Inference

Refers to the ability to deduce the identity of a person associated with a set of data

Information

An instance of an information type. Meaningful interpretation or expression of data.

Incineration

A physically Destructive method of sanitizing media; the act of burning completely

LDAP

Light Director Access Protocol The Lightweight Directory Access Protocol, or LDAP

Least Privilege

The principle that a security architecture should be designed so that each entity is granted

Latency

Time delay in processing voice packets. See NIST SP 800-58 for more information.

Key Distribution

The transport of a key and other keying material from an entity that either owns

Java

A programming language developed by Sun Microsystems. Java contains a number of

JavaScript

A scripting language for use in developing interactive Web sites.

Key Logger

A program designed to record which keys are pressed on a computer keyboard

Key Escrow

A deposit of the private key of a subscriber and other pertinent information

HTTPS

HTTP transmitted over TLS. See NIST SP 800-95 under HyperText Transfer Protocol

Hypervisor

The virtualization component that manages the guest OSs on a host and controls the flow

HTTP

A standard method for communication between clients and Web servers.

Virus Definitions

Predefined signatures for known malware used by antivirus detection algorithms.

Enterprise

An organization with a defined mission/goal and a defined boundary

Deprecated

The use of the algorithm and key length is allowed, but the user must accept some risk.

DES

The symmetric encryption algorithm defined by the Data Encryption Standard

Deleted File

A file that has been logically, but not necessarily physically, erased

Enclave

A set of system resources that operate in the same security domain and that share

Event Filtering

The suppression of log entries from analysis, reporting, or long-term storage