An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time
Cryptographic
Pertaining to, or concerned with, cryptography.
Privacy
Assurance that the confidentiality of, and access to, certain information about an entity is protected.
Rivest-Shamir-Adleman (RSA)
Algorithm developed by Rivest, Shamir and Adelman (allowed in FIPS 186-3 and specified in ANS X9.31 and PKCS #1).
Disclosure
Divulging of, or provision of access to, data.
Control
The part of the ICS used to perform the monitoring and control of the physical process.
DH
A method used to securely exchange or establish secret keys across an insecure network.
PIN
A memorized secret typically consisting of only decimal digits.
Exfiltration
The unauthorized transfer of information from an information system.
Forensics
The practice of gathering, retaining, and analyzing computer-related data for investigative purposes
Intranet
A computer network, especially one based on Internet technology
Pseudonym
A name assigned through a formal process by a federal department or agency to a federal employee for the purpose of the employee’s protection
Extranet
A computer network that an organization uses for application data traffic between the organization and its business partners.
Awareness
Awareness is not training.
Format
Pre-established layout for data.
Cyberspace
A global domain within the information environment consisting of the interdependent network
Normalization
Converting each log data field to a particular data representation and categorizing it consistently.
Log Conversion
Parsing a log in one format and storing its entries in a second format.
PSK
A single secret key used by IPsec endpoints to authenticate endpoints to each other
Interface
In a service-oriented architecture, a specification of the operations that a service offers its clients.
Authentication, Authorization, and Accounting
The property that data originated from its purported source.
Null
Dummy letter, letter symbol, or code group inserted into an encrypted message to delay or prevent its decryption
Default Classification
Classification reflecting the highest classification being processed in an information system.
Algorithm Identifier
A PIV algorithm identifier is a one-byte identifier that specifies a cryptographic algorithm and key size.
The Federal Information Security Management Act (FISMA)
Requires agencies to integrate IT security into their capital planning and enterprise architecture processes at the agency
Decryption
The process of transforming ciphertext into plaintext using a cryptographic algorithm and key.
Aggregated Information
Information elements collated on a number of individuals, typically used for the purposes of making comparisons or identifying patterns.