HTTP transmitted over TLS. See NIST SP 800-95 under HyperText Transfer Protocol
The virtualization component that manages the guest OSs on a host and controls the flow
A standard method for communication between clients and Web servers.
A categorization of different types of network traffic to prioritize latency-sensitive
Predefined signatures for known malware used by antivirus detection algorithms.
An organization with a defined mission/goal and a defined boundary
The use of the algorithm and key length is allowed, but the user must accept some risk.
The symmetric encryption algorithm defined by the Data Encryption Standard
Safeguards implemented through software to protect end-user machines
A file that has been logically, but not necessarily physically, erased
A set of system resources that operate in the same security domain and that share
The suppression of log entries from analysis, reporting, or long-term storage
Any observable occurrence in an information system. See the following under Event
The prevention of authorized access to resources or the delaying of time-critical
A specialized formatted number that is registered with an internationally
Of or relating to biometric identification in which submitted feature data
A string of eight bits. Often referred to as a byte. See the following under Octet
Bit(s) used to determine whether a block of data has been altered.
Of or relating to biometric verification in which submitted feature data
Hardware, firmware, or software that is intentionally included
A host that provides “electronic post office” facilities. It stores incoming mail
A “repair job” for a piece of programming; also known as a “fix”.
The process of recovering secret passwords stored in a computer system
Provides a single point of entry into the SOA for requester entities
A possible replacement for the conventional BIOS that is becoming widely deployed
A passphrase is a memorized secret consisting of a sequence of words or other text
The behavior of an actor. A tactic is the highest-level description of this behavior