Glossary A
- Authenticity
- Authorization
- Awareness
- Authentication, Authorization, and ...
- Algorithm Identifier
- Aggregated Information
- Anonymozation
- Aggregate
- Agent
- Antispyware Software
- Anti-Forensic
- ABAC
- Acceptable Risk
- Availability
- Access Control
- Access Control List ...
- Access Control Matrix
- Access Control Mechanism
- Access Control System
- Access List
- Access Point (AP)
- Accountability
- Active Content
- Active Attack
- Active Cyber Defense
- Active Security Testing
- Administrative Account
- Advanced Persistent Threat
- Adversary
- Adverse Consequence
- AES
- Aggregation
- Air Gap
- Alarm
- Alert

Authenticity
The property that data originated from its purported source.See NIST SP 800-38B under Authenticity, NIST SP 800-38C under Authenticity, NIST SP 800-38D under Authenticity, NIST ...
Authorization
The process of granting or denying specific requests: 1) for obtaining and using information and related information processing services; and 2) to enter specific physical ...
Authentication, Authorization, and Accounting
The property that data originated from its purported source.See NIST SP 800-38B under Authenticity, NIST SP 800-38C under Authenticity, NIST SP 800-38D under Authenticity, NIST ...
Algorithm Identifier
A PIV algorithm identifier is a one-byte identifier that specifies a cryptographic algorithm and key size. For symmetric cryptographic operations, the algorithm identifier also specifies ...
Aggregated Information
Information elements collated on a number of individuals, typically used for the purposes of making comparisons or identifying patterns.See NIST SP 800-122 for more information.
Anonymozation
Process that removes the association between the identifying dataset and the data subject.See NISTIR 8053 (ISO/TS 25237:2008) for more information.
Antispyware Software
A program that specializes in detecting both malware and non-malware forms of spyware.See NIST SP 800-69 for more information.
Anti-Forensic
A technique for concealing or destroying data so that others cannot access it.See NIST SP 800-86 for more information.
Acceptable Risk
The level of Residual Risk that has been determined to be a reasonable level of potential loss/disruption for a specific IT system. See NIST SP ...
Availability
Availability indicates that data and services are available when needed. For some organizations, this simply means that the data and services must be available between ...
Access Control
Procedures and controls that limit or detect access to critical information resources. This can be accomplished through software, biometrics devices, or physical access to a ...
Access Control List (ACL)
A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed ...
Access Control Matrix
A table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that ...
Access Control Mechanism
Security safeguards (i.e., hardware and software features, physical controls, operating procedures, management procedures, and various combinations of these) designed to detect and deny unauthorized access ...
Access Control System
A set of procedures and/or processes, normally automated, which allows access to a controlled area or to information to be controlled, in accordance with ...
Access List
Roster of individuals authorized admittance to a controlled area. See CNSSI 4009-2015 for more information.
Access Point (AP)
A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is ...
Accountability
The principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss ...
Active Content
Electronic documents that can carry out or trigger actions automatically on a computer platform without the intervention of a user. See CNSSI 4009-2015 (NIST SP 800-28) and NIST SP 800-28 ...
Active Attack
An attack on the authentication protocol where the Attacker transmits data to the Claimant, Credential Service Provider, Verifier, or Relaying Party. Examples of active attacks ...
Active Cyber Defense
Active Cyber Defense (ACD)Synchronized, real-time capability to discover, detect, analyze,and mitigate threats and vulnerabilities.See CNSSI 4009-2015 (DSOC 2011) for more information.
Active Security Testing
Security testing that involves direct interaction with a target, such as sending packets to a target.See NIST SP 800-115 for more information.
Administrative Account
A user account with full privileges on a computer.See NIST SP 800-69 for more information.
Advanced Persistent Threat
APTAn adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack ...
Adverse Consequence
An undesirable consequence associated with a loss. See (ISO/IEC 15026) for more information.