A routing device that provides access control functionality for host addresses

Packet Filter

A routing device that provides access control functionality for host addresses


The process of using a mathematical algorithm against data

Fault Tree Analysis

A top-down, deductive failure analysis in which an undesired state of a system (top event)


A citizen of the United States or an alien lawfully admitted for permanent residence.

Fault Tolerant

Of a system, having the built-in capability to provide continued, correct execution

Hybrid Cloud

The cloud infrastructure is a composition of two or more distinct cloud infrastructures


An occurrence that actually or potentially jeopardizes the confidentiality, integrity,


The consolidation of similar log entries into a single entry containing a count


Official responsible for carrying out the Chief Information Officer responsibilities


Denial of Authorization to Operate; issued by a DAO to an issuer that is not authorized


A Denial of Service technique that uses numerous hosts to perform the attack.

Incident Handling

An IT security incident is an adverse event in a computer system or network

Incident Response

The mitigation of violations of security policies and recommended practices.

Impact Level

The magnitude of harm that can be expected to result from the consequences


A package that contains all the files required to run a container. See NIST SP 800-190.


A group of eight bits that is treated either as a single entity or as an array of 8 individual


Advanced Encryption Standard (as specified in FIPS 197). NIST SP 800-57 Part 1 Rev. 4


Individual, group, organization, or government that conducts or has the intent to conduct

Hot Site

A fully operational offsite data processing facility equipped with hardware and software

Host-based IDPS

A program that monitors the characteristics of a single host and the events occurring