Deleted File

A file that has been logically, but not necessarily physically, erased

Enclave

A set of system resources that operate in the same security domain and that share

Event Filtering

The suppression of log entries from analysis, reporting, or long-term storage

Event

Any observable occurrence in an information system. See the following under Event

One-to-Many

Of or relating to biometric identification in which submitted feature data

Octet

A string of eight bits. Often referred to as a byte. See the following under Octet

Parity

Bit(s) used to determine whether a block of data has been altered.

One-to-One

Of or relating to biometric verification in which submitted feature data

Malware

Hardware, firmware, or software that is intentionally included

Mail Server

A host that provides “electronic post office” facilities. It stores incoming mail

Patch

A “repair job” for a piece of programming; also known as a “fix”.

Password Cracking

The process of recovering secret passwords stored in a computer system

Web Portal

Provides a single point of entry into the SOA for requester entities

UEFI

A possible replacement for the conventional BIOS that is becoming widely deployed

Passphrase

A passphrase is a memorized secret consisting of a sequence of words or other text

TTP

The behavior of an actor. A tactic is the highest-level description of this behavior

Whitelisting

A list of discrete entities, such as hosts or applications that are known to be benign

Web Service

A software component or system designed to support interoperable machine

Wifi

A generic term that refers to a wireless local area network that observes the IEEE 802.11

Threats

Any circumstance or event with the potential to adversely impact organizational operations

Tempest

A name referring to the investigation, study, and control of unintentional compromising

Third-Party Providers

Service providers, integrators, vendors, telecommunications, and infrastructure support

Technical Controls

The security controls (i.e., safeguards or countermeasures) for an information system

Threat Actor

An individual or a group posing a threat. See NIST SP 800-150 under Threat Actor

Telework

The ability for an organization’s employees and contractors to conduct work