A simulated environment created by virtualization. See the following under Virtual machine (VM) for more information: NIST SP 800-125. NIST SP 800-190. Software that allows a single host to run one ...
Protected information system link utilizing tunneling, security controls, and endpoint address translation giving the impression of a dedicated line. See NIST SP 800-53 Rev. 4 under Virtual Private ...
The simulation of the software and/or hardware upon which other software runs. See the following for more information: NIST SP 800-125 .NIST SP 800-190 (NIST SP 800-125). The use of ...
A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting (i.e., inserting a copy of itself into and becoming part of) ...
Voice over Internet Protocol A term used to describe the transmission of packetized voice using the internet protocol (IP) and consists of both signaling ...
Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. See the following under ...