An FCKMS role that assists in the key-recovery/metadata-recovery process.
The process used to view or record both the keystrokes entered by a computer user
A high-level policy of an organization that is created to support and enforce portions
Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”)
Use a system of symbols to represent information, which might originally
Upon a disruption event that causes the system to fail, it fails to a pre-determined state.
An RBG that includes a DRBG mechanism and (at least initially) has access
Information that is not encrypted.See NIST SP 800-82 Rev. 2 under Clear Text
Information that has been determined pursuant
Information that has been determined: pursuant to Executive Order 12958
An interface between two systems at which (a) they are not connected physically
A method of testing where testers target individual binary components
A brief, usually human-readable, technical notification regarding …
A device or function that signals the existence of an abnormal condition
The process for generating, transmitting, storing, analyzing, and disposing of log data.
An individual record within a log. See NIST SP 800-92 for detailed information.
An incorrect or suboptimal configuration of an information system
A character that has some special meaning to a computer program
Information describing the characteristics of data including
A group of computers and other devices dispersed over a relatively limited area
A user account with full privileges on a computer. See NIST SP 800-69
A standard that defines the way in which Internet communications
facilitates the adjudication of different interconnected system security policies
Accepting, avoiding, mitigating, sharing, or transferring risk to organizational operations
Performs packet sniffing and network traffic analysis
Layer of the TCP/IP protocol stack that is responsible for routing packets
Bitwise logical “exclusive-or”, where 0⊕ 0 = 0, 0⊕ 1 = 1, 1⊕ 0 = 1, and 1⊕ 1 = 0.