See system security officer (SSO).
Series of transformations that converts plaintext to ciphertext using the Cipher Key.
A random or non-repeating value that is included in data exchanged by a protocol
A binary vector used as the input to initialize the algorithm for the encryption
A hash value of a (public) key encoded into a string (e.g., into hexadecimal).
Removing malware from within a file.
A piece of state information supplied by a Web server to a browser, in a response for a requested resource, for the browser to store temporarily and return to the server on any subsequent visits or requests.
(A) with respect to an executive agency means any equipment or interconnected system or subsystem of equipment
A Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiations and the discrete logarithm problem.
A globally unique identifier of a data object as defined in ISO/IEC 8824-2.
A service that is used to provide assurance of the integrity and origin of data
The discipline that embodies the principles, means, and methods for the transformation of data
A domain that implements a security policy and is administered by a single authority.
A type of intra-agency, interagency, or National Guard agreement between two or more parties, which includes specific terms that are agreed to, and a commitment by at least one party to engage in action. It includes either a commitment of resources or binds a party to a specific action. See CNSSI 4009-2015 under memorandum of agreement (MOA) from DoDI 4000.19
A standard for adoption and use by federal departments and agencies that has been developed
The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.
A common connection point for devices in a network. Hubs commonly are used to pass data from one device (or segment) to another.
The property that data originated from its purported source.
An inter-network connection device that restricts data communication traffic between two connected networks.
Refers to both information and communications networks.
A protocol that makes use of the headers in an IETF RFC 2822 message to describe the structure of rich message content.
Disposal is a release outcome following the decision that media does not contain sensitive data.
The process of granting or denying specific requests
Computer programs and data stored in hardware – typically in read-only memory (ROM) or programmable read-only memory (PROM)
A particular type of de-identification that both removes the association with a data subject
Storing a log file in a way that reduces the amount of storage space needed for the file without altering the meaning of its contents.
An attack that attempts to cause a failure in a system by providing more input than the system can process properly.