Concepts
access control,
assurance,
attack,
audit,
authentication,
authorization,
automated information system,
availability,
certification,
Common Criteria for Information Technology Security,
cryptography,
cyberspace,
evaluation,
identity,
key management,
privacy,
requirements,
risk,
risk management,
security,
security target,
software development,
threat,
trust,
Trusted Computer System Evaluation Criteria,
users,
Terms
- *-property
- IncludedBy:Bell-LaPadula security model, property,
- PreferredFor:star (*) property,
- Related:access control, model,
- Synonym:confinement property,
- 2-factor authentication
- IncludedBy:3-factor authentication,
- Related:process,
- 3-factor authentication
- IncludedBy:authentication,
- Includes:2-factor authentication, authentication information,
- Related:biometric authentication, challenge/response, passwords, personal identification number, personal identity verification, process, proof of possession protocol, tokens,
- ABA Guidelines
- Related:association, certificate, digital signature, signature,
- abend
- Related:control, failure, process, program, test,
- abort
- Related:computer, failure, program,
- Abrams, Jojodia, Podell essays
- Related:computer, information, information security, security,
- Abstract Syntax Notation One
- Includes:Basic Encoding Rules, Distinguished Encoding Rules, object identifier,
- Related:certificate, computer, function, information, object, protocols, public-key infrastructure, revocation, standard,
- abuse of privilege
- IncludedBy:threat,
- Related:insider threat, policy, users,
- acceptable level of risk
- IncludedBy:threat,
- Related:analysis, application, assessment, authority, control, countermeasures, critical, network, operation, requirements, vulnerability,
- acceptable risk
- IncludedBy:risk,
- Related:control, system,
- acceptable use policy
- IncludedBy:policy,
- Related:network, system, users,
- acceptance criteria
- IncludedBy:acceptance procedure, criteria,
- Related:authorized, entity, system, users,
- acceptance inspection
- IncludedBy:acceptance procedure,
- Related:information, security testing, software, standard, system, test,
- acceptance procedure
- IncludedBy:software development, target of evaluation,
- Includes:acceptance criteria, acceptance inspection, acceptance testing, object,
- Related:control, control systems, process, system, target,
- acceptance testing
- IncludedBy:acceptance procedure, security testing, test,
- Related:criteria, requirements, system, users,
- access
- Includes:Directory Access Protocol, Internet Message Access Protocol, version 4, Law Enforcement Access Field, Lightweight Directory Access Protocol, Terminal Access Controller Access Control System, access approval, access approval authority, access authority, access category, access control, access control center, access control lists, access control mechanisms, access control officer, access control service, access control system, access eligibility determination, access evaluation, access level, access list, access mediation, access mode, access national agency check and inquiries, access period, access point, access port, access profile, access roster, access termination, access type, access with limited privileges, accesses, accessibility, accessioned records, acknowledged special access program, acquisition special access program, administrative access, approved access control device, attribute-based access control, browse access protection, code division multiple access, common access card, context-dependent access control, controlled access area, controlled access program coordination office, controlled access program oversight committee, controlled access programs, controlled access protection, delete access, demand assigned multiple access, direct access storage device, direct memory access, discretionary access control, execute access, failure access, ferroelectric random access memory, file transfer access management, formal access approval, frequency division multiple access, handle via special access control channels only, identity based access control, intelligence special access program, interim access authorization, last mile broadband access, limited access authorization, local access, logical access, logical access control, mandatory access control, media access control address, merge access, multiple access rights terminal, need for access, network access, network access control, non-discretionary access control, non-volatile random access memory, object, on-access scanning, one-time access, partition rule base access control, peer access approval, peer access enforcement, physical access control, policy-based access control, privileged access, program access request, random access memory, read access, remote access, remote access software, risk-adaptable access control, role-based access control, special access office, special access program, special access program facility, special access program/special access required, special access programs central office, special access programs coordination office, special access required programs oversight committee, subject, surrogate access, tactical special access program facility, temporary access eligibility, time division multiple access, umbrella special access program, unacknowledged special access program, unauthorized access, update access, waived special access program, wi-fi protected access-2, wireless access point, write access,
- Related:ACL-based authorization, Automated Information System security, Bell-LaPadula security model, Clark Wilson integrity model, Defense Central Security Index, Defensive Information Operations, Department of Defense National Agency Check Plus Written Inquiries, Escrowed Encryption Standard, Freedom of Information Act, IA product, IT security policy, Identification Protocol, Internet Engineering Task Force, Internet Protocol Security Option, KOA agent, Network File System, PHF, PIV issuer, POSIX, Post Office Protocol, version 3, RA domains, SOCKS, SSO PIN, TCB subset, TOE security functions interface, U.S.-controlled facility, U.S.-controlled space, USENET, accreditation range, accredited security parameter, acoustic security, activation data, active wiretapping, ad hoc network, adequate security, adjudication, adjudication authority, adversary, adverse information, alternative compensatory control measures, anonymous and guest login, anonymous login, appeal, applicant, application, application program interface, application proxy, application server attack, archiving, associated markings, attack, attack signature, attribute-based authorization, audit, audit trail, authenticate, authentication, authentication mechanism, authentication period, authority, authorization, authorized, authorized adjudicative agency, authorized investigative agency, authorized person, authorized user, automated information system media control system, availability, availability service, backdoor, balanced magnetic switch, base station, bastion host, benign, between-the-lines-entry, billets, boundary, brute force password attack, buffer overflow, call back, capability, carve-out, category, central office, centralized authorization, certification practice statement, classified, classified contract, classified information procedures act, classified visit, clearance, clearance certification, clearance level, cleared escort, client, client server, closed storage, cloud computing, co-utilization, collateral information, common gateway interface, communications, compartment, compartmentalization, compartmentation, compartmented intelligence, compartmented mode, compelling need, component reference monitor, computer intrusion, computer security, computer security intrusion, confidentiality, confinement property, console logon, continuous operation, contractor/command program security officer, control, controlled security mode, controlled sharing, controlled space, cookies, covert channel, covert channel analysis, cracker, credentials, critical, critical program information, critical system, cross domain solution, cryptographic application programming interface, data asset, data compromise, data integrity service, data management, debriefing, dedicated mode, default account, default file protection, demilitarized zone, demon dialer, denial-of-service, determination authority, device distribution profile, dictionary attack, directory service, disclosure of information, disclosure record, diskette, distributed plant, domain, domain name system, domain parameter, dominated by, dual control, eligibility, encapsulation, entry control, exception, exploit, exploitation, external security controls, external system exposure, extranet, extraordinary security measures, facility security clearance, failed logon, false acceptance, false acceptance rate, false rejection rate, federated identity, federation, fedline, fetch protection, file encryption, file protection, file security, file series, firewall, flooding, flow, foreign disclosure, foreign ownership, control, or influence, foreign travel briefing, foreign visit, formulary, full disk encryption, government-approved facility, granularity, guard, guest system, hackers, high assurance guard, host, https, hyperlink, hypertext, identification, identification and authentication, identification authentication, identity credential issuer, identity verification, identity-based security policy, immediate family member, impersonation, inadvertent disclosure, inadvertent disclosure incident, incident of security concern, individual accountability, individual electronic accountability, indoctrination, inference, information, information assurance, information assurance product, information category, information security, information security risk, information sharing environment, information steward, information systems security, inside threat, insider, insider threat, integrity, intercept, interception, interface, internal security controls, internal system exposure, internal vulnerability, internet protocol security, internet service provider, intranet, intruder, intrusion, intrusion detection, intrusion detection and prevention system, intrusion detection systems, intrusion detection tools, isolator, joint personnel adjudication system, kerberos, key recovery, key-escrow, kiosk, labeled security protections, least privilege, letter of compelling need, list-oriented, local logon, lock-and-key protection system, lockout, logged in, logic bombs, logical completeness measure, login, logoff, logon, maintenance hook, major application, malicious intruder, malicious logic, management client, masquerade, masquerading, minor application, mission critical, mode of operation, modes of operation, motivation, multi-releasable, multilevel mode, multilevel secure, multilevel security, multilevel security mode, national security information, need-to-know, need-to-know determination, network component, network reference monitor, network security, network weaving, nicknames, no-lone zone, non-disclosure agreement, non-discretionary security, non-discussion area, noncomputing security methods, office of personnel management, online attack, open storage area, operations and support, operations manager, operator, overwriting, packet filter, packet filtering, partitioned security mode, password protected, password system, passwords, peer-to-peer communication, penetration, penetration testing, perimeter-based security, permanent records, permissions, personal computer system, personal identification number, personnel security, personnel security - issue information, personnel security clearance, personnel security exceptions, personnel security interview, personnel security investigation, personnel security program, physical and environmental protection, physical security, piggyback, piggyback attack, piggyback entry, pii confidentiality impact level, platform it interconnection, point-to-point tunneling protocol, policy, pop-up box, port, portal, primary services node (prsn), privacy, privilege management, privileged accounts, privileged user, probe, procedural security, process, program channels or program security channels, program material, program office, program security officer, programmable read-only memory, protected network, protection ring, protection-critical portions of the TCB, protective security service, proximity, proxy, proxy server, public-key certificate, real-time reaction, records, reference monitor, reference monitor concept, reference validation mechanism, reinstatement, relying party, remote administration tool, remote authentication dial-in user service, remote login, replay attacks, repository, requirements, resource, resource encapsulation, response force, restricted area, revocation, risk avoidance, rootkit, routine changes, rule-based security policy, rules of behavior, ruleset, salt, sampling frame, sandboxed environment, sandboxing, scattered castles, scoping guidance, screen scraping, secure data device, secure single sign-on, secure state, secure working area, security, security assurance, security attribute, security banner, security clearance, security compromise, security controls, security director, security domain, security incident, security intrusion, security kernel, security label, security level, security management, security management infrastructure, security policy, security safeguards, security service, security violation, security-relevant event, segregation of duties, senior foreign official, senior review group, sensitive activities, sensitive compartmented information, sensitive compartmented information courier, sensitive information, sensitivity label, service, signature, simple network management protocol, simple security condition, simple security property, single scope background investigation - periodic reinvestigation, single sign-on, social engineering, software, software-based fault isolation, source program, special program review group, sponsoring agency, spoof, spoofing, storage object, store, subcontract, subject security level, subset-domain, suspicious contact, system, system entry, system high mode, system resources, system software, system-high security mode, target vulnerability validation techniques, tcpwrapper, technical countermeasures, technical policy, technological attack, technology, technology control plan, temporary help/job shopper, term rule-based security policy, theft, threat, ticket, ticket-oriented, timing attacks, tokens, transaction, trapdoor, trespass, trojan horse, trust relationship, trusted gateway, trusted identification forwarding, trusted subject, two-person integrity, unauthorized disclosure, unauthorized person, unclassified internet protocol router network, unclassified sensitive, unfavorable personnel security determination, uniform resource locator, unprotected network, user PIN, users, vault, verification, virus, vulnerability, war driving, web browser cache, web content filtering software, website, wide-area network, wimax, wireless gateway server, wiretapping, workstation, world wide web, write,
- access approval
- IncludedBy:access,
- Related:authorization, classified, security clearance,
- access approval authority
- IncludedBy:access,
- access authority
- IncludedBy:access,
- access category
- IncludedBy:access,
- Related:authorized, process, program, resource, users,
- access control
- IncludedBy:Automated Information System security, access, authorization, control, risk management, security, security-relevant event, trusted computing base, users,
- Includes:IT default file protection parameters, centralized authorization, classified information, component reference monitor, controlled sharing, cookies, default file protection, entry control, fetch protection, file protection, file security, granularity, logged in, login, logoff, logon, need-to-know, network reference monitor, privileged, sandboxed environment, secure state, security kernel, security perimeter, sensitivity label, system entry, technical policy,
- Related:*-property, Bell-LaPadula security model, Clark Wilson integrity model, Defensive Information Operations, Escrowed Encryption Standard, Identification Protocol, Internet Engineering Task Force, Internet Protocol Security Option, Network File System, PIV issuer, POSIX, RA domains, SOCKS, TCB subset, TOE security functions interface, U.S.-controlled facility, U.S.-controlled space, accreditation range, active wiretapping, adequate security, adversary, application, application program interface, application proxy, archiving, attack, audit, audit trail, authenticate, authentication, authorized, availability, availability service, backdoor, bastion host, benign, between-the-lines-entry, boundary, boundary host, breach, buffer overflow, call back, capability, category, classified, clearance level, client, client server, common gateway interface, communications, compartment, compartmentalization, compartmented mode, computer intrusion, computer security, computer security intrusion, confidentiality, confinement property, controlled security mode, controlled space, covert channel, covert channel analysis, cracker, credentials, critical, critical system, cryptographic application programming interface, cryptographic equipment room, data compromise, data integrity service, data management, dedicated mode, default account, demilitarized zone, demon dialer, denial-of-service, dictionary attack, directory service, disclosure of information, domain, domain name system, domain parameter, dominated by, dual control, encapsulation, exploit, exploitation, external security controls, external system exposure, extranet, federated identity, federation, fedline, firewall, flooding, formulary, function, guard, hackers, host, https, hyperlink, hypertext, identification, identification and authentication, identification authentication, identity credential issuer, identity verification, identity-based security policy, impersonation, inadvertent disclosure, individual accountability, individual electronic accountability, inference, information, information assurance product, information category, information security, information systems security, integrity, interception, interface, internal security controls, internal system exposure, internet protocol security, internet service provider, intranet, intruder, intrusion, intrusion detection, intrusion detection tools, kerberos, key recovery, key-escrow, kiosk, labeled security protections, list-oriented, lock-and-key protection system, lockout, logic bombs, logical completeness measure, maintenance hook, major application, malicious intruder, malicious logic, masquerade, masquerading, minimum essential infrastructure, mode of operation, modes of operation, motivation, multilevel mode, multilevel secure, multilevel security, multilevel security mode, national security information, network, network component, network security, network weaving, no-lone zone, non-discretionary security, noncomputing security methods, operations manager, operator, packet filtering, partitioned security mode, password system, passwords, peer-to-peer communication, penetration, permissions, personal identification number, personnel security, physical and environmental protection, physical security, piggyback, piggyback attack, piggyback entry, point-to-point tunneling protocol, policy, pop-up box, privacy, probe, procedural security, process, program, protected network, protection ring, protection-critical portions of the TCB, proximity, proxy server, real-time reaction, records, reference monitor, reference monitor concept, reference validation mechanism, remote administration tool, remote authentication dial-in user service, repository, resource, resource encapsulation, restricted area, rootkit, rule-based security policy, rules of behavior, ruleset, salt, sampling frame, scoping guidance, screen scraping, secure single sign-on, security clearance, security compromise, security controls, security domain, security incident, security intrusion, security label, security management, security management infrastructure, security policy, security safeguards, security violation, segregation of duties, sensitive compartmented information, sensitive information, signature, simple network management protocol, simple security condition, simple security property, single sign-on, social engineering, software, source program, spoof, spoofing, storage object, subject security level, subset-domain, system, system high mode, system resources, system software, system-high security mode, tcpwrapper, technological attack, technology, term rule-based security policy, theft, threat, threat consequence, ticket, ticket-oriented, timing attacks, tokens, transaction, trapdoor, trespass, trojan horse, trust relationship, trusted gateway, trusted identification forwarding, trusted subject, two-person integrity, uniform resource locator, unprotected network, user PIN, verification, virus, vulnerability, web browser cache, website, wide-area network, wireless gateway server, wiretapping, workstation, world wide web,
- access control center
- IncludedBy:access, control,
- Related:computer, cryptography, key, policy, security, system,
- access control lists
- IncludedBy:access,
- Includes:ACL-based authorization,
- PreferredFor:access list,
- Related:authorized, communications security, computer, control, object, process, program, resource, subject, system, users,
- access control mechanisms
- IncludedBy:access, control,
- Related:authorized, management, security, software, system, unauthorized access,
- access control officer
- IncludedBy:access, control,
- access control service
- IncludedBy:access, control,
- Related:authorized, entity, policy, resource, security, system, unauthorized access,
- access control system
- IncludedBy:access,
- Related:security,
- access eligibility determination
- IncludedBy:access,
- Related:classified, requirements, security,
- access evaluation
- IncludedBy:access, evaluation,
- Related:security,
- access level
- IncludedBy:access, security level,
- Related:authorization, identify, object, users,
- access list
- HasPreferred:access control lists,
- IncludedBy:access,
- access mediation
- IncludedBy:access,
- Related:authorized, control, policy, process, resource,
- access mode
- IncludedBy:access, automated information system,
- Related:object, operation, process, subject, system,
- access national agency check and inquiries
- IncludedBy:access,
- Related:classified, security,
- access period
- IncludedBy:access,
- access point
- IncludedBy:access,
- access port
- IncludedBy:access,
- Related:computer,
- access profile
- IncludedBy:access, file, profile,
- Related:object, users,
- access roster
- IncludedBy:access,
- access termination
- IncludedBy:access,
- access type
- IncludedBy:access,
- Related:authorization, file, management, object, program, users,
- access with limited privileges
- IncludedBy:access,
- Related:application, control, domain, process, security, system, users,
- accesses
- IncludedBy:access,
- Related:classified, critical, requirements, security,
- accessibility
- IncludedBy:access,
- Related:computer, resource, system,
- accessioned records
- IncludedBy:access,
- account aggregation
- Related:entity, information, target,
- account authority digital signature
- IncludedBy:authority, public-key infrastructure, signature,
- Related:authentication, key, public-key,
- account fraud
- IncludedBy:fraud, identity theft,
- PreferredFor:account hijacking, account takeover,
- Related:entity, theft,
- account hijacking
- HasPreferred:account fraud,
- account management
- Related:information,
- account takeover
- HasPreferred:account fraud,
- accountability
- IncludedBy:security goals,
- Includes:automated information system, identification, object, users,
- Related:audit, authority, communications security, computer, control, deterrence, entity, failure, fault isolation, identify, information, intrusion, intrusion detection, intrusion prevention, key, minimum essential infrastructure, non-repudiation, owner, policy, process, property, quality, recovery, resource, security objectives, system, trust,
- accounting legend code
- IncludedBy:code,
- Related:communications security, control, control systems, security, system,
- accounting number
- Related:communications security, control,
- accreditation
- IncludedBy:certification,
- Includes:DoD Information Technology Security Certification and Accreditation Process, National Voluntary Laboratory Accreditation Program, Scope of Accreditation, accreditation authority, accreditation body, accreditation boundary, accreditation disapproval, accreditation multiplicity parameter, accreditation package, accreditation phase, accreditation range, approval/accreditation, automated information system, certification and accreditation, designated approving authority, full accreditation, identification and accreditation, interim accreditation, interim accreditation action plan, post-accreditation phase, private accreditation exponent, private accreditation information, public accreditation verification exponent, security, site accreditation, system accreditation, type accreditation,
- PreferredFor:accredited,
- Related:Common Criteria Testing Laboratory, approved technologies list, approved test methods list, assessment, association, authority, authorization, cascading, certificate, certificate revocation list, certification phase, certifier, classified, computer, control, controlled security mode, criteria, dedicated security mode, evaluation, external security controls, function, information, intelligence, multilevel security mode, national information assurance partnership, network, operation, partitioned security mode, pre-certification phase, process, requirements, risk, security evaluation, security testing, site certification, standard, system, system-high security mode, test, trust, trusted computer system, type certification,
- accreditation authority
- IncludedBy:accreditation, authority,
- Related:entity, information, trust,
- accreditation body
- IncludedBy:accreditation, national information assurance partnership,
- Related:standard,
- accreditation boundary
- IncludedBy:accreditation, boundary,
- Related:information, resource, security, system, users,
- Synonym:security perimeter,
- accreditation disapproval
- IncludedBy:accreditation,
- Related:control, critical, operation, requirements, risk, security, system,
- accreditation multiplicity parameter
- IncludedBy:accreditation,
- Related:authority, entity, information,
- accreditation package
- IncludedBy:accreditation,
- Related:security, system,
- accreditation phase
- IncludedBy:accreditation,
- Related:assessment, process, risk, security, system, update,
- accreditation range
- IncludedBy:accreditation,
- Related:access, access control, authority, computer, computer security, control, criteria, evaluation, network, operation, process, requirements, risk, security, system, trust, trusted computer system,
- accredited
- HasPreferred:accreditation,
- accredited security parameter
- IncludedBy:security,
- Related:access,
- accrediting authority
- IncludedBy:authority,
- Related:security,
- accuracy
- Related:assessment,
- ACH debit fraud
- IncludedBy:fraud, identity theft,
- Related:authorized,
- acknowledged special access program
- IncludedBy:access,
- Related:authorized, classified, compromise, risk, vulnerability,
- ACL-based authorization
- IncludedBy:access control lists, authorization,
- Includes:distributed computing environment,
- Related:access,
- acoustic intelligence
- IncludedBy:intelligence,
- Related:acoustic security, analysis,
- acoustic security
- IncludedBy:security,
- Related:access, acoustic intelligence, classified,
- acoustic warfare
- IncludedBy:warfare,
- acquirer
- IncludedBy:Secure Electronic Transaction,
- Related:authorization, process, system,
- acquisition
- Related:control,
- acquisition plan
- Related:analysis, requirements,
- acquisition program
- acquisition special access program
- IncludedBy:access,
- Related:evaluation, intelligence, requirements,
- acquisition strategy
- Related:control, object, system,
- acquisition systems protection
- Related:authorized, compromise, foreign, intelligence, security,
- activation data
- Related:access,
- active attack
- IncludedBy:attack,
- Related:authentication, impersonation, protocols,
- active content
- Related:program, software,
- active security testing
- IncludedBy:security testing, test,
- Related:system, target, vulnerability,
- active state
- Antonym:deactivated state,
- IncludedBy:key lifecycle state,
- Related:algorithm, application, cryptographic, key, lifecycle, security,
- active wiretapping
- IncludedBy:wiretapping,
- Related:access, access control, authorized, communications, computer, control, message, users,
- activities
- activity
- activity analysis
- IncludedBy:analysis, security software,
- Related:process,
- activity security manager
- IncludedBy:security,
- Related:classified, information security, security incident,
- activity-based costing
- IncludedBy:business process,
- actuator
- ad hoc
- ad hoc network
- IncludedBy:network,
- Related:access,
- ad hoc testing
- IncludedBy:security testing, test,
- ad-lib test
- IncludedBy:test,
- adaptive predictive coding
- add-on security
- IncludedBy:security,
- Related:computer, operation, process, software, system,
- address
- address indicator group
- address of record
- address spoofing
- IncludedBy:masquerade, spoof, spoofing,
- Includes:ip spoofing,
- Related:impersonation, network, system,
- adequate security
- IncludedBy:security,
- Related:access, access control, authorized, availability, control, information, integrity, management, operation, risk, system, unauthorized access,
- adjudication
- Related:access, classified, evaluation, security, trust,
- adjudication authority
- Related:access,
- adjudicative process
- Related:risk, security,
- adjudicator
- Related:security,
- administration documentation
- IncludedBy:target of evaluation,
- Related:information, target,
- administrative access
- IncludedBy:access,
- Related:authorized, function, system,
- administrative account
- Related:computer, users,
- administrative safeguards
- Related:development, security,
- administrative security
- HasPreferred:procedural security,
- IncludedBy:security,
- administrator
- IncludedBy:target of evaluation,
- Related:operation, target,
- advanced development model
- IncludedBy:software development,
- advanced encryption standard
- IncludedBy:National Institute of Standards and Technology, encryption, standard, symmetric cryptography,
- Related:algorithm, classified, cryptographic, key,
- advanced intelligence network
- IncludedBy:intelligence, network,
- advanced intelligent network
- IncludedBy:network,
- advanced key processor
- IncludedBy:key,
- Related:management,
- Advanced Mobile Phone Service
- Related:standard, system, update, users,
- advanced narrowband digital voice terminal
- advanced persistent threats
- IncludedBy:threat,
- Related:attack, critical, cyberspace, target,
- Advanced Research Projects Agency Network
- IncludedBy:network,
- advanced self-protection jammer
- IncludedBy:communications security, jamming,
- Related:assurance,
- adversary
- IncludedBy:security,
- Includes:adversary collection methodology, adversary threat strategy,
- Related:C2-attack, C2-protect, RED team, access, access control, advisory, attack, camouflage, command and control warfare, communications cover, communications deception, compromise, counterintelligence, countermeasures, cover, critical, cryptographic key, damage, data aggregation, deception, eavesdropping, entity, imitative communications deception, indicator, information, information assurance, information operations, information superiority, information warfare, intelligence, intelligent threat, malware, man-in-the-middle attack, motivation, national information infrastructure, non-technical countermeasure, operations security, operations security indicator, perceived collection threat, radio frequency jamming, random, replay attacks, risk, security environment threat list, security threat, social engineering, system, target, threat, threat analysis, traffic analysis, vulnerability, vulnerability analysis, vulnerability assessment,
- adversary collection methodology
- IncludedBy:adversary,
- Related:critical,
- adversary threat strategy
- IncludedBy:adversary, threat,
- adverse action
- adverse information
- Related:access, classified, security,
- advisory
- Includes:Computer Incident Advisory Capability, National COMSEC Advisory Memorandum, National Industrial Security Advisory Committee, National Security Telecommunications Advisory Committee, National Security Telecommunications and Information Systems Security Advisory/Information Memorandum, National Telecommunications and Information Systems Security Advisory Memoranda/Instructions, TEMPEST advisory group,
- Related:Internet Architecture Board, adversary, computer emergency response team, development, target, threat,
- affiliate
- agency
- Related:classified, control,
- agent
- Related:attack, intrusion, intrusion detection, malicious, program,
- agent of the government
- Related:authorized,
- aggregation
- Related:classified, information, security,
- aggressive mode
- Related:establishment, internet protocol security, internet security protocol, message,
- agreement
- Related:management, security,
- alarm
- Related:countermeasures, function,
- Synonym:alert,
- alarm reporting
- Related:fault, identification, information, network, resource, security software,
- alarm surveillance
- Related:analysis, communications, control, fault, function, information, network, operation, resource, security software,
- alert
- Related:anomaly, attack, audit, communications security, critical, identify, message, network, process, resource, security,
- Synonym:alarm,
- algorithm
- Includes:Data Authentication Algorithm, El Gamal algorithm, Elliptic Curve Digital Signature Algorithm, International Data Encryption Algorithm, Key Exchange Algorithm, MAC algorithm key, NULL encryption algorithm, RSA algorithm, Rivest-Shamir-Adleman algorithm, algorithm transition, asymmetric algorithm, asymmetric cryptographic algorithm, asymmetric encryption algorithm, control algorithm, cryptographic algorithm, cryptographic algorithm for confidentiality, data encryption algorithm, digital signature algorithm, encipherment algorithm, encryption algorithm, hash algorithm, keyed hash algorithm, message authentication code algorithm, message digest algorithm 5, public-key algorithm, secure hash algorithm, symmetric algorithm, symmetric encipherment algorithm, symmetric encryption algorithm,
- Related:CAST, Clipper chip, Commercial COMSEC Evaluation Program, Common Criteria for Information Technology Security, Computer Security Objects Register, Diffie-Hellman, Digital Signature Standard, Escrowed Encryption Standard, FIPS PUB 140-1, FIPS approved security method, Fortezza, Internet Security Association and Key Management Protocol, OAKLEY, Rivest Cipher 2, Rivest Cipher 4, SET qualifier, Simple Key-management for Internet Protocols, Skipjack, Type 4 product, Type I cryptography, Type II cryptography, Type III cryptography, X.509 attribute certificate, X.509 certificate revocation list, X.509 public-key certificate, active state, advanced encryption standard, approved, asymmetric cryptography, asymmetric encipherment system, biometric template, block cipher, break, brute force attack, certification request, checksum, cipher, cipher block chaining, cipher feedback, cipher suite, ciphertext, ciphertext-only attack, code, communications security, computer, computer cryptography, cryptanalysis, cryptographic, cryptographic functions, cryptographic key, cryptographic logic, cryptographic module, cryptographic system, cryptographic token, cryptography, cryptonet, cryptoperiod, cycle time, cyclic redundancy check, data authentication code, data authentication code vs. Data Authentication Code, data encryption standard, decrypt, digital envelope, digital signature, domain of interpretation, effective key length, electronically generated key, elliptic curve cryptography, encipherment, encrypt, encryption, encryption strength, frequency hopping, hash, hash function, hybrid encryption, indistinguishability, initial transformation, initialization value, initialization vector, intelligent threat, internet protocol security, key, key agreement, key distribution, key generating function, key generator, key pair, key recovery, key space, key transport, key-escrow system, keyed hash, known-plaintext attack, link encryption, man-in-the-middle attack, message, message authentication code, message authentication code vs. Message Authentication Code, message digest, metrics, mode of operation, one-time pad, out-of-band, output transformation, parameters, pretty good privacy, private key, process controller, protection suite, pseudo-random, public-key, public-key cryptography standards, public-key forward secrecy, public-key information, secret key, secret-key cryptography, secure hash standard, secure hypertext transfer protocol, secure socket layer, security mechanism, security strength, semantic security, signature generation, signature verification, stream cipher, strength of mechanisms, symmetric cryptography, symmetric key, trapdoor, triple DES, trust, tunnel, type 1 products, type 2 product, type 3 product, validate, virus definitions,
- algorithm transition
- IncludedBy:algorithm,
- Related:cryptographic, process,
- alias
- Related:anonymous, entity, masquerade,
- alien
- Related:United States citizen,
- alignment
- Related:process, system,
- all-hazards
- allocation
- Related:control, security,
- allowed traffic
- Related:bit forwarding rate, ruleset, system, test,
- alternate COMSEC custodian
- IncludedBy:communications security,
- Related:authority,
- alternate work site
- alternative compensatory control measures
- Related:access, intelligence,
- alternative work site
- Related:program,
- American institute of certified public accountants
- American National Standards Institute
- IncludedBy:standard,
- Related:association, automated information system, communications, computer, users,
- American Standard Code for Information Interchange
- IncludedBy:code, information, standard,
- Related:automated information system,
- analog signal
- analysis
- Includes:SWOT analysis, activity analysis, analysis of alternatives, boundary value analysis, business impact analysis, cost-risk analysis, cost/benefit, cost/benefit analysis, cost/benefit estimate, covert channel analysis, cryptanalysis, cryptosystem analysis, dynamic analysis, emanations analysis, error analysis, gap analysis, information sharing and analysis center, mutation analysis, network behavior analysis system, requirements analysis, risk analysis, risk reduction analysis, root cause analysis, security fault analysis, security flow analysis, sensitivity analysis, signals analysis, stateful protocol analysis, static analysis, target identification and analysis techniques, technical threat analysis, threat analysis, traffic analysis, value analysis, vulnerability analysis,
- Related:Federal Standard 1027, Integrated CASE tools, SOF-basic, SOF-high, SOF-medium, TCB subset, acceptable level of risk, acoustic intelligence, acquisition plan, alarm surveillance, assessment, black-box testing, break, brute force attack, business case, chosen-ciphertext attack, chosen-plaintext attack, ciphertext-only attack, code coverage, correctness, counterintelligence assessment, countermeasures, cryptology, cryptoperiod, damage assessment, data historian, diagnostics, digital forensics, electronic security, elliptic curve cryptography, emanations security, emission security, emissions security, error seeding, evaluation assurance, fault injection, financial crimes enforcement network, flaw hypothesis methodology, flooding, formal language, functional test case design, global requirements, hashed message authentication code, independent validation and verification, instrumentation, intelligence, intelligence sources and methods, judgment sample, known-plaintext attack, limited network analyzer, local requirements, measurement and signature intelligence, model, national computer security assessment program, network sniffing, one-time pad, operations security, operations security process, operations security survey, personal computer system, portfolio, privacy impact assessment, reference monitor, reference validation mechanism, remote maintenance, risk assessment, risk identification, risk management, robustness, sanitization, sanitizing, security test and evaluation, significant change, symbolic execution, system development, system development methodologies, target vulnerability validation techniques, telemetry, telemetry intelligence, threat event, threat monitoring, traffic flow confidentiality, transmission security, trust, trust level, verification, vulnerability, vulnerability assessment,
- Synonym:evaluation, test,
- analysis of alternatives
- IncludedBy:analysis,
- Related:information, process,
- ankle-biter
- IncludedBy:threat,
- Related:internet, malicious, program,
- anomaly
- Includes:anomaly detection, anomaly detection model,
- Related:alert, bug, failure, fault, operation, problem, requirements, software, users,
- anomaly detection
- IncludedBy:anomaly, security software,
- Related:countermeasures, intrusion, system, users,
- anomaly detection model
- IncludedBy:anomaly, model, security policy model,
- Related:intrusion, system, users,
- anomaly-based detection
- anonymity
- Related:identification, information, security, users,
- anonymous
- Related:alias, application, attack, authorized, entity, privacy, security, system, users,
- anonymous and guest login
- IncludedBy:login,
- Related:access, authentication, protocols, system,
- anonymous login
- IncludedBy:internet, login,
- Related:access, control, file, passwords, protocols, resource, system, threat, users,
- anti-jam
- IncludedBy:communications security,
- Related:information, jamming,
- anti-jamming
- IncludedBy:communications security,
- Related:jamming,
- anti-spoof
- Antonym:spoofing,
- IncludedBy:spoof,
- Related:attack, authentication, authorized, identification, security software, subject,
- anti-tamper
- IncludedBy:tamper,
- Related:critical,
- anti-tamper executive agent
- IncludedBy:tamper,
- antispyware software
- IncludedBy:software,
- Related:malware, program,
- antisubmarine warfare
- IncludedBy:warfare,
- antivirus software
- IncludedBy:security software, software, virus,
- Related:application, computer, countermeasures, file, identify, incident, integrity, intrusion, intrusion detection, malware, program, system,
- antivirus tools
- IncludedBy:virus,
- Related:code, countermeasures, malicious, software, system, technology,
- appeal
- Related:access,
- appendix
- Related:signature,
- applet
- Related:application, program, world wide web,
- applicant
- Related:access, authorized, certificate, certification, classified, entity, key,
- applicant assertion
- Related:entity, identity, information, process, registration,
- application
- IncludedBy:software,
- Includes:Cryptographic Application Program Interface, Generic Security Service Application Program Interface, application controls, application data backup/recovery, application entity, application gateway firewall, application generator, application level gateway, application program interface, application programming interface, application proxy, application server attack, application software, application system, application-level firewall, cryptographic application programming interface, key management application service element, major application, rapid application development, wireless application protocol,
- Related:COMSEC end-item, Common Criteria for Information Technology Security, Defense Information Infrastructure, Distinguished Encoding Rules, Europay, MasterCard, Visa, FIPS PUB 140-1, Federal Public-key Infrastructure, Generic Upper Layer Security, IT security certification, IT security support functions, Java, Lightweight Directory Access Protocol, Network File System, OSI architecture, Open Systems Interconnection Reference model, PIV issuer, PKIX, POSIX, S/Key, SOCKS, TOE security functions interface, X.500 Directory, acceptable level of risk, access, access control, access with limited privileges, active state, anonymous, antivirus software, applet, archive, asynchronous transfer mode, automated information system, backup, backup generations, banner grabbing, baseline management, bastion host, bill payment, blacklist, certificate policy, certification, certification authority workstation, certification phase, certification practice statement, circuit proxy, clean system, closed security environment, collaborative computing, command and control warfare, common security, communications, component operations, computer, computer architecture, computer fraud, computer related controls, computing environment, control, control server, cookies, critical system files, cryptographic system, cybersecurity, data dictionary, data encryption key, decrypt, defense-in-depth, degauss, denial-of-service, designation policy, digital forensics, directly trusted CA, disaster recovery plan, distributed computing environment, documentation, dual-homed gateway firewall, email, emanations security, encryption, end entity, end-user, extensible markup language, extension, extranet, fail soft, file infector virus, file transfer protocol, firewall, firmware, formal language, function, general controls, general support system, global information grid, hash function, hijacking, host, host-based firewall, hybrid encryption, hypertext markup language, hypertext transfer protocol, identity management systems, interface, internet vs. Internet, interpretation, interpreted virus, kerberos, key generating function, key management, key-encrypting key, least privilege, legacy systems, line managers, link encryption, lockout, macro virus, malicious applets, malicious code, malicious program, malware, management server, meta-language, middleware, mode of operation, modem, motion control network, multipurpose internet mail extensions, national security system, naval special warfare, network protocol stack, network service worm, on-line system, online certificate status protocol, open security, open security environment, open system interconnection model, operating system, operations security, outcome, packet filter, passive fingerprinting, password cracker, patch, penetration testing, personal identification number, personality label, physical security, platform, portability, pretty good privacy, process, program, protocol analyzer, prototyping, proxy, proxy server, public-key cryptography standards, public-key infrastructure, purge, random, realm, registration authority, rekey, relying party, repair action, reusability, review techniques, risk analysis, routing control, run manual, scalability, scope of a requirement, screened host firewall, secure socket layer, security assertion markup language, security evaluation, security requirements, security support programming interface, security testing, session key, significant change, simple mail transfer protocol, simple network management protocol, single sign-on, site accreditation, smartcards, software security, source code generator, starting variable, statistical process control, support software, system, system accreditation, system software, systems engineering, systems software, target identification and analysis techniques, technical controls, technology area, teleprocessing, telnet, test bed, test facility, transmission control protocol, transmission security, transport layer security, trust-file PKI, trusted gateway, type accreditation, unauthorized access, unit of transfer, user data protocol, user partnership program, users, validate, validation, verification, version scanning, virus, virus signature, vulnerability, vulnerability assessment, water supply system, whitelist, workgroup computing, workstation, world wide web,
- application controls
- IncludedBy:application, control,
- Related:authorized, encryption, process, program, security controls, system, validation,
- application data backup/recovery
- IncludedBy:application, availability, backup,
- Related:damage, information, process, software,
- application entity
- IncludedBy:application, entity,
- application gateway firewall
- IncludedBy:application, firewall, gateway,
- Related:internet, protocols, system,
- application generator
- IncludedBy:application,
- Related:code, control, program, requirements, software,
- application level gateway
- IncludedBy:application, gateway,
- Related:connection, firewall, process, system,
- Synonym:application proxy,
- application program interface
- IncludedBy:application, interface, program, security, software,
- Related:access, access control, code, communications, function, network, standard, system, users,
- application programming interface
- IncludedBy:application, interface, program,
- Related:interoperability, software, system,
- application proxy
- IncludedBy:application, firewall, proxy,
- Includes:gateway,
- Related:access, access control, audit, connection, control, protocols, response,
- Synonym:application level gateway,
- application server attack
- IncludedBy:application, attack,
- Related:access, authorized, availability, compromise, computer, information, integrity, resource, system, users,
- application software
- IncludedBy:application, software,
- Related:process, program, system,
- application system
- IncludedBy:application, system,
- Related:automated information system, computer, function, process, program, resource,
- application-level firewall
- IncludedBy:application, firewall, security,
- Related:connection, process, protocols, system,
- approach
- approval for service use
- approval to operate
- Related:management, risk,
- approval/accreditation
- IncludedBy:accreditation,
- Related:TEMPEST, authorization, communications, communications security, computer, control, evaluation, information, operation, process, security, software, system,
- approved
- Related:algorithm, function, security,
- approved access control device
- IncludedBy:access,
- Related:requirements, security,
- approved built-in combination lock
- approved combination padlock
- Related:requirements,
- approved electronic, mechanical, or electromechanical device
- Related:requirements, security,
- approved key-operated padlock
- IncludedBy:key,
- Related:requirements,
- approved mode of operation
- Related:security,
- approved security container
- IncludedBy:security,
- Related:certification,
- approved security function
- IncludedBy:security,
- Related:authentication, management,
- approved technologies list
- IncludedBy:Common Criteria Testing Laboratory, national information assurance partnership,
- Related:IT security, accreditation, computer security, evaluation, information, security, technology, test,
- approved test methods list
- IncludedBy:Common Criteria Testing Laboratory, national information assurance partnership, test,
- Related:IT security, accreditation, authorized, computer security, evaluation, security,
- approved vault
- approved vault door
- architectural design
- IncludedBy:software development, target of evaluation,
- Related:process, target,
- architecture
- Related:function, information, interface, system, users,
- archive
- IncludedBy:recovery,
- Related:application, audit, backup, certificate, cryptographic, digital signature, information, integrity, key, non-repudiation service, operation, public-key, public-key infrastructure, redundancy, retrieval, signature, software, software library, system, technology, uniform resource locator,
- Synonym:archiving,
- archiving
- Related:access, access control, backup, file,
- Synonym:archive,
- area interswitch rekeying key
- IncludedBy:key, rekey,
- areas of control
- IncludedBy:control,
- Related:assurance, object,
- areas of potential compromise
- IncludedBy:compromise, vulnerability,
- Related:minimum essential infrastructure,
- ARPANET
- IncludedBy:internet, network,
- as-is process model
- IncludedBy:model, process,
- Related:baseline, business process,
- assessment
- Includes:computer incident assessment capability, counterintelligence assessment, criticality assessment, damage assessment, independent assessment, national computer security assessment program, operations security assessment, privacy impact assessment, qualitative risk assessment, risk assessment, threat assessment, vulnerability assessment, web risk assessment,
- Related:Common Criteria for Information Technology Security, Common Criteria for Information Technology Security Evaluation, acceptable level of risk, accreditation, accreditation phase, accuracy, analysis, assurance, authorize processing, binding of functionality, certification, certification package, certification phase, cost-risk analysis, deliverable, ease of use, evaluation, evaluation pass statement, evaluator, information, management countermeasure, metrics, monitoring and evaluation, operations security, operations security process, portfolio, pre-certification phase, process, process assurance, rating, resource, risk analysis, risk avoidance, risk management, scheme, security, security category, security fault analysis, site certification, standard, strength of mechanisms, suitability of functionality, system, threat monitoring, verification, vulnerability,
- assessment method
- assessment object
- assessment objective
- Related:control, security,
- assessment procedure
- asset
- IncludedBy:target of evaluation,
- Related:countermeasures, information, intelligence, operation, resource,
- asset identification
- Related:security,
- asset reporting format
- assignment
- IncludedBy:protection profile,
- Related:file, function, message, profile, signature,
- associated markings
- Related:access, classified,
- association
- Includes:Internet Security Association and Key Management Protocol, information systems audit and control association, information systems security association, personal computer memory card international association, security association, security association identifier, security association lifetime, symmetric measure of association,
- Related:ABA Guidelines, American National Standards Institute, IPsec Key Exchange, PCMCIA, U.S. person, accreditation, authentication header, binding, certification authority, cookies, data integrity service, data origin authentication service, dynamic binding, encapsulating security payload, hijack attack, information, internet key exchange protocol, internet protocol security, key establishment, key recovery, key transport, keying material, man-in-the-middle attack, on-line cryptosystem, peer entity authentication, peer entity authentication service, primary account number, protocols, proxy server, repudiation, risk, security parameters index, security situation, spam, static binding, system, transport mode vs. tunnel mode, unit of transfer,
- assurance
- IncludedBy:European Information Technology Security Evaluation Criteria, Federal Criteria for Information Technology Security, evaluation, security, security goals, target of evaluation,
- Includes:assurance approach, assurance authority, assurance case, assurance component, assurance element, assurance level, assurance method, assurance profile, assurance results, assurance scheme, assurance stage, assure, automated information system, confidence, configuration management, development assurance, development assurance component, development assurance package, development assurance requirements, effectiveness, evaluation assurance, evaluation assurance component, evaluation assurance package, evaluation assurance requirements, evidence, high assurance guard, identification and authentication, information assurance, information assurance component, infrastructure assurance, integrity, mission assurance category, process assurance, profile assurance, quality assurance, quality assurance/control, rating, robustness, security assurance, site information assurance manager, software assurance, software quality assurance, supporting information assurance infrastructures, test,
- Related:Common Criteria for Information Technology Security, Defensive Information Operations, Information Technology Security Evaluation Criteria, RED team, Trusted Computer System Evaluation Criteria, advanced self-protection jammer, areas of control, assessment, augmentation, authentication, authentication mode, authentication tag, availability, backtracking resistance, bebugging, beyond A1, cardholder certificate, certificate, certification, class 2, 3, 4, or 5, closed security environment, common criteria, communications deception, communications security, component dependencies, component extensibility, component hierarchy, computer, computer security, computer security toolbox, computing security methods, confidentiality, control, controlled access protection, criteria, cross domain solution, cryptographic system, cybersecurity, data privacy, defense-in-depth, deliverable, demilitarized zone, electronic protection, enclave, entity, entity authentication of A to B, environmental failure protection, error seeding, evaluation products list, explicit key authentication from A to B, exploit, extension, fetch protection, file protection, function, functional protection requirements, hardening, identity, implicit key authentication from A to B, information, information protection policy, information systems security manager, infrastructure protection, internal system exposure, key authentication, key confirmation, key confirmation from A to B, level of protection, levels of concern, likelihood of occurrence, lock-and-key protection system, minimum level of protection, mutual authentication, mutual entity authentication, network security, non-repudiation, notarization, object, open security, open security environment, outsourced information technology based process, package, physical protection, platform it interconnection, policy, port protection device, prediction resistance, privacy protection, privileged user, process, product rationale, property, protection needs elicitation, protection philosophy, protection profile, protection profile family, protection ring, protection-critical portions of the TCB, public-key infrastructure, purge, quality of protection, questions on controls, requirements, security evaluation, security mechanism, security objectives, security target, signature validation, software, suspicious activity report, system, system administrator, target, technology, trusted computer system, trusted computing system, trusted foundry, trusted network interpretation, type 3 product, unilateral authentication, users, validation, virtual private network,
- assurance approach
- IncludedBy:assurance,
- assurance authority
- IncludedBy:assurance, authority,
- assurance case
- IncludedBy:assurance,
- assurance component
- IncludedBy:Common Criteria for Information Technology Security Evaluation, assurance, component,
- Related:requirements,
- assurance element
- IncludedBy:assurance,
- Related:process,
- assurance level
- IncludedBy:assurance,
- Related:confidence, criteria, federation, quality, requirements, target,
- assurance method
- IncludedBy:assurance,
- assurance profile
- IncludedBy:assurance, file, profile,
- Related:confidence, function,
- assurance results
- IncludedBy:assurance,
- assurance scheme
- IncludedBy:assurance,
- Related:authority,
- assurance stage
- IncludedBy:assurance,
- assure
- IncludedBy:assurance,
- Related:IT security, ensure, process, program,
- assured information sharing
- Related:risk, security,
- assured software
- IncludedBy:software,
- Related:process, test, trust,
- astragal strip
- Related:authorized,
- asymmetric algorithm
- IncludedBy:algorithm, asymmetric cryptography,
- Includes:Diffie-Hellman, Rivest-Shamir-Adleman algorithm, elliptic curve cryptosystem, private key, public-key, public-key cryptography standards,
- Related:encryption, key, message,
- asymmetric cipher
- IncludedBy:asymmetric cryptography, cipher,
- Related:encipherment, system,
- asymmetric cryptographic algorithm
- IncludedBy:algorithm, cryptographic, encryption, key,
- Related:message,
- asymmetric cryptographic technique
- IncludedBy:asymmetric cryptography, cryptographic,
- Related:cipher, cryptographic system, encipherment, entity, function, key, message, property, public-key, signature, system, verification,
- asymmetric cryptography
- IncludedBy:cryptography,
- Includes:asymmetric algorithm, asymmetric cipher, asymmetric cryptographic technique, asymmetric encipherment system, asymmetric encryption algorithm, asymmetric key pair, asymmetric signature system, public-key derivation function, public-key information, public-key system,
- Related:algorithm, authentication, confidentiality, digital signature, encryption, integrity, key, key management, owner, public-key, signature,
- asymmetric encipherment system
- IncludedBy:asymmetric cryptography, cipher, encipherment, system,
- Related:algorithm, cryptographic, encryption,
- asymmetric encryption algorithm
- IncludedBy:algorithm, asymmetric cryptography, encryption,
- Related:cipher, encipherment, system,
- asymmetric key pair
- IncludedBy:asymmetric cryptography, key,
- Related:public-key,
- asymmetric keys
- IncludedBy:key,
- Related:encryption, operation, public-key, signature, verification,
- asymmetric signature system
- IncludedBy:asymmetric cryptography, signature, system,
- Related:cryptographic, verification,
- asynchronous attacks
- IncludedBy:attack,
- Related:system,
- asynchronous communication
- IncludedBy:communications,
- Related:information,
- asynchronous transfer mode
- IncludedBy:security,
- Related:application, connection, network, process, technology,
- attack
- Antonym:security software,
- IncludedBy:incident, risk, security, threat,
- Includes:Attack Sensing and Warning, C2-attack, ICMP flood, IP splicing/hijacking, Star Trek attack, TTY watcher, active attack, application server attack, asynchronous attacks, attack potential, attack signature, attack signature recognition, attackers, between-the-lines-entry, blended attack, browsing, brute force, brute force attack, brute force password attack, buffer overflow attack, check_password, chosen-ciphertext attack, chosen-plaintext attack, ciphertext-only attack, computer intrusion, computer network attack, cut-and-paste attack, cyberattack, data diddling, data driven attack, demon dialer, denial-of-service, dictionary attack, eavesdropping, eavesdropping attack, electronic attack, flooding, hijack attack, impersonation, insider attack, interleaving attack, key logger, keystroke monitoring, killer packets, known-plaintext attack, laboratory attack, leapfrog attack, man-in-the-middle attack, masquerade attack, masquerading, mimicking, nak attack, off-line attack, online attack, online guessing attack, pagejacking, passive attack, penetration, perpetrator, phreaking, piggyback attack, ping of death, ping sweep, port scan, reflection attack, replay attacks, rootkit, scanning, scavenging, session hijack attack, shoulder surfing, smurf, smurfing, social engineering, spoofing, spoofing attack, subversion, supply chain attack, synchronous flood, tampering, technical attack, technological attack, terminal hijacking, timing attacks, tunneling attack, warehouse attack, wiretapping,
- Related:Diffie-Hellman, POP3 APOP, RED team, SOF-basic, SOF-high, SOF-medium, US-CERT, access, access control, advanced persistent threats, adversary, agent, alert, anonymous, anti-spoof, authentication header, authorization, authorized, availability, availability service, bastion host, blinding, blue team, bot-network operators, buffer overflow, challenge-response protocol, checksum, code red, compromise, computer, computer emergency response team, computer emergency response teams' coordination center, computer network operations, control, cookies, countermeasures, cracker, criminal, criminal groups, critical, cross site scripting, cryptanalysis, cybersecurity, defense-in-depth, demilitarized zone, disconnection, electronic warfare, elliptic curve cryptography, emergency action plan, entity, entropy, evasion, exploit, exploit code, firewall, flaw hypothesis methodology, guessing entropy, hackers, handler, hash function, hijacking, honeypot, host-based security, impact, incident of security concern, incident response plan, indicator, information, information security, information system resilience, insider, integrity, internet, intrusion, intrusion detection systems, jamming, kerberos, key validation, keyed hash, layered solution, mailbomb, malicious, man-in-the-middle attack, management message, manipulation detection code, min-entropy, misappropriation, motivation, network, nonce, one-time passwords, operation, pharming, physical security, policy, precursor, privacy system, protected checksum, proxy, purge, radio frequency jamming, remote administration tool, resource, risk plane, risk value, salt, scenario, scrambling, secret key, security audit, security environment threat list, security management infrastructure, signature, spammers, strength of a requirement, strength of function, strength of mechanisms, survivability, system, target, threat action, threat consequence, tiger team, traceability, traffic analysis, trapdoor, tri-homed, trojan horse, trusted process, unilateral authentication, users, victim, virus, vulnerability, vulnerability assessment, white team, zombie,
- attack potential
- IncludedBy:attack,
- Related:resource,
- Attack Sensing and Warning
- IncludedBy:attack,
- Related:authorized, identification, response,
- attack signature
- IncludedBy:attack, signature,
- Related:access, audit,
- attack signature recognition
- IncludedBy:attack, security software, signature,
- Includes:virus signature,
- Related:file, profile,
- attackers
- IncludedBy:attack,
- Related:computer, information, malicious, min-entropy, system,
- attribute
- Related:entity, object, quality,
- attribute authority
- IncludedBy:authority, public-key infrastructure,
- Related:certificate, entity, identity, trust,
- attribute certificate
- IncludedBy:certificate,
- Related:authority, backup, cryptographic, cryptography, digital signature, function, identification, information, key, owner, public-key, security, signature, subject, users,
- attribute sampling
- attribute-based access control
- IncludedBy:access, control,
- Related:target,
- attribute-based authorization
- IncludedBy:authorization,
- Related:access,
- audit
- IncludedBy:security,
- Includes:COMSEC account audit, audit charter, audit data, audit log, audit plan, audit program, audit record, audit reduction tools, audit service, audit software, audit trail, audit/review, auditing tool, computer operations, audit, and security technology, computer-assisted audit technique, information systems audit and control association, information systems audit and control foundation, institute of internal auditors, multihost based auditing, security audit, test, vulnerability audit,
- Related:Government Accountability Office, IT security, IT security training, Identification Protocol, POSIX, access, access control, accountability, alert, application proxy, archive, attack signature, confidence, control, controlled access program oversight committee, controlled access protection, criteria, critical, distributed computing environment, file, fraudulent financial reporting, function, functional component, gap analysis, host based, identify, independence, intrusion detection, intrusion detection systems, key management, key-escrow, keystroke monitoring, login, network based, network component, object, operation, policy, policy management authority, population, resource encapsulation, sas 70 report, secure single sign-on, security controls, security features, security software, security-relevant event, sniffer, standard, system, system administrator, system security officer, technical countermeasures, threat monitoring, trust, verification, vulnerability, vulnerability analysis, work program,
- audit charter
- IncludedBy:audit,
- Related:authority, function,
- audit data
- IncludedBy:audit,
- Related:system,
- audit log
- IncludedBy:audit,
- audit plan
- IncludedBy:audit,
- Related:object, resource,
- audit program
- IncludedBy:audit, program,
- Related:function,
- audit record
- IncludedBy:audit,
- Related:information,
- audit reduction tools
- IncludedBy:audit,
- audit service
- IncludedBy:audit,
- Related:information, system,
- audit software
- IncludedBy:audit, software,
- Related:computer, file, program,
- audit trail
- IncludedBy:audit, threat monitoring,
- Includes:automated information system, console logs, security audit trail,
- Related:access, access control, authorized, communications, communications security, computer, computer security, evidence, file, information, login, message, operation, process, resource, system, users,
- Synonym:logging,
- audit/review
- IncludedBy:audit,
- Related:certification, control, function, identify, system, vulnerability,
- auditing tool
- IncludedBy:audit,
- Related:computer, network, passwords, system,
- augmentation
- Related:assurance,
- authentic signature
- IncludedBy:signature,
- Related:digital signature, trust,
- authenticate
- IncludedBy:authentication,
- Related:access, access control, authorized, certificate, communications, digital signature, entity, identity, integrity, network, object, public-key infrastructure, resource, signature, system, users, validate,
- authentication
- IncludedBy:quality of protection, security,
- Includes:3-factor authentication, Challenge Handshake Authentication Protocol, Challenge-Response Authentication Mechanism, Data Authentication Algorithm, Distributed Authentication Security Service, Extensible Authentication Protocol, Password Authentication Protocol, SAML authentication assertion, Simple Authentication and Security Layer, authenticate, authentication code, authentication data, authentication exchange, authentication header, authentication header protocol, authentication mechanism, authentication mode, authentication period, authentication protocol, authentication service, authentication system, authentication tag, authentication token, authentication tools, biometric authentication, challenge and reply authentication, data authentication code, data authentication code vs. Data Authentication Code, data origin authentication, data origin authentication service, electronic authentication, entity authentication, entity authentication of A to B, explicit key authentication from A to B, identification, implicit key authentication from A to B, key authentication, logon, low-cost encryption/authentication device, message authentication code, message authentication key, multifactor authentication, mutual authentication, mutual entity authentication, peer entity authentication, peer entity authentication service, privacy, authentication, integrity, non-repudiation, simple authentication, source authentication, strong authentication, unilateral authentication,
- Related:COMSEC control program, COMSEC equipment, Diffie-Hellman, FIPS approved security method, Generic Security Service Application Program Interface, IA product, IMAP4 AUTHENTICATE, IP splicing/hijacking, IPsec Key Exchange, IT security, Internet Engineering Task Force, Internet Security Association and Key Management Protocol, KMI protected channel, Lightweight Directory Access Protocol, OAKLEY, POP3 APOP, POP3 AUTH, Post Office Protocol, version 3, Rivest-Shamir-Adleman algorithm, S-box, S/Key, SOCKS, Secure Electronic Transaction, Terminal Access Controller Access Control System, The Exponential Encryption System, X.509, access, access control, account authority digital signature, active attack, anonymous and guest login, anti-spoof, approved security function, assurance, asymmetric cryptography, authenticity, authorization, authorized, backup, biometric measurement, biometrics, call back, certificate, certificate policy, certificate revocation list, certificate status responder, certification authority digital signature, challenge-response protocol, challenge/response, claimant, code, common data security architecture, communications security, computer, computer cryptography, computer network, confidence, control, credentials, criteria, critical, critical security parameters, cryptographic algorithm, cryptographic key, cryptography, data integrity service, data key, defense-wide information assurance program, dictionary attack, digital id, digital signature, distinguishing identifier, distributed computing environment, domain name system, dongle, eavesdropping attack, electronic credentials, encapsulating security payload, entity, exchange multiplicity parameter, file, file encryption, fingerprint, fraud, full disk encryption, handshaking procedures, hash function, impersonation, individual electronic accountability, information, information assurance, information assurance product, information systems security, information systems security equipment modification, initiator, integrity, interleaving attack, internet protocol security, keyed hash, keyed hash algorithm, keying material, language, man-in-the-middle attack, masquerading, message, message integrity code, network component, non-repudiation, non-repudiation service, nonce, object, off-line attack, one-time passwords, online attack, origin authenticity, passive attack, password system, passwords, point-to-point protocol, practice statement, pretty good privacy, privacy enhanced mail, process, proof of possession protocol, protection suite, protocol run, proxy, proxy server, public key enabling, public-key forward secrecy, public-key infrastructure, realm, registration, registration authority, replay attacks, resource, responder, sandboxed environment, secret, secret seed, secure DNS, secure communication protocol, secure hash standard, secure shell, secure socket layer, security assertion markup language, security association, security association identifier, security controls, security mechanism, security service, session hijack attack, shared secret, signature, simple network management protocol, single sign-on, software, spoof, spoofing, subject, subscriber, symmetric key, system, system entity, system entry, technical countermeasures, test, third party trusted host model, tokens, transport layer security, trust, trusted third party, unsigned data, user identifier, users, validate vs. verify, validation, verification, verifier, verifier impersonation attack, virtual private network, vulnerability, zero-knowledge password protocol,
- authentication code
- IncludedBy:authentication, code,
- Related:computer, cryptographic, cryptography, encryption, function, information, integrity, process, software, system, users,
- authentication data
- IncludedBy:authentication,
- Related:entity, identity, information, users,
- authentication exchange
- IncludedBy:authentication,
- Related:entity, identity, information,
- authentication header
- IncludedBy:authentication, internet protocol security, security protocol,
- Related:association, attack, confidentiality, connection, gateway, integrity, internet, internet security protocol, protocols, tunnel,
- Synonym:authentication header protocol,
- authentication header protocol
- IncludedBy:authentication, protocols,
- Related:integrity, internet protocol security, internet security protocol,
- Synonym:authentication header,
- authentication information
- IncludedBy:3-factor authentication, information,
- Related:entity, identity,
- authentication mechanism
- IncludedBy:authentication,
- Related:access, identity, software, users,
- authentication mode
- IncludedBy:authentication,
- Related:assurance,
- authentication period
- IncludedBy:authentication,
- Related:access,
- authentication protocol
- IncludedBy:authentication, protocols,
- Related:control, cryptographic, entity, identity, key, message, process,
- authentication service
- IncludedBy:authentication,
- Related:entity, identity, network,
- authentication system
- IncludedBy:authentication, system,
- Related:cryptographic system, cryptography, process,
- authentication tag
- IncludedBy:authentication,
- Related:assurance,
- authentication token
- IncludedBy:authentication, tokens,
- Related:code, response,
- authentication tools
- IncludedBy:authentication, security software,
- authenticator
- Related:backup, entity, identity,
- authenticity
- IncludedBy:integrity,
- Related:authentication, confidence, entity, identity, information, message, process, property, resource, subject, system, trust, users,
- authority
- Includes:Internet Assigned Numbers Authority, Internet Policy Registration Authority, JTC1 Registration Authority, X.509 authority revocation list, account authority digital signature, accreditation authority, accrediting authority, assurance authority, attribute authority, authority certificate, authority revocation list, brand certification authority, cardholder certification authority, certificate authority workstation, certification authority, certification authority digital signature, certification authority workstation, certificaton authority, certified TEMPEST technical authority, command authority, controlling authority, delegated accrediting authority, delivery authority, designated accrediting authority, designated approval authority, designated approving authority, designating authority, evaluation authority, geopolitical certificate authority, issuing authority, judicial authority, local authority, merchant certification authority, organizational registration authority, payment gateway certification authority, policy approving authority, policy certification authority, policy creation authority, policy management authority, principal accrediting authority, registration authority, security authority, sub-registration authority, subordinate certification authority, time-stamping authority, trusted time stamping authority,
- Related:COMSEC custodian, International Traffic in Arms Regulations, Internet Protocol Security Option, NRS token, NRT token, National Voluntary Laboratory Accreditation Program, SSO PIN, acceptable level of risk, access, accountability, accreditation, accreditation multiplicity parameter, accreditation range, alternate COMSEC custodian, assurance scheme, attribute certificate, audit charter, authorizing official, binding, certificate, certificate domain, certificate rekey, certificate revocation list, certification, certification hierarchy, certification practice statement, command and control, conformant validation certificate, control, credentials, cryptosystem review, data storage, designer, digital certificate, distribution point, enclave, entity, evaluation and validation scheme, evaluation scheme, identity proofing, information owner, information system security officer, inspectable space, national telecommunications and information system security directives, network security officer, non-repudiation of submission, non-repudiation of transport, notarization, operational waiver, personnel security, policy, policy mapping, primary account number, private accreditation exponent, private accreditation information, process, public-key certificate, public-key cryptography standards, public-key information, public-key infrastructure, realm, registration, review board, risk management, root, root CA, root registry, rules of engagement, security policy, sensitive information, special access program, system security officer, time-stamp requester, trust, trusted third party, trusted time stamp, users, validated products list, validation service,
- authority certificate
- IncludedBy:authority, certificate,
- Related:certification,
- authority revocation list
- IncludedBy:authority, revocation,
- Related:certificate, key, public-key, validate,
- authorization (to operate)
- IncludedBy:authorization,
- Related:control, management, risk, security,
- authorization
- IncludedBy:users,
- Includes:ACL-based authorization, access control, attribute-based authorization, authorization (to operate), authorization boundary, authorization key, authorization to process, authorize processing, authorized, delegation, interim access authorization, joint authorization, limited access authorization, list-oriented, multilevel security, need-to-know determination, permissions, pre-authorization, privilege, regrade, secure single sign-on, system security authorization agreement, ticket-oriented,
- Related:Bell-LaPadula security model, Identification Protocol, RA domains, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, Terminal Access Controller Access Control System, access, access approval, access level, access type, accreditation, acquirer, approval/accreditation, attack, authentication, case-by-case basis, category, certificate update, clearance, closed security environment, computer, connection approval, control, covert channel, cracker, credentials, dedicated security mode, discretionary access control, eavesdropping, entity, export license, file, firewall, hackers, identity, identity based access control, insider, intelligence sources and methods, interconnection security agreements, interface control document, interim accreditation, interim approval to operate, interim approval to test, internal system exposure, intruder, intrusion, intrusion detection, kerberos, key-encryption-key, key-escrow system, language, malicious intruder, management controls, mandatory access control, mode of operation, modes of operation, multilevel secure, multilevel security mode, open security environment, partitioned security mode, passwords, payment gateway, periods processing, personality label, personnel security, policy-based access control, privilege management infrastructure, privileged accounts, process, program, registration, reinstatement, remote authentication dial-in user service, resource, risk executive, risk index, risk management, risk-adaptable access control, role, role-based access control, security, security assertion markup language, security clearance, security intrusion, security management infrastructure, security perimeter, sensitive compartmented information facility accreditation, simple network management protocol, skimming, system, system-high security mode, trojan horse, trust, unfavorable personnel security determination, update (a certificate), user partnership program, vulnerability,
- authorization boundary
- IncludedBy:authorization,
- authorization key
- IncludedBy:authorization, key,
- authorization to process
- IncludedBy:authorization, process,
- Related:system,
- authorize processing
- IncludedBy:authorization, process,
- Related:assessment, control, operation, risk, system,
- authorized
- IncludedBy:authorization,
- Includes:authorized adjudicative agency, authorized classification and control markings register, authorized data security association list, authorized investigative agency, authorized person, authorized user, authorized vendor, authorized vendor program, unauthorized access, unauthorized disclosure, unauthorized person,
- Related:ACH debit fraud, Attack Sensing and Warning, Automated Information System security, Bell-LaPadula security model, COMSEC equipment, COMSEC facility, DD 254 - Final, Defense Central Security Index, Escrowed Encryption Standard, FIPS PUB 140-1, IP splicing/hijacking, IS related risk, IT security database, IT security incident, IT-related risk, PIV issuer, RED team, SOCKS, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, TOP SECRET, U.S.-controlled facility, U.S.-controlled space, acceptance criteria, access, access category, access control, access control lists, access control mechanisms, access control service, access mediation, acknowledged special access program, acquisition systems protection, active wiretapping, adequate security, administrative access, agent of the government, anonymous, anti-spoof, applicant, application controls, application server attack, approved test methods list, astragal strip, attack, audit trail, authenticate, authentication, automated information system media control system, automated security incident measurement, availability, between-the-lines-entry, bound metadata, browse access protection, call back, call back security, capability, carve-out, certification, certification authority, change control and lifecycle management, classification, classification levels, classification markings and implementation working group, classified, classified information, clearance, cleared commercial carrier, client server, communications security, compromise, compromised key list, computer abuse, computer intrusion, computer network defense, computer security intrusion, confidential, confidentiality, configuration control, control zone, controlled access area, controlled space, controlled unclassified information, courier, covert channel, covert channel analysis, critical system, cryptographic key, cryptographic officer, cryptography, cryptoperiod, damage assessment, damage to the national security, data compromise, data confidentiality, data confidentiality service, data integrity, data integrity service, data security, deception, declassification, delegation of disclosure authority letter, deliberate compromise of classified information, deliberate exposure, demon dialer, denial-of-service, designated, designated laboratories list, disaster plan, disclosure of information, discretionary access control, downgrade, eavesdropping, egress point, electronic security, emanations security, emission security, emissions security, encryption, entity, entry control, exposures, extranet, extraordinary security measures, failure access, false acceptance rate, falsification, fetch protection, file protection, file security, firewall, fishbowl, forced entry, foreign disclosure, foreign liaison officer, foreign military sales, foreign ownership, control, or influence, fraud, frequency hopping, guard, hackers, hacking, handcarrier, honeypot, human error, identity, illegal drug use, impact, impersonation, implant, inadvertent disclosure, inadvertent disclosure incident, incident of security concern, inference, information assurance, information assurance product, information security, information systems security, insertion, insider, integrity, integrity policy, intelligence activities, intelligence activity, intelligence community classification and control markings implementation, interception, internal security controls, intranet, intrusion, intrusion detection, intrusion detection systems, intrusion detection tools, issuer, joint personnel adjudication system, key distribution service, key owner, key recovery, leakage, least privilege, level of concern, list-oriented, logic bombs, logical access, logical access control, logoff, logon, major application, malicious applets, malicious code, malicious logic, malicious program, malware, masquerade, masquerading, media protection, misappropriation, mission critical, mode of operation, modes of operation, motivation, national security information, national security system, need for access, need-to-know, need-to-know determination, network security, no-lone zone, non-disclosure agreement, non-discussion area, open storage, operational data security, original classification, original classification authority, overt channel, passive, passive attack, passive threat, passwords, penetration, permissions, personal firewall, phage, physical and environmental protection, physical security, piggyback, piggyback entry, pre-activation state, principal disclosure authority, privacy, privileged access, privileged process, probe, procedural security, process, program channels or program security channels, program protection plan, protected network, protection ring, protective security service, proxy, random selection, regrade, remote access, resource, risk, rogue device, safeguarding statement, scavenging, secrecy policy, secret, secure state, security, security clearance, security compromise, security in-depth, security incident, security violation, segregation of duties, sensitive information, session hijack attack, signature, skimming, social engineering, special access program/special access required, split knowledge, sponsor, spoof, spoofing, store, subcommittee on Automated Information System security, subcommittee on telecommunications security, subject, substitution, superuser, surreptitious entry, suspicious contact, system, system integrity, system integrity service, system security officer, system-high security mode, tamper, tamper resisting, tampering, tcpwrapper, theft of data, theft of functionality, theft of service, threat, ticket-oriented, time bomb, traditional INFOSEC program, transmission, trapdoor, trespass, trojan horse, trusted agent, trusted computing base, trusted identification forwarding, two-person control, two-person integrity, unclassified, unclassified controlled nuclear information, unclassified sensitive, unforgeable, upgrade, user representative, usurpation, vault, violation of permissions, vulnerability, war driving,
- authorized adjudicative agency
- IncludedBy:authorized,
- Related:access, classified, intelligence,
- authorized classification and control markings register
- IncludedBy:authorized,
- Related:classified, intelligence, security,
- authorized data security association list
- IncludedBy:authorized, security,
- authorized investigative agency
- IncludedBy:authorized,
- Related:access, classified, intelligence,
- authorized person
- IncludedBy:authorized,
- Related:access, classified, information,
- Synonym:authorized user,
- authorized user
- IncludedBy:authorized, users,
- Related:access, operation,
- Synonym:authorized person,
- authorized vendor
- IncludedBy:authorized,
- Related:cryptography, requirements,
- authorized vendor program
- IncludedBy:authorized, program,
- Related:cryptographic, requirements, security,
- authorizing official
- Related:authority, function, information, operation, risk, system,
- auto-manual system
- IncludedBy:system,
- automated clearing house
- Related:computer,
- automated data processing
- HasPreferred:automated information system,
- automated data processing security
- HasPreferred:Automated Information System security,
- IncludedBy:security,
- automated data processing system
- IncludedBy:automated information system, process, system,
- Related:computer, software,
- automated information system
- IncludedBy:accountability, accreditation, assurance, audit trail, certification, declassification of AIS storage media, designated approving authority, information, modes of operation, process, security, system,
- Includes:Automated Information System security, CPU time, International organization for standardization, access mode, automated data processing system, bastion host, batch mode, batch processing, big-endian, bit, byte, central processing unit, centralized data processing, client server, computer abuse, data, data administration, data aggregation, data architecture, data contamination, data control language, data definition language, data dictionary, data flow diagram, data input, data management, data manipulation language, data processing, data reengineering, data storage, data structure, data validation, database administration, debugging, direct memory access, distributed dataprocessing, distributed processing, fail soft, front-end processor, host, host based, host to front-end protocol, host-based firewall, information architecture, information center, information engineering, information environment, information flow, information operations, information ratio, information technology, information technology system, interface control unit, lifecycle management, logical system definition, master file, memory scavenging, million instruction per second, multihost based auditing, network, random access memory, remote job entry, remote terminal emulation, screened host firewall, workstation,
- PreferredFor:IT system, automated data processing,
- Related:American National Standards Institute, American Standard Code for Information Interchange, Backus-Naur form, PCMCIA, application, application system, computer, control, data synchronization, digital document, direct access storage device, extended industry standard architecture, fiber distributed data interface, frame relay, function, industry standard architecture, input/output, language, laptop computer, large scale integration, legacy data, logged in, nibble, object code, object-oriented programming, operation, personal computer, personal computer memory card international association, personal digital assistant, read-only memory, remote procedure call, resource, reusability, rotational delay, safety-critical software, screen scraping, software, standard generalized markup language, structured query language, system resources, workflow, workload,
- automated information system media control system
- Related:access, authorized, classified, identity, security,
- Automated Information System security
- IncludedBy:automated information system, information, process, risk management, subcommittee on Automated Information System security, system,
- Includes:IT Security Evaluation Criteria, IT Security Evaluation Methodology, IT security, IT security certification, access control, communications security, emissions security, physical security, security safeguards,
