See system security officer (SSO).
Cipher
Series of transformations that converts plaintext to ciphertext using the Cipher Key.
Nonce
A random or non-repeating value that is included in data exchanged by a protocol
IV
A binary vector used as the input to initialize the algorithm for the encryption
Fingerprint
A hash value of a (public) key encoded into a string (e.g., into hexadecimal).
Disinfecting
Removing malware from within a file.
Cookie
A piece of state information supplied by a Web server to a browser, in a response for a requested resource, for the browser to store temporarily and return to the server on any subsequent visits or requests.
IT
(A) with respect to an executive agency means any equipment or interconnected system or subsystem of equipment
DSA
A Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiations and the discrete logarithm problem.
OID
A globally unique identifier of a data object as defined in ISO/IEC 8824-2.
Non-repudiation
A service that is used to provide assurance of the integrity and origin of data
Cryptography
The discipline that embodies the principles, means, and methods for the transformation of data
Domain
A domain that implements a security policy and is administered by a single authority.
MOU/A
A type of intra-agency, interagency, or National Guard agreement between two or more parties, which includes specific terms that are agreed to, and a commitment by at least one party to engage in action. It includes either a commitment of resources or binds a party to a specific action. See CNSSI 4009-2015 under memorandum of agreement (MOA) from DoDI 4000.19
FIPS
A standard for adoption and use by federal departments and agencies that has been developed
DSIG
The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
Hub
A common connection point for devices in a network. Hubs commonly are used to pass data from one device (or segment) to another.
Authenticity
The property that data originated from its purported source.
Firewall
An inter-network connection device that restricts data communication traffic between two connected networks.
Cyber
Refers to both information and communications networks.
Multipurpose Internet Mail Extensions (MIME)
A protocol that makes use of the headers in an IETF RFC 2822 message to describe the structure of rich message content.
Disposal
Disposal is a release outcome following the decision that media does not contain sensitive data.
Authorization
The process of granting or denying specific requests
Firmware
Computer programs and data stored in hardware – typically in read-only memory (ROM) or programmable read-only memory (PROM)
Pseudonymization
A particular type of de-identification that both removes the association with a data subject
Log Compression
Storing a log file in a way that reduces the amount of storage space needed for the file without altering the meaning of its contents.
Flooding
An attack that attempts to cause a failure in a system by providing more input than the system can process properly.