HTTPS

HTTP transmitted over TLS. See NIST SP 800-95 under HyperText Transfer Protocol

Hypervisor

The virtualization component that manages the guest OSs on a host and controls the flow

HTTP

A standard method for communication between clients and Web servers.

Virus Definitions

Predefined signatures for known malware used by antivirus detection algorithms.

Enterprise

An organization with a defined mission/goal and a defined boundary

Deprecated

The use of the algorithm and key length is allowed, but the user must accept some risk.

DES

The symmetric encryption algorithm defined by the Data Encryption Standard

Deleted File

A file that has been logically, but not necessarily physically, erased

Enclave

A set of system resources that operate in the same security domain and that share

Event Filtering

The suppression of log entries from analysis, reporting, or long-term storage

Event

Any observable occurrence in an information system. See the following under Event

One-to-Many

Of or relating to biometric identification in which submitted feature data

Octet

A string of eight bits. Often referred to as a byte. See the following under Octet

Parity

Bit(s) used to determine whether a block of data has been altered.

One-to-One

Of or relating to biometric verification in which submitted feature data

Malware

Hardware, firmware, or software that is intentionally included

Mail Server

A host that provides “electronic post office” facilities. It stores incoming mail

Patch

A “repair job” for a piece of programming; also known as a “fix”.

Password Cracking

The process of recovering secret passwords stored in a computer system

Web Portal

Provides a single point of entry into the SOA for requester entities

UEFI

A possible replacement for the conventional BIOS that is becoming widely deployed

Passphrase

A passphrase is a memorized secret consisting of a sequence of words or other text

TTP

The behavior of an actor. A tactic is the highest-level description of this behavior