Cipher

Series of transformations that converts plaintext to ciphertext using the Cipher Key.

Nonce

A random or non-repeating value that is included in data exchanged by a protocol

IV

A binary vector used as the input to initialize the algorithm for the encryption

Fingerprint

A hash value of a (public) key encoded into a string (e.g., into hexadecimal).

Cookie

A piece of state information supplied by a Web server to a browser, in a response for a requested resource, for the browser to store temporarily and return to the server on any subsequent visits or requests.

IT

(A) with respect to an executive agency means any equipment or interconnected system or subsystem of equipment

DSA

A Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiations and the discrete logarithm problem.

OID

A globally unique identifier of a data object as defined in ISO/IEC 8824-2.

Non-repudiation

A service that is used to provide assurance of the integrity and origin of data

Cryptography

The discipline that embodies the principles, means, and methods for the transformation of data

Domain

A domain that implements a security policy and is administered by a single authority.

MOU/A

A type of intra-agency, interagency, or National Guard agreement between two or more parties, which includes specific terms that are agreed to, and a commitment by at least one party to engage in action. It includes either a commitment of resources or binds a party to a specific action. See CNSSI 4009-2015 under memorandum of agreement (MOA) from DoDI 4000.19

Read More

FIPS

A standard for adoption and use by federal departments and agencies that has been developed

DSIG

The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.

Hub

A common connection point for devices in a network. Hubs commonly are used to pass data from one device (or segment) to another.

Authenticity

The property that data originated from its purported source.

Firewall

An inter-network connection device that restricts data communication traffic between two connected networks.

Cyber

Refers to both information and communications networks.

Disposal

Disposal is a release outcome following the decision that media does not contain sensitive data.

Authorization

The process of granting or denying specific requests

Firmware

Computer programs and data stored in hardware – typically in read-only memory (ROM) or programmable read-only memory (PROM)

Pseudonymization

A particular type of de-identification that both removes the association with a data subject

Log Compression

Storing a log file in a way that reduces the amount of storage space needed for the file without altering the meaning of its contents.

Flooding

An attack that attempts to cause a failure in a system by providing more input than the system can process properly.