Refers to the ability to deduce the identity of a person associated with a set of data


An instance of an information type. Meaningful interpretation or expression of data.


A physically Destructive method of sanitizing media; the act of burning completely


Light Director Access Protocol The Lightweight Directory Access Protocol, or LDAP

Least Privilege

The principle that a security architecture should be designed so that each entity is granted


Time delay in processing voice packets. See NIST SP 800-58 for more information.

Key Distribution

The transport of a key and other keying material from an entity that either owns


A programming language developed by Sun Microsystems. Java contains a number of


A scripting language for use in developing interactive Web sites.

Key Logger

A program designed to record which keys are pressed on a computer keyboard

Key Escrow

A deposit of the private key of a subscriber and other pertinent information


HTTP transmitted over TLS. See NIST SP 800-95 under HyperText Transfer Protocol


The virtualization component that manages the guest OSs on a host and controls the flow


A standard method for communication between clients and Web servers.

Virus Definitions

Predefined signatures for known malware used by antivirus detection algorithms.


An organization with a defined mission/goal and a defined boundary


The use of the algorithm and key length is allowed, but the user must accept some risk.


The symmetric encryption algorithm defined by the Data Encryption Standard

Deleted File

A file that has been logically, but not necessarily physically, erased


A set of system resources that operate in the same security domain and that share

Event Filtering

The suppression of log entries from analysis, reporting, or long-term storage