- PreferredFor:automated data processing security,
- Related:access, authorized, computer, control, denial-of-service, function, operation, security software, software,
- Synonym:computer security,
- automated key distribution
- IncludedBy:key management,
- Related:computer, computer network, cryptographic, network, protocols,
- automated key management center
- IncludedBy:key management,
- automated key management system
- IncludedBy:key management, system,
- automated key transport
- IncludedBy:key,
- automated logon sequences
- IncludedBy:logon,
- Related:computer, connection, program, users,
- automated office support systems
- IncludedBy:system,
- automated password generator
- automated security incident measurement
- IncludedBy:incident, security incident, security software,
- Related:authorized, information, network, target,
- automated security monitoring
- IncludedBy:risk management, security software,
- Related:classified, control, critical, process, software, subject, system,
- automatic declassification
- automatic digital network
- IncludedBy:network,
- automatic key distribution center
- IncludedBy:key,
- automatic key distribution/rekeying control unit
- IncludedBy:control, key, rekey,
- automatic log-on
- Related:users,
- automatic remote rekeying
- IncludedBy:key, rekey,
- autonomous message switch
- IncludedBy:message,
- autonomous system
- IncludedBy:system,
- Related:policy, router,
- auxiliary power unit
- auxiliary vector
- availability
- IncludedBy:risk management, security, security goals,
- Includes:application data backup/recovery, availability of data, availability service, business continuity plan, business impact analysis, contingency planning, continuity of operations, environmentally controlled area, fire barrier, fire suppression system, high availability, object, privacy, authentication, integrity, non-repudiation, recovery, system retention/backup, token backup,
- Related:Common Criteria for Information Technology Security, IT security, IT security controls, IT security incident, National Computer Security Center, access, access control, adequate security, application server attack, assurance, attack, authorized, baseline security, communications, computer, computer abuse, computer emergency response team, computer related controls, computer security, critical, defense-in-depth, defense-wide information assurance program, denial-of-service, entity, entry-level certification, failure, fault tolerant, hardening, high impact, high-impact system, impact, impact level, impact value, incident, information, information assurance, information security, information system and network security, intrusion, level of concern, levels of concern, line managers, low impact, low-impact system, maintainability, malicious code, malware, mid-level certification, minimum essential infrastructure, mirroring, mission assurance category, moderate impact, moderate-impact system, post-accreditation phase, potential impact, process, property, redundant control server, reliability, remediation, requirements for procedures and standards, resource, resource starvation, retro-virus, risk, security category, security controls, security event, security policy, security requirements, security safeguards, security service, simple network management protocol, software, system, tactical edge, token management, top-level certification, trustworthy system, turnaround time, uniform resource name, users, vaulting, vulnerability,
- availability of data
- IncludedBy:availability,
- Related:users,
- availability service
- IncludedBy:availability,
- Related:access, access control, attack, control, denial-of-service, resource, system,
- awareness (information security)
- IncludedBy:security,
- back up vs. backup
- IncludedBy:backup, contingency plan,
- Related:damage, function, resource, system,
- backdoor
- IncludedBy:malicious code,
- Related:access, access control, computer, control, login, malicious, privileged, program, protocols, resource, risk, security, software, system, users,
- Synonym:trapdoor,
- background investigation
- Related:security,
- backhaul
- backtracking resistance
- Related:assurance,
- backup
- IncludedBy:recovery,
- Includes:application data backup/recovery, back up vs. backup, backup generations, backup operations, backup plan, backup procedures, binding of functionality, binding of security functionality, card backup, dynamic binding, static binding, system retention/backup, token backup,
- Related:X.509 certificate revocation list, application, archive, archiving, attribute certificate, authentication, authenticator, certificate renewal, certification, certification authority, certify, contingency plan, contingency planning, cryptographic key management system, digital certificate, digital signature, fallback procedures, file, key, key recovery, logic bombs, mirroring, national telecommunications and information system security directives, operations manager, process, program, public-key infrastructure, redundancy, redundant control server, registration, remediation, retrieval, retro-virus, security event, system, system administrator, time-stamp token, token management, valid certificate, validate vs. verify, validity period, vaulting,
- backup generations
- IncludedBy:backup, contingency plan,
- Related:application, file,
- backup operations
- IncludedBy:backup, contingency plan, operation,
- Related:business process, computer,
- backup plan
- IncludedBy:backup, contingency plan,
- backup procedures
- IncludedBy:backup, recovery,
- Related:computer, failure, file, program, system,
- Backus-Naur form
- Related:automated information system,
- baggage
- IncludedBy:Secure Electronic Transaction,
- Related:encryption, message,
- balanced magnetic switch
- Related:access, intrusion,
- bandwidth
- IncludedBy:information,
- PreferredFor:information rate,
- Related:channel capacity, communications, computer, computer network, covert, network, standard,
- bank identification number
- IncludedBy:Secure Electronic Transaction, identification,
- Related:identify,
- banking and finance
- IncludedBy:critical infrastructures,
- Related:critical, operation, system,
- banner
- Related:system,
- banner grabbing
- Related:application, connection, information, process, version,
- bar code
- IncludedBy:code,
- Related:identification, information,
- barograph
- barometer
- base station
- Related:access,
- baseline
- IncludedBy:security,
- Includes:baseline architecture, baseline controls, baseline management, baselining, security requirements baseline,
- Related:as-is process model, control, interface control document, release, revision, security target, site accreditation, software, software library, software system test and evaluation process, version,
- baseline architecture
- IncludedBy:baseline,
- baseline configuration
- Related:control,
- baseline controls
- IncludedBy:baseline, control,
- Related:security controls, system,
- baseline management
- IncludedBy:baseline, configuration management,
- Related:application, identify,
- baseline security
- IncludedBy:security,
- Related:availability, control,
- baselining
- IncludedBy:baseline,
- Related:process, resource,
- basic component
- IncludedBy:component,
- Basic Encoding Rules
- IncludedBy:Abstract Syntax Notation One,
- Includes:Distinguished Encoding Rules,
- Related:standard,
- basic testing
- bastion host
- IncludedBy:automated information system, firewall,
- Related:access, access control, application, attack, computer, gateway, network, protocols, resource, router, software, system, users,
- batch mode
- IncludedBy:automated information system,
- Related:file, process,
- batch process
- IncludedBy:process,
- Related:subject,
- batch processing
- IncludedBy:automated information system, process,
- bebugging
- Related:assurance, computer, program, test,
- Synonym:error seeding,
- behavioral outcome
- Related:security,
- Bell-LaPadula model
- HasPreferred:Bell-LaPadula security model,
- Bell-LaPadula security model
- IncludedBy:formal security policy model, model, security model,
- Includes:*-property, lattice, lattice model, object, simple security condition, simple security property, subject, tranquility, trusted subject,
- PreferredFor:Bell-LaPadula model, tranquility property,
- Related:access, access control, authorization, authorized, classification levels, classified, computer, computer security, confinement property, control, flow, information, operation, policy, process, system,
- benchmark
- Related:business process, computer, evaluation, process, program, requirements, software, standard, system, test, users,
- benchmarking
- Related:identify, operation, process, quality,
- benign
- Related:access, access control, compromise, countermeasures, cryptographic, cryptography,
- benign environment
- Related:countermeasures, security,
- best practices
- IncludedBy:risk management,
- Related:business process, function, identify, process, recommended practices, system,
- beta i
- Related:certification, security,
- beta ii
- Related:certification, security,
- between-the-lines-entry
- IncludedBy:attack,
- Includes:piggyback,
- Related:access, access control, authorized, communications, unauthorized access, users,
- beyond A1
- IncludedBy:trusted computer system,
- Related:assurance, computer, criteria, evaluation, security, system, technology,
- bias
- Related:process, system,
- Biba Integrity model
- IncludedBy:formal security policy model, integrity, model,
- Related:object, subject, system,
- Synonym:Biba model,
- Biba model
- IncludedBy:model,
- Related:integrity, object, subject, trust,
- Synonym:Biba Integrity model,
- big-endian
- IncludedBy:automated information system,
- bilateral trust
- IncludedBy:public-key infrastructure, trust,
- Related:business process,
- bill payment
- Related:application, internet,
- bill presentment
- Related:internet,
- billets
- Related:access, security,
- bind
- Related:certificate, digital signature, key, public-key, public-key infrastructure, signature, subject,
- binding
- Related:association, authority, certificate, certification, communications, cryptographic, cryptography, entity, identity, information, key, officer, operation, process, public-key, registration, security, trust, verification,
- binding of functionality
- IncludedBy:backup, function, target of evaluation,
- Related:assessment, security, target,
- binding of security functionality
- IncludedBy:backup, function, security,
- biological warfare
- IncludedBy:warfare,
- Related:damage,
- biometric authentication
- IncludedBy:authentication, biometrics,
- Includes:thumbprint,
- Related:3-factor authentication, information,
- biometric information
- IncludedBy:biometrics, information,
- biometric measurement
- IncludedBy:biometrics,
- Related:authentication, entity, identity, users,
- biometric system
- IncludedBy:biometrics, system,
- Related:entity, identification, identity, users, verification,
- biometric template
- IncludedBy:biometrics,
- Related:algorithm,
- biometrics
- IncludedBy:security,
- Includes:biometric authentication, biometric information, biometric measurement, biometric system, biometric template, capture, comparisons, false acceptance rate, match, minutiae,
- Related:authentication, entity, identify, identity, key, registration, signature,
- bit
- IncludedBy:automated information system,
- Related:information, key,
- bit error rate
- Related:communications, system, telecommunications,
- bit forwarding rate
- Related:allowed traffic, goodput, illegal traffic, interface, rejected traffic, response, test, unit of transfer,
- BLACK
- Related:RED/BLACK concept, cipher, classified, communications security, cryptography, information, process, security, system,
- black-box testing
- IncludedBy:security testing, test,
- Related:analysis, function, functional test case design, functional testing, program, software, stress testing,
- blacklist
- Related:application, malicious, threat, users,
- blacklisting
- Related:security,
- blended attack
- IncludedBy:attack,
- Related:code, malicious, malware,
- blinding
- Related:attack,
- block
- Related:function,
- block chaining
- Related:cipher, cryptographic, encipherment, information,
- Synonym:cipher block chaining,
- block cipher
- IncludedBy:cipher,
- Related:algorithm, encryption, interface, key, operation, process, property,
- block cipher algorithm
- block cipher key
- IncludedBy:cipher, key,
- Related:control, operation,
- Blowfish
- IncludedBy:symmetric cryptography,
- Related:cipher, key,
- blue box devices
- IncludedBy:threat,
- Related:system,
- blue team
- Related:attack, cyberspace, evaluation, risk, security, security testing, test, threat, vulnerability,
- body of evidence
- Related:control, requirements, security,
- bomb
- IncludedBy:threat,
- Related:failure, software, system,
- boot sector virus
- IncludedBy:virus,
- Related:system,
- bot-network operators
- IncludedBy:network, threat,
- Related:attack, control, denial-of-service, system,
- bounce
- Related:email, message,
- bound metadata
- IncludedBy:metadata,
- Related:authorized, key,
- boundary
- Includes:COMSEC boundary, accreditation boundary, boundary host, boundary value, boundary value analysis, boundary value coverage, boundary value testing, cryptographic boundary, enclave boundary, specialized boundary host, system boundary,
- Related:access, access control, cryptographic module, evaluation assurance level, external security controls, firewall, interface, remote access, security perimeter, software, system, users,
- boundary host
- IncludedBy:boundary,
- Related:access control, control, flow, information, system,
- boundary protection
- Related:control,
- boundary protection device
- Related:control, security,
- boundary value
- IncludedBy:boundary,
- Includes:boundary value analysis, boundary value coverage, boundary value testing,
- Related:stress testing, system,
- boundary value analysis
- IncludedBy:analysis, boundary, boundary value,
- Related:domain, security testing, test,
- boundary value coverage
- IncludedBy:boundary, boundary value,
- Related:test,
- boundary value testing
- IncludedBy:boundary, boundary value, security testing, test,
- Related:domain,
- branch coverage
- Related:program, test,
- brand
- IncludedBy:Secure Electronic Transaction,
- Related:entity, network, role,
- brand certification authority
- IncludedBy:Secure Electronic Transaction, authority, certification, public-key infrastructure,
- brand CRL identifier
- IncludedBy:Secure Electronic Transaction, public-key infrastructure,
- Related:digital signature, message, process, signature,
- breach
- IncludedBy:threat,
- Related:access control, control, information, penetration, security, system,
- break
- Related:algorithm, analysis, computer, cryptographic, cryptography, encryption, function, gateway, key, network, system,
- break-wire detector
- Related:intrusion,
- brevity list
- Related:message,
- bridge
- Related:protocols, router,
- British Standard 7799
- IncludedBy:standard,
- Related:certification, code, control, criteria, information, information security, object, requirements, security, system,
- broadband network
- IncludedBy:network,
- Related:operation, technology,
- broadcast
- brouters
- IncludedBy:router,
- Related:network, protocols,
- browse access protection
- IncludedBy:access,
- Related:authorized, file, owner, security, software, system, users,
- browser
- IncludedBy:world wide web,
- Related:computer, information, program,
- browsing
- IncludedBy:attack,
- Related:information,
- brute force
- HasPreferred:brute force attack,
- IncludedBy:attack,
- brute force attack
- IncludedBy:attack,
- PreferredFor:brute force,
- Related:algorithm, analysis, cipher, computer, cryptography, intelligence, key, message, process, program,
- brute force password attack
- IncludedBy:attack,
- Related:access,
- buffer overflow
- IncludedBy:flow, threat,
- Related:access, access control, attack, code, computer, control, information, interface, process, system,
- buffer overflow attack
- IncludedBy:attack,
- bug
- IncludedBy:threat,
- Related:anomaly, defect, error, exception, fault, function, program, property,
- bulk encryption
- IncludedBy:encryption,
- Related:communications, telecommunications,
- bulletin board services (systems)
- IncludedBy:system,
- burn bag
- Related:classified,
- burn-in
- business areas
- Related:function, information, operation, resource, version,
- business case
- IncludedBy:business process,
- Related:analysis, function, process, risk,
- business continuity
- business continuity plan
- IncludedBy:availability, business process,
- Related:risk,
- business disruption and system failures
- IncludedBy:operational risk loss, system,
- business impact analysis
- IncludedBy:analysis, availability, business process, risk analysis,
- Related:control, identify, process, requirements,
- business process
- IncludedBy:process,
- Includes:activity-based costing, business case, business continuity plan, business impact analysis, business process improvement, business process reengineering, constructive cost model, cost reimbursement contract, cost-risk analysis, cost/benefit, cost/benefit analysis, rolling cost forecasting technique,
- Related:as-is process model, backup operations, benchmark, best practices, bilateral trust, change management, contingency plan, continuity of services and operations, core or key process, hardening, integrity, legacy systems, mission critical system, process management approach, recovery site, remediation, simulation modeling, to-be-process model, total quality management, workload, world class organizations,
- business process improvement
- IncludedBy:business process, process, quality,
- business process reengineering
- IncludedBy:business process, process,
- Related:critical, quality, system,
- BUSTER
- Related:security,
- bypass label processing
- IncludedBy:process,
- byte
- IncludedBy:automated information system,
- Related:computer, information,
- C2-attack
- IncludedBy:attack,
- Related:C2-protect, adversary, information, system,
- C2-protect
- IncludedBy:Orange book, security,
- Related:C2-attack, adversary, command and control, control, information, system,
- CA certificate
- IncludedBy:certificate,
- Related:X.509, digital signature, key, public-key, signature,
- call back
- IncludedBy:security,
- Related:access, access control, authentication, authorized, computer, connection, identify, system,
- call back security
- IncludedBy:security,
- Related:authorized, connection, identify, system,
- camouflage
- Related:adversary, case officer, object,
- Canadian Trusted Computer Product Evaluation Criteria
- IncludedBy:Common Criteria for Information Technology Security Evaluation, computer, criteria, trust,
- candidate TCB subset
- IncludedBy:trusted computing base,
- Includes:object, subject,
- Related:evaluation, identification, software,
- canister
- Related:key,
- capability
- Includes:object,
- Related:access, access control, authorized, certificate, communications, critical, critical infrastructures, entity, file, information, public-key infrastructure, resource, risk, system, tokens,
- capacity
- Related:message, signature,
- CAPSTONE chip
- IncludedBy:National Security Agency,
- Related:Fortezza, cryptographic, cryptography, escrow, function, key, process,
- Capstone policies
- Related:requirements,
- capture
- IncludedBy:biometrics,
- Related:users,
- card backup
- HasPreferred:token backup,
- IncludedBy:backup,
- card initialization
- Related:file, process, tokens,
- card personalization
- Related:code, signature, tokens,
- cardholder
- IncludedBy:Secure Electronic Transaction,
- Related:entity, identity, information, software, users,
- cardholder certificate
- IncludedBy:Secure Electronic Transaction, certificate,
- Related:assurance, encryption, tokens, validate,
- cardholder certification authority
- IncludedBy:Secure Electronic Transaction, authority, certification, public-key infrastructure,
- Related:certificate, gateway, tokens, verification,
- carve-out
- Related:access, authorized, classified,
- cascading
- Related:accreditation, flow, information, network, security, system,
- case officer
- Related:camouflage, deception, intelligence,
- CASE tools
- Related:code, function, information, model, program, requirements, security testing, software, test,
- case-by-case basis
- Related:authorization,
- CAST
- IncludedBy:symmetric cryptography,
- Related:algorithm, encryption,
- category
- Includes:object,
- Related:access, access control, authorization, classified, information, privileged, security, subject,
- cause and effect diagram
- HasPreferred:fishbone diagram,
- caveat
- Related:foreign, security,
- CCI assembly
- Related:communications security, control, cryptographic, cryptography, function,
- CCI component
- Related:communications security, control, cryptographic, cryptography, function,
- CCI equipment
- Related:communications, communications security, control, cryptographic, cryptography, function, information, telecommunications,
- CCITT
- IncludedBy:ITU-T,
- cell
- Related:communications, system,
- cellular telephone
- cellular transmission
- Related:communications, network, technology,
- center for information technology excellence
- IncludedBy:information, technology,
- Related:IT security, security, standard,
- central adjudication facility
- Related:security,
- central office
- Related:access,
- central office of record
- Related:communications security, subject,
- central processing unit
- IncludedBy:automated information system, process,
- central services node
- Related:management, security,
- Central United States Registry for North Atlantic Treaty Organization
- Related:classified,
- centralized authorization
- IncludedBy:access control,
- Related:access, control,
- centralized data processing
- IncludedBy:automated information system, process,
- centralized operations
- IncludedBy:operation,
- Related:certification, computer, control, function, process, quality,
- centrally-administered network
- IncludedBy:network,
- Related:system,
- certificate
- IncludedBy:Secure Electronic Transaction, multilevel information systems security initiative, pretty good privacy, privacy enhanced mail, web of trust,
- Includes:CA certificate, Validation Certificate, X.509 attribute certificate, X.509 certificate, X.509 certificate revocation list, X.509 public-key certificate, attribute certificate, authority certificate, cardholder certificate, certificate authority workstation, certificate chain, certificate chain validation, certificate creation, certificate directory, certificate domain, certificate domain parameters, certificate expiration, certificate holder, certificate management, certificate management services, certificate owner, certificate policy, certificate policy qualifier, certificate reactivation, certificate rekey, certificate renewal, certificate request, certificate revocation, certificate revocation list, certificate revocation tree, certificate serial number, certificate status responder, certificate update, certificate user, certificate validation, conformant validation certificate, cross-certificate, digital certificate, encryption certificate, geopolitical certificate authority, indirect certificate revocation list, merchant certificate, mutual recognition of certificates, online certificate status protocol, organizational certificate, public-key certificate, root certificate, security certificate, self-signed certificate, signature certificate, software publisher certificate, trusted certificate, v1 certificate, v2 certificate, v3 certificate, valid certificate,
- Related:ABA Guidelines, Abstract Syntax Notation One, Cryptographic Message Syntax, Distinguished Encoding Rules, Federal Public-key Infrastructure, IT security certification, MISSI user, Minimum Interoperability Specification for PKI Components, PKCS #10, PKIX, RA domains, SET private extension, SET qualifier, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, X.500 Directory, X.509, X.509 authority revocation list, accreditation, applicant, archive, assurance, attribute authority, authenticate, authentication, authority, authority revocation list, bind, binding, capability, cardholder certification authority, certification, certification authority digital signature, certification authority workstation, certification hierarchy, certification path, certification policy, certification practice statement, certification request, certification service, certify, common name, common security, compromised key list, credentials, critical, cross-certification, cryptoperiod, delta CRL, digital id, digital signature, directly trusted CA key, directory service, directory vs. Directory, distinguished name, distribution point, domain, end entity, enrollment service, entity, evaluation, extension, hierarchy management, identification, identity, information, invalidity date, issue, issuer, key, key lifetime, key management infrastructure, key material identifier, local authority, management, merchant certification authority, mesh PKI, message, operation, organizational registration authority, owner, party, path discovery, path validation, payment gateway certification authority, personal identity verification card, personality label, policy, policy approving authority, policy certification authority, policy creation authority, policy mapping, privilege management infrastructure, process, program, public-key, public-key infrastructure, registration, registration authority, registration service, relying party, repository, requirements, revocation, revocation date, root, root CA, secure hypertext transfer protocol, security, security event, security management infrastructure, security testing, signature, slot, sponsor, standard, strong authentication, subject, subordinate certification authority, system, test, ticket, token management, tokens, trust-file PKI, trusted key, tunneled password protocol, unforgeable, users, v1 CRL, v2 CRL, valid signature, validate, validate vs. verify, validated products list, validation, validity period, world wide web,
- certificate authority
- HasPreferred:certification authority,
- certificate authority workstation
- IncludedBy:authority, certificate,
- certificate chain
- IncludedBy:certificate,
- Related:certification, public-key infrastructure, standard,
- certificate chain validation
- IncludedBy:certificate, validation,
- Related:public-key infrastructure, standard,
- certificate creation
- IncludedBy:certificate, public-key infrastructure,
- Related:process,
- certificate directory
- IncludedBy:certificate, public-key infrastructure,
- Related:certification, key, public-key,
- certificate domain
- IncludedBy:certificate, domain,
- Related:authority, certification, key, policy, public-key, security,
- certificate domain parameters
- IncludedBy:certificate, domain,
- Related:cryptographic, cryptography, public-key infrastructure,
- certificate expiration
- IncludedBy:certificate,
- PreferredFor:expire,
- Related:public-key infrastructure,
- certificate holder
- IncludedBy:certificate,
- Related:entity, subject, system,
- certificate management
- IncludedBy:certificate, management, public-key infrastructure,
- Related:code, destruction, function, key, process, rekey, update,
- certificate management authority
- IncludedBy:management,
- Related:certification,
- certificate management services
- IncludedBy:certificate,
- Related:certification, lifecycle, public-key infrastructure, registration, revocation,
- certificate owner
- IncludedBy:certificate, owner,
- Related:entity, subject, system, world wide web,
- certificate policy
- IncludedBy:Secure Electronic Transaction, certificate, policy, public-key infrastructure,
- Related:X.509, application, authentication, control, critical, key, management, object, public-key, requirements, security, trust, users,
- certificate policy qualifier
- IncludedBy:certificate, policy, public-key infrastructure,
- Related:X.509, information, key, public-key,
- certificate reactivation
- IncludedBy:certificate, public-key infrastructure,
- Related:process, revocation,
- certificate rekey
- IncludedBy:certificate, key, multilevel information systems security initiative, public-key infrastructure, rekey,
- Related:X.509, authority, process, public-key, revoked state, subject, update,
- certificate renewal
- IncludedBy:certificate, public-key infrastructure, renewal,
- PreferredFor:renew,
- Related:X.509, backup, key, process, public-key, rekey, revoked state, subject, update,
- certificate request
- IncludedBy:certificate, public-key infrastructure,
- Related:certification, standard,
- certificate revocation
- IncludedBy:certificate, public-key infrastructure,
- PreferredFor:revoke,
- Related:X.509, users,
- certificate revocation list
- IncludedBy:certificate, certification authority, revocation,
- Related:accreditation, authentication, authority, encryption, evaluation, identify, key, process, public-key, revoked state, users, validate,
- certificate revocation tree
- IncludedBy:certificate, revocation,
- Related:X.509, hash,
- certificate serial number
- IncludedBy:certificate,
- PreferredFor:serial number,
- certificate status authority
- Related:trust,
- certificate status responder
- IncludedBy:certificate, public-key infrastructure,
- Related:X.509, authentication, information, trust, users,
- certificate update
- IncludedBy:certificate, public-key infrastructure, update,
- Related:X.509, authorization, key, process, public-key, rekey, renewal, subject,
- certificate user
- IncludedBy:certificate, users,
- Related:control, entity, information, key, process, public-key, subject, system,
- certificate validation
- IncludedBy:certificate, public-key infrastructure, validation,
- Related:X.509, certification, critical, digital signature, key, process, public-key, revocation, revoked state, semantics, signature, trust, users, validate,
- certificate-related information
- Related:certification,
- certification
- IncludedBy:Secure Electronic Transaction, multilevel information systems security initiative,
- Includes:IT security certification, accreditation, automated information system, brand certification authority, cardholder certification authority, certification agent or certifier, certification analyst, certification authority, certification authority digital signature, certification authority facility, certification authority workstation, certification body, certification hierarchy, certification package, certification path, certification phase, certification policy, certification practice statement, certification request, certification service, clearance certification, decertification, digital certification, entry-level certification, evaluation, facilities certification, merchant certification authority, mid-level certification, payment gateway certification authority, policy certification authority, pre-certification phase, principal certification authority, requirements, root certification authority, security certification level, site certification, subordinate certification authority, superior certification authority, top-level certification, type certification,
- Related:British Standard 7799, For Official Use Only Certified TEMPEST Technical Authority, IT security, Internet Policy Registration Authority, MISSI user, PIV registrar, RA domains, SET qualifier, SSO PIN, X.509 public-key certificate, applicant, application, approved security container, assessment, assurance, audit/review, authority, authority certificate, authorized, backup, beta i, beta ii, binding, centralized operations, certificate, certificate chain, certificate directory, certificate domain, certificate management authority, certificate management services, certificate request, certificate validation, certificate-related information, certified TEMPEST technical authority, certifier, clearance, component extensibility, computer, computer security, control, criteria, cross-certificate, digital certificate, entity, extension, external security controls, geopolitical certificate authority, hierarchical PKI, hierarchy management, hierarchy of trust, information, information assurance, key, key management, line supervision, management, mission assurance category, operation, owner, path discovery, path validation, penetration test, policy approving authority, policy creation authority, policy management authority, pre-authorization, privacy enhanced mail, process, protocols, public-key, public-key certificate, public-key information, public-key infrastructure, root, root certificate, security event, security program manager, security testing, system, test, top CA, trust, trust anchor, trust chain, trust hierarchy, trust-file PKI, trusted agent, trusted certificate, trusted key, users, validate vs. verify,
- certification agent or certifier
- IncludedBy:certification,
- Related:control, evaluation, requirements, risk, security, system, vulnerability,
- certification analyst
- IncludedBy:certification,
- Related:control, management, requirements, risk, security,
- certification and accreditation
- IncludedBy:accreditation, evaluation, requirements, risk,
- Related:process,
- certification authority
- IncludedBy:authority, certification, public-key infrastructure, trust,
- Includes:certificate revocation list, credentials, cross-certification, non-repudiation, root CA,
- PreferredFor:certificate authority,
- Related:PIV issuer, X.509, association, authorized, backup, entity, evaluation, identity, identity credential issuer, information, key, message, public-key, requirements, security, standard, system, test, users, validate,
- certification authority digital signature
- IncludedBy:authority, certification, public-key infrastructure, signature,
- Related:authentication, certificate, key, public-key,
- certification authority facility
- IncludedBy:certification,
- certification authority workstation
- IncludedBy:authority, certification, public-key infrastructure,
- Related:application, certificate, computer, function, software, system, trust,
- certification body
- IncludedBy:certification,
- certification hierarchy
- IncludedBy:Secure Electronic Transaction, certification, multilevel information systems security initiative, public-key infrastructure,
- Related:authority, certificate, gateway, internet, key, policy, public-key, registration, users, validation,
- certification package
- IncludedBy:certification,
- Related:assessment, operation, risk, security,
- certification path
- IncludedBy:certification, public-key infrastructure,
- Related:X.509, certificate, digital signature, entity, information, key, object, process, public-key, signature, subject, trust, users, validate,
- certification phase
- IncludedBy:certification,
- Related:accreditation, application, assessment, control, process, security, system, verification,
- certification policy
- IncludedBy:certification, policy,
- Related:certificate, public-key infrastructure,
- certification practice statement
- IncludedBy:certification, public-key infrastructure,
- Related:access, application, authority, certificate, computer, entity, operation, policy, requirements, security, system, trust, users,
- certification request
- IncludedBy:certification, public-key infrastructure,
- Related:X.509, algorithm, certificate, entity, key, public-key,
- certification service
- IncludedBy:certification, public-key infrastructure,
- Related:certificate,
- certification test and evaluation
- IncludedBy:evaluation, test,
- Related:development, security, software,
- certificaton authority
- IncludedBy:authority, public-key infrastructure,
- certified information systems security professional
- IncludedBy:computer security, information, system,
- certified TEMPEST technical authority
- IncludedBy:TEMPEST, authority,
- Related:certification, criteria, requirements,
- certifier
- Related:accreditation, certification, identify, requirements, risk, system,
- certify
- Related:backup, certificate, entity, identity, key, owner, public-key, public-key infrastructure, subject, verification,
- CGI scripts
- IncludedBy:common gateway interface, software, threat, world wide web,
- Related:security,
- chain letter
- IncludedBy:threat,
- Related:users,
- chain of custody
- chain of evidence
- Related:control,
- challenge
- IncludedBy:challenge/response,
- Related:information, random, response,
- challenge and reply authentication
- IncludedBy:authentication,
- Related:subject,
- Challenge Handshake Authentication Protocol
- IncludedBy:authentication, challenge/response, protocols, security protocol,
- Related:cryptographic, cryptography, entity, hash, key, random, response,
- Challenge-Response Authentication Mechanism
- IncludedBy:authentication, challenge/response, response,
- Related:hash, key, shared secret,
- challenge-response protocol
- IncludedBy:protocols, response,
- Related:attack, authentication, control, cryptographic, hash, key, operation, public-key, random,
- challenge/response
- IncludedBy:response,
- Includes:Challenge Handshake Authentication Protocol, Challenge-Response Authentication Mechanism, challenge,
- Related:3-factor authentication, Extensible Authentication Protocol, IMAP4 AUTHENTICATE, POP3 AUTH, authentication, entity, identity, information, key, process, system, tokens, users,
- change control and lifecycle management
- IncludedBy:control, software development,
- Related:authorized, program,
- change management
- Related:business process, process, security testing, test,
- channel
- Includes:communication channel, covert channel, covert storage channel, covert timing channel, exploitable channel, internal communication channel, overt channel, security-compliant channel, trusted channel,
- Related:information, system,
- channel capacity
- Related:bandwidth, communications, information,
- channel scanning
- Related:intrusion, intrusion detection, system,
- check character
- IncludedBy:error detection code,
- Includes:check character system,
- check character system
- IncludedBy:check character, system,
- check digits
- check word
- Related:cipher, cryptographic, cryptography,
check_password
- check_password
- IncludedBy:attack,
- Related:passwords, program,
- checksum
- IncludedBy:integrity,
- Related:algorithm, attack, computer, confidence, countermeasures, cryptographic, cryptography, entity, function, hash, information, network, object, system,
- chemical warfare
- IncludedBy:warfare,
- Related:control,
- Chernobyl packet
- IncludedBy:threat,
- Related:gateway, network,
- chief information agency officer
- IncludedBy:information, officer,
- Related:operation, process, resource, technology,
- chief information officer
- IncludedBy:information, officer,
- Related:management, resource, technology,
- chosen-ciphertext attack
- IncludedBy:attack, cipher,
- Related:analysis, key,
- chosen-plaintext attack
- IncludedBy:attack,
- Related:analysis, cipher, cryptography, key,
- cipher
- IncludedBy:encryption,
- Includes:Rivest Cipher 2, Rivest Cipher 4, asymmetric cipher, asymmetric encipherment system, block cipher, block cipher key, chosen-ciphertext attack, cipher block chaining, cipher feedback, cipher suite, cipher text auto-key, ciphertext, ciphertext-only attack, decipher, decipherment, encipher, encipherment, encipherment algorithm, encrypt, encrypted key, n-bit block cipher, private decipherment key, private decipherment transformation, public encipherment key, public encipherment transformation, stream cipher, symmetric encipherment algorithm,
- Related:BLACK, Blowfish, Data Authentication Algorithm, El Gamal algorithm, RED/BLACK separation, Rivest-Shamir-Adleman algorithm, Skipjack, algorithm, asymmetric cryptographic technique, asymmetric encryption algorithm, block chaining, brute force attack, check word, chosen-plaintext attack, ciphony, cleartext, code, controlled access area, cryptanalysis, cryptographic, cryptographic algorithm, cryptographic key, cryptographic synchronization, cryptographic system, cryptography, cut-and-paste attack, data encryption algorithm, data encryption key, decrypt, decryption, encode, encryption algorithm, feedback buffer, initialization value, initialization vector, initializing value, intelligent threat, key, key generator, key stream, known-plaintext attack, message authentication code vs. Message Authentication Code, mode of operation, one-time pad, one-way encryption, out-of-band, private key, public-key, public-key certificate, public-key cryptography, secret-key cryptography, security strength, semantic security, superencryption, system, traffic analysis, traffic encryption key, triple DES,
- cipher block chaining
- IncludedBy:cipher,
- Related:algorithm, code,
- Synonym:block chaining,
- cipher feedback
- IncludedBy:cipher, cryptography,
- Related:algorithm, code,
- cipher suite
- IncludedBy:cipher,
- Related:algorithm, code,
- cipher text auto-key
- IncludedBy:cipher, key,
- Related:cryptographic,
- ciphertext
- IncludedBy:cipher,
- Related:algorithm, encipherment, encryption, information, message,
- ciphertext key
- HasPreferred:encrypted key,
- IncludedBy:key,
- ciphertext-only attack
- IncludedBy:attack, cipher,
- Related:algorithm, analysis, cryptographic, key, subject,
- ciphony
- Related:cipher, information, process,
- circuit control officer
- IncludedBy:control,
- circuit level gateway
- IncludedBy:gateway,
- Related:connection, firewall, validate,
- Synonym:circuit proxy,
- circuit proxy
- IncludedBy:firewall, proxy,
- Related:application, connection, control, key,
- Synonym:circuit level gateway,
- circuit switching
- Related:communications, connection, network, system,
- civil liberties
- CKMS
- Related:cryptographic, key, metadata,
- CKMS component
- Related:policy, software,
- CKMS profile
- IncludedBy:file, profile,
- Related:requirements, security,
- claimant
- Related:authentication, entity, function, identity, man-in-the-middle attack, protocols,
- clandestine operation
- Related:covert operation, overt operation,
- Clark Wilson integrity model
- IncludedBy:integrity, model,
- Related:access, access control, control, software,
- class 2, 3, 4, or 5
- IncludedBy:public-key infrastructure,
- Related:assurance, classified, critical, cryptographic, entity, identification, information, key, risk, system, tokens,
- class
- Related:object,
- class hierarchy
- Related:network,
- class object
- IncludedBy:object,
- classification
- Related:authorized, classified, object, security,
- classification guidance
- classification guide
- Related:classified, subject,
- classification levels
- IncludedBy:classified,
- Includes:TOP SECRET, confidential, default classification, secret, sensitive, sensitive but unclassified, trust level,
- Related:Bell-LaPadula security model, Internet Protocol Security Option, authorized, classified information, clearance level, compartment, confinement property, controlled security mode, damage, dedicated security mode, dominated by, dominates, downgrade, information, lattice model, mode of operation, modes of operation, multilevel security, multilevel security mode, non-discretionary security, object, regrade, risk index, sanitize, security label, security level, security situation, sensitivity label, system-high security mode, users,
- classification markings and implementation working group
- Related:authorized, intelligence,
- classified
- IncludedBy:security,
- Includes:classification levels, classified contract, classified information, classified information procedures act, classified information spillage, classified military information, classified national security information, classified visit, controlled unclassified information, default classification, deliberate compromise of classified information, endorsed for unclassified cryptographic information, endorsed for unclassified cryptographic item, north atlantic treaty organization classified information, sensitive but unclassified, sensitive but unclassified information, unclassified, unclassified controlled nuclear information, unclassified internet protocol router network, unclassified sensitive,
- Related:BLACK, Bell-LaPadula security model, COMSEC demilitarization, CRYPTO, Central United States Registry for North Atlantic Treaty Organization, DD 254 - Final, DD 254 - Original, Defense Central Security Index, Defense Information Systems Network, Escrowed Encryption Standard, FIPS PUB 140-1, Federal Public-key Infrastructure, Federal Standard 1027, Internet Protocol Security Option, Key Exchange Algorithm, National Institute of Standards and Technology, National Security Agency, RED, RED/BLACK concept, Secure Telephone Unit III, Skipjack, Trusted Computer System Evaluation Criteria, Type 1 key, Type 2 key, Type I cryptography, Type II cryptography, access, access approval, access control, access eligibility determination, access national agency check and inquiries, accesses, accreditation, acknowledged special access program, acoustic security, activity security manager, adjudication, advanced encryption standard, adverse information, agency, aggregation, applicant, associated markings, authorized, authorized adjudicative agency, authorized classification and control markings register, authorized investigative agency, authorized person, automated information system media control system, automated security monitoring, burn bag, carve-out, category, class 2, 3, 4, or 5, classification, classification guide, classifier, clearance, clearance certification, cleared escort, clearing, closed area, code word, cognizant security agency, compartment, compartmentalization, compromise, confidentiality, confinement property, contamination, controlled cryptographic item, controlled security mode, courier, custodian, damage assessment, data aggregation, data encryption standard, declassification, declassification authority, dedicated mode, dedicated security mode, derivative classification, designated disclosure authority, dominated by, dominates, downgrade, downgrading, equity, escort, exception, facilities accreditation, facilities certification, facility security clearance, false positive, for official use only, foreign disclosure, foreign disclosure point of contact, foreign ownership, control, or influence, foreign relations of the united states, foreign travel briefing, foreign visit, formal access approval, formerly restricted data, government-to-government transfer, guard, handcarrier, handle via special access control channels only, high assurance guard, inadvertent disclosure incident, incident of security concern, industrial security, information, information category, information security oversight office, inspectable space, interim approval to operate, internal vulnerability, invalidation, key-escrow system, lattice model, law enforcement sensitive, mandatory access control, mandatory declassification review, mission critical, mode of operation, modes of operation, multilevel security, multilevel security mode, multiuser mode of operation, national security information, national security system, national security-related information, naval nuclear propulsion information, need for access, need-to-know, nicknames, non-disclosure agreement, non-discretionary security, non-discussion area, one-time access, open storage, operations security, operations security survey, originating agency determination required, pass/fail, periods processing, personnel security, personnel security - issue information, personnel security clearance, personnel security determination, personnel security interview, personnel security investigation, personnel security program, policy, program channels or program security channels, program protection plan, program sensitive information, protected distribution systems, protected information, public law 100-235, purge, radio frequency jamming, reference material, regrade, reinstatement, release, restricted area, restricted data, revocation, revocation of facility security clearance, risk index, safeguarding and safeguarding measures, safeguarding statement, sanitize, sanitizing, secret, secret key, secure data device, secure operating system, security assurance, security classification guides, security clearance, security compromise, security domain, security incident, security infraction, security label, security level, security policy automation network, security situation, security violation, senior agency official, sensitive compartmented information, sensitive information, sensitivity label, single scope background investigation - periodic reinvestigation, source document, special access program facility, spillage, sponsoring agency, stand-alone automated information system, standard practice procedures, stratified random sample, subcontract, suspicious contact, system-high security mode, systematic declassification review, tear line, technical data, temporary help/job shopper, transmission, transportation plan, trusted computer system, trusted foundry, type 1 products, type 2 product, type 3 key, type 3 product, unacknowledged special access program, unauthorized disclosure, unauthorized person, unfavorable personnel security determination, upgrade, working papers,
- classified contract
- IncludedBy:classified,
- Related:access, requirements,
- classified data
- HasPreferred:classified information,
- classified information
- IncludedBy:access control, classified, information,
- Includes:classified military information, classified national security information,
- PreferredFor:classified data,
- Related:authorized, classification levels, classified information procedures act, classified information spillage,
- classified information procedures act
- IncludedBy:classified,
- Related:access, classified information,
- classified information spillage
- IncludedBy:classified, information, threat,
- Related:classified information, incident, security incident,
- classified military information
- IncludedBy:classified, classified information,
- classified national security information
- IncludedBy:classified, classified information,
- classified visit
- IncludedBy:classified,
- Related:access,
- classifier
- Related:classified, security,
- clean system
- IncludedBy:system,
- Related:application, compromise, computer, file, risk, security, software, trust, virus,
- clear
- Related:software,
- clearance
- Related:access, authorization, authorized, certification, classified, security, trust,
- clearance certification
- IncludedBy:certification,
- Related:access, classified, security,
- clearance level
- Related:access, access control, classification levels, information, security, security clearance,
- cleared commercial carrier
- Related:authorized, security,
- cleared employees
- Related:security,
- cleared escort
- Related:United States citizen, access, classified,
- clearing
- Related:classified, key, system,
- cleartext
- Antonym:encryption,
- PreferredFor:plain text,
- Related:cipher, cryptography, information, operation, process,
- client (application)
- client
- Related:access, access control, computer, entity, process, program, system, users,
- client server
- IncludedBy:automated information system,
- Related:access, access control, authorized, communications, computer, model, process, program, system, users,
- clients, products, and business practices
- IncludedBy:operational risk loss,
- Related:requirements,
- Clinger-Cohen Act of 1996
- Related:management, risk,
- Clipper chip
- IncludedBy:National Institute of Standards and Technology, National Security Agency,
- Includes:Law Enforcement Access Field,
- Related:algorithm, communications, cryptographic, cryptography, encryption, escrow, key, process, standard, tamper,
- closed area
- Related:classified, requirements,
- closed security environment
- IncludedBy:security, software development,
- Related:application, assurance, authorization, control, malicious, operation, system,
- closed storage
- Related:access, security,
- closed user group
- IncludedBy:users,
- Related:communications,
- cloud computing
- Related:access, control, management, security, software, users,
- cluster controller
- IncludedBy:control,
- cluster sample
- Related:random,
- co-utilization
- Related:access,
- coalition
- coaxial cable
- code
- Includes:American Standard Code for Information Interchange, accounting legend code, authentication code, bar code, code amber, code book, code coverage, code division multiple access, code green, code group, code red, code vocabulary, coded switch system, country code, data authentication code, data authentication code vs. Data Authentication Code, decode, electronic codebook, encode, error detection code, executable code, hash code, hashed message authentication code, malicious code, manipulation detection code, message authentication code, message authentication code algorithm, message authentication code vs. Message Authentication Code, message integrity code, microcode, mobile code, object code, one-part code, operations code, source code, source code generator, two-part code,
- Related:British Standard 7799, CASE tools, Distinguished Encoding Rules, El Gamal algorithm, Generic Security Service Application Program Interface, Integrated CASE tools, POSIX, Type II cryptography, algorithm, antivirus tools, application generator, application program interface, authentication, authentication token, blended attack, buffer overflow, card personalization, certificate management, cipher, cipher block chaining, cipher feedback, cipher suite, coding, communications security, compiled viruses, compiler, completeness, computer, crack, cryptographic, cryptographic application programming interface, cryptographic key, cryptography, cyclic redundancy check, data driven attack, dc servo drive, decrypt, domain name, dynamic analysis, encrypt, encryption, exploit, fault injection, fork bomb, gateway, hash, hash token, identification authentication, imprint, information, instrumentation, interface, interpreted virus, keyed hash algorithm, keying material, killer packets, logic bombs, maintenance hook, malicious program, malware, message, national security system, network sniffing, null, object, out-of-band, output transformation, passive security testing, patch, payload, penetration test, penetration testing, personal identification number, polymorphism, portability, positive control material, primary account number, program, protocols, reduction-function, reverse engineering, revoked state, scalability, secure hash standard, security perimeter, sensitive information, shim, simple network management protocol, spyware, state delta verification system, syllabary, symmetric key, synchronous flood, system, technical vulnerability information, test case generator, test cycle, time bomb, trapdoor, trojan horse, trust, unit, untrusted process, variant, verification, virus, worm,
- code amber
- IncludedBy:code, critical infrastructures, threat,
- Related:critical, function, security,
- code book
- IncludedBy:code,
- Related:encryption, system,
- code coverage
- IncludedBy:code,
- Related:analysis, software, test,
- code division multiple access
- IncludedBy:access, code, security,
- Related:cryptography, technology,
- code green
- IncludedBy:code, critical infrastructures,
- code group
- IncludedBy:code,
- Related:system,
- code red
- IncludedBy:code, critical infrastructures, threat,
- Related:attack, critical, function, security,
- code vocabulary
- IncludedBy:code,
- Related:system,
- code word
- Related:classified, security,
- coded switch system
- IncludedBy:code, system,
- coding
- Related:code, computer, flow, program, software,
- coefficient of variation
- Related:standard,
- coercive force
- coercivity
- cognizant security agency
- IncludedBy:security,
- Related:classified, intelligence,
- cognizant security office
- IncludedBy:security,
- cohabitant
- cold site
- IncludedBy:disaster recovery,
- Related:communications, computer, connection, hot site, system,
- cold start
- Related:cryptography, key, users,
- collaborative computing
- Related:application, information, technology,
- collateral information
- Related:access, security, security clearance, subject,
- collision
- collision-resistant hash function
- IncludedBy:function, hash,
- Related:property, requirements,
- color change
- Related:information, process, system,
- command and control
- IncludedBy:control,
- Includes:command and control warfare, command, control, and communications, command, control, communications and computers, command, control, communications and intelligence, global command and control system, nuclear command and control document,
- Related:C2-protect, Defense Information Infrastructure, authority, communications, function, operation,
- command and control warfare
- IncludedBy:command and control, control, warfare,
- Related:adversary, application, information, intelligence, operation, security,
- command authority
- IncludedBy:authority,
- Related:key, users,
- command, control, and communications
- IncludedBy:command and control, communications, control,
- command, control, communications and computers
- IncludedBy:command and control, communications, computer, control,
- command, control, communications and intelligence
- IncludedBy:command and control, communications, control, intelligence,
- Commercial COMSEC Endorsement Program
- IncludedBy:communications security, program,
- Commercial COMSEC Evaluation Program
- IncludedBy:communications security, evaluation, program,
- Related:algorithm, module, standard, system,
- commercial off-the-shelf software
- IncludedBy:software,
- Related:test,
- Synonym:COTS software,
- commercial software
- IncludedBy:software,
- Related:owner,
- commercial-off-the-shelf
- Includes:COTS software,
- Committee of sponsoring organizations (of the Treadway Commission)
- commodity service
- Related:control, management, security,
- common access card
- IncludedBy:access,
- common carrier
- common control
- IncludedBy:control,
- Related:security,
- common control provider
- IncludedBy:control,
- Related:development, security,
- common criteria
- IncludedBy:criteria,
- Related:assurance, computer security, evaluation, function, information, information assurance, program, requirements, role, security, standard, system, technology,
- Synonym:Common Criteria for Information Technology Security,
- Common Criteria for Information Technology Security
- IncludedBy:National Institute of Standards and Technology, computer security, criteria, information, security, technology,
- Includes:Common Criteria for Information Technology Security Evaluation, national information assurance partnership,
- Related:National Security Agency, algorithm, application, assessment, assurance, availability, computer, computer network, confidentiality, control, cryptographic, cryptography, emanation, emanations security, evaluation, function, integrity, malicious, network, operation, requirements, software, standard, system, threat, trust, version,
- Synonym:common criteria,
- Common Criteria for Information Technology Security Evaluation
- IncludedBy:Common Criteria for Information Technology Security, computer security, criteria, evaluation, information, technology,
- Includes:Canadian Trusted Computer Product Evaluation Criteria, European Information Technology Security Evaluation Criteria, Federal Criteria for Information Technology Security, Trusted Computer System Evaluation Criteria, assurance component, common criteria version 1.0, common criteria version 2.0, component dependencies, component extensibility, component hierarchy, component operations, evaluation assurance level, functional component, protection profile, security target, trusted gateway,
- Related:IT security, assessment, requirements, risk,
- Common Criteria Testing Laboratory
- IncludedBy:criteria, national information assurance partnership, security testing, test,
- Includes:Monitoring of Evaluations, Scope of Accreditation, Validation Certificate, approved technologies list, approved test methods list, deliverables list, designated laboratories list, designating authority, designation policy, evaluation technical report, evaluation work plan, observation reports,
- Related:IT security, accreditation, computer security, evaluation, program, validation,
- Common Criteria Testing Program
- IncludedBy:criteria, national information assurance partnership, program, security testing, test,
- Related:evaluation, validation,
- common criteria version 1.0
- IncludedBy:Common Criteria for Information Technology Security Evaluation, criteria, version,
- Related:computer security, information, technology,
- common criteria version 2.0
- IncludedBy:Common Criteria for Information Technology Security Evaluation, criteria, version,
- Related:computer security, information, technology,
- common data security
- IncludedBy:common data security architecture,
- Related:communications, module, system,
- common data security architecture
- IncludedBy:security,
- Includes:common data security, common security, common security services manager, cryptographic service, cryptographic service providers,
- PreferredFor:communication and data security architecture,
- Related:authentication, encryption,
- Common Evaluation Methodology
- IncludedBy:evaluation, national information assurance partnership,
- common fill device
- Related:key,
- common gateway interface
- IncludedBy:gateway, interface, world wide web,
- Includes:CGI scripts,
- Related:access, access control, program, resource,
- common interswitch rekeying key
- IncludedBy:key, rekey,
- Common IP Security Option
- IncludedBy:security,
- common misuse scoring system
- Related:security, software, vulnerability,
- common name
- IncludedBy:public-key infrastructure,
- Related:X.509, certificate, key, object, public-key,
- common platform enumeration
- common security
- IncludedBy:common data security architecture,
- Related:application, certificate, cryptographic, integrity, key, policy, protocols, public-key infrastructure, trust,
- common security services manager
- IncludedBy:common data security architecture,
- common vulnerabilities and exposures
- IncludedBy:exposures, vulnerability,
- Related:cyberspace, risk,
- communication and data security architecture
- HasPreferred:common data security architecture,
- IncludedBy:security,
- communication channel
- IncludedBy:channel, communications,
- Includes:internal communication channel,
- Related:information, network,
- communication equipment room
- IncludedBy:communications,
- communication link
- IncludedBy:communications,
- communications
- IncludedBy:network,
- Includes:National Communications System, National Security Telecommunications Advisory Committee, National Security Telecommunications and Information Systems Security Advisory/Information Memorandum, National Security Telecommunications and Information Systems Security Committee, National Security Telecommunications and Information Systems Security Directive, National Security Telecommunications and Information Systems Security Instruction, National Security Telecommunications and Information Systems Security Policy, National Telecommunications and Information Administration, National Telecommunications and Information Systems Security Advisory Memoranda/Instructions, National Telecommunications and Information Systems Security Directive, National Telecommunications and Information Systems Security Instruction, National Telecommunications and Information Systems Security Policy, asynchronous communication, command, control, and communications, command, control, communications and computers, command, control, communications and intelligence, communication channel, communication equipment room, communication link, communications cover, communications deception, communications electronics operating instruction, communications profile, communications protocol, communications security element, data communications, defense communications system, diplomatic telecommunications service, federal telecommunications system, global telecommunications service, government emergency telecommunications service, imitative communications, information and communications, internal communication channel, manipulative communications deception, minimum essential emergency communications network, national telecommunications and information system security directives, personal communications network, private communication technology, protected communications, protected communications zone, secure communications, subcommittee on telecommunications security, telecommunications, telecommunications security, tri-service tactical communications system,
- Related:American National Standards Institute, CCI equipment, COMSEC aid, COMSEC equipment, COMSEC material, COMSEC module, COMSEC monitoring, COMSEC survey, CRYPTO, Clipper chip, Defense Information Infrastructure, Escrowed Encryption Standard, IT resources, ITU-T, Integrated services digital network, National Security Decision Directive 145, OSI architecture, Rivest-Shamir-Adleman algorithm, TEMPEST, access, access control, active wiretapping, alarm surveillance, application, application program interface, approval/accreditation, audit trail, authenticate, availability, bandwidth, between-the-lines-entry, binding, bit error rate, bulk encryption, capability, cell, cellular transmission, channel capacity, circuit switching, client server, closed user group, cold site, command and control, common data security, component, computer fraud, content filtering, control, controlled cryptographic item, covert channel, covert timing channel, cracker, cross-talk, cryptography, cryptology, cybersecurity, cyberspace, deception, delegated development program, dial-up, dial-up line, digital telephony, distributed processing, electronic commerce, electronic data interchange, electronic key management system, electronic security, email, encryption, end-to-end encryption, exercise key, extraction resistance, fault, field device, field site, frequency hopping, front-end processor, full-duplex, gateway, general support system, global information grid, global information infrastructure, help desk, host, inference, information processing standard, information superhighway, information systems security engineering, information technology, information technology system, interface, interference, internet, internet control message protocol, internet protocol, internetwork, intranet, key exchange, key management/exchange, key recovery, line conditioning, line conduction, link, link encryption, local loop, local-area network, major application, message indicator, mission critical, multicast, multilevel security, national information infrastructure, national security system, nations, network architecture, network configuration, network device, network layer security, network management, network management architecture, network management protocol, network weaving, online certificate status protocol, open system interconnection model, operations code, outage, over-the-air key transfer, over-the-air rekeying, overt channel, packet filtering, passive wiretapping, peer-to-peer communication, per-call key, personal firewall, platform, port, privacy system, protocol suite, protocols, public-key infrastructure, reliability, remote access, remote terminal emulation, remote terminal unit, replay attacks, secure hypertext transfer protocol, secure socket layer, security, security controls, security perimeter, session hijack attack, signaling, simple network management protocol, software, spread spectrum, subcommittee on Automated Information System security, subnetwork, superencryption, system, system assets, systems security steering group, systems software, technology area, telecommuting, teleprocessing, traffic analysis, traffic padding, traffic-flow security, transmission security, transport mode vs. tunnel mode, trusted gateway, tunnel, user data protocol, virtual private network, war dialer, wide-area network, wiretapping, worm,
- communications cover
- IncludedBy:communications,
- Related:adversary, information,
- communications deception
- IncludedBy:communications, security,
- Related:adversary, assurance,
- communications electronics operating instruction
- IncludedBy:communications,
- communications intelligence
- IncludedBy:intelligence,
- Related:foreign,
- communications profile
- IncludedBy:communications, file, profile,
- Related:communications security, function, security, system,
- communications protocol
- IncludedBy:communications, protocols,
- Related:computer, information, standard,
- communications security
- IncludedBy:Automated Information System security, security,
- Includes:COMSEC Material Control System, COMSEC Parent Switch, COMSEC Resources Program, COMSEC Subordinate Switch, COMSEC Utility Program, COMSEC account, COMSEC account audit, COMSEC aid, COMSEC boundary, COMSEC chip set, COMSEC control program, COMSEC custodian, COMSEC end-item, COMSEC equipment, COMSEC facility, COMSEC incident, COMSEC insecurity, COMSEC manager, COMSEC material, COMSEC modification, COMSEC module, COMSEC monitoring, COMSEC profile, COMSEC survey, COMSEC system data, COMSEC training, Commercial COMSEC Endorsement Program, Commercial COMSEC Evaluation Program, National COMSEC Advisory Memorandum, National COMSEC Information Memorandum, National COMSEC Instruction, advanced self-protection jammer, alternate COMSEC custodian, anti-jam, anti-jamming, communications security element, crypto-security, emissions security, internet protocol security, meaconing, intrusion, jamming, and interference, network security, network security architecture, network security architecture and design, network security officer, subcommittee on telecommunications security, telecommunications security,
- Related:BLACK, CCI assembly, CCI component, CCI equipment, CRYPTO, FIPS PUB 140-1, Federal Public-key Infrastructure, RED, RED/BLACK separation, Secure Data Exchange, TSEC nomenclature, access control lists, accountability, accounting legend code, accounting number, alert, algorithm, approval/accreditation, assurance, audit trail, authentication, authorized, central office of record, code, communications profile, computer emergency response team, confidentiality, control, cryptographic, cryptography, data transfer device, design controlled spare parts, direct shipment, drop accountability, electronic attack, electronic key management system, electronically generated key, element, encryption algorithm, entity, fill device, fixed COMSEC facility, frequency hopping, incident, information, information security, integrity, key, key distribution center, key management, limited maintenance, local management device/key processor, long title, mandatory modification, network sponsor, optional modification, procedural security, process, protective packaging, repair action, security architecture, security incident, security net control station, short title, supersession, system, systems security steering group, telecommunications, test key, time-compliance date, transmission security, trusted path, two-person integrity, updating, user representative,
- communications security element
- IncludedBy:communications, communications security,
- communications security monitoring
- IncludedBy:security,
- community of interest
- Related:security, users,
- community risk
- IncludedBy:risk,
- Related:vulnerability,
- community string
- Related:passwords, version,
- company
- comparisons
- IncludedBy:biometrics,
- Related:entity, identification, identity, process, verification,
- compartment
- Related:access, access control, classification levels, classified, control, information,
- compartment key
- IncludedBy:key,
- compartmentalization
- Related:access, access control, classified, control, information, security,
- compartmentation
- Related:access,
- compartmented intelligence
- IncludedBy:intelligence,
- Related:access,
- compartmented mode
- Related:access, access control, information, operation, process, security, system, users,
- compelling need
- Related:access,
- compensating security controls
- IncludedBy:control, security,
- Related:countermeasures, information, management, operation, system,
- competition
- Related:object,
- compiled viruses
- IncludedBy:virus,
- Related:code, program, system,
- compiler
- IncludedBy:software development,
- Related:code, computer, object, program, source code,
- completeness
- Related:code, function, requirements, software,
- compliance-based
- Related:IT security, program, security, standard, system,
- component
- IncludedBy:component dependencies, component extensibility, component hierarchy, component operations, component reference monitor, construction of TOE requirements, target of evaluation,
- Includes:assurance component, basic component, development assurance component, evaluation assurance component, functional component, functional unit, network component,
- Related:communications, computer, control, entity, file, function, gateway, identity, message, network, object, operation, profile, security, security testing, software, subject, system, target, telecommunications, test, trust, verification,
- component dependencies
- IncludedBy:Common Criteria for Information Technology Security Evaluation,
- Includes:component,
- Related:assurance, function,
- component extensibility
- IncludedBy:Common Criteria for Information Technology Security Evaluation,
- Includes:component, security target,
- Related:assurance, certification, criteria, function,
- component hierarchy
- IncludedBy:Common Criteria for Information Technology Security Evaluation,
- Includes:component,
- Related:assurance, criteria, function, requirements,
- component operations
- IncludedBy:Common Criteria for Information Technology Security Evaluation, operation,
- Includes:component, security policy, threat,
- Related:application, criteria, policy,
- component reference monitor
- IncludedBy:access control,
- Includes:component, object, subject,
- Related:access, control,
- comprehensive testing
- compromise
- IncludedBy:incident,
- Includes:areas of potential compromise, compromised key list, compromised state, compromising emanation performance requirement, compromising emanations, data compromise, deliberate compromise of classified information, destroyed compromised state, security compromise,
- Related:DNS spoofing, TEMPEST, TEMPEST shielded, TEMPEST test, acknowledged special access program, acquisition systems protection, adversary, application server attack, attack, authorized, benign, classified, clean system, computer, control, control zone, core secrets, cost-risk analysis, counterintelligence assessment, critical, critical program information, critical security parameters, cryptographic, cryptography, emanations security, emissions security, entity, environmental failure protection, environmental failure testing, file integrity checking, flaw hypothesis methodology, forward secrecy, information, insider, intrusion, invalidity date, key, key lifecycle state, leapfrog attack, line supervision, malware, metadata, multilevel device, object, ohnosecond, payment gateway certification authority, policy, privacy, protective technologies, public-key forward secrecy, revocation, revocation date, risk analysis, robustness, rootkit, security, security audit, security environment threat list, security event, security incident, security infraction, security management infrastructure, security violation, suppression measure, suspicious contact, system, tri-homed, trust, trusted recovery, unacknowledged special access program, version, vulnerability, vulnerability assessment, warehouse attack,
- compromised key list
- IncludedBy:compromise, key, multilevel information systems security initiative, public-key infrastructure, threat,
- Related:authorized, certificate, computer, control, identification, subject, system, users,
- compromised state
- IncludedBy:compromise, key lifecycle state,
- Related:cryptographic, key, lifecycle, process,
- compromising emanation performance requirement
- IncludedBy:compromise, emanations security, risk,
- compromising emanations
- IncludedBy:TEMPEST, compromise, emanations security, threat,
- Related:information, intelligence, process, system,
- computer
- Includes:Canadian Trusted Computer Product Evaluation Criteria, Computer Incident Advisory Capability, Computer Security Objects Register, DoD Trusted Computer System Evaluation Criteria, National Computer Security Center, National Computer Security Center glossary, Trusted Computer System Evaluation Criteria, command, control, communications and computers, computer abuse, computer architecture, computer cryptography, computer emergency response team, computer emergency response teams' coordination center, computer forensics, computer fraud, computer incident assessment capability, computer intrusion, computer network, computer network attack, computer network defense, computer network exploitation, computer network operations, computer operations, audit, and security technology, computer oracle and password system, computer related controls, computer related crime, computer security, computer security emergency response team, computer security incident, computer security incident response capability, computer security incident response team, computer security intrusion, computer security object, computer security subsystem, computer security technical vulnerability reporting program, computer-aided software engineering, computer-assisted audit technique, embedded computer, energy-efficient computer equipment, joint task force-computer network defense, laptop computer, national computer security assessment program, organization computer security representative, personal computer, personal computer memory card international association, trusted computer system,
- Related:Abrams, Jojodia, Podell essays, Abstract Syntax Notation One, American National Standards Institute, Automated Information System security, Bell-LaPadula security model, COMSEC control program, Common Criteria for Information Technology Security, Cryptographic Application Program Interface, Defense Information Infrastructure, Estelle, FIPS PUB 140-1, Federal Information Processing Standards, Forum of Incident Response and Security Teams, IP address, IT resources, IT security incident, Integrated services digital network, Internet worm, Open Systems Interconnection Reference model, Orange book, PC card, PCMCIA, PHF, POSIX, Red book, SOCKS, TEMPEST, Terminal Access Controller Access Control System, Trusted Systems Interoperability Group, Yellow book, abort, access control center, access control lists, access port, accessibility, accountability, accreditation, accreditation range, active wiretapping, add-on security, administrative account, algorithm, antivirus software, application, application server attack, application system, approval/accreditation, assurance, attack, attackers, audit software, audit trail, auditing tool, authentication, authentication code, authorization, automated clearing house, automated data processing system, automated information system, automated key distribution, automated logon sequences, availability, backdoor, backup operations, backup procedures, bandwidth, bastion host, bebugging, benchmark, beyond A1, break, browser, brute force attack, buffer overflow, byte, call back, centralized operations, certification, certification authority workstation, certification practice statement, checksum, clean system, client, client server, code, coding, cold site, communications protocol, compiler, component, compromise, compromised key list, confidentiality, configuration control, configuration item, configuration management, console logon, console logs, continuity of services and operations, cracker, cracking, crash, criteria, cyberspace, cyberspace operations, data, data encryption standard, data integrity, data management, data processing, database management system, debug, default account, demilitarized zone, denial-of-service, descriptive top-level specification, dial back, dial-up, dial-up line, dial-up security, digital certificate, digital signature, discrete event simulation, distributed data, distributed database, distributed denial-of-service, distributed processing, domain name service server, dongle, download, dump, dumpster diving, e-mail server, electronic commerce, electronic data interchange, email, emergency response, emergency shutdown controls, end system, end-to-end encryption, end-user, endorsed tools list, error seeding, evaluated products list, executable code, exploitable channel, extensible markup language, extranet, fault, field, file, file infector virus, file security, file transfer, file transfer protocol, firewall, firmware, flaw hypothesis methodology, flooding, formal language, formal proof, formal security policy model, formal specification, formal top-level specification, format, framework, front-end processor, front-end security filter, full disk encryption, functional testing, gateway, gateway server, general controls, general-purpose system, gopher, graphical-user interface, guard, hackers, handshaking procedures, hardening, hardware, help desk, host, host-based firewall, hypertext, identification authentication, imaging system, impersonation, incident, individual accountability, information flow, information security, information system, information technology, information technology system, insider, integrity, interactive mode, interface, internet, internet protocol, internet vs. Internet, interoperability, interoperability standards/protocols, intranet, intrusion, intrusion detection, intrusion detection and prevention, intrusion detection systems, intrusion detection tools, intrusion prevention, key center, key logger, kiosk, language of temporal ordering specification, leakage, legacy systems, link, list-oriented, local-area network, logic bombs, loop, malicious applets, malicious intruder, malicious logic, malware, memory, message authentication code vs. Message Authentication Code, message integrity code, meta-language, microcode, middleware, mirroring, mockingbird, modem, multiuser mode of operation, national information infrastructure, network, network component, network device, network front-end, network services, node, object, on-demand scanning, on-line system, operating system, optical scanner, output, overt channel, packet sniffer, packet switching, passive threat, password cracking, peer-to-peer communication, penetration test, penetration testing, peripheral equipment, persistent cookie, personal digital assistant, personal firewall, personal identity verification, phishing, phracker, piggyback entry, port, portability, pretty good privacy, privilege, privileged access, privileged instructions, privileged process, procedural security, process controller, program, proprietary information, protocol suite, protocols, prototyping, proxy server, public law 100-235, push technology, read-only memory, real-time processing, real-time system, reciprocal agreement, recovery site, reliability, remote access, remote access software, remote terminal emulation, remote terminal unit, requirements, requirements traceability matrix, resource starvation, response time, restart, reusability, reverse engineering, risk, rootkit, router, run, safeguarding statement, scan, screen scraping, script, script bunny, secure configuration management, security architecture, security audit, security evaluation, security event, security incident, security kernel, security label, security policy model, security service, security test and evaluation, security-relevant event, segregation of duties, sensitive information, server, session key, shrink-wrapped software, simple mail transfer protocol, simulation modeling, single sign-on, smartcards, sniffer, social engineering, soft TEMPEST, software, software development methodologies, software product, source code, source data entry, source program, spoofing, spyware detection and removal utility, stand-alone, shared system, stand-alone, single-user system, state variable, stovepipe systems, supervisory control, supervisory control and data acquisition, support software, suspicious event, system, system development lifecycle, system files, system integrity, system lifecycle, system parameter, system security officer, system software, systems software, technical policy, technical vulnerability, telecommuting, teleprocessing, telnet, testability, thrashing, threat, ticket-oriented, tiger team, time bomb, timing attacks, tokens, traceroute, tracking cookie, transaction, transmission control protocol, trapdoor, trojan horse, trust level, trusted computing base, trusted network interpretation, trusted path, trusted platform module chip, trustworthy system, tunnel, type time, unit, upload, user data protocol, user id, user interface, users, utility programs, value-added network, vaulting, vendor, virtual private network, virus, virus-detection tool, vulnerability, war dialer, war driving, web server, website hosting, white-box testing, wireless gateway server, workstation, worm,
- computer abuse
- IncludedBy:automated information system, computer, threat,
- Related:authorized, availability, confidentiality, damage, denial-of-service, fraud, information, integrity, key, malicious, process, resource, theft,
- computer architecture
- IncludedBy:computer, security architecture,
- Includes:object,
- Related:application, process, program, protocols, software, standard, system,
- computer cryptography
- IncludedBy:computer, cryptography,
- Related:algorithm, authentication, encryption, information, process, program, users,
- computer emergency response team
- IncludedBy:computer, response, security,
- Includes:Forum of Incident Response and Security Teams, computer emergency response teams' coordination center,
- Related:Computer Incident Advisory Capability, advisory, attack, availability, communications security, computer security, computer security incident response team, incident, information, integrity, internet, network, owner, system, threat, vulnerability,
- computer emergency response teams' coordination center
- IncludedBy:computer, computer emergency response team, response,
- Related:attack, internet, program, software, system,
- computer forensics
- IncludedBy:computer,
- PreferredFor:forensics,
- Related:integrity,
- computer fraud
- IncludedBy:computer, fraud,
- Related:application, communications, file, operation, program, software, system,
- Computer Incident Advisory Capability
- IncludedBy:advisory, computer, incident,
- Related:computer emergency response team, response,
- computer incident assessment capability
- IncludedBy:assessment, computer, incident,
- computer incident response team
- Related:cyberspace, security,
- computer intrusion
- IncludedBy:attack, computer, incident, intrusion,
- Related:access, access control, authorized, information, system, unauthorized access,
- computer network
- IncludedBy:computer, network,
- Includes:computer network attack, computer network defense, computer network exploitation, computer network operations, joint task force-computer network defense,
- Related:Common Criteria for Information Technology Security, Estelle, authentication, automated key distribution, bandwidth, computer oracle and password system, cyberspace operations, distributed dataprocessing, extranet, firewall, gateway, hackers, host, internet, internet vs. Internet, intranet, language of temporal ordering specification, mirroring, packet switching, protocol suite, remote access, security policy automation network, sniffer, system, transmission control protocol, tunnel, value-added network, vaulting, virtual private network, war driving, wide-area network, wireless gateway server,
- computer network attack
- IncludedBy:attack, computer, computer network, network,
- Related:information, operation,
- computer network defense
- IncludedBy:computer, computer network, network,
- Related:authorized, information, system,
- computer network exploitation
- IncludedBy:computer, computer network, network,
- Related:information, intelligence, system, target,
- computer network operations
- IncludedBy:computer, computer network, network,
- Related:attack,
- computer operations, audit, and security technology
- IncludedBy:audit, computer, operation, technology,
- Related:computer security, function, system,
- computer oracle and password system
- IncludedBy:computer, security software, system,
- Related:computer network, network, passwords, program, software,
- computer related controls
- IncludedBy:computer, control,
- Related:application, availability, confidentiality, integrity, security controls,
- computer related crime
- IncludedBy:computer, threat,
- Related:illegal, technology,
- computer security
- IncludedBy:computer, security,
- Includes:Common Criteria for Information Technology Security, Common Criteria for Information Technology Security Evaluation, Computer Security Objects Register, DoD Information Technology Security Certification and Accreditation Process, European Information Technology Security Evaluation Criteria, Federal Criteria for Information Technology Security, IS security architecture, IT Security Evaluation Criteria, IT Security Evaluation Methodology, IT security certification, IT security policy, IT security product, Information Systems Security products and services catalogue, Information Technology Security Evaluation Criteria, National Computer Security Center, National Computer Security Center glossary, National Security Telecommunications and Information Systems Security Advisory/Information Memorandum, National Security Telecommunications and Information Systems Security Committee, National Security Telecommunications and Information Systems Security Directive, National Security Telecommunications and Information Systems Security Instruction, National Security Telecommunications and Information Systems Security Policy, National Telecommunications and Information Systems Security Advisory Memoranda/Instructions, National Telecommunications and Information Systems Security Directive, National Telecommunications and Information Systems Security Instruction, National Telecommunications and Information Systems Security Policy, Subcommittee on Information Systems Security, certified information systems security professional, computer security emergency response team, computer security incident, computer security incident response capability, computer security incident response team, computer security intrusion, computer security object, computer security subsystem, computer security technical vulnerability reporting program, computing security methods, emissions security, information system security officer, information systems security association, information systems security engineering, information systems security equipment modification, information systems security manager, information systems security officer, multilevel information systems security initiative, national computer security assessment program, national telecommunications and information system security directives, program automated information system security incident support team, subcommittee on Automated Information System security,
- Related:Bell-LaPadula security model, Common Criteria Testing Laboratory, Federal Criteria Vol. I, Federal Information Processing Standards, Forum of Incident Response and Security Teams, National Security Decision Directive 145, National Voluntary Laboratory Accreditation Program, Orange book, Scope of Accreditation, Trusted Computer System Evaluation Criteria, Yellow book, access, access control, accreditation range, approved technologies list, approved test methods list, assurance, audit trail, availability, certification, common criteria, common criteria version 1.0, common criteria version 2.0, computer emergency response team, computer operations, audit, and security technology, confidentiality, conformant validation certificate, control, correctness, covert channel, criteria, dedicated mode, degausser, degausser products list, deliverables list, designated, designated laboratories list, dominates, endorsed tools list, evaluated products list, evaluation, evaluation work plan, function, information, integrity, observation reports, partitioned security mode, party, preferred products list, procedural security, process, protection profile, public law 100-235, residual risk, risk treatment, security architecture, security purpose, security requirements, security target, security-compliant channel, sensitive information, software, subcommittee on telecommunications security, suspicious event, system, system high mode, systems security steering group, tamper, technology area, trusted network interpretation,
- Synonym:Automated Information System security, IT security, information systems security,
- computer security emergency response team
- IncludedBy:computer, computer security, response,
- computer security incident
- IncludedBy:computer, computer security, incident, security incident,
- Related:information, intrusion, system,
- computer security incident response capability
- IncludedBy:computer, computer security, incident, response, security incident,
- computer security incident response team
- IncludedBy:computer, computer security, incident, response, security incident,
- Related:computer emergency response team, information,
- computer security intrusion
- IncludedBy:computer, computer security, intrusion,
