A standard that defines the way in which Internet communications

Risk Response

Accepting, avoiding, mitigating, sharing, or transferring risk to organizational operations

Network Layer

Layer of the TCP/IP protocol stack that is responsible for routing packets

Exclusive OR

Bitwise logical “exclusive-or”, where 0⊕ 0 = 0, 0⊕ 1 = 1, 1⊕ 0 = 1, and 1⊕ 1 = 0.


Grounds for belief or disbelief; data on which to base proof or to establish truth or falsehood.


Risk Management Framework A structured approach used to oversee and manage risk

Risk Management

The process of managing risks to organizational operations organizational assets

Risk Tolerance

The level of risk an entity is willing to assume in order to achieve a potential desired

Risk Mitigation

Prioritizing, evaluating, and implementing the appropriate risk-reducing controls

Media Sanitization

A general term referring to the actions taken to render data written on media unrecoverable

Mission Critical

Any telecommunications or information system that is defined as a national security

Mobile Code

Software programs or parts of programs obtained from remote systems

Log Analysis

Studying log entries to identify events of interest or suppress log entries

Random Number

For the purposes of this Recommendation, a value in a set that has an equal probability


A record of the events occurring within an organization’s systems and networks.

Log Clearing

Removing all entries from a log that precede a certain date and time.


Consists of the information passed down from the previous layer.


Access control based on user roles (i.e., a collection of access authorizations a user


To write data on a medium, such as a magnetic tape, magnetic disk, or optical disk.


An authentication and accounting system used to control access to an ISP.

Event Aggregation

The consolidation of similar log entries into a single entry containing a count of the number