Development Life Cycle

The scope of activities associated with a system, encompassing the system’s initiation


To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field.

Ephemeral Key Pair

A key pair, consisting of a public key and a private key that is intended

Ephemeral Key

A cryptographic key that is generated for each execution of a key-establishment


To destroy is an action applied to a key or a piece of secret data.

Deny by Default

To block all inbound and outbound traffic that has not been expressly permitted by firewall


Universal Serial Bus A hardware interface for low-speed peripherals such as the keyboard

Byte String

An ordered sequence of bytes. See NIST SP 800-56B Rev. 1 and NIST SP 800-56A Rev. 2

Warm Site

An environmentally conditioned work space that is partially equipped with information


A measurable physical characteristic or personal behavioral trait used

Patch Management

The systematic notification, identification, deployment, installation, and verification


Federal Desktop Core Configuration OMB-mandated set of security configurations

Packet Filtering

See “Packet Filtering”. See NIST SP 800-41 Rev. 1 under Stateless Inspection

Read-Only Memory

ROM is a pre-recorded storage medium that can only be read from and not written to.


Refers to the ability to deduce the identity of a person associated with a set of data


An instance of an information type. Meaningful interpretation or expression of data.