- Related:access, access control, authorized, information, penetration, system, unauthorized access,
- computer security object
- IncludedBy:computer, computer security, object,
- Related:security software,
- Computer Security Objects Register
- IncludedBy:National Institute of Standards and Technology, computer, computer security, object,
- Related:algorithm, registration, standard,
- computer security subsystem
- IncludedBy:computer, computer security, system,
- Related:software,
- computer security technical vulnerability reporting program
- IncludedBy:computer, computer security, program, vulnerability,
- Related:information, login, software,
- computer security toolbox
- IncludedBy:security,
- Related:assurance,
- computer-aided software engineering
- IncludedBy:computer, software,
- computer-assisted audit technique
- IncludedBy:audit, computer,
- Related:program, software, test,
- computerized telephone system
- computing environment
- Related:application, system,
- computing security methods
- IncludedBy:computer security,
- Related:assurance, function, network, requirements, software, system, verification,
- COMSEC
- Related:security,
- COMSEC account
- IncludedBy:communications security,
- Related:control, entity,
- COMSEC account audit
- IncludedBy:audit, communications security,
- COMSEC aid
- IncludedBy:communications security,
- Related:communications, key, operation, system, telecommunications,
- COMSEC assembly
- COMSEC boundary
- IncludedBy:boundary, communications security,
- Related:critical, function, key, software,
- COMSEC chip set
- IncludedBy:communications security,
- COMSEC control program
- IncludedBy:communications security, control, program,
- Related:authentication, computer, encryption, function, key, message,
- COMSEC custodian
- IncludedBy:communications security,
- Related:authority,
- COMSEC demilitarization
- Related:classified, process,
- COMSEC element
- COMSEC end-item
- IncludedBy:communications security,
- Related:application,
- COMSEC equipment
- IncludedBy:communications security,
- Related:authentication, authorized, communications, cryptography, information, process, telecommunications, version,
- COMSEC facility
- IncludedBy:communications security,
- Related:authorized,
- COMSEC incident
- IncludedBy:communications security, incident,
- COMSEC insecurity
- IncludedBy:communications security,
- Related:incident, information,
- COMSEC manager
- IncludedBy:communications security,
- Related:resource,
- COMSEC material
- IncludedBy:communications security,
- Related:communications, control systems, cryptographic, cryptography, function, key, software, telecommunications,
- COMSEC Material Control System
- IncludedBy:communications security, control, control systems, system,
- Related:key,
- COMSEC modification
- IncludedBy:communications security, information systems security equipment modification,
- Related:information, system,
- COMSEC module
- IncludedBy:communications security, module,
- Related:communications, function, system, telecommunications,
- COMSEC monitoring
- IncludedBy:communications security,
- Related:communications, telecommunications,
- COMSEC Parent Switch
- IncludedBy:communications security,
- COMSEC profile
- IncludedBy:communications security, file, profile,
- Related:operation, system,
- COMSEC Resources Program
- IncludedBy:communications security, program, resource,
- COMSEC Subordinate Switch
- IncludedBy:communications security,
- COMSEC survey
- IncludedBy:communications security,
- Related:communications, information, operation, system,
- COMSEC system data
- IncludedBy:communications security, system,
- Related:control, information, key,
- COMSEC training
- IncludedBy:communications security,
- COMSEC Utility Program
- IncludedBy:communications security, program,
- concealment
- concealment system
- IncludedBy:system,
- Related:confidentiality, information, security,
- concept of operations
- IncludedBy:operation, security,
- Related:internet, object, process, system,
- concurrency control
- IncludedBy:control,
- Related:users,
- concurrent connections
- IncludedBy:connection,
- Related:flow, test, users,
- confidence
- IncludedBy:assurance, trust,
- Includes:confidence coefficient, confidence interval, confidence level, confidence limits, public confidence,
- Related:IT Security Evaluation Criteria, IT Security Evaluation Methodology, Monitoring of Evaluations, assurance level, assurance profile, audit, authentication, authenticity, checksum, confidentiality, data confidentiality, data integrity, defense, defense-in-depth, infrastructure assurance, interval estimate, national information assurance partnership, policy, profile assurance, quality assurance, reference monitor, reliability, robustness, sampling error, software quality assurance, source integrity, state delta verification system, trusted channel, trusted computing system, trusted path,
- confidence coefficient
- IncludedBy:confidence,
- confidence interval
- IncludedBy:confidence,
- confidence level
- IncludedBy:confidence,
- Related:random,
- confidence limits
- IncludedBy:confidence,
- confidential
- IncludedBy:classification levels,
- Related:authorized, damage, security,
- confidential source
- Related:security,
- confidentiality
- IncludedBy:privacy, security goals,
- Includes:cryptographic algorithm for confidentiality, data confidentiality, data confidentiality service, traffic flow confidentiality,
- Related:Common Criteria for Information Technology Security, Generic Security Service Application Program Interface, Generic Upper Layer Security, IT security, IT security controls, IT security incident, NULL encryption algorithm, Secure Electronic Transaction, access, access control, assurance, asymmetric cryptography, authentication header, authorized, classified, communications security, computer, computer abuse, computer related controls, computer security, concealment system, confidence, data privacy, data security, defense-in-depth, defense-wide information assurance program, digital envelope, encapsulating security payload, encryption algorithm, entry-level certification, flow, hybrid encryption, information, information assurance, information security, internet, internet protocol security, intrusion, key recovery, levels of concern, line managers, mid-level certification, network, object, passive, penetration, post-accreditation phase, privacy enhanced mail, privacy programs, privacy protection, process, property, public-key infrastructure, requirements for procedures and standards, secure shell, secure socket layer, security controls, security event, security objectives, security policy, simple network management protocol, subject, symmetric cryptography, system, top-level certification, transmission security, users, vulnerability, wrap,
- configuration
- IncludedBy:configuration management, target of evaluation,
- Related:function, software, system, target,
- configuration control
- IncludedBy:configuration management, control, target of evaluation,
- Includes:object,
- Related:authorized, computer, establishment, identification, information, integrity, malicious, operation, process, software, system, target,
- configuration control board
- IncludedBy:control,
- Related:development, software,
- configuration identification
- IncludedBy:configuration management, identification,
- Related:function, system,
- configuration item
- IncludedBy:configuration management,
- Related:computer, entity, function, process, program, software,
- configuration management
- IncludedBy:assurance, risk management, software development,
- Includes:baseline management, configuration, configuration control, configuration identification, configuration item, secure configuration management,
- Related:computer, control, function, identify, operation, process, requirements, software, system, test,
- confinement
- Includes:confinement channel, confinement property,
- Related:program, risk,
- confinement channel
- IncludedBy:confinement,
- Related:covert, covert channel, covert timing channel,
- confinement property
- IncludedBy:confinement,
- Related:Bell-LaPadula security model, access, access control, classification levels, classified, object, subject,
- Synonym:*-property,
- conformance
- Related:requirements, standard, test,
- conformance testing
- IncludedBy:security testing, test,
- Related:process,
- conformant validation certificate
- IncludedBy:certificate, validation,
- Related:IT security, authority, computer security, security,
- congruence
- Related:property,
- connection
- IncludedBy:firewall,
- Includes:Open Systems Interconnection Reference model, concurrent connections, connection approval, connection establishment, connection establishment time, connection maintenance, connection overhead, connection teardown, connection teardown time, connectionless data integrity service, interconnection security agreements, network connection, open system interconnection, open system interconnection model, open systems interconnection, platform it interconnection, system interconnection,
- Related:Identification Protocol, Internet Security Association and Key Management Protocol, Internet worm, OSI architecture, SOCKS, SYN flood, Security Protocol 3, Security Protocol 4, Simple Authentication and Security Layer, Terminal Access Controller Access Control System, USENET, application level gateway, application proxy, application-level firewall, asynchronous transfer mode, authentication header, automated logon sequences, banner grabbing, call back, call back security, circuit level gateway, circuit proxy, circuit switching, cold site, connectivity, control, cookies, data origin authentication service, data source, derogatory information, dial back, encapsulating security payload, external system exposure, file, firewall machine, foreign liaison officer, global information infrastructure, handcarrier, information, interface, internet, internet protocol security, internetwork private line interface, local-area network, long-haul telecommunications, malicious code screening, memorandum of understanding, national information infrastructure, network, network address translation, network configuration, network tap, on ramp, personal firewall, piggyback, piggyback attack, piggyback entry, point-to-point tunneling protocol, port, port scanner, port scanning, protective security service, protocols, proxy, proxy server, remote access, remote maintenance, router, rules of behavior, scan, secure shell, secure socket layer, security association, security certificate, security controls, security domain, security parameters index, session key, signaling, stateful packet filtering, stealth probe, stovepipe systems, system security authorization agreement, tinkerbell program, transmission control protocol, trusted identification forwarding, tunneling, unit of transfer, users, war dialing, wireless technology, wiretapping, worm,
- connection approval
- IncludedBy:connection,
- Related:authorization,
- connection establishment
- IncludedBy:connection, establishment,
- Related:identify, protocols, security association, test,
- connection establishment time
- IncludedBy:connection, establishment,
- Related:interface, protocols,
- connection maintenance
- IncludedBy:connection,
- Related:identify, protocols, users,
- connection overhead
- IncludedBy:connection,
- Related:establishment,
- connection teardown
- IncludedBy:connection,
- Related:identify, protocols, test,
- connection teardown time
- IncludedBy:connection,
- Related:interface, protocols,
- connectionless data integrity service
- IncludedBy:connection, integrity,
- Related:security,
- connectivity
- IncludedBy:target of evaluation,
- Related:connection, property,
- consequence
- consequence management
- IncludedBy:risk management,
- consignee
- consignor
- Related:shipper,
- consistency
- IncludedBy:database management system,
- Related:standard, system,
- console
- Related:interface, intrusion, intrusion detection, program, system, users,
- console logon
- IncludedBy:logon,
- Related:access, computer, control, privileged, system, users,
- console logs
- IncludedBy:audit trail,
- Related:computer, control, system,
- constant surveillance service
- Related:security,
- construction
- IncludedBy:target of evaluation,
- Related:process, target,
- construction of TOE requirements
- IncludedBy:requirements, target of evaluation,
- Includes:component, security target,
- Related:object, security,
- construction surveillance technician
- Related:security,
- constructive cost model
- IncludedBy:business process,
- consumers
- Related:policy, requirements, security, system, users,
- contact interface
- IncludedBy:interface,
- Related:flow,
- contactless interface
- IncludedBy:interface,
- Related:flow,
- contactless smart card
- IncludedBy:smartcards,
- Related:information,
- container
- Related:encryption, file, technology,
- contamination
- IncludedBy:fetch protection, file protection, incident, risk,
- Related:classified,
- content filtering
- Related:communications, process, users,
- context-dependent access control
- IncludedBy:access, control,
- continental united states
- contingency key
- IncludedBy:key,
- Related:operation,
- contingency plan
- IncludedBy:contingency planning,
- Includes:back up vs. backup, backup generations, backup operations, backup plan, disaster plan, disaster recovery, disaster recovery plan, emergency plan, recovery procedures, redundancy,
- Related:IT security, backup, business process, critical, failure, management, operation, process, program, recovery, resource, response, risk, security, system, test,
- contingency planning
- IncludedBy:availability,
- Includes:contingency plan,
- Related:backup, control, critical, operation, recovery, resource, response, system,
- continuity of operations
- IncludedBy:availability, operation,
- Related:process,
- continuity of operations plan
- IncludedBy:operation,
- Related:damage, function, management, risk,
- continuity of services and operations
- IncludedBy:operation, risk management,
- Related:business process, computer, control, critical, minimum essential infrastructure, recovery,
- continuous monitoring
- Related:control, development, risk, security,
- continuous operation
- Related:access,
- continuous process
- IncludedBy:process,
- Related:flow, operation,
- continuous process improvement
- IncludedBy:process, quality,
- Related:operation,
- continuous sensitive compartmented information facility operation
- continuous signature service
- IncludedBy:signature,
- contract
- Related:subject,
- contracting officer
- contracting officer representative
- contractor
- Related:security,
- contractor special security officer
- IncludedBy:security,
- Related:information security,
- contractor/command program manager
- contractor/command program security officer
- IncludedBy:security,
- Related:access,
- control
- Includes:COMSEC Material Control System, COMSEC control program, IT security controls, Office of Foreign Assets Control, TSF scope of control, Terminal Access Controller Access Control System, U.S.-controlled facility, U.S.-controlled space, access control, access control center, access control mechanisms, access control officer, access control service, application controls, areas of control, attribute-based access control, automatic key distribution/rekeying control unit, baseline controls, change control and lifecycle management, circuit control officer, cluster controller, command and control, command and control warfare, command, control, and communications, command, control, communications and computers, command, control, communications and intelligence, common control, common control provider, compensating security controls, computer related controls, concurrency control, configuration control, configuration control board, context-dependent access control, control algorithm, control center, control class, control family, control identification list, control information, control loop, control network, control objectives, control objectives for information and related technology, control server, control systems, control zone, controlled access area, controlled access protection, controlled area, controlled cryptographic item, controlled interface, controlled security mode, controlled sharing, controlled space, controlled variable, controller, controlling authority, criteria of control, cryptonet control station, data control language, data flow control, design controlled spare parts, discretionary access control, distributed control system, domain controller, dual control, emergency shutdown controls, entry control, environmentally controlled area, external security controls, failure control, firewall control proxy, foreign owned, controlled or influenced, general controls, global command and control system, hybrid security control, identity based access control, industrial control system, information flow control, information systems audit and control association, information systems audit and control foundation, interface control document, interface control unit, internal control questionnaire, internal security controls, internet control message protocol, key control, logical access control, machine controller, management control processes, management controls, management security controls, mandatory access control, master control switch, media access control address, modification/configuration control board, motion control network, net control station, network access control, non-discretionary access control, nuclear command and control document, operational controls, partition rule base access control, physical access control, physical controls, point of control and observation, policy-based access control, positive control material, procedural controls, process controller, programmable logic controller, quality assurance/control, quality control, questions on controls, redundant control server, risk-adaptable access control, role-based access control, routing control, security control assessment, security control assessor, security control baseline, security control effectiveness, security control enhancements, security control inheritance, security controls, security net control station, single loop controller, statistical process control, supervisory control, supervisory control and data acquisition, system-specific security control, tailored security control baseline, technical controls, technical security controls, transfers outside TSF control, transmission control protocol, transmission control protocol/internet protocol, two-person control, zone of control,
- Related:Automated Information System security, Bell-LaPadula security model, British Standard 7799, C2-protect, CCI assembly, CCI component, CCI equipment, COMSEC account, COMSEC system data, Clark Wilson integrity model, Common Criteria for Information Technology Security, Defense Information Infrastructure, IA product, IT security database, IT security policy, Identification Protocol, International Traffic in Arms Regulations, KMI operating account, MAC algorithm key, PIV issuer, POSIX, RED signal, SSO PIN, TCB subset, TEMPEST, Trusted Computer System Evaluation Criteria, U.S. person, Wassenaar Arrangement, abend, acceptable level of risk, acceptable risk, acceptance procedure, access, access control lists, access mediation, access with limited privileges, accountability, accounting legend code, accounting number, accreditation, accreditation disapproval, accreditation range, acquisition, acquisition strategy, active wiretapping, adequate security, agency, alarm surveillance, allocation, anonymous login, application, application generator, application proxy, approval/accreditation, assessment objective, assurance, attack, audit, audit/review, authentication, authentication protocol, authority, authorization, authorization (to operate), authorize processing, automated information system, automated security monitoring, availability service, backdoor, baseline, baseline configuration, baseline security, block cipher key, body of evidence, bot-network operators, boundary host, boundary protection, boundary protection device, breach, buffer overflow, business impact analysis, centralized authorization, centralized operations, certificate policy, certificate user, certification, certification agent or certifier, certification analyst, certification phase, chain of evidence, challenge-response protocol, chemical warfare, circuit proxy, closed security environment, cloud computing, commodity service, communications, communications security, compartment, compartmentalization, component, component reference monitor, compromise, compromised key list, computer security, configuration management, connection, console logon, console logs, contingency planning, continuity of services and operations, continuous monitoring, cookies, cost/benefit estimate, countermeasures, covert channel, credentials, critical elements, cross domain solution, cryptographic key, cryptographic system review, cryptographic token, cryptosystem review, cyberattack, cyberspace, cycle time, data historian, data management, database management system, decrypt, dedicated mode, dedicated security mode, default file protection, defense-in-depth, developer security, device distribution profile, digital watermarking, distributed database, distributed dataprocessing, disturbance, documentation, domain, domain name system, due care, electronic warfare, electronic warfare support, embedded cryptographic system, embedded system, enclave, encryption, encryption algorithm, entity-wide security, examine, exploitation, extensible, external network, fieldbus, filtering router, firewall, flaw hypothesis methodology, formal security policy model, formulary, full accreditation, general support system, granularity, handler, hardware and system software maintenance, hash token, high assurance guard, hijack attack, host to front-end protocol, human-machine interface, identification and authentication, incident response capability, independent assessment, independent validation authority, information, information assurance product, information category, information management, information owner, information security, information security program plan, information security testing, information sharing environment, information steward, information system, information systems security equipment modification, information technology, inspectable space, intellectual property, intelligent electronic device, interconnection security agreements, interface testing, interference, interim accreditation action plan, internal network, internet, internet protocol, internet protocol security, interview, isolation, kerberos, key, key management, key management infrastructure, key stream, key-escrow system, labeled security protections, lattice model, levels of concern, light tower, line conditioning, line conduction, local-area network, logical access, logical completeness measure, login, malicious logic, manipulated variable, media library, media protection, misappropriation, modes of operation, multi-releasable, national security information, national security system, naval coastal warfare, network, network administrator, network analyzer, network component, network connection, network management, network reference monitor, network security, non-repudiation, noncomputing security methods, object, official information, open security environment, operating system, operations security, optional modification, packet, packet filter, packet filtering, packet switching, pagejacking, password protected, penetration study, perimeter-based security, permissions, personnel security, photo eye, physical and environmental protection, physical security, physically isolated network, point-to-point tunneling protocol, policy, pre-certification phase, pressure regulator, privacy, privileged command, privileged instructions, privileged user, probe, procedural security, proof of possession protocol, protected distribution systems, protected network, protection philosophy, protection-critical portions of the TCB, protocol data unit, protocols, proximity, proxy server, public-key certificate, public-key infrastructure, random number generator, reference monitor, reference monitor concept, remote access, repair action, replay attacks, residual risk, restricted area, risk assessment, risk management, risk mitigation, risk reduction analysis, rule-based security policy, ruleset, safeguarding statement, safety, salt, sandboxed environment, sandboxing, scoping guidance, secure configuration management, secure operating system, secure subsystem, security, security attribute, security audit, security awareness, training, and education, security breach, security certification level, security kernel, security label, security management, security management infrastructure, security perimeter, security plan, security program plan, security safeguards, security service, security test & evaluation, security violation, security-relevant event, segregation of duties, sensitive compartmented information, sensitive information, sensitivity label, servo valve, session hijack attack, set point, short title, signaling, simple network management protocol, software library, software-based fault isolation, special access program, split knowledge, spoofing, stateful packet filtering, superuser, surrogate access, system, system administrator, system and data integrity, system development and acquisition, system interconnection, system of records, system security plan, system software, systems software, tailoring, tamper, technical security policy, technological attack, technology, terminal hijacking, test, thermostat, threat shifting, ticket, token authenticator, token management, tokens, topical areas, trace packet, transmission security, trapdoor, under sea warfare, unprotected network, user PIN, user data protocol, users, usurpation, verification, verification techniques, verifier, virtual private network, vulnerability, vulnerability assessment, wireless device,
- control algorithm
- IncludedBy:algorithm, control,
- control center
- IncludedBy:control,
- Related:process,
- control class
- IncludedBy:control,
- Related:operation, security,
- control family
- IncludedBy:control,
- Related:security,
- control identification list
- IncludedBy:control, identification,
- Related:critical, security,
- control information
- IncludedBy:control, cryptographic module, information,
- Related:cryptographic, module, operation,
- control loop
- IncludedBy:control,
- Related:function, process,
- control network
- IncludedBy:control, network,
- Related:critical, process,
- control objectives
- IncludedBy:control, object, risk management,
- Related:information,
- control objectives for information and related technology
- IncludedBy:control, information, object, technology,
- control server
- IncludedBy:control,
- Related:application, control systems, system,
- control systems
- IncludedBy:control, system,
- Includes:COMSEC Material Control System, Terminal Access Controller Access Control System, distributed control system, global command and control system, supervisory control and data acquisition,
- Related:COMSEC material, acceptance procedure, accounting legend code, control server, controlled variable, cookies, login, machine controller, national security information, physical access control, programmable logic controller, salt, sensitive compartmented information,
- control zone
- IncludedBy:control, security,
- Related:authorized, compromise, information, process,
- controlled access area
- IncludedBy:access, control,
- Related:authorized, cipher, entry control,
- controlled access program coordination office
- IncludedBy:access,
- Related:intelligence,
- controlled access program oversight committee
- IncludedBy:access,
- Related:audit, evaluation, intelligence,
- controlled access programs
- IncludedBy:access,
- Related:intelligence, security clearance,
- controlled access protection
- IncludedBy:access, control,
- Related:assurance, audit, evaluation, function, resource, security, trust, users,
- controlled area
- IncludedBy:control,
- Related:requirements,
- controlled area/compound
- Related:security, subject,
- controlled building
- Related:security, subject,
- controlled cryptographic item
- IncludedBy:control, cryptographic,
- Related:classified, communications, information, requirements, telecommunications,
- controlled information
- Related:foreign, object, target,
- controlled interface
- IncludedBy:control, interface,
- Related:flow, information, security, system,
- controlled security mode
- IncludedBy:control, multilevel security,
- Related:access, access control, accreditation, classification levels, classified, information, operation, policy, requirements, risk, software, system, users, version, vulnerability,
- controlled sharing
- IncludedBy:access control, control,
- Related:access, system,
- controlled space
- IncludedBy:control,
- Related:access, access control, authorized,
- controlled unclassified information
- IncludedBy:classified,
- Related:authorized,
- controlled variable
- IncludedBy:control,
- Related:control systems, system,
- controller
- IncludedBy:control,
- Related:program,
- controlling authority
- IncludedBy:authority, control,
- Related:cryptography, key, operation,
- conversion
- IncludedBy:version,
- Related:software,
- cookies
- IncludedBy:access control,
- Related:access, application, association, attack, connection, control, control systems, denial-of-service, establishment, file, information, internet, internet protocol security, internet security protocol, message, privacy, profile, system, world wide web,
- cooperative key generation
- IncludedBy:key,
- Related:encryption, function, random,
- cooperative program personnel
- Related:foreign,
- cooperative remote rekeying
- IncludedBy:key, rekey,
- coordinated universal time
- Related:GeneralizedTime, UTCTime,
- core or key process
- IncludedBy:key, process,
- Related:business process,
- core secrets
- Related:compromise,
- corporate family
- corporate security policy
- IncludedBy:policy, security policy,
- Related:information, users,
- corporation
- correctness
- IncludedBy:European Information Technology Security Evaluation Criteria, Federal Criteria for Information Technology Security, integrity,
- Includes:correctness integrity, correctness proof,
- Related:analysis, computer security, criteria, evidence, fault, file, function, information, profile, program, property, requirements, security target, software, system, target, technology, users, verification,
- correctness integrity
- IncludedBy:correctness, integrity,
- Related:information,
- correctness proof
- IncludedBy:correctness, security,
- Related:system,
- corroborate
- IncludedBy:validate,
- corruption
- IncludedBy:threat consequence,
- Related:function, operation, system,
- cost reimbursement contract
- IncludedBy:business process,
- cost-risk analysis
- IncludedBy:analysis, business process, risk analysis,
- Related:assessment, compromise, cost/benefit analysis, system,
- cost/benefit
- IncludedBy:analysis, business process,
- Related:cost/benefit analysis, cost/benefit estimate, function, program,
- cost/benefit analysis
- IncludedBy:analysis, business process,
- Related:cost-risk analysis, cost/benefit, countermeasures, operation, process, risk, risk management, vulnerability,
- cost/benefit estimate
- IncludedBy:analysis,
- Related:control, cost/benefit, process,
- COTS software
- IncludedBy:commercial-off-the-shelf, software,
- Related:mass-market software, standard,
- Synonym:commercial off-the-shelf software,
- counter
- Related:process,
- counterintelligence
- IncludedBy:intelligence,
- Related:adversary, countermeasures, foreign, information, security, threat,
- counterintelligence assessment
- IncludedBy:assessment, intelligence,
- Related:analysis, compromise, critical, foreign, risk, target, threat,
- countermeasures
- IncludedBy:risk management, threat,
- Includes:electronic counter-countermeasures, electronic countermeasures, non-technical countermeasure, security countermeasures, technical countermeasures, technical surveillance countermeasures, technical surveillance countermeasures inspection, technical surveillance countermeasures surveys and evaluations,
- Related:acceptable level of risk, adversary, alarm, analysis, anomaly detection, antivirus software, antivirus tools, asset, attack, benign, benign environment, checksum, compensating security controls, control, cost/benefit analysis, counterintelligence, firewall, function, information, information systems security engineering, internet, intrusion detection, intrusion prevention, key, layered solution, level of protection, management controls, object, operation, operational controls, operations security, operations security process, physical security, protective distribution system, protocols, residual risk, risk analysis, risk assessment, robustness, security audit, security controls, security safeguards, security software, security testing, system, system security authorization agreement, technical controls, technology, threat analysis, threat assessment, virus definitions, vulnerability, vulnerability assessment, work factor,
- country code
- IncludedBy:code,
- Related:domain, standard,
- courier
- Related:authorized, classified,
- cover
- Related:adversary,
- cover-coding
- Related:information, risk,
- coverage
- Related:test,
- covert
- Includes:covert channel, covert channel analysis, covert operation, covert storage channel, covert testing, covert timing channel,
- Related:RED team, bandwidth, confinement channel, espionage, exploitable channel, flooding, leakage, malware, overt channel, rootkit, sniffer,
- covert channel
- Antonym:overt channel, security-compliant channel,
- IncludedBy:channel, covert, exploitable channel,
- Includes:covert storage channel, covert timing channel,
- PreferredFor:storage channel, timing channel,
- Related:access, access control, authorization, authorized, communications, computer security, confinement channel, control, entity, exploit, information, insider, policy, process, resource, response, security, system,
- covert channel analysis
- IncludedBy:analysis, covert,
- Related:access, access control, authorized, information, policy, program, security, unauthorized access,
- covert operation
- IncludedBy:covert,
- Related:clandestine operation, identity,
- covert storage channel
- IncludedBy:channel, covert, covert channel,
- Includes:subject,
- Related:process, resource, security,
- covert testing
- IncludedBy:covert, test,
- Related:management,
- covert timing channel
- IncludedBy:channel, covert, covert channel,
- Related:communications, confinement channel, information, policy, process, resource, response, security, system,
- CPU time
- IncludedBy:automated information system,
- Related:process,
- crack
- IncludedBy:threat,
- Includes:crack root, cracker, cracking,
- Related:code, cryptography, passwords, security, system, users,
- crack root
- IncludedBy:crack,
- Related:security, system,
- cracker
- IncludedBy:crack, hackers,
- Related:access, access control, attack, authorization, communications, computer, information, intrusion, malicious, security, system, telecommunications,
- cracking
- IncludedBy:crack,
- Related:computer, system,
- crash
- IncludedBy:threat,
- Related:computer, failure, system,
- credential service provider
- Related:trust,
- credentials
- IncludedBy:certification authority,
- Includes:digital certificate, identity credential, identity credential issuer, ticket,
- Related:access, access control, authentication, authority, authorization, certificate, control, entity, evidence, identity, information, model, object, security testing, standard, system, test,
- credentials service provider
- Related:entity, registration, trust,
- credit check
- Related:security, subject,
- criminal
- IncludedBy:illegal,
- Includes:criminal activity, criminal groups,
- Related:Defense Travel Briefing, attack, dark-side hacker, derogatory information, hybrid threat, hybrid warfare, local agency check, phishing, report of investigation, security environment threat list, threat, vishing,
- criminal activity
- IncludedBy:criminal,
- Related:foreign,
- criminal groups
- IncludedBy:criminal, threat,
- Related:attack, entity, fraud, identity, system, theft,
- crisis management
- IncludedBy:risk management,
- criteria
- Includes:Canadian Trusted Computer Product Evaluation Criteria, Common Criteria Testing Laboratory, Common Criteria Testing Program, Common Criteria for Information Technology Security, Common Criteria for Information Technology Security Evaluation, DoD Trusted Computer System Evaluation Criteria, European Information Technology Security Evaluation Criteria, Federal Criteria Vol. I, Federal Criteria for Information Technology Security, IT Security Evaluation Criteria, Information Technology Security Evaluation Criteria, NIAP Common Criteria Evaluation and Validation Scheme, Trusted Computer System Evaluation Criteria, acceptance criteria, common criteria, common criteria version 1.0, common criteria version 2.0, criteria of control, evaluation criteria,
- Related:British Standard 7799, FIPS approved security method, Federal Standard 1027, IT Security Evaluation Methodology, IT security certification, NIAP Oversight Body, National Computer Security Center, National Voluntary Laboratory Accreditation Program, Orange book, Red book, Scope of Accreditation, Yellow book, acceptance testing, accreditation, accreditation range, assurance, assurance level, audit, authentication, beyond A1, certification, certified TEMPEST technical authority, component extensibility, component hierarchy, component operations, computer, computer security, correctness, descriptive top-level specification, designated, designated laboratories list, designating authority, designation policy, ethernet sniffing, evaluated products list, evaluated system, evaluation, evaluation assurance level, evaluation pass statement, evaluator actions, firewall, information, interpretation, national information assurance partnership, national security system, network component, non-repudiation policy, protection profile, rainbow series, requirements for content and presentation, requirements for evidence, requirements for procedures and standards, risk evaluation, scheme, security, security policy model, security target, sensitive information, target of evaluation, technology, technology area, test case generator, test method, test strategy, testability, trust, trusted functionality, trusted gateway, trusted network interpretation, validated products list, validation report,
- criteria of control
- IncludedBy:control, criteria,
- critical
- IncludedBy:risk,
- Includes:Protected Critical Infrastructure Information (PCII), critical and sensitive information list, critical asset, critical design review, critical elements, critical financial markets, critical information, critical infrastructure information, critical infrastructures, critical mechanism, critical nuclear weapon design information, critical path method, critical program information, critical security parameters, critical system, critical system files, criticality, criticality assessment, criticality level, criticality/sensitivity, mission critical, mission critical system, protection-critical portions of the TCB, safety-critical software, security-critical mechanisms, technology critical,
- Related:COMSEC boundary, Defense Security Service, Suite A, X.509, acceptable level of risk, access, access control, accesses, accreditation disapproval, advanced persistent threats, adversary, adversary collection methodology, alert, anti-tamper, attack, audit, authentication, automated security monitoring, availability, banking and finance, business process reengineering, capability, certificate, certificate policy, certificate validation, class 2, 3, 4, or 5, code amber, code red, compromise, contingency plan, contingency planning, continuity of services and operations, control identification list, control network, counterintelligence assessment, data owner, denial-of-service, destruction, disaster recovery plan, electrical power systems, emergency services, essential secrecy, firewall, function, gas and oil production, storage and transportation, hackers, hot site, incapacitation, information and communications, information security, infrastructure assurance, infrastructure protection, intent, interim accreditation action plan, legacy systems, letter of compelling need, levels of concern, line managers, mandatory access control, national computer security assessment program, national information infrastructure, national security system, natural disaster, network security, non-repudiation service, operations security, operations security indicator, operations security process, partnership, physical protection, physical security, process, protected information, public confidence, public-key infrastructure, reconstitution, remediation, resource, risk analysis, risk assessment, scenario, sector coordinator, sector liaison, security environment threat list, security label, security policy, security strength, semantics, sensitive activities, sensitive position, significant change, single loop controller, single scope background investigation - periodic reinvestigation, special access program, spoofing, system, system retention/backup, terrorists, threat, transportation, users, vulnerability, vulnerability analysis, vulnerability assessment, vulnerability audit, water supply system, world class organizations,
- critical and sensitive information list
- IncludedBy:critical, sensitive information,
- critical asset
- IncludedBy:critical,
- Related:security, vulnerability,
- critical design review
- IncludedBy:critical,
- Related:requirements,
- critical elements
- IncludedBy:critical,
- Related:control, security, system,
- critical financial markets
- IncludedBy:critical,
- Related:foreign, operation,
- critical information
- IncludedBy:critical,
- Related:object,
- critical infrastructure information
- IncludedBy:critical,
- critical infrastructures
- IncludedBy:critical, risk management,
- Includes:banking and finance, code amber, code green, code red, electrical power systems, emergency services, gas and oil production, storage and transportation, information and communications, infrastructure protection, transportation, utility, water supply system,
- Related:capability, cyberspace, destruction, government services, incapacitation, infrastructure assurance, natural disaster, operation, partnership, risk assessment, sector coordinator, sector liaison, system,
- critical mechanism
- IncludedBy:critical, target of evaluation,
- Related:failure, security, target,
- critical nuclear weapon design information
- IncludedBy:critical,
- critical path method
- IncludedBy:critical,
- critical program information
- IncludedBy:critical,
- Related:access, compromise,
- critical security parameters
- IncludedBy:critical, security policy,
- Related:authentication, compromise, cryptographic, cryptography, information, key, module, passwords,
- critical system
- IncludedBy:critical, system,
- Includes:critical system files,
- Related:access, access control, authorized, information, security,
- critical system files
- IncludedBy:critical, critical system, file, system,
- Related:application, damage, integrity, key, security, software,
- criticality
- IncludedBy:critical,
- Related:function, information, system, threat,
- criticality assessment
- IncludedBy:assessment, critical,
- Related:entity, function, operation, resource, risk assessment, security, system,
- criticality level
- IncludedBy:critical,
- criticality/sensitivity
- IncludedBy:critical,
- Related:information, operation, process, system,
- cross domain solution
- IncludedBy:domain,
- Related:access, assurance, control, information, security,
- cross site scripting
- Related:attack, target, vulnerability,
- cross-certificate
- IncludedBy:certificate,
- Related:certification, cross-certification, trust,
- cross-certification
- IncludedBy:certification authority,
- Related:certificate, cross-certificate, key, process, public-key, users, validate,
- cross-domain capabilities
- Related:security,
- cross-talk
- Related:communications,
- cryptanalysis
- IncludedBy:analysis, threat consequence,
- Related:algorithm, attack, cipher, cryptographic, cryptography, encryption, key, key management, message, operation, process, security, system,
- CRYPTO
- Related:classified, communications, communications security, cryptographic, cryptography, identify, information, key, telecommunications,
- crypto officer
- Related:management,
- crypto-alarm
- IncludedBy:cryptography,
- Related:operation,
- crypto-ancillary equipment
- IncludedBy:cryptography,
- Related:cryptographic, function, operation,
- crypto-ignition key
- IncludedBy:key,
- crypto-ignition plug
- IncludedBy:cryptography,
- crypto-security
- IncludedBy:communications security,
- Related:cryptographic system, system,
- cryptographic
- IncludedBy:cryptography,
- Includes:Cryptographic Application Program Interface, Cryptographic Message Syntax, asymmetric cryptographic algorithm, asymmetric cryptographic technique, controlled cryptographic item, cryptographic algorithm, cryptographic algorithm for confidentiality, cryptographic application programming interface, cryptographic boundary, cryptographic card, cryptographic check function, cryptographic check value, cryptographic component, cryptographic device services, cryptographic equipment room, cryptographic functions, cryptographic hash function, cryptographic ignition key, cryptographic initialization, cryptographic key, cryptographic key component, cryptographic key management system, cryptographic logic, cryptographic module, cryptographic module security policy, cryptographic officer, cryptographic randomization, cryptographic service, cryptographic service providers, cryptographic strength, cryptographic synchronization, cryptographic system, cryptographic token, embedded cryptographic system, endorsed cryptographic products list, endorsed for unclassified cryptographic information, endorsed for unclassified cryptographic item, rapid automatic cryptographic equipment, symmetric cryptographic technique,
- Related:CAPSTONE chip, CCI assembly, CCI component, CCI equipment, CKMS, COMSEC material, CRYPTO, Challenge Handshake Authentication Protocol, Clipper chip, Common Criteria for Information Technology Security, Distributed Authentication Security Service, FIPS PUB 140-1, FIPS approved security method, Fortezza, International Traffic in Arms Regulations, MD2, MD4, MD5, PC card, PKCS #11, RED/BLACK separation, RSA algorithm, Rivest-Shamir-Adleman algorithm, S/Key, The Exponential Encryption System, Type 1 key, Type 2 key, Type 4 key, Type 4 product, Type I cryptography, Type II cryptography, Type III cryptography, active state, advanced encryption standard, algorithm, algorithm transition, archive, asymmetric encipherment system, asymmetric signature system, attribute certificate, authentication code, authentication protocol, authorized vendor program, automated key distribution, benign, binding, block chaining, break, certificate domain parameters, challenge-response protocol, check word, checksum, cipher, cipher text auto-key, ciphertext-only attack, class 2, 3, 4, or 5, code, common security, communications security, compromise, compromised state, control information, critical security parameters, cryptanalysis, crypto-ancillary equipment, cryptographic equipment, cryptonet, cryptoperiod, cryptosynchronization, cyclic redundancy check, data authentication code, data encryption key, data encryption standard, data items' representation, data key, deactivated state, decipher, decrypt, digital key, digital signature, digital signature algorithm, domain of interpretation, effective key length, electronic key entry, embedded cryptography, encipher, encipherment, encrypt, encrypted key, encryption, encryption algorithm, encryption certificate, end-to-end encryption, end-to-end security, environmental failure protection, environmental failure testing, escrow, garbled, generation, hardware, hash, hash function, hash value, hashed message authentication code, initialization value, initialization vector, initialize, input data, integrity check, interface, internetwork private line interface, key, key distribution, key entry, key generation, key generator, key length, key lifecycle state, key loader, key management, key management infrastructure, key management/exchange, key output, key owner, key recovery, key space, key updating, key-auto-key, key-encrypting key, key-escrow, keyed hash, keying material, known-plaintext attack, manual cryptosystem, manual key distribution, manual key entry, message authentication code, message authentication code algorithm, message digest, message digest algorithm 5, metadata, mode of operation, non-repudiation, one-time passwords, one-way encryption, one-way function, operations manager, operator, output data, parameters, personal identity verification, personal identity verification card, personal security environment, personalization service, physical protection, plaintext key, port, pretty good privacy, private key, protected channel, public-key, public-key forward secrecy, public-key infrastructure, public-key system, random, recover, rekey, retrieval, revoked state, salt, scheme, secret key, secret-key cryptography, secure hash algorithm, secure hash standard, secure hypertext transfer protocol, security event, security strength, session key, shared secret, signature certificate, signature system, simple network management protocol, split key, split knowledge, status information, strong authentication, symmetric encryption algorithm, symmetric key, tamper, time-stamp token, tokens, transport, trapdoor, trusted path, trusted platform module chip, tunneled password protocol, type 1 products, type 2 product, type 3 key, type 3 product, unforgeable, updating, validate, validate vs. verify, verification key, work factor, zeroize,
- cryptographic alarm
- cryptographic algorithm
- IncludedBy:algorithm, cryptographic,
- Related:authentication, cipher, digital signature, encryption, hash, key, process, signature,
- cryptographic algorithm for confidentiality
- IncludedBy:algorithm, confidentiality, cryptographic,
- Related:information,
- Cryptographic Application Program Interface
- IncludedBy:application, cryptographic, encryption, interface, program, security,
- Related:computer, function, standard,
- cryptographic application programming interface
- IncludedBy:application, cryptographic, interface, program, software,
- Related:access, access control, code,
- cryptographic binding
- cryptographic boundary
- IncludedBy:boundary, cryptographic, cryptographic module,
- Includes:physical protection,
- Related:module, software,
- cryptographic card
- IncludedBy:cryptographic, tokens,
- cryptographic check function
- IncludedBy:cryptographic, function,
- Related:key,
- cryptographic check value
- IncludedBy:cryptographic,
- Related:function, information,
- cryptographic component
- IncludedBy:cryptographic,
- Related:hash, system,
- cryptographic device services
- IncludedBy:cryptographic,
- cryptographic equipment
- IncludedBy:cryptography,
- Related:cryptographic,
- cryptographic equipment room
- IncludedBy:cryptographic,
- Related:access control, cryptographic system,
- cryptographic functions
- IncludedBy:cryptographic, encryption, function, key,
- Related:algorithm, message, random,
- cryptographic hash function
- IncludedBy:cryptographic, function, hash,
- Related:domain, hash function, process,
- cryptographic ignition key
- IncludedBy:cryptographic, key,
- Related:encryption, module, tokens,
- cryptographic initialization
- IncludedBy:cryptographic,
- Related:encryption, function, key,
- cryptographic key
- IncludedBy:cryptographic, key,
- Related:adversary, algorithm, authentication, authorized, cipher, code, control, encipherment, encryption, operation, process, random, requirements, signature, verification,
- cryptographic key component
- IncludedBy:cryptographic, key,
- Related:operation,
- cryptographic key management system
- IncludedBy:cryptographic, key management, system,
- Related:backup, metadata, revocation,
- cryptographic logic
- IncludedBy:cryptographic,
- Related:algorithm, process,
- cryptographic material
- Cryptographic Message Syntax
- IncludedBy:cryptographic, message,
- Related:certificate, digital signature, encryption, hash, key, key management, public-key infrastructure, signature,
- cryptographic module
- IncludedBy:cryptographic, module,
- Includes:control information, cryptographic boundary, cryptographic module security policy, data path, firmware, hardware, input data, microcode, operator, output data,
- Related:algorithm, boundary, establishment, function, key, process, security, software,
- cryptographic module security policy
- IncludedBy:cryptographic, cryptographic module, module, policy, security policy,
- Related:requirements, standard,
- cryptographic net
- cryptographic officer
- IncludedBy:cryptographic, officer,
- Related:authorized, function,
- cryptographic period
- cryptographic product
- Related:software, trust,
- cryptographic randomization
- IncludedBy:cryptographic, random,
- Related:function,
- cryptographic security
- IncludedBy:security,
- cryptographic service
- IncludedBy:common data security architecture, cryptographic,
- Related:encryption, function, hash, key, module, random, software,
- cryptographic service providers
- IncludedBy:common data security architecture, cryptographic,
- cryptographic strength
- IncludedBy:cryptographic,
- Related:operation,
- cryptographic synchronization
- IncludedBy:cryptographic,
- Related:cipher, encipherment, process,
- cryptographic system
- IncludedBy:cryptographic, system,
- Includes:cryptosystem analysis, cryptosystem evaluation, cryptosystem review, cryptosystem survey, elliptic curve cryptosystem, embedded cryptographic system, manual cryptosystem, off-line cryptosystem, on-line cryptosystem, one-time cryptosystem,
- PreferredFor:cryptosystem,
- Related:algorithm, application, assurance, asymmetric cryptographic technique, authentication system, cipher, crypto-security, cryptographic equipment room, digital signature, encryption, encryption strength, hash, key, key management, key stream, message indicator, one-time pad, one-time tape, private key, process, public-key, signature, system indicator, traffic-flow security,
- cryptographic system analysis
- cryptographic system evaluation
- IncludedBy:evaluation,
- cryptographic system review
- Related:control,
- cryptographic system survey
- Related:evaluation, management,
- cryptographic token
- IncludedBy:cryptographic, tokens,
- Related:algorithm, control, function, information, key, key management, module, random, users,
- cryptography
- Includes:FIPS-Validated Cryptography, NSA-approved cryptography, National Cryptologic School, Type I cryptography, Type II cryptography, Type III cryptography, asymmetric cryptography, cipher feedback, computer cryptography, crypto-alarm, crypto-ancillary equipment, crypto-ignition plug, cryptographic, cryptographic equipment, cryptonet control station, cryptosynchronization, elliptic curve cryptography, embedded cryptography, encipherment algorithm, encrypt, manual cryptosystem, minimalist cryptography, private-key cryptography, public-key cryptography, public-key cryptography standards, secret-key cryptography, symmetric cryptography, synchronous crypto-operation,
- Related:BLACK, CAPSTONE chip, CCI assembly, CCI component, CCI equipment, COMSEC equipment, COMSEC material, CRYPTO, Challenge Handshake Authentication Protocol, Clipper chip, Common Criteria for Information Technology Security, Diffie-Hellman, Digital Signature Standard, Distributed Authentication Security Service, El Gamal algorithm, Elliptic Curve Digital Signature Algorithm, FIPS PUB 140-1, FIREFLY, Generic Security Service Application Program Interface, IEEE P1363, International Traffic in Arms Regulations, Internet Security Association and Key Management Protocol, MD2, MD4, MD5, MIME Object Security Services, PC card, RED/BLACK separation, The Exponential Encryption System, access control center, algorithm, attribute certificate, authentication, authentication code, authentication system, authorized, authorized vendor, benign, binding, break, brute force attack, certificate domain parameters, check word, checksum, chosen-plaintext attack, cipher, cleartext, code, code division multiple access, cold start, communications, communications security, compromise, controlling authority, crack, critical security parameters, cryptanalysis, cryptology, cut-and-paste attack, cyclic redundancy check, data driven attack, data items' representation, digital signature, domain of interpretation, emissions security, encipherment, encryption, end entity, end-to-end security, entity, environmental failure protection, environmental failure testing, extraction resistance, feedback buffer, fill device, hash, hash function, hashed message authentication code, hybrid encryption, identity, information, initialize, integrity check, intelligent threat, interface, kerberos, key, key agreement, key center, key distribution center, key management, key pair, key translation center, known-plaintext attack, message, message authentication code, message authentication code algorithm, message authentication code vs. Message Authentication Code, message indicator, modulus, national security system, non-repudiation, one-time pad, one-time passwords, one-time tape, one-way function, operations manager, out-of-band, permuter, personal security environment, personalization service, port, pretty good privacy, primary account number, privacy, private key, public-key, public-key forward secrecy, public-key infrastructure, quadrant, random, rekey, scavenging, seal, secure hash standard, secure socket layer, security, security event, semantic security, shared secret, signature, simple network management protocol, status information, steganography, strong authentication, system indicator, ticket, time-stamp token, token storage key, traffic analysis, traffic padding, traffic-flow security, trapdoor, trusted path, two-person control, unforgeable, updating, user partnership program, validate vs. verify, work factor, wrap, zeroize,
- cryptologic
- cryptologic information system
- cryptology
- Related:analysis, communications, cryptography, intelligence, security,
- cryptonet
- Related:algorithm, cryptographic, key, system,
- cryptonet control station
- IncludedBy:control, cryptography,
- cryptonet key
- IncludedBy:key,
- cryptoperiod
- Related:algorithm, analysis, authorized, certificate, cryptographic, key, process, public-key, public-key infrastructure, rekey, risk, system,
- cryptosynchronization
- IncludedBy:cryptography,
- Related:cryptographic, process,
- cryptosystem
- HasPreferred:cryptographic system,
- cryptosystem analysis
- IncludedBy:analysis, cryptographic system, system,
- Related:process,
- cryptosystem evaluation
- IncludedBy:cryptographic system, evaluation, system,
- Related:process, vulnerability,
- cryptosystem review
- IncludedBy:cryptographic system, system,
- Related:authority, control,
- cryptosystem survey
- IncludedBy:cryptographic system, system,
- Related:evaluation, information,
- cultural assumptions
- Related:function,
- custodian
- Related:classified,
- customer
- HasPreferred:users,
- customer/contractor-supplied software
- IncludedBy:software,
- cut-and-paste attack
- IncludedBy:attack,
- Related:cipher, cryptography, integrity,
- cyber
- HasPreferred:cyberspace,
- cyber crime
- HasPreferred:cybercrime,
- cyber espionage
- IncludedBy:cyberspace, espionage,
- cyber incident
- IncludedBy:cyberspace, incident,
- cyber infrastructure
- IncludedBy:cyberspace,
- cyber security
- HasPreferred:cybersecurity,
- cyber space
- HasPreferred:cyberspace,
- cyber system
- IncludedBy:cyberspace,
- cyberattack
- IncludedBy:attack, cyberspace,
- Related:control, information, software, technology, vulnerability,
- cybercrime
- IncludedBy:cyberspace,
- PreferredFor:cyber crime,
- Related:espionage,
- cybersecurity
- IncludedBy:cyberspace, security,
- PreferredFor:cyber security,
- Related:application, assurance, attack, communications, information, risk, risk management, system, telecommunications, users,
- cyberspace
- IncludedBy:internet,
- Includes:cyber espionage, cyber incident, cyber infrastructure, cyber system, cyberattack, cybercrime, cybersecurity, cyberspace operations,
- PreferredFor:cyber, cyber space,
- Related:US-CERT, advanced persistent threats, blue team, common vulnerabilities and exposures, communications, computer, computer incident response team, control, critical infrastructures, entity-wide security, incident response plan, information, nations, process, risk, system, technology, telecommunications, zero-day exploit,
- cyberspace operations
- IncludedBy:cyberspace,
- Related:computer, computer network, information, object,
- cycle time
- Related:algorithm, control, process,
- cyclic redundancy check
- Related:algorithm, code, cryptographic, cryptography, hash, integrity, protocols,
- cyclical redundancy check
- daemon
- Related:process, system,
- damage
- Includes:damage assessment, damage to physical assets, damage to the national security,
- Related:TOP SECRET, adversary, application data backup/recovery, back up vs. backup, biological warfare, classification levels, computer abuse, confidential, continuity of operations plan, critical system files, directed-energy warfare, disaster recovery plan, disruption, emergency action plan, emergency response, environmentally controlled area, hackers, high impact, impact, infrastructure assurance, insider, joint task force-computer network defense, least privilege, logic bombs, low impact, malicious code, moderate impact, physical security, recover, safety, secret, sensitive information, system safety, technical vulnerability, terrorists, threat, threat assessment, token backup, toluene,
- damage assessment
- IncludedBy:assessment, damage,
- Related:analysis, authorized, classified, security,
- damage to physical assets
- IncludedBy:damage, operational risk loss,
- damage to the national security
- IncludedBy:damage, security,
- Related:authorized, foreign,
- dangling threat
- IncludedBy:threat,
- Related:vulnerability,
- dangling vulnerability
- IncludedBy:vulnerability,
- Related:risk,
- dark-side hacker
- IncludedBy:threat,
- Related:criminal, malicious,
- data
- IncludedBy:automated information system,
- Related:computer, information, process,
- data administration
- IncludedBy:automated information system,
- data aggregation
- IncludedBy:automated information system,
- Related:adversary, classified, information, system,
- data architecture
- IncludedBy:automated information system,
- Related:information, process,
- data asset
- Related:access,
- Data Authentication Algorithm
- IncludedBy:algorithm, authentication,
- Related:cipher, function, hash, key,
- data authentication code
- IncludedBy:National Institute of Standards and Technology, authentication, code, integrity,
- Related:algorithm, cryptographic, function, hash function, key, message, standard,
- Synonym:message authentication code,
- data authentication code vs. Data Authentication Code
- IncludedBy:authentication, code,
- Related:algorithm, hash, key, message, message authentication code, standard,
- data communications
- IncludedBy:communications,
- Related:information, system,
- data compromise
- IncludedBy:compromise, incident,
- Related:access, access control, authorized, information, security, security incident, unauthorized access,
- data confidentiality
- IncludedBy:confidentiality, data privacy,
- Related:authorized, confidence, entity, information, process, property, system,
- data confidentiality service
- IncludedBy:confidentiality,
- Related:authorized, security,
- data contamination
- IncludedBy:automated information system,
- Related:integrity, process,
- data control language
- IncludedBy:automated information system, control,
- data custodian
- Related:information, owner,
- data definition language
- IncludedBy:automated information system,
- data dictionary
- IncludedBy:automated information system,
- Related:application, file, program,
- data diddling
- IncludedBy:attack,
- data driven attack
- IncludedBy:attack,
- Related:code, cryptography, process, software, system, users,
- data element
- data encryption algorithm
- IncludedBy:algorithm, encryption, symmetric cryptography,
- Related:cipher, key, standard,
- data encryption key
- IncludedBy:encryption, key,
- Includes:data key,
- Related:application, cipher, cryptographic, integrity, message, signature,
- data encryption security association type indicator
- IncludedBy:security,
- data encryption standard
- IncludedBy:Federal Information Processing Standards, National Institute of Standards and Technology, encryption, key, standard, symmetric algorithm,
- Includes:initialization vector,
- Related:algorithm, classified, computer, cryptographic, function, information, integrity, message, policy, process, technology,
- data flow control
- IncludedBy:control, flow,
- Related:information,
- data flow diagram
- IncludedBy:automated information system, flow,
- data historian
- Related:analysis, control, process,
- data input
- IncludedBy:automated information system,
- Related:domain, function, key, message, process, signature,
- data integrity
- IncludedBy:data security, integrity,
- Related:authorized, computer, confidence, destruction, entity, information, malicious, process, property, quality, subject, trust,
- data integrity service
- IncludedBy:integrity,
- Related:access, access control, association, authentication, authorized, entity, identity, malicious, security, system, users, verification,
- data items' representation
- Related:cryptographic, cryptography, hash,
- data key
- IncludedBy:data encryption key, key, key recovery,
- Related:authentication, cryptographic, process,
- data loss
- data management
- IncludedBy:automated information system,
- Related:access, access control, computer, control,
- data manipulation language
- IncludedBy:automated information system,
- data origin authentication
- IncludedBy:authentication,
- Related:verification,
- data origin authentication service
- IncludedBy:authentication,
- Related:association, connection, digital signature, entity, identity, integrity, key, public-key, signature, system,
- data owner
- IncludedBy:owner,
- Related:critical,
- data path
- IncludedBy:cryptographic module,
- data privacy
- IncludedBy:data security, privacy,
- Includes:data confidentiality,
- Related:assurance, confidentiality,
- data processing
- IncludedBy:automated information system, process,
- Related:computer, program,
- data reengineering
- IncludedBy:automated information system,
- Related:process, system,
- data security
- IncludedBy:security,
- Includes:data integrity, data privacy,
- Related:authorized, confidentiality, integrity,
- data source
- Includes:users,
- Related:connection, firewall, interface, network,
- data storage
- IncludedBy:automated information system,
- Related:authority, information,
- data string
- Related:function, hash,
- data structure
- IncludedBy:automated information system,
- data synchronization
- Related:automated information system, file, information,
- data transfer device
- Related:communications security, key, program, system,
- data validation
- IncludedBy:automated information system, validation,
- database
- Related:information, process,
- database administration
- IncludedBy:automated information system,
- database management system
- IncludedBy:system,
- Includes:consistency, metadata, transaction, view, view definition,
- Related:Directory Access Protocol, computer, control, function, information, integrity, retrieval, security, software, users,
- database server
- Related:information,
- datagram
- Related:entity, establishment, information, network,
- dc servo drive
- Related:code,
- DD 254 - Final
- Related:authorized, classified, requirements, security,
- DD 254 - Original
- Related:classified, requirements, security,
- deactivated state
- Antonym:active state,
- IncludedBy:key lifecycle state,
- Related:cryptographic, key, lifecycle, process,
- dead bolt
- deadlock
- IncludedBy:threat,
- Related:process,
- Synonym:deadly embrace,
- deadlocking panic hardware
- deadly embrace
- IncludedBy:threat,
- Related:process,
- Synonym:deadlock,
- debilitated
- IncludedBy:risk,
- debriefing
- Related:access,
- debug
- Related:computer, fault, software,
- debugger
- debugging
- IncludedBy:automated information system,
- deception
- IncludedBy:threat consequence,
- Related:adversary, authorized, case officer, communications, denial, entity, evidence, telecommunications,
- decertification
- IncludedBy:certification,
- Related:revocation,
- decibel
- decipher
- IncludedBy:cipher,
- Related:cryptographic, key, system,
- decipherment
- IncludedBy:cipher,
- Related:encipherment,
- decision support systems
- IncludedBy:system,
- declassification
- Related:authorized, classified,
- declassification authority
- Related:classified,
- declassification guide
- Related:security,
- declassification of AIS storage media
- Includes:automated information system, subject,
- Related:security,
- decode
- IncludedBy:code,
- decomposition
- IncludedBy:protection profile,
- Related:file, process, profile,
- decrypt
- Related:algorithm, application, cipher, code, control, cryptographic, encryption, information, key,
- decryption
- Antonym:encryption,
- Related:cipher, encipherment, process,
- dedicated loop encryption device
- IncludedBy:encryption,
- dedicated mode
- Related:access, access control, classified, computer security, control, information, operation, process, program, security, system, users,
- dedicated security mode
- IncludedBy:modes of operation, security,
- Related:accreditation, authorization, classification levels, classified, control, information, operation, policy, process, system, system-high security mode, users,
- default account
- Related:access, access control, computer, login, passwords, system, users,
- default classification
- IncludedBy:classification levels, classified,
- Includes:object,
- Related:process, system,
- default file protection
- IncludedBy:access control, file,
- Related:access, control, owner, system,
- defect
- IncludedBy:risk,
- Related:bug, failure, fault, requirements,
- defense
- Related:confidence, threat,
- defense articles
- Defense Central Index of Investigations
- Related:security,
- Defense Central Security Index
- IncludedBy:security,
- Related:access, authorized, classified,
- defense communications system
- IncludedBy:communications, system,
- defense courier service
- Defense Industrial Security Clearance Office
- IncludedBy:security,
- Defense Information Infrastructure
- IncludedBy:information,
- Related:application, command and control, communications, computer, control, intelligence, network, process, security, system, telecommunications, users,
- Defense Information System Network
- IncludedBy:information, network, system,
- Defense Information Systems Network
- IncludedBy:network,
- Related:classified, requirements, security, users,
- Defense Information Systems Network Designated Approving Authority
- IncludedBy:network,
- Related:intelligence, risk, security,
- defense message system
- IncludedBy:message, system,
- Defense Office of Hearings and Appeals
- Defense Personnel Exchange Program
- Related:foreign,
- Defense Security Service
- IncludedBy:security,
- Related:critical, intelligence,
- Defense Security Service Personnel Investigations Center
- IncludedBy:security,
- Defense Services
- Related:foreign,
- defense switched network
- IncludedBy:network,
- Defense Travel Briefing
- Related:criminal, security, target,
- Defense Treaty Inspection Readiness Program
- Related:security,
- defense-in-breadth
- Related:development, risk,
- defense-in-depth
- IncludedBy:security,
- Related:application, assurance, attack, availability, confidence, confidentiality, control, information, integrity, operation, resource, risk, system, technology,
- defense-wide information assurance program
- IncludedBy:information, information assurance, program,
- Related:authentication, availability, confidentiality, integrity, non-repudiation, resource,
- Defensive Information Operations
- IncludedBy:information, operation,
- Related:access, access control, assurance, exploit, information assurance, intelligence, process, security, system, technology,
- degauss
- IncludedBy:erasure,
- Includes:degaussing,
- Related:application, process,
- degausser
- IncludedBy:National Security Agency, degausser products list,
- Related:computer security, information, system,
- degausser products list
- IncludedBy:Information Systems Security products and services catalogue, National Security Agency, national information assurance partnership,
- Includes:degausser,
- Related:computer security, information, system,
- degaussing
- IncludedBy:degauss,
- degrees of freedom
- Related:random,
- delegated accrediting authority
- IncludedBy:authority,
- delegated development program
- IncludedBy:development, program,
- Related:communications, telecommunications,
- delegation
- IncludedBy:authorization,
- delegation of disclosure authority letter
- Related:authorized, foreign, subject,
- delete access
- IncludedBy:access,
- Related:program,
- deleted file
- deliberate compromise of classified information
- IncludedBy:classified, compromise,
- Related:authorized, object,
- deliberate exposure
- IncludedBy:threat consequence,
- Related:authorized, entity,
- deliverable
- Related:assessment, assurance, file, object, process, profile, security, security target, standard, system, target,
- deliverables list
- IncludedBy:Common Criteria Testing Laboratory, national information assurance partnership, target of evaluation,
- Related:IT security, computer security, security, security target, target,
- delivery
- IncludedBy:target of evaluation,
- Related:process, target,
- delivery authority
- IncludedBy:authority,
- Related:evidence, trust,
- delta CRL
- IncludedBy:public-key infrastructure,
- Related:X.509, certificate, revoked state,
- demand assigned multiple access
- IncludedBy:access,
- demilitarized zone
- IncludedBy:firewall,
- Includes:protected network, unprotected network,
- Related:access, access control, assurance, attack, computer, information, internet, policy, resource, ruleset, security, trust,
- demon dialer
- IncludedBy:attack,
- Related:access, access control, authorized, denial-of-service, malicious, program,
- denial
- Related:deception, denial-of-service,
- denial time
- Related:risk,
- denial-of-service
- IncludedBy:attack, exploit, incident,
- Includes:distributed denial-of-service,
- PreferredFor:interdiction,
- Related:Automated Information System security, ICMP flood, SYN flood, access, access control, application, authorized, availability, availability service, bot-network operators, computer, computer abuse, cookies, critical, demon dialer, denial, function, information systems security, internet, letterbomb, logic bombs, message, operation, ping of death, resource, smurf, spam, system, tamper, users,
- deny by default
- Related:malware, router, security,
- Department of Defense Components
- Department of Defense Information System
- Department of Defense National Agency Check Plus Written Inquiries
- Related:access, security,
- department/agency/organization code
- dependency
- IncludedBy:trusted computing base,
- Related:object, requirements,
- depends
- IncludedBy:trusted computing base,
- depot maintenance
- IncludedBy:full maintenance,
- depth
- derf
- IncludedBy:threat,
- Related:exploit, terminal hijacking,
- derivative classification
- Related:classified,
- derogatory information
- Related:connection, criminal, foreign, security, trust,
- descriptive top-level specification
- IncludedBy:top-level specification,
- Related:computer, criteria, evaluation, information, system, trust,
- design controlled spare parts
- IncludedBy:control,
- Related:communications security,
- designated
- Related:IT security, authorized, computer security, criteria, evaluation, security, validation,
- designated accrediting authority
- IncludedBy:authority,
- Related:risk,
- designated approval authority
- IncludedBy:authority,
- Related:risk, system,
- designated approving authority
- IncludedBy:accreditation, authority, risk,
- Includes:automated information system,
- Related:information, network, operation, system,
- designated approving authority representative
- Related:requirements, security,
- designated disclosure authority
- Related:classified,
- designated intelligence disclosure official
- IncludedBy:intelligence,
- Related:foreign,
- designated laboratories list
- IncludedBy:Common Criteria Testing Laboratory, national information assurance partnership,
- Related:IT security, authorized, computer security, criteria, evaluation, security, validation,
- designating authority
- IncludedBy:Common Criteria Testing Laboratory, authority,
- Related:criteria, evaluation, validation,
- designation policy
- IncludedBy:Common Criteria Testing Laboratory, policy,
- Related:application, criteria, evaluation, process, requirements, security, validation,
- designer
- Related:authority, system,
- destroyed
- HasPreferred:destruction,
- destroyed compromised state
- IncludedBy:compromise, destruction, key lifecycle state,
- Related:key, lifecycle, metadata,
- destroyed state
- IncludedBy:destruction, key lifecycle state,
- Related:key, lifecycle, metadata,
- destroying
- HasPreferred:destruction,
- destruction
- IncludedBy:risk,
- Includes:destroyed compromised state, destroyed state,
- PreferredFor:destroyed, destroying,
- Related:Rivest-Shamir-Adleman algorithm, certificate management, critical, critical infrastructures, data integrity, erasure, garbled, integrity, key lifecycle state, key management, one-time pad, recover,
- detailed design
- IncludedBy:software development, target of evaluation,
- Related:process, target,
- detectable actions
- determination authority
- Related:access, intelligence,
- deterministic
- Related:random,
- deterrence
- Related:accountability, fear, uncertainty, or doubt,
- developer
- IncludedBy:target of evaluation,
- Related:system, target,
- developer security
- IncludedBy:security,
- Related:control,
- development
- Includes:delegated development program, system development lifecycle,
- Related:IT security training, administrative safeguards, advisory, certification test and evaluation, common control provider, configuration control board, continuous monitoring, defense-in-breadth, easter egg, environment, information system lifecycle, information system owner, maintenance hook, major information system, management controls, proprietary information, security engineering, system owner, traditional INFOSEC program, user partnership program,
- development assurance
- IncludedBy:assurance, development process,
- Includes:software development methodologies,
- Related:evidence, operation, process, requirements, test,
- development assurance component
- IncludedBy:assurance, component,
- Related:requirements,
- development assurance package
- IncludedBy:assurance,
- development assurance requirements
- IncludedBy:assurance, requirements,
- Related:evidence, file, process, profile,
- development environment
- IncludedBy:development process, target of evaluation,
- Related:standard, target,
- development process
- IncludedBy:process, software development, target of evaluation,
- Includes:development assurance, development environment, hierarchical decomposition, informal specification, security specifications, top-level specification, validation, verification,
- Related:requirements, software, target,
- deviation
- Related:personnel security exceptions,
- device distribution profile
- Related:access, control, management,
- device registration manager
- Related:management, users,
- diagnostics
- Related:analysis, information,
- dial back
- Related:computer, connection, identify, system,
- dial-up
- Includes:dial-up line, dial-up security,
- Related:communications, computer,
- dial-up capability
- Related:remote logon, standard, system, users,
- dial-up line
- IncludedBy:dial-up,
- Related:communications, computer, internet, system,
- dial-up security
- IncludedBy:dial-up, security,
- Related:computer,
- diameter
- Related:security,
- dictionary attack
- IncludedBy:attack,
- Related:access, access control, authentication, encryption, key, message, password cracker, passwords, software, system, users,
- differential power analysis
- Diffie-Hellman
- IncludedBy:asymmetric algorithm,
- Related:algorithm, attack, authentication, cryptography, encryption, establishment, key, key management, operation, privacy, protocols, public-key,
- diffie-hellman group
- Related:encryption, key,
- digest
- HasPreferred:message digest,
- digital certificate
- IncludedBy:certificate, credentials, key,
- Related:authority, backup, certification, computer, digital signature, entity, identity, object, public-key, security, signature,
- digital certification
- IncludedBy:certification,
- Related:key, public-key,
- digital document
- Related:automated information system, information, object,
- digital envelope
- Related:algorithm, confidentiality, encryption, key, message, public-key,
- digital evidence
- digital forensics
- Related:analysis, application, identification, information, integrity,
- digital id
- IncludedBy:public-key infrastructure,
- Related:authentication, certificate, entity, identification, identity, information, key, public-key,
- digital key
- IncludedBy:key,
- Related:cryptographic,
- digital notary
- Related:digital signature, signature, trust,
- digital signature
- IncludedBy:key, public-key infrastructure, signature,
- Includes:Digital Signature Standard, digital signature algorithm,
- Related:ABA Guidelines, CA certificate, Cryptographic Message Syntax, Distinguished Encoding Rules, El Gamal algorithm, Elliptic Curve Digital Signature Algorithm, Fortezza, IEEE P1363, Internet Security Association and Key Management Protocol, MIME Object Security Services, PKCS #7, Rivest-Shamir-Adleman algorithm, Secure/MIME, The Exponential Encryption System, X.509 attribute certificate, X.509 certificate revocation list, X.509 public-key certificate, algorithm, archive, asymmetric cryptography, attribute certificate, authentic signature, authenticate, authentication, backup, bind, brand CRL identifier, certificate, certificate validation, certification path, computer, cryptographic, cryptographic algorithm, cryptographic system, cryptography, data origin authentication service, digital certificate, digital notary, digitized signature, dual signature, electronic signature, elliptic curve cryptography, encryption, encryption certificate, end entity, entity, file, function, hash, identity, information, integrity, invalidity date, key pair, merchant certificate, message, network, no prior relationship, non-repudiation, object, operation, personality label, pre-signature, pretty good privacy, private signature key, process, program, public-key, public-key certificate, revocation date, seal, security mechanism, sign, signature certificate, signature equation, signature function, signature key, signature process, signature system, signer, symmetric cryptography, system, triple DES, unforgeable, valid signature, validate vs. verify, verification,
- digital signature algorithm
- IncludedBy:Digital Signature Standard, algorithm, digital signature, signature,
- Related:cryptographic, entity, hash, identity, integrity, key, message, public-key, secure hash algorithm, standard,
- Digital Signature Standard
- IncludedBy:Federal Information Processing Standards, National Institute of Standards and Technology, digital signature, signature, standard,
- Includes:Elliptic Curve Digital Signature Algorithm, digital signature algorithm,
- Related:algorithm, cryptography, information, process, technology,
- digital subscriber voice terminal
- digital telephony
- Related:communications, system, technology,
- digital watermarking
- PreferredFor:watermarking,
- Related:control, function, integrity, owner, property,
- digitized signature
- IncludedBy:signature,
- Related:digital signature,
- digraph and/or trigraph
- diplomatic telecommunications service
- IncludedBy:communications, telecommunications,
- Related:network,
- direct access storage device
- IncludedBy:access,
- Related:automated information system,
- direct data feed
- Related:information, process,
- direct memory access
- IncludedBy:access, automated information system,
- direct shipment
- Related:communications security, users,
- directed-energy warfare
- IncludedBy:warfare,
- Related:damage,
- direction finding
- directive
- directly trusted CA
- IncludedBy:public-key infrastructure, trust,
- Related:application, entity, key, public-key,
- directly trusted CA key
- IncludedBy:key, public-key infrastructure, trust,
- Related:certificate, entity, public-key,
- Director Central Intelligence Directive
- IncludedBy:intelligence,
- Director of Central Intelligence Directive
- IncludedBy:intelligence,
- directory
- HasPreferred:directory vs. Directory,
- Directory Access Protocol
- IncludedBy:access, protocols,
- Related:database management system, system, users,
- directory information base
- IncludedBy:information,
- directory service
- Related:access, access control, certificate, information, object, public-key infrastructure,
- directory user agent
- IncludedBy:users,
- directory vs. Directory
- PreferredFor:directory,
- Related:certificate, entity, information, public-key infrastructure, system,
- disaster plan
- IncludedBy:contingency plan,
- Related:authorized, threat,
- disaster recovery
- IncludedBy:contingency plan, recovery, risk management,
- Includes:cold site, hot site,
- Related:file, operation, process, reconstitution, users,
- disaster recovery plan
- IncludedBy:contingency plan, recovery,
- Related:application, critical, damage, management, operation, process, risk, risk management, software, system,
- disclosure
- Related:release,
- disclosure of information
- IncludedBy:information,
- Related:access, access control, authorized,
- disclosure record
- Related:access,
- disconnection
- Related:attack,
- discrete event simulation
- Related:computer, model, system,
- discrete process
- IncludedBy:process,
- Related:entity, identity,
- discretionary access control
- Antonym:non-discretionary access control,
- IncludedBy:access, control,
- Includes:surrogate access,
- Related:authorization, authorized, entity, file, identity, object, owner, policy, privileged, process, resource, security, subject, system, users,
- disinfecting
- Related:file, malware, security,
- disk imaging
- diskette
- Related:access,
- dispersion
- Related:standard,
- disposition
- disruption
- IncludedBy:threat consequence,
- Related:damage, function, operation, system,
- dissemination
- Related:intelligence,
- Distinguished Encoding Rules
- IncludedBy:Abstract Syntax Notation One, Basic Encoding Rules,
- Related:application, certificate, code, digital signature, signature,
- distinguished name
- IncludedBy:public-key infrastructure,
- Includes:subordinate distinguished name,
- Related:X.509, certificate, entity, identify, identity, information, key, object, public-key, subject,
- distinguishing identifier
- Related:authentication, entity, information, non-repudiation, process,
- Distributed Authentication Security Service
- IncludedBy:authentication, internet, security protocol,
- Related:cryptographic, cryptography, protocols,
- distributed computing environment
- IncludedBy:ACL-based authorization, Generic Security Service Application Program Interface,
- Includes:kerberos,
- Related:application, audit, authentication, interface, system,
- distributed control system
- IncludedBy:control, control systems, system,
- Related:intelligence, process,
- distributed data
- Related:computer, network,
- distributed database
- Related:computer, control, network, process, system,
- distributed dataprocessing
- IncludedBy:automated information system, process,
- Related:computer network, control, function,
- distributed denial-of-service
- IncludedBy:denial-of-service, exploit,
- Related:computer, system, worm,
- distributed plant
- Related:access, internet,
- distributed processing
- IncludedBy:automated information system, process,
- Related:communications, computer, network, operation, system,
- distribution point
- IncludedBy:public-key infrastructure,
- Related:X.509, authority, certificate, information, key, public-key, revocation, revoked state,
- disturbance
- Related:control, system,
- DNS spoofing
- IncludedBy:domain name system, masquerade, spoof, spoofing,
- Related:compromise, domain, system,
- document
- documentary information
- documentation
- IncludedBy:target of evaluation,
- Related:application, control, information, operation, security, software, system, target, users,
- DoD Information Technology Security Certification and Accreditation Process
- IncludedBy:accreditation, computer security, information, process, requirements, technology,
- Related:identify, information security, standard, system,
- DoD Trusted Computer System Evaluation Criteria
- IncludedBy:computer, criteria, evaluation, system, trust,
- domain
- IncludedBy:multilevel information systems security initiative, object, subject,
- Includes:RA domains, certificate domain, certificate domain parameters, cross domain solution, domain controller, domain modulus, domain name, domain name service server, domain name system, domain of interpretation, domain parameter, domain verification exponent, public domain software, security domain, subset-domain,
- Related:DNS spoofing, Internet Corporation for Assigned Names and Numbers, access, access control, access with limited privileges, boundary value analysis, boundary value testing, certificate, control, country code, cryptographic hash function, data input, executive state, firewall, hash function, hash token, identification data, identity, internet, metadata, model, one-way function, packet filtering, pharming, policy, policy creation authority, policy mapping, program, public-key certificate, public-key derivation function, public-key infrastructure, realm, registration, resource, revoked state, security, security authority, security perimeter, security policy information file, signature function, signature process, system, transport, trust relationship, uniform resource locator, users, validate, verification process,
- domain controller
- IncludedBy:control, domain,
- Related:identification, information, passwords,
- domain modulus
- IncludedBy:domain,
- Related:trust,
- domain name
- IncludedBy:domain, domain name system,
- Related:code, internet, resource, system,
- domain name service server
- IncludedBy:domain, internet,
- Related:computer, protocols,
- domain name system
- IncludedBy:domain, internet, system,
- Includes:DNS spoofing, domain name,
- Related:access, access control, authentication, control, information, integrity, key, operation, program, protocols, public-key, resource, response, software, users,
- domain of interpretation
- IncludedBy:domain,
- Related:algorithm, cryptographic, cryptography, information, internet protocol security, internet security protocol, security,
- domain parameter
- IncludedBy:domain,
- Related:access, access control, function, hash, message, policy, security, tokens,
- domain verification exponent
- IncludedBy:domain, verification,
- dominated by
- Antonym:dominates,
- Includes:object,
- Related:access, access control, classification levels, classified, integrity, policy, security, trust,
- dominates
- Antonym:dominated by,
- Related:classification levels, classified, computer security, security,
- dongle
- IncludedBy:tokens,
- Related:authentication, computer, information, key, program, software,
- downgrade
- IncludedBy:requirements, security,
- Related:authorized, classification levels, classified, file, information, network,
- downgrading
- Related:classified,
- download
- Related:computer, file, process,
- draft RFC
- IncludedBy:Request for Comment,
- drop accountability
- Related:communications security,
- Drug Enforcement Agency
- dual citizen
- Related:United States citizen,
- dual control
- IncludedBy:control, security,
- Related:access, access control, entity, function, information, process, resource, system,
- dual driver service
- dual signature
- IncludedBy:Secure Electronic Transaction, signature,
- Related:digital signature, encryption, hash, integrity, key, message, operation, verification,
- dual technology
- Related:intrusion,
- dual-homed gateway firewall
- IncludedBy:firewall, gateway,
- Related:application, interface, internet, network,
- dual-use certificate
- due care
- Related:control, information, information security, security, system,
- dump
- Related:computer, failure,
- dumpster diving
- IncludedBy:threat,
- PreferredFor:trashing,
- Related:computer, identity theft, information,
- duplicate digital evidence
- duration
- dynamic analysis
- IncludedBy:analysis,
- Related:code, process, program, system, testing,
- dynamic binding
- IncludedBy:backup,
