Development Life Cycle

The scope of activities associated with a system, encompassing the system’s initiation

Degauss

To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field.

Ephemeral Key Pair

A key pair, consisting of a public key and a private key that is intended

Ephemeral Key

A cryptographic key that is generated for each execution of a key-establishment

Destroy

To destroy is an action applied to a key or a piece of secret data.

Deny by Default

To block all inbound and outbound traffic that has not been expressly permitted by firewall

USB

Universal Serial Bus A hardware interface for low-speed peripherals such as the keyboard

Byte String

An ordered sequence of bytes. See NIST SP 800-56B Rev. 1 and NIST SP 800-56A Rev. 2

Warm Site

An environmentally conditioned work space that is partially equipped with information

Biometrics

A measurable physical characteristic or personal behavioral trait used

Patch Management

The systematic notification, identification, deployment, installation, and verification

FDCC

Federal Desktop Core Configuration OMB-mandated set of security configurations

Packet Filtering

See “Packet Filtering”. See NIST SP 800-41 Rev. 1 under Stateless Inspection

Read-Only Memory

ROM is a pre-recorded storage medium that can only be read from and not written to.

Inference

Refers to the ability to deduce the identity of a person associated with a set of data

Information

An instance of an information type. Meaningful interpretation or expression of data.