A function in the lifecycle of keying material; mechanisms and processes
Evolution of a system, product, service, project, or other human-made entity
A function in the lifecycle of keying material; a process whereby a notice is made
A user account with limited privileges on a computer. See NIST SP 800-69
A weighted factor based on a subjective analysis of the probability that a given threat
A type of threat action whereby an unauthorized entity gains access to a system
A protocol defined in IETF RFCs 2440 and 3156 for encrypting messages
An online protocol used to determine the status of a public key certificate.
The scope of activities associated with a system, encompassing the system’s initiation
To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field.
Use of a set of methods, principles, or rules for assessing risks based on the use
A key pair, consisting of a public key and a private key that is intended
A cryptographic key that is generated for each execution of a key-establishment
Communications encryption in which data is encrypted when being passed
Perimeter network segment that is logically between internal and external networks.
To destroy is an action applied to a key or a piece of secret data.
To block all inbound and outbound traffic that has not been expressly permitted by firewall
Universal Serial Bus A hardware interface for low-speed peripherals such as the keyboard
An ordered sequence of bytes. See NIST SP 800-56B Rev. 1 and NIST SP 800-56A Rev. 2
An algorithm that, given the same inputs, always produces the same outputs.
An environmentally conditioned work space that is partially equipped with information
A measurable physical characteristic or personal behavioral trait used
The systematic notification, identification, deployment, installation, and verification
A uniform resource identifier, or URI, is a short string containing a name or address
Federal Desktop Core Configuration OMB-mandated set of security configurations
The amount of time mission/business process can be disrupted
See “Packet Filtering”. See NIST SP 800-41 Rev. 1 under Stateless Inspection