- Related:association, message, object,
- dynamic subsystem
- e-banking
- IncludedBy:internet,
- e-government
- e-mail server
- IncludedBy:internet,
- Related:computer,
- ease of use
- IncludedBy:target of evaluation,
- Related:assessment, target, users,
- easter egg
- Related:development, threat,
- eavesdropping
- IncludedBy:attack,
- Related:adversary, authorization, authorized, emanation, emanations security, information, message, shoulder surfing,
- eavesdropping attack
- IncludedBy:attack,
- Related:authentication, information, protocols,
- economic intelligence
- IncludedBy:intelligence,
- economy of mechanism
- IncludedBy:security,
- Related:operation, policy, system,
- EE
- Related:encryption, entity, escrow, standard,
- effective key length
- IncludedBy:encryption, key,
- Related:algorithm, cryptographic,
- effectiveness
- IncludedBy:assurance,
- Related:file, function, operation, profile, property, requirements, risk, security target, target, threat,
- egress filtering
- Related:internet, process, protocols, security,
- egress point
- Related:authorized,
- El Gamal algorithm
- IncludedBy:algorithm,
- Related:cipher, code, cryptography, digital signature, encryption, signature,
- elapsed time
- electrical power systems
- IncludedBy:critical infrastructures, system,
- Related:critical, function, users,
- electromagnetic compatibility
- Related:response, system,
- electromagnetic emanations
- IncludedBy:emanation, emanations security,
- electromagnetic interference
- IncludedBy:risk,
- Related:system,
- electronic attack
- IncludedBy:attack,
- Related:communications security, jamming,
- electronic authentication
- IncludedBy:authentication,
- Related:information, process, system, users,
- electronic benefit transfer
- Related:network,
- electronic business (e-business)
- electronic codebook
- IncludedBy:code,
- electronic commerce
- IncludedBy:Secure Electronic Transaction,
- Related:communications, computer, electronic data interchange, email, function, information, internet, technology,
- electronic counter-countermeasures
- IncludedBy:countermeasures,
- electronic countermeasures
- IncludedBy:countermeasures,
- electronic credentials
- Related:authentication, entity, identity,
- electronic data interchange
- Related:communications, computer, electronic commerce, standard, value-added network,
- electronic document management system
- IncludedBy:system,
- electronic evidence
- electronic fill device
- electronic funds transfer system
- IncludedBy:system,
- electronic generation, accounting, and distribution system
- IncludedBy:system,
- electronic intelligence
- IncludedBy:intelligence,
- Related:foreign,
- electronic key entry
- IncludedBy:key management,
- Related:cryptographic, module, users,
- electronic key management system
- IncludedBy:key management, system,
- Related:communications, communications security,
- electronic messaging services
- Related:function, internet, management, quality, requirements,
- electronic personnel security questionnaire
- IncludedBy:security,
- electronic protection
- Related:assurance,
- electronic questionnaire for investigative processing
- Related:security,
- electronic security
- IncludedBy:security,
- Related:analysis, authorized, communications, information,
- electronic signature
- IncludedBy:signature,
- Related:digital signature, information, message,
- electronic surveillance
- Related:Foreign Intelligence Surveillance Act,
- electronic transmission
- electronic warfare
- IncludedBy:warfare,
- Includes:electronic warfare support,
- Related:attack, control,
- electronic warfare support
- IncludedBy:electronic warfare, warfare,
- Related:control, identify, information, intelligence, operation, target, threat,
- electronically generated key
- IncludedBy:key,
- Related:algorithm, communications security, software,
- element
- Related:communications security, security,
- eligibility
- Related:access, security,
- elliptic curve cryptography
- IncludedBy:cryptography,
- Related:algorithm, analysis, attack, digital signature, key, signature,
- elliptic curve cryptosystem
- IncludedBy:asymmetric algorithm, cryptographic system, system,
- Related:encryption, key, public-key,
- Elliptic Curve Digital Signature Algorithm
- IncludedBy:Digital Signature Standard, algorithm, signature,
- Related:cryptography, digital signature, standard,
- email
- IncludedBy:internet,
- Includes:email packages, email security software, letterbomb, mailbomb, multipurpose internet mail extensions, privacy enhanced mail, secure multipurpose internet mail extensions, spam,
- Related:SET qualifier, Secure Data Network System, X.400, application, bounce, communications, computer, electronic commerce, gateway, message, message authentication code vs. Message Authentication Code, message handling system, message integrity code, pretty good privacy, simple mail transfer protocol, system,
- email packages
- IncludedBy:email,
- Includes:email security software,
- Related:encryption, function, interface, signature, users,
- email security software
- IncludedBy:email, email packages, security software, software,
- Includes:pretty good privacy,
- Related:encryption, message, network, signature, users,
- emanation
- IncludedBy:TEMPEST, emanations security, threat,
- Includes:electromagnetic emanations, emanations analysis,
- Related:Common Criteria for Information Technology Security, Federal Standard 1027, TEMPEST test, eavesdropping, implant, information, intelligence, operation, procedural security, process, security architecture, suppression measure, system,
- Synonym:RED signal,
- emanations analysis
- IncludedBy:analysis, emanation, threat consequence,
- Related:system,
- emanations security
- IncludedBy:TEMPEST,
- Includes:compromising emanation performance requirement, compromising emanations, electromagnetic emanations, emanation, undesired signal data emanations,
- Related:Common Criteria for Information Technology Security, Federal Standard 1027, TEMPEST test, analysis, application, authorized, compromise, eavesdropping, implant, information, procedural security, security architecture, suppression measure, system, technology,
- Synonym:emissions security,
- embedded computer
- IncludedBy:computer,
- Related:system,
- embedded cryptographic system
- IncludedBy:cryptographic, cryptographic system, system,
- Related:control, function,
- embedded cryptography
- IncludedBy:cryptography,
- Related:cryptographic, function, system,
- embedded system
- IncludedBy:system,
- Related:control, function,
- emergency action message
- IncludedBy:message,
- emergency action plan
- Related:attack, damage, intelligence,
- emergency plan
- IncludedBy:contingency plan,
- Related:threat,
- emergency response
- IncludedBy:response,
- Related:computer, damage, operation, property, threat,
- emergency response time
- IncludedBy:response,
- emergency services
- IncludedBy:critical infrastructures,
- Related:critical, function, recovery, response, system,
- emergency shutdown controls
- IncludedBy:control, risk management,
- Related:IT security, computer, system, vulnerability,
- emission security
- IncludedBy:security,
- Related:analysis, authorized,
- emissions security
- IncludedBy:Automated Information System security, TEMPEST, communications security, computer security,
- Related:RED signal, analysis, authorized, compromise, cryptography, information, system, telecommunications,
- Synonym:emanations security,
- employee
- employment practices and workplace safety
- IncludedBy:operational risk loss,
- empty position
- encapsulating security payload
- IncludedBy:internet protocol security, security protocol,
- Related:association, authentication, confidentiality, connection, flow, gateway, integrity, internet, internet security protocol, message, protocols, tunnel,
- encapsulating security payload protocol
- IncludedBy:protocols, security,
- Related:encryption, integrity, internet protocol security, internet security protocol,
- encapsulation
- Related:access, access control, object, program, protocols, resource, users,
- encipher
- IncludedBy:cipher, encryption,
- Related:cryptographic, system,
- encipherment
- IncludedBy:cipher, encryption,
- Includes:asymmetric encipherment system, encipherment algorithm, public encipherment key, public encipherment transformation, symmetric encipherment algorithm,
- Related:algorithm, asymmetric cipher, asymmetric cryptographic technique, asymmetric encryption algorithm, block chaining, ciphertext, cryptographic, cryptographic key, cryptographic synchronization, cryptography, decipherment, decryption, encryption algorithm, feedback buffer, information, initializing value, key, private decipherment transformation, private key, public-key, public-key certificate,
- encipherment algorithm
- IncludedBy:algorithm, cipher, cryptography, encipherment,
- Related:encryption,
- enclave
- Related:assurance, authority, control, policy, security,
- enclave boundary
- IncludedBy:boundary,
- encode
- IncludedBy:code, encryption,
- Related:cipher, information, system,
- encrypt
- encrypt
- IncludedBy:cipher, cryptography, encryption,
- Related:algorithm, code, cryptographic,
- encrypt for transmission only
- Related:encryption, network,
- encrypted key
- IncludedBy:cipher, key, key recovery,
- PreferredFor:ciphertext key,
- Related:cryptographic, passwords, security,
- encrypted network
- IncludedBy:network,
- encryption
- Antonym:cleartext, decryption,
- IncludedBy:Secure Electronic Transaction, privacy enhanced mail,
- Includes:Cryptographic Application Program Interface, Escrowed Encryption Standard, International Data Encryption Algorithm, NULL encryption algorithm, The Exponential Encryption System, advanced encryption standard, asymmetric cryptographic algorithm, asymmetric encryption algorithm, bulk encryption, cipher, cryptographic functions, data encryption algorithm, data encryption key, data encryption standard, dedicated loop encryption device, effective key length, encipher, encipherment, encode, encrypt, encryption algorithm, encryption certificate, encryption software, encryption strength, encryption tools, end-to-end encryption, endorsed data encryption standard products list, file encryption, full disk encryption, hybrid encryption, key-encryption-key, link encryption, low-cost encryption/authentication device, one-way encryption, pretty good privacy, secure multipurpose internet mail extensions, superencryption, symmetric algorithm, symmetric encryption algorithm, tactical trunk encryption device, tamper, traffic encryption key, trunk encryption device,
- Related:CAST, COMSEC control program, Clipper chip, Cryptographic Message Syntax, Diffie-Hellman, EE, El Gamal algorithm, Federal Standard 1027, Fortezza, IEEE P1363, IP splicing/hijacking, Internet Security Association and Key Management Protocol, Law Enforcement Access Field, MIME Object Security Services, Network Layer Security Protocol, Rivest Cipher 2, Rivest Cipher 4, Rivest-Shamir-Adleman algorithm, SET private extension, SOCKS, Secure/MIME, Simple Key-management for Internet Protocols, Skipjack, Terminal Access Controller Access Control System, Transport Layer Security Protocol, algorithm, application, application controls, asymmetric algorithm, asymmetric cryptography, asymmetric encipherment system, asymmetric keys, authentication code, authorized, baggage, block cipher, break, cardholder certificate, certificate revocation list, ciphertext, code, code book, common data security architecture, communications, computer cryptography, container, control, cooperative key generation, cryptanalysis, cryptographic, cryptographic algorithm, cryptographic ignition key, cryptographic initialization, cryptographic key, cryptographic service, cryptographic system, cryptography, decrypt, dictionary attack, diffie-hellman group, digital envelope, digital signature, dual signature, elliptic curve cryptosystem, email packages, email security software, encapsulating security payload protocol, encipherment algorithm, encrypt for transmission only, in the clear, indistinguishability, information, information systems security, information systems security equipment modification, initialization vector, initialize, intelligent threat, internet protocol security, key, key agreement, key center, key distribution center, key generator, key logger, key pair, key recovery, key translation center, key transport, key-encrypting key, key-escrow system, keyed hash, keys used to encrypt and decrypt files, merchant certificate, message authentication code vs. Message Authentication Code, message integrity code, mode of operation, off-line cryptosystem, on-line cryptosystem, one-time pad, operation, over-the-air key transfer, over-the-air rekeying, password system, per-call key, personality label, privacy programs, privacy system, process, protected communications, protected distribution systems, protection suite, public-key cryptography, public-key forward secrecy, salt, secret-key cryptography, secure shell, secure socket layer, security, security management infrastructure, security mechanism, security strength, semantic security, session key, signature certificate, standard, start-up KEK, stream cipher, symmetric cryptographic technique, symmetric cryptography, symmetric key, system, system indicator, threat consequence, tokens, traffic analysis, triple DES, tunnel, unencrypted, version, virtual private network, wrap,
- encryption algorithm
- IncludedBy:algorithm, encryption,
- Related:cipher, communications security, confidentiality, control, cryptographic, encipherment, key, process, version,
- encryption certificate
- IncludedBy:certificate, encryption,
- Related:X.509, cryptographic, digital signature, function, key, public-key, signature,
- encryption software
- IncludedBy:encryption, software,
- Related:file, function, message, users,
- encryption strength
- IncludedBy:encryption, quality of protection,
- PreferredFor:strength of encryption,
- Related:algorithm, cryptographic system, key, system,
- encryption tools
- IncludedBy:encryption, security software,
- end cryptographic unit
- Related:management, security,
- end entity
- IncludedBy:entity,
- Related:X.509, application, certificate, cryptography, digital signature, key, policy, public-key, public-key infrastructure, role, signature, subject, system,
- end system
- IncludedBy:system,
- Related:computer, internet, network, protocols,
- end-item accounting
- end-to-end encryption
- IncludedBy:encryption,
- Related:communications, computer, cryptographic, flow, information, network, router, system, telecommunications,
- end-to-end security
- IncludedBy:security,
- Related:cryptographic, cryptography, information, system,
- end-user
- IncludedBy:target of evaluation, users,
- Related:application, computer, entity, network, operation, public-key infrastructure, resource, system, target,
- end-user computing
- IncludedBy:users,
- endorsed cryptographic products list
- IncludedBy:cryptographic,
- endorsed data encryption standard products list
- IncludedBy:encryption, standard,
- endorsed for unclassified cryptographic information
- IncludedBy:classified, cryptographic, information,
- endorsed for unclassified cryptographic item
- IncludedBy:classified, cryptographic,
- Related:information,
- Endorsed TEMPEST Products List
- IncludedBy:TEMPEST,
- endorsed tools list
- IncludedBy:Information Systems Security products and services catalogue, formal verification, national information assurance partnership,
- Related:computer, computer security, system, trust, verification,
- endorsement
- Related:information, security,
- energy-efficient computer equipment
- IncludedBy:computer,
- Related:model, users,
- enforcement vector
- Engineering
- Related:requirements, security,
- engineering development model
- enhanced hierarchical development methodology
- IncludedBy:software development methodologies,
- Related:program, security,
- enrollment manager
- Related:management,
- enrollment service
- Related:certificate, entity, process,
- ensure
- Related:IT security, assure, program, security,
- enterprise
- Related:management, operation, process, risk, security,
- enterprise architecture
- Related:security,
- enterprise resource planning
- IncludedBy:resource,
- enterprise risk management
- IncludedBy:management, risk,
- Related:threat, trust,
- enterprise service
- Related:users,
- entity
- Includes:application entity, end entity, entity authentication, entity authentication of A to B, entity-wide security, external it entity, federated identity, identity, identity based access control, identity credential, identity credential issuer, identity management systems, identity proofing, identity theft, identity token, identity validation, identity verification, identity-based security policy, mutual entity authentication, peer entity authentication, peer entity authentication service, personal identity verification, personal identity verification card, redundant identity, system entity,
- Related:COMSEC account, Challenge Handshake Authentication Protocol, EE, Identification Protocol, Internet Corporation for Assigned Names and Numbers, MISSI user, OAKLEY, PIV issuer, PIV registrar, PKCS #10, X.509, X.509 public-key certificate, acceptance criteria, access control service, account aggregation, account fraud, accountability, accreditation authority, accreditation multiplicity parameter, adversary, alias, anonymous, applicant, applicant assertion, assurance, asymmetric cryptographic technique, attack, attribute, attribute authority, authenticate, authentication, authentication data, authentication exchange, authentication information, authentication protocol, authentication service, authenticator, authenticity, authority, authorization, authorized, availability, binding, biometric measurement, biometric system, biometrics, brand, capability, cardholder, certificate, certificate holder, certificate owner, certificate user, certification, certification authority, certification path, certification practice statement, certification request, certify, challenge/response, checksum, claimant, class 2, 3, 4, or 5, client, communications security, comparisons, component, compromise, configuration item, covert channel, credentials, credentials service provider, criminal groups, criticality assessment, cryptography, data confidentiality, data integrity, data integrity service, data origin authentication service, datagram, deception, deliberate exposure, digital certificate, digital id, digital signature, digital signature algorithm, directly trusted CA, directly trusted CA key, directory vs. Directory, discrete process, discretionary access control, distinguished name, distinguishing identifier, dual control, electronic credentials, end-user, enrollment service, evidence requester, evidence subject, exchange multiplicity parameter, explicit key authentication from A to B, exposures, false acceptance, false rejection, false rejection rate, falsification, flooding, fraud, help desk, human error, identification, identification and authentication, identification authentication, identification data, identifier, implicit key authentication from A to B, individual accountability, inference, insertion, insider, interception, intruder, intrusion, investigation service, issuing authority, judicial authority, kerberos, key confirmation, key confirmation from A to B, key distribution center, key establishment, key owner, key token, key translation centre, key transport, least privilege, login, malicious code, malware, mandatory access control, masquerade, masquerade attack, masquerading, misappropriation, mutual authentication, mutual suspicion, nations, non-repudiation, non-repudiation of creation, non-repudiation service, object, one-time passwords, organizational registration authority, origin authenticity, originator, outsourcing, password system, passwords, perpetrator, personal identification number, personal security environment, phishing, physical access control, practice statement, pre-authorization, principal, privacy, private accreditation information, private key, proprietary, protected channel, proxy server, pseudonym, public-key, public-key certificate, public-key derivation function, public-key information, public-key infrastructure, randomizer, recipient, references, registration, registration authority, relying party, repudiation, response, risk, risk management, role-based access control, root, router, salt, secret, secure envelope, secure socket layer, security authority, server, signature key, signer, simple authentication, site accreditation, source authentication, sponsor, spoof, strong authentication, subject, substitution, theft of service, threat, ticket, time variant parameter, time-stamp requester, time-stamp verifier, tokens, transaction intermediary, trapdoor, trojan horse, trust, trusted agent, unilateral authentication, users, usurpation, validate vs. verify, validation service, vendor, verification, verification key, verified name, verifier, violation of permissions, witness,
- entity authentication
- IncludedBy:authentication, entity,
- entity authentication of A to B
- IncludedBy:authentication, entity,
- Related:assurance, identity,
- entity-wide security
- IncludedBy:entity, security,
- Related:control, cyberspace, risk,
- entrance national agency check
- Related:security,
- entrapment
- IncludedBy:risk management,
- Related:exploit, penetration, system,
- entropy
- Related:attack,
- entry control
- IncludedBy:access control, control,
- Related:access, authorized, controlled access area, process, resource,
- entry label
- Related:information,
- entry-level certification
- IncludedBy:certification,
- Related:availability, confidentiality, integrity, system,
- environment
- Includes:object,
- Related:development, operation, system, users,
- environment of operation
- Related:risk, security, threat,
- environmental failure protection
- IncludedBy:failure, risk management,
- Related:assurance, compromise, cryptographic, cryptography, module,
- environmental failure testing
- IncludedBy:failure, security testing, test,
- Related:compromise, cryptographic, cryptography, module,
- environmentally controlled area
- IncludedBy:availability, control,
- Related:damage,
- ephemeral key
- IncludedBy:key,
- Related:public-key, requirements,
- equipment radiation TEMPEST zone
- IncludedBy:TEMPEST,
- equity
- Related:classified,
- erasable programmable readonly memory
- erasure
- Includes:degauss, overwrite procedure,
- Related:destruction, information, process,
- error
- Related:bug, fault, operation, process, program, system, version,
- error analysis
- IncludedBy:analysis,
- error detection and correction
- error detection code
- IncludedBy:code, integrity,
- Includes:check character,
- Related:information,
- error guessing
- Related:test,
- error seeding
- Related:analysis, assurance, computer, mutation analysis, process, program,
- Synonym:bebugging,
- escort
- Related:classified,
- escrow
- Includes:Escrowed Encryption Standard, key-escrow, key-escrow system,
- Related:CAPSTONE chip, Clipper chip, EE, Law Enforcement Access Field, Skipjack, cryptographic, key, key management, key recovery, public-key infrastructure, retrieval, trust,
- Escrowed Encryption Standard
- IncludedBy:encryption, escrow, standard,
- Related:access, access control, algorithm, authorized, classified, communications, key, system, telecommunications,
- espionage
- IncludedBy:threat,
- Includes:cyber espionage,
- Related:covert, cybercrime, intelligence,
- essential elements of friendly information
- essential elements of information
- essential secrecy
- Related:critical,
- establishment
- Includes:connection establishment, connection establishment time, key establishment, point-to-point key establishment,
- Related:Diffie-Hellman, FIPS PUB 140-1, IPsec Key Exchange, Internet Security Association and Key Management Protocol, OAKLEY, Photuris, aggressive mode, configuration control, connection overhead, cookies, cryptographic module, datagram, filtering router, identity proofing, key agreement, key confirmation, key recovery, key transport, main mode, peer entity authentication service, privacy protection, public law 100-235, public-key forward secrecy, quick mode, security, security association, subcommittee on Automated Information System security, subcommittee on telecommunications security, testability, unit of transfer,
- Estelle
- Related:computer, computer network, network, protocols,
- ethernet meltdown
- IncludedBy:threat,
- Related:gateway, illegal, network,
- ethernet sniffing
- IncludedBy:sniffing,
- Related:criteria, file, interface, login, packet sniffer, passwords, promiscuous mode, software, users,
- Europay, MasterCard, Visa
- Related:application, tokens,
- European Information Technology Security Evaluation Criteria
- IncludedBy:Common Criteria for Information Technology Security Evaluation, computer security, criteria, information, target of evaluation, technology,
- Includes:assurance, correctness,
- Related:target, version,
- European quality award
- IncludedBy:quality,
- evaluated products list
- IncludedBy:Information Systems Security products and services catalogue, National Security Agency, national information assurance partnership,
- Related:computer, computer security, criteria, evaluation, information, software, system, trust, trusted computer system,
- evaluated system
- IncludedBy:evaluation, system,
- Related:criteria, security,
- evaluation
- IncludedBy:certification,
- Includes:Commercial COMSEC Evaluation Program, Common Criteria for Information Technology Security Evaluation, Common Evaluation Methodology, DoD Trusted Computer System Evaluation Criteria, IT Security Evaluation Criteria, IT Security Evaluation Methodology, Information Technology Security Evaluation Criteria, Monitoring of Evaluations, Trusted Computer System Evaluation Criteria, Trusted Products Evaluation Program, access evaluation, assurance, certification and accreditation, certification test and evaluation, cryptographic system evaluation, cryptosystem evaluation, evaluated system, evaluation authority, evaluation facility, evaluation pass statement, evaluation products list, evaluation scheme, evaluation technical report, evaluation work plan, independent review and evaluation, monitoring and evaluation, program evaluation and review technique, quality of protection, risk evaluation, security evaluation, security test & evaluation, software system test and evaluation process, strength of a requirement, target of evaluation, technical surveillance countermeasures surveys and evaluations, training effectiveness evaluation, validation, verification,
- Related:Common Criteria Testing Laboratory, Common Criteria Testing Program, Common Criteria for Information Technology Security, FIPS approved security method, Government Accountability Office, IT security, NIAP Oversight Body, National Computer Security Center, National Voluntary Laboratory Accreditation Program, Orange book, Red book, Scope of Accreditation, Yellow book, accreditation, accreditation range, acquisition special access program, adjudication, approval/accreditation, approved technologies list, approved test methods list, assessment, benchmark, beyond A1, blue team, candidate TCB subset, certificate, certificate revocation list, certification agent or certifier, certification authority, common criteria, computer security, controlled access program oversight committee, controlled access protection, criteria, cryptographic system survey, cryptosystem survey, descriptive top-level specification, designated, designated laboratories list, designating authority, designation policy, evaluated products list, file, flaw hypothesis methodology, function, independent assessment, intelligence, interface control document, interim approval to operate, network component, observation reports, operations security assessment, penetration test, policy, preproduction model, process, profile, protection philosophy, quality, requirements for content and presentation, requirements for evidence, risk analysis, risk assessment, risk avoidance, risk management, risk treatment, security, security control assessment, security environment threat list, security policy model, security-compliant channel, self-inspection, source selection, sponsor, subset-domain, system, target, technology area, test method, test procedure, testing, threat assessment, training assessment, trusted network interpretation, trusted path, type certification, validated products list,
- Synonym:analysis,
- evaluation and validation scheme
- IncludedBy:validation,
- Related:authority, function, standard, system,
- evaluation assurance
- IncludedBy:assurance,
- Includes:evaluation assurance level,
- Related:analysis, target, threat,
- evaluation assurance component
- IncludedBy:assurance, component,
- Related:requirements,
- evaluation assurance level
- IncludedBy:Common Criteria for Information Technology Security Evaluation, evaluation assurance, requirements,
- Includes:evaluation criteria, evaluator, evaluator actions,
- Related:boundary, criteria, network, system,
- evaluation assurance package
- IncludedBy:assurance,
- evaluation assurance requirements
- IncludedBy:assurance, requirements,
- Related:file, profile,
- evaluation authority
- IncludedBy:authority, evaluation,
- Related:quality, standard,
- evaluation criteria
- IncludedBy:criteria, evaluation assurance level,
- Related:system,
- evaluation facility
- IncludedBy:evaluation,
- evaluation pass statement
- IncludedBy:evaluation,
- Related:assessment, criteria, standard,
- evaluation products list
- IncludedBy:evaluation,
- Related:assurance,
- evaluation scheme
- IncludedBy:evaluation,
- Related:authority,
- evaluation technical report
- IncludedBy:Common Criteria Testing Laboratory, evaluation,
- Related:validation,
- evaluation work plan
- IncludedBy:Common Criteria Testing Laboratory, evaluation,
- Related:IT security, computer security, security,
- evaluator
- IncludedBy:evaluation assurance level,
- Related:assessment, officer, security, system,
- evaluator actions
- IncludedBy:evaluation assurance level,
- Related:criteria, identify, information,
- evasion
- Related:attack, malicious, target,
- event
- Related:incident, system,
- evidence
- IncludedBy:assurance,
- Includes:evidence requester, evidence subject, requirements for evidence,
- Related:audit trail, correctness, credentials, deception, delivery authority, development assurance, development assurance requirements, failure, forced entry, information, logging, monitor, non-repudiation, non-repudiation information, non-repudiation of submission, non-repudiation of transport, non-repudiation policy, non-repudiation service, non-repudiation token, notarization, notary, operations security, operations security survey, proof, records, secure envelope, security audit trail, security environment threat list, security target, statistical estimate, surreptitious entry, time-stamping authority, time-stamping service, trust, trusted time stamping authority, validate vs. verify, validation, validation report, verifier, witness,
- evidence requester
- IncludedBy:evidence,
- Related:entity, trust,
- evidence subject
- IncludedBy:evidence, subject,
- Related:entity,
- examination
- examine
- Related:control, security,
- exception
- Related:access, bug, classified, fault, flow, operation, program, security, subject,
- exchange multiplicity parameter
- Related:authentication, entity, message,
- exculpatory evidence
- executable code
- IncludedBy:code,
- Related:computer, program,
- execute access
- IncludedBy:access,
- Related:program, software,
- execution, delivery, and process management
- IncludedBy:operational risk loss, process,
- executive information systems
- IncludedBy:information, system,
- executive order
- executive state
- Includes:privileged instructions,
- PreferredFor:supervisor state,
- Related:domain, operation, privileged, software, system, users,
- executive steering committee
- Related:information, process,
- exempted
- exercise key
- IncludedBy:key,
- Related:communications,
- exercised
- Related:program, test,
- exhaustive testing
- IncludedBy:security testing, test,
- Related:program,
- expanded national agency check
- expanded steel
- expansibility
- expected output
- Related:security,
- expert review team
- Related:identify, information, resource, security, system,
- expire
- HasPreferred:certificate expiration,
- explain
- Related:information, requirements,
- explicit key authentication from A to B
- IncludedBy:authentication, key,
- Related:assurance, entity,
- exploit
- IncludedBy:threat,
- Includes:denial-of-service, distributed denial-of-service, exploit tools, logic bombs, phishing, sniffer, trojan horse, virus, vishing, war driving, worm, zero-day exploit,
- Related:Defensive Information Operations, access, access control, assurance, attack, code, covert channel, derf, entrapment, exploitable channel, firewall, flaw hypothesis methodology, information, information assurance, information superiority, information warfare, intelligent threat, non-technical countermeasure, object, operations security, penetration testing, port scan, program, security, security threat, smurf, system, technical vulnerability, threat agent, vulnerability,
- exploit code
- Related:attack,
- exploit tools
- IncludedBy:exploit,
- Related:system, vulnerability,
- exploitable channel
- IncludedBy:channel, threat, trusted computing base,
- Includes:covert channel, subject,
- Related:computer, covert, exploit, information, policy, security, system,
- exploitation
- IncludedBy:vulnerability,
- PreferredFor:exploitation of vulnerability,
- Related:access, access control, control, intelligence, operation, policy, security, system,
- exploitation of vulnerability
- HasPreferred:exploitation,
- IncludedBy:vulnerability,
- export
- Related:foreign,
- export license
- Related:authorization, security,
- export license application
- Related:foreign,
- exposures
- IncludedBy:threat consequence,
- Includes:common vulnerabilities and exposures, external system exposure, internal system exposure,
- Related:authorized, entity, inadvertent disclosure, levels of concern, media protection, risk, risk assessment, system, unauthorized disclosure,
- extended industry standard architecture
- IncludedBy:standard,
- Related:automated information system,
- extensibility
- Related:function, interface, protocols, system,
- extensible
- Related:control, program,
- Extensible Authentication Protocol
- IncludedBy:authentication, protocols, security protocol,
- Related:challenge/response, network, passwords, response, router,
- extensible markup language
- IncludedBy:standard generalized markup language,
- Related:application, computer, object, process, program, validation,
- extension
- IncludedBy:public-key infrastructure,
- PreferredFor:private extension,
- Related:X.509, application, assurance, certificate, certification, function, information, key, policy, public-key, requirements, revocation, security, standard, subject,
- external fraud
- IncludedBy:fraud, operational risk loss,
- Related:property,
- external it entity
- IncludedBy:entity, target of evaluation,
- Related:system, target, trust,
- external label
- Related:identify,
- external network
- IncludedBy:network,
- Related:control,
- external security controls
- IncludedBy:control, protection profile, risk management, security controls,
- Related:access, access control, accreditation, boundary, certification, file, process, profile,
- external security testing
- IncludedBy:security testing, test,
- Related:security perimeter,
- external system exposure
- IncludedBy:exposures, system,
- Related:access, access control, connection, internet, users,
- external throughput rate
- extraction resistance
- Related:communications, cryptography, key, telecommunications,
- extranet
- IncludedBy:internet,
- Related:access, access control, application, authorized, computer, computer network, network, technology, users, virtual private network,
- extraordinary security measures
- IncludedBy:security,
- Related:access, authorized,
- facilities
- Related:information, process, resource, technology,
- facilities accreditation
- Related:classified, security,
- facilities certification
- IncludedBy:certification,
- Related:classified, security,
- facility
- facility manager
- Related:security, system,
- facility security clearance
- IncludedBy:security,
- Related:access, classified,
- facsimile
- fail safe
- IncludedBy:failure control,
- Related:failure, operation, process, program, software, system,
- fail soft
- IncludedBy:automated information system, failure control,
- Related:application, failure, function, process, software, system,
- failed logon
- IncludedBy:logon, threat,
- Related:access, resource, users,
- failover
- failure
- IncludedBy:risk,
- Includes:environmental failure protection, environmental failure testing, failure access, failure control, mean-time-between-failure, mean-time-between-outages, mean-time-to-fail,
- Related:IS related risk, abend, abort, accountability, anomaly, availability, backup procedures, bomb, contingency plan, crash, critical mechanism, defect, dump, evidence, fail safe, fail soft, fallback procedures, flooding, function, mean-time-to-repair, mean-time-to-service-restoral, operation, outage, problem, program, recovery procedures, requirements, software, software reliability, strength of a requirement, system, uninterruptible power supply, vulnerability,
- Synonym:fault,
- failure access
- IncludedBy:access, failure, threat,
- Related:authorized, incident, software, system, unauthorized access,
- failure control
- IncludedBy:control, failure, risk management,
- Includes:fail safe, fail soft,
- Related:function, process, recovery, software, system,
- fallback procedures
- Related:backup, failure, process, system,
- false acceptance
- Related:access, entity, identity, security, system, users,
- false acceptance rate
- IncludedBy:biometrics,
- Related:access, authorized, system, users,
- false denial of origin
- IncludedBy:threat consequence,
- false denial of receipt
- IncludedBy:threat consequence,
- false negative
- IncludedBy:risk,
- Related:identify, intrusion, intrusion detection, malicious, system, technology, threat,
- false positive
- IncludedBy:risk,
- Related:classified, intrusion, intrusion detection, malicious, system, technology,
- false rejection
- Related:entity, identity, security, system,
- false rejection rate
- Related:access, entity, identity, security, system,
- falsification
- IncludedBy:threat consequence,
- Related:authorized, entity,
- family
- Related:object, security,
- fault
- IncludedBy:threat,
- Includes:fault injection, fault isolation, fault management, fault tolerance, fault tolerant, security fault analysis,
- Related:Federal Standard 1027, alarm reporting, alarm surveillance, anomaly, bug, communications, computer, correctness, debug, defect, error, exception, function, maintenance, network, network management, problem, process, program, software, software reliability, system, trap,
- Synonym:failure,
- fault injection
- IncludedBy:fault,
- Related:analysis, code, program, software,
- fault isolation
- IncludedBy:fault,
- Related:accountability, function,
- fault management
- IncludedBy:fault,
- fault tolerance
- IncludedBy:fault,
- Related:operation, process, risk, software, system,
- Synonym:fault tolerant,
- fault tolerant
- IncludedBy:fault,
- Related:availability, function, software, system,
- Synonym:fault tolerance,
- fear, uncertainty, or doubt
- Related:deterrence,
- Federal Criteria for Information Technology Security
- IncludedBy:Common Criteria for Information Technology Security Evaluation, computer security, criteria, information, technology,
- Includes:Federal Criteria Vol. I, assurance, correctness,
- Related:system, trust,
- Federal Criteria Vol. I
- IncludedBy:Federal Criteria for Information Technology Security, National Institute of Standards and Technology, criteria,
- Includes:protection profile,
- Related:computer security, file, information, profile, standard, technology, version,
- federal enterprise architecture
- Related:management,
- Federal Information Processing Standards
- IncludedBy:National Institute of Standards and Technology, information, process, standard,
- Includes:Digital Signature Standard, FIPS PUB 140-1, FIPS approved security method, Federal Information Processing Standards Publication 140, data encryption standard,
- Related:computer, computer security, property, security, system, technology,
- Federal Information Processing Standards Publication 140
- IncludedBy:Federal Information Processing Standards, information, process, standard,
- Synonym:FIPS PUB 140-1,
- federal information system
- federal personnel manual
- Federal Public-key Infrastructure
- IncludedBy:key, public-key, public-key infrastructure,
- Related:application, certificate, classified, communications security,
- federal record
- Federal Reserve Banks
- federal secure telephone service
- Federal Standard 1027
- IncludedBy:National Institute of Standards and Technology, standard,
- Related:FIPS PUB 140-1, National Security Agency, analysis, classified, criteria, emanation, emanations security, encryption, fault, information, key, key management, security, tamper,
- federal telecommunications system
- IncludedBy:communications, system, telecommunications,
- federated identity
- IncludedBy:entity, identity,
- Related:access, access control, federation, system, users,
- federation
- Related:access, access control, assurance level, federated identity, relying party, system, users,
- fedline
- Related:access, access control,
- fedwire
- Related:process, system,
- feedback buffer
- Related:cipher, cryptography, encipherment, process,
- ferroelectric random access memory
- IncludedBy:access,
- fetch protection
- IncludedBy:access control,
- Includes:contamination,
- Related:access, assurance, authorized, file, process, program, system, unauthorized access,
- fiber distributed data interface
- IncludedBy:interface,
- Related:automated information system,
- fiber-optics
- Related:information,
- field
- Related:computer, file,
- field device
- Related:communications,
- field site
- Related:communications, system,
- fieldbus
- Related:control, message, protocols,
- file
- Includes:CKMS profile, COMSEC profile, IT default file protection parameters, Network File System, access profile, assurance profile, communications profile, critical system files, default file protection, file encryption, file infector virus, file integrity checker, file integrity checking, file protection, file security, file transfer, file transfer access management, file transfer protocol, keys used to encrypt and decrypt files, master file, profile, profile assurance, protection profile, protection profile family, secure profile inspector, security policy information file, system files, system profile, transaction file, trust-file PKI, user profile,
- Related:Federal Criteria Vol. I, Minimum Interoperability Specification for PKI Components, PHF, PKIX, Tripwire, access type, anonymous login, antivirus software, archiving, assignment, attack signature recognition, audit, audit software, audit trail, authentication, authorization, backup, backup generations, backup procedures, batch mode, browse access protection, capability, card initialization, clean system, component, computer, computer fraud, connection, container, cookies, correctness, data dictionary, data synchronization, decomposition, deliverable, development assurance requirements, digital signature, disaster recovery, discretionary access control, disinfecting, downgrade, download, effectiveness, encryption software, ethernet sniffing, evaluation, evaluation assurance requirements, external security controls, fetch protection, field, firewall, functional protection requirements, general controls, gopher, granularity, hash function, hash totals, honeypot, hypertext markup language, integration test, intrusion detection systems, key-escrow, logic bombs, login, macro virus, malicious applets, mandatory access control, message digest, metadata, multipartite virus, multipurpose internet mail extensions, national computer security assessment program, national information assurance partnership, object, off-line attack, on-access scanning, output, permissions, personal security environment, pretty good privacy, product rationale, programmable logic controller, prowler, purge, purging, push technology, quarantine, quarantining, real-time system, recovery procedures, redundancy, refinement, register, review techniques, rootkit, sampling frame, sandboxed environment, sanitize, script, secure hash algorithm, security certificate, security label, security target, security-relevant event, server, snarf, social engineering, stateful protocol analysis, superuser, suspicious activity report, system administrator privileges, system resources, system software, tracking cookie, trigger, trojan horse, trusted certificate, trusted key, uniform resource locator, upload, users, utility programs, virus, virus signature, web browser cache, web of trust, work product,
- file encryption
- IncludedBy:encryption, file,
- Related:access, authentication, process,
- file infector virus
- IncludedBy:file, virus,
- Related:application, computer, process, program,
- file integrity checker
- IncludedBy:file, integrity,
- Related:message, software,
- file integrity checking
- IncludedBy:file, integrity,
- Related:compromise, message, software,
- file name anomaly
- file protection
- IncludedBy:access control, file,
- Includes:contamination,
- Related:access, assurance, authorized, process, system, unauthorized access,
- file security
- IncludedBy:access control, file,
- Related:access, authorized, computer,
- file series
- Related:access, subject,
- file series exemption
- file transfer
- IncludedBy:file,
- Related:computer, network, process, protocols, system,
- file transfer access management
- IncludedBy:access, file,
- Related:network,
- file transfer protocol
- IncludedBy:file, internet, protocols,
- Related:application, computer, network, standard,
- fill device
- Related:communications security, cryptography, key,
- fill device interface unit
- IncludedBy:interface,
- filtering router
- IncludedBy:router,
- Related:control, establishment, internet, network, packet filter, policy, security,
- Synonym:screening router,
- finality
- financial crimes enforcement network
- IncludedBy:network,
- Related:analysis,
- financial disclosure
- Related:security, subject,
- fingerprint
- Related:authentication, hash, key, public-key,
- finite population correction factor
- finite state machine
- Related:function, model,
- FIPS approved security method
- IncludedBy:Federal Information Processing Standards, National Institute of Standards and Technology, security policy,
- Related:algorithm, authentication, criteria, cryptographic, evaluation, key,
- FIPS PUB 140-1
- IncludedBy:Federal Information Processing Standards, National Institute of Standards and Technology,
- Includes:random number generator,
- Related:Federal Standard 1027, algorithm, application, authorized, classified, communications security, computer, cryptographic, cryptography, establishment, information, interface, key, key management, module, requirements, role, security, security testing, software, standard, system, test, zeroization, zeroize,
- Synonym:Federal Information Processing Standards Publication 140,
- FIPS PUB
- FIPS-Validated Cryptography
- IncludedBy:cryptography,
- Related:requirements,
- fire barrier
- IncludedBy:availability,
- fire suppression system
- IncludedBy:availability, system,
- FIREFLY
- Related:cryptography, key, key management, management, protocols, public-key,
- firewall
- IncludedBy:front-end security filter, gateway, guard, internet, security filter, security software,
- Includes:application gateway firewall, application proxy, application-level firewall, bastion host, circuit proxy, connection, demilitarized zone, dual-homed gateway firewall, firewall machine, goodput, homed, host-based firewall, illegal traffic, logging, network address translation, network level firewall, packet filter, packet filtering, packet filtering firewall, protected network, proxy, rejected traffic, router-based firewall, ruleset, screened host firewall, screened subnet firewall, stateful packet filtering, trusted gateway, unprotected network,
- Related:access, access control, application, application level gateway, attack, authorization, authorized, boundary, circuit level gateway, computer, computer network, control, countermeasures, criteria, critical, data source, domain, exploit, file, flow, identification, interface, network, operation, policy, process, protocols, resource, router, screening router, software, spoof, system, threat, unauthorized access, unit of transfer, users, vulnerability,
- firewall control proxy
- IncludedBy:control,
- firewall machine
- IncludedBy:firewall,
- Related:connection, security,
- firmware
- IncludedBy:cryptographic module,
- Related:application, computer, program, software,
- fishbone diagram
- PreferredFor:cause and effect diagram,
- Related:identify,
- fishbowl
- Related:authorized, information, system, users,
- fixed COMSEC facility
- Related:communications security,
- fixed disk
- fixed price contract
- flash memory
- flaw
- IncludedBy:threat,
- Related:system,
- flaw hypothesis methodology
- IncludedBy:risk management,
- Related:analysis, attack, compromise, computer, control, evaluation, exploit, penetration, security testing, system, test,
- flexibility
- Related:operation, program,
- flooding
- IncludedBy:attack, incident,
- Related:access, access control, analysis, computer, covert, entity, failure, flow, information, message, process, system,
- flow
- Includes:buffer overflow, data flow control, data flow diagram, information flow, information flow control, modeling or flowcharting, security flow analysis, traffic flow confidentiality, traffic-flow security, underflow, workflow,
- Related:Bell-LaPadula security model, Gypsy verification environment, access, boundary host, cascading, coding, concurrent connections, confidentiality, contact interface, contactless interface, continuous process, controlled interface, encapsulating security payload, end-to-end encryption, exception, firewall, flooding, hierarchical development methodology, identify, information superiority, infrastructure, interface, internet protocol, internet protocol security, intrusion, intrusion detection, lattice model, link encryption, mandatory access control, network behavior analysis system, packet filtering, ping of death, pressure sensor, program, read, read access, sensor, subject, system, topology, traffic analysis, user data protocol, valve, vulnerability, wiretapping, workgroup computing, write,
- flow control
- HasPreferred:information flow control,
- flush
- Related:security,
- focused testing
- foe
- IncludedBy:threat,
- for official use only
- Related:classified,
- For Official Use Only Certified TEMPEST Technical Authority
- Related:certification, requirements, security,
- forced entry
- Related:authorized, evidence,
- foreground information
- foreign
- Includes:Foreign Intelligence Surveillance Act, Office of Foreign Assets Control, foreign contact, foreign disclosure, foreign disclosure point of contact, foreign exchange personnel, foreign government information, foreign intelligence, foreign intelligence service, foreign interest, foreign liaison officer, foreign military sales, foreign national, foreign owned, controlled or influenced, foreign ownership, control, or influence, foreign person, foreign relations of the united states, foreign representative, foreign travel briefing, foreign visit, representative of a foreign interest, senior foreign official,
- Related:Defense Personnel Exchange Program, Defense Services, U.S. person, United States national, acquisition systems protection, caveat, communications intelligence, controlled information, cooperative program personnel, counterintelligence, counterintelligence assessment, criminal activity, critical financial markets, damage to the national security, delegation of disclosure authority letter, derogatory information, designated intelligence disclosure official, electronic intelligence, export, export license application, formerly restricted data, government-to-government transfer, intelligence, intelligence community, long-haul telecommunications, national security system, national security-related information, oral/visual disclosure, program protection plan, psychological operations, release prefix, security assurance, security policy automation network, senior intelligence officer, sensitive information, special access required programs oversight committee, special activity, tear line, technical security, technology control plan, technology transfer, telemetry intelligence, threat, unclassified sensitive,
- foreign contact
- IncludedBy:foreign,
- Related:United States citizen,
- foreign disclosure
- IncludedBy:foreign,
- Related:access, authorized, classified, security,
- foreign disclosure point of contact
- IncludedBy:foreign,
- Related:classified,
- foreign exchange personnel
- IncludedBy:foreign,
- foreign government information
- IncludedBy:foreign,
- foreign intelligence
- IncludedBy:foreign, intelligence,
- foreign intelligence service
- IncludedBy:foreign, intelligence,
- Foreign Intelligence Surveillance Act
- IncludedBy:foreign, intelligence,
- Related:electronic surveillance,
- foreign interest
- IncludedBy:foreign,
- Related:trust,
- foreign liaison officer
- IncludedBy:foreign,
- Related:authorized, connection, security,
- foreign military sales
- IncludedBy:foreign,
- Related:authorized, security,
- foreign national
- IncludedBy:foreign,
- foreign owned, controlled or influenced
- IncludedBy:control, foreign,
- foreign ownership, control, or influence
- IncludedBy:foreign,
- Related:access, authorized, classified,
- foreign person
- IncludedBy:foreign,
- Related:trust,
- foreign relations of the united states
- IncludedBy:foreign,
- Related:classified,
- foreign representative
- IncludedBy:foreign,
- foreign travel briefing
- IncludedBy:foreign,
- Related:access, classified, security,
- foreign visit
- IncludedBy:foreign,
- Related:access, classified,
- forensic copy
- forensic specialist
- forensics
- HasPreferred:computer forensics,
- fork bomb
- IncludedBy:threat,
- Related:code, process, system,
- formal
- Antonym:informal,
- Includes:formal access approval, formal development methodology, formal model of security policy, formal proof, formal security policy model, formal specification, formal top-level specification, formal verification,
- Related:semantics,
- formal access approval
- IncludedBy:access, formal,
- Related:classified, information, owner, privacy, process, requirements, security,
- formal development methodology
- IncludedBy:formal, software development methodologies,
- Related:identification, model, program, requirements, security, software, system, verification,
- formal language
- Related:analysis, application, computer, program,
- formal method
- Related:policy, security, system,
- formal model of security policy
- IncludedBy:formal, model, policy, security, target of evaluation,
- Synonym:formal security policy model,
- formal proof
- IncludedBy:formal, formal verification,
- Related:computer, process, program, verification,
- formal security policy
- IncludedBy:policy, security,
- formal security policy model
- IncludedBy:formal, formal verification, model, policy, security policy, trusted computing base,
- Includes:Bell-LaPadula security model, Biba Integrity model,
- Related:computer, control, interface, operation, semantics, system,
- Synonym:formal model of security policy,
- formal specification
- Antonym:informal specification,
- IncludedBy:formal, formal verification,
- Includes:formal top-level specification,
- Related:computer, function, semantics, software, system,
- formal top-level specification
- IncludedBy:formal, formal specification, top-level specification,
- Related:computer, model, policy, process, program, requirements, security, system, verification,
- formal verification
- IncludedBy:formal, verification,
- Includes:endorsed tools list, formal proof, formal security policy model, formal specification,
- Related:model, policy, process, program, security, system,
- format
- Related:computer, information, process,
- formatting function
- formerly restricted data
- Related:classified, foreign,
- formulary
- Related:access, access control, control,
- Fortezza
- IncludedBy:National Institute of Standards and Technology, National Security Agency,
- Related:CAPSTONE chip, MISSI user, SSO PIN, SSO-PIN ORA, algorithm, cryptographic, digital signature, encryption, hash, key, no-PIN ORA, personal identification number, personality label, signature, slot, software, tokens, user PIN, user-PIN ORA,
- Forum of Incident Response and Security Teams
- IncludedBy:computer emergency response team, incident, response,
- Related:computer, computer security, information, information security, quality, security incident,
- forward cipher
- forward engineering
- Related:process, system,
- forward secrecy
- Includes:forward secrecy with respect to A, forward secrecy with respect to both A and B individually, mutual forward secrecy, public-key forward secrecy,
- PreferredFor:perfect forward secrecy,
- Related:compromise, internet protocol security, internet security protocol, key,
- forward secrecy with respect to A
- IncludedBy:forward secrecy,
- Related:key, operation, property,
- forward secrecy with respect to both A and B individually
- IncludedBy:forward secrecy,
- Related:key, operation, property,
- frame relay
- Related:automated information system, system, technology, users,
- framework
- Related:computer, system,
- framing
- Related:information, standard, users,
- fraud
- IncludedBy:illegal, threat,
- Includes:ACH debit fraud, account fraud, computer fraud, external fraud, fraudulent financial reporting, internal fraud,
- Related:authentication, authorized, computer abuse, criminal groups, entity, identity theft, invalidity date, pharming, phishing, replay attacks, suspicious activity report, unforgeable,
- fraudulent financial reporting
- IncludedBy:fraud,
- Related:audit,
- Freedom of Information Act
- Related:access,
- freight forwarder
- frequency division multiple access
- IncludedBy:access,
- Related:users,
- frequency hopping
- Related:algorithm, authorized, communications, communications security, jamming, telecommunications,
- friend
- friendly
- front-end processor
- IncludedBy:automated information system, process,
- Related:communications, computer,
- front-end security filter
- IncludedBy:security,
- Includes:firewall,
- Related:computer, integrity, policy, process, software, system,
- full accreditation
- IncludedBy:accreditation,
- Related:control, process, requirements, security, system,
- full disk encryption
- IncludedBy:encryption,
- Related:access, authentication, computer, process, system,
- full maintenance
- Includes:depot maintenance,
- full-duplex
- Related:communications,
- function
- Includes:IT security support functions, TOE security functions, TOE security functions interface, binding of functionality, binding of security functionality, collision-resistant hash function, cryptographic check function, cryptographic functions, cryptographic hash function, functional component, functional package, functional proponent, functional protection requirements, functional security requirements specification, functional test case design, functional testing, functional unit, functionality, functionality class, hash function, hash function identifier, key derivation function, key generating function, mask generation function, one-way function, public-key derivation function, quality function deployment, reduction-function, round-function, security function policy, security functions, signature function, strength of function, sub-function, suitability of functionality, theft of functionality, trusted functionality, verification function,
- Related:Abstract Syntax Notation One, Automated Information System security, CAPSTONE chip, CASE tools, CCI assembly, CCI component, CCI equipment, COMSEC boundary, COMSEC control program, COMSEC material, COMSEC module, Common Criteria for Information Technology Security, Cryptographic Application Program Interface, Data Authentication Algorithm, Generic Upper Layer Security, Guidelines and Recommendations for Security Incident Processing, IA architecture, IT security product, Information Technology Security Evaluation Criteria, Internet Corporation for Assigned Names and Numbers, Internet Security Association and Key Management Protocol, Monitoring of Evaluations, Network File System, Open Systems Interconnection Reference model, PC card, PKCS #11, POSIX, Rivest-Shamir-Adleman algorithm, S/Key, SOF-basic, SOF-high, SOF-medium, SSO PIN, SSO-PIN ORA, Terminal Access Controller Access Control System, The Exponential Encryption System, Type 4 key, access control, accreditation, administrative access, alarm, alarm surveillance, application, application program interface, application system, approved, architecture, assignment, assurance, assurance profile, asymmetric cryptographic technique, attribute certificate, audit, audit charter, audit program, audit/review, authentication code, authorizing official, automated information system, back up vs. backup, best practices, black-box testing, block, break, bug, business areas, business case, centralized operations, certificate management, certification authority workstation, checksum, claimant, code amber, code red, command and control, common criteria, communications profile, completeness, component, component dependencies, component extensibility, component hierarchy, computer operations, audit, and security technology, computer security, computing security methods, configuration, configuration identification, configuration item, configuration management, continuity of operations plan, control loop, controlled access protection, cooperative key generation, correctness, corruption, cost/benefit, countermeasures, critical, criticality, criticality assessment, crypto-ancillary equipment, cryptographic check value, cryptographic initialization, cryptographic module, cryptographic officer, cryptographic randomization, cryptographic service, cryptographic token, cultural assumptions, data authentication code, data encryption standard, data input, data string, database management system, denial-of-service, digital signature, digital watermarking, disruption, distributed dataprocessing, domain parameter, dual control, effectiveness, electrical power systems, electronic commerce, electronic messaging services, email packages, embedded cryptographic system, embedded cryptography, embedded system, emergency services, encryption certificate, encryption software, evaluation, evaluation and validation scheme, extensibility, extension, fail soft, failure, failure control, fault, fault isolation, fault tolerant, finite state machine, formal specification, gateway, general support system, generation, global command and control system, granularity of a requirement, group user id, hardening, hash code, hash result, hash token, hash value, hashed message authentication code, human error, informal security policy, information architecture, information processing standard, information systems security equipment modification, information technology, information warfare, infrastructure, initial transformation, initializing value, integrity, intelligent electronic device, inter-TSF transfers, interface, internal subject, joint task force-computer network defense, key, key agreement, keyed hash, lines of business, logical access, logical system definition, maintenance, major application, malicious applets, malicious logic, man-in-the-middle attack, matrix, message authentication code algorithm, message authentication code vs. Message Authentication Code, message digest, message representative, metrics, misuse, mockingbird, modes of operation, mutual suspicion, mutually suspicious, national information assurance partnership, national security system, natural disaster, network security, no-PIN ORA, off-line cryptosystem, on-line cryptosystem, one-time passwords, open system interconnection model, operating system, operational integrity, organizational registration authority, output transformation, package, packet filtering, plug-in, point-to-point tunneling protocol, port, pre-signature, privilege, privileged process, privileged user, process, product, product rationale, programmable logic controller, protection profile, protection profile family, protection-critical portions of the TCB, protocols, proxy, public-key infrastructure, public-key system, quality of protection, randomizer, reference monitor, reference validation mechanism, registration authority, reliability, requirements, requirements traceability matrix, resource, restructuring, reusability, revision, risk, risk assessment, risk management, robustness, role, role-based access control, rootkit, salt, sector, secure hash standard, secure operating system, security, security certification level, security features, security management infrastructure, security mechanism, security policy, security relevant, security target, security testing, separation of duties, signaling, signaling system 7, signature certificate, signature equation, significant change, site certification, smartcards, software, software assurance, software enhancement, software reliability, software system test and evaluation process, stovepipe systems, stream cipher, strength of a requirement, structural testing, subassembly, subsystem, support software, system, system files, system integrity, system security officer, tamper, tampering, technology area, teleprocessing, testability, thrashing, threat, to-be-process model, token management, tokens, top-level specification, trapdoor, trojan horse, trust, trusted channel, trusted path, trustworthy system, turnaround time, unforgeable, user PIN, user-PIN ORA, usurpation, verifier, version, violation of permissions, website, white-box testing, word, workload,
- functional component
- IncludedBy:Common Criteria for Information Technology Security Evaluation, component, function, security target,
- Includes:object,
- Related:audit, requirements,
- functional package
- IncludedBy:function,
- Includes:security target,
- functional proponent
- IncludedBy:function, network sponsor,
- functional protection requirements
- IncludedBy:function, protection profile,
- Related:assurance, file, profile,
- functional security requirements specification
- IncludedBy:function, requirements, security,
- functional test case design
- IncludedBy:function, test,
- Related:analysis, black-box testing,
- functional testing
- IncludedBy:function, security testing, test,
- Related:black-box testing, computer, operation, response, system,
- functional unit
- IncludedBy:component, function,
- functionality
- IncludedBy:function, target of evaluation,
- Related:requirements, security,
- functionality class
- IncludedBy:function, target of evaluation,
- Related:policy, security, system, target,
- future narrow band digital terminal
- IncludedBy:security,
- Related:message, network,
- gap analysis
- IncludedBy:analysis, risk analysis,
- Related:audit, vulnerability analysis,
- garbled
- Related:cryptographic, destruction, key,
- gas and oil production, storage and transportation
- IncludedBy:critical infrastructures,
- Related:critical, process, role, system,
- gateway
- IncludedBy:application proxy,
- Includes:application gateway firewall, application level gateway, circuit level gateway, common gateway interface, dual-homed gateway firewall, firewall, gateway server, payment gateway, payment gateway certification authority, security gateway, trusted gateway, wireless gateway server,
- Related:Chernobyl packet, authentication header, bastion host, break, cardholder certification authority, certification hierarchy, code, communications, component, computer, computer network, email, encapsulating security payload, ethernet meltdown, function, geopolitical certificate authority, guard, interface, internet control message protocol, internetwork, local-area network, merchant certification authority, network, operation, program, protocols, router, screened host firewall, screened subnet firewall, secure network server, security, system, transport mode vs. tunnel mode, tunnel, virtual private network, wiretapping,
- gateway server
- IncludedBy:gateway, internet,
- Related:computer,
- gauss
- general accounting office
- general controls
- IncludedBy:control,
- Related:IT security, application, computer, file, integrity, object, operation, policy, program, recovery, security, system,
- General Services Administration
- general support system
- IncludedBy:system,
- Related:application, communications, control, function, information, management, resource, software, users,
- general-purpose system
- IncludedBy:system,
- Related:computer,
- GeneralizedTime
- Related:UTCTime, coordinated universal time,
- generally accepted system security principles
- IncludedBy:security, system,
- generation
- Related:cryptographic, function, key, metadata,
- Generic Security Service Application Program Interface
- IncludedBy:application, interface, internet, program, security protocol,
- Includes:distributed computing environment, security support programming interface,
- Related:authentication, code, confidentiality, cryptography, integrity, non-repudiation, privacy, process, protocols, standard, system, tokens,
- generic SIO class
- generic threat
- IncludedBy:threat,
- Related:vulnerability,
- Generic Upper Layer Security
- IncludedBy:security,
- Related:application, confidentiality, function, information, integrity, standard,
- geopolitical certificate authority
- IncludedBy:Secure Electronic Transaction, authority, certificate,
- Related:certification, gateway, public-key infrastructure,
- geosynchronous orbit
- global command and control system
- IncludedBy:command and control, control, control systems, security, system,
- Related:function, information, network, process,
- global information grid
- IncludedBy:information, security,
- Related:application, communications, policy, process, software, system,
- global information infrastructure
- IncludedBy:information,
- Related:communications, connection, system,
- global network information environment
- IncludedBy:information, network, security,
- Related:process, system,
- global positioning system
- IncludedBy:system,
- global requirements
- Antonym:local requirements,
- IncludedBy:requirements, trusted computing base,
- Related:analysis, system,
- global telecommunications service
- IncludedBy:communications, telecommunications,
- Related:network,
- goodput
- IncludedBy:firewall,
- Related:bit forwarding rate, interface, network, protocols, test,
- gopher
- Related:computer, file, network, protocols, users,
- Government Accountability Office
- Related:audit, evaluation,
- government contracting activity
- government emergency telecommunications service
- IncludedBy:communications, telecommunications,
- Related:network,
- government program manager
- government services
- Related:critical infrastructures,
- government-approved facility
- Related:access,
- government-off-the-shelf
- government-to-government transfer
- Related:classified, foreign,
- graduated security
- IncludedBy:security,
- Related:risk, system, technology, threat,
- granularity
- IncludedBy:access control,
- Includes:object,
- Related:access, control, file,
- granularity of a requirement
- IncludedBy:requirements, trusted computing base,
- Includes:object, subject,
- Related:function, users,
- graphical-user interface
- IncludedBy:interface, users,
- Related:computer, key, program,
- GRC senior staff
- Related:program,
- Green book
- IncludedBy:rainbow series,
- Related:information, interface, internet, passwords, process, program, standard, system,
- ground wave emergency network
- IncludedBy:network,
- group
- Related:users,
- group key encryption key
- IncludedBy:key,
- group of users
- IncludedBy:users,
- Related:security, software,
- group traffic encryption key
- IncludedBy:key,
- group user id
- IncludedBy:user id,
- Related:function, risk,
- guard (system)
- guard
- IncludedBy:security,
- Includes:firewall,
- Related:United States citizen, access, access control, authorized, classified, computer, gateway, information, integrity, network, process, system, trust, users,
- guerrilla warfare
- IncludedBy:warfare,
- guessing entropy
- Related:attack, passwords, random, system,
- guest system
- Related:access,
- guideline
- Related:policy,
- Guidelines and Recommendations for Security Incident Processing
- IncludedBy:incident, process, security incident,
- Related:function, internet, network, response, role, technology,
- Gypsy verification environment
- IncludedBy:software development methodologies, verification,
- Related:flow, information, process, program, users,
- hackers
- IncludedBy:threat,
- Includes:cracker, hacking, script bunny,
- Related:Samurai, access, access control, attack, authorization, authorized, computer, computer network, critical, damage, hacking run, information, intelligence, internet, malicious, network, program, protocols, security, system, users,
- hacking
- IncludedBy:hackers,
- Related:authorized, information, network, security, system,
- hacking run
- Related:hackers,
- half-block
- handcarrier
- Related:authorized, classified, connection,
- handle
- Related:operation, process,
- handle via special access control channels only
- IncludedBy:access,
- Related:classified, requirements, security,
- handler
- Related:attack, control, incident, program, response,
- handshaking procedures
- Related:authentication, computer, identify, program, users,
- hard copy key
- IncludedBy:key,
- Related:program,
- hard disk
- hard-copy output
- hardened unique storage
- hardened unique storage Key
- IncludedBy:key,
- hardening
- Related:assurance, availability, business process, computer, function, process, security,
- hardware
- IncludedBy:cryptographic module,
- Related:computer, cryptographic, module, process, program, software, system,
- hardware and system software maintenance
- IncludedBy:software, system,
- Related:control, operation, security,
- hardware or software error
- IncludedBy:software, threat consequence,
- Related:operation, system,
- hardware token
- HasPreferred:tokens,
- hardwired key
- IncludedBy:key,
- hash
- IncludedBy:security,
- Includes:collision-resistant hash function, cryptographic hash function, hash algorithm, hash code, hash function, hash function identifier, hash result, hash token, hash totals, hash value, hashed message authentication code, hashing, hashword, keyed hash, keyed hash algorithm, secure hash algorithm, secure hash standard,
- Related:Challenge Handshake Authentication Protocol, Challenge-Response Authentication Mechanism, Cryptographic Message Syntax, Data Authentication Algorithm, Fortezza, MD2, MD4, MD5, POP3 APOP, Rivest-Shamir-Adleman algorithm, S/Key, SET private extension, SET qualifier, algorithm, certificate revocation tree, challenge-response protocol, checksum, code, cryptographic, cryptographic algorithm, cryptographic component, cryptographic service, cryptographic system, cryptography, cyclic redundancy check, data authentication code vs. Data Authentication Code, data items' representation, data string, digital signature, digital signature algorithm, domain parameter, dual signature, fingerprint, imprint, initializing value, integrity, integrity check, matrix, message, message authentication code vs. Message Authentication Code, message digest, message integrity code, one-time passwords, one-way function, output transformation, public-key forward secrecy, reduction-function, round-function, secure socket layer, thumbprint, witness, word,
- hash algorithm
- IncludedBy:algorithm, hash,
- Related:message,
- hash code
- IncludedBy:code, hash,
- Related:function, hash function, subject,
- hash function
- IncludedBy:function, hash,
- Related:algorithm, application, attack, authentication, cryptographic, cryptographic hash function, cryptography, data authentication code, domain, file, hash code, hash result, hash value, message, message authentication code, object, property, random, requirements, subject,
- hash function identifier
- IncludedBy:function, hash,
- Related:identify,
- hash result
- IncludedBy:hash,
- Related:function, hash function, message, process,
- hash token
- IncludedBy:hash, tokens,
- Related:code, control, domain, function, identify, signature,
- hash totals
- IncludedBy:hash,
- Related:file, information,
- hash value
- IncludedBy:hash,
- Related:cryptographic, function, hash function, message,
- hashed message authentication code
- IncludedBy:code, hash, message, message authentication code,
- Related:analysis, cryptographic, cryptography, function, key, software,
- hashing
- IncludedBy:hash,
- hashword
- IncludedBy:hash,
- hazard
- head of department of defense component
- health information exchange
- help desk
- Related:communications, computer, entity,
- hierarchical decomposition
- IncludedBy:development process,
- Related:system,
- hierarchical development methodology
- IncludedBy:software development methodologies,
- Related:flow, information, process, program,
- hierarchical input process output
- IncludedBy:process,
- hierarchical PKI
- IncludedBy:public-key infrastructure,
- Related:certification,
- hierarchy management
- IncludedBy:public-key infrastructure,
- Related:certificate, certification, key, process, public-key,
- hierarchy of trust
- IncludedBy:public-key infrastructure, trust,
- Related:certification,
- high assurance guard
- IncludedBy:assurance,
- Related:access, classified, control, message, software,
- high availability
- IncludedBy:availability,
- high impact
- Related:availability, damage, security, threat,
- high-impact system
- IncludedBy:system,
- Related:availability, information, integrity, object, security,
- hijack attack
- IncludedBy:attack,
- Related:IP splicing/hijacking, association, control, hijacking, pagejacking, spoofing, terminal hijacking,
- hijacking
- Related:application, attack, hijack attack, response, session hijack attack, system, users,
- hoax
- IncludedBy:threat,
- Related:social engineering, system, users,
- home office facility
- homed
- IncludedBy:firewall,
- Includes:tri-homed,
- Related:interface, network, security testing, test,
- honeypot
- Related:attack, authorized, file, resource, system, users,
- host
- IncludedBy:automated information system,
- Related:access, access control, application, communications, computer, computer network, information, internet, network, protocols, software, system, users,
- host based
- IncludedBy:automated information system,
- Related:audit, information, intrusion,
- host to front-end protocol
- IncludedBy:automated information system, protocols,
- Related:control,
- host-based firewall
- IncludedBy:automated information system, firewall,
- Related:application, computer, network, software,
- host-based intrusion prevention system
- IncludedBy:intrusion, system,
- Related:identify, program,
- host-based security
- IncludedBy:security,
- Related:attack, system, version,
- hot site
- IncludedBy:disaster recovery,
- Related:cold site, critical, software, system,
- hot wash
- Related:test,
- https
- Related:access, access control, internet, protocols, security,
- human error
- IncludedBy:threat consequence,
- Related:authorized, entity, function, system,
- human intelligence
- IncludedBy:intelligence,
- human user
- IncludedBy:target of evaluation, users,
- human-machine interface
- IncludedBy:interface,
- Related:control, software,
- hybrid encryption
- IncludedBy:encryption,
- Related:algorithm, application, confidentiality, cryptography, key,
- hybrid security control
- IncludedBy:control, security,
- hybrid threat
- IncludedBy:threat,
- Related:criminal, hybrid warfare, information, object, warfare,
- hybrid warfare
- IncludedBy:warfare,
- Related:criminal, hybrid threat, threat,
- hydrometer
- hydrophone
- hydroscope
- Related:object,
- hygrograph
- hygrometer
- hygroscope
- hyperlink
- IncludedBy:world wide web,
- Related:access, access control, information, link, object, users,
- hypermedia
- Related:internet, object,
- hypertext
- Related:access, access control, computer, internet, standard generalized markup language, world wide web,
- hypertext markup language
- IncludedBy:standard generalized markup language, world wide web,
- Related:application, file, semantics, system,
- hypertext transfer protocol
- IncludedBy:protocols, world wide web,
- Related:application, internet, network, response, secure socket layer,
- IA architecture
- IncludedBy:information assurance,
- Related:function, operation, security, system,
- IA infrastructure
- Related:management, risk, security,
- IA product
- Related:access, authentication, control, security,
- IA-enabled information technlogogy product
- IncludedBy:information,
- Related:role, router, security, system, technology, trust,
- IA-enabled information technology product
- IncludedBy:information, information assurance, technology,
- IA-enabled product
- Related:security, trust,
- ICMP flood
- IncludedBy:attack,
- Related:denial-of-service, protocols,
- identification
- IncludedBy:accountability, authentication,
- Includes:Identification Protocol, bank identification number, configuration identification, control identification list, identification and accreditation, identification and authentication, identification authentication, identification data, identification, friend or foe, identification, friend, foe, or neutral, identify, identity, identity based access control, identity-based security policy, key management identification number, personal identification number, privacy, authentication, integrity, identification, non-repudiation, radio frequency identification, risk identification, target identification and analysis techniques, terminal identification, trusted identification forwarding,
- Related:Attack Sensing and Warning, IT security support functions, SSO PIN, access, access control, alarm reporting, anonymity, anti-spoof, attribute certificate, bar code, biometric system, candidate TCB subset, certificate, class 2, 3, 4, or 5, comparisons, compromised key list, configuration control, digital forensics, digital id, domain controller, entity, firewall, formal development methodology, identity credential, identity credential issuer, individual electronic accountability, information systems security, information systems security equipment modification, key tag, network component, network sniffing, operations security, personal identity verification, pre-certification phase, primary account number, process, public-key derivation function, redundant identity, registration authority, relying party, repair action, resource, risk analysis, risk assessment, risk management, security controls, spoofing, system, target vulnerability validation techniques, threat assessment, token device, trusted agent, uniform resource identifier, user PIN, users, validate vs. verify, verification, vulnerability assessment,
- identification and accreditation
- IncludedBy:accreditation, identification,
- identification and authentication
- IncludedBy:assurance, identification,
- Related:access, access control, control, entity, identity, system, users,
- identification authentication
- IncludedBy:identification,
- Related:access, access control, code, computer, entity, identity, process, resource, response, users,
- identification data
- IncludedBy:identification,
- Related:domain, entity, identify, identity credential, key, policy, process, security, signature,
- Identification Protocol
- IncludedBy:identification, internet, protocols, security protocol,
- Related:access, access control, audit, authorization, connection, control, entity, identity, information, owner, system, users,
- identification, friend or foe
- IncludedBy:identification,
- identification, friend, foe, or neutral
- IncludedBy:identification,
- identifier
- Related:entity, identity, key,
- identify
- IncludedBy:identification,
- Related:CRYPTO, DoD Information Technology Security Certification and Accreditation Process, PKIX private extension, SATAN, SWOT analysis, TSEC nomenclature, Tripwire, access level, accountability, alert, antivirus software, audit, audit/review, bank identification number, baseline management, benchmarking, best practices, biometrics, business impact analysis, call back, call back security, certificate revocation list, certifier, configuration management, connection establishment, connection maintenance, connection teardown, dial back, distinguished name, electronic warfare support, evaluator actions, expert review team, external label, false negative, fishbone diagram, flow, handshaking procedures, hash function identifier, hash token, host-based intrusion prevention system, identification data, identity, identity credential, identity theft, individual accountability, information security, information systems security engineering, inspectable space, interface control document, intrusion detection, intrusion detection systems, intrusion detection tools, management server, mass mailing worm, message identifier, network behavior analysis system, network-based intrusion prevention system, observation reports, operations security, penetration signature, penetration test, penetration testing, persistent cookie, registration service, requirements for content and presentation, requirements for procedures and standards, reverse engineering, risk analysis, risk assessment, risk evaluation, risk identification, risk management, root cause analysis, security association identifier, security policy model, short title, signature, smartcards, sniffer, spyware detection and removal utility, stateful protocol analysis, system indicator, system security authorization agreement, system testing, terminal identification, test, test design, threat analysis, triangulation, uniform resource identifier, user id, user identifier, vulnerability analysis, vulnerability assessment, vulnerability audit, wireless intrusion detection and prevention system,
- identity
- IncludedBy:entity, identification,
- Includes:federated identity, identity based access control, identity binding, identity credential, identity credential issuer, identity management systems, identity proofing, identity registration, identity theft, identity token, identity validation, identity verification, identity-based security policy, personal identity verification, redundant identity, tradecraft identity, workcraft identity,
- Related:Identification Protocol, KMI-aware device, KOA agent, OAKLEY, applicant assertion, assurance, attribute authority, authenticate, authentication data, authentication exchange, authentication information, authentication mechanism, authentication protocol, authentication service, authenticator, authenticity, authorization, authorized, automated information system media control system, binding, biometric measurement, biometric system, biometrics, cardholder, certificate, certification authority, certify, challenge/response, claimant, comparisons, component, covert operation, credentials, criminal groups, cryptography, data integrity service, data origin authentication service, digital certificate, digital id, digital signature, digital signature algorithm, discrete process, discretionary access control, distinguished name, domain, electronic credentials, entity authentication of A to B, false acceptance, false rejection, false rejection rate, identification and authentication, identification authentication, identifier, identify, individual accountability, information, interoperability, key owner, masquerade attack, masquerading, mutual authentication, mutual entity authentication, non-repudiation, object, one-time passwords, organizational registration authority, password system, passwords, peer entity authentication service, personal identification number, personally identifiable information, phishing, physical access control, policy-based access control, principal, private accreditation information, protected channel, proxy server, pseudonym, public-key certificate, public-key infrastructure, references, registration, registration authority, relying party, response, role-based access control, secure socket layer, security, simple authentication, source authentication, strong authentication, subject, ticket, tokens, trust, undercover operation, unilateral authentication, users, validate vs. verify, verification, verified name, verifier, witness,
- identity based access control
- IncludedBy:access, control, entity, identification, identity,
- Related:authorization,
- identity binding
- IncludedBy:identity,
- identity credential
- IncludedBy:credentials, entity, identity,
- Related:identification, identification data, identify, identity credential issuer, information, users,
- identity credential issuer
- IncludedBy:credentials, entity, identity,
- Related:PIV issuer, access, access control, certification authority, identification, identity credential, resource, users, validate,
- identity management systems
- IncludedBy:entity, identity, system,
- Related:application, process, validation, verification,
- identity proofing
- IncludedBy:entity, identity,
- Related:authority, establishment, information, process, registration, validate,
- identity registration
- IncludedBy:identity,
- identity theft
- IncludedBy:entity, identity, theft,
- Includes:ACH debit fraud, account fraud,
- Related:dumpster diving, fraud, identify, information, keystroke logger, phishing, shoulder surfing, social engineering, spyware, subject,
- identity token
- IncludedBy:entity, identity, tokens,
- Related:key, object,
- identity validation
- IncludedBy:entity, identity, validation,
- Related:resource, test, users,
- identity verification
- IncludedBy:entity, identity, verification,
- Related:access, access control, process, system,
- identity-based security policy
- IncludedBy:entity, identification, identity, policy, security,
- Related:access, access control, object, process, resource, subject, system, users,
- IEEE 802.10
- Related:network, security, standard,
- IEEE P1363
- Related:cryptography, digital signature, encryption, key, public-key, signature, standard,
- illegal
- IncludedBy:risk,
- Includes:criminal, fraud, illegal drug use, illegal traffic, theft,
- Related:computer related crime, ethernet meltdown, suspicious contact, unclassified controlled nuclear information,
- illegal drug use
- IncludedBy:illegal,
- Related:authorized,
- illegal traffic
- IncludedBy:firewall, illegal,
- Related:bit forwarding rate, ruleset,
- Synonym:rejected traffic,
- image
- imagery
- Related:object,
- imagery intelligence
- IncludedBy:intelligence,
- Related:object,
- imaging system
- IncludedBy:system,
- Related:computer,
- IMAP4 AUTHENTICATE
- Related:authentication, challenge/response, key, protocols, response, security,
- imitative communications
- IncludedBy:communications,
- Related:message,
- imitative communications deception
- Related:adversary,
- immediate family member
- Related:access,
- immigrant alien
- impact
- Related:attack, authorized, availability, damage, incident, information, risk assessment, system,
- impact level
- Related:availability, security,
- impact value
- Related:availability,
- impersonating
- Related:spoof,
- Synonym:impersonation,
- impersonation
- IncludedBy:attack,
- Includes:verifier impersonation attack,
- Related:access, access control, active attack, address spoofing, authentication, authorized, computer, ip spoofing, man-in-the-middle attack, masquerading, mimicking, network, replay attacks, social engineering, spoofing, system, users,
- Synonym:impersonating, masquerade,
- implant
- Related:authorized, emanation, emanations security, information,
- implementation
- IncludedBy:target of evaluation,
- Related:process, software, target,
- implementation under test
- IncludedBy:test,
- Related:protocols, security testing,
- implementation vulnerability
- IncludedBy:vulnerability,
- Related:software,
- implicit key authentication from A to B
- IncludedBy:authentication, key,
- Related:assurance, entity,
- imported software
- IncludedBy:software,
- imprint
- Related:code, hash,
- improved emergency message automatic transmission system
- IncludedBy:message, system,
- in the clear
- Related:encryption,
- inadvertent disclosure
- IncludedBy:incident,
- Related:access, access control, authorized, exposures, information, risk,
- inadvertent disclosure incident
- Related:access, authorized, classified, security, security incident,
- inappropriate usage
- IncludedBy:threat,
- incapacitation
- IncludedBy:risk, threat consequence,
- Related:critical, critical infrastructures, operation, system,
- incident
- IncludedBy:threat,
