Encryption Algorithm

Set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.

Decipher

Convert enciphered text to plain text by means of a cryptographic system.

Antispyware Software

A program that specializes in detecting both malware and non-malware forms of spyware.

Anti-Forensic

A technique for concealing or destroying data so that others cannot access it.

Permission

Authorization to perform some action on a system.

Risk

 The level of impact on organizational operations (including mission, functions, image

Transmission

The state that exists when information is being electronically sent from one location

Container Runtime

The environment for each container; comprised of binaries coordinating multiple OS

Contingency Plan

Management policy and procedures used to guide an enterprise response

Mobile Device

A portable computing device that: (i) has a small form factor such that

Framework

A layered structure indicating what kind of programs can or should be built

Internet of Things

As used in this publication, user or industrial devices that are connected to the internet.

Internet

The single, interconnected, worldwide system of commercial, governmental, educational

Total Risk

The potential for the occurrence of an adverse event if no mitigating action is taken

Training

The ‘Training’ level of the learning continuum strives to produce relevant

Operating System

The software “master control application” that runs the computer.

Key Recovery Agent

An FCKMS role that assists in the key-recovery/metadata-recovery process.

Keystroke Monitoring

The process used to view or record both the keystrokes entered by a computer user

Encryption

Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”)

Encode

Use a system of symbols to represent information, which might originally

Fail to Known State

Upon a disruption event that causes the system to fail, it fails to a pre-determined state.