The U.S. government repository of standards-based vulnerability management data
A mechanism for mapping addresses on one network to addresses on another network
A form of contactless, close proximity, radio communications based on RFID
Refers to the ability to deduce the identity of a person associated with a set of data
An instance of an information type. Meaningful interpretation or expression of data.
A physically Destructive method of sanitizing media; the act of burning completely
Light Director Access Protocol The Lightweight Directory Access Protocol, or LDAP
The principle that a security architecture should be designed so that each entity is granted
Time delay in processing voice packets. See NIST SP 800-58 for more information.
A key center that generates keys for distribution to subscriber entities.
The transport of a key and other keying material from an entity that either owns
A programming language developed by Sun Microsystems. Java contains a number of
A scripting language for use in developing interactive Web sites.
A program designed to record which keys are pressed on a computer keyboard
A deposit of the private key of a subscriber and other pertinent information
HTTP transmitted over TLS. See NIST SP 800-95 under HyperText Transfer Protocol
The virtualization component that manages the guest OSs on a host and controls the flow
A standard method for communication between clients and Web servers.
A categorization of different types of network traffic to prioritize latency-sensitive
Predefined signatures for known malware used by antivirus detection algorithms.
An organization with a defined mission/goal and a defined boundary
The use of the algorithm and key length is allowed, but the user must accept some risk.
The symmetric encryption algorithm defined by the Data Encryption Standard
Safeguards implemented through software to protect end-user machines
A file that has been logically, but not necessarily physically, erased
A set of system resources that operate in the same security domain and that share
The suppression of log entries from analysis, reporting, or long-term storage