- Includes:COMSEC incident, Computer Incident Advisory Capability, Forum of Incident Response and Security Teams, Guidelines and Recommendations for Security Incident Processing, IT security incident, attack, automated security incident measurement, compromise, computer incident assessment capability, computer intrusion, computer security incident, computer security incident response capability, computer security incident response team, contamination, cyber incident, data compromise, denial-of-service, flooding, inadvertent disclosure, incident handling, incident response capability, multiple component incident, probe, program automated information system security incident support team, security incident, security intrusion, suspicious event,
- Related:COMSEC insecurity, antivirus software, availability, classified information spillage, communications security, computer, computer emergency response team, event, failure access, handler, impact, indication, information, infrastructure assurance, integrity, intrusion, intrusion detection, intrusion detection and prevention, intrusion prevention, intrusion prevention system, joint task force-computer network defense, mitigation, precursor, process, protective technologies, response, security, security controls, security event, security policy, signature, spyware detection and removal utility, standard, system, vulnerability,
- incident handling
- IncludedBy:incident, response,
- PreferredFor:incident response,
- Related:security,
- incident of security concern
- IncludedBy:security,
- Related:access, attack, authorized, classified,
- incident response
- HasPreferred:incident handling,
- incident response capability
- IncludedBy:incident, response,
- Related:control, operation, security, system,
- incident response plan
- Related:attack, cyberspace,
- incomplete parameter checking
- IncludedBy:threat,
- Related:penetration, system,
- inculpatory evidence
- independence
- Related:audit,
- independent assessment
- IncludedBy:assessment,
- Related:control, evaluation, security, system,
- independent research and development
- independent review and evaluation
- IncludedBy:evaluation,
- Related:system,
- independent validation and verification
- IncludedBy:validation, verification,
- Related:analysis, requirements, security testing, software, software development, test, users,
- independent validation authority
- Related:control, requirements, risk, security, software,
- indication
- Related:incident, malware, security,
- Synonym:signature,
- indicator
- Related:adversary, attack,
- indirect certificate revocation list
- IncludedBy:certificate, public-key infrastructure, revocation,
- Related:X.509,
- indistinguishability
- Related:algorithm, encryption, security,
- individual accountability
- Related:access, access control, computer, entity, identify, identity, system, users,
- individual electronic accountability
- Related:access, access control, authentication, identification, system, users,
- individuals
- Related:privacy,
- indoctrination
- Related:access,
- industrial control system
- IncludedBy:control,
- industrial espionage
- industrial security
- IncludedBy:security,
- Related:classified, information security,
- industry standard architecture
- IncludedBy:standard,
- Related:automated information system,
- infection
- IncludedBy:threat,
- Related:malicious, virus, worm,
- inference
- IncludedBy:threat consequence,
- Related:access, access control, authorized, communications, entity,
- informal
- Antonym:formal,
- Includes:informal specification,
- informal security policy
- IncludedBy:policy, security,
- Related:function,
- informal specification
- Antonym:formal specification,
- IncludedBy:development process, informal,
- information
- Includes:American Standard Code for Information Interchange, Automated Information System security, Common Criteria for Information Technology Security, Common Criteria for Information Technology Security Evaluation, Defense Information Infrastructure, Defense Information System Network, Defensive Information Operations, DoD Information Technology Security Certification and Accreditation Process, European Information Technology Security Evaluation Criteria, Federal Criteria for Information Technology Security, Federal Information Processing Standards, Federal Information Processing Standards Publication 140, IA-enabled information technlogogy product, IA-enabled information technology product, Information Systems Security products and services catalogue, Information Technology Security Evaluation Criteria, National COMSEC Information Memorandum, National Security Telecommunications and Information Systems Security Advisory/Information Memorandum, National Security Telecommunications and Information Systems Security Committee, National Security Telecommunications and Information Systems Security Directive, National Security Telecommunications and Information Systems Security Instruction, National Security Telecommunications and Information Systems Security Policy, National Telecommunications and Information Administration, National Telecommunications and Information Systems Security Advisory Memoranda/Instructions, National Telecommunications and Information Systems Security Directive, National Telecommunications and Information Systems Security Instruction, National Telecommunications and Information Systems Security Policy, Subcommittee on Information Systems Security, authentication information, automated information system, bandwidth, biometric information, center for information technology excellence, certified information systems security professional, chief information agency officer, chief information officer, classified information, classified information spillage, control information, control objectives for information and related technology, defense-wide information assurance program, directory information base, disclosure of information, endorsed for unclassified cryptographic information, executive information systems, global information grid, global information infrastructure, global network information environment, information and communications, information architecture, information assurance, information assurance manager, information assurance officer, information assurance product, information category, information center, information engineering, information environment, information flow, information flow control, information operations, information owner, information processing standard, information protection policy, information ratio, information resources, information security, information security policy, information security testing, information sharing and analysis center, information superhighway, information superiority, information system, information system security officer, information systems audit and control association, information systems audit and control foundation, information systems security, information systems security association, information systems security engineering, information systems security equipment modification, information systems security manager, information systems security officer, information systems security product, information systems/technology, information technology, information technology system, information type, information warfare, major information system, management information base, multilevel information systems security initiative, national information assurance partnership, national information infrastructure, national security information, national telecommunications and information system security directives, network information services, non-repudiation information, official information, operational vulnerability information, private accreditation information, program automated information system security incident support team, proprietary information, public information, public-key information, request for information, security information object, security information object class, security policy information file, sensitive compartmented information, sensitive compartmented information facility, sensitive information, special information operations, status information, subcommittee on Automated Information System security, technical vulnerability information, wide area information service,
- Related:Abrams, Jojodia, Podell essays, Abstract Syntax Notation One, BLACK, Bell-LaPadula security model, British Standard 7799, C2-attack, C2-protect, CASE tools, CCI equipment, COMSEC equipment, COMSEC insecurity, COMSEC modification, COMSEC survey, COMSEC system data, CRYPTO, Digital Signature Standard, FIPS PUB 140-1, Federal Criteria Vol. I, Federal Standard 1027, Forum of Incident Response and Security Teams, Generic Upper Layer Security, Green book, Gypsy verification environment, IS related risk, IT Security Evaluation Criteria, IT security, IT security controls, IT security database, IT security incident, IT security policy, IT-related risk, Identification Protocol, Integrated CASE tools, International Traffic in Arms Regulations, International organization for standardization, Internet Corporation for Assigned Names and Numbers, Internet Protocol Security Option, NIAP Common Criteria Evaluation and Validation Scheme, National Institute of Standards and Technology, National Security Agency, National Security Decision Directive 145, PKCS #11, PKIX, POSIX, RED, RED signal, RED team, RED/BLACK concept, RED/BLACK separation, SAML authentication assertion, SET private extension, SET qualifier, Secure Electronic Transaction, TEMPEST, TOE security functions interface, Tripwire, Type 1 key, Type 2 key, Type I cryptography, Type II cryptography, Type III cryptography, Wassenaar Arrangement, X.500 Directory, acceptance inspection, access, access control, account aggregation, account management, accountability, accreditation, accreditation authority, accreditation boundary, accreditation multiplicity parameter, adequate security, administration documentation, adversary, aggregation, alarm reporting, alarm surveillance, analysis of alternatives, anonymity, anti-jam, applicant assertion, application data backup/recovery, application server attack, approval/accreditation, approved technologies list, architecture, archive, assessment, asset, association, assurance, asynchronous communication, attack, attackers, attribute certificate, audit record, audit service, audit trail, authentication, authentication code, authentication data, authentication exchange, authenticity, authorized person, authorizing official, automated security incident measurement, availability, banner grabbing, bar code, binding, biometric authentication, bit, block chaining, boundary host, breach, browser, browsing, buffer overflow, business areas, byte, capability, cardholder, cascading, category, certificate, certificate policy qualifier, certificate status responder, certificate user, certification, certification authority, certification path, challenge, challenge/response, channel, channel capacity, checksum, ciphertext, ciphony, class 2, 3, 4, or 5, classification levels, classified, clearance level, cleartext, code, collaborative computing, color change, command and control warfare, common criteria, common criteria version 1.0, common criteria version 2.0, communication channel, communications cover, communications protocol, communications security, compartment, compartmentalization, compartmented mode, compensating security controls, compromise, compromising emanations, computer abuse, computer cryptography, computer emergency response team, computer intrusion, computer network attack, computer network defense, computer network exploitation, computer security, computer security incident, computer security incident response team, computer security intrusion, computer security technical vulnerability reporting program, concealment system, confidentiality, configuration control, connection, contactless smart card, control, control objectives, control zone, controlled cryptographic item, controlled interface, controlled security mode, cookies, corporate security policy, correctness, correctness integrity, counterintelligence, countermeasures, cover-coding, covert channel, covert channel analysis, covert timing channel, cracker, credentials, criteria, critical security parameters, critical system, criticality, criticality/sensitivity, cross domain solution, cryptographic algorithm for confidentiality, cryptographic check value, cryptographic token, cryptography, cryptosystem survey, cyberattack, cybersecurity, cyberspace, cyberspace operations, data, data aggregation, data architecture, data communications, data compromise, data confidentiality, data custodian, data encryption standard, data flow control, data integrity, data storage, data synchronization, database, database management system, database server, datagram, decrypt, dedicated mode, dedicated security mode, defense-in-depth, degausser, degausser products list, demilitarized zone, descriptive top-level specification, designated approving authority, diagnostics, digital document, digital forensics, digital id, digital signature, direct data feed, directory service, directory vs. Directory, distinguished name, distinguishing identifier, distribution point, documentation, domain controller, domain name system, domain of interpretation, dongle, downgrade, dual control, due care, dumpster diving, eavesdropping, eavesdropping attack, electronic authentication, electronic commerce, electronic security, electronic signature, electronic warfare support, emanation, emanations security, emissions security, encipherment, encode, encryption, end-to-end encryption, end-to-end security, endorsed for unclassified cryptographic item, endorsement, entry label, erasure, error detection code, evaluated products list, evaluator actions, evidence, executive steering committee, expert review team, explain, exploit, exploitable channel, extension, facilities, fiber-optics, fishbowl, flooding, formal access approval, format, framing, general support system, global command and control system, guard, hackers, hacking, hash totals, hierarchical development methodology, high-impact system, host, host based, hybrid threat, hyperlink, identity, identity credential, identity proofing, identity theft, impact, implant, inadvertent disclosure, incident, input data, inspectable space, instrumentation, integrity, integrity policy, intelligence, interconnection security agreements, interface, interference, interim accreditation, interim approval to operate, interim approval to test, interleaving attack, internal system exposure, internet control message protocol, interoperability, interoperability standards/protocols, intranet, intrusion, intrusion detection, intrusion detection systems, key agreement, key establishment, key exchange, key tag, key wrapping, keying material, laboratory attack, leapfrog attack, legacy data, legacy systems, level of protection, levels of concern, lifecycle management, lines of business, link encryption, logical system definition, low-impact system, magnetic remanence, major application, malware, man-in-the-middle attack, management controls, management server, mandatory access control, master file, match, memory scavenging, merchant, message externals, metadata, mission critical, mobile code, mode of operation, moderate-impact system, modes of operation, multi-security level, multicast, multilevel mode, multilevel secure, multilevel security, multilevel security mode, multimedia, multiuser mode of operation, national computer security assessment program, national security system, nations, need-to-know, need-to-know determination, network, network connection, network management protocol, network security, network security officer, network sniffing, non-discretionary security, non-repudiation, non-repudiation exchange, non-technical countermeasure, object, object identifier, on ramp, one-part code, one-time passwords, online certificate status protocol, open storage, open systems interconnection, operational controls, operational documentation, operational key, operations security, oracle, organisational security policy, out-of-band, output, output data, packet, packet filtering, packet switching, partitioned security mode, passive, passive threat, passwords, payload, people, periods processing, personalization service, personnel security, pharming, phishers, phishing, phreaking, physical security, post-accreditation phase, preferred products list, privacy, privacy impact assessment, privacy protection, private accreditation exponent, private data, private key, probe, process, product rationale, promiscuous mode, proprietary, protected distribution systems, protection needs elicitation, protective distribution system, protective technologies, protocol converter, protocol data unit, protocols, psychological operations, public law 100-235, public-key, public-key certificate, public-key infrastructure, purge, purging, radio frequency identification, read, read access, real-time, records, recovery site, redundancy, references, register, register entry, registration authority, regrade, reliability, relying party, remanence, remote access, remote authentication dial-in user service, remote diagnostics, repository, repudiation, requirements for content and presentation, residual risk, residue, resource, review techniques, risk, risk analysis, risk assessment, risk management, rootkit, routing, rules of engagement, sample, sanitization, sanitize, sanitizing, scanning, screen scraping, secrecy policy, secret, sector coordinator, sector liaison, secure channel, security, security assertion markup language, security association, security attribute, security breach, security category, security certificate, security clearance, security controls, security domain, security evaluation, security event, security flow analysis, security incident, security label, security level, security management, security management infrastructure, security plan, security policy, security policy model, security requirements, security situation, security strength, security tag, security violation, semantic security, sensitive, sensitive label, sensitivity, sensitivity label, signaling, significant change, simple authentication, simple network management protocol, single-level device, smartcards, sniffer, social engineering, soft TEMPEST, solicitation, source integrity, spammers, special access program, special access program facility, spillage, split knowledge, spoofing, spread spectrum, spyware, state, stateful packet filtering, strong authentication, sub-function, subcommittee on telecommunications security, subject, subsystem, superencryption, system, system entity, system high mode, system low, system retention/backup, system security, system security engineering, system security officer, system security policy, system-high security mode, systems security steering group, tamper, target identification and analysis techniques, target vulnerability validation techniques, technical controls, technical countermeasures, technical security policy, telecommunications, teleprocessing, terrorists, threat, threat agent, threat analysis, threat assessment, threat monitoring, token backup, token copy, token device, tokens, topology, traceroute, traffic analysis, transaction, transmission, transmission security, trapdoor, trojan horse, trust, trusted channel, trusted computer system, trusted gateway, trusted identification forwarding, trusted path, trusted platform module chip, trusted subject, trusted time stamp, type 1 products, type 2 product, type 3 key, type 3 product, type certification, unauthorized disclosure, unclassified, uniform resource locator, user documentation, user partnership program, user representative, users, validate vs. verify, validated products list, vaulting, verification, verifier impersonation attack, virtual departments or divisions, virtual private network, vulnerability, vulnerability analysis, vulnerability assessment, vulnerability audit, web bug, website, wireless technology, wiretapping, workflow, workstation, world wide web, worm, write,
- information and communications
- IncludedBy:communications, critical infrastructures, information,
- Related:critical, process, software, telecommunications,
- information architecture
- IncludedBy:automated information system, information,
- Related:function, interface,
- information assurance
- IncludedBy:assurance, information,
- Includes:IA architecture, IA-enabled information technology product, defense-wide information assurance program, information assurance manager, information assurance officer, information assurance product, national information assurance partnership,
- Related:Defensive Information Operations, access, adversary, authentication, authorized, availability, certification, common criteria, confidentiality, exploit, information security, information systems security manager, integrity, intrusion, level of protection, levels of concern, malicious, non-repudiation, object, operation, requirements, system, trust, vulnerability,
- information assurance component
- IncludedBy:assurance,
- Related:software,
- information assurance manager
- IncludedBy:information, information assurance,
- Related:system,
- information assurance officer
- IncludedBy:information, information assurance, officer,
- Related:network security officer, system, system administrator,
- information assurance product
- IncludedBy:information, information assurance,
- Related:access, access control, authentication, authorized, control, integrity, intrusion, intrusion detection, malicious, system, technology, vulnerability,
- information category
- IncludedBy:information,
- Related:access, access control, classified, control, process, security, system, technology,
- information center
- IncludedBy:automated information system, information,
- information domain
- Related:security,
- information engineering
- IncludedBy:automated information system, information,
- Related:system,
- information environment
- IncludedBy:automated information system, information,
- Related:process, system,
- information flow
- IncludedBy:automated information system, flow, information,
- Related:computer, system,
- information flow control
- IncludedBy:control, flow, information,
- Includes:object,
- PreferredFor:flow control,
- Related:security, system,
- information integrity
- information management
- IncludedBy:management,
- Related:control,
- information operations
- IncludedBy:automated information system, information, operation,
- Related:adversary, system,
- information owner
- IncludedBy:information, owner,
- Related:authority, control, operation, process,
- information processing standard
- IncludedBy:information, process, standard,
- Related:communications, function, interoperability, operation, security testing, software, telecommunications, test,
- information protection policy
- IncludedBy:information, policy,
- Related:assurance, operation, security policy, threat,
- information rate
- HasPreferred:bandwidth,
- information ratio
- IncludedBy:automated information system, information,
- information resources
- IncludedBy:information, resource,
- Related:technology,
- information security
- IncludedBy:information, security,
- Includes:information security oversight office, information security policy, information security testing, information systems security,
- Related:Abrams, Jojodia, Podell essays, British Standard 7799, DoD Information Technology Security Certification and Accreditation Process, Forum of Incident Response and Security Teams, International Traffic in Arms Regulations, National Institute of Standards and Technology, National Security Agency, Sensitive Information Computer Security Act of 1987, access, access control, activity security manager, attack, authorized, availability, communications security, computer, confidentiality, contractor special security officer, control, critical, due care, identify, industrial security, information assurance, information system security officer, integrity, management controls, mission critical, national information assurance partnership, national security system, non-technical countermeasure, process, public-key infrastructure, review techniques, risk, rules of engagement, security policy, system, target identification and analysis techniques, target vulnerability validation techniques, technical countermeasures, threat, users, vulnerability,
- information security architect
- IncludedBy:security,
- Related:requirements,
- information security architecture
- IncludedBy:security,
- information security oversight office
- IncludedBy:information security,
- Related:classified,
- information security policy
- IncludedBy:information, information security, policy,
- information security program plan
- IncludedBy:security,
- Related:control, management, requirements,
- information security risk
- IncludedBy:risk,
- Related:access,
- information security testing
- IncludedBy:information, information security, security testing, test,
- Related:control, process, requirements, system,
- information sharing
- Related:requirements,
- information sharing and analysis center
- IncludedBy:analysis, information,
- Related:intrusion, threat, vulnerability,
- information sharing environment
- Related:access, control, security, trust,
- information steward
- Related:access, control, management, security,
- information superhighway
- IncludedBy:information,
- Related:communications, system,
- information superiority
- IncludedBy:information,
- Related:adversary, exploit, flow, process,
- information system
- IncludedBy:information, system,
- Related:computer, control, process, resource,
- information system and network security
- IncludedBy:network, security,
- Related:availability,
- information system lifecycle
- Related:development,
- information system owner
- Related:development,
- information system resilience
- Related:attack,
- information system security engineer/system design security officer
- IncludedBy:security,
- Related:requirements,
- information system security officer
- IncludedBy:computer security, information, officer, system, system security officer,
- Related:authority, information security, operation, owner, program,
- information system storage device
- information systems audit and control association
- IncludedBy:association, audit, control, information, system,
- information systems audit and control foundation
- IncludedBy:audit, control, information, system,
- information systems security
- IncludedBy:information, information security, system, threat,
- Includes:network security, system security, system security engineering, telecommunications security,
- Related:access, access control, authentication, authorized, denial-of-service, encryption, identification, process, unauthorized access, users,
- Synonym:computer security,
- information systems security association
- IncludedBy:association, computer security, information, system,
- information systems security engineering
- IncludedBy:computer security, information, requirements, system, threat,
- Related:communications, countermeasures, identify, process, risk management, vulnerability,
- information systems security equipment modification
- IncludedBy:computer security, information, system,
- Includes:COMSEC modification,
- Related:authentication, control, encryption, function, identification, key, message, policy, software,
- information systems security manager
- IncludedBy:computer security, information, system,
- Related:assurance, information assurance, program,
- information systems security officer
- IncludedBy:computer security, information, officer, system,
- Includes:network security officer,
- Related:operation, program,
- information systems security product
- IncludedBy:information, security, system,
- Related:module,
- Information Systems Security products and services catalogue
- IncludedBy:computer security, information, system,
- Includes:degausser products list, endorsed tools list, evaluated products list, preferred products list,
- information systems security representative
- IncludedBy:security,
- information systems/technology
- IncludedBy:information, system, technology,
- information technology
- IncludedBy:automated information system, information, technology,
- Related:communications, computer, control, function, management, process, resource, software, system, telecommunications,
- Information Technology Security Evaluation Criteria
- IncludedBy:computer security, criteria, evaluation, information, technology,
- Related:assurance, function, standard,
- information technology system
- IncludedBy:automated information system, information, system, technology,
- Related:communications, computer,
- information type
- IncludedBy:information,
- Related:policy, privacy, security,
- information warfare
- IncludedBy:information, threat, warfare,
- Related:adversary, exploit, function, object, operation, process, system,
- infrastructure
- Related:flow, function, security, system,
- infrastructure assurance
- IncludedBy:assurance,
- Related:confidence, critical, critical infrastructures, damage, incident, response, risk, risk management, threat,
- infrastructure protection
- IncludedBy:critical infrastructures,
- Related:assurance, critical, risk, threat, vulnerability,
- ingress filtering
- Related:internet, process, security,
- inheritance
- Related:object,
- initial operating capability
- Related:requirements,
- initial transformation
- Related:algorithm, function, network,
- initialization value
- Related:algorithm, cipher, cryptographic, key, message, process,
- Synonym:initialization vector,
- initialization vector
- IncludedBy:data encryption standard,
- Related:algorithm, cipher, cryptographic, encryption, operation, process,
- Synonym:initialization value,
- initialize
- Related:cryptographic, cryptography, encryption, key,
- initializing value
- Related:cipher, encipherment, function, hash, process,
- initiator
- Related:authentication,
- inline sensor
- input
- Related:resource,
- input data
- IncludedBy:cryptographic module,
- Related:cryptographic, information, module,
- input preparation cycle
- Related:operation, process,
- input/output
- Related:automated information system,
- insertion
- IncludedBy:threat consequence,
- Related:authorized, entity,
- inside threat
- IncludedBy:threat,
- Related:access,
- insider
- IncludedBy:threat,
- Includes:insider attack, insider threat,
- Related:access, attack, authorization, authorized, compromise, computer, covert channel, damage, entity, malicious intruder, resource, security, security perimeter, system,
- insider attack
- IncludedBy:attack, insider,
- Related:insider threat, network,
- insider threat
- IncludedBy:insider,
- Related:abuse of privilege, access, insider attack, internal vulnerability, security,
- inspectable space
- Related:TEMPEST, authority, classified, control, identify, information, process,
- instance
- Related:object,
- instantiate
- Institute of Electrical and Electronics Engineers, Inc
- institute of internal auditors
- IncludedBy:audit,
- instrument
- Related:operation, security testing, software, system, test,
- instrumentation
- Related:analysis, code, information, operation, program, software, system,
- integral file block
- Integrated CASE tools
- Related:analysis, code, information, software,
- integrated logistics support
- Integrated services digital network
- IncludedBy:network,
- Related:communications, computer, interface, standard, system, users,
- integrated test facility
- IncludedBy:test,
- Related:software development,
- integration test
- IncludedBy:test,
- Related:file, interface, process, program, software development,
- integrity
- IncludedBy:assurance, quality of protection, security goals,
- Includes:Biba Integrity model, Clark Wilson integrity model, authenticity, checksum, connectionless data integrity service, correctness, correctness integrity, data authentication code, data integrity, data integrity service, error detection code, file integrity checker, file integrity checking, integrity check, integrity check value, integrity policy, integrity-checking tools, message integrity code, operational integrity, privacy, authentication, integrity, identification, non-repudiation, privacy, authentication, integrity, non-repudiation, secure hash algorithm, source integrity, system and data integrity, system integrity, system integrity service, two-person integrity,
- Related:Biba model, Common Criteria for Information Technology Security, Generic Security Service Application Program Interface, Generic Upper Layer Security, IT security, IT security controls, IT security incident, Rivest-Shamir-Adleman algorithm, Secure Electronic Transaction, access, access control, adequate security, antivirus software, application server attack, archive, asymmetric cryptography, attack, authenticate, authentication, authentication code, authentication header, authentication header protocol, authorized, business process, common security, communications security, computer, computer abuse, computer emergency response team, computer forensics, computer related controls, computer security, configuration control, critical system files, cut-and-paste attack, cyclic redundancy check, data contamination, data encryption key, data encryption standard, data origin authentication service, data security, database management system, defense-in-depth, defense-wide information assurance program, destruction, digital forensics, digital signature, digital signature algorithm, digital watermarking, domain name system, dominated by, dual signature, encapsulating security payload, encapsulating security payload protocol, entry-level certification, front-end security filter, function, general controls, guard, hash, high-impact system, incident, information, information assurance, information assurance product, information security, internet protocol security, intrusion, kerberos, key wrapping, level of concern, levels of concern, line managers, low-impact system, malicious, malicious code, malware, message authentication code, message authentication code vs. Message Authentication Code, message digest, mid-level certification, moderate-impact system, network management, network security, non-repudiation, object, post-accreditation phase, potential impact, privacy enhanced mail, process, property, protected channel, protection suite, public-key certificate, public-key infrastructure, quality, reference monitor, requirements for procedures and standards, review techniques, sandboxed environment, seal, secure DNS, secure envelope, secure hypertext transfer protocol, secure shell, secure single sign-on, secure socket layer, security category, security controls, security event, security objectives, security policy, security requirements, signature, signed applet, simple key management for IP, simple network management protocol, software, supervisory control and data acquisition, system, threat, top-level certification, transmission, trojan horse, trust, trusted channel, trusted computer system, verification, virtual private network, vulnerability,
- integrity check
- IncludedBy:integrity,
- Related:cryptographic, cryptography, hash,
- integrity check value
- IncludedBy:integrity,
- integrity policy
- IncludedBy:integrity, policy,
- Related:authorized, information, security, security policy, users,
- integrity-checking tools
- IncludedBy:integrity, security software,
- intellectual property
- IncludedBy:property,
- Related:control,
- intelligence
- Includes:Director Central Intelligence Directive, Director of Central Intelligence Directive, Foreign Intelligence Surveillance Act, acoustic intelligence, advanced intelligence network, command, control, communications and intelligence, communications intelligence, compartmented intelligence, counterintelligence, counterintelligence assessment, designated intelligence disclosure official, economic intelligence, electronic intelligence, foreign intelligence, foreign intelligence service, human intelligence, imagery intelligence, intelligence activities, intelligence activity, intelligence collection, intelligence community, intelligence community classification and control markings implementation, intelligence cycle, intelligence information, intelligence sources and methods, intelligence special access program, intelligence system, measurement and signature intelligence, national intelligence, open source intelligence, senior intelligence officer, senior officials of the intelligence community, special intelligence, telemetry intelligence,
- Related:Defense Information Infrastructure, Defense Information Systems Network Designated Approving Authority, Defense Security Service, Defensive Information Operations, National Security Agency, accreditation, acquisition special access program, acquisition systems protection, adversary, alternative compensatory control measures, analysis, asset, authorized adjudicative agency, authorized classification and control markings register, authorized investigative agency, brute force attack, case officer, classification markings and implementation working group, cognizant security agency, command and control warfare, compromising emanations, computer network exploitation, controlled access program coordination office, controlled access program oversight committee, controlled access programs, cryptology, determination authority, dissemination, distributed control system, electronic warfare support, emanation, emergency action plan, espionage, evaluation, exploitation, foreign, hackers, information, internal vulnerability, national security information, national security system, non-disclosure agreement, operations security, packet switching, personnel security exceptions, physical security waiver, principal accrediting authority, process, program protection plan, reciprocity, report of investigation, risk avoidance, scattered castles, security environment threat list, senior review group, sensitive activities, sensitive compartmented information, sensitive compartmented information facility, sensitive compartmented information facility accreditation, sensitive compartmented information facility database, signal flags, single scope background investigation - periodic reinvestigation, special access program, special access required programs oversight committee, special activity, special security center, sponsoring agency, suspicious contact, systems security steering group, tear line, technical threat analysis, threat assessment, traffic analysis, unconventional warfare,
- intelligence activities
- IncludedBy:intelligence,
- Related:authorized,
- intelligence activity
- IncludedBy:intelligence,
- Related:authorized,
- intelligence collection
- IncludedBy:intelligence,
- intelligence community
- IncludedBy:intelligence,
- Related:foreign, program, security,
- intelligence community classification and control markings implementation
- IncludedBy:intelligence,
- Related:authorized,
- intelligence cycle
- IncludedBy:intelligence,
- Related:users,
- intelligence information
- IncludedBy:intelligence,
- intelligence sources and methods
- IncludedBy:intelligence,
- Related:analysis, authorization,
- intelligence special access program
- IncludedBy:access, intelligence,
- intelligence system
- IncludedBy:intelligence,
- intelligent electronic device
- Related:control, function, process,
- intelligent threat
- IncludedBy:threat,
- Related:adversary, algorithm, cipher, cryptography, encryption, exploit, key, operation, vulnerability,
- intending citizen
- intent
- Related:critical, object, security,
- intention
- inter-TSF transfers
- IncludedBy:TOE security functions, target of evaluation,
- Related:function, trust,
- interactive mode
- Related:computer, response,
- interarea interswitch rekeying key
- IncludedBy:key, rekey,
- intercept
- IncludedBy:threat,
- Related:access, interception,
- interception
- IncludedBy:threat consequence,
- Related:access, access control, authorized, entity, intercept,
- interconnected network
- IncludedBy:network,
- interconnection security agreements
- IncludedBy:connection, security,
- Related:authorization, control, information, requirements, risk, system,
- interdependence
- Related:risk,
- interdependency
- interdiction
- HasPreferred:denial-of-service,
- interface
- Includes:Cryptographic Application Program Interface, Generic Security Service Application Program Interface, TOE security functions interface, application program interface, application programming interface, common gateway interface, contact interface, contactless interface, controlled interface, cryptographic application programming interface, fiber distributed data interface, fill device interface unit, graphical-user interface, human-machine interface, interface control document, interface control unit, interface testing, internetwork private line interface, layer management interface, network interface card, secure digital net radio interface unit, security support programming interface, user interface, user interface system,
- Related:FIPS PUB 140-1, Green book, Integrated services digital network, PC card, PKCS #11, POSIX, TTY watcher, access, access control, application, architecture, bit forwarding rate, block cipher, boundary, buffer overflow, code, communications, computer, connection, connection establishment time, connection teardown time, console, cryptographic, cryptography, data source, distributed computing environment, dual-homed gateway firewall, email packages, ethernet sniffing, extensibility, firewall, flow, formal security policy model, function, gateway, goodput, homed, information, information architecture, integration test, line conditioning, line conduction, module, on-line system, payment gateway, process, program, promiscuous mode, protocol data unit, proximity, remote terminal emulation, ruleset, scope of a requirement, significant change, smartcards, software, software system test and evaluation process, stealth mode, subnetwork, system, teleprocessing, tri-homed, trusted agent, user representative, users,
- interface control document
- IncludedBy:control, interface,
- Related:authorization, baseline, evaluation, identify, lifecycle, operation,
- interface control unit
- IncludedBy:automated information system, control, interface,
- interface testing
- IncludedBy:interface, security testing, test,
- Related:control, system,
- interference
- IncludedBy:threat consequence,
- Related:communications, control, information, operation, system, users,
- interim access authorization
- IncludedBy:access, authorization,
- Related:temporary access eligibility,
- interim accreditation
- IncludedBy:accreditation,
- Related:authorization, information, process, security, system,
- interim accreditation action plan
- IncludedBy:accreditation,
- Related:control, critical, operation, owner, program, resource, risk, security, system,
- interim approval to operate
- Related:authorization, classified, evaluation, information, process, security, system,
- interim approval to test
- IncludedBy:test,
- Related:authorization, information, operation, system,
- interim security clearance
- IncludedBy:security,
- Related:requirements, temporary access eligibility,
- interleaving attack
- IncludedBy:attack,
- Related:authentication, information,
- internal communication channel
- IncludedBy:channel, communication channel, communications, target of evaluation,
- internal control questionnaire
- IncludedBy:control,
- internal fraud
- IncludedBy:fraud, operational risk loss,
- Related:policy, property,
- internal label
- internal network
- IncludedBy:network,
- Related:control, security,
- internal rate of return
- internal security controls
- IncludedBy:control, risk management, security controls,
- Includes:subject,
- Related:access, access control, authorized, program, resource, software, system,
- internal security testing
- IncludedBy:security testing, test,
- Related:security perimeter,
- internal subject
- IncludedBy:subject,
- Related:function, process, system, users,
- internal system exposure
- IncludedBy:exposures, system,
- Related:access, access control, assurance, authorization, information, process, security,
- internal throughput time
- internal TOE transfer
- IncludedBy:target of evaluation,
- internal vulnerability
- IncludedBy:vulnerability,
- Related:access, classified, insider threat, intelligence, trust,
- International Data Encryption Algorithm
- IncludedBy:algorithm, encryption, symmetric algorithm,
- Related:key,
- international organization
- International organization for standardization
- IncludedBy:automated information system, standard,
- Includes:Open Systems Interconnection Reference model,
- Related:ITU-T, information, process, system, technology,
- international standards organization
- IncludedBy:standard,
- international telecommunication union
- Related:network,
- International Traffic in Arms Regulations
- Related:TEMPEST, authority, control, cryptographic, cryptography, information, information security, security, system, technology,
- internet
- Includes:ARPANET, Distributed Authentication Security Service, Generic Security Service Application Program Interface, IP address, Identification Protocol, Internet Architecture Board, Internet Assigned Numbers Authority, Internet Corporation for Assigned Names and Numbers, Internet Draft, Internet Engineering Steering Group, Internet Engineering Task Force, Internet Message Access Protocol, version 4, Internet Policy Registration Authority, Internet Protocol Security Option, Internet Security Association and Key Management Protocol, Internet Society, Internet Society Copyright, Internet Standard, Internet Standards document, Internet worm, MIME Object Security Services, PKIX, POP3 AUTH, Post Office Protocol, version 3, Rexd, SOCKS, Secure/MIME, Simple Authentication and Security Layer, Simple Key-management for Internet Protocols, Terminal Access Controller Access Control System, USENET, anonymous login, cyberspace, domain name service server, domain name system, e-banking, e-mail server, email, extranet, file transfer protocol, firewall, gateway server, internet control message protocol, internet key exchange protocol, internet protocol, internet protocol security, internet service provider, internet vs. Internet, internetwork, internetwork private line interface, intranet, listserv, mailing list, management information base, markup language, multipurpose internet mail extensions, point-to-point protocol, port, pretty good privacy, proxy server, router, secure hypertext transfer protocol, secure multipurpose internet mail extensions, secure shell, simple mail transfer protocol, simple network management protocol, sniffer, telnet, traceroute, transmission control protocol, transmission control protocol/internet protocol, transport layer security, tunnel, uniform resource identifier, uniform resource locator, uniform resource name, user data protocol, virtual private network, wide area information service, world wide web, worm,
- Related:Green book, Guidelines and Recommendations for Security Incident Processing, IPsec Key Exchange, Layer 2 Forwarding Protocol, Layer 2 Tunneling Protocol, Message Security Protocol, Open Systems Interconnection Reference model, Request for Comment, Secure Electronic Transaction, ankle-biter, application gateway firewall, attack, authentication header, bill payment, bill presentment, certification hierarchy, communications, computer, computer emergency response team, computer emergency response teams' coordination center, computer network, concept of operations, confidentiality, connection, control, cookies, countermeasures, demilitarized zone, denial-of-service, dial-up line, distributed plant, domain, domain name, dual-homed gateway firewall, egress filtering, electronic commerce, electronic messaging services, encapsulating security payload, end system, external system exposure, filtering router, hackers, host, https, hypermedia, hypertext, hypertext transfer protocol, ingress filtering, interoperability standards/protocols, lurking, message, national information infrastructure, network, network address translation, network connection, network worm, object identifier, one-time passwords, online certificate status protocol, open systems security, packet assembly and disassembly, password sniffing, peer-to-peer communication, personal communications network, phishing, point-to-point tunneling protocol, policy certification authority, pop-up box, port scanning, privacy enhanced mail, protocols, public-key forward secrecy, remote authentication dial-in user service, repudiation, rules of behavior, scan, secure socket layer, security assertion markup language, spam, system, trojan horse, trusted gateway, users, validate vs. verify, vendor, virtual mall, vishing, web server, website hosting,
- Internet Architecture Board
- IncludedBy:Internet Society, internet,
- Related:advisory, protocols, standard, trust,
- Internet Assigned Numbers Authority
- IncludedBy:Internet Society, authority, internet,
- Related:network, protocols, registration,
- internet control message protocol
- IncludedBy:control, internet, message, protocols, security,
- Related:communications, gateway, information, network, process, router, standard,
- Internet Corporation for Assigned Names and Numbers
- IncludedBy:internet,
- Related:domain, entity, function, information, key, object, protocols, system,
- Internet Draft
- IncludedBy:internet,
- Related:update,
- Internet Engineering Steering Group
- IncludedBy:Internet Society, internet,
- Related:process, standard, trust,
- Internet Engineering Task Force
- IncludedBy:Internet Society, internet,
- Related:access, access control, authentication, message, protocols, random, security, standard, technology, version,
- internet key exchange protocol
- IncludedBy:internet, key, protocols,
- Related:association, security,
- Internet Message Access Protocol, version 4
- IncludedBy:access, internet, message, protocols, version,
- Internet Policy Registration Authority
- IncludedBy:Internet Society, authority, internet, policy, registration,
- Related:X.509, certification, public-key infrastructure,
- internet protocol
- IncludedBy:internet, protocols,
- Related:communications, computer, control, flow, network, router, standard, system, version,
- internet protocol security
- IncludedBy:communications security, internet, protocols, security protocol,
- Includes:IPsec Key Exchange, authentication header, encapsulating security payload, transport mode vs. tunnel mode, tunnel mode,
- Related:Internet Security Association and Key Management Protocol, NULL encryption algorithm, OAKLEY, Photuris, access, access control, aggressive mode, algorithm, association, authentication, authentication header protocol, confidentiality, connection, control, cookies, domain of interpretation, encapsulating security payload protocol, encryption, flow, forward secrecy, integrity, internet security protocol, key, key management, main mode, pre-shared key, process, protection suite, public-key, quick mode, secure socket layer, security association, security gateway, security parameters index, system, transport mode, triple DES, version,
- Internet Protocol Security Option
- IncludedBy:internet, protocols, security protocol,
- Related:National Security Agency, access, access control, authority, classification levels, classified, information, network, process, program, users,
- Internet Security Association and Key Management Protocol
- IncludedBy:association, internet, key management, protocols, security protocol,
- Related:algorithm, authentication, connection, cryptography, digital signature, encryption, establishment, function, internet protocol security, internet security protocol, signature,
- internet security protocol
- Includes:IPsec Key Exchange,
- Related:Internet Security Association and Key Management Protocol, NULL encryption algorithm, OAKLEY, Photuris, aggressive mode, authentication header, authentication header protocol, cookies, domain of interpretation, encapsulating security payload, encapsulating security payload protocol, forward secrecy, internet protocol security, main mode, pre-shared key, protection suite, quick mode, secure socket layer, security association, security gateway, security parameters index, transport mode, transport mode vs. tunnel mode, triple DES, tunnel mode,
- internet service provider
- IncludedBy:internet,
- Related:access, access control,
- Internet Society
- IncludedBy:internet,
- Includes:Internet Architecture Board, Internet Assigned Numbers Authority, Internet Engineering Steering Group, Internet Engineering Task Force, Internet Policy Registration Authority, Internet Society Copyright, Request for Comment,
- Related:standard, trust,
- Internet Society Copyright
- IncludedBy:Internet Society, internet,
- Related:process, standard,
- Internet Standard
- IncludedBy:internet, standard,
- Related:Request for Comment, operation, process, protocols,
- Internet Standards document
- IncludedBy:Request for Comment, internet, standard,
- Related:process,
- internet vs. Internet
- IncludedBy:internet,
- Related:application, computer, computer network, model, network, protocols, standard, system, users,
- Internet worm
- IncludedBy:internet, worm,
- Related:computer, connection, network, program, system,
- internetwork
- IncludedBy:internet, network,
- Related:communications, gateway, protocols, system,
- internetwork private line interface
- IncludedBy:interface, internet, network,
- Related:connection, cryptographic,
- interoperability
- Includes:Minimum Interoperability Specification for PKI Components, Trusted Systems Interoperability Group, interoperability standards/protocols,
- Related:PKIX, application programming interface, computer, identity, information, information processing standard, open system environment, open systems, portability, recommended practices, security assertion markup language, semantics, site accreditation, system,
- Synonym:interoperable,
- interoperability standards/protocols
- IncludedBy:interoperability, protocols, standard,
- Related:computer, information, internet, program,
- interoperable
- Related:software,
- Synonym:interoperability,
- interoperate
- Related:system,
- interpersonal messaging
- interpretation
- Related:application, criteria,
- interpreted virus
- IncludedBy:virus,
- Related:application, code,
- interswitch rekeying key
- IncludedBy:key, rekey,
- interval estimate
- Related:confidence,
- interval variable
- interview
- Related:control, security,
- intranet
- IncludedBy:internet,
- Related:access, access control, authorized, communications, computer, computer network, information, network, technology, users,
- intruder
- IncludedBy:intrusion,
- Related:access, access control, authorization, entity, resource, system,
- intrusion
- IncludedBy:threat consequence,
- Includes:Intrusion Detection In Our Time, SATAN, computer intrusion, computer security intrusion, host-based intrusion prevention system, intruder, intrusion detection, intrusion detection and prevention, intrusion detection and prevention system, intrusion detection system load balancer, intrusion detection systems, intrusion detection tools, intrusion prevention, intrusion prevention system, meaconing, intrusion, jamming, and interference, network-based intrusion prevention system, penetration, security intrusion, wireless intrusion detection and prevention system,
- Related:access, access control, accountability, agent, anomaly detection, anomaly detection model, antivirus software, attack, authorization, authorized, availability, balanced magnetic switch, break-wire detector, channel scanning, compromise, computer, computer security incident, confidentiality, console, cracker, dual technology, entity, false negative, false positive, flow, host based, incident, information, information assurance, information assurance product, information sharing and analysis center, integrity, management server, misuse detection model, multihost based auditing, network based, network behavior analysis system, resource, rules based detection, security, sensor, shim, stealth mode, stealth probe, subversion, system, technology, trustworthy system, tuning, unauthorized access,
- intrusion detection
- IncludedBy:intrusion,
- Includes:Intrusion Detection In Our Time, intrusion detection and prevention, intrusion detection system load balancer, intrusion detection systems, intrusion detection tools, wireless intrusion detection and prevention system,
- Related:access, access control, accountability, agent, antivirus software, audit, authorization, authorized, channel scanning, computer, console, countermeasures, false negative, false positive, flow, identify, incident, information, information assurance product, intrusion prevention system, management server, network, network behavior analysis system, process, resource, rules based detection, security, sensor, shim, software, stealth mode, stealth probe, system, tuning,
- intrusion detection and prevention
- IncludedBy:intrusion, intrusion detection,
- Related:computer, incident, process, system,
- intrusion detection and prevention system
- IncludedBy:intrusion,
- Related:access, security,
- Intrusion Detection In Our Time
- IncludedBy:intrusion, intrusion detection, security software,
- Related:system,
- intrusion detection system load balancer
- IncludedBy:intrusion, intrusion detection, system,
- intrusion detection systems
- IncludedBy:intrusion, intrusion detection, security software, system,
- Related:access, attack, audit, authorized, computer, file, identify, information, network, process, resource, software, target,
- intrusion detection tools
- IncludedBy:intrusion, intrusion detection, security software,
- Related:access, access control, authorized, computer, identify, system, unauthorized access,
- intrusion prevention
- IncludedBy:intrusion,
- Includes:intrusion prevention system,
- Related:accountability, computer, countermeasures, incident, process, system,
- intrusion prevention system
- IncludedBy:intrusion, intrusion prevention, system,
- Related:incident, intrusion detection, software, target,
- invalidation
- Related:classified,
- invalidity date
- IncludedBy:public-key infrastructure,
- Related:X.509, certificate, compromise, digital signature, fraud, key, non-repudiation, revocation, revoked state, signature,
- inverse cipher
- investigation service
- Related:entity,
- IP address
- IncludedBy:internet,
- Related:computer, network, protocols, version,
- ip payload compression protocol
- IncludedBy:protocols,
- IP security
- IncludedBy:security,
- IP splicing/hijacking
- IncludedBy:attack,
- Related:authentication, authorized, encryption, hijack attack, network, role, users,
- ip spoofing
- IncludedBy:address spoofing, masquerade, spoof, spoofing,
- Related:impersonation, network, system,
- IPsec Key Exchange
- IncludedBy:internet protocol security, internet security protocol, key,
- Related:association, authentication, establishment, internet, protocols,
- irregular warfare
- IncludedBy:warfare,
- IS related risk
- IncludedBy:risk,
- Related:authorized, failure, information, malicious, operation, system, threat, vulnerability,
- IS security architecture
- IncludedBy:computer security,
- Related:system,
- isolation
- Includes:object, subject,
- Related:control, system,
- isolator
- Related:access, security,
- issue
- Related:certificate, public-key infrastructure, users,
- issue case
- issuer
- IncludedBy:Secure Electronic Transaction,
- Related:X.509, authorized, certificate, public-key infrastructure,
- issuing authority
- IncludedBy:authority,
- Related:entity, update,
- IT default file protection parameters
- IncludedBy:access control, file,
- Related:owner, system,
- IT resources
- IncludedBy:resource,
- Related:communications, computer, software, system, telecommunications,
- IT security
- IncludedBy:Automated Information System security,
- Includes:IT Security Evaluation Criteria, IT Security Evaluation Methodology, IT security achitecture, IT security certification, IT security controls, IT security database, IT security goal, IT security incident, IT security objective, IT security plan, IT security policy, IT security product, IT security support functions,
- Related:Common Criteria Testing Laboratory, Common Criteria for Information Technology Security Evaluation, National Voluntary Laboratory Accreditation Program, Scope of Accreditation, approved technologies list, approved test methods list, assure, audit, authentication, availability, center for information technology excellence, certification, compliance-based, confidentiality, conformant validation certificate, contingency plan, deliverables list, designated, designated laboratories list, emergency shutdown controls, ensure, evaluation, evaluation work plan, general controls, information, integrity, management control processes, non-repudiation, observation reports, operation, organization computer security representative, party, protection profile, residual risk, risk treatment, risk-based, security goals, security target, system, technology area, waiver,
- Synonym:computer security,
- IT security achitecture
- IncludedBy:IT security, security,
- Related:system,
- IT security architecture
- IncludedBy:security,
- IT security awareness
- IncludedBy:security,
- IT security certification
- IncludedBy:Automated Information System security, IT security, certification, computer security, target of evaluation,
- Related:application, certificate, criteria,
- IT security controls
- IncludedBy:IT security, control, security,
- Related:availability, confidentiality, information, integrity, security controls, software,
- IT security database
- IncludedBy:IT security, security,
- Related:authorized, control, information, process, program, system,
- IT security education
- IncludedBy:security,
- IT Security Evaluation Criteria
- IncludedBy:Automated Information System security, IT security, computer security, criteria, evaluation,
- Related:confidence, information, standard, validation,
- IT Security Evaluation Methodology
- IncludedBy:Automated Information System security, IT security, computer security, evaluation,
- Related:confidence, criteria, standard, validation,
- IT security goal
- HasPreferred:security goals,
- IncludedBy:IT security, security,
- IT security incident
- IncludedBy:IT security, incident, security incident,
- Related:authorized, availability, computer, confidentiality, information, integrity, resource, security-relevant event, system, users, vulnerability,
- IT security investment
- IncludedBy:security,
- IT security metrics
- IncludedBy:security,
- IT security objective
- HasPreferred:security objectives,
- IncludedBy:IT security, object, security,
- IT security plan
- IncludedBy:IT security, security,
- Related:system,
- IT security policy
- IncludedBy:IT security, computer security, policy,
- Related:access, control, information, management, risk, system, users,
- IT security product
- IncludedBy:IT security, computer security,
- Related:function, software, system,
- IT security support functions
- IncludedBy:IT security, function, security,
- Related:application, identification, software, system, users,
- IT security training
- IncludedBy:security,
- Related:audit, development, management,
- IT system
- HasPreferred:automated information system,
- IT-related risk
- IncludedBy:risk,
- Related:authorized, information, malicious, operation, system, technology, threat, vulnerability,
- iteration
- Related:operation,
- ITU-T
- Includes:CCITT, Open Systems Interconnection Reference model,
- Related:International organization for standardization, communications, protocols, standard, system, telecommunications,
- jamming
- Includes:advanced self-protection jammer, meaconing, intrusion, jamming, and interference, radio frequency jamming,
- Related:anti-jam, anti-jamming, attack, electronic attack, frequency hopping,
- Java
- IncludedBy:software,
- Related:application, network, program, system,
- jitter
- joint authorization
- IncludedBy:authorization,
- Related:security,
- joint personnel adjudication system
- Related:access, authorized, security,
- joint task force-computer network defense
- IncludedBy:computer, computer network, network,
- Related:damage, function, incident, system, threat,
- joint use agreement
- Related:security,
- joint venture
- JTC1 Registration Authority
- IncludedBy:authority, registration,
- Related:object, standard,
- judgment sample
- Related:analysis, standard,
- judicial authority
- IncludedBy:authority,
- Related:entity,
- kerberos
- IncludedBy:Simple Authentication and Security Layer, distributed computing environment, security software,
- Includes:key distribution center, session key, third party trusted host model,
- Related:access, access control, application, attack, authorization, control, cryptography, entity, integrity, key, network, passwords, privacy, protocols, system, technology, trust, users, vulnerability,
- kernelized secure operating system
- IncludedBy:system,
- key
- IncludedBy:Secure Electronic Transaction, key management, multilevel information systems security initiative,
- Includes:Federal Public-key Infrastructure, IPsec Key Exchange, Key Exchange Algorithm, MAC algorithm key, Programmable key storage device, S/Key, SAVILLE Advanced Remote Keying, Simple Public-Key Infrastructure, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, Type 1 key, Type 2 key, Type 4 key, X.509 public-key certificate, advanced key processor, approved key-operated padlock, area interswitch rekeying key, asymmetric cryptographic algorithm, asymmetric key pair, asymmetric keys, authorization key, automated key transport, automatic key distribution center, automatic key distribution/rekeying control unit, automatic remote rekeying, block cipher key, certificate rekey, cipher text auto-key, ciphertext key, common interswitch rekeying key, compartment key, compromised key list, contingency key, cooperative key generation, cooperative remote rekeying, core or key process, crypto-ignition key, cryptographic functions, cryptographic ignition key, cryptographic key, cryptographic key component, cryptonet key, data encryption key, data encryption standard, data key, digital certificate, digital key, digital signature, directly trusted CA key, effective key length, electronically generated key, encrypted key, ephemeral key, exercise key, explicit key authentication from A to B, group key encryption key, group traffic encryption key, hard copy key, hardened unique storage Key, hardwired key, implicit key authentication from A to B, interarea interswitch rekeying key, internet key exchange protocol, interswitch rekeying key, key agreement, key authentication, key bundle, key card, key confirmation, key confirmation from A to B, key control, key derivation function, key distribution, key distribution centre, key distribution service, key entry, key establishment, key exchange, key expansion, key generating function, key generation, key generation exponent, key generation material, key generator, key label, key length, key lifecycle, key lifetime, key list, key logger, key management device, key material identification number, key material identifier, key output, key owner, key pair, key processor, key production key, key resources, key service unit, key space, key state transition, key storage device, key stream, key tag, key tape, key token, key translation center, key translation centre, key transport, key update, key updating, key validation, key variable generator, key wrap, key wrapping, key-auto-key, key-encrypting key, key-encryption-key, key-escrow system, keyed hash, keyed hash algorithm, keying material, keys used to encrypt and decrypt files, keystroke logger, keystroke monitoring, local management device/key processor, lock-and-key protection system, loop key generator, maintenance key, manual key transport, manual remote rekeying, master crypto-ignition key, master crypto-ignition key custodian, master cryptographic ignition key, message authentication key, operational key, over-the-air key distribution, over-the-air key transfer, over-the-air rekeying, per-call key, plaintext key, point-to-point key establishment, post-nuclear event key, pre-shared key, pretty good privacy, private decipherment key, private key, private signature key, private-key cryptography, public encipherment key, public key enabling, public verification key, public-key, public-key algorithm, public-key certificate, public-key cryptography, public-key cryptography standards, public-key derivation function, public-key forward secrecy, public-key information, public-key infrastructure, public-key system, rekey, rekey (a certificate), remote rekeying, reserve keying material, root key, round key, secret key, secret-key cryptography, secure multipurpose internet mail extensions, security management infrastructure, seed key, session key, signature key, single point keying, split key, static key, symmetric algorithm, symmetric key, test key, token storage key, tokens, traffic encryption key, transmission security key, trusted key, type 3 key, unique interswitch rekeying key, update (key), verification key, virtual private network,
- Related:Blowfish, CA certificate, CAPSTONE chip, CKMS, COMSEC Material Control System, COMSEC aid, COMSEC boundary, COMSEC control program, COMSEC material, COMSEC system data, CRYPTO, Challenge Handshake Authentication Protocol, Challenge-Response Authentication Mechanism, Clipper chip, Cryptographic Message Syntax, Data Authentication Algorithm, Diffie-Hellman, Escrowed Encryption Standard, FIPS PUB 140-1, FIPS approved security method, FIREFLY, Federal Standard 1027, Fortezza, IEEE P1363, IMAP4 AUTHENTICATE, International Data Encryption Algorithm, Internet Corporation for Assigned Names and Numbers, MIME Object Security Services, MISSI user, OAKLEY, PKCS #10, PKCS #11, PKIX, POP3 APOP, Photuris, RED signal, RSA algorithm, Rivest Cipher 2, Rivest Cipher 4, Rivest-Shamir-Adleman algorithm, SET private extension, Secure Data Network System, Simple Authentication and Security Layer, Skipjack, Standards for Interoperable LAN/MAN Security, The Exponential Encryption System, U.S.-controlled space, Wassenaar Arrangement, X.500 Directory, X.509, X.509 attribute certificate, X.509 certificate, X.509 certificate revocation list, access control center, account authority digital signature, accountability, active state, advanced encryption standard, algorithm, applicant, archive, asymmetric algorithm, asymmetric cryptographic technique, asymmetric cryptography, attribute certificate, authentication protocol, authority revocation list, backup, bind, binding, biometrics, bit, block cipher, bound metadata, break, brute force attack, canister, certificate, certificate directory, certificate domain, certificate management, certificate policy, certificate policy qualifier, certificate renewal, certificate revocation list, certificate update, certificate user, certificate validation, certification, certification authority, certification authority digital signature, certification hierarchy, certification path, certification request, certify, challenge-response protocol, challenge/response, chosen-ciphertext attack, chosen-plaintext attack, cipher, ciphertext-only attack, circuit proxy, class 2, 3, 4, or 5, clearing, cold start, command authority, common fill device, common name, common security, communications security, compromise, compromised state, computer abuse, control, controlling authority, countermeasures, critical security parameters, critical system files, cross-certification, cryptanalysis, cryptographic, cryptographic algorithm, cryptographic check function, cryptographic initialization, cryptographic module, cryptographic service, cryptographic system, cryptographic token, cryptography, cryptonet, cryptoperiod, data authentication code, data authentication code vs. Data Authentication Code, data encryption algorithm, data input, data origin authentication service, data transfer device, deactivated state, decipher, decrypt, destroyed compromised state, destroyed state, dictionary attack, diffie-hellman group, digital certification, digital envelope, digital id, digital signature algorithm, directly trusted CA, distinguished name, distribution point, domain name system, dongle, dual signature, elliptic curve cryptography, elliptic curve cryptosystem, encipherment, encryption, encryption algorithm, encryption certificate, encryption strength, end entity, escrow, extension, extraction resistance, fill device, fingerprint, forward secrecy, forward secrecy with respect to A, forward secrecy with respect to both A and B individually, function, garbled, generation, graphical-user interface, hashed message authentication code, hierarchy management, hybrid encryption, identification data, identifier, identity token, information systems security equipment modification, initialization value, initialize, intelligent threat, internet protocol security, invalidity date, kerberos, known-plaintext attack, link encryption, malicious applets, man-in-the-middle attack, merchant certificate, mesh PKI, message, message authentication code, message authentication code algorithm, message authentication code vs. Message Authentication Code, message integrity code, message representative, metadata, mode of operation, modulus, mutual forward secrecy, national information infrastructure, non-repudiation, nonce, object, ohnosecond, one-time cryptosystem, one-time pad, one-time passwords, one-time tape, one-way encryption, online certificate status protocol, operation, operations manager, organizational certificate, out-of-band, passwords, path discovery, peripheral equipment, personal digital assistant, personal identity verification, personal identity verification card, personal security environment, personality label, personalization service, physical protection, policy approving authority, policy certification authority, policy creation authority, pre-activation state, print suppression, privacy enhanced mail, private communication technology, private component, private decipherment transformation, proof of possession protocol, protected channel, protective packaging, protective technologies, public component, public encipherment transformation, random, randomizer, recover, registration, registration authority, release prefix, renewal, repository, retrieval, revocation, revocation date, revoked state, root, root certificate, secret, secure envelope, secure hash standard, secure hypertext transfer protocol, secure socket layer, security association identifier, security event, segregation of duties, self-signed certificate, shared secret, signature, signature certificate, signature function, signature generation, signature process, signature verification, signer, slot, smartcards, social engineering, soft TEMPEST, split knowledge, standard, start-up KEK, stream cipher, strong authentication, subject, subordinate certification authority, suspended state, symmetric cryptographic technique, symmetric cryptography, symmetric encipherment algorithm, symmetric encryption algorithm, system indicator, third party trusted host model, ticket, token copy, token management, transport, trapdoor, triple DES, trust, trust anchor, trust-file PKI, trusted certificate, trusted platform module chip, tunneled password protocol, two-person integrity, type 1 products, type 2 product, type 3 product, unforgeable, update, updating, user interface, user representative, users, v1 certificate, v2 certificate, v3 certificate, validate, validate vs. verify, validity period, verification, verification function, verification process, web of trust, workstation, zeroize,
- key agreement
- IncludedBy:key,
- Related:algorithm, cryptography, encryption, establishment, function, information, message, process, public-key, shared secret,
- key authentication
- IncludedBy:authentication, key,
- Related:assurance,
- key bundle
- IncludedBy:key,
- key card
- IncludedBy:key,
- key center
- Related:computer, cryptography, encryption, process, standard, system, users,
- key confirmation
- IncludedBy:key,
- Related:assurance, entity, establishment, protocols,
- key confirmation from A to B
- IncludedBy:key,
- Related:assurance, entity,
- key control
- IncludedBy:control, key,
- key derivation function
- IncludedBy:function, key,
- key distribution
- IncludedBy:key,
- Includes:key distribution center, key distribution service,
- Related:algorithm, cryptographic, key exchange, key management/exchange, process,
- key distribution center
- IncludedBy:kerberos, key distribution, key management,
- PreferredFor:key distribution centre,
- Related:communications security, cryptography, encryption, entity, protocols, standard, trust,
- key distribution centre
- HasPreferred:key distribution center,
- IncludedBy:key,
- key distribution service
- IncludedBy:key, key distribution,
- Related:authorized,
- key entry
- IncludedBy:key,
- Related:cryptographic, module, process,
- key establishment
- IncludedBy:establishment, key,
- Related:association, entity, information, process, security,
- key exchange
- IncludedBy:key,
- Includes:Key Exchange Algorithm,
- Related:communications, information, key distribution, process, public-key,
- Key Exchange Algorithm
- IncludedBy:algorithm, key, key exchange,
- Related:National Security Agency, classified,
- key expansion
- IncludedBy:key,
- key generating function
- IncludedBy:function, key, key generation,
- Related:algorithm, application, property,
- key generation
- IncludedBy:key,
- Includes:key generating function, key generator,
- Related:cryptographic, process,
- key generation exponent
- IncludedBy:key,
- Related:trust,
- key generation material
- IncludedBy:key,
- key generator
- IncludedBy:key, key generation,
- Related:algorithm, cipher, cryptographic, encryption, random,
- key label
- IncludedBy:key,
- key length
- IncludedBy:key,
- Related:cryptographic,
- key lifecycle
- HasPreferred:key lifecycle state,
- IncludedBy:key, lifecycle,
- key lifecycle state
- IncludedBy:key management, lifecycle,
- Includes:active state, compromised state, deactivated state, destroyed compromised state, destroyed state, key state transition, pre-activation state, revoked state, suspended state,
- PreferredFor:key lifecycle,
- Related:compromise, cryptographic, destruction, revoked state,
- key lifetime
- IncludedBy:key, multilevel information systems security initiative,
- Related:X.509, certificate, public-key, public-key infrastructure,
- key list
- IncludedBy:key,
- key loader
- IncludedBy:key management,
- Related:cryptographic, module,
- key logger
- IncludedBy:attack, key,
- Related:computer, encryption, keystroke logger, passwords, program,
- key management
- IncludedBy:management, security,
- Includes:Internet Security Association and Key Management Protocol, Key Management Protocol, Simple Key-management for Internet Protocols, automated key distribution, automated key management center, automated key management system, cryptographic key management system, electronic key entry, electronic key management system, key, key distribution center, key lifecycle state, key loader, key management application service element, key management center, key management identification number, key management infrastructure, key management ordering and distribution center, key management protocol data unit, key management system, key management system Agent, key management user agent, key management/exchange, key recovery, key-escrow, manual key distribution, manual key entry, simple key management for IP,
- Related:Cryptographic Message Syntax, Diffie-Hellman, FIPS PUB 140-1, FIREFLY, Federal Standard 1027, Rivest-Shamir-Adleman algorithm, Secure Data Network System, Standards for Interoperable LAN/MAN Security, application, asymmetric cryptography, audit, certification, communications security, control, cryptanalysis, cryptographic, cryptographic system, cryptographic token, cryptography, destruction, escrow, internet protocol security, one-time pad, policy, privacy enhanced mail, process, registration, revocation, secure hypertext transfer protocol, symmetric cryptography, system, token management,
- key management application service element
- IncludedBy:application, key management,
- key management center
- IncludedBy:key management,
- key management device
- IncludedBy:key, management,
- Related:users,
- key management identification number
- IncludedBy:identification, key management,
- key management infrastructure
- IncludedBy:key management, management,
- Related:certificate, control, cryptographic, object, process, public-key, software, subject, users,
- key management ordering and distribution center
- IncludedBy:key management,
- Key Management Protocol
- IncludedBy:key management, protocols, security protocol,
- Related:users, version,
- key management protocol data unit
- IncludedBy:key management, protocols,
- key management system
- IncludedBy:key management, system,
- key management system Agent
- IncludedBy:key management, system,
- key management user agent
- IncludedBy:key management, users,
- key management/exchange
- IncludedBy:key management,
- Related:communications, cryptographic, key distribution, privacy, public-key, system,
- key material identification number
- IncludedBy:key,
- key material identifier
- IncludedBy:key, multilevel information systems security initiative,
- Related:X.509, certificate, public-key, public-key infrastructure,
- key output
- IncludedBy:key,
- Related:cryptographic, metadata, module, process,
- key owner
- IncludedBy:key, owner,
- Related:authorized, cryptographic, entity, identity, module,
- key pair
- IncludedBy:key,
- Related:algorithm, cryptography, digital signature, encryption, owner, public-key, signature, system,
- key processor
- IncludedBy:key, process,
- key production key
- IncludedBy:key,
- key recovery
- IncludedBy:key management, recovery,
- Includes:data key, encrypted key, key-encrypting key, key-escrow system, plaintext key, session key, split knowledge,
- Related:access, access control, algorithm, association, authorized, backup, communications, confidentiality, cryptographic, encryption, escrow, establishment, key-escrow, operation, process, protocols, retrieval, standard, telecommunications, trust,
- key resources
- IncludedBy:key,
- key service unit
- IncludedBy:key,
- key space
- IncludedBy:key,
- Related:algorithm, cryptographic,
- key state transition
- IncludedBy:key, key lifecycle state,
- Related:lifecycle, process,
- key storage device
- IncludedBy:key,
- key stream
- IncludedBy:key,
- Related:cipher, control, cryptographic system, process, security, system,
- key tag
- IncludedBy:key,
- Related:identification, information,
- key tape
- IncludedBy:key,
- key token
- IncludedBy:key, tokens,
- Related:entity, message,
- key translation center
- IncludedBy:key,
- Related:cryptography, encryption, protocols, standard,
- key translation centre
- IncludedBy:key,
- Related:entity, trust,
- key transport
- IncludedBy:key,
- Related:algorithm, association, encryption, entity, establishment, message, process, public-key, random,
- key update
- IncludedBy:key, update,
- key updating
- IncludedBy:key,
- Related:cryptographic, process,
- key validation
- IncludedBy:key, validation,
- Related:attack, public-key, requirements,
- key variable generator
- IncludedBy:key,
- key wrap
- IncludedBy:key,
- key wrapping
- IncludedBy:key,
- Related:information, integrity,
- key-auto-key
- IncludedBy:key,
- Related:cryptographic,
- key-encrypting key
- IncludedBy:key, key recovery,
- Related:application, cryptographic, encryption,
- key-encryption-key
- IncludedBy:encryption, key,
- Related:authorization,
- key-escrow
- IncludedBy:escrow, key management,
- Related:access, access control, audit, cryptographic, file, key recovery, process, system, trust,
- key-escrow system
- IncludedBy:escrow, key, key recovery, system,
- Related:algorithm, authorization, classified, control, encryption, message, process, program, public-key, standard, technology, trust,
- keyed hash
- IncludedBy:hash, key,
- Related:algorithm, attack, authentication, cryptographic, encryption, function, object, threat,
- keyed hash algorithm
- IncludedBy:algorithm, hash, key,
- Related:authentication, code, message,
- keying material
- IncludedBy:key,
- Related:association, authentication, code, cryptographic, information, security,
- keys used to encrypt and decrypt files
- IncludedBy:file, key,
- Related:encryption, users,
- keystroke logger
- IncludedBy:key,
- Related:identity theft, key logger, keystroke monitoring,
- keystroke monitoring
- IncludedBy:attack, key,
- Related:audit, keystroke logger, response, software, users,
- killer packets
- IncludedBy:attack,
- Related:code, network, system,
- kiosk
- Related:access, access control, computer,
- KMI operating account
- Related:control,
- KMI protected channel
- Related:authentication,
- KMI-aware device
- Related:identity,
- known-plaintext attack
- IncludedBy:attack,
- Related:algorithm, analysis, cipher, cryptographic, cryptography, key,
- KOA agent
- Related:access, identity,
- KOA manager
- Related:management,
- KOA registration manager
- label
- IncludedBy:security label,
- labeled security protections
- IncludedBy:security,
- Related:access, access control, control, trust,
- laboratory attack
- IncludedBy:attack,
- Related:information, recovery,
- language
- Related:authentication, authorization, automated information system, security,
- language of temporal ordering specification
- Related:computer, computer network, network, protocols,
- laptop
- HasPreferred:laptop computer,
- IncludedBy:portable computer system,
- laptop computer
- IncludedBy:computer,
- PreferredFor:laptop,
- Related:automated information system, version,
- large scale integration
- Related:automated information system,
- last mile broadband access
- IncludedBy:access,
- lattice
- IncludedBy:Bell-LaPadula security model,
- Related:test,
- lattice model
- IncludedBy:Bell-LaPadula security model, model,
- Related:classification levels, classified, control, flow, system, test,
- Law Enforcement Access Field
- IncludedBy:Clipper chip, access,
- Related:encryption, escrow, standard,
- law enforcement sensitive
- Related:classified, threat,
- lawful permanent resident
- Layer 2 Forwarding Protocol
- IncludedBy:protocols, security protocol,
- Related:internet, network, users,
- Layer 2 Tunneling Protocol
- IncludedBy:protocols, security protocol, tunnel,
- Related:internet, network,
- layer management entry
- layer management interface
- IncludedBy:interface,
- layered solution
- IncludedBy:security,
- Related:attack, countermeasures,
- lead
- Related:subject,
- leakage
- IncludedBy:threat,
- Related:authorized, computer, covert, system,
- leapfrog attack
- IncludedBy:attack,
- Related:compromise, information, passwords, standard, users,
- least privilege
- IncludedBy:privilege,
- Includes:need-to-know, subject,
- Related:access, application, authorized, damage, entity, operation, resource, security, system, users,
- least trust
- IncludedBy:trust,
- Related:security,
- legacy data
- Related:automated information system, information, standard,
- legacy systems
- IncludedBy:system,
- Related:application, business process, computer, critical, information, operation, program,
- letter of compelling need
- Related:access, critical, risk, security,
- letter of consent
- letter of intent
- Related:security, subject,
- letterbomb
- IncludedBy:email, threat,
- Related:denial-of-service, malicious,
- level of concern
- Related:authorized, availability, integrity,
- level of protection
- Related:assurance, countermeasures, information, information assurance, network, risk, security, standard, system, threat, vulnerability,
- levels of concern
- Related:assurance, availability, confidentiality, control, critical, exposures, information, information assurance, integrity, risk, security, system, threat, vulnerability,
- liability
- license
- Related:software,
- lifecycle
- Includes:key lifecycle, key lifecycle state, lifecycle management, lifecycle stage,
- Related:active state, certificate management services, compromised state, deactivated state, destroyed compromised state, destroyed state, interface control document, key state transition, pre-activation state, revoked state, security event, software assurance, suspended state, system,
- lifecycle management
- IncludedBy:automated information system, lifecycle,
- Related:information, process, system,
- lifecycle stage
- IncludedBy:lifecycle,
- light tower
- Related:control, process,
- Lightweight Directory Access Protocol
- IncludedBy:access, protocols, security protocol,
- Related:application, authentication, requirements, resource,
- likelihood of occurrence
- Related:assurance, risk, threat, vulnerability,
- limited access authorization
- IncludedBy:access, authorization,
- Related:United States citizen,
- limited background investigation
- Related:subject,
- limited maintenance
- Related:communications security,
- limited network analyzer
- IncludedBy:network,
- Related:analysis,
- limited rate initial preproduction
- line conditioning
- Related:communications, control, interface, telecommunications,
- line conduction
- Related:communications, control, interface, telecommunications,
- line managers
- Related:application, availability, confidentiality, critical, integrity, process,
- line of business
- Related:management, security,
- line supervision
- Related:certification, compromise, security,
- line-of-sight signal propagation
- linear predictive coding
- lines of business
- Related:function, information, operation, resource, version,
- link
- Related:communications, computer, hyperlink, network, world wide web,
- link encryption
- IncludedBy:encryption,
- Related:algorithm, application, communications, flow, information, key, network, operation, system,
- list-oriented
- Antonym:ticket-oriented,
- IncludedBy:authorization,
- Includes:object, subject,
- Related:access, access control, authorized, computer, system,
- listserv
- IncludedBy:internet,
- local access
- IncludedBy:access,
- local agency check
- Related:criminal, security, subject,
- local authority
- IncludedBy:authority,
- Related:certificate, management, users,
- local logon
- IncludedBy:logon,
- Related:access, users,
- local loop
- Related:communications,
- local management device
- local management device/key processor
- IncludedBy:key, process,
- Related:communications security, users,
- local registration authority
- local requirements
- Antonym:global requirements,
- IncludedBy:requirements, trusted computing base,
- Related:analysis,
- local-area network
- IncludedBy:network,
- Related:communications, computer, connection, control, gateway, process, system, users, wide-area network,
- lock-and-key protection system
- IncludedBy:key, system,
- Related:access, access control, assurance, passwords,
- lockout
- Related:access, access control, application, logon,
- logged in
- IncludedBy:access control,
- Related:access, automated information system, system,
- Synonym:logon,
- logging
- IncludedBy:firewall,
- Related:evidence, process, system, test, users,
- Synonym:audit trail,
- logic bombs
- IncludedBy:exploit,
- Related:access, access control, authorized, backup, code, computer, damage, denial-of-service, file, malicious, program, resource, software, system, time bomb, virus,
- logical access
- IncludedBy:access,
- Related:authorized, control, function, security, system, users,
- logical access control
- IncludedBy:access, control,
- Related:authorized, process, program, resource, users,
- logical co-processing kernel
- IncludedBy:process,
- logical completeness measure
- Related:access, access control, control, security,
- logical perimeter
- Related:users,
- logical system definition
- IncludedBy:automated information system, system,
- Related:function, information, network,
- login
- IncludedBy:access control,
- Includes:anonymous and guest login, anonymous login, login prompt, remote login,
- Related:S/Key, access, audit, audit trail, backdoor, computer security technical vulnerability reporting program, control, control systems, default account, entity, ethernet sniffing, file, one-time passwords, passwords, repository, resource, secure shell, security-relevant event, single sign-on, system, telnet, tinkerbell program,
- Synonym:logon,
- login prompt
- IncludedBy:login,
- Related:passwords, system, users,
- logoff
- IncludedBy:access control,
- Related:access, authorized, logon,
- logon
- IncludedBy:access control, authentication,
- Includes:automated logon sequences, console logon, failed logon, local logon, remote logon,
- Related:access, authorized, lockout, logoff, secure single sign-on, security-relevant event,
- Synonym:logged in, login,
- long title
- Related:communications security,
- long-haul telecommunications
- Related:connection, foreign,
- loop
- IncludedBy:risk,
- Related:computer, process, program,
- loop key generator
- IncludedBy:key,
- loophole
- IncludedBy:threat,
- Related:policy, security, software, system,
- low impact
- Related:availability, damage, security,
- low probability of detection
- Related:risk,
- low probability of intercept
- Related:risk,
- low-cost encryption/authentication device
- IncludedBy:authentication, encryption,
- low-impact system
- IncludedBy:system,
- Related:availability, information, integrity, object, security,
- lurking
- IncludedBy:threat,
- Related:internet,
- MAC algorithm key
- IncludedBy:algorithm, key,
- Related:control, operation,
- machine controller
- IncludedBy:control,
- Related:control systems, system,
- macro virus
- IncludedBy:threat, virus,
- Related:application, file, process, program,
