The process of transforming ciphertext into plaintext using a cryptographic algorithm and key.

Aggregated Information

Information elements collated on a number of individuals, typically used for the purposes of making comparisons or identifying patterns.

Certificate Status Authority

A trusted entity that provides on-line verification to a Relying Party of a subject certificate’s trustworthiness

Threat Analysis

Process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat.

Evaluation Assurance Level

Set of assurance requirements that represent a point on the Common Criteria predefined assurance scale.

Enclave Boundary

Point at which an enclave’s internal network service layer connects to an external network’s service layer


Process that removes the association between the identifying dataset and the data subject.


A uniform resource identifier, or URI, is a short string containing a name or address which refers to an object in the “web.”

Time bomb

Resident computer program that triggers an unauthorized act at a predefined time.


The process of preparing National Security System equipment for disposal by extracting all CCI

Encryption Certificate

A certificate containing a public key that can encrypt or decrypt electronic messages, files, documents


To combine several more-specific prefixes into a less-specific prefix.


A generic term encompassing decoding and deciphering.


Convert encoded data back to its original form of representation.


An assessment object that includes people applying specifications, mechanisms, or activities.

Network Address Translation (NAT)

A routing technology used by many firewalls to hide internal system addresses from an external network through use of an addressing schema.


Output Block.


Encompasses all those components of the system that are to be accredited by the DAA.

Certificate Policy (CP)

A specialized form of administrative policy tuned to electronic transactions performed during certificate management.


A host-based IPS program that monitors and analyzes activity and performs preventive actions.

Encryption Algorithm

Set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.