A brief, usually human-readable, technical notification regarding …
Alarm
A device or function that signals the existence of an abnormal condition
Log Management
The process for generating, transmitting, storing, analyzing, and disposing of log data.
Log Entry
An individual record within a log. See NIST SP 800-92 for detailed information.
Misconfiguration
An incorrect or suboptimal configuration of an information system
Metacharacter
A character that has some special meaning to a computer program
Metadata
Information describing the characteristics of data including
Local Area Network (LAN)
A group of computers and other devices dispersed over a relatively limited area
Administrative Account
A user account with full privileges on a computer. See NIST SP 800-69
WAP
A standard that defines the way in which Internet communications
Boundary Protection Device
facilitates the adjudication of different interconnected system security policies
Risk Response
Accepting, avoiding, mitigating, sharing, or transferring risk to organizational operations
Network Intrusion Detection System
Performs packet sniffing and network traffic analysis
Network Layer
Layer of the TCP/IP protocol stack that is responsible for routing packets
Exclusive OR
Bitwise logical “exclusive-or”, where 0⊕ 0 = 0, 0⊕ 1 = 1, 1⊕ 0 = 1, and 1⊕ 1 = 0.
Evidence
Grounds for belief or disbelief; data on which to base proof or to establish truth or falsehood.
RMF
Risk Management Framework A structured approach used to oversee and manage risk
Block Cipher-based Message Authentication Code
Cipher-based Message Authentication Code
Risk Management
The process of managing risks to organizational operations organizational assets
Risk Tolerance
The level of risk an entity is willing to assume in order to achieve a potential desired
Risk Mitigation
Prioritizing, evaluating, and implementing the appropriate risk-reducing controls
Block Cipher Algorithm
A family of functions and their inverses that is parameterized by cryptographic keys
Media Sanitization
A general term referring to the actions taken to render data written on media unrecoverable
Mission Critical
Any telecommunications or information system that is defined as a national security
Mobile Code
Software programs or parts of programs obtained from remote systems
Log Analysis
Studying log entries to identify events of interest or suppress log entries
Random Number
For the purposes of this Recommendation, a value in a set that has an equal probability