- magnetic media
- magnetic remanence
- IncludedBy:overwrite procedure,
- Related:information,
- Synonym:remanence,
- mailbomb
- IncludedBy:email, threat,
- PreferredFor:mailbombing,
- Related:attack, system,
- mailbombing
- HasPreferred:mailbomb,
- mailing list
- IncludedBy:internet,
- main mode
- Related:establishment, internet protocol security, internet security protocol, message,
- maintainability
- Related:availability, operation, program,
- maintenance
- Related:fault, function, process, software, system,
- maintenance hook
- IncludedBy:risk,
- Related:access, access control, code, development, software,
- maintenance key
- IncludedBy:key,
- major application
- IncludedBy:application,
- Related:access, access control, authorized, communications, function, information, management, program, requirements, resource, risk, security, software, system, technology, telecommunications, unauthorized access, users,
- major information system
- IncludedBy:information, system,
- Related:development, management, program, property, resource, role,
- malicious
- Includes:malicious applets, malicious code, malicious code screening, malicious intruder, malicious logic, malicious program,
- Related:Common Criteria for Information Technology Security, IS related risk, IT-related risk, agent, ankle-biter, antivirus tools, attack, attackers, backdoor, blacklist, blended attack, closed security environment, computer abuse, configuration control, cracker, dark-side hacker, data integrity, data integrity service, demon dialer, evasion, false negative, false positive, hackers, infection, information assurance, information assurance product, integrity, letterbomb, logic bombs, malware, man-in-the-middle attack, masquerade, mockingbird, open security, open security environment, payload, replay attacks, risk, rootkit, sandboxed environment, security, social engineering, spyware, threat, time bomb, trojan horse, trusted process, untrusted process, virus, vulnerability, worm,
- malicious applets
- IncludedBy:malicious, threat,
- Related:application, authorized, computer, file, function, key, program, resource,
- malicious code
- IncludedBy:code, malicious, threat,
- Includes:backdoor, malware, rootkit, spyware, trojan horse, virus, worm,
- Related:application, authorized, availability, damage, entity, integrity, malicious logic, process, program, software, system,
- malicious code screening
- IncludedBy:malicious,
- Related:connection,
- malicious intruder
- IncludedBy:malicious, threat,
- Related:access, access control, authorization, computer, insider,
- malicious logic
- IncludedBy:malicious, threat consequence,
- Related:access, access control, authorized, computer, control, function, malicious code, resource, software, system, unauthorized access, users, virus,
- malicious program
- IncludedBy:malicious, program, threat,
- Related:application, authorized, code,
- malware
- IncludedBy:malicious code,
- Related:adversary, antispyware software, antivirus software, application, authorized, availability, blended attack, code, compromise, computer, covert, deny by default, disinfecting, entity, indication, information, integrity, malicious, on-access scanning, on-demand scanning, precursor, process, program, quarantine, quarantining, security, signature, software, spyware, system, virus, virus definitions, worm,
- man-in-the-middle
- HasPreferred:man-in-the-middle attack,
- man-in-the-middle attack
- IncludedBy:attack,
- PreferredFor:man-in-the-middle,
- Related:adversary, algorithm, association, attack, authentication, claimant, function, impersonation, information, key, malicious, message, protocols, verifier,
- management
- Includes:Management Act, certificate management, certificate management authority, enterprise risk management, information management, key management, key management device, key management infrastructure, management client, management controls, management security controls, patch management, policy management authority, privilege management, records management, risk management, risk management framework, security management dashboard,
- Related:Clinger-Cohen Act of 1996, FIREFLY, IA infrastructure, IT security policy, IT security training, KOA manager, NSA-approved cryptography, access control mechanisms, access type, adequate security, advanced key processor, agreement, approval to operate, approved security function, authorization (to operate), central services node, certificate, certificate policy, certification, certification analyst, chief information officer, cloud computing, commodity service, compensating security controls, contingency plan, continuity of operations plan, covert testing, crypto officer, cryptographic system survey, device distribution profile, device registration manager, disaster recovery plan, electronic messaging services, end cryptographic unit, enrollment manager, enterprise, federal enterprise architecture, general support system, information security program plan, information steward, information technology, line of business, local authority, major application, major information system, mission critical, national security system, national vulnerability database, officer, personnel registration manager, policy certification authority, primary services node (prsn), product source node, resilience, risk analysis, risk assessment, risk mitigation, risk monitoring, security, security control assessment, security controls, security net control station, security program plan, security safeguards, security service, system security plan,
- Management Act
- IncludedBy:management,
- Related:security,
- management client
- IncludedBy:management,
- Related:access,
- management control processes
- IncludedBy:control, process,
- Related:IT security, program, requirements, security,
- management controls
- IncludedBy:control, management,
- Related:authorization, countermeasures, development, information, information security, process, risk, risk management, security, security controls, system,
- management countermeasure
- Related:assessment, risk, security,
- management engineering plan
- management information base
- IncludedBy:information, internet,
- management message
- Related:attack, privacy,
- management network
- IncludedBy:network,
- Related:security, software,
- management security controls
- IncludedBy:control, management, security,
- Related:risk,
- management server
- Related:application, identify, information, intrusion, intrusion detection, protocols, system,
- mandatory access control
- IncludedBy:access, control,
- Related:authorization, classified, critical, entity, file, flow, information, object, owner, policy, resource, security, subject, system, trust, users,
- Synonym:non-discretionary access control,
- mandatory declassification review
- Related:classified, requirements,
- mandatory modification
- Related:communications security,
- manipulated variable
- Related:control, process,
- manipulation detection code
- IncludedBy:code,
- Related:attack,
- manipulative communications deception
- IncludedBy:communications,
- Related:telecommunications,
- manual cryptosystem
- IncludedBy:cryptographic system, cryptography, system,
- Related:cryptographic, process,
- manual key distribution
- IncludedBy:key management,
- Related:cryptographic,
- manual key entry
- IncludedBy:key management,
- Related:cryptographic, module,
- manual key transport
- IncludedBy:key,
- manual remote rekeying
- IncludedBy:key, rekey,
- markup language
- IncludedBy:internet, standard generalized markup language,
- Related:system,
- mask generation function
- IncludedBy:function,
- Related:property,
- masquerade
- IncludedBy:threat consequence,
- Includes:DNS spoofing, address spoofing, ip spoofing, masquerade attack, masquerading, mimicking, spoofing, spoofing attack,
- Related:access, access control, alias, authorized, entity, malicious, system,
- Synonym:impersonation,
- masquerade attack
- IncludedBy:attack, masquerade,
- Related:entity, identity, system,
- masquerading
- IncludedBy:attack, masquerade,
- Related:access, access control, authentication, authorized, entity, identity, impersonation, spoof, system, users,
- mass mailing worm
- IncludedBy:worm,
- Related:identify, system,
- mass-market software
- IncludedBy:software, software product,
- Related:COTS software, users,
- master control switch
- IncludedBy:control,
- master crypto-ignition key
- IncludedBy:key,
- Related:operation,
- master crypto-ignition key custodian
- IncludedBy:key,
- Related:security,
- master cryptographic ignition key
- IncludedBy:key,
- master file
- IncludedBy:automated information system, file,
- Related:information,
- match
- IncludedBy:biometrics,
- Related:information, process,
- material
- material symbol
- matrix
- Related:function, hash,
- maximum tolerable downtime
- MD2
- Related:cryptographic, cryptography, hash,
- MD4
- Related:cryptographic, cryptography, hash,
- MD5
- Related:cryptographic, cryptography, hash, version,
- meaconing, intrusion, jamming, and interference
- IncludedBy:communications security, intrusion, jamming,
- mean
- mean absolute deviation
- mean-time-between-failure
- IncludedBy:failure,
- mean-time-between-outages
- IncludedBy:failure,
- mean-time-to-fail
- IncludedBy:failure,
- mean-time-to-repair
- Related:failure,
- mean-time-to-service-restoral
- Related:failure,
- measure
- measurement and signature intelligence
- IncludedBy:intelligence,
- Related:analysis,
- mechanisms
- Related:program, software, system,
- media
- Related:object,
- media access control address
- IncludedBy:access, control,
- Related:standard,
- media library
- Related:control,
- media protection
- Related:authorized, control, exposures, operation, security, system,
- media sanitization
- median
- MEI resource elements
- IncludedBy:minimum essential infrastructure, resource,
- Related:vulnerability,
- memorandum of agreement
- HasPreferred:memorandum of understanding,
- memorandum of understanding
- PreferredFor:memorandum of agreement,
- Related:connection, system,
- memory
- Related:computer,
- memory component
- memory resident
- Related:system, virus,
- memory scavenging
- IncludedBy:automated information system, threat,
- Related:information,
- memory space-time
- merchant
- IncludedBy:Secure Electronic Transaction,
- Related:information,
- merchant certificate
- IncludedBy:Secure Electronic Transaction, certificate,
- Related:digital signature, encryption, key, public-key, signature,
- merchant certification authority
- IncludedBy:Secure Electronic Transaction, authority, certification, public-key infrastructure,
- Related:certificate, gateway,
- merge access
- IncludedBy:access,
- mesh PKI
- IncludedBy:public-key, public-key infrastructure,
- Related:certificate, key, trust, users, validation,
- message
- Includes:Cryptographic Message Syntax, Internet Message Access Protocol, version 4, Message Security Protocol, autonomous message switch, defense message system, emergency action message, hashed message authentication code, improved emergency message automatic transmission system, internet control message protocol, message authentication code, message authentication code algorithm, message authentication code vs. Message Authentication Code, message digest, message digest algorithm 5, message externals, message handling system, message identifier, message indicator, message integrity code, message passing, message representative, signed message,
- Related:COMSEC control program, Internet Engineering Task Force, MIME Object Security Services, NRD token, NRO token, NRS token, NRT token, OSI architecture, Post Office Protocol, version 3, Rivest-Shamir-Adleman algorithm, SET private extension, Secure Data Network System, Secure/MIME, X.400, active wiretapping, aggressive mode, alert, algorithm, assignment, asymmetric algorithm, asymmetric cryptographic algorithm, asymmetric cryptographic technique, audit trail, authentication, authentication protocol, authenticity, baggage, bounce, brand CRL identifier, brevity list, brute force attack, capacity, certificate, certification authority, ciphertext, code, component, cookies, cryptanalysis, cryptographic functions, cryptography, data authentication code, data authentication code vs. Data Authentication Code, data encryption key, data encryption standard, data input, denial-of-service, dictionary attack, digital envelope, digital signature, digital signature algorithm, domain parameter, dual signature, dynamic binding, eavesdropping, electronic signature, email, email security software, encapsulating security payload, encryption software, exchange multiplicity parameter, fieldbus, file integrity checker, file integrity checking, flooding, future narrow band digital terminal, hash, hash algorithm, hash function, hash result, hash value, high assurance guard, imitative communications, information systems security equipment modification, initialization value, internet, key, key agreement, key token, key transport, key-escrow system, keyed hash algorithm, main mode, man-in-the-middle attack, multipurpose internet mail extensions, network, non-recoverable part, non-repudiation, non-repudiation of creation, non-repudiation of delivery, non-repudiation of knowledge, non-repudiation of origin, non-repudiation of receipt, non-repudiation of sending, non-repudiation of submission, non-repudiation of transport, null, open system interconnection model, organizational certificate, originator, packet, packet switching, payment gateway, peer-to-peer communication, polling, polymorphism, pre-signature, pretty good privacy, privacy enhanced mail, protected channel, protocol data unit, protocol run, proxy server, public-key infrastructure, public-key system, recipient, recoverable part, reflection attack, replay attacks, rootkit, router, run manual, salt, secret key, secret-key cryptography, secure hash algorithm, secure hash standard, secure hypertext transfer protocol, secure multipurpose internet mail extensions, signaling, signature, signature process, simple mail transfer protocol, simple network management protocol, smurf, sniffer, spam, spam filtering software, spamming, steganography, superencryption, symmetric cryptography, symmetric key, system indicator, time variant parameter, token authenticator, tokens, traffic load, traffic padding, traffic-flow security, trailer, trap, trapdoor, troll, tunnel, tunneling, verification process, virus hoax, vishing, wireless gateway server,
- message authentication code
- IncludedBy:authentication, code, message,
- Includes:hashed message authentication code, message authentication code algorithm, message authentication code vs. Message Authentication Code,
- Related:algorithm, cryptographic, cryptography, data authentication code vs. Data Authentication Code, hash function, integrity, key, message integrity code,
- Synonym:data authentication code,
- message authentication code algorithm
- IncludedBy:algorithm, code, message, message authentication code,
- Related:cryptographic, cryptography, function, key, requirements,
- message authentication code vs. Message Authentication Code
- IncludedBy:code, message, message authentication code,
- Related:algorithm, cipher, computer, cryptography, email, encryption, function, hash, integrity, key, software, standard,
- message authentication key
- IncludedBy:authentication, key,
- message digest
- IncludedBy:message,
- Includes:message digest algorithm 5,
- PreferredFor:digest,
- Related:algorithm, cryptographic, file, function, hash, integrity, property, signature, test,
- message digest algorithm 5
- IncludedBy:algorithm, message, message digest,
- Related:cryptographic,
- message externals
- IncludedBy:message,
- Related:information,
- message handling system
- IncludedBy:message, system,
- Related:email, users,
- message identifier
- IncludedBy:message,
- Related:identify,
- message indicator
- IncludedBy:message,
- Related:communications, cryptographic system, cryptography, system,
- message integrity check
- HasPreferred:message integrity code,
- message integrity code
- IncludedBy:code, integrity, message,
- PreferredFor:message integrity check,
- Related:authentication, computer, email, encryption, hash, key, message authentication code, software,
- message passing
- IncludedBy:message,
- Related:object, operation, target,
- message representative
- IncludedBy:message,
- Related:function, key, signature,
- Message Security Protocol
- IncludedBy:message, protocols, security protocol,
- Related:National Security Agency, internet, program, system,
- meta-language
- Related:application, computer, semantics,
- metadata
- IncludedBy:database management system,
- Includes:bound metadata,
- Related:CKMS, compromise, cryptographic, cryptographic key management system, destroyed compromised state, destroyed state, domain, file, generation, information, key, key output, process, registration,
- metrics
- Related:algorithm, assessment, function, process, random, software, software development,
- metropolitan area networks
- IncludedBy:network,
- microcode
- IncludedBy:code, cryptographic module,
- Related:computer, program,
- mid-level certification
- IncludedBy:certification,
- Related:availability, confidentiality, integrity, system,
- middleware
- Related:application, computer, software, system,
- million instruction per second
- IncludedBy:automated information system,
- MIME Object Security Services
- IncludedBy:internet, object, security protocol,
- Related:cryptography, digital signature, encryption, key, message, protocols, signature,
- mimicking
- IncludedBy:attack, masquerade,
- Related:impersonation, spoof,
- Synonym:spoofing,
- min-entropy
- Related:attack, attackers, passwords, random, system, users,
- mine warfare
- IncludedBy:warfare,
- miniature receiver terminal
- miniature terminal
- minimalist cryptography
- IncludedBy:cryptography,
- minimum background investigation
- Related:subject, trust,
- minimum essential emergency communications network
- IncludedBy:communications, minimum essential infrastructure, network,
- minimum essential infrastructure
- Includes:MEI resource elements, minimum essential emergency communications network,
- Related:access control, accountability, areas of potential compromise, availability, continuity of services and operations, segregation of duties,
- minimum essential requirements
- IncludedBy:requirements,
- Minimum Interoperability Specification for PKI Components
- IncludedBy:interoperability, public-key infrastructure,
- Related:certificate, file, operation, profile,
- minimum level of protection
- Related:assurance, risk,
- minor application
- Related:access, risk, security,
- minor derogatory information
- Related:security,
- minutiae
- IncludedBy:biometrics,
- mirroring
- Related:availability, backup, computer, computer network, process,
- misappropriation
- IncludedBy:threat consequence,
- Related:attack, authorized, control, entity, resource, system,
- misnamed files
- MISSI user
- IncludedBy:multilevel information systems security initiative, users,
- Related:Fortezza, X.509, certificate, certification, entity, key, process, public-key, public-key infrastructure, subject, system,
- mission assurance category
- IncludedBy:assurance,
- Related:availability, certification, object, requirements,
- mission critical
- IncludedBy:critical,
- Related:access, authorized, classified, communications, information, information security, management, operation, process, security, system, telecommunications, vulnerability,
- mission critical system
- IncludedBy:critical, system,
- Related:business process, process,
- mission essential
- mission needs statement
- IncludedBy:threat,
- misuse
- IncludedBy:threat consequence,
- Related:function, security, system,
- misuse detection model
- IncludedBy:model, security policy model,
- Related:intrusion, rules based detection, system, vulnerability,
- mitigation
- IncludedBy:risk management,
- Related:incident, response,
- mnemonic
- mobile code
- IncludedBy:code,
- Related:information, module, program, software, system, users,
- mobile code technologies
- Related:software,
- mobile device
- mobile software agent
- IncludedBy:software,
- mobile subscribe
- mobile subscriber equipment
- mobile topology
- mockingbird
- IncludedBy:threat,
- Related:computer, function, malicious, process, program, system, users,
- mode
- HasPreferred:mode of operation,
- mode of operation
- IncludedBy:operation,
- PreferredFor:mode,
- Related:access, access control, algorithm, application, authorization, authorized, cipher, classification levels, classified, cryptographic, encryption, information, key, policy, process, security, system, users,
- model
- Includes:Bell-LaPadula security model, Biba Integrity model, Biba model, Clark Wilson integrity model, Open Systems Interconnection Reference model, TOE security policy model, anomaly detection model, as-is process model, formal model of security policy, formal security policy model, lattice model, misuse detection model, modeling or flowcharting, open system interconnection model, security model, security policy model, simulation modeling, third party trusted host model, to-be-process model,
- Related:*-property, CASE tools, OSI architecture, Standards for Interoperable LAN/MAN Security, analysis, client server, credentials, discrete event simulation, domain, energy-efficient computer equipment, finite state machine, formal development methodology, formal top-level specification, formal verification, internet vs. Internet, object, operation, process, prototyping, secure hypertext transfer protocol, security, security policy, simple security condition, simple security property, subject, system, ticket, top-level specification, tranquility, trusted subject, verification, world class organizations,
- model experimental development model/exploratory development model
- modeling or flowcharting
- IncludedBy:flow, model,
- Related:process,
- modem
- Related:application, computer,
- moderate impact
- Related:availability, damage, security, threat,
- moderate-impact system
- IncludedBy:system,
- Related:availability, information, integrity, object, security,
- modes of operation
- IncludedBy:operation,
- Includes:automated information system, dedicated security mode, multilevel device, multilevel secure, multilevel security mode, multiuser mode of operation, partitioned security mode, protection ring, single-level device, stand-alone, shared system, stand-alone, single-user system, system high, system low, system-high security mode,
- Related:access, access control, authorization, authorized, classification levels, classified, control, function, information, process, program, security, software, system, trust, users,
- modification/configuration control board
- IncludedBy:control,
- modular software
- IncludedBy:software,
- Related:module, process,
- modularity
- Related:module, software,
- module
- Includes:COMSEC module, cryptographic module, cryptographic module security policy, plug-in modules, trusted platform module chip,
- Related:Commercial COMSEC Evaluation Program, FIPS PUB 140-1, PC card, common data security, control information, critical security parameters, cryptographic boundary, cryptographic ignition key, cryptographic service, cryptographic token, electronic key entry, environmental failure protection, environmental failure testing, hardware, information systems security product, input data, interface, key entry, key loader, key output, key owner, manual key entry, mobile code, modular software, modularity, operator, output data, physical protection, port, portability, security event, session key, software architecture, split knowledge, status information, trusted path, type 3 product, validate vs. verify, white-box testing, worm, zeroize,
- modulus
- Related:cryptography, key, public-key,
- monitor
- Related:evidence, trust,
- monitoring and evaluation
- IncludedBy:evaluation,
- Related:assessment, process, risk, risk management, security testing, test, validation,
- Monitoring of Evaluations
- IncludedBy:Common Criteria Testing Laboratory, evaluation,
- Related:confidence, function, security,
- monolithic TCB
- IncludedBy:trusted computing base,
- morris worm
- IncludedBy:worm,
- Related:program,
- motion control network
- IncludedBy:control, network,
- Related:application,
- motion detection sensor
- motivation
- IncludedBy:security,
- Related:access, access control, adversary, attack, authorized, unauthorized access,
- multi-hop problem
- Related:risk, security, software,
- multi-hop relay topology
- multi-releasable
- Related:access, control, users,
- multi-security level
- IncludedBy:security,
- Related:information, process,
- multicast
- Related:communications, information, system,
- multifactor authentication
- IncludedBy:authentication,
- multihost based auditing
- IncludedBy:audit, automated information system,
- Related:intrusion,
- multilevel device
- IncludedBy:modes of operation,
- Related:compromise, process, risk, security, trust,
- multilevel information systems security initiative
- IncludedBy:National Security Agency, computer security, information, system,
- Includes:MISSI user, SSO PIN, SSO-PIN ORA, certificate, certificate rekey, certification, certification hierarchy, compromised key list, domain, key, key lifetime, key material identifier, no-PIN ORA, organizational certificate, organizational registration authority, personality label, policy approving authority, policy creation authority, root, root registry, slot, subordinate certification authority, user PIN, user-PIN ORA,
- Related:network, program,
- multilevel mode
- Related:access, access control, information, operation, process, security, system, users,
- multilevel secure
- IncludedBy:modes of operation,
- Related:access, access control, authorization, information, resource, security, system, users,
- multilevel security
- IncludedBy:authorization, security,
- Includes:controlled security mode,
- Related:access, access control, classification levels, classified, communications, information, process, system,
- multilevel security mode
- IncludedBy:modes of operation, security,
- Includes:system-high security mode,
- Related:access, access control, accreditation, authorization, classification levels, classified, information, operation, policy, process, system, users,
- multimedia
- Related:information,
- multinational warfare
- IncludedBy:warfare,
- multipartite virus
- IncludedBy:virus,
- Related:file,
- multiple access rights terminal
- IncludedBy:access,
- Related:users,
- multiple component incident
- IncludedBy:incident,
- multiple facility organization
- Related:trust,
multiple input, multiple output technology:
- multiple input, multiple output technology:
- multiple security levels
- IncludedBy:security,
- Related:trust,
- multiple sources
- multipurpose internet mail extensions
- IncludedBy:email, internet, security protocol,
- Includes:secure multipurpose internet mail extensions,
- Related:application, file, message, protocols, system,
- multiuser mode of operation
- IncludedBy:modes of operation, operation, users,
- Related:classified, computer, information, process, requirements, system,
- mutation analysis
- IncludedBy:analysis,
- Related:error seeding, program, test,
- mutation testing
- IncludedBy:security testing, test,
- Related:program,
- mutual authentication
- IncludedBy:authentication,
- Related:assurance, entity, identity, unilateral authentication,
- Synonym:mutual entity authentication,
- mutual entity authentication
- IncludedBy:authentication, entity,
- Related:assurance, identity,
- Synonym:mutual authentication,
- mutual forward secrecy
- IncludedBy:forward secrecy,
- Related:key, operation, property,
- mutual recognition of certificates
- IncludedBy:certificate,
- mutual suspicion
- IncludedBy:security,
- Related:entity, function, system, trust,
- mutually suspicious
- IncludedBy:security,
- Related:function, process, program, property, system,
- n-bit block cipher
- IncludedBy:cipher,
- Related:property,
- nak attack
- IncludedBy:attack,
- Related:penetration, system,
- naming authority
- narrowband network
- IncludedBy:network,
- national agency check
- Related:security,
- national agency check plus written inquiries
- Related:security,
- national agency check with local agency checks and credit check
- Related:security,
- National Communications System
- IncludedBy:communications, system,
- national computer security assessment program
- IncludedBy:assessment, computer, computer security, program,
- Related:analysis, critical, file, information, profile, system, threat, vulnerability,
- National Computer Security Center
- IncludedBy:computer, computer security,
- Includes:trusted computer system,
- Related:National Security Agency, availability, criteria, evaluation, network, system, trust,
- National Computer Security Center glossary
- IncludedBy:computer, computer security,
- Related:network, trust,
- National COMSEC Advisory Memorandum
- IncludedBy:advisory, communications security,
- National COMSEC Information Memorandum
- IncludedBy:communications security, information,
- National COMSEC Instruction
- IncludedBy:communications security,
- National Cryptologic School
- IncludedBy:cryptography,
- National Industrial Security Advisory Committee
- IncludedBy:advisory, security,
- national information assurance partnership
- IncludedBy:Common Criteria for Information Technology Security, National Institute of Standards and Technology, information, information assurance,
- Includes:Common Criteria Testing Laboratory, Common Criteria Testing Program, Common Evaluation Methodology, NIAP Common Criteria Evaluation and Validation Scheme, NIAP Oversight Body, National Voluntary Laboratory Accreditation Program, accreditation body, approved technologies list, approved test methods list, degausser products list, deliverables list, designated laboratories list, endorsed tools list, evaluated products list, preferred products list, validated products list,
- Related:National Security Agency, accreditation, confidence, criteria, file, function, information security, object, profile, program, quality, requirements, security testing, system, technology, test, users,
- national information infrastructure
- IncludedBy:information,
- Related:adversary, communications, computer, connection, critical, internet, key, network, users,
- National Institute of Standards and Technology
- IncludedBy:standard, technology,
- Includes:Clipper chip, Common Criteria for Information Technology Security, Computer Security Objects Register, Digital Signature Standard, FIPS PUB 140-1, FIPS approved security method, Federal Criteria Vol. I, Federal Information Processing Standards, Federal Standard 1027, Fortezza, NIAP Common Criteria Evaluation and Validation Scheme, advanced encryption standard, data authentication code, data encryption standard, national information assurance partnership, object identifier, party, validate vs. verify,
- Related:classified, information, information security,
- national intelligence
- IncludedBy:intelligence,
- Related:security, threat,
- National of the United States
- HasPreferred:United States national,
- national quality award
- IncludedBy:quality,
- National Security Agency
- IncludedBy:security,
- Includes:CAPSTONE chip, Clipper chip, Fortezza, Skipjack, degausser, degausser products list, evaluated products list, multilevel information systems security initiative, preferred products list, rainbow series,
- Related:Common Criteria for Information Technology Security, Federal Standard 1027, Internet Protocol Security Option, Key Exchange Algorithm, Message Security Protocol, NIAP Common Criteria Evaluation and Validation Scheme, National Computer Security Center, Secure Data Network System, Type I cryptography, Type II cryptography, classified, information, information security, intelligence, national information assurance partnership, party, system,
- National Security Agency/Central Security Service
- IncludedBy:security,
- National Security Decision Directive 145
- IncludedBy:security,
- Includes:object, subcommittee on Automated Information System security, subcommittee on telecommunications security,
- Related:communications, computer security, information, policy, process, system, telecommunications,
- National Security Decision Directive
- IncludedBy:security,
- National Security Directive
- IncludedBy:security,
- National Security Emergency Preparedness
- IncludedBy:security,
- national security information
- IncludedBy:information, security,
- Related:access, access control, authorized, classified, control, control systems, intelligence, process, system,
- national security system
- IncludedBy:security, system,
- Related:application, authorized, classified, code, communications, control, criteria, critical, cryptography, foreign, function, information, information security, intelligence, management, operation, policy, subject, telecommunications,
- National Security Telecommunications Advisory Committee
- IncludedBy:advisory, communications, security, telecommunications,
- National Security Telecommunications and Information Systems Security Advisory/Information Memorandum
- IncludedBy:advisory, communications, computer security, information, system, telecommunications,
- National Security Telecommunications and Information Systems Security Committee
- IncludedBy:communications, computer security, information, system, telecommunications,
- Related:operation, policy,
- National Security Telecommunications and Information Systems Security Directive
- IncludedBy:communications, computer security, information, system, telecommunications,
- National Security Telecommunications and Information Systems Security Instruction
- IncludedBy:communications, computer security, information, system, telecommunications,
- National Security Telecommunications and Information Systems Security Policy
- IncludedBy:communications, computer security, information, policy, system, telecommunications,
- national security-related information
- IncludedBy:security,
- Related:classified, foreign,
- National Telecommunications and Information Administration
- IncludedBy:communications, information, telecommunications,
- Related:network,
- national telecommunications and information system security directives
- IncludedBy:communications, computer security, information, system, telecommunications,
- Related:authority, backup, program,
- National Telecommunications and Information Systems Security Advisory Memoranda/Instructions
- IncludedBy:advisory, communications, computer security, information, system, telecommunications,
- National Telecommunications and Information Systems Security Directive
- IncludedBy:communications, computer security, information, system, telecommunications,
- National Telecommunications and Information Systems Security Instruction
- IncludedBy:communications, computer security, information, system, telecommunications,
- National Telecommunications and Information Systems Security Policy
- IncludedBy:communications, computer security, information, policy, system, telecommunications,
- National Voluntary Laboratory Accreditation Program
- IncludedBy:accreditation, national information assurance partnership, program,
- Related:IT security, authority, computer security, criteria, evaluation, security, validation,
- national vulnerability database
- IncludedBy:vulnerability,
- Related:management, security,
- nations
- IncludedBy:threat,
- Related:United States citizen, communications, cyberspace, entity, information, program,
- natural benchmark
- Related:program, users,
- natural disaster
- IncludedBy:threat consequence,
- Related:critical, critical infrastructures, function, system,
- naval coastal warfare
- IncludedBy:warfare,
- Related:control, policy, security,
- naval expeditionary warfare
- IncludedBy:warfare,
- Related:object,
- naval nuclear propulsion information
- Related:classified,
- naval special warfare
- IncludedBy:warfare,
- Related:application,
- need for access
- IncludedBy:access,
- Related:authorized, classified,
- need-to-know
- IncludedBy:access control, least privilege,
- Includes:need-to-know determination,
- Related:access, authorized, classified, information,
- need-to-know determination
- IncludedBy:authorization, need-to-know,
- Related:access, authorized, information,
- negative acknowledgment
- negative tests
- IncludedBy:test,
- Related:security testing, software,
- negotiated acquisition
- Related:response,
- net control station
- IncludedBy:control,
- net present value
- net-centric architecture
- network
- IncludedBy:automated information system,
- Includes:ARPANET, Advanced Research Projects Agency Network, Defense Information System Network, Defense Information Systems Network, Defense Information Systems Network Designated Approving Authority, Integrated services digital network, Network File System, Network Layer Security Protocol, Secure Data Network System, Trusted Network Interpretation Environment Guideline, ad hoc network, advanced intelligence network, advanced intelligent network, automatic digital network, bot-network operators, broadband network, centrally-administered network, communications, computer network, computer network attack, computer network defense, computer network exploitation, computer network operations, control network, defense switched network, encrypted network, external network, financial crimes enforcement network, global network information environment, ground wave emergency network, information system and network security, interconnected network , internal network, internetwork, internetwork private line interface, joint task force-computer network defense, limited network analyzer, local-area network, management network, metropolitan area networks, minimum essential emergency communications network, motion control network, narrowband network, network access, network access control, network address translation, network administrator, network analyzer, network architecture, network based, network behavior analysis system, network component, network configuration, network connection, network device, network discovery, network front-end, network information services, network interface card, network layer security, network level firewall, network management, network management architecture, network management protocol, network management software, network manager, network protocol stack, network reference monitor, network security, network security architecture, network security architecture and design, network security officer, network service worm, network services, network size, network sniffing, network sponsor, network system, network tap, network topology, network trusted computing base, network weaving, network worm, network-based intrusion prevention system, networking features of software, personal communications network, physically isolated network, protected network, robust security network, secure network server, security policy automation network, simple network management protocol, subnetwork, trusted network interpretation, unclassified internet protocol router network, unified network, unlimited network analyzer, unprotected network, value-added network, virtual network perimeter, virtual private network, wide-area network, wireless local area network,
- Related:Chernobyl packet, Common Criteria for Information Technology Security, Defense Information Infrastructure, Estelle, Extensible Authentication Protocol, Guidelines and Recommendations for Security Incident Processing, IEEE 802.10, IP address, IP splicing/hijacking, Internet Assigned Numbers Authority, Internet Protocol Security Option, Internet worm, Java, Layer 2 Forwarding Protocol, Layer 2 Tunneling Protocol, NTCB partition, National Computer Security Center, National Computer Security Center glossary, National Telecommunications and Information Administration, OSI architecture, Open Systems Interconnection Reference model, Red book, SATAN, SOCKS, Secure Data Exchange, Secure Electronic Transaction, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, Terminal Access Controller Access Control System, acceptable level of risk, acceptable use policy, access control, accreditation, accreditation range, address spoofing, alarm reporting, alarm surveillance, alert, application program interface, asynchronous transfer mode, attack, auditing tool, authenticate, authentication service, automated key distribution, automated security incident measurement, bandwidth, bastion host, brand, break, brouters, cascading, cellular transmission, checksum, circuit switching, class hierarchy, communication channel, component, computer, computer emergency response team, computer oracle and password system, computing security methods, confidentiality, connection, control, data source, datagram, designated approving authority, digital signature, diplomatic telecommunications service, distributed data, distributed database, distributed processing, downgrade, dual-homed gateway firewall, electronic benefit transfer, email security software, encrypt for transmission only, end system, end-to-end encryption, end-user, ethernet meltdown, evaluation assurance level, extranet, fault, file transfer, file transfer access management, file transfer protocol, filtering router, firewall, future narrow band digital terminal, gateway, global command and control system, global telecommunications service, goodput, gopher, government emergency telecommunications service, guard, hackers, hacking, homed, host, host-based firewall, hypertext transfer protocol, impersonation, information, initial transformation, insider attack, international telecommunication union, internet, internet control message protocol, internet protocol, internet vs. Internet, intranet, intrusion detection, intrusion detection systems, ip spoofing, kerberos, killer packets, language of temporal ordering specification, level of protection, link, link encryption, logical system definition, message, multilevel information systems security initiative, national information infrastructure, non-technical countermeasure, object, octet, on-line transaction processing, open system environment, open system interconnection model, open systems interconnection, open systems security, overt channel, packet, packet filtering, packet sniffer, packet switching, packet transfer mode, passive, password sniffing, passwords, perimeter-based security, phreaking, point-to-point tunneling protocol, pretty good privacy, private branch exchange, private decipherment transformation, proprietary protocol, protocol suite, protocols, proxy, purge, queuing theory, remote access software, remote authentication dial-in user service, remote login, residual risk, rootkit, router, router-based firewall, routing control, ruleset, sanitization, screened subnet firewall, screening router, secure profile inspector, secure shell, secure socket layer, security architecture, security gateway, security incident, security kernel, security management, security net control station, security range, security situation, security-compliant channel, server, signaling, signaling system 7, single sign-on, smurf, smurfing, sniffer, start-up KEK, state transition diagram, stealth probe, subject, superuser, synchronous flood, synchronous transmission, system, tcpwrapper, technical countermeasures, technology area, telecommunications, telnet, threat, tinkerbell program, topology, trace packet, traffic load, transaction file, transfer device, transfer time, transmission, transmission control protocol, transmission medium, transmission security, trusted identification forwarding, trusted process, tunnel, tunneled VPN, tunneling, tunneling router, user data protocol, users, vulnerability, web browser cache, web of trust, web vs. Web, wiretapping, worm,
- network access
- IncludedBy:access, network,
- network access control
- IncludedBy:access, control, network,
- network address translation
- IncludedBy:firewall, network,
- Related:connection, internet, security,
- network administrator
- IncludedBy:network,
- Related:control,
- network analyzer
- IncludedBy:network,
- Related:control, protocols, software,
- network architecture
- IncludedBy:network, security architecture,
- Includes:network component, object,
- Related:communications, process, protocols, software, standard,
- network based
- IncludedBy:network,
- Related:audit, intrusion,
- network behavior analysis system
- IncludedBy:analysis, network, system,
- Related:flow, identify, intrusion, intrusion detection, threat,
- network component
- IncludedBy:component, network, network architecture,
- Includes:network front-end, network reference monitor,
- Related:access, access control, audit, authentication, computer, control, criteria, evaluation, identification, policy, system, trust, trusted computer system, users,
- network configuration
- IncludedBy:network,
- Related:communications, connection, resource,
- network connection
- IncludedBy:connection, network,
- Related:control, information, internet, protocols,
- network device
- IncludedBy:network,
- Related:communications, computer, router, system,
- network discovery
- IncludedBy:network,
- Related:process,
- Network File System
- IncludedBy:file, network, system,
- Related:access, access control, application, function, protocols,
- network front-end
- IncludedBy:network, network component,
- Related:computer, protocols, security, system,
- network information services
- IncludedBy:information, network,
- Related:resource,
- network interface card
- IncludedBy:interface, network,
- network layer security
- IncludedBy:network, security,
- Related:communications,
- Network Layer Security Protocol
- IncludedBy:network, protocols, security protocol,
- Related:encryption,
- network level firewall
- IncludedBy:firewall, network,
- Related:protocols,
- network management
- IncludedBy:network,
- Related:communications, control, fault, integrity, operation, security,
- network management architecture
- IncludedBy:network,
- Related:communications, software,
- network management protocol
- IncludedBy:network, protocols,
- Related:communications, information, operation, response,
- network management software
- IncludedBy:network, software,
- Related:security, system,
- network manager
- IncludedBy:network,
- network protocol stack
- IncludedBy:network, protocols,
- Related:application, software,
- network reference monitor
- IncludedBy:access control, network, network component, reference monitor,
- Includes:object, subject,
- Related:access, control,
- network security
- IncludedBy:communications security, information systems security, network,
- Related:access, access control, assurance, authorized, control, critical, function, information, integrity, system, unauthorized access,
- network security architecture
- IncludedBy:communications security, network,
- network security architecture and design
- IncludedBy:communications security, network,
- network security officer
- IncludedBy:communications security, information systems security officer, network, officer,
- Related:authority, information, information assurance officer, system,
- network service worm
- IncludedBy:network, worm,
- Related:application, system, vulnerability,
- network services
- IncludedBy:network,
- Related:computer, system, users,
- network size
- IncludedBy:network,
- network sniffing
- IncludedBy:network,
- Related:analysis, code, identification, information, protocols, target, threat,
- network sponsor
- IncludedBy:network,
- Includes:functional proponent,
- Related:communications security, policy, security, system,
- network system
- IncludedBy:network, system,
- Related:security,
- network tap
- IncludedBy:network,
- Related:connection,
- network topology
- IncludedBy:network,
- network trusted computing base
- IncludedBy:network, trusted computing base,
- Includes:NTCB partition,
- Related:policy, security, software, system,
- network weaving
- IncludedBy:network,
- Related:access, access control, communications, penetration,
- network worm
- IncludedBy:network, worm,
- Related:internet, program, system,
- network-based intrusion prevention system
- IncludedBy:intrusion, network, system,
- Related:identify, program,
- networking features of software
- IncludedBy:network, software,
- newly discovered records
- NIAP Common Criteria Evaluation and Validation Scheme
- IncludedBy:National Institute of Standards and Technology, criteria, national information assurance partnership, validation,
- Related:National Security Agency, information, trust,
- NIAP Oversight Body
- IncludedBy:national information assurance partnership,
- Related:criteria, evaluation, operation, validation,
- nibble
- Related:automated information system,
- nicknames
- Related:access, classified,
- no prior relationship
- Related:digital signature, signature,
- no-lone zone
- Related:access, access control, authorized, security,
- no-PIN ORA
- IncludedBy:multilevel information systems security initiative,
- Related:Fortezza, function, users,
- node
- Related:computer, users,
- nominal variable
- non-conductive section
- non-disclosure agreement
- Related:access, authorized, classified, intelligence, requirements, security,
- non-discretionary access control
- Antonym:discretionary access control,
- IncludedBy:access, control,
- Related:non-discretionary security, object,
- Synonym:mandatory access control,
- non-discretionary security
- IncludedBy:security,
- Related:access, access control, classification levels, classified, information, non-discretionary access control, policy, users,
- non-discussion area
- Related:access, authorized, classified,
- non-line-of-sight signal propagation
- non-local maintenance
- non-organizational user
- Related:users,
- non-record material
- non-recoverable part
- Related:message, recovery, signature,
- non-repudiation
- Antonym:repudiation,
- IncludedBy:certification authority, quality of protection,
- Includes:non-repudiation exchange, non-repudiation information, non-repudiation of creation, non-repudiation of delivery, non-repudiation of knowledge, non-repudiation of origin, non-repudiation of receipt, non-repudiation of sending, non-repudiation of submission, non-repudiation of transport, non-repudiation policy, non-repudiation service, non-repudiation token, privacy, authentication, integrity, identification, non-repudiation, privacy, authentication, integrity, non-repudiation,
- Related:Generic Security Service Application Program Interface, IT security, NRD token, NRO token, NRS token, NRT token, accountability, assurance, authentication, control, cryptographic, cryptography, defense-wide information assurance program, digital signature, distinguishing identifier, entity, evidence, identity, information, information assurance, integrity, invalidity date, key, message, notarization token, originator, process, proof, public-key, recipient, sandboxed environment, secure single sign-on, security, signature, validate,
- non-repudiation exchange
- IncludedBy:non-repudiation,
- Related:information,
- non-repudiation information
- IncludedBy:information, non-repudiation,
- Related:evidence, policy, validate,
- non-repudiation of creation
- IncludedBy:non-repudiation,
- Related:entity, message,
- non-repudiation of delivery
- IncludedBy:non-repudiation,
- Includes:NRD token,
- Related:message,
- non-repudiation of knowledge
- IncludedBy:non-repudiation,
- Related:message,
- non-repudiation of origin
- IncludedBy:non-repudiation,
- Includes:NRO token,
- Related:message,
- non-repudiation of receipt
- IncludedBy:non-repudiation,
- Related:message,
- non-repudiation of sending
- IncludedBy:non-repudiation,
- Related:message,
- non-repudiation of submission
- IncludedBy:non-repudiation,
- Includes:NRS token,
- Related:authority, evidence, message,
- non-repudiation of transport
- IncludedBy:non-repudiation,
- Includes:NRT token,
- Related:authority, evidence, message,
- non-repudiation policy
- IncludedBy:non-repudiation, policy,
- Related:criteria, evidence, verification,
- non-repudiation service
- IncludedBy:non-repudiation,
- Related:archive, authentication, critical, entity, evidence, process, retrieval, security, subject, test, trust, version,
- non-repudiation token
- IncludedBy:non-repudiation, tokens,
- Includes:NRD token, NRO token, NRS token, NRT token,
- Related:evidence, security,
- non-technical countermeasure
- IncludedBy:countermeasures, security,
- Related:adversary, exploit, information, information security, network, process, system, vulnerability,
- non-volatile random access memory
- IncludedBy:access,
- nonce
- Related:attack, authentication, key, protocols, random, response, security,
- noncomputing security methods
- IncludedBy:security,
- Related:access, access control, control, resource, software,
- nonkernel security related
- IncludedBy:security,
- nonvolatile memory components
- normal operation
- IncludedBy:operation,
- Related:process, system,
- north atlantic treaty organization classified information
- IncludedBy:classified,
- notarization
- Related:assurance, authority, evidence, registration, trust,
- notarization token
- IncludedBy:tokens,
- Related:non-repudiation,
- notary
- Related:evidence, revocation, tokens, trust,
- NRD token
- IncludedBy:non-repudiation of delivery, non-repudiation token, tokens,
- Related:message, non-repudiation,
- NRO token
- IncludedBy:non-repudiation of origin, non-repudiation token, tokens,
- Related:message, non-repudiation,
- NRS token
- IncludedBy:non-repudiation of submission, non-repudiation token, tokens,
- Related:authority, message, non-repudiation,
- NRT token
- IncludedBy:non-repudiation of transport, non-repudiation token, tokens,
- Related:authority, message, non-repudiation,
- NSA-approved cryptography
- IncludedBy:cryptography,
- Related:management,
- NTCB partition
- IncludedBy:network trusted computing base, trusted computing base,
- Related:network, policy,
- nuclear command and control document
- IncludedBy:command and control, control,
- nuclear warfare
- IncludedBy:warfare,
- null
- Related:code, message, security,
- NULL encryption algorithm
- IncludedBy:algorithm, encryption,
- Related:confidentiality, internet protocol security, internet security protocol,
- OAKLEY
- Related:algorithm, authentication, entity, establishment, identity, internet protocol security, internet security protocol, key, protocols, public-key, threat, update, users,
- obfuscation technique
- Related:virus,
- object
- IncludedBy:Bell-LaPadula security model, National Security Decision Directive 145, TCB subset, TOE security policy, acceptance procedure, access, accountability, availability, candidate TCB subset, capability, category, component reference monitor, computer architecture, configuration control, default classification, dominated by, environment, functional component, granularity, granularity of a requirement, information flow control, isolation, list-oriented, network architecture, network reference monitor, owner, package, passive, permissions, product rationale, protection philosophy, protection-critical portions of the TCB, read, read access, reference monitor, reference monitor concept, reference validation mechanism, resource, scavenging, scope of a requirement, secure state, secure subsystem, security attribute, security enforcing, security function policy, security functions, security label, security policy, sensitivity label, shall, should, simple security condition, simple security property, software requirement, subject security level, technical policy, technical security policy, ticket-oriented, tranquility, trusted subject, verification, write, write access,
- Includes:Computer Security Objects Register, IT security objective, MIME Object Security Services, TOE security functions, class object, computer security object, control objectives, control objectives for information and related technology, domain, object code, object identifier, object reuse, object-oriented programming, recovery point objectives, recovery time objectives, security information object, security information object class, security objectives, storage object, top-level security objectives,
- Related:Abstract Syntax Notation One, Biba Integrity model, Biba model, British Standard 7799, Internet Corporation for Assigned Names and Numbers, JTC1 Registration Authority, SOCKS, X.500 Directory, access control lists, access level, access mode, access profile, access type, acquisition strategy, areas of control, assurance, attribute, audit, audit plan, authenticate, authentication, camouflage, certificate policy, certification path, checksum, class, classification, classification levels, code, common name, competition, compiler, component, compromise, computer, concept of operations, confidentiality, confinement property, construction of TOE requirements, control, controlled information, countermeasures, credentials, critical information, cyberspace operations, deliberate compromise of classified information, deliverable, dependency, digital certificate, digital document, digital signature, directory service, discretionary access control, distinguished name, dynamic binding, encapsulation, entity, exploit, extensible markup language, family, file, general controls, hash function, high-impact system, hybrid threat, hydroscope, hyperlink, hypermedia, identity, identity token, identity-based security policy, imagery, imagery intelligence, information, information assurance, information warfare, inheritance, instance, integrity, intent, key, key management infrastructure, keyed hash, low-impact system, mandatory access control, media, message passing, mission assurance category, model, moderate-impact system, national information assurance partnership, naval expeditionary warfare, network, non-discretionary access control, operation, payload, polymorphism, process, program, protected checksum, protection profile, protocols, psychological operations, questions on controls, response, risk identification, rule-based security policy, seal, security audit, security domain, security goals, security level, security purpose, security testing, sensitive label, sign, signer, software performance engineering, source code, spam, special activity, special program review group, static binding, subject, system, system entity, target, test case, test item, threat, tokens, topical areas, uniform resource identifier, uniform resource locator, vulnerability, work program, wrap,
- UsedBy:subject,
- object code
- IncludedBy:code, object,
- Related:automated information system,
- object identifier
- IncludedBy:Abstract Syntax Notation One, National Institute of Standards and Technology, object,
- Related:X.509, information, internet, protocols, public-key infrastructure, security, standard,
- object reuse
- IncludedBy:object,
- Includes:subject,
- object-oriented programming
- IncludedBy:object, program,
- Related:automated information system,
- observables
- observation reports
- IncludedBy:Common Criteria Testing Laboratory,
- Related:IT security, computer security, evaluation, identify, security,
- obstruction
- IncludedBy:threat consequence,
- Related:operation, system,
- octet
- Related:network, standard, system,
- oersted
- off-card
- off-line attack
- IncludedBy:attack,
- Related:authentication, file, protocols, system,
- off-line cryptosystem
- IncludedBy:cryptographic system, system,
- Related:encryption, function,
- office information system
- Related:users,
- Office of Foreign Assets Control
- IncludedBy:control, foreign,
- Related:policy, security, target,
- office of management and budget
- office of personnel management
- Related:access, security,
- officer
- Includes:chief information agency officer, chief information officer, cryptographic officer, information assurance officer, information system security officer, information systems security officer, network security officer, security officer, system security officer,
- Related:binding, evaluator, management, security, tiger team, users,
- official department of defense information
- official information
- IncludedBy:information,
- Related:control,
- ohnosecond
- Related:compromise, key,
- on ramp
- Related:connection, information,
- on-access scanning
- IncludedBy:access,
- Related:file, malware, security,
- on-card
- on-demand scanning
- Related:computer, malware, security, users,
- on-line cryptosystem
- IncludedBy:cryptographic system, system,
- Related:association, encryption, function,
- on-line system
- IncludedBy:system,
- Related:application, computer, interface, program,
- on-line transaction processing
- IncludedBy:process,
- Related:network,
- one-part code
- IncludedBy:code,
- Related:information, system,
- one-time access
- IncludedBy:access,
- Related:classified, security,
- one-time cryptosystem
- IncludedBy:cryptographic system, system,
- Related:key,
- one-time pad
- Related:algorithm, analysis, cipher, cryptographic system, cryptography, destruction, encryption, key, key management, random, resource, system,
- one-time passwords
- IncludedBy:passwords,
- Related:attack, authentication, cryptographic, cryptography, entity, function, hash, identity, information, internet, key, login, process, protocols, system, threat,
- one-time tape
- Related:cryptographic system, cryptography, key, system,
- one-way encryption
- IncludedBy:encryption,
- Related:cipher, cryptographic, key,
- one-way function
- IncludedBy:function,
- Related:cryptographic, cryptography, domain, hash, property,
- one-way hash algorithm
- online attack
- IncludedBy:attack,
- Related:access, authentication, protocols, role,
- online certificate status protocol
- IncludedBy:certificate, protocols, security protocol,
- Related:application, communications, information, internet, key, public-key, response, revocation, revoked state,
- online guessing attack
- IncludedBy:attack,
- open security
- IncludedBy:security,
- Related:application, assurance, malicious, operation, system,
- open security environment
- IncludedBy:security,
- Related:application, assurance, authorization, control, malicious, operation, system,
- open source intelligence
- IncludedBy:intelligence,
- open storage
- Related:authorized, classified, information, security,
- open storage area
- Related:access, security,
- open system environment
- IncludedBy:system,
- Related:interoperability, network, scalability, standard, users,
- open system interconnection
- IncludedBy:connection, system,
- open system interconnection model
- IncludedBy:Open Systems Interconnection Reference model, connection, model, security, system,
- Related:application, communications, function, message, network, process,
- open systems
- IncludedBy:system,
- Related:interoperability, standard,
- open systems interconnection
- IncludedBy:Open Systems Interconnection Reference model, connection, system,
- Related:information, network, protocols, resource, standard,
- Open Systems Interconnection Reference model
- IncludedBy:ITU-T, International organization for standardization, connection, model, system,
- Includes:OSI architecture, open system interconnection model, open systems interconnection,
- Related:X.509, application, computer, function, internet, network, protocols, public-key infrastructure, security, standard,
- open systems security
- IncludedBy:security, system,
- Related:internet, network,
- operating procedure
- IncludedBy:target of evaluation,
- Related:target,
- operating system
- IncludedBy:system,
- Related:application, computer, control, function, operation, program, resource, software,
- operating system fingerprinting
- IncludedBy:system,
- Related:target, threat,
- operation
- IncludedBy:target of evaluation,
- Includes:Defensive Information Operations, backup operations, centralized operations, component operations, computer operations, audit, and security technology, concept of operations, continuity of operations, continuity of operations plan, continuity of services and operations, information operations, mode of operation, modes of operation, multiuser mode of operation, normal operation, operational controls, operational data security, operational documentation, operational environment, operational integrity, operational key, operational risk, operational risk exposure, operational risk loss, operational testing, operational vulnerability information, operational waiver, operations code, operations manager, operations security, psychological operations, software operation, special information operations, synchronous crypto-operation,
- Related:Automated Information System security, Bell-LaPadula security model, COMSEC aid, COMSEC profile, COMSEC survey, Common Criteria for Information Technology Security, Diffie-Hellman, IA architecture, IS related risk, IT security, IT-related risk, Internet Standard, MAC algorithm key, Minimum Interoperability Specification for PKI Components, NIAP Oversight Body, National Security Telecommunications and Information Systems Security Committee, PKIX, Skipjack, TSF data, Wassenaar Arrangement, acceptable level of risk, access mode, accreditation, accreditation disapproval, accreditation range, add-on security, adequate security, administrator, alarm surveillance, anomaly, approval/accreditation, archive, asset, asymmetric keys, attack, audit, audit trail, authorize processing, authorized user, authorizing official, automated information system, banking and finance, benchmarking, binding, block cipher, block cipher key, broadband network, business areas, certificate, certification, certification package, certification practice statement, challenge-response protocol, chief information agency officer, cleartext, closed security environment, command and control, command and control warfare, compartmented mode, compensating security controls, component, computer fraud, computer network attack, configuration control, configuration management, contingency key, contingency plan, contingency planning, continuous process, continuous process improvement, control class, control information, controlled security mode, controlling authority, corruption, cost/benefit analysis, countermeasures, critical financial markets, critical infrastructures, criticality assessment, criticality/sensitivity, cryptanalysis, crypto-alarm, crypto-ancillary equipment, cryptographic key, cryptographic key component, cryptographic strength, dedicated mode, dedicated security mode, defense-in-depth, denial-of-service, designated approving authority, development assurance, digital signature, disaster recovery, disaster recovery plan, disruption, distributed processing, documentation, domain name system, dual signature, economy of mechanism, effectiveness, electronic warfare support, emanation, emergency response, encryption, end-user, enterprise, environment, error, exception, executive state, exploitation, fail safe, failure, fault tolerance, firewall, flexibility, formal security policy model, forward secrecy with respect to A, forward secrecy with respect to both A and B individually, functional testing, gateway, general controls, handle, hardware and system software maintenance, hardware or software error, incapacitation, incident response capability, information assurance, information owner, information processing standard, information protection policy, information system security officer, information systems security officer, information warfare, initialization vector, input preparation cycle, instrument, instrumentation, intelligent threat, interface control document, interference, interim accreditation action plan, interim approval to test, iteration, key, key recovery, least privilege, legacy systems, lines of business, link encryption, maintainability, master crypto-ignition key, media protection, message passing, mission critical, model, multilevel mode, multilevel security mode, mutual forward secrecy, national security system, network management, network management protocol, object, obstruction, open security, open security environment, operating system, organisational security policy, out-of-band, outage, output transformation, overload, partitioned security mode, partnership, password system, periods processing, personnel security, physical and environmental protection, physical destruction, polling, polymorphism, post-accreditation phase, potential impact, privilege, procedural security, process, protection ring, protection-critical portions of the TCB, proxy, public-key cryptography standards, public-key forward secrecy, queuing theory, rating, read, read access, real-time processing, recovery point objectives, recovery site, reference validation mechanism, reliability, repair action, requirements for procedures and standards, residue, retrieval, revocation, risk, risk assessment, risk management, risk plane, root, secret, secure hypertext transfer protocol, security, security audit trail, security awareness, training, and education, security category, security controls, security environment, security evaluation, security event, security policy, security situation, security strength, security test & evaluation, security test and evaluation, security threat, security-critical mechanisms, segregation of duties, session key, signaling, simple network management protocol, simulation modeling, site accreditation, site certification, sniffer, software build, software engineering, software lifecycle, software system test and evaluation process, special access program, starting variable, status information, store, sub-function, subject, subversion, superencryption, supervisory control and data acquisition, support software, survivability, symmetric key, system, system accreditation, system administrator, system and data integrity, system high mode, system integrity, system interconnection, system low, system owner, system security authorization agreement, system software, system-high security mode, systems engineering, tamper, target, test procedure, thrashing, threat, threat agent, threat analysis, time-compliance date, timing attacks, token backup, token copy, token management, token restore, traceroute, trusted channel, trusted identification forwarding, trusted platform module chip, trustworthy system, type accreditation, untrusted process, user data, user representative, utility programs, verification procedure refinements, vulnerability, wedged, write,
- operational controls
- IncludedBy:control, operation,
- Related:countermeasures, information, security, security controls, system,
- operational countermeasure
- operational data security
- IncludedBy:operation, security,
- Related:authorized, process,
- operational documentation
- IncludedBy:operation, target of evaluation,
- Related:information, target,
- operational environment
- IncludedBy:operation, target of evaluation,
- Related:standard, target,
- operational integrity
- IncludedBy:integrity, operation,
- Related:function, system,
- operational key
- IncludedBy:key, operation,
- Related:information,
- operational risk
- IncludedBy:operation, risk,
- Includes:operational risk exposure, operational risk loss,
- Related:process, standard, system,
- operational risk exposure
- IncludedBy:operation, operational risk,
- Related:standard,
- operational risk loss
- IncludedBy:operation, operational risk,
- Includes:business disruption and system failures, clients, products, and business practices, damage to physical assets, employment practices and workplace safety, execution, delivery, and process management, external fraud, internal fraud,
- Related:program,
- operational testing
- IncludedBy:operation, security testing, test,
- Related:system,
- operational vulnerability information
- IncludedBy:information, operation, vulnerability,
- operational waiver
- IncludedBy:operation,
- Related:authority,
- operations and support
- Related:access,
- operations code
- IncludedBy:code, operation,
- Related:communications,
- operations manager
- IncludedBy:operation,
- Related:access, access control, backup, cryptographic, cryptography, key, security, software, system, users,
- operations security
- IncludedBy:operation, security,
- Related:adversary, analysis, application, assessment, classified, control, countermeasures, critical, evidence, exploit, identification, identify, information, intelligence, process, risk, system, threat, vulnerability,
- operations security assessment
- IncludedBy:assessment, security,
- Related:evaluation,
- operations security indicator
- IncludedBy:security,
- Related:adversary, critical,
- operations security plan
- IncludedBy:security,
- operations security process
- IncludedBy:security,
- Related:analysis, assessment, countermeasures, critical, risk, threat, vulnerability,
- operations security program
- IncludedBy:security,
- operations security survey
- IncludedBy:security,
- Related:analysis, classified, evidence,
- operations security working group
- IncludedBy:security,
- operator
- IncludedBy:cryptographic module,
- Related:access, access control, cryptographic, module, process, role,
- opportunity cost
- Related:risk management,
- optical character recognition
- optical fiber
- optical scanner
- Related:computer,
- optical storage media
- optional modification
- Related:TEMPEST, communications security, control, security,
- oracle
- Related:information, software, test,
- oral/visual disclosure
- Related:foreign,
- Orange book
- IncludedBy:rainbow series,
- Includes:C2-protect,
- Related:computer, computer security, criteria, evaluation, security, system, trust,
- order of an element in a finite commutative group
- ordinal variable
- organisational security policies
- HasPreferred:organisational security policy,
- IncludedBy:security,
- organisational security policy
- IncludedBy:policy, security policy,
- PreferredFor:organisational security policies,
- Related:information, operation,
- organization
- organization computer security representative
- IncludedBy:computer, security,
- Related:IT security, program,
- organizational certificate
- IncludedBy:certificate, multilevel information systems security initiative,
- Related:X.509, key, message, public-key, system,
- organizational maintenance
- Related:users,
- organizational registration authority
- IncludedBy:authority, multilevel information systems security initiative, registration,
- Related:certificate, entity, function, identity, role, users,
- organizational user
- organizational-level commander/commanding officer
- origin authenticity
- Related:authentication, entity, standard,
- original classification
- Related:authorized, security,
- original classification authority
- Related:authorized,
- originating agency determination required
- Related:classified,
- originating agency's determination required
- originator
- Related:entity, message, non-repudiation,
- OSI architecture
- IncludedBy:Open Systems Interconnection Reference model,
- Related:application, communications, connection, message, model, network, process, protocols, standard, system, users,
- out-of-band
- Related:algorithm, cipher, code, cryptography, information, key, operation, security, shared secret,
- outage
- Related:communications, failure, operation,
- outcome
- Related:application,
- outlier
- output
- IncludedBy:trusted computing base,
- Related:computer, file, information, process,
- output data
- IncludedBy:cryptographic module,
- Related:cryptographic, information, module,
- output feedback
- output transformation
- Related:algorithm, code, function, hash, operation,
- outside threat
- IncludedBy:threat,
- outside(r) threat
- IncludedBy:threat,
- Related:security,
- outsourced information technology based process
- Related:assurance, security,
- outsourcing
- Related:entity,
- over-the-air key distribution
- IncludedBy:key,
- Related:rekey,
- over-the-air key transfer
- IncludedBy:key,
- Related:communications, encryption,
- over-the-air rekeying
- IncludedBy:key, rekey,
- Related:communications, encryption, security,
- overload
- IncludedBy:threat consequence,
- Related:operation, system,
- overseas security policy board
- IncludedBy:security,
- overt channel
- Antonym:covert channel,
- IncludedBy:channel,
- Related:authorized, communications, computer, covert, network, system,
- overt collection
- overt operation
- Related:clandestine operation,
- overt testing
- IncludedBy:test,
- Related:security,
- overwrite procedure
- IncludedBy:erasure,
- Includes:magnetic remanence, remanence,
- Related:process, security, software,
- overwrite verification
- overwriting
- Related:access, virus,
- owner
- Includes:certificate owner, data owner, information owner, key owner, object, process owner, subject, system owner,
- Related:IT default file protection parameters, Identification Protocol, Secure Electronic Transaction, accountability, asymmetric cryptography, attribute certificate, browse access protection, certificate, certification, certify, commercial software, computer emergency response team, data custodian, default file protection, digital watermarking, discretionary access control, formal access approval, information system security officer, interim accreditation action plan, key pair, mandatory access control, pretty good privacy, privacy enhanced mail, public-key certificate, reconstitution, response, security, sensitive, sensitivity, settlement, skimming, smartcards, system security officer, technical vulnerability, users, vulnerability,
- owners/operators
- package
- Includes:object,
- Related:assurance, function, security,
- packet
- Related:control, information, message, network,
- packet assembly and disassembly
- Related:internet,
- packet filter
- IncludedBy:firewall,
- Related:access, application, control, filtering router, packet filtering, policy, program, security, users,
- packet filtering
- IncludedBy:firewall,
- Includes:stateful packet filtering,
- Related:access, access control, communications, control, domain, flow, function, information, network, packet filter, process, protocols, proxy, router,
- packet filtering firewall
- IncludedBy:firewall,
- Related:protocols, router,
- packet sniffer
- IncludedBy:sniffer,
- Related:computer, ethernet sniffing, network, program, promiscuous mode, software,
- packet switching
- Related:computer, computer network, control, information, intelligence, message, network, software,
- packet transfer mode
- Related:network,
- padding
- pagejacking
- IncludedBy:attack,
- Related:control, hijack attack, target, world wide web,
- parameters
- Related:algorithm, cryptographic, security, standard,
- parent corporation
- pareto diagram
- parity
- IncludedBy:security,
- partial order
- partition rule base access control
- IncludedBy:access, control,
- partitioned security mode
- IncludedBy:modes of operation, security,
- Related:access, access control, accreditation, authorization, computer security, information, operation, policy, system, users,
- partnership
- Related:critical, critical infrastructures, operation,
- party
- IncludedBy:National Institute of Standards and Technology,
- Related:IT security, National Security Agency, certificate, computer security, security,
- pass/fail
- Related:classified, requirements, security, subject,
- passive
- Includes:object,
- Related:authorized, confidentiality, information, network, property, system, threat,
- passive attack
- IncludedBy:attack,
- Related:authentication, authorized, protocols,
- passive fingerprinting
- Related:application, system,
- passive security testing
- IncludedBy:security testing, test,
- Related:code, requirements, software, system, target,
- passive sensor
- passive threat
- IncludedBy:threat,
- Related:authorized, computer, information, system,
- passive wiretapping
- IncludedBy:wiretapping,
- Related:communications,
- passphrase
- IncludedBy:passwords,
- Related:system,
- Password Authentication Protocol
- IncludedBy:authentication, protocols, security protocol,
- Related:passwords, users,
- password cracker
- IncludedBy:threat,
- Related:application, dictionary attack, program, software, test,
- password cracking
- IncludedBy:passwords,
- Related:computer, process, system,
- password protected
- Related:access, control,
- password shadowing
- Related:theft,
- password sniffing
- IncludedBy:sniffing,
- Related:internet, network, passwords, program,
- password system
- IncludedBy:system,
- Related:access, access control, authentication, encryption, entity, identity, operation,
- password-locked screensaver
- Related:passwords, system, users,
- passwords
- Includes:one-time passwords, passphrase, password cracking, secure single sign-on, time-dependent password, tunneled password protocol, virtual password, zero-knowledge password protocol,
- Related:3-factor authentication, Extensible Authentication Protocol, Green book, Password Authentication Protocol, Terminal Access Controller Access Control System, access, access control, anonymous login, auditing tool, authentication, authorization, authorized, check_password, community string, computer oracle and password system, crack, critical security parameters, default account, dictionary attack, domain controller, encrypted key, entity, ethernet sniffing, guessing entropy, identity, information, kerberos, key, key logger, leapfrog attack, lock-and-key protection system, login, login prompt, min-entropy, network, password sniffing, password-locked screensaver, personal identification number, print suppression, process, proof of possession protocol, public-key forward secrecy, rootkit, salt, secret, security-relevant event, shared secret, simple authentication, simple network management protocol, smartcards, sniffer, social engineering, system, target vulnerability validation techniques, third party trusted host model, ticket, tokens, user identifier, users,
- patch
- Related:application, code, program, security, software, update,
- patch management
- IncludedBy:management,
- Related:process, security testing, software, test, users,
- path coverage
- Related:security testing, test,
- path discovery
- IncludedBy:public-key infrastructure,
- Related:certificate, certification, key, process, public-key, trust,
- path histories
- Related:software,
- path validation
- IncludedBy:public-key infrastructure, validation,
- Related:certificate, certification, process,
- payload
- Related:code, information, malicious, object, system, virus,
- payment
- payment card
- IncludedBy:Secure Electronic Transaction,
- payment gateway
- IncludedBy:Secure Electronic Transaction, gateway,
- Related:authorization, interface, message, process, system,
- payment gateway certification authority
- IncludedBy:Secure Electronic Transaction, authority, certification, gateway, public-key infrastructure,
- Related:certificate, compromise,
- PC card
- Related:computer, cryptographic, cryptography, function, interface, module, standard,
- PCA
- PCMCIA
- Related:association, automated information system, computer, standard, technology,
- peer access approval
- IncludedBy:access,
- peer access enforcement
- IncludedBy:access,
- peer entity authentication
- IncludedBy:authentication, entity,
- Related:association,
- peer entity authentication service
- IncludedBy:authentication, entity,
- Related:association, establishment, identity, system,
- peer-to-peer communication
- Related:access, access control, communications, computer, internet, message, users,
- penetration
- IncludedBy:attack, intrusion, threat consequence,
- Includes:penetration signature, penetration study, penetration test, penetration testing,
- Related:access, access control, authorized, breach, computer security intrusion, confidentiality, entrapment, flaw hypothesis methodology, incomplete parameter checking, nak attack, network weaving, phreaking, protective packaging, protective technologies, real-time reaction, resource, security certification level, security testing, security violation, system, unauthorized access,
- penetration signature
- IncludedBy:penetration, signature,
- Related:identify, system,
- penetration study
- IncludedBy:penetration, risk management,
- Related:control, system,
- penetration test
- IncludedBy:penetration, test,
- Related:certification, code, computer, evaluation, identify, process, security, security testing, system, users,
- Synonym:penetration testing,
- penetration testing
- IncludedBy:penetration, security testing, target of evaluation, test,
- Related:access, application, code, computer, exploit, identify, system, target, trust, users, vulnerability,
- Synonym:penetration test,
- people
- Related:information, security, system,
- per-call key
- IncludedBy:key,
- Related:communications, encryption, system, telecommunications,
- perceived collection threat
- IncludedBy:threat,
- Related:adversary,
- perfect forward secrecy
- HasPreferred:forward secrecy,
- performance gap
- Related:process, quality,
- performance measurement
- Related:process, system,
- performance reference model
- perimeter
- HasPreferred:security perimeter,
- perimeter-based security
- IncludedBy:security perimeter,
- Related:access, control, network,
- periodic reinvestigation
- periods processing
- IncludedBy:process,
- Related:authorization, classified, information, operation, requirements, security, system, users,
- peripheral
- peripheral devices
- peripheral equipment
- Related:computer, key,
- perishable data
- permanent records
- Related:access,
- permanent resident alien
- permissions
- IncludedBy:authorization,
- Includes:object, subject,
- Related:access, access control, authorized, control, file, public-key infrastructure, resource,
- permissive action link
- permuter
- Related:cryptography,
- perpetrator
- IncludedBy:attack,
- Related:entity,
- persistent cookie
- Related:computer, identify, users,
- personal communications network
- IncludedBy:communications, network,
- Related:internet, system, technology,
- personal computer
- IncludedBy:computer,
- Related:automated information system,
- personal computer memory card international association
- IncludedBy:association, computer,
- Related:automated information system,
- personal computer system
- Related:access, analysis,
- personal digital assistant
- Related:automated information system, computer, key,
- personal financial statement
- Related:security,
- personal firewall
- Related:authorized, communications, computer, connection, security,
- personal identification number
- IncludedBy:identification,
- Related:3-factor authentication, Fortezza, access, access control, application, code, entity, identity, passwords, personal identity verification, resource, shared secret, system, users,
- personal identity verification
- IncludedBy:entity, identity, verification,
- Includes:PIV issuer, PIV registrar, PIV sponsor, personal identity verification card,
- Related:3-factor authentication, computer, cryptographic, identification, key, personal identification number, process,
- personal identity verification card
- IncludedBy:entity, personal identity verification, smartcards, tokens, verification,
- Related:certificate, cryptographic, key, process,
- personal security environment
- IncludedBy:security,
- Related:cryptographic, cryptography, entity, file, key, personalization service, policy, public-key infrastructure, requirements, system, tamper, tokens, trust,
- personality
- HasPreferred:personality label,
- personality label
- IncludedBy:multilevel information systems security initiative, public-key infrastructure,
- PreferredFor:personality,
- Related:Fortezza, X.509, application, authorization, certificate, digital signature, encryption, key, public-key, role, signature, subject, users,
- personalization service
- Related:cryptographic, cryptography, information, key, personal security environment, security, trust,
- personally identifiable information
- Related:identity, security,
- personnel registration manager
- Related:management, users,
- personnel security - issue information
- IncludedBy:security,
- Includes:substantial issue information,
- Related:access, classified,
- personnel security
- IncludedBy:security,
- Related:access, access control, authority, authorization, classified, control, information, operation, personnel security exceptions, policy, system, trust,
- personnel security clearance
- IncludedBy:security,
- Related:access, classified,
- personnel security determination
- IncludedBy:security,
- Related:classified, trust,
- personnel security exceptions
- IncludedBy:security,
- Related:access, deviation, intelligence, personnel security, subject,
- personnel security interview
- IncludedBy:security,
- Related:access, classified,
- personnel security investigation
- IncludedBy:security,
- Related:access, classified,
- personnel security program
- IncludedBy:security,
- Related:access, classified, trust,
- personnel security questionnaire
- IncludedBy:security,
- Related:questionnaire for national security positions, subject, trust,
- phage
- IncludedBy:threat,
- Related:authorized, program, virus,
- pharming
- Related:attack, domain, fraud, information, software,
- phased periodic reinvestigation
- Related:subject,
- PHF
- IncludedBy:threat,
- Related:access, computer, file, program, system,
- PHF hack
- IncludedBy:threat,
- Related:users,
- phishers
- IncludedBy:threat,
- Related:information,
- phishing
- IncludedBy:exploit, social engineering,
- Related:computer, criminal, entity, fraud, identity, identity theft, information, internet, spoof, theft, users, vishing,
- photo eye
- Related:control,
- Photuris
- Related:establishment, internet protocol security, internet security protocol, key, protocols,
- phracker
- IncludedBy:threat,
- Related:computer,
- phreaker
- IncludedBy:threat,
- Related:system,
- phreaking
- IncludedBy:attack,
- Related:information, network, penetration, system, technology,
- physical access control
- IncludedBy:access, control,
- Related:control systems, entity, identity, role, system, validation,
- physical and environmental protection
- Related:access, access control, authorized, control, operation, security, system, threat, unauthorized access,
- physical controls
- IncludedBy:control,
- Related:system,
- physical destruction
- IncludedBy:threat consequence,
- Related:operation, system,
- physical protection
- IncludedBy:cryptographic boundary,
- Related:assurance, critical, cryptographic, key, module, security,
- physical security
- IncludedBy:Automated Information System security,
- Related:access, access control, application, attack, authorized, control, countermeasures, critical, damage, information, resource, system, theft, threat, unauthorized access, vulnerability,
- physical security waiver
- IncludedBy:security,
- Related:intelligence,
- physically isolated network
- IncludedBy:network,
- Related:control,
- piconet
- piggyback
- IncludedBy:between-the-lines-entry,
- Related:access, access control, authorized, connection, system, unauthorized access, users,
- piggyback attack
- IncludedBy:attack,
- Related:access, access control, connection, system, users,
- piggyback entry
- IncludedBy:threat,
- Related:access, access control, authorized, computer, connection, system, unauthorized access, users,
- pii confidentiality impact level
- Related:access,
- pilot testing
- IncludedBy:security testing, test,
- Related:program, software, version,
- ping of death
- IncludedBy:attack,
- Related:denial-of-service, flow, system,
- ping sweep
- IncludedBy:attack,
- Related:vulnerability,
- PIV issuer
- IncludedBy:personal identity verification, smartcards,
- Related:PIV registrar, access, access control, application, authorized, certification authority, control, entity, identity credential issuer, software, subject, verification,
- PIV registrar
- IncludedBy:personal identity verification,
- Related:PIV issuer, certification, entity, process,
- PIV sponsor
- IncludedBy:personal identity verification,
- PKCS #10
- IncludedBy:public-key cryptography standards, public-key infrastructure,
- Related:X.509, certificate, entity, key, public-key, standard,
- PKCS #11
- IncludedBy:public-key cryptography standards,
- Related:cryptographic, function, information, interface, key, software, standard, tokens,
- PKCS #7
- IncludedBy:public-key cryptography standards,
- Related:digital signature, signature, standard,
- PKIX
- IncludedBy:internet, public-key infrastructure,
- Related:X.509, application, certificate, file, information, interoperability, key, operation, profile, protocols, public-key, security, standard, system, trust,
- PKIX private extension
- IncludedBy:public-key infrastructure,
- Related:identify, verification,
- plain text
- HasPreferred:cleartext,
- plaintext key
- IncludedBy:key, key recovery,
- Related:cryptographic,
- plan of action and milestones
- plan of actions and milestones
- Related:resource,
- plan, do, check, act
- platform
- Related:application, communications, process, software, system,
- platform it interconnection
- IncludedBy:connection,
- Related:access, assurance, security,
- plug-in
- Related:function, standard, system,
- plug-in modules
- IncludedBy:module,
- Related:software, world wide web,
- point estimate
- point of control and observation
- IncludedBy:control,
- Related:security testing, test,
- point-of-sale
- point-to-point key establishment
- IncludedBy:establishment, key,
- point-to-point protocol
- IncludedBy:internet, protocols,
- Includes:point-to-point tunneling protocol,
- Related:authentication,
- point-to-point tunneling protocol
- IncludedBy:point-to-point protocol, protocols, security protocol, tunnel, virtual private network,
