Key Recovery

A function in the lifecycle of keying material; mechanisms and processes

Life Cycle

Evolution of a system, product, service, project, or other human-made entity

Key Revocation

A function in the lifecycle of keying material; a process whereby a notice is made

Likelihood

A weighted factor based on a subjective analysis of the probability that a given threat

Masquerading

A type of threat action whereby an unauthorized entity gains access to a system

OpenPGP

A protocol defined in IETF RFCs 2440 and 3156 for encrypting messages

OCSP

An online protocol used to determine the status of a public key certificate.

Development Life Cycle

The scope of activities associated with a system, encompassing the system’s initiation

Degauss

To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field.

Ephemeral Key Pair

A key pair, consisting of a public key and a private key that is intended

Ephemeral Key

A cryptographic key that is generated for each execution of a key-establishment

Destroy

To destroy is an action applied to a key or a piece of secret data.

Deny by Default

To block all inbound and outbound traffic that has not been expressly permitted by firewall

USB

Universal Serial Bus A hardware interface for low-speed peripherals such as the keyboard

Byte String

An ordered sequence of bytes. See NIST SP 800-56B Rev. 1 and NIST SP 800-56A Rev. 2

Warm Site

An environmentally conditioned work space that is partially equipped with information

Biometrics

A measurable physical characteristic or personal behavioral trait used

Patch Management

The systematic notification, identification, deployment, installation, and verification

FDCC

Federal Desktop Core Configuration OMB-mandated set of security configurations

Packet Filtering

See “Packet Filtering”. See NIST SP 800-41 Rev. 1 under Stateless Inspection