The single, interconnected, worldwide system of commercial, governmental, educational
Multi-level Security (MLS)
Concept of processing information with different classifications and categories
Total Risk
The potential for the occurrence of an adverse event if no mitigating action is taken
Training
The ‘Training’ level of the learning continuum strives to produce relevant
Most Significant Bit(s)
The left-most bit(s) of a bit string. See the following under Most Significant Bit(s)
Operating System
The software “master control application” that runs the computer.
Physical Access Control System
An electronic system that controls the ability of people or vehicles to enter a protected area
Operating System Virtualization
A virtual implementation of the operating system interface that can be used
Key Recovery Agent
An FCKMS role that assists in the key-recovery/metadata-recovery process.
Keystroke Monitoring
The process used to view or record both the keystrokes entered by a computer user
Information Security Policy
A high-level policy of an organization that is created to support and enforce portions
Encryption
Cryptographic transformation of data (called “plaintext”) into a form (called “ciphertext”)
Encode
Use a system of symbols to represent information, which might originally
Fail to Known State
Upon a disruption event that causes the system to fail, it fails to a pre-determined state.
DRBG
An RBG that includes a DRBG mechanism and (at least initially) has access
Clear Text
Information that is not encrypted.See NIST SP 800-82 Rev. 2 under Clear Text
Classified National Security Information
Information that has been determined pursuant
Classified Information
Information that has been determined: pursuant to Executive Order 12958
Air Gap
An interface between two systems at which (a) they are not connected physically
Penetration Testing
A method of testing where testers target individual binary components
Alert
A brief, usually human-readable, technical notification regarding …
Alarm
A device or function that signals the existence of an abnormal condition
Log Management
The process for generating, transmitting, storing, analyzing, and disposing of log data.
Log Entry
An individual record within a log. See NIST SP 800-92 for detailed information.
Misconfiguration
An incorrect or suboptimal configuration of an information system
Metacharacter
A character that has some special meaning to a computer program
Metadata
Information describing the characteristics of data including