- Includes:private communication technology,
- Related:access, access control, connection, control, function, internet, network, users, version,
- policy
- Includes:IT security policy, Internet Policy Registration Authority, National Security Telecommunications and Information Systems Security Policy, National Telecommunications and Information Systems Security Policy, TOE security policy, TOE security policy model, acceptable use policy, certificate policy, certificate policy qualifier, certification policy, corporate security policy, cryptographic module security policy, designation policy, formal model of security policy, formal security policy, formal security policy model, identity-based security policy, informal security policy, information protection policy, information security policy, integrity policy, non-repudiation policy, organisational security policy, policy approving authority, policy certification authority, policy creation authority, policy management authority, policy mapping, public-key infrastructure, rule-based security policy, secrecy policy, security function policy, security policy, security policy information file, security policy model, system security policy, technical policy, technical security policy, term rule-based security policy, usage security policy,
- Related:Bell-LaPadula security model, CKMS component, NTCB partition, National Security Decision Directive 145, National Security Telecommunications and Information Systems Security Committee, Office of Foreign Assets Control, SET qualifier, TCB subset, TOE security functions, abuse of privilege, access, access control, access control center, access control service, access mediation, accountability, assurance, attack, audit, authority, autonomous system, certificate, certificate domain, certification hierarchy, certification practice statement, classified, common security, component operations, compromise, confidence, consumers, control, controlled security mode, covert channel, covert channel analysis, covert timing channel, data encryption standard, dedicated security mode, demilitarized zone, discretionary access control, domain, domain parameter, dominated by, economy of mechanism, enclave, end entity, evaluation, exploitable channel, exploitation, extension, filtering router, firewall, formal method, formal top-level specification, formal verification, front-end security filter, functionality class, general controls, global information grid, guideline, identification data, information systems security equipment modification, information type, internal fraud, key management, loophole, mandatory access control, mode of operation, multilevel security mode, national security system, naval coastal warfare, network component, network sponsor, network trusted computing base, non-discretionary security, non-repudiation information, packet filter, partitioned security mode, personal security environment, personnel security, privacy, privacy impact assessment, private data, product rationale, proof, protected network, protection philosophy, rainbow series, risk management, root, root registry, ruleset, secure configuration management, security, security association, security audit, security authority, security clearance, security domain, security filter, security functions, security incident, security inspection, security label, security management infrastructure, security net control station, security perimeter, security program manager, security requirements, security violation, security-compliant channel, security-critical mechanisms, security-relevant event, sensitive information, source selection, system administrator, system security officer, system-high security mode, systems security steering group, trust, trusted channel, trusted computing base, trusted functionality, trusted path, trusted process, trusted subject, unprotected network, untrusted process, users, verification, vulnerability,
- policy approving authority
- IncludedBy:authority, multilevel information systems security initiative, policy, public-key infrastructure,
- Related:X.509, certificate, certification, key, public-key, role,
- policy certification authority
- IncludedBy:authority, certification, policy, public-key infrastructure,
- Related:X.509, certificate, internet, key, management, public-key, registration, security,
- policy creation authority
- IncludedBy:authority, multilevel information systems security initiative, policy, public-key infrastructure,
- Related:X.509, certificate, certification, domain, key, public-key, role, users,
- policy management authority
- IncludedBy:authority, management, policy, public-key infrastructure,
- Related:audit, certification,
- policy mapping
- IncludedBy:policy,
- Related:authority, certificate, domain, public-key infrastructure,
- policy-based access control
- IncludedBy:access, control,
- Related:authorization, identity, risk,
- polling
- Related:message, operation, process,
- polymorphism
- Related:code, message, object, operation, response, system,
- pop-up box
- Related:access, access control, internet, world wide web,
- POP3 APOP
- Related:attack, authentication, hash, key, protocols, shared secret, users,
- POP3 AUTH
- IncludedBy:internet,
- Related:authentication, challenge/response, protocols, response, security,
- population
- Related:audit,
- port
- IncludedBy:internet,
- Related:access, communications, computer, connection, cryptographic, cryptography, function, module,
- port protection device
- Related:assurance,
- port scan
- IncludedBy:attack,
- Related:exploit, vulnerability,
- port scanner
- Related:connection, program, system, threat,
- port scanning
- Related:connection, internet, program, system,
- portability
- Related:application, code, computer, interoperability, module, program, software, system, users,
- portable computer system
- Includes:laptop,
- portable electronic devices
- portal
- Related:access,
- portfolio
- Related:analysis, assessment,
- portfolio management
- positive control material
- IncludedBy:control,
- Related:code, system,
- positive enable system
- IncludedBy:system,
- POSIX
- Related:access, access control, application, audit, code, computer, control, function, information, interface, security, standard, system,
- Post Office Protocol, version 3
- IncludedBy:internet, protocols, version,
- Related:access, authentication, message, security, standard,
- post-accreditation phase
- IncludedBy:accreditation,
- Related:availability, confidentiality, information, integrity, operation, process, risk, security, software, system, threat,
- post-nuclear event key
- IncludedBy:key,
- potential impact
- Related:availability, integrity, operation,
- practice statement
- Related:authentication, entity,
- practices dangerous to security
- IncludedBy:security,
- pre-activation state
- IncludedBy:key lifecycle state,
- Related:authorized, key, lifecycle,
- pre-authorization
- IncludedBy:authorization,
- Related:certification, entity, public-key infrastructure, validate,
- pre-certification phase
- IncludedBy:certification,
- Related:accreditation, assessment, control, identification, process, risk, security, system, validation, verification,
- pre-shared key
- IncludedBy:key,
- Related:internet protocol security, internet security protocol,
- pre-signature
- IncludedBy:signature,
- Related:digital signature, function, message, process, random,
- precision
- Related:sampling error,
- precondition
- precursor
- Related:attack, incident, malware,
- prediction resistance
- Related:assurance,
- predisposing condition
- Related:threat,
- preferred products list
- IncludedBy:Information Systems Security products and services catalogue, National Security Agency, national information assurance partnership,
- Includes:TEMPEST,
- Related:computer security, information, requirements, system,
- prefix free representation
- preliminary design review
- preparedness
- preproduction model
- Related:evaluation, standard, version,
- presidential historical materials and records
- pressure regulator
- Related:control,
- pressure sensor
- Related:flow, system,
- pretty good privacy
- IncludedBy:email security software, encryption, internet, key, privacy, security protocol, web of trust,
- Includes:certificate,
- Related:algorithm, application, authentication, computer, cryptographic, cryptography, digital signature, email, file, message, network, owner, program, protocols, public-key, signature, software, standard, system,
- prevention
- primary account number
- IncludedBy:Secure Electronic Transaction,
- Related:association, authority, code, cryptography, identification,
- primary services node (prsn)
- Related:access, management, users,
- prime contract
- prime contractor
- primitive
- IncludedBy:trusted computing base,
- principal
- Related:entity, identity,
- principal accrediting authority
- IncludedBy:authority,
- Related:intelligence, system,
- principal certification authority
- IncludedBy:certification,
- principal disclosure authority
- Related:authorized,
- print suppression
- Related:key, passwords, security,
- printer
- prioritization
- privacy
- IncludedBy:quality of protection,
- Includes:confidentiality, data privacy, pretty good privacy, privacy enhanced mail, privacy impact assessment, privacy programs, privacy protection, privacy system, privacy, authentication, integrity, identification, non-repudiation, privacy, authentication, integrity, non-repudiation, virtual private network, wired equivalent privacy,
- Related:Diffie-Hellman, Generic Security Service Application Program Interface, S-box, Samurai, Sensitive Information Computer Security Act of 1987, access, access control, anonymous, authorized, compromise, control, cookies, cryptography, entity, formal access approval, individuals, information, information type, kerberos, key management/exchange, management message, policy, private communication technology, private key, public law 100-235, sandboxed environment, secret seed, secure hypertext transfer protocol, secure single sign-on, secure socket layer, security, sensitive information, simple key management for IP, spyware, system, system security plan, trusted channel, unclassified sensitive, users,
- privacy enhanced mail
- IncludedBy:email, privacy, security protocol,
- Includes:certificate, encryption,
- Related:X.509, authentication, certification, confidentiality, integrity, internet, key, key management, message, owner, protocols, public-key, public-key infrastructure, standard,
- privacy impact assessment
- IncludedBy:assessment, privacy,
- Related:analysis, information, policy, process, requirements, risk, system,
- privacy programs
- IncludedBy:privacy, program,
- Related:confidentiality, encryption, software, users,
- privacy protection
- IncludedBy:privacy,
- Related:assurance, confidentiality, establishment, information, security, threat,
- privacy system
- IncludedBy:privacy, system,
- Related:attack, communications, encryption, telecommunications,
- privacy, authentication, integrity, identification, non-repudiation
- IncludedBy:identification, integrity, non-repudiation, privacy,
- privacy, authentication, integrity, non-repudiation
- IncludedBy:authentication, availability, integrity, non-repudiation, privacy,
- private accreditation exponent
- IncludedBy:accreditation,
- Related:authority, information, verification,
- private accreditation information
- IncludedBy:accreditation, information,
- Related:authority, entity, identity,
- private branch exchange
- Related:network,
- private communication technology
- IncludedBy:communications, point-to-point tunneling protocol, technology,
- Related:key, privacy, public-key, standard, system,
- private component
- Related:key,
- private data
- Related:information, policy,
- private decipherment key
- IncludedBy:cipher, key,
- private decipherment transformation
- IncludedBy:cipher,
- Related:encipherment, key, network, system,
- private extension
- HasPreferred:extension,
- private key
- IncludedBy:asymmetric algorithm, key, public-key infrastructure,
- Related:algorithm, cipher, cryptographic, cryptographic system, cryptography, encipherment, entity, information, privacy, public-key, secret, signature, system, users,
- private signature key
- IncludedBy:key, signature,
- Related:digital signature,
- private-key cryptography
- HasPreferred:secret-key cryptography,
- IncludedBy:cryptography, key,
- privilege
- IncludedBy:authorization,
- Includes:least privilege,
- Related:computer, function, operation, security, system,
- privilege management
- IncludedBy:management,
- Related:access,
- privilege management infrastructure
- Related:authorization, certificate, process,
- privileged
- IncludedBy:access control,
- Includes:privileged access, privileged instructions, privileged process, privileged user,
- Related:backdoor, category, console logon, discretionary access control, executive state, program, protection ring, system, vulnerability,
- privileged access
- IncludedBy:access, privileged,
- Related:authorized, computer, process, resource, users,
- privileged accounts
- Related:access, authorization, users,
- privileged command
- Related:control, security,
- privileged instructions
- IncludedBy:executive state, privileged,
- Related:computer, control, system,
- privileged process
- IncludedBy:privileged, process,
- Related:authorized, computer, function, security, trust,
- privileged user
- IncludedBy:privileged, users,
- Related:access, assurance, control, function, program, security, system, trust,
- probability-proportional-to-size
- probe
- IncludedBy:incident,
- Related:access, access control, authorized, control, information, program, security, system, unauthorized access, users,
- problem
- Related:anomaly, failure, fault,
- procedural controls
- IncludedBy:control,
- Related:system,
- procedural security
- IncludedBy:security,
- PreferredFor:administrative security,
- Related:access, access control, authorized, communications security, computer, computer security, control, emanation, emanations security, operation, system, unauthorized access,
- procedure
- process
- IncludedBy:subject,
- Includes:Automated Information System security, DoD Information Technology Security Certification and Accreditation Process, Federal Information Processing Standards, Federal Information Processing Standards Publication 140, Guidelines and Recommendations for Security Incident Processing, as-is process model, authorization to process, authorize processing, automated data processing system, automated information system, batch process, batch processing, business process, business process improvement, business process reengineering, bypass label processing, central processing unit, centralized data processing, continuous process, continuous process improvement, core or key process, data processing, development process, discrete process, distributed dataprocessing, distributed processing, execution, delivery, and process management, front-end processor, hierarchical input process output, information processing standard, key processor, local management device/key processor, logical co-processing kernel, management control processes, on-line transaction processing, periods processing, privileged process, process assurance, process controller, process management approach, process owner, real-time processing, signature process, software system test and evaluation process, statistical process control, subprocess, teleprocessing, to-be-process model, trusted process, untrusted process, verification process,
- Related:2-factor authentication, 3-factor authentication, BLACK, Bell-LaPadula security model, CAPSTONE chip, COMSEC demilitarization, COMSEC equipment, CPU time, Clipper chip, Defense Information Infrastructure, Defensive Information Operations, Digital Signature Standard, Generic Security Service Application Program Interface, Green book, Gypsy verification environment, IT security database, International organization for standardization, Internet Engineering Steering Group, Internet Protocol Security Option, Internet Society Copyright, Internet Standard, Internet Standards document, MISSI user, National Security Decision Directive 145, OSI architecture, PIV registrar, RED, Rivest-Shamir-Adleman algorithm, Trusted Computer System Evaluation Criteria, Type III cryptography, X.500 Directory, abend, acceptance procedure, access, access category, access control, access control lists, access mediation, access mode, access with limited privileges, accountability, accreditation, accreditation phase, accreditation range, acquirer, activity analysis, add-on security, alert, algorithm transition, alignment, analysis of alternatives, applicant assertion, application, application controls, application data backup/recovery, application level gateway, application software, application system, application-level firewall, approval/accreditation, architectural design, assessment, assurance, assurance element, assure, assured software, asynchronous transfer mode, audit trail, authentication, authentication code, authentication protocol, authentication system, authenticity, authority, authorization, authorized, automated security monitoring, availability, backup, banner grabbing, baselining, batch mode, benchmark, benchmarking, best practices, bias, binding, block cipher, brand CRL identifier, brute force attack, buffer overflow, business case, business impact analysis, card initialization, centralized operations, certificate, certificate creation, certificate management, certificate reactivation, certificate rekey, certificate renewal, certificate revocation list, certificate update, certificate user, certificate validation, certification, certification and accreditation, certification path, certification phase, challenge/response, change management, chief information agency officer, ciphony, cleartext, client, client server, color change, communications security, comparisons, compartmented mode, compromised state, compromising emanations, computer abuse, computer architecture, computer cryptography, computer security, concept of operations, confidentiality, configuration control, configuration item, configuration management, conformance testing, construction, content filtering, contingency plan, continuity of operations, control center, control loop, control network, control zone, cost/benefit analysis, cost/benefit estimate, counter, covert channel, covert storage channel, covert timing channel, critical, criticality/sensitivity, cross-certification, cryptanalysis, cryptographic algorithm, cryptographic hash function, cryptographic key, cryptographic logic, cryptographic module, cryptographic synchronization, cryptographic system, cryptoperiod, cryptosynchronization, cryptosystem analysis, cryptosystem evaluation, cyberspace, cycle time, daemon, data, data architecture, data confidentiality, data contamination, data driven attack, data encryption standard, data historian, data input, data integrity, data key, data reengineering, database, deactivated state, deadlock, deadly embrace, decomposition, decryption, dedicated mode, dedicated security mode, default classification, degauss, deliverable, delivery, designation policy, detailed design, development assurance, development assurance requirements, digital signature, direct data feed, disaster recovery, disaster recovery plan, discretionary access control, distinguishing identifier, distributed control system, distributed database, download, dual control, dynamic analysis, egress filtering, electronic authentication, emanation, encryption, encryption algorithm, enrollment service, enterprise, entry control, erasure, error, error seeding, evaluation, executive steering committee, extensible markup language, external security controls, facilities, fail safe, fail soft, failure control, fallback procedures, fault, fault tolerance, fedwire, feedback buffer, fetch protection, file encryption, file infector virus, file protection, file transfer, firewall, flooding, fork bomb, formal access approval, formal proof, formal top-level specification, formal verification, format, forward engineering, front-end security filter, full accreditation, full disk encryption, function, gas and oil production, storage and transportation, global command and control system, global information grid, global network information environment, guard, handle, hardening, hardware, hash result, hierarchical development methodology, hierarchy management, identification, identification authentication, identification data, identity management systems, identity proofing, identity verification, identity-based security policy, implementation, incident, information, information and communications, information category, information environment, information owner, information security, information security testing, information superiority, information system, information systems security, information systems security engineering, information technology, information warfare, ingress filtering, initialization value, initialization vector, initializing value, input preparation cycle, inspectable space, integration test, integrity, intelligence, intelligent electronic device, interface, interim accreditation, interim approval to operate, internal subject, internal system exposure, internet control message protocol, internet protocol security, intrusion detection, intrusion detection and prevention, intrusion detection systems, intrusion prevention, key agreement, key center, key distribution, key entry, key establishment, key exchange, key generation, key management, key management infrastructure, key output, key recovery, key state transition, key stream, key transport, key updating, key-escrow, key-escrow system, lifecycle management, light tower, line managers, local-area network, logging, logical access control, loop, macro virus, maintenance, malicious code, malware, management controls, manipulated variable, manual cryptosystem, match, metadata, metrics, mirroring, mission critical, mission critical system, mockingbird, mode of operation, model, modeling or flowcharting, modes of operation, modular software, monitoring and evaluation, multi-security level, multilevel device, multilevel mode, multilevel security, multilevel security mode, multiuser mode of operation, mutually suspicious, national security information, network architecture, network discovery, non-repudiation, non-repudiation service, non-technical countermeasure, normal operation, object, one-time passwords, open system interconnection model, operation, operational data security, operational risk, operations security, operator, output, overwrite procedure, packet filtering, password cracking, passwords, patch management, path discovery, path validation, payment gateway, penetration test, performance gap, performance measurement, personal identity verification, personal identity verification card, platform, polling, post-accreditation phase, pre-certification phase, pre-signature, privacy impact assessment, privilege management infrastructure, privileged access, production, program, programmable logic controller, proprietary information, protection ring, protective technologies, protocols, proxy server, pseudo-random number generator, public law 100-235, public-key cryptography, public-key infrastructure, purge, quality, quality control, random number generator, randomizer, read-only memory, real-time, real-time system, reciprocal agreement, recovery procedures, recovery site, recovery time objectives, registration, registration authority, rekey, release, relying party, renewal, requirements, residue, resource, resource encapsulation, resource starvation, response, response time, reverse engineering, reverse software engineering, revocation, risk analysis, risk assessment, risk evaluation, risk identification, risk index, risk management, risk treatment, role-based access control, routing, routing control, safeguarding statement, salami technique, salt, sandboxed environment, sanitize, screen scraping, security architecture, security audit trail, security certification level, security clearance, security evaluation, security management, security management infrastructure, security mechanism, security parameters index, security policy, security program manager, security requirements, security service, security test & evaluation, security testing, seed key, sensitive compartmented information, sensitive compartmented information facility, sensitivity analysis, separation of duties, server, settlement, signaling, signature, signature function, signature generation, signature key, signature verification, significant change, simple authentication, simulation modeling, single loop controller, single-level device, smartcards, social engineering, software, software development, software quality assurance, software reengineering, source data automation, source selection, special information operations, spoofing, stateful packet filtering, stateful protocol analysis, static analysis, stream cipher, stretch goal, strong authentication, superencryption, superuser, supervisory control and data acquisition, symmetric encryption algorithm, system entity, system high mode, system low, system retention/backup, system-high security mode, systems engineering, systems software, technical countermeasures, technical security policy, technical vulnerability, technology, telecommunications, test, test execution, test facility, test plan, testing, threat assessment, time-stamp verifier, timing attacks, token management, tokens, total quality management, traceability, tranquility, transaction file, transport, trojan horse, trust, trusted agent, trusted computer system, trusted path, two-person control, type 1 products, type 2 product, type certification, update, updating, upload, user id revalidation, user identifier, user representative, users, validate, validate vs. verify, validation, value-added, vaulting, verification, verification and validation, verification function, verification key, verification techniques, version scanning, vulnerability, vulnerability assessment, vulnerability audit, web risk assessment, web server, website hosting, work product, workflow, workstation, world class organizations, worm,
- process assurance
- IncludedBy:assurance, process,
- Related:assessment,
- process controller
- IncludedBy:control, process,
- Related:algorithm, computer, system,
- process management approach
- IncludedBy:process,
- Related:business process, quality,
- process owner
- IncludedBy:owner, process,
- producers
- Related:security,
- product
- Includes:software product,
- Related:function, software, system,
- product rationale
- IncludedBy:protection profile,
- Includes:object,
- Related:assurance, file, function, information, policy, profile, security, system, threat,
- product source node
- Related:management,
- production
- IncludedBy:target of evaluation,
- Related:process, target,
- production model
- profile
- IncludedBy:file,
- Includes:CKMS profile, COMSEC profile, access profile, assurance profile, communications profile, profile assurance, protection profile, protection profile family, secure profile inspector, system profile, user profile,
- Related:Federal Criteria Vol. I, Minimum Interoperability Specification for PKI Components, PKIX, assignment, attack signature recognition, component, cookies, correctness, decomposition, deliverable, development assurance requirements, effectiveness, evaluation, evaluation assurance requirements, external security controls, functional protection requirements, national computer security assessment program, national information assurance partnership, product rationale, refinement, security, security target, stateful protocol analysis, tracking cookie, users,
- profile assurance
- IncludedBy:assurance, file, profile,
- Related:confidence,
- profiling
- program
- Includes:COMSEC Resources Program, COMSEC Utility Program, COMSEC control program, Commercial COMSEC Endorsement Program, Commercial COMSEC Evaluation Program, Common Criteria Testing Program, Cryptographic Application Program Interface, Generic Security Service Application Program Interface, National Voluntary Laboratory Accreditation Program, Programmable key storage device, TEMPEST Endorsement Program, Trusted Products Evaluation Program, application program interface, application programming interface, audit program, authorized vendor program, computer security technical vulnerability reporting program, cryptographic application programming interface, defense-wide information assurance program, delegated development program, malicious program, national computer security assessment program, object-oriented programming, privacy programs, program automated information system security incident support team, program evaluation and review technique, program manager, programmable logic controller, programmable read-only memory, programming languages and compilers, rating maintenance program, security program manager, security support programming interface, source program, special access program, special access program facility, tinkerbell program, traditional INFOSEC program, user partnership program, utility programs, work program,
- Related:CASE tools, Common Criteria Testing Laboratory, GRC senior staff, Green book, Gypsy verification environment, IT security database, Internet Protocol Security Option, Internet worm, Java, Message Security Protocol, PHF, Rexd, SATAN, Secure Data Network System, TOE security functions interface, abend, abort, access category, access control, access control lists, access type, active content, agent, alternative work site, ankle-biter, antispyware software, antivirus software, applet, application, application controls, application generator, application software, application system, assure, audit software, authorization, automated logon sequences, backdoor, backup, backup procedures, bebugging, benchmark, black-box testing, branch coverage, browser, brute force attack, bug, certificate, change control and lifecycle management, check_password, client, client server, code, coding, common criteria, common gateway interface, compiled viruses, compiler, compliance-based, computer, computer architecture, computer cryptography, computer emergency response teams' coordination center, computer fraud, computer oracle and password system, computer-assisted audit technique, configuration item, confinement, console, contingency plan, controller, correctness, cost/benefit, covert channel analysis, data dictionary, data processing, data transfer device, dedicated mode, delete access, demon dialer, digital signature, domain, domain name system, dongle, dynamic analysis, encapsulation, enhanced hierarchical development methodology, ensure, error, error seeding, exception, executable code, execute access, exercised, exhaustive testing, exploit, extensible, extensible markup language, fail safe, failure, fault, fault injection, fetch protection, file infector virus, firmware, flexibility, flow, formal development methodology, formal language, formal proof, formal top-level specification, formal verification, gateway, general controls, graphical-user interface, hackers, handler, handshaking procedures, hard copy key, hardware, hierarchical development methodology, host-based intrusion prevention system, information system security officer, information systems security manager, information systems security officer, instrumentation, integration test, intelligence community, interface, interim accreditation action plan, internal security controls, interoperability standards/protocols, key logger, key-escrow system, legacy systems, logic bombs, logical access control, loop, macro virus, maintainability, major application, major information system, malicious applets, malicious code, malware, management control processes, mechanisms, microcode, mobile code, mockingbird, modes of operation, morris worm, multilevel information systems security initiative, mutation analysis, mutation testing, mutually suspicious, national information assurance partnership, national telecommunications and information system security directives, nations, natural benchmark, network worm, network-based intrusion prevention system, object, on-line system, operating system, operational risk loss, organization computer security representative, packet filter, packet sniffer, password cracker, password sniffing, patch, phage, pilot testing, port scanner, port scanning, portability, pretty good privacy, privileged, privileged user, probe, process, proprietary information, protection ring, proxy, pseudo-flaw, read access, records, regression testing, reliability, remote administration tool, replicator, requirements traceability matrix, restart, reusability, reverse engineering, risk management, run, sandboxed environment, scan, scope of a requirement, script bunny, security, security policy, sensitive information, sensitivity analysis, server, set point, silver bullet, simulation modeling, smurf, sniffer, software, software development methodologies, software product, software reliability, software security, source code, spam, spam filtering software, spyware detection and removal utility, stakeholder, static analysis, stress testing, structural testing, supervisory control, symbolic execution, synthetic benchmarks, system high mode, system resources, system security authorization agreement, system security officer, system software, systems software, test bed, test case, test generator, testability, tester, time bomb, tokens, trapdoor, trigger, trojan horse, unit, update access, user data protocol, users, utility, vaccines, validation, virus, virus scanner, vulnerability, waiver, war dialer, war dialing, web content filtering software, white-box testing, workstation, worm, zombie,
- program access request
- IncludedBy:access,
- program automated information system security incident support team
- IncludedBy:computer security, incident, information, program, security incident, system,
- program channels or program security channels
- IncludedBy:security,
- Related:access, authorized, classified,
- program evaluation and review technique
- IncludedBy:evaluation, program,
- program executive agent
- program executive office, enterprise information systems
- program manager
- IncludedBy:program,
- Related:security, system,
- program material
- Related:access,
- program office
- Related:access,
- program protection plan
- Related:authorized, classified, foreign, intelligence,
- program security officer
- IncludedBy:security,
- Related:access,
- program sensitive information
- Related:classified,
- Programmable key storage device
- IncludedBy:key, program,
- programmable logic controller
- IncludedBy:control, program,
- Related:control systems, file, function, process, system, users,
- programmable read-only memory
- IncludedBy:program,
- Related:access,
- programming languages and compilers
- IncludedBy:program, software, target of evaluation,
- Related:target,
- project/program manager
- promiscuous mode
- IncludedBy:threat,
- Related:ethernet sniffing, information, interface, packet sniffer,
- proof
- Related:evidence, non-repudiation, policy,
- proof of possession protocol
- IncludedBy:protocols,
- Related:3-factor authentication, authentication, control, key, passwords,
- property
- Includes:*-property, intellectual property, simple security property,
- Related:Federal Information Processing Standards, accountability, assurance, asymmetric cryptographic technique, authenticity, availability, block cipher, bug, collision-resistant hash function, confidentiality, congruence, connectivity, correctness, data confidentiality, data integrity, digital watermarking, effectiveness, emergency response, external fraud, forward secrecy with respect to A, forward secrecy with respect to both A and B individually, hash function, integrity, internal fraud, key generating function, major information system, mask generation function, message digest, mutual forward secrecy, mutually suspicious, n-bit block cipher, one-way function, passive, proprietary, public-key forward secrecy, reliability, restricted area, safety, security, security kernel, sensor, stream cipher, system parameter, tranquility, trusted subject, unforgeable,
- proprietary
- Related:entity, information, property,
- proprietary information
- IncludedBy:information,
- Related:computer, development, process, program,
- proprietary protocol
- IncludedBy:protocols,
- Related:network, resource,
- protected channel
- Related:cryptographic, entity, identity, integrity, key, message,
- protected checksum
- Related:attack, object,
- protected communications
- IncludedBy:communications,
- Related:encryption, standard, telecommunications,
- protected communications zone
- IncludedBy:communications,
- Protected Critical Infrastructure Information (PCII)
- IncludedBy:critical,
- protected distribution systems
- IncludedBy:system,
- Related:classified, control, encryption, information, security,
- protected information
- Related:classified, critical,
- protected network
- Antonym:unprotected network,
- IncludedBy:demilitarized zone, firewall, network,
- Related:access, access control, authorized, control, policy, ruleset, unauthorized access,
- protected services list
- protected wireline distribution system
- IncludedBy:system,
- protection
- protection needs elicitation
- IncludedBy:requirements, security,
- Related:assurance, information,
- protection philosophy
- Includes:object,
- Related:assurance, control, evaluation, policy, security, system,
- protection profile
- IncludedBy:Common Criteria for Information Technology Security Evaluation, Federal Criteria Vol. I, file, profile, requirements,
- Includes:assignment, decomposition, external security controls, functional protection requirements, product rationale, protection profile family, refinement, trusted computing base,
- Related:IT security, assurance, computer security, criteria, function, object, security, security target, security testing, system, target, test,
- protection profile family
- IncludedBy:file, profile, protection profile,
- Related:assurance, function,
- protection ring
- IncludedBy:modes of operation,
- Related:access, access control, assurance, authorized, operation, privileged, process, program, system, users,
- protection suite
- Related:algorithm, authentication, encryption, integrity, internet protocol security, internet security protocol,
- protection-critical portions of the TCB
- IncludedBy:critical, trusted computing base,
- Includes:object, subject,
- Related:access, access control, assurance, control, function, operation, system,
- protective distribution system
- IncludedBy:system,
- Related:countermeasures, information,
- protective measures
- protective packaging
- Related:communications security, key, penetration,
- protective security service
- IncludedBy:security,
- Related:access, authorized, connection,
- protective technologies
- Related:compromise, incident, information, key, penetration, process, tamper,
- protocol analyzer
- IncludedBy:protocols,
- Related:application, software, users,
- protocol converter
- IncludedBy:protocols,
- Related:information,
- protocol data unit
- IncludedBy:protocols,
- Related:control, information, interface, message,
- protocol entity
- protocol run
- IncludedBy:protocols,
- Related:authentication, message,
- protocol suite
- IncludedBy:protocols,
- Related:communications, computer, computer network, network,
- protocols
- Includes:Challenge Handshake Authentication Protocol, Directory Access Protocol, Extensible Authentication Protocol, Identification Protocol, Internet Message Access Protocol, version 4, Internet Protocol Security Option, Internet Security Association and Key Management Protocol, Key Management Protocol, Layer 2 Forwarding Protocol, Layer 2 Tunneling Protocol, Lightweight Directory Access Protocol, Message Security Protocol, Network Layer Security Protocol, Password Authentication Protocol, Post Office Protocol, version 3, Security Protocol 3, Security Protocol 4, Simple Key-management for Internet Protocols, Transport Layer Security Protocol, authentication header protocol, authentication protocol, challenge-response protocol, communications protocol, encapsulating security payload protocol, file transfer protocol, host to front-end protocol, hypertext transfer protocol, internet control message protocol, internet key exchange protocol, internet protocol, internet protocol security, interoperability standards/protocols, ip payload compression protocol, key management protocol data unit, network management protocol, network protocol stack, online certificate status protocol, point-to-point protocol, point-to-point tunneling protocol, proof of possession protocol, proprietary protocol, protocol analyzer, protocol converter, protocol data unit, protocol run, protocol suite, secure hypertext transfer protocol, security protocol, simple mail transfer protocol, simple network management protocol, stateful protocol analysis, transmission control protocol, transmission control protocol/internet protocol, tunneled password protocol, user data protocol, wireless application protocol, zero-knowledge password protocol,
- Related:Abstract Syntax Notation One, Diffie-Hellman, Distributed Authentication Security Service, Estelle, FIREFLY, Generic Security Service Application Program Interface, ICMP flood, IMAP4 AUTHENTICATE, IP address, IPsec Key Exchange, ITU-T, Internet Architecture Board, Internet Assigned Numbers Authority, Internet Corporation for Assigned Names and Numbers, Internet Engineering Task Force, Internet Standard, MIME Object Security Services, Network File System, OAKLEY, OSI architecture, Open Systems Interconnection Reference model, PKIX, POP3 APOP, POP3 AUTH, Photuris, SOCKS, SYN flood, Secure Data Exchange, Secure Data Network System, Secure Electronic Transaction, Secure/MIME, Simple Authentication and Security Layer, Standards for Interoperable LAN/MAN Security, Terminal Access Controller Access Control System, active attack, anonymous and guest login, anonymous login, application gateway firewall, application proxy, application-level firewall, association, authentication header, automated key distribution, backdoor, bastion host, bridge, brouters, certification, claimant, code, common security, communications, computer, computer architecture, connection, connection establishment, connection establishment time, connection maintenance, connection teardown, connection teardown time, control, countermeasures, cyclic redundancy check, domain name service server, domain name system, eavesdropping attack, egress filtering, encapsulating security payload, encapsulation, end system, extensibility, fieldbus, file transfer, firewall, function, gateway, goodput, gopher, hackers, host, https, implementation under test, information, internet, internet vs. Internet, internetwork, kerberos, key confirmation, key distribution center, key recovery, key translation center, language of temporal ordering specification, man-in-the-middle attack, management server, multipurpose internet mail extensions, network, network analyzer, network architecture, network connection, network front-end, network level firewall, network sniffing, nonce, object, object identifier, off-line attack, one-time passwords, online attack, open systems interconnection, packet filtering, packet filtering firewall, passive attack, pretty good privacy, privacy enhanced mail, process, proxy, proxy server, public-key forward secrecy, remote authentication dial-in user service, router, scheme, secure multipurpose internet mail extensions, secure shell, secure socket layer, security association, security association identifier, security certificate, security gateway, security parameters index, signaling system 7, simple key management for IP, software, stealth probe, subnetwork, system, telnet, token authenticator, tokens, transport layer security, transport mode vs. tunnel mode, tunnel, tunneling, uniform resource identifier, uniform resource locator, verifier, verifier impersonation attack, vishing, vulnerability, wireless intrusion detection and prevention system, world wide web,
- prototyping
- Related:application, computer, model, system,
- prove a correspondence
- Related:system,
- provider
- prowler
- IncludedBy:threat,
- Related:file,
- proximity
- Related:access, access control, control, interface, technology,
- proximity sensor
- Related:target,
- proxy
- IncludedBy:firewall,
- Includes:application proxy, circuit proxy, proxy server,
- Related:access, application, attack, authentication, authorized, connection, function, network, operation, packet filtering, program, protocols, software, stateful packet filtering, system, users,
- proxy agent
- Related:software,
- proxy server
- IncludedBy:internet, proxy,
- Related:access, access control, application, association, authentication, computer, connection, control, entity, identity, message, process, protocols, response, router, security, software, system, users, version, world wide web,
- pseudo-flaw
- IncludedBy:risk management, threat,
- Related:program, system,
- pseudo-random
- IncludedBy:random,
- Related:algorithm,
- pseudo-random number generator
- IncludedBy:random,
- Related:process, software, test,
- pseudonym
- Related:entity, identity,
- psychological operations
- IncludedBy:operation, threat,
- Related:foreign, information, object,
- public accreditation verification exponent
- IncludedBy:accreditation, verification,
- public component
- Related:key, public-key,
- public confidence
- IncludedBy:confidence,
- Related:critical, security,
- public domain
- public domain software
- IncludedBy:domain, software,
- Related:subject,
- public encipherment key
- IncludedBy:cipher, encipherment, key, public-key infrastructure,
- Related:public-key,
- public encipherment transformation
- IncludedBy:cipher, encipherment, public-key infrastructure,
- Related:key, public-key, system,
- public information
- IncludedBy:information,
- public key enabling
- IncludedBy:key,
- Related:authentication, security,
- public law 100-235
- Related:classified, computer, computer security, establishment, information, privacy, process, security, standard, system, technology,
- public seed
- public verification key
- IncludedBy:key, public-key infrastructure, verification,
- Related:public-key,
- public-key
- IncludedBy:asymmetric algorithm, key,
- Includes:Federal Public-key Infrastructure, Simple Public-Key Infrastructure, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, X.509 public-key certificate, mesh PKI, public-key algorithm, public-key certificate, public-key cryptography, public-key cryptography standards, public-key derivation function, public-key forward secrecy, public-key information, public-key system,
- Related:CA certificate, Diffie-Hellman, FIREFLY, IEEE P1363, MISSI user, OAKLEY, PKCS #10, PKIX, RSA algorithm, Rivest-Shamir-Adleman algorithm, The Exponential Encryption System, X.500 Directory, X.509, X.509 attribute certificate, X.509 certificate, X.509 certificate revocation list, account authority digital signature, algorithm, archive, asymmetric cryptographic technique, asymmetric cryptography, asymmetric key pair, asymmetric keys, attribute certificate, authority revocation list, bind, binding, certificate, certificate directory, certificate domain, certificate policy, certificate policy qualifier, certificate rekey, certificate renewal, certificate revocation list, certificate update, certificate user, certificate validation, certification, certification authority, certification authority digital signature, certification hierarchy, certification path, certification request, certify, challenge-response protocol, cipher, common name, cross-certification, cryptographic, cryptographic system, cryptography, cryptoperiod, data origin authentication service, digital certificate, digital certification, digital envelope, digital id, digital signature, digital signature algorithm, directly trusted CA, directly trusted CA key, distinguished name, distribution point, domain name system, elliptic curve cryptosystem, encipherment, encryption certificate, end entity, entity, ephemeral key, extension, fingerprint, hierarchy management, information, internet protocol security, key agreement, key exchange, key lifetime, key management infrastructure, key management/exchange, key material identifier, key pair, key transport, key validation, key-escrow system, merchant certificate, modulus, non-repudiation, online certificate status protocol, organizational certificate, path discovery, personality label, policy approving authority, policy certification authority, policy creation authority, pretty good privacy, privacy enhanced mail, private communication technology, private key, public component, public encipherment key, public encipherment transformation, public verification key, registration, registration authority, repository, root, root certificate, root key, secure hypertext transfer protocol, secure multipurpose internet mail extensions, secure socket layer, self-signed certificate, signature, signature certificate, signature verification, strong authentication, subject, subordinate certification authority, symmetric cryptography, system, tokens, trust anchor, trust-file PKI, trusted certificate, trusted key, tunneled password protocol, unforgeable, users, v1 certificate, v2 certificate, v3 certificate, validate, validate vs. verify, validity period, verification, virtual private network, web of trust,
- public-key algorithm
- IncludedBy:algorithm, key, public-key,
- public-key certificate
- IncludedBy:certificate, key, public-key,
- Related:access, authority, certification, cipher, control, digital signature, domain, encipherment, entity, identity, information, integrity, owner, signature, system, test, trust, users, verification,
- public-key cryptography
- IncludedBy:cryptography, key, public-key,
- Includes:Rivest-Shamir-Adleman algorithm,
- Related:cipher, encryption, process, public-key infrastructure, signature, standard, system, users,
- public-key cryptography standards
- IncludedBy:Rivest-Shamir-Adleman algorithm, asymmetric algorithm, cryptography, key, public-key, standard,
- Includes:PKCS #10, PKCS #11, PKCS #7,
- Related:algorithm, application, authority, operation, public-key infrastructure, security, system,
- public-key derivation function
- IncludedBy:asymmetric cryptography, function, key, public-key, public-key infrastructure,
- Related:domain, entity, identification, random, requirements, security, verification,
- public-key forward secrecy
- IncludedBy:forward secrecy, key, public-key,
- Related:algorithm, authentication, compromise, cryptographic, cryptography, encryption, establishment, hash, internet, operation, passwords, property, protocols, security, standard, system,
- public-key information
- IncludedBy:asymmetric cryptography, information, key, public-key, public-key infrastructure,
- Related:algorithm, authority, certification, entity,
- public-key infrastructure
- IncludedBy:key, policy,
- Includes:Federal Public-key Infrastructure, Minimum Interoperability Specification for PKI Components, PKCS #10, PKIX, PKIX private extension, RA domains, SET private extension, SET qualifier, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, X.509, X.509 authority revocation list, X.509 certificate revocation list, account authority digital signature, attribute authority, bilateral trust, brand CRL identifier, brand certification authority, cardholder certification authority, certificate creation, certificate directory, certificate management, certificate policy, certificate policy qualifier, certificate reactivation, certificate rekey, certificate renewal, certificate request, certificate revocation, certificate status responder, certificate update, certificate validation, certification authority, certification authority digital signature, certification authority workstation, certification hierarchy, certification path, certification practice statement, certification request, certification service, certificaton authority, class 2, 3, 4, or 5, common name, compromised key list, delta CRL, digital id, digital signature, directly trusted CA, directly trusted CA key, distinguished name, distribution point, extension, hierarchical PKI, hierarchy management, hierarchy of trust, indirect certificate revocation list, invalidity date, merchant certification authority, mesh PKI, path discovery, path validation, payment gateway certification authority, personality label, policy approving authority, policy certification authority, policy creation authority, policy management authority, private key, public encipherment key, public encipherment transformation, public verification key, public-key derivation function, public-key information, public-key system, registration authority, revocation date, root, subordinate certification authority, top CA, trust-file PKI, v1 CRL, v2 CRL, validity period,
- Related:Abstract Syntax Notation One, Cryptographic Message Syntax, Internet Policy Registration Authority, MISSI user, Open Systems Interconnection Reference model, X.500 Directory, application, archive, assurance, authenticate, authentication, authority, backup, bind, capability, certificate, certificate chain, certificate chain validation, certificate domain parameters, certificate expiration, certificate management services, certification, certification policy, certify, common security, communications, confidentiality, control, critical, cryptographic, cryptography, cryptoperiod, directory service, directory vs. Directory, domain, end entity, end-user, entity, escrow, function, geopolitical certificate authority, identity, information, information security, integrity, issue, issuer, key lifetime, key material identifier, message, object identifier, permissions, personal security environment, policy mapping, pre-authorization, privacy enhanced mail, process, public-key cryptography, public-key cryptography standards, registration, registration service, relying party, repository, revocation, role, secure hypertext transfer protocol, security, security event, signature, slot, software, standard, strong authentication, subject, system, tokens, trust, trust chain, trust hierarchy, trusted key, trusted third party, tunnel, unforgeable, users, valid signature, validate, validate vs. verify, validation, web of trust,
- public-key system
- IncludedBy:asymmetric cryptography, key, public-key, public-key infrastructure, system,
- Related:cryptographic, function, message, signature, verification,
- purge
- Related:application, assurance, attack, classified, file, information, network, process, risk, system,
- purging
- Related:file, information, sanitization,
- push technology
- IncludedBy:technology,
- Related:computer, file, signature, update, users, virus, world wide web,
- quadrant
- Related:cryptography, tamper, technology,
- qualitative assessment
- Related:risk,
- qualitative risk assessment
- IncludedBy:assessment, risk,
- Related:system, threat, vulnerability,
- quality
- Includes:European quality award, business process improvement, continuous process improvement, national quality award, quality assurance, quality assurance/control, quality attributes, quality control, quality function deployment, quality of protection, software quality assurance, total quality management,
- Related:Forum of Incident Response and Security Teams, accountability, assurance level, attribute, benchmarking, business process reengineering, centralized operations, data integrity, electronic messaging services, evaluation, evaluation authority, integrity, national information assurance partnership, performance gap, process, process management approach, requirements, security, standard, statistical process control, stretch goal, system, system integrity, users, validation, value analysis,
- quality assurance
- IncludedBy:assurance, quality,
- Related:confidence, requirements, system,
- quality assurance/control
- IncludedBy:assurance, control, quality,
- quality attributes
- IncludedBy:quality,
- Related:requirements, software,
- quality control
- IncludedBy:control, quality,
- Related:process, system,
- quality function deployment
- IncludedBy:function, quality,
- Related:requirements, system,
- quality of protection
- IncludedBy:evaluation, quality,
- Includes:authentication, encryption strength, integrity, non-repudiation, privacy,
- Related:assurance, function, security,
- quality of service
- Related:requirements, security,
- quantitative assessment
- Related:risk,
- quarantine
- Related:file, malware,
- quarantining
- Related:file, malware, security,
- questionnaire for national security positions
- IncludedBy:security,
- Related:personnel security questionnaire,
- questions on controls
- IncludedBy:control,
- Related:assurance, object, security controls,
- queuing theory
- Related:network, operation,
- quick mode
- Related:establishment, internet protocol security, internet security protocol,
- RA domains
- IncludedBy:domain, public-key infrastructure,
- Related:access, access control, authorization, certificate, certification, subject,
- radio frequency identification
- IncludedBy:identification,
- Related:information,
- radio frequency jamming
- IncludedBy:jamming,
- Related:adversary, attack, classified, threat,
- radix
- rainbow series
- IncludedBy:National Security Agency, Trusted Computer System Evaluation Criteria,
- Includes:Green book, Orange book, Red book, Yellow book,
- Related:criteria, policy,
- random
- Includes:cryptographic randomization, pseudo-random, pseudo-random number generator, random access memory, random number, random number generator, random number sampling, random selection, randomized, randomizer, simple random sample, stratified random sample, systematic selection with a random start,
- Related:Challenge Handshake Authentication Protocol, Internet Engineering Task Force, Rivest-Shamir-Adleman algorithm, adversary, application, challenge, challenge-response protocol, cluster sample, confidence level, cooperative key generation, cryptographic, cryptographic functions, cryptographic key, cryptographic service, cryptographic token, cryptography, degrees of freedom, deterministic, guessing entropy, hash function, key, key generator, key transport, metrics, min-entropy, nonce, one-time pad, pre-signature, public-key derivation function, replay attacks, salt, secure hash standard, security, session key, signature function, stream cipher, test, time variant parameter, trapdoor,
- random access memory
- IncludedBy:access, automated information system, random,
- random bit generator
- random number
- IncludedBy:random,
- random number generator
- IncludedBy:FIPS PUB 140-1, random,
- Related:control, process,
- random number sampling
- IncludedBy:random,
- random procurement
- Related:United States citizen,
- random selection
- IncludedBy:random,
- Related:authorized, standard,
- randomized
- IncludedBy:random,
- randomizer
- IncludedBy:random,
- Related:entity, function, key, process, signature,
- range
- rapid application development
- IncludedBy:application,
- Related:software, users,
- rapid automatic cryptographic equipment
- IncludedBy:cryptographic,
- rating
- IncludedBy:assurance,
- Related:assessment, operation, security target, target,
- rating maintenance program
- IncludedBy:program,
- ratio estimate
- ratio variable
- read
- Includes:object, subject,
- Related:flow, information, operation,
- read access
- IncludedBy:access,
- Includes:object, subject,
- Related:flow, information, operation, program, software,
- read-only memory
- Related:automated information system, computer, process,
- real-time
- Related:information, process,
- real-time processing
- IncludedBy:process,
- Related:computer, operation,
- real-time reaction
- Related:access, access control, penetration, response,
- real-time system
- IncludedBy:system,
- Related:computer, file, process, update,
- realm
- Related:application, authentication, authority, domain,
- recipient
- Related:entity, message, non-repudiation,
- recipient usage period
- reciprocal agreement
- Related:computer, process, system,
- reciprocity
- Related:intelligence, security,
- recommended practices
- IncludedBy:risk management,
- Related:best practices, interoperability,
- reconstitution
- Related:critical, disaster recovery, owner,
- records
- Related:access, access control, evidence, information, program, subject, system, test,
- records having permanent historical value
- records management
- IncludedBy:management,
- Related:requirements,
- recover
- Related:cryptographic, damage, destruction, key, retrieval, trust,
- recoverable part
- Related:message, signature,
- recovery
- IncludedBy:availability,
- Includes:archive, backup, backup procedures, disaster recovery, disaster recovery plan, key recovery, recovery point objectives, recovery procedures, recovery site, recovery time objectives, recovery vendors, trusted recovery,
- Related:accountability, contingency plan, contingency planning, continuity of services and operations, emergency services, failure control, general controls, laboratory attack, non-recoverable part, run manual, sanitize, security management infrastructure, system testing, vaulting, zeroization, zeroize,
- recovery point objectives
- IncludedBy:object, recovery,
- Related:operation,
- recovery procedures
- IncludedBy:contingency plan, recovery,
- Related:failure, file, process, system,
- recovery site
- IncludedBy:recovery,
- Related:business process, computer, information, operation, process,
- recovery time objectives
- IncludedBy:object, recovery,
- Related:process,
- recovery vendors
- IncludedBy:recovery,
- recycled
- RED
- Related:RED/BLACK concept, classified, communications security, information, process, security, system,
- Red book
- IncludedBy:rainbow series,
- Related:computer, criteria, evaluation, network, system, trust,
- RED signal
- IncludedBy:threat,
- Related:RED/BLACK concept, control, emissions security, information, key, security,
- Synonym:emanation,
- RED team
- Related:RED/BLACK concept, adversary, assurance, attack, authorized, covert, information, security, security testing, system, test, threat, vulnerability,
- RED team exercise
- Related:security,
- RED/BLACK concept
- Related:BLACK, RED, RED signal, RED team, RED/BLACK separation, classified, information, security, system,
- RED/BLACK separation
- Related:RED/BLACK concept, cipher, communications security, cryptographic, cryptography, information, system,
- redaction
- reduction-function
- IncludedBy:function,
- Related:code, hash,
- redundancy
- IncludedBy:contingency plan,
- Related:archive, backup, file, information, risk, system,
- redundant array of inexpensive disks
- redundant control server
- IncludedBy:control,
- Related:availability, backup,
- redundant identity
- IncludedBy:entity, identity,
- Related:identification,
- reference material
- Related:classified,
- reference monitor
- IncludedBy:reference monitor concept, target of evaluation,
- Includes:network reference monitor, object, subject,
- Related:access, access control, analysis, confidence, control, function, integrity, security, system, tamper, target, test,
- reference monitor concept
- Includes:object, reference monitor, security kernel, subject,
- Related:access, access control, control,
- reference validation mechanism
- IncludedBy:trusted computing base, validation,
- Includes:object, subject,
- Related:access, access control, analysis, function, operation, security testing, system, tamper, test,
- references
- Related:entity, identity, information, security, subject,
- refinement
- IncludedBy:protection profile,
- Related:file, profile,
- reflection attack
- IncludedBy:attack,
- Related:message,
- register
- Related:file, information, registration,
- register entry
- Related:information,
- registration
- Includes:Internet Policy Registration Authority, JTC1 Registration Authority, organizational registration authority, registration authority, registration service, sub-registration authority,
- Related:Computer Security Objects Register, Internet Assigned Numbers Authority, applicant assertion, authentication, authority, authorization, backup, binding, biometrics, certificate, certificate management services, certification hierarchy, credentials service provider, domain, entity, identity, identity proofing, key, key management, metadata, notarization, policy certification authority, process, public-key, public-key infrastructure, register, role, security, security management infrastructure, subject, system, trusted agent, validate,
- registration authority
- IncludedBy:Secure Electronic Transaction, authority, public-key infrastructure, registration,
- Related:application, authentication, certificate, entity, function, identification, identity, information, key, process, public-key, revocation, subject, tokens, trust, users,
- registration service
- IncludedBy:registration,
- Related:certificate, identify, public-key infrastructure,
- regrade
- IncludedBy:authorization,
- Related:authorized, classification levels, classified, information,
- regression testing
- IncludedBy:security testing, test,
- Related:program, software,
- reimbursable suitability investigation sabotage
- reinstatement
- Related:access, authorization, classified,
- rejected traffic
- IncludedBy:firewall,
- Related:bit forwarding rate, ruleset,
- Synonym:illegal traffic,
- rekey (a certificate)
- IncludedBy:key,
- rekey
- IncludedBy:key,
- Includes:area interswitch rekeying key, automatic key distribution/rekeying control unit, automatic remote rekeying, certificate rekey, common interswitch rekeying key, cooperative remote rekeying, interarea interswitch rekeying key, interswitch rekeying key, manual remote rekeying, over-the-air rekeying, remote rekeying, unique interswitch rekeying key,
- Related:application, certificate management, certificate renewal, certificate update, cryptographic, cryptography, cryptoperiod, over-the-air key distribution, process, security event, security management infrastructure, session key, system,
- relay
- relay station
- Related:security,
- release
- Related:baseline, classified, disclosure, process, software,
- release prefix
- Related:foreign, key,
- reliability
- IncludedBy:risk management,
- Includes:software reliability,
- Related:availability, communications, computer, confidence, function, information, operation, program, property, requirements, software, system, telecommunications,
- reliability qualification tests
- IncludedBy:test,
- relying party
- Related:access, application, certificate, entity, federation, identification, identity, information, process, public-key infrastructure, signature, system, users,
- remanence
- IncludedBy:overwrite procedure,
- Related:information,
- Synonym:magnetic remanence,
- remediation
- IncludedBy:risk management,
- Related:availability, backup, business process, critical, software, system, threat, vulnerability,
- remediation plan
- Related:threat,
- remote access
- IncludedBy:access,
- Related:authorized, boundary, communications, computer, computer network, connection, control, information, remote login, security, security perimeter, software, system, users,
- remote access software
- IncludedBy:access, software,
- Related:computer, network, remote login, secure socket layer, system, telnet,
- remote administration tool
- Related:access, access control, attack, program, system,
- remote authentication dial-in user service
- IncludedBy:Simple Authentication and Security Layer, security protocol, security software, users,
- Related:access, access control, authorization, information, internet, network, protocols, shared secret,
- remote diagnostics
- Related:information, security, security perimeter, system,
- remote job entry
- IncludedBy:automated information system,
- remote login
- IncludedBy:login,
- Related:access, network, remote access, remote access software, system, users,
- Synonym:remote logon,
- remote logon
- IncludedBy:logon, risk,
- Related:dial-up capability, users,
- Synonym:remote login,
- remote maintenance
- Related:analysis, connection, security,
- remote procedure call
- Related:automated information system,
- remote rekeying
- IncludedBy:key, rekey,
- remote terminal
- remote terminal emulation
- IncludedBy:automated information system,
- Related:communications, computer, interface, system, test,
- remote terminal unit
- Related:communications, computer,
- removable hard disk
- removable media
- renew (a certificate)
- renew
- HasPreferred:certificate renewal,
- renewal
- Includes:certificate renewal,
- Related:certificate update, key, process, security event,
- repair action
- Related:application, communications security, control, identification, operation,
- replay attacks
- IncludedBy:attack,
- Related:access, adversary, authentication, communications, control, fraud, impersonation, malicious, message, random,
- replicator
- Related:program, virus, worm,
- report of investigation
- Related:criminal, intelligence, security,
- repository
- Related:access, access control, certificate, information, key, login, public-key, public-key infrastructure, system, trust, users,
- representative of a foreign interest
- IncludedBy:foreign,
- repudiation
- Antonym:non-repudiation,
- IncludedBy:threat consequence,
- Related:association, entity, information, internet, system,
- Request for Comment
- IncludedBy:Internet Society,
- Includes:Internet Standards document, draft RFC,
- Related:Internet Standard, internet, standard,
- request for information
- IncludedBy:information,
- request for proposal
- requirements
- IncludedBy:certification, software development, target of evaluation,
- Includes:DoD Information Technology Security Certification and Accreditation Process, certification and accreditation, construction of TOE requirements, development assurance requirements, downgrade, evaluation assurance level, evaluation assurance requirements, functional security requirements specification, global requirements, granularity of a requirement, information systems security engineering, local requirements, minimum essential requirements, protection needs elicitation, protection profile, requirements analysis, requirements for content and presentation, requirements for evidence, requirements for procedures and standards, requirements traceability matrix, reserve requirements, sanitization, scope of a requirement, security requirements, security requirements review, software requirement, strength of a requirement, system requirement, system security authorization agreement,
- Related:British Standard 7799, CASE tools, CKMS profile, Capstone policies, Common Criteria for Information Technology Security, Common Criteria for Information Technology Security Evaluation, DD 254 - Final, DD 254 - Original, Defense Information Systems Network, Engineering, FIPS PUB 140-1, FIPS-Validated Cryptography, For Official Use Only Certified TEMPEST Technical Authority, Lightweight Directory Access Protocol, SET private extension, TEMPEST approved, Trusted Computer System Evaluation Criteria, Yellow book, acceptable level of risk, acceptance testing, access, access eligibility determination, accesses, accreditation, accreditation disapproval, accreditation range, acquisition plan, acquisition special access program, anomaly, application generator, approved access control device, approved combination padlock, approved electronic, mechanical, or electromechanical device, approved key-operated padlock, assurance, assurance component, assurance level, authorized vendor, authorized vendor program, benchmark, body of evidence, business impact analysis, certificate, certificate policy, certification agent or certifier, certification analyst, certification authority, certification practice statement, certified TEMPEST technical authority, certifier, classified contract, clients, products, and business practices, closed area, collision-resistant hash function, common criteria, completeness, component hierarchy, computer, computing security methods, configuration management, conformance, consumers, controlled area, controlled cryptographic item, controlled security mode, correctness, critical design review, cryptographic key, cryptographic module security policy, defect, dependency, designated approving authority representative, designation policy, development assurance, development assurance component, development process, effectiveness, electronic messaging services, ephemeral key, evaluation assurance component, explain, extension, failure, formal access approval, formal development methodology, formal top-level specification, full accreditation, function, functional component, functionality, handle via special access control channels only, hash function, independent validation and verification, independent validation authority, information assurance, information security architect, information security program plan, information security testing, information sharing, information system security engineer/system design security officer, initial operating capability, interconnection security agreements, interim security clearance, key validation, major application, management control processes, mandatory declassification review, message authentication code algorithm, mission assurance category, multiuser mode of operation, national information assurance partnership, non-disclosure agreement, pass/fail, passive security testing, periods processing, personal security environment, preferred products list, privacy impact assessment, process, public-key derivation function, quality, quality assurance, quality attributes, quality function deployment, quality of service, records management, reliability, reserve account, reverse software engineering, secure single sign-on, security, security architecture, security assurance, security control assessment, security controls, security engineering, security incident, security plan, security policy, security program plan, security safeguards, security service, security violation, sensitive information, site certification, software lifecycle, software quality assurance, software system test and evaluation process, sound group, source code generator, source selection, special access program, special access program/special access required, special background investigation, special information operations, special program review group, specification, standard practice procedures, stress testing, subcontract, system, system administrator, system interconnection, tailoring (assessment procedures), target, temporary access eligibility, test coverage, top-level specification, trusted network interpretation, trusted operating system, two-person control, type accreditation, type certification, user representative, users, validation, verification, verification and validation, verification techniques, virtual password, waiver,
- requirements analysis
- IncludedBy:analysis, requirements,
- Related:resource,
- requirements for content and presentation
- IncludedBy:requirements,
- Related:criteria, evaluation, identify, information,
- requirements for evidence
- IncludedBy:evidence, requirements,
- Related:criteria, evaluation,
- requirements for procedures and standards
- IncludedBy:requirements, standard, target of evaluation,
- Related:availability, confidentiality, criteria, identify, integrity, operation, security,
- requirements traceability matrix
- IncludedBy:requirements,
- Related:computer, function, program,
- research and technology
- reserve account
- Related:requirements, role,
- reserve keying material
- IncludedBy:key,
- reserve requirements
- IncludedBy:requirements,
- Related:system,
- residual risk
- IncludedBy:threat,
- Related:IT security, computer security, control, countermeasures, information, network, system,
- residue
- IncludedBy:risk,
- Related:information, operation, process,
- resilience
- Related:management, risk,
- resource
- IncludedBy:target of evaluation,
- Includes:COMSEC Resources Program, IT resources, MEI resource elements, TOE resource, TOE security functions, enterprise resource planning, information resources, object, resource encapsulation, resource starvation, system resources, uniform resource identifier, uniform resource locator, uniform resource name,
- Related:COMSEC manager, IT security incident, Lightweight Directory Access Protocol, TOE security functions interface, access, access category, access control, access control lists, access control service, access mediation, accessibility, accountability, accreditation boundary, alarm reporting, alarm surveillance, alert, anonymous login, application server attack, application system, assessment, asset, attack, attack potential, audit plan, audit trail, authenticate, authentication, authenticity, authorization, authorized, automated information system, availability, availability service, back up vs. backup, backdoor, baselining, bastion host, business areas, capability, chief information agency officer, chief information officer, common gateway interface, computer abuse, contingency plan, contingency planning, controlled access protection, covert channel, covert storage channel, covert timing channel, critical, criticality assessment, defense-in-depth, defense-wide information assurance program, demilitarized zone, denial-of-service, discretionary access control, domain, domain name, domain name system, dual control, encapsulation, end-user, entry control, expert review team, facilities, failed logon, firewall, function, general support system, honeypot, identification, identification authentication, identity credential issuer, identity validation, identity-based security policy, information, information system, information technology, input, insider, interim accreditation action plan, internal security controls, intruder, intrusion, intrusion detection, intrusion detection systems, least privilege, lines of business, logic bombs, logical access control, login, major application, major information system, malicious applets, malicious logic, mandatory access control, misappropriation, multilevel secure, network configuration, network information services, noncomputing security methods, one-time pad, open systems interconnection, operating system, penetration, permissions, personal identification number, physical security, plan of actions and milestones, privileged access, process, proprietary protocol, requirements analysis, risk analysis, risk assessment, risk management, role-based access control, rule-based security policy, sandboxed environment, secure operating system, secure single sign-on, secure subsystem, security, security clearance, security compromise, security intrusion, security kernel, security label, security management, security management infrastructure, security perimeter, security policy, security service, security testing, security violation, segregation of duties, simulation modeling, single sign-on, spoofing, state variable, stress testing, system, system assets, system integrity, system integrity service, system life, system low, system retention/backup, system security policy, technical security policy, term rule-based security policy, test plan, thrashing, ticket, tokens, trust relationship, trusted gateway, unauthorized access, users, virtual private network, vulnerability, vulnerability assessment, website, work factor, worm,
- resource encapsulation
- IncludedBy:resource,
- Includes:subject,
- Related:access, access control, audit, process,
- resource starvation
- IncludedBy:resource,
- Related:availability, computer, process, threat,
- responder
- Related:authentication,
- response
- Includes:Challenge-Response Authentication Mechanism, Forum of Incident Response and Security Teams, challenge-response protocol, challenge/response, computer emergency response team, computer emergency response teams' coordination center, computer security emergency response team, computer security incident response capability, computer security incident response team, emergency response, emergency response time, incident handling, incident response capability, response time,
- Related:Attack Sensing and Warning, Challenge Handshake Authentication Protocol, Computer Incident Advisory Capability, Extensible Authentication Protocol, Guidelines and Recommendations for Security Incident Processing, IMAP4 AUTHENTICATE, POP3 AUTH, application proxy, authentication token, bit forwarding rate, challenge, contingency plan, contingency planning, covert channel, covert timing channel, domain name system, electromagnetic compatibility, emergency services, entity, functional testing, handler, hijacking, hypertext transfer protocol, identification authentication, identity, incident, infrastructure assurance, interactive mode, keystroke monitoring, mitigation, negotiated acquisition, network management protocol, nonce, object, online certificate status protocol, owner, polymorphism, process, proxy server, real-time reaction, security controls, server, smurf, solicitation, think time, troll, validation,
- response force
- Related:access, security, threat,
- response time
- IncludedBy:response,
- Related:computer, process, system,
- responsibility to provide
- Related:users,
- responsible individual
- Related:trust,
- restart
- Related:computer, program,
- restricted area
- Includes:subject,
- Related:access, access control, classified, control, property, security,
- restricted data
- Related:classified,
- restructuring
- Related:function, semantics, subject, system,
- retrieval
- Related:archive, backup, cryptographic, database management system, escrow, key, key recovery, non-repudiation service, operation, recover, world wide web,
- retro-virus
- IncludedBy:threat, virus,
- Related:availability, backup, system,
- reusability
- Related:application, automated information system, computer, function, program,
- reusable software asset
- IncludedBy:software,
- reverse engineering
- IncludedBy:threat consequence,
- Includes:reverse software engineering,
- Related:code, computer, identify, process, program, subject, system, version,
- reverse software engineering
- IncludedBy:reverse engineering, software,
- Related:process, requirements,
- review board
- Related:authority, system,
- review techniques
- Related:application, file, information, information security, integrity, security, security testing, system, test, vulnerability,
- revision
- Related:baseline, function,
- revocation
- Includes:X.509 authority revocation list, X.509 certificate revocation list, authority revocation list, certificate revocation list, certificate revocation tree, indirect certificate revocation list, revocation date,
- Related:Abstract Syntax Notation One, access, certificate, certificate management services, certificate reactivation, certificate validation, classified, compromise, cryptographic key management system, decertification, distribution point, extension, invalidity date, key, key management, notary, online certificate status protocol, operation, process, public-key infrastructure, registration authority, security, security event,
- revocation date
- IncludedBy:public-key infrastructure, revocation,
- Related:X.509, certificate, compromise, digital signature, key, signature,
- revocation of facility security clearance
- IncludedBy:security,
- Related:classified,
- revoke
- HasPreferred:certificate revocation,
- revoke a certificate
- revoked
- HasPreferred:revoked state,
- revoked state
- IncludedBy:key lifecycle state,
- PreferredFor:revoked,
- Related:X.509 certificate revocation list, certificate rekey, certificate renewal, certificate revocation list, certificate validation, code, cryptographic, delta CRL, distribution point, domain, invalidity date, key, key lifecycle state, lifecycle, online certificate status protocol, security association, unit of transfer,
- Rexd
- IncludedBy:internet,
- Related:program,
- risk
- Antonym:security software,
- IncludedBy:Secure Electronic Transaction, security,
- Includes:IS related risk, IT-related risk, acceptable risk, attack, certification and accreditation, community risk, compromising emanation performance requirement, contamination, critical, debilitated, defect, designated approving authority, destruction, electromagnetic interference, enterprise risk management, failure, false negative, false positive, illegal, incapacitation, information security risk, loop, maintenance hook, operational risk, qualitative risk assessment, remote logon, residue, risk assessment methodology, risk assessment report, risk assessor, risk avoidance, risk evaluation, risk executive, risk identification, risk management, risk management framework, risk mitigation, risk model, risk monitoring, risk plane, risk reduction analysis, risk response, risk response measure, risk tolerance, risk treatment, risk value, risk-adaptable access control, risk-based, risk-informed decisionmaking, security-relevant event, shared account, threat, total risk, unauthorized disclosure, undesired signal data emanations, untrusted process, web risk assessment,
- Related:Clinger-Cohen Act of 1996, Common Criteria for Information Technology Security Evaluation, Defense Information Systems Network Designated Approving Authority, IA infrastructure, IT security policy, Wassenaar Arrangement, accreditation, accreditation disapproval, accreditation phase, accreditation range, acknowledged special access program, adequate security, adjudicative process, adversary, approval to operate, association, assured information sharing, authorization (to operate), authorize processing, authorized, authorizing official, availability, backdoor, blue team, business case, business continuity plan, capability, certification agent or certifier, certification analyst, certification package, certifier, class 2, 3, 4, or 5, clean system, common vulnerabilities and exposures, computer, confinement, contingency plan, continuity of operations plan, continuous monitoring, controlled security mode, cost/benefit analysis, counterintelligence assessment, cover-coding, cryptoperiod, cybersecurity, cyberspace, dangling vulnerability, defense-in-breadth, defense-in-depth, denial time, designated accrediting authority, designated approval authority, disaster recovery plan, effectiveness, enterprise, entity, entity-wide security, environment of operation, exposures, fault tolerance, function, graduated security, group user id, inadvertent disclosure, independent validation authority, information, information security, infrastructure assurance, infrastructure protection, interconnection security agreements, interdependence, interim accreditation action plan, letter of compelling need, level of protection, levels of concern, likelihood of occurrence, low probability of detection, low probability of intercept, major application, malicious, management controls, management countermeasure, management security controls, minimum level of protection, minor application, monitoring and evaluation, multi-hop problem, multilevel device, operation, operations security, operations security process, policy-based access control, post-accreditation phase, pre-certification phase, privacy impact assessment, purge, qualitative assessment, quantitative assessment, redundancy, resilience, robustness, root cause analysis, rules of behavior, safety, scoping guidance, security control effectiveness, security controls, security countermeasures, security goals, security purpose, security safeguards, security-relevant change, semi-quantitative assessment, separation of duties, significant change, simulation modeling, single-hop problem, situational awareness, special information operations, symmetric cryptography, system, system security authorization agreement, system security plan, tactical edge, target, technical vulnerability, technology control plan, test plan, trusted gateway, trusted process, unacknowledged special access program, vaulting, virus scanner, virus-detection tool, work factor,
- risk analysis
- IncludedBy:analysis, risk management,
- Includes:business impact analysis, cost-risk analysis, gap analysis, security fault analysis, security objectives, security requirements, security specifications, security testing, threat analysis, vulnerability analysis,
- Related:application, assessment, compromise, countermeasures, critical, evaluation, identification, identify, information, management, process, resource, system, threat, vulnerability,
- Synonym:risk assessment,
- risk assessment
- IncludedBy:assessment, risk management,
- Related:analysis, control, countermeasures, critical, critical infrastructures, criticality assessment, evaluation, exposures, function, identification, identify, impact, information, management, operation, process, resource, system, threat, vulnerability,
- Synonym:risk analysis,
- risk assessment methodology
- IncludedBy:risk,
- risk assessment report
- IncludedBy:risk,
- risk assessor
- IncludedBy:risk,
- risk avoidance
- IncludedBy:risk,
- Related:access, assessment, evaluation, intelligence,
- risk evaluation
- IncludedBy:evaluation, risk,
- Related:criteria, identify, process,
- risk executive
- IncludedBy:risk,
- Related:authorization,
- risk identification
- IncludedBy:identification, risk,
- Related:analysis, identify, object, process, threat, vulnerability,
- risk index
- IncludedBy:risk management,
- Includes:security range,
- Related:authorization, classification levels, classified, process, system, users,
- risk management
- IncludedBy:management, risk, security,
- Includes:Automated Information System security, access control, automated security monitoring, availability, best practices, configuration management, consequence management, continuity of services and operations, control objectives, countermeasures, crisis management, critical infrastructures, disaster recovery, emergency shutdown controls, entrapment, environmental failure protection, external security controls, failure control, flaw hypothesis methodology, internal security controls, mitigation, penetration study, pseudo-flaw, recommended practices, reliability, remediation, risk analysis, risk assessment, risk index, risk-based management, security enforcing, security evaluation, security measures, security mechanism, security policy, security-critical mechanisms, segregation of duties, test, threat consequence, threat monitoring, user profile, waiver,
- Related:analysis, assessment, authority, authorization, control, cost/benefit analysis, cybersecurity, disaster recovery plan, entity, evaluation, function, identification, identify, information, information systems security engineering, infrastructure assurance, management controls, monitoring and evaluation, operation, opportunity cost, policy, process, program, resource, security controls, security software, strengths, weaknesses, opportunities, threats, system, technology, vulnerability,
- risk management framework
- IncludedBy:management, risk,
- risk mitigation
- IncludedBy:risk,
- Related:control, management,
- risk model
- IncludedBy:risk,
- risk monitoring
- IncludedBy:risk,
- Related:management,
- risk plane
- IncludedBy:risk,
- Related:attack, operation,
- risk reduction analysis
- IncludedBy:analysis, risk,
- Related:control,
- risk response
- IncludedBy:risk,
- risk response measure
- IncludedBy:risk,
- risk tolerance
- IncludedBy:risk,
- risk treatment
- IncludedBy:risk,
- Related:IT security, computer security, evaluation, process,
- risk value
- IncludedBy:risk,
- Related:attack, threat, vulnerability,
- risk-adaptable access control
- IncludedBy:access, control, risk,
- Related:authorization,
- risk-based
- IncludedBy:risk,
- Related:IT security,
- risk-based management
- IncludedBy:risk management,
- risk-informed decisionmaking
- IncludedBy:risk,
- Rivest Cipher 2
- IncludedBy:cipher, symmetric algorithm,
- Related:algorithm, encryption, key, security,
- Rivest Cipher 4
- IncludedBy:cipher, symmetric algorithm,
- Related:algorithm, encryption, key, security,
- Rivest, Shamir, and Adleman
- HasPreferred:Rivest-Shamir-Adleman algorithm,
- Rivest-Shamir-Adleman
- HasPreferred:Rivest-Shamir-Adleman algorithm,
- Rivest-Shamir-Adleman algorithm
- IncludedBy:algorithm, asymmetric algorithm, public-key cryptography,
- Includes:public-key cryptography standards,
- PreferredFor:Rivest, Shamir, and Adleman, Rivest-Shamir-Adleman,
- Related:authentication, cipher, communications, cryptographic, destruction, digital signature, encryption, function, hash, integrity, key, key management, message, process, public-key, random, security, signature, standard, test,
- robust security network
- IncludedBy:network, security,
- robustness
- IncludedBy:assurance,
- Related:analysis, compromise, confidence, countermeasures, function, risk, software reliability, system, threat, vulnerability,
- rogue device
- Related:authorized, threat,
- role
- IncludedBy:target of evaluation,
- Includes:role-based access control,
- Related:FIPS PUB 140-1, Guidelines and Recommendations for Security Incident Processing, IA-enabled information technlogogy product, IP splicing/hijacking, authorization, brand, common criteria, end entity, function, gas and oil production, storage and transportation, major information system, online attack, operator, organizational registration authority, personality label, physical access control, policy approving authority, policy creation authority, public-key infrastructure, registration, reserve account, subordinate certification authority, system, system entity, system security officer, transportation, trust, users,
- role-based access control
- IncludedBy:access, control, role,
- Related:authorization, entity, function, identity, process, resource, subject, system,
- rolling cost forecasting technique
- IncludedBy:business process,
- Related:system, update,
- root
- IncludedBy:multilevel information systems security initiative, public-key infrastructure,
- Related:authority, certificate, certification, entity, key, operation, policy, public-key, subject, system, trust, users,
- root CA
- IncludedBy:certification authority,
- Related:authority, certificate,
- root cause analysis
- IncludedBy:analysis,
- Related:identify, risk,
- root certificate
- IncludedBy:certificate,
- Related:certification, key, public-key, subject,
- root certification authority
- IncludedBy:certification,
- Related:security, trust,
- root key
- IncludedBy:key,
- Related:public-key,
- root registry
- IncludedBy:multilevel information systems security initiative,
- Related:authority, policy,
- rootkit
- IncludedBy:attack, malicious code,
- Related:access, access control, compromise, computer, covert, file, function, information, malicious, message, network, passwords, software, standard, system,
- rotational delay
- Related:automated information system,
- round key
- IncludedBy:key,
- round-function
- IncludedBy:function,
- Related:hash,
- router
- IncludedBy:internet,
- Includes:brouters, filtering router, router flapping, router-based firewall, screening router, tunneling router,
- Related:Extensible Authentication Protocol, IA-enabled information technlogogy product, Terminal Access Controller Access Control System, autonomous system, bastion host, bridge, computer, connection, deny by default, end-to-end encryption, entity, firewall, gateway, internet control message protocol, internet protocol, message, network, network device, packet filtering, packet filtering firewall, protocols, proxy server, screened host firewall, smurf, system resources, technology area, trusted process, vendor,
- router flapping
- IncludedBy:router,
- Related:update,
- router-based firewall
- IncludedBy:firewall, router,
- Related:network, security,
- routine changes
- Related:access, security,
- routing
- Related:information, process,
- routing control
- IncludedBy:control,
- Related:application, network, process,
- RSA algorithm
- IncludedBy:algorithm,
- Related:cryptographic, key, public-key,
- rule-based security policy
- IncludedBy:policy, security,
- Related:access, access control, control, object, resource, subject, users,
- rules based detection
- Related:intrusion, intrusion detection, misuse detection model, security software, signature, system, vulnerability,
- rules of behavior
- Related:access, access control, connection, internet, risk, security, system,
- rules of engagement
- Related:authority, information, information security, security, security testing, test,
- ruleset
- IncludedBy:firewall,
- Related:access, access control, allowed traffic, control, demilitarized zone, illegal traffic, interface, network, policy, protected network, rejected traffic, security association, signature, system, test, unprotected network,
- run
- Related:computer, program,
- run manual
- Related:application, message, recovery,
- S-box
- Related:authentication, privacy, security,
- S/Key
- IncludedBy:key,
- Related:application, authentication, cryptographic, function, hash, login, security, users,
- safeguarding and safeguarding measures
- Related:classified,
- safeguarding statement
- Related:authorized, classified, computer, control, process,
- safeguards
- HasPreferred:security safeguards,
- safety
- Related:control, damage, property, risk, software, system,
- safety-critical software
- IncludedBy:critical, software,
- Related:automated information system, system,
- salami technique
- IncludedBy:threat,
- Related:process,
- salt
- Related:access, access control, attack, control, control systems, cryptographic, encryption, entity, function, message, passwords, process, random, signature, system,
- SAML authentication assertion
- IncludedBy:authentication, security assertion markup language,
- Related:information, subject,
- sample
- Related:information, test,
- sampling distribution
- sampling error
- Related:confidence, precision,
- sampling frame
- Related:access, access control, file,
- Samurai
- Related:hackers, privacy,
- sandboxed environment
- IncludedBy:access control,
- Related:access, authentication, control, file, integrity, malicious, non-repudiation, privacy, process, program, resource,
- sandboxing
- Related:access, control, software, trust,
- sanitization
- IncludedBy:requirements, security,
- Related:analysis, information, network, purging,
- sanitize
- Related:classification levels, classified, file, information, process, recovery, security, system,
- sanitizing
- Related:analysis, classified, information,
- sas 70 report
- Related:audit, standard,
- SATAN
- IncludedBy:intrusion, security software,
- Related:identify, network, program, system, vulnerability,
- SAVILLE Advanced Remote Keying
- IncludedBy:key,
- SCADA server
- Related:system,
- scalability
- Related:application, code, open system environment, scoping guidance, software, system,
- scaling
- scan
- Related:computer, connection, internet, program, software,
- scanning
- IncludedBy:attack,
- Related:information, system,
- scattered castles
- Related:access, intelligence, security,
- scatternet
- scavenging
- IncludedBy:attack, threat consequence,
- Includes:object,
- Related:authorized, cryptography, system,
- scenario
- Related:attack, critical, target,
- scheduled records
- scheme
- Related:assessment, criteria, cryptographic, protocols,
- scope
- Related:security,
- scope of a requirement
- IncludedBy:requirements, trusted computing base,
- Includes:object, subject,
- Related:application, interface, program, users,
- Scope of Accreditation
- IncludedBy:Common Criteria Testing Laboratory, accreditation,
- Related:IT security, computer security, criteria, evaluation, security, technology, test, validation,
- scoping guidance
- Related:access, access control, control, risk, scalability, security, technology,
- scrambling
- Related:attack,
- scratch pad store
- screen scraping
- Related:access, access control, automated information system, computer, information, process, target,
- screened host firewall
- IncludedBy:automated information system, firewall,
- Related:application, gateway, router,
- screened subnet firewall
- IncludedBy:firewall,
- Related:gateway, network, system,
- screening router
- IncludedBy:router,
- Related:firewall, network, security,
- Synonym:filtering router,
- script
- Related:computer, file,
- script bunny
- IncludedBy:hackers,
- Related:computer, program,
- seal
- Related:cryptography, digital signature, integrity, object, signature,
- secrecy policy
- IncludedBy:policy,
- Related:authorized, information, security, security policy, users,
- secret
- IncludedBy:TOE security functions, classification levels,
- Related:authentication, authorized, classified, damage, entity, information, key, operation, passwords, private key, shared secret, system, tokens, users,
- secret and below interoperability
- secret key
- IncludedBy:key, secret-key cryptography, symmetric algorithm,
- Related:algorithm, attack, classified, cryptographic, message,
- secret seed
- Related:authentication, privacy, security,
- secret-key cryptography
- IncludedBy:cryptography, key,
- Includes:secret key,
- PreferredFor:private-key cryptography,
- Related:algorithm, cipher, cryptographic, encryption, message, standard,
- sector
- Related:function,
- sector coordinating council
- sector coordinator
- Related:critical, critical infrastructures, information, system,
- sector liaison
- Related:critical, critical infrastructures, information, system,
- sector partnership model
- sector specialists
- sector-specific agency
- sector-specific plan
- secure channel
- Related:information, security,
- secure communication protocol
- Related:authentication,
- secure communications
- IncludedBy:communications,
- Related:security, telecommunications,
- secure configuration management
- IncludedBy:configuration management,
- Related:computer, control, policy, security, software, system,
- secure copy
- Related:security, target,
- secure data device
- Related:access, classified, users,
- Secure Data Exchange
- IncludedBy:security protocol,
- Related:communications security, network, protocols, standard,
- Secure Data Network System
- IncludedBy:network, security protocol, system,
- Related:National Security Agency, email, key, key management, message, program, protocols,
- secure digital net radio interface unit
- IncludedBy:interface,
- Related:security,
- secure DNS
- Related:authentication, integrity, security,
- Secure Electronic Transaction
- Includes:SET private extension, SET qualifier, acquirer, baggage, bank identification number, brand, brand CRL identifier, brand certification authority, cardholder, cardholder certificate, cardholder certification authority, certificate, certificate policy, certification, certification hierarchy, dual signature, electronic commerce, encryption, geopolitical certificate authority, issuer, key, merchant, merchant certificate, merchant certification authority, payment card, payment gateway, payment gateway certification authority, primary account number, registration authority, risk, tokens, tunnel,
- Related:authentication, confidentiality, information, integrity, internet, network, owner, protocols, standard,
- secure envelope
- Related:entity, evidence, integrity, key, security,
- secure erase
- secure hash algorithm
- IncludedBy:algorithm, hash, integrity,
- Related:cryptographic, digital signature algorithm, file, message,
- secure hash standard
- IncludedBy:hash, standard,
- Related:algorithm, authentication, code, cryptographic, cryptography, function, key, message, random, signature,
- secure hypertext transfer protocol
- IncludedBy:internet, protocols, security protocol, world wide web,
- Related:algorithm, certificate, communications, cryptographic, integrity, key, key management, message, model, operation, privacy, public-key, public-key infrastructure, trust,
- Synonym:secure socket layer,
- secure mobile unit
- Related:security,
- secure multipurpose internet mail extensions
- IncludedBy:email, encryption, internet, key, multipurpose internet mail extensions, security protocol,
- Related:message, protocols, public-key, technology, version,
- Synonym:Secure/MIME,
- secure network server
- IncludedBy:network, security,
- Related:gateway,
- secure operating system
- IncludedBy:system,
- Related:classified, control, function, resource, software,
- secure profile inspector
- IncludedBy:file, profile, security,
- Related:network,
- secure shell
- IncludedBy:internet,
- Related:authentication, confidentiality, connection, encryption, integrity, login, network, protocols, tunnel, users,
- secure single sign-on
- IncludedBy:authorization, passwords,
- Related:access, access control, audit, integrity, logon, non-repudiation, privacy, requirements, resource, security, single sign-on,
- secure socket layer
- IncludedBy:security protocol, world wide web,
- Related:algorithm, application, authentication, communications, confidentiality, connection, cryptography, encryption, entity, hash, hypertext transfer protocol, identity, integrity, internet, internet protocol security, internet security protocol, key, network, privacy, protocols, public-key, remote access software, standard, system, transport layer security, users, version,
- Synonym:secure hypertext transfer protocol,
- secure state
- IncludedBy:access control,
- Includes:object, subject,
- Related:access, authorized, system,
- secure subsystem
- IncludedBy:system,
- Includes:object, subject,
- Related:control, resource, security,
- secure telephone unit
- Related:security,
- Secure Telephone Unit III
- Related:classified, security,
- secure terminal equipment
- Related:security,
- secure working area
- Related:access,
- Secure/MIME
- IncludedBy:internet,
- Related:digital signature, encryption, message, protocols, signature,
- Synonym:secure multipurpose internet mail extensions,
- security
- IncludedBy:accreditation,
- Includes:C2-protect, Common Criteria for Information Technology Security, Common IP Security Option, Cryptographic Application Program Interface, Defense Central Security Index, Defense Industrial Security Clearance Office, Defense Security Service, Defense Security Service Personnel Investigations Center, Generic Upper Layer Security, IP security, IT security achitecture, IT security architecture, IT security awareness, IT security controls, IT security database, IT security education, IT security goal, IT security investment, IT security metrics, IT security objective, IT security plan, IT security support functions, IT security training, National Industrial Security Advisory Committee, National Security Agency, National Security Agency/Central Security Service, National Security Decision Directive, National Security Decision Directive 145, National Security Directive, National Security Emergency Preparedness, National Security Telecommunications Advisory Committee, Sensitive Information Computer Security Act of 1987, Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, Standard Security Label, Standards for Interoperable LAN/MAN Security, TEMPEST, TOE security policy model, access control, accredited security parameter, acoustic security, activity security manager, add-on security, adequate security, administrative security, adversary, application program interface, application-level firewall, approved security container, approved security function, assurance, asynchronous transfer mode, attack, audit, authentication, authorized data security association list, automated data processing security, automated information system, availability, awareness (information security), baseline, baseline security, binding of security functionality, biometrics, call back, call back security, classified, closed security environment, code division multiple access, cognizant security agency, cognizant security office, common data security architecture, communication and data security architecture, communications deception, communications security, communications security monitoring, compensating security controls, computer emergency response team, computer security, computer security toolbox, concept of operations, contractor special security officer, contractor/command program security officer, control zone, correctness proof, cryptographic security, cybersecurity, damage to the national security, data encryption security association type indicator, data security, dedicated security mode, defense-in-depth, developer security, dial-up security, downgrade, dual control, economy of mechanism, electronic personnel security questionnaire, electronic security, emission security, encapsulating security payload protocol, end-to-end security, entity-wide security, extraordinary security measures, facility security clearance, formal model of security policy, formal security policy, front-end security filter, functional security requirements specification, future narrow band digital terminal, generally accepted system security principles, global command and control system, global information grid, global network information environment, graduated security, guard, hash, host-based security, hybrid security control, identity-based security policy, incident of security concern, industrial security, informal security policy, information security, information security architect, information security architecture, information security program plan, information system and network security, information system security engineer/system design security officer, information systems security product, information systems security representative, interconnection security agreements, interim security clearance, internet control message protocol, key management, labeled security protections, layered solution, management security controls, motivation, multi-security level, multilevel security, multilevel security mode, multiple security levels, mutual suspicion, mutually suspicious, national security information, national security system, national security-related information, network layer security, non-discretionary security, non-technical countermeasure, noncomputing security methods, nonkernel security related, open security, open security environment, open system interconnection model, open systems security, operational data security, operations security, operations security assessment, operations security indicator, operations security plan, operations security process, operations security program, operations security survey, operations security working group, organisational security policies, organization computer security representative, overseas security policy board, parity, partitioned security mode, personal security environment, personnel security, personnel security - issue information, personnel security clearance, personnel security determination, personnel security exceptions, personnel security interview, personnel security investigation, personnel security program, personnel security questionnaire, physical security waiver, practices dangerous to security, procedural security, program channels or program security channels, program security officer, protection needs elicitation, protective security service, questionnaire for national security positions, revocation of facility security clearance, risk, risk management, robust security network, rule-based security policy, sanitization, secure network server, secure profile inspector, security architecture, security assertion markup language, security association lifetime, security attribute, security authority, security awareness, training, and education, security banner, security breach, security categorization, security category, security certificate, security certification level, security class, security classification guides, security clearance, security cognizance, security compromise, security concept of operations, security control assessment, security control assessor, security control baseline, security control effectiveness, security control enhancements, security control inheritance, security controls, security countermeasures, security director, security domain, security element, security engineering, security environment, security environment changes, security environment threat list, security event, security fault analysis, security features users guide, security filter, security flaw, security flow analysis, security functions, security gateway, security goals, security impact analysis, security in-depth, security incident, security information object, security information object class, security infraction, security inspection, security intrusion, security label, security level, security management, security management dashboard, security management infrastructure, security markings, security model, security net control station, security objectives, security officer, security parameters index, security plan, security policy automation network, security policy board, security policy information file, security posture, security profile, security program manager, security program plan, security protocol, security purpose, security range, security relevant, security requirements review, security service, security situation, security software, security specifications, security strength, security tag, security target, security test & evaluation, security testing, security threat, security token, security violation, security zone, security-compliant channel, security-relevant change, security-relevant information, security/suitability investigations index, semantic security, separation of duties, signals security, signature, site security manager, software security, special security center, special security officer, strength of mechanisms, subject security level, system security authorization agreement, system security management, system security officer, system-specific security control, systems security steering group, tailored security control baseline, tamper, technical countermeasures, technical security, technical security controls, telecommunications and automated information systems security, term rule-based security policy, time division multiple access, top-level security objectives, traffic-flow security, training (information security), transmission security, transmission security key, transport layer security, trusted computing system, tunneling router, unfavorable personnel security determination, virtual network perimeter,
- Related:Abrams, Jojodia, Podell essays, BLACK, BUSTER, British Standard 7799, CGI scripts, CKMS profile, COMSEC, DD 254 - Final, DD 254 - Original, Defense Central Index of Investigations, Defense Information Infrastructure, Defense Information Systems Network, Defense Information Systems Network Designated Approving Authority, Defense Travel Briefing, Defense Treaty Inspection Readiness Program, Defensive Information Operations, Department of Defense National Agency Check Plus Written Inquiries, Engineering, FIPS PUB 140-1, Federal Information Processing Standards, Federal Standard 1027, For Official Use Only Certified TEMPEST Technical Authority, IA architecture, IA infrastructure, IA product, IA-enabled information technlogogy product, IA-enabled product, IEEE 802.10, IMAP4 AUTHENTICATE, International Traffic in Arms Regulations, Internet Engineering Task Force, Management Act, Monitoring of Evaluations, National Voluntary Laboratory Accreditation Program, Office of Foreign Assets Control, Open Systems Interconnection Reference model, Orange book, PKIX, POP3 AUTH, POSIX, Post Office Protocol, version 3, RED, RED signal, RED team, RED team exercise, RED/BLACK concept, Rivest Cipher 2, Rivest Cipher 4, Rivest-Shamir-Adleman algorithm, S-box, S/Key, SOF-basic, SOF-high, SOF-medium, Scope of Accreditation, Secure Telephone Unit III, Suite B, TEMPEST approved, TEMPEST zoned equipment, TOP SECRET, TSEC, Trusted Computer System Evaluation Criteria, Type 1 key, Type 2 key, US-CERT, Wassenaar Arrangement, Yellow book, access, access control center, access control mechanisms, access control service, access control system, access eligibility determination, access evaluation, access national agency check and inquiries, access with limited privileges, accesses, accounting legend code, accreditation boundary, accreditation disapproval, accreditation package, accreditation phase, accreditation range, accrediting authority, acquisition systems protection, active state, adjudication, adjudicative process, adjudicator, administrative safeguards, adverse information, aggregation, agreement, alert, allocation, anonymity, anonymous, approval/accreditation, approved, approved access control device, approved electronic, mechanical, or electromechanical device, approved mode of operation, approved technologies list, approved test methods list, assessment, assessment objective, asset identification, assured information sharing, attribute certificate, authorization, authorization (to operate), authorized, authorized classification and control markings register, authorized vendor program, automated information system media control system, backdoor, background investigation, behavioral outcome, benign environment, beta i, beta ii, beyond A1, billets, binding, binding of functionality, blacklisting, blue team, body of evidence, boundary protection device, breach, browse access protection, cascading, category, caveat, center for information technology excellence, central adjudication facility, central services node, certificate, certificate domain, certificate policy, certification agent or certifier, certification analyst, certification authority, certification package, certification phase, certification practice statement, certification test and evaluation, classification, classifier, clean system, clearance, clearance certification, clearance level, cleared commercial carrier, cleared employees, closed storage, cloud computing, code amber, code red, code word, collateral information, command and control warfare, commodity service, common control, common control provider, common criteria, common misuse scoring system, communications, communications profile, community of interest, compartmentalization, compartmented mode, compliance-based, component, compromise, computer incident response team, concealment system, confidential, confidential source, conformant validation certificate, connectionless data integrity service, constant surveillance service, construction of TOE requirements, construction surveillance technician, consumers, contingency plan, continuous monitoring, contractor, control, control class, control family, control identification list, controlled access protection, controlled area/compound, controlled building, controlled interface, counterintelligence, covert channel, covert channel analysis, covert storage channel, covert timing channel, crack, crack root, cracker, credit check, criteria, critical asset, critical elements, critical mechanism, critical system, critical system files, criticality assessment, cross domain solution, cross-domain capabilities, cryptanalysis, cryptographic module, cryptography, cryptology, damage assessment, data compromise, data confidentiality service, data integrity service, database management system, declassification guide, declassification of AIS storage media, dedicated mode, deliverable, deliverables list, demilitarized zone, deny by default, derogatory information, designated, designated approving authority representative, designated laboratories list, designation policy, diameter, digital certificate, discretionary access control, disinfecting, documentation, domain, domain of interpretation, domain parameter, dominated by, dominates, due care, egress filtering, electronic questionnaire for investigative processing, element, eligibility, enclave, encrypted key, encryption, end cryptographic unit, endorsement, enhanced hierarchical development methodology, ensure, enterprise, enterprise architecture, entrance national agency check, environment of operation, establishment, evaluated system, evaluation, evaluation work plan, evaluator, examine, exception, expected output, expert review team, exploit, exploitable channel, exploitation, export license, extension, facilities accreditation, facilities certification, facility manager, false acceptance, false rejection, false rejection rate, family, filtering router, financial disclosure, firewall machine, flush, foreign disclosure, foreign liaison officer, foreign military sales, foreign travel briefing, formal access approval, formal development methodology, formal method, formal top-level specification, formal verification, full accreditation, function, functionality, functionality class, gateway, general controls, group of users, hackers, hacking, handle via special access control channels only, hardening, hardware and system software maintenance, high impact, high-impact system, https, identification data, identity, impact level, inadvertent disclosure incident, incident, incident handling, incident response capability, independent assessment, independent validation authority, indication, indistinguishability, information, information category, information domain, information flow control, information sharing environment, information steward, information type, infrastructure, ingress filtering, insider, insider threat, integrity policy, intelligence community, intent, interim accreditation, interim accreditation action plan, interim approval to operate, internal network, internal system exposure, internet key exchange protocol, interview, intrusion, intrusion detection, intrusion detection and prevention system, isolator, joint authorization, joint personnel adjudication system, joint use agreement, key establishment, key stream, keying material, language, least privilege, least trust, letter of compelling need, letter of intent, level of protection, levels of concern, line of business, line supervision, local agency check, logical access, logical completeness measure, loophole, low impact, low-impact system, major application, malicious, malware, management, management control processes, management controls, management countermeasure, management network, mandatory access control, master crypto-ignition key custodian, media protection, minor application, minor derogatory information, mission critical, misuse, mode of operation, model, moderate impact, moderate-impact system, modes of operation, multi-hop problem, multilevel device, multilevel mode, multilevel secure, national agency check, national agency check plus written inquiries, national agency check with local agency checks and credit check, national intelligence, national vulnerability database, naval coastal warfare, network address translation, network front-end, network management, network management software, network sponsor, network system, network trusted computing base, no-lone zone, non-disclosure agreement, non-repudiation, non-repudiation service, non-repudiation token, nonce, null, object identifier, observation reports, office of personnel management, officer, on-access scanning, on-demand scanning, one-time access, open storage, open storage area, operation, operational controls, operations manager, optional modification, original classification, out-of-band, outside(r) threat, outsourced information technology based process, over-the-air rekeying, overt testing, overwrite procedure, owner, package, packet filter, parameters, party, pass/fail, patch, penetration test, people, periods processing, personal financial statement, personal firewall, personalization service, personally identifiable information, physical and environmental protection, physical protection, platform it interconnection, policy, policy certification authority, post-accreditation phase, pre-certification phase, print suppression, privacy, privacy protection, privilege, privileged command, privileged process, privileged user, probe, producers, product rationale, profile, program, program manager, property, protected distribution systems, protection philosophy, protection profile, proxy server, public confidence, public key enabling, public law 100-235, public-key cryptography standards, public-key derivation function, public-key forward secrecy, public-key infrastructure, quality, quality of protection, quality of service, quarantining, random, reciprocity, reference monitor, references, registration, relay station, remote access, remote diagnostics, remote maintenance, report of investigation, requirements, requirements for procedures and standards, resource, response force, restricted area, review techniques, revocation, root certification authority, router-based firewall, routine changes, rules of behavior, rules of engagement, sanitize, scattered castles, scope, scoping guidance, screening router, secrecy policy, secret seed, secure DNS, secure channel, secure communications, secure configuration management, secure copy, secure digital net radio interface unit, secure envelope, secure mobile unit, secure single sign-on, secure subsystem, secure telephone unit, secure terminal equipment, security safeguards, senior officials of the intelligence community, sensitive compartmented information facility - fixed facility checklist, sensitive compartmented information facility accreditation, sensitive information, sensitive label, sensitive position, service, signal flags, signed applet, significant change, simple network management protocol, single scope background investigation, single scope background investigation - periodic reinvestigation, single-hop problem, single-level device, site certification, situational awareness, smartcards, sneaker, special access program facility, special access programs central office, special access required programs oversight committee, special background investigation, special information operations, special investigative inquiry, special program document control center, specialized boundary host, specification, spillage, split knowledge, statement of reasons, status monitoring, suitability of functionality, suspicious event, system, system administrator, system and data integrity, system development and acquisition, system files, system high, system high mode, system integrity service, system interconnection, system low, system profile, system software, tactical approval to operate, tailoring, target identification and analysis techniques, target of evaluation, target vulnerability validation techniques, technical controls, technical non-repudiation, technical surveillance countermeasures, technical surveillance countermeasures inspection, technical surveillance countermeasures surveys and evaluations, technology, technology area, technology critical, terrorists, threat action, threat analysis, threat shifting, tiger team, token copy, token management, token restore, token storage key, tokens, top-level specification, training effectiveness evaluation, tranquility, transportation, trapdoor, tri-homed, trojan horse, trust anchor, trust level, trusted channel, trusted computing base, trusted network interpretation, trusted operating system, trusted third party, trustworthiness, trustworthy system, two-person control, two-person integrity, type 1 products, type 2 product, type accepted telephone, type certification, unfavorable administrative action, unified network, unit of transfer, upgrade, user partnership program, user registration, user representative, validate, validate vs. verify, validation, verification techniques, vishing, vulnerability, vulnerability analysis, vulnerability assessment, white team, wi-fi protected access-2, wired equivalent privacy, wireless local area network, work factor, zero-day exploit,
- security architecture
- IncludedBy:security,
- Includes:computer architecture, network architecture,
- Related:communications security, computer, computer security, emanation, emanations security, network, process, requirements, system, threat, users,
- security assertion markup language
- IncludedBy:security,
- Includes:SAML authentication assertion,
- Related:application, authentication, authorization, information, internet, interoperability, standard, trust,
- security association
- IncludedBy:association, security protocol,
- Related:authentication, connection, connection establishment, establishment, information, internet protocol security, internet security protocol, policy, protocols, revoked state, ruleset, tunnel,
- security association identifier
- IncludedBy:association, security protocol,
- Related:authentication, identify, key, protocols,
- security association lifetime
- IncludedBy:association, security,
- security assurance
- IncludedBy:assurance,
- Related:access, classified, foreign, requirements,
- security attribute
- IncludedBy:security,
- Includes:TOE security functions, object, subject,
- Related:access, control, information, users,
- security audit
- IncludedBy:audit,
- Related:attack, compromise, computer, control, countermeasures, object, policy, system, vulnerability,
- security audit trail
- IncludedBy:audit trail,
- Related:evidence, operation, process, system,
- security authority
- IncludedBy:authority, security,
- Related:domain, entity, policy,
- security awareness, training, and education
- IncludedBy:security,
- Related:control, operation,
- security banner
- IncludedBy:security,
- Related:access, users,
- security breach
- IncludedBy:security, threat,
- Related:control, information, system,
- security categorization
- IncludedBy:security,
- security category
- IncludedBy:security,
- Related:assessment, availability, information, integrity, operation, system,
- security certificate
- IncludedBy:certificate, security,
- Related:connection, file, information, protocols,
- security certification level
- IncludedBy:certification, security,
- Related:control, function, penetration, process, security testing, system, test, verification,
- security class
- IncludedBy:security,
- security classification guides
- IncludedBy:security,
- Related:classified,
- security clearance
- IncludedBy:security,
- Related:access, access approval, access control, authorization, authorized, classified, clearance level, collateral information, controlled access programs, information, policy, process, resource, special access program, standard, system, trust,
- security cognizance
- IncludedBy:security,
- security compromise
- IncludedBy:compromise, security,
- Related:access, access control, authorized, classified, resource, system, unauthorized access,
- security concept of operations
- IncludedBy:security,
- Related:users,
- security control assessment
- IncludedBy:control, security,
- Related:evaluation, management, requirements,
- security control assessor
- IncludedBy:control, security,
- security control baseline
- IncludedBy:control, security,
- security control effectiveness
- IncludedBy:control, security,
- Related:risk,
- security control enhancements
- IncludedBy:control, security,
- security control inheritance
- IncludedBy:control, security,
- security controls
- IncludedBy:control, security,
- Includes:external security controls, internal security controls,
- Related:IT security controls, access, access control, application controls, audit, authentication, availability, baseline controls, communications, computer related controls, confidentiality, connection, countermeasures, identification, incident, information, integrity, management, management controls, operation, operational controls, questions on controls, requirements, response, risk, risk management, software, system, technical controls,
- Synonym:security measures,
- security countermeasures
- IncludedBy:countermeasures, security,
- Related:risk, vulnerability,
- security director
- IncludedBy:security,
- Related:access,
- security domain
- IncludedBy:domain, security,
- Related:access, access control, classified, connection, information, object, policy, subject, system, users,
- security element
- IncludedBy:security,
- security enforcing
- IncludedBy:risk management, target of evaluation,
- Includes:object,
- Related:target,
- security engineering
- IncludedBy:security,
- Related:development, requirements,
- security environment
- IncludedBy:security,
- Related:operation, system,
- security environment changes
- IncludedBy:security,
- security environment threat list
- IncludedBy:security, threat,
- Related:adversary, attack, compromise, criminal, critical, evaluation, evidence, intelligence, target,
- security evaluation
- IncludedBy:evaluation, risk management,
- Related:accreditation, application, assurance, computer, information, operation, process, software, system, trust,
- security event
- IncludedBy:security,
- Related:availability, backup, certificate, certification, compromise, computer, confidentiality, cryptographic, cryptography, incident, information, integrity, key, lifecycle, module, operation, public-key infrastructure, rekey, renewal, revocation, security incident, security-relevant event, software, system, test, update,
- security fault analysis
- IncludedBy:analysis, fault, risk analysis, security,
- Related:assessment,
- security features
- IncludedBy:security safeguards,
- Related:audit, function, software, system, users,
- security features users guide
- IncludedBy:security, users,
- Related:system,
- security filter
- IncludedBy:security,
- Includes:firewall,
- Related:policy, system, trust,
- security flaw
- IncludedBy:security, threat,
- Related:system,
- security flow analysis
- IncludedBy:analysis, flow, security,
- Related:information, system,
- security function policy
- IncludedBy:function, policy, security policy,
- Includes:object,
- security functions
- IncludedBy:function, security, target of evaluation,
- Includes:object,
- Related:policy, security testing, software, target, test,
- security gateway
- IncludedBy:gateway, security,
- Related:internet protocol security, internet security protocol, network, protocols, system, trust,
- security goals
- IncludedBy:security,
- Includes:accountability, assurance, availability, confidentiality, integrity,
- PreferredFor:IT security goal,
- Related:IT security, object, risk, system,
- security impact analysis
- IncludedBy:security,
- security in-depth
- IncludedBy:security,
- Related:authorized,
- security incident
- IncludedBy:incident, security,
- Includes:Guidelines and Recommendations for Security Incident Processing, IT security incident, automated security incident measurement, computer security incident, computer security incident response capability, computer security incident response team, program automated information system security incident support team,
- Related:Forum of Incident Response and Security Teams, access, access control, activity security manager, authorized, classified, classified information spillage, communications security, compromise, computer, data compromise, inadvertent disclosure incident, information, network, policy, requirements, security event, security intrusion, suspicious event, system, unauthorized access, vulnerability,
- security information object
- IncludedBy:information, object, security,
- security information object class
- IncludedBy:information, object, security,
- security infraction
- IncludedBy:security,
- Related:classified, compromise,
- security inspection
- IncludedBy:security,
- Related:policy,
- security intrusion
- IncludedBy:incident, intrusion, security,
- Related:access, access control, authorization, resource, security incident, system,
- security kernel
- IncludedBy:access control, reference monitor concept,
- Related:access, computer, control, network, property, resource, software, system, trust,
- security label
- IncludedBy:security,
- Includes:label, object, sensitivity label,
- Related:access, access control, classification levels, classified, computer, control, critical, file, information, policy, resource, subject, system, virus,
- security level
- IncludedBy:security,
- Includes:access level,
- Related:access, classification levels, classified, information, object, subject, threat, users,
- security management
- IncludedBy:security,
- Related:access, access control, control, information, network, process, resource,
- security management dashboard
- IncludedBy:management, security,
- security management infrastructure
- IncludedBy:key, security,
- Related:access, access control, attack, authorization, certificate, compromise, control, encryption, function, information, policy, process, recovery, registration, rekey, resource, system,
- security markings
- IncludedBy:security,
- security measures
- IncludedBy:risk management,
- Related:software, system,
- Synonym:security controls,
- security mechanism
- IncludedBy:risk management,
- Related:algorithm, assurance, authentication, digital signature, encryption, function, process, signature, software, system,
- security model
- IncludedBy:model, security,
- Includes:Bell-LaPadula security model,
- Related:system,
- security net control station
- IncludedBy:control, security,
- Related:communications security, management, network, policy, system,
- security objectives
- IncludedBy:object, risk analysis, security, target of evaluation,
- PreferredFor:IT security objective,
- Related:accountability, assurance, confidentiality, integrity, system, target, threat,
- security officer
- IncludedBy:officer, security,
- Related:system,
- security parameters index
- IncludedBy:security,
- Related:association, connection, internet protocol security, internet security protocol, process, protocols, system,
- security perimeter
- IncludedBy:access control,
- Includes:perimeter-based security,
- PreferredFor:perimeter,
- Related:authorization, boundary, code, communications, control, domain, external security testing, insider, internal security testing, policy, remote access, remote diagnostics, resource, system, trust,
- Synonym:accreditation boundary,
- security plan
- IncludedBy:security,
- Related:control, information, requirements, system,
- security policy
- IncludedBy:component operations, policy, risk management, security-relevant event,
- Includes:FIPS approved security method, TOE security policy, corporate security policy, critical security parameters, cryptographic module security policy, formal security policy model, object, organisational security policy, security function policy, security policy model, system security policy, technical security policy, trusted functionality, trusted process, trusted subject, usage security policy,
- Related:access, access control, authority, availability, confidentiality, critical, function, incident, information, information protection policy, information security, integrity, integrity policy, model, operation, process, program, requirements, resource, secrecy policy, software, system, technology, threat, users,
- security policy automation network
- IncludedBy:network, security,
- Related:classified, computer network, foreign,
- security policy board
- IncludedBy:security,
- security policy information file
- IncludedBy:file, information, policy, security,
- Related:domain,
- security policy model
- IncludedBy:model, policy, security policy,
- Includes:anomaly detection model, misuse detection model,
- Related:computer, criteria, evaluation, identify, information, system, trust, trusted computer system,
- security posture
- IncludedBy:security,
- Related:software,
- security profile
- IncludedBy:security,
- security program manager
- IncludedBy:program, security,
- Related:certification, policy, process, standard,
- security program plan
- IncludedBy:security,
- Related:control, management, requirements,
- Security Protocol 3
- IncludedBy:protocols, security protocol,
- Related:connection,
- Security Protocol 4
- IncludedBy:protocols, security protocol,
- Related:connection,
- security protocol
- IncludedBy:protocols, security,
- Includes:Challenge Handshake Authentication Protocol, Distributed Authentication Security Service, Extensible Authentication Protocol, Generic Security Service Application Program Interface, Identification Protocol, Internet Protocol Security Option, Internet Security Association and Key Management Protocol, Key Management Protocol, Layer 2 Forwarding Protocol, Layer 2 Tunneling Protocol, Lightweight Directory Access Protocol, MIME Object Security Services, Message Security Protocol, Network Layer Security Protocol, Password Authentication Protocol, Secure Data Exchange, Secure Data Network System, Security Protocol 3, Security Protocol 4, Simple Authentication and Security Layer, Simple Key-management for Internet Protocols, Terminal Access Controller Access Control System, Transport Layer Security Protocol, authentication header, encapsulating security payload, internet protocol security, multipurpose internet mail extensions, online certificate status protocol, point-to-point tunneling protocol, pretty good privacy, privacy enhanced mail, remote authentication dial-in user service, secure hypertext transfer protocol, secure multipurpose internet mail extensions, secure socket layer, security association, security association identifier, simple key management for IP, virtual private network,
- security purpose
- IncludedBy:security,
- Related:computer security, object, risk, system,
- security range
- IncludedBy:risk index, security,
- Related:network, system,
- security relevant
- IncludedBy:security, target of evaluation,
- Includes:security-relevant event,
- Related:function, target,
- security requirements
- IncludedBy:requirements, risk analysis, security target,
- Includes:security requirements baseline,
- Related:application, availability, computer security, information, integrity, policy, process, security testing, system, test,
- security requirements baseline
- IncludedBy:baseline, security requirements,
- Related:system,
- security requirements review
- IncludedBy:requirements, security,
- security safeguards
- IncludedBy:Automated Information System security,
- Includes:security features,
- PreferredFor:safeguards,
- Related:access, access control, availability, control, countermeasures, management, requirements, risk, security, security software, software, system,
- security service
- IncludedBy:security,
- Related:access, authentication, availability, computer, control, management, process, requirements, resource, security software, system,
- security situation
- IncludedBy:security,
- PreferredFor:situation,
- Related:association, classification levels, classified, information, network, operation,
- security software
- Antonym:attack, risk, threat, vulnerability,
- IncludedBy:security, software,
- Includes:Intrusion Detection In Our Time, SATAN, Tiger, Tripwire, activity analysis, anomaly detection, antivirus software, attack signature recognition, authentication tools, automated security incident measurement, automated security monitoring, computer oracle and password system, email security software, encryption tools, firewall, integrity-checking tools, intrusion detection systems, intrusion detection tools, kerberos, remote authentication dial-in user service, security support programming interface, tcpwrapper, tinkerbell program, vaccines, virus scanner, virus-detection tool,
- Related:Automated Information System security, alarm reporting, alarm surveillance, anti-spoof, audit, computer security object, countermeasures, risk management, rules based detection, security safeguards, security service, software security, trap, trusted computing system,
- security specifications
- IncludedBy:development process, risk analysis, security,
- Related:system,
- security strength
- IncludedBy:security,
- Related:algorithm, cipher, critical, cryptographic, encryption, information, operation, system,
- security support programming interface
- IncludedBy:Generic Security Service Application Program Interface, interface, program, security software, software,
- Related:application, standard,
- security tag
- IncludedBy:security,
- Related:information,
- security target
- IncludedBy:Common Criteria for Information Technology Security Evaluation, component extensibility, construction of TOE requirements, functional package, security, target, target of evaluation,
- Includes:functional component, security requirements,
- Related:IT security, assurance, baseline, computer security, correctness, criteria, deliverable, deliverables list, effectiveness, evidence, file, function, profile, protection profile, rating, security testing, suitability of functionality, system, test, threat, vulnerability assessment,
- security test & evaluation
- IncludedBy:evaluation, security, test,
- Related:control, operation, process, system,
- security test and evaluation
- IncludedBy:software security, software system test and evaluation process, test,
- Includes:security testing,
- Related:analysis, computer, operation, system,
- security testing
- IncludedBy:risk analysis, security, security test and evaluation, test,
- Includes:Common Criteria Testing Laboratory, Common Criteria Testing Program, acceptance testing, active security testing, ad hoc testing, black-box testing, boundary value testing, conformance testing, environmental failure testing, exhaustive testing, external security testing, functional testing, information security testing, interface testing, internal security testing, mutation testing, operational testing, passive security testing, penetration testing, pilot testing, regression testing, smart testing, stress testing, structural testing, syntax testing, system testing, testing, unit testing, verification, white-box testing,
- Related:CASE tools, FIPS PUB 140-1, RED team, acceptance inspection, accreditation, application, blue team, boundary value analysis, certificate, certification, change management, component, countermeasures, credentials, flaw hypothesis methodology, function, homed, implementation under test, independent validation and verification, information processing standard, instrument, monitoring and evaluation, national information assurance partnership, negative tests, object, patch management, path coverage, penetration, penetration test, point of control and observation, process, protection profile, reference validation mechanism, resource, review techniques, rules of engagement, security certification level, security functions, security requirements, security target, system, system development lifecycle, target identification and analysis techniques, target vulnerability validation techniques, test cycle, test facility, test item, test key, test plan, test report, tiger team, trusted certificate, users,
- security threat
- IncludedBy:security, threat,
- Related:adversary, exploit, operation, vulnerability,
- security token
- IncludedBy:security, tokens,
- security violation
- IncludedBy:security, threat,
- PreferredFor:violation,
- Related:access, access control, authorized, classified, compromise, control, information, penetration, policy, requirements, resource, system, threat consequence, unauthorized access, users,
- security zone
- IncludedBy:security,
- Related:trust,
- security-compliant channel
- Antonym:covert channel,
- IncludedBy:channel, security,
- Related:computer security, evaluation, network, policy, trust,
- Synonym:trusted channel,
- security-critical mechanisms
- IncludedBy:critical, risk management,
- Related:operation, policy,
- security-relevant change
- IncludedBy:security,
- Related:risk, users,
- security-relevant event
- IncludedBy:risk, security relevant,
- Includes:access control, security policy, subject, users,
- Related:IT security incident, access, audit, computer, control, file, login, logon, passwords, policy, security event, system,
- security-relevant information
- IncludedBy:security,
- security/suitability investigations index
- IncludedBy:security,
- seed key
- IncludedBy:key,
- Related:process,
- seek time
- segregation of duties
- IncludedBy:risk management,
- Related:access, access control, authorized, computer, control, key, minimum essential infrastructure, operation, resource, unauthorized access,
- selection
- self-inspection
- Related:evaluation,
- self-signed certificate
- IncludedBy:certificate,
- Related:X.509, key, public-key, subject,
- semantic security
- IncludedBy:security,
- Related:algorithm, cipher, cryptography, encryption, information,
- semantics
- Related:certificate validation, critical, formal, formal security policy model, formal specification, hypertext markup language, interoperability, meta-language, restructuring, semiformal,
- semi-quantitative assessment
- Related:risk,
- semiformal
- Related:semantics,
- senior agency official
- Related:classified,
- senior foreign official
- IncludedBy:foreign,
- Related:access,
- senior intelligence officer
- IncludedBy:intelligence,
- Related:foreign,
- senior officials of the intelligence community
- IncludedBy:intelligence,
- Related:security,
- senior review group
- Related:access, intelligence,
- sensitive
- IncludedBy:classification levels,
- Related:information, owner, users,
- sensitive activities
- Related:access, critical, intelligence,
- sensitive but unclassified
- IncludedBy:classification levels, classified, sensitive information,
- sensitive but unclassified information
- IncludedBy:classified,
- Related:unclassified sensitive,
- sensitive compartmented information
- IncludedBy:information,
- Related:access, access control, classified, control, control systems, intelligence, process, system,
- sensitive compartmented information courier
- Related:access,
- sensitive compartmented information facility - coutilization
- sensitive compartmented information facility - fixed facility checklist
- Related:security,
- sensitive compartmented information facility
- IncludedBy:information,
- Related:intelligence, process,
- sensitive compartmented information facility accreditation
- Related:authorization, intelligence, security,
- sensitive compartmented information facility database
- Related:intelligence,
- sensitive information
- IncludedBy:information,
- Includes:critical and sensitive information list, sensitive but unclassified,
- Related:access, access control, authority, authorized, classified, code, computer, computer security, control, criteria, damage, foreign, policy, privacy, program, requirements, security, system, unauthorized access,
- Sensitive Information Computer Security Act of 1987
- IncludedBy:security,
- Related:information security, privacy, users,
- sensitive label
- Related:information, object, security,
- sensitive position
- Related:critical, security,
- sensitivity
- Related:information, owner,
- sensitivity analysis
- IncludedBy:analysis,
- Related:process, program, test,
- sensitivity label
- IncludedBy:access control, security label,
- Includes:object,
- Related:access, classification levels, classified, control, information, subject, trust,
- sensor
- Related:flow, intrusion, intrusion detection, property, system,
- sensor or monitor
- Related:system,
- separation of duties
- IncludedBy:security,
- Related:function, process, risk, system,
- sequence number
- serial number
- HasPreferred:certificate serial number,
- server
- Related:computer, entity, file, network, process, program, response, system,
- service
- Related:access, security,
- service-level agreement
- servo valve
- Related:control,
- session hijack attack
- IncludedBy:attack,
- PreferredFor:session hijacking,
- Related:authentication, authorized, communications, control, hijacking, users,
- session hijacking
- HasPreferred:session hijack attack,
- session key
- IncludedBy:kerberos, key, key recovery, trust, virtual private network,
- Related:application, computer, connection, cryptographic, encryption, module, operation, random, rekey,
- set point
- Related:control, program,
- SET private extension
- IncludedBy:Secure Electronic Transaction, public-key infrastructure,
- Related:X.509, certificate, encryption, hash, information, key, message, requirements, tunnel,
- SET qualifier
- IncludedBy:Secure Electronic Transaction, public-key infrastructure,
- Related:algorithm, certificate, certification, email, hash, information, policy,
- settlement
- Related:owner, process,
- shall
- Includes:object,
- shared account
- IncludedBy:risk,
- Related:users,
- shared secret
- Related:Challenge-Response Authentication Mechanism, POP3 APOP, authentication, cryptographic, cryptography, key, key agreement, out-of-band, passwords, personal identification number, remote authentication dial-in user service, secret,
- shielded enclosure
- shim
- Related:code, intrusion, intrusion detection,
- shipper
- Related:consignor,
- short title
- Related:communications security, control, identify,
- should
- Includes:object,
- Related:technology,
- shoulder surfing
- IncludedBy:attack,
- Related:eavesdropping, identity theft,
- shrink-wrapped software
- IncludedBy:software,
- Related:computer,
- sign
- Related:digital signature, object, signature,
- signal flags
- Related:intelligence, security,
- signaling
- Related:communications, connection, control, function, information, message, network, operation, process, system, telecommunications,
- signaling system 7
- IncludedBy:system,
- Related:function, network, protocols,
- signals analysis
- IncludedBy:analysis, threat consequence,
- Related:system,
- signals security
- IncludedBy:security,
- signature
- IncludedBy:security,
- Includes:Digital Signature Standard, Elliptic Curve Digital Signature Algorithm, account authority digital signature, asymmetric signature system, attack signature, attack signature recognition, authentic signature, certification authority digital signature, continuous signature service, digital signature, digital signature algorithm, digitized signature, dual signature, electronic signature, penetration signature, pre-signature, private signature key, signature certificate, signature equation, signature function, signature generation, signature key, signature process, signature system, signature verification, valid signature, virus signature,
- Related:ABA Guidelines, CA certificate, Cryptographic Message Syntax, Distinguished Encoding Rules, El Gamal algorithm, Fortezza, IEEE P1363, Internet Security Association and Key Management Protocol, MIME Object Security Services, PKCS #7, Rivest-Shamir-Adleman algorithm, Secure/MIME, The Exponential Encryption System, X.509 attribute certificate, X.509 certificate revocation list, X.509 public-key certificate, access, access control, appendix, archive, assignment, asymmetric cryptographic technique, asymmetric cryptography, asymmetric keys, attack, attribute certificate, authenticate, authentication, authorized, bind, biometrics, brand CRL identifier, capacity, card personalization, certificate, certificate validation, certification path, cryptographic algorithm, cryptographic key, cryptographic system, cryptography, data encryption key, data input, data origin authentication service, digital certificate, digital notary, elliptic curve cryptography, email packages, email security software, encryption certificate, end entity, hash token, identification data, identify, incident, integrity, invalidity date, key, key pair, malware, merchant certificate, message, message digest, message representative, no prior relationship, non-recoverable part, non-repudiation, personality label, pretty good privacy, private key, process, public-key, public-key certificate, public-key cryptography, public-key infrastructure, public-key system, push technology, randomizer, recoverable part, relying party, revocation date, rules based detection, ruleset, salt, seal, secure hash standard, security mechanism, sign, signed message, signer, symmetric cryptography, system, threat, time-stamping service, triple DES, unauthorized access, unforgeable, vaccines, validate vs. verify, verification key, verification process, virus, virus definitions,
- Synonym:indication,
- signature certificate
- IncludedBy:certificate, signature,
- Related:X.509, cryptographic, digital signature, encryption, function, key, public-key,
- signature equation
- IncludedBy:signature,
- Related:digital signature, function,
- signature function
- IncludedBy:function, signature,
- Related:digital signature, domain, key, process, random,
- signature generation
- IncludedBy:signature,
- Related:algorithm, key, process,
- signature key
- IncludedBy:key, signature,
- Related:digital signature, entity, process,
- signature process
- IncludedBy:process, signature,
- Related:digital signature, domain, key, message,
- signature system
- IncludedBy:signature, system,
- Related:cryptographic, digital signature, verification,
- signature validation
- Related:assurance,
- signature verification
- IncludedBy:signature, verification,
- Related:algorithm, key, process, public-key,
- signed applet
- IncludedBy:software,
- Related:integrity, security, tamper,
- signed data
- signed message
- IncludedBy:message,
- Related:signature,
- signer
- Related:digital signature, entity, key, object, signature,
- significant change
- Related:analysis, application, critical, function, information, interface, process, risk, security, software, system,
- significant derogatory information
- silver bullet
- Related:program,
- simple authentication
- IncludedBy:authentication,
- Related:entity, identity, information, passwords, process,
- Simple Authentication and Security Layer
- IncludedBy:authentication, internet, security protocol,
- Includes:kerberos, remote authentication dial-in user service,
- Related:connection, key, protocols, users,
- Simple Distributed Security Infrastructure
- IncludedBy:Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure,
- simple key management for IP
- IncludedBy:key management, security protocol,
- Related:integrity, privacy, protocols,
- Simple Key-management for Internet Protocols
- IncludedBy:internet, key management, protocols, security protocol,
- Related:algorithm, encryption,
- simple mail transfer protocol
- IncludedBy:internet, protocols,
- Related:application, computer, email, message, standard,
- simple network management protocol
- IncludedBy:internet, network, protocols,
- Related:access, access control, application, authentication, authorization, availability, code, communications, confidentiality, control, cryptographic, cryptography, information, integrity, message, operation, passwords, security, software, standard, version,
- Simple Public-Key Infrastructure
- IncludedBy:Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure, key, public-key,
- Simple Public-Key Infrastructure/Simple Distributed Security Infrastructure
- IncludedBy:key, public-key, public-key infrastructure, security,
- Includes:Simple Distributed Security Infrastructure, Simple Public-Key Infrastructure,
- Related:authorization, authorized, certificate, network,
- simple random sample
- IncludedBy:random,
- simple security condition
- IncludedBy:Bell-LaPadula security model, simple security property,
- Includes:object, subject,
- Related:access, access control, model,
- simple security property
- IncludedBy:Bell-LaPadula security model, property,
- Includes:object, simple security condition, subject,
- Related:access, access control, model,
- simulation modeling
- IncludedBy:model,
- Related:business process, computer, operation, process, program, resource, risk, test,
- single loop controller
- IncludedBy:control,
- Related:critical, process,
- single point keying
- IncludedBy:key,
- single scope background investigation - periodic reinvestigation
- Related:access, classified, critical, intelligence, security,
- single scope background investigation
- Related:security,
- single sign-on
- Related:access, access control, application, authentication, computer, login, network, resource, secure single sign-on, system, trust, users,
- single-hop problem
- Related:risk, security, software,
- single-level device
- IncludedBy:modes of operation,
- Related:information, process, security, system, trust,
- site accreditation
- IncludedBy:accreditation,
- Related:application, baseline, entity, interoperability, operation, system,
- site certification
- IncludedBy:certification,
- Related:accreditation, assessment, function, operation, requirements, security, system,
- site information assurance manager
- IncludedBy:assurance,
- Related:users,
- site security manager
- IncludedBy:security,
- Related:United States citizen,
- situation
- HasPreferred:security situation,
- situational awareness
- Related:risk, security, threat,
- skimming
- Related:authorization, authorized, owner,
- Skipjack
- IncludedBy:National Security Agency, symmetric algorithm,
- Related:algorithm, cipher, classified, encryption, escrow, key, operation,
- slot
- IncludedBy:multilevel information systems security initiative,
- Related:Fortezza, X.509, certificate, key, public-key infrastructure,
- smart testing
- IncludedBy:security testing, test,
- smartcards
- IncludedBy:tokens,
- Includes:PIV issuer, contactless smart card, personal identity verification card,
- Related:application, computer, function, identify, information, interface, key, owner, passwords, process, security, standard, tamper, users,
- smurf
- IncludedBy:attack,
- Related:denial-of-service, exploit, message, network, program, response, router, smurfing, software,
- smurfing
- IncludedBy:attack,
- Related:network, smurf, spoof,
- snake oil
- IncludedBy:threat,
- snarf
- IncludedBy:threat,
- Related:file,
- sneaker
- IncludedBy:threat,
- Related:security, test, tiger team,
- sniffer
- IncludedBy:exploit, internet,
- Includes:packet sniffer,
- Related:audit, computer, computer network, covert, identify, information, message, network, operation, passwords, program, sniffing, software, users,
- sniffing
- IncludedBy:threat,
- Includes:ethernet sniffing, password sniffing,
- Related:sniffer,
- social engineering
- IncludedBy:attack,
- Includes:phishing,
- Related:access, access control, adversary, authorized, computer, file, hoax, identity theft, impersonation, information, key, malicious, passwords, process, system, target, technology, theft, tokens, trust, users,
- SOCKS
- IncludedBy:internet,
- Related:access, access control, application, authentication, authorized, computer, connection, encryption, network, object, protocols, unauthorized access,
- SOF-basic
- IncludedBy:strength of function, target of evaluation,
- Related:analysis, attack, function, security,
- SOF-high
- IncludedBy:strength of function, target of evaluation,
- Related:analysis, attack, function, security,
- SOF-medium
- IncludedBy:strength of function, target of evaluation,
- Related:analysis, attack, function, security,
- soft TEMPEST
- IncludedBy:TEMPEST,
- Related:computer, information, key, software,
- software
- Includes:CGI scripts, COTS software, Java, antispyware software, antivirus software, application, application program interface, application software, assured software, audit software, commercial off-the-shelf software, commercial software, computer-aided software engineering, cryptographic application programming interface, customer/contractor-supplied software, email security software, encryption software, hardware and system software maintenance, hardware or software error, imported software, mass-market software, mobile software agent, modular software, network management software, networking features of software, programming languages and compilers, public domain software, remote access software, reusable software asset, reverse software engineering, safety-critical software, security software, security support programming interface, shrink-wrapped software, signed applet, software architecture, software assurance, software build, software configuration management, software development, software development lifecycle, software development methodologies, software engineering, software enhancement, software library, software lifecycle, software maintenance, software operation, software performance engineering, software product, software publisher certificate, software quality assurance, software reengineering, software release, software reliability, software repository, software requirement, software security, software system test and evaluation process, software verification and validation, software-based fault isolation, spam filtering software, support software, system software, systems software, trusted software, virus, web content filtering software,
- Related:Automated Information System security, CASE tools, CKMS component, COMSEC boundary, COMSEC material, Clark Wilson integrity model, Common Criteria for Information Technology Security, FIPS PUB 140-1, Fortezza, IT resources, IT security controls, IT security product, IT security support functions, Integrated CASE tools, PIV issuer, PKCS #11, TCB subset, TOE security functions, Tiger, Tripwire, Trusted Computer System Evaluation Criteria, acceptance inspection, access, access control, access control mechanisms, active content, add-on security, anomaly, antivirus tools, application data backup/recovery, application generator, application programming interface, approval/accreditation, archive, assurance, authentication, authentication code, authentication mechanism, automated data processing system, automated information system, automated security monitoring, availability, backdoor, baseline, bastion host, benchmark, black-box testing, bomb, boundary, browse access protection, candidate TCB subset, cardholder, certification authority workstation, certification test and evaluation, clean system, clear, cloud computing, code coverage, coding, common misuse scoring system, communications, completeness, component, computer, computer architecture, computer emergency response teams' coordination center, computer fraud, computer oracle and password system, computer security, computer security subsystem, computer security technical vulnerability reporting program, computer-assisted audit technique, computing security methods, configuration, configuration control, configuration control board, configuration item, configuration management, controlled security mode, conversion, correctness, critical system files, cryptographic boundary, cryptographic module, cryptographic product, cryptographic service, cyberattack, data driven attack, database management system, debug, development process, dictionary attack, disaster recovery plan, documentation, domain name system, dongle, electronically generated key, ethernet sniffing, evaluated products list, execute access, executive state, fail safe, fail soft, failure, failure access, failure control, fault, fault injection, fault tolerance, fault tolerant, file integrity checker, file integrity checking, firewall, firmware, formal development methodology, formal specification, front-end security filter, function, general support system, global information grid, group of users, hardware, hashed message authentication code, high assurance guard, host, host-based firewall, hot site, human-machine interface, implementation, implementation vulnerability, independent validation and verification, independent validation authority, information and communications, information assurance component, information processing standard, information systems security equipment modification, information technology, instrument, instrumentation, integrity, interface, internal security controls, interoperable, intrusion detection, intrusion detection systems, intrusion prevention system, key management infrastructure, keystroke monitoring, license, logic bombs, loophole, maintenance, maintenance hook, major application, malicious code, malicious logic, malware, management network, mechanisms, message authentication code vs. Message Authentication Code, message integrity code, metrics, middleware, mobile code, mobile code technologies, modes of operation, modularity, multi-hop problem, negative tests, network analyzer, network architecture, network management architecture, network protocol stack, network trusted computing base, noncomputing security methods, operating system, operations manager, oracle, overwrite procedure, packet sniffer, packet switching, passive security testing, password cracker, patch, patch management, path histories, pharming, pilot testing, platform, plug-in modules, portability, post-accreditation phase, pretty good privacy, privacy programs, process, product, program, protocol analyzer, protocols, proxy, proxy agent, proxy server, pseudo-random number generator, public-key infrastructure, quality attributes, rapid application development, read access, regression testing, release, reliability, remediation, remote access, rootkit, safety, sandboxing, scalability, scan, secure configuration management, secure operating system, security controls, security evaluation, security event, security features, security functions, security kernel, security measures, security mechanism, security policy, security posture, security safeguards, significant change, simple network management protocol, single-hop problem, smurf, sniffer, soft TEMPEST, source code, source code generator, spyware, subsystem, supply chain attack, symbolic execution, system, system and data integrity, system assets, system development methodologies, system life, system low, system retention/backup, system safety, system-high security mode, tcpwrapper, technical attack, technical controls, technical countermeasures, technical security controls, technical security policy, technical vulnerability, technological attack, technology, telecommuting, test bed, test bed configuration, test case generator, test case suite, test coverage, test cycle, test design, test environment, test execution, test item, test plan, test result analyzer, test suite, testability, tester, testing, theft of functionality, trapdoor, trojan horse, trust anchor, trust-file PKI, trusted channel, trusted computer system, trusted computing base, trusted distribution, trusted gateway, trusted path, trustworthy system, type accreditation, unit, unit testing, update access, user initialization, utility programs, validation, vendor, verification, verification and validation, version, virtual machine, virus scanner, virus signature, virus-detection tool, vulnerability, web server, wedged, workgroup computing,
- software architecture
- IncludedBy:software, software development,
- Related:module,
- software assurance
- IncludedBy:assurance, software,
- Related:function, lifecycle, vulnerability,
- software build
- IncludedBy:software, software development,
- Related:operation, system, version,
- software configuration management
- IncludedBy:software, software development,
- software development
- IncludedBy:software, software product,
- Includes:acceptance procedure, advanced development model, architectural design, change control and lifecycle management, closed security environment, compiler, configuration management, detailed design, development process, requirements, software architecture, software build, software configuration management, software development lifecycle, software development methodologies, software engineering, software enhancement, software lifecycle, software performance engineering, software quality assurance, software reengineering, software system test and evaluation process, software verification and validation, source code,
- Related:independent validation and verification, integrated test facility, integration test, metrics, process, software security, test, test case, test cycle, test design, test facility, white-box testing,
- software development lifecycle
- IncludedBy:software, software development,
- software development methodologies
- IncludedBy:development assurance, software, software development, system development methodologies,
- Includes:Gypsy verification environment, enhanced hierarchical development methodology, formal development methodology, hierarchical development methodology,
- Related:computer, program, system,
- software engineering
- IncludedBy:software, software development,
- Related:operation, system,
- software enhancement
- IncludedBy:software, software development,
- Related:function,
- software library
- IncludedBy:software,
- Related:archive, baseline, control,
- software lifecycle
- IncludedBy:software, software development, software product,
- Related:operation, requirements, test,
- software maintenance
- IncludedBy:software,
- software operation
- IncludedBy:operation, software,
- software performance engineering
- IncludedBy:software, software development,
- Related:object,
- software product
- IncludedBy:product, software,
- Includes:mass-market software, software development, software lifecycle, software requirement,
- Related:computer, program, users,
- software publisher certificate
- IncludedBy:certificate, software,
- software quality assurance
- IncludedBy:assurance, quality, software, software development,
- Related:confidence, process, requirements, system,
- software reengineering
- IncludedBy:software, software development,
- Related:process, subject, system,
- software release
- IncludedBy:software,
- Related:update, version,
- software reliability
- IncludedBy:reliability, software,
- Related:failure, fault, function, program, robustness, system,
- software repository
- IncludedBy:software,
- software requirement
- IncludedBy:requirements, software, software product,
- Includes:object, software security, testability,
- Related:users,
- software security
- IncludedBy:security, software, software requirement,
- Includes:security test and evaluation,
- Related:application, program, security software, software development, system,
- software system test and evaluation process
- IncludedBy:evaluation, process, software, software development, system, test,
- Includes:security test and evaluation,
- Related:baseline, function, interface, operation, requirements,
- software verification and validation
- IncludedBy:software, software development, validation, verification,
- software-based fault isolation
- IncludedBy:software,
- Related:access, control, trust,
- sole proprietorship
- sole source acquisition
- solenoid valve
- solicitation
- Related:information, response,
- sound group
- Related:requirements,
- sound masking system
- Related:threat,
- sound transmission class
- source authentication
- IncludedBy:authentication,
- Related:entity, identity,
- source code
- IncludedBy:code, software development,
- Includes:source code generator,
- Related:compiler, computer, object, program, software,
- source code generator
- IncludedBy:code, source code,
- Related:application, requirements, software,
- source data automation
- Related:process,
- source data entry
- Related:computer, system, version,
- source document
- Related:classified,
- source integrity
- IncludedBy:integrity,
- Related:confidence, information, trust,
- source program
- IncludedBy:program,
- Related:access, access control, computer, system, trust,
- source selection
- Related:evaluation, policy, process, requirements, system,
- spam
- IncludedBy:email, threat,
- Includes:spam filtering software, spamming,
- Related:association, denial-of-service, internet, message, object, program,
- spam filtering software
- IncludedBy:software, spam,
- Related:message, program,
- spammers
- IncludedBy:threat,
- Related:attack, information,
- spamming
- IncludedBy:spam,
- Related:message,
- spanning port
- special access office
- IncludedBy:access,
- special access program
- IncludedBy:access, program,
- Related:authority, control, critical, information, intelligence, operation, requirements, security clearance, threat,
- special access program facility
- IncludedBy:access, program,
- Related:classified, information, security,
- special access program/special access required
- IncludedBy:access,
- Related:authorized, requirements,
- special access programs central office
- IncludedBy:access,
- Related:security,
- special access programs coordination office
- IncludedBy:access,
- special access required programs oversight committee
- IncludedBy:access,
- Related:foreign, intelligence, security,
- special activity
- Related:foreign, intelligence, object,
- special background investigation
- Related:requirements, security,
- special character
- special information operations
- IncludedBy:information, operation,
- Related:process, requirements, risk, security,
- special intelligence
- IncludedBy:intelligence,
- special investigative inquiry
- Related:security,
- special program document control center
- Related:security,
- special program review group
- Related:access, object, requirements,
- special security center
- IncludedBy:security,
- Related:intelligence,
- special security officer
- IncludedBy:security,
- specialized boundary host
- IncludedBy:boundary,
- Related:security, users,
- specific SIO class
- specification
- Related:requirements, security, system,
- spillage
- Related:classified, information, security,
- split key
- IncludedBy:key,
- Related:cryptographic,
- split knowledge
- IncludedBy:key recovery,
- Related:authorized, control, cryptographic, information, key, module, security,
- sponsor
- Related:authorized, certificate, entity, evaluation, subject, test,
- sponsoring agency
- Related:access, classified, intelligence,
- spoof
- IncludedBy:threat consequence,
- Includes:DNS spoofing, address spoofing, anti-spoof, ip spoofing, spoofing attack,
- Related:access, access control, authentication, authorized, entity, firewall, impersonating, masquerading, mimicking, phishing, smurfing, system, users,
- spoofing
- Antonym:anti-spoof,
- IncludedBy:attack, masquerade,
- Includes:DNS spoofing, address spoofing, ip spoofing,
- Related:access, access control, authentication, authorized, computer, control, critical, hijack attack, identification, impersonation, information, process, resource, subject, system, trust, users,
- Synonym:mimicking,
- spoofing attack
- IncludedBy:attack, masquerade, spoof,
- spread
- spread spectrum
- Related:communications, information, telecommunications,
- spyware
- IncludedBy:malicious code,
- Related:code, identity theft, information, malicious, malware, privacy, software, system, users,
- spyware detection and removal utility
- Related:computer, identify, incident, program,
- SSO PIN
- IncludedBy:multilevel information systems security initiative,
- Related:Fortezza, access, authority, certification, control, function, identification, users,
- SSO-PIN ORA
- IncludedBy:multilevel information systems security initiative,
- Related:Fortezza, function, users,
- stakeholder
- Related:program,
- stand-alone automated information system
- Related:classified,
- stand-alone, shared system
- IncludedBy:modes of operation, system,
- Related:computer, users,
- stand-alone, single-user system
- IncludedBy:modes of operation, system, users,
- Related:computer,
- standalone system
- standard
- Includes:American National Standards Institute, American Standard Code for Information Interchange, British Standard 7799, Digital Signature Standard, Escrowed Encryption Standard, Federal Information Processing Standards, Federal Information Processing Standards Publication 140, Federal Standard 1027, International organization for standardization, Internet Standard, Internet Standards document, National Institute of Standards and Technology, Standard Security Label, Standards for Interoperable LAN/MAN Security, advanced encryption standard, data encryption standard, endorsed data encryption standard products list, extended industry standard architecture, industry standard architecture, information processing standard, international standards organization, interoperability standards/protocols, public-key cryptography standards, requirements for procedures and standards, secure hash standard, standard deviation, standard error of the mean, standard generalized markup language,
- Related:Abstract Syntax Notation One, Advanced Mobile Phone Service, Basic Encoding Rules, COTS software, Clipper chip, Commercial COMSEC Evaluation Program, Common Criteria for Information Technology Security, Computer Security Objects Register, Cryptographic Application Program Interface, DoD Information Technology Security Certification and Accreditation Process, EE, Elliptic Curve Digital Signature Algorithm, FIPS PUB 140-1, Federal Criteria Vol. I, Generic Security Service Application Program Interface, Generic Upper Layer Security, Green book, IEEE 802.10, IEEE P1363, IT Security Evaluation Criteria, IT Security Evaluation Methodology, ITU-T, Information Technology Security Evaluation Criteria, Integrated services digital network, Internet Architecture Board, Internet Engineering Steering Group, Internet Engineering Task Force, Internet Society, Internet Society Copyright, JTC1 Registration Authority, Law Enforcement Access Field, OSI architecture, Open Systems Interconnection Reference model, PC card, PCMCIA, PKCS #10, PKCS #11, PKCS #7, PKIX, POSIX, Post Office Protocol, version 3, Request for Comment, Rivest-Shamir-Adleman algorithm, Secure Data Exchange, Secure Electronic Transaction, TEMPEST, Transport Layer Security Protocol, Trusted Computer System Evaluation Criteria, Type III cryptography, X.400, X.500 Directory, acceptance inspection, accreditation, accreditation body, application program interface, assessment, audit, bandwidth, benchmark, center for information technology excellence, certificate, certificate chain, certificate chain validation, certificate request, certification authority, coefficient of variation, common criteria, communications protocol, compliance-based, computer architecture, conformance, consistency, country code, credentials, cryptographic module security policy, data authentication code, data authentication code vs. Data Authentication Code, data encryption algorithm, deliverable, development environment, dial-up capability, digital signature algorithm, dispersion, electronic data interchange, encryption, evaluation and validation scheme, evaluation authority, evaluation pass statement, extension, file transfer protocol, framing, incident, internet control message protocol, internet protocol, internet vs. Internet, judgment sample, key, key center, key distribution center, key recovery, key translation center, key-escrow system, leapfrog attack, legacy data, level of protection, media access control address, message authentication code vs. Message Authentication Code, network architecture, object identifier, octet, open system environment, open systems, open systems interconnection, operational environment, operational risk, operational risk exposure, origin authenticity, parameters, plug-in, preproduction model, pretty good privacy, privacy enhanced mail, private communication technology, protected communications, public law 100-235, public-key cryptography, public-key forward secrecy, public-key infrastructure, quality, random selection, rootkit, sas 70 report, secret-key cryptography, secure socket layer, security assertion markup language, security clearance, security program manager, security support programming interface, simple mail transfer protocol, simple network management protocol, smartcards, starting variable, stealth probe, stovepipe systems, system administrator, telnet, transmission control protocol, trust hierarchy, trust level, type 3 product, user data protocol, validation, vulnerability, wireless application protocol, wrap,
- standard deviation
- IncludedBy:standard,
- standard error of the mean
- IncludedBy:standard,
- standard generalized markup language
- IncludedBy:standard,
- Includes:extensible markup language, hypertext markup language, markup language,
- Related:automated information system, hypertext, wireless application protocol,
- standard operating procedure
- standard practice procedures
- Related:classified, requirements,
- Standard Security Label
- IncludedBy:security, standard,
- Standards for Interoperable LAN/MAN Security
- IncludedBy:security, standard,
- Related:key, key management, model, protocols,
- star (*) property
- HasPreferred:*-property,
- Star Trek attack
- IncludedBy:attack,
- Related:system,
- start-up KEK
- Related:encryption, key, network,
- starting variable
- Related:application, operation, standard,
- state
- Related:information,
- state delta verification system
- IncludedBy:system, verification,
- Related:code, confidence,
- state transition diagram
- Related:network,
- state variable
- Related:computer, resource, system,
- stateful inspection
- stateful packet filtering
- IncludedBy:firewall, packet filtering,
- Related:connection, control, information, process, proxy,
- stateful protocol analysis
- IncludedBy:analysis, protocols,
- Related:file, identify, process, profile,
- statement coverage
- Related:test,
- statement of reasons
- Related:security, subject,
- static analysis
- IncludedBy:analysis,
- Related:process, program, system,
- static binding
- IncludedBy:backup,
- Related:association, object,
- static key
- IncludedBy:key,
- statistic
- statistical estimate
- Related:evidence,
- statistical process control
- IncludedBy:control, process,
- Related:application, quality,
- status information
- IncludedBy:information,
- Related:cryptographic, cryptography, module, operation,
- status monitoring
- Related:security,
- steady-state
- stealth mode
- Related:interface, intrusion, intrusion detection,
- stealth probe
- IncludedBy:threat,
- Related:connection, intrusion, intrusion detection, network, protocols, standard,
- steganography
- Related:cryptography, message,
- storage channel
- HasPreferred:covert channel,
- storage object
- IncludedBy:object,
- Related:access, access control,
- store
- Related:access, authorized, operation,
- stovepipe systems
- IncludedBy:system,
- Related:computer, connection, function, standard,
- strata
- stratified random sample
- IncludedBy:random,
- Related:classified,
- stream cipher
- IncludedBy:cipher,
- Related:algorithm, encryption, function, key, process, property, random,
- strength of a requirement
- IncludedBy:evaluation, requirements,
- Related:attack, failure, function,
- strength of encryption
- HasPreferred:encryption strength,
- strength of function
- IncludedBy:TOE security functions, function, target of evaluation,
- Includes:SOF-basic, SOF-high, SOF-medium,
- Related:attack,
- strength of mechanisms
- IncludedBy:security, target of evaluation,
- Related:algorithm, assessment, attack, target,
- strengths, weaknesses, opportunities, threats
- IncludedBy:threat,
- Includes:SWOT analysis,
- Related:risk management,
- stress testing
- IncludedBy:security testing, test,
- Related:black-box testing, boundary value, program, requirements, resource, subject, system,
- stretch goal
- Related:process, quality,
- striped core
- strong authentication
- IncludedBy:authentication,
- Related:certificate, cryptographic, cryptography, entity, identity, information, key, process, public-key, public-key infrastructure,
- structural testing
- IncludedBy:security testing, test,
- Related:function, program, system,
- structured query language
- Related:automated information system,
- sub-function
- IncludedBy:function,
- Related:information, operation, system, version,
- sub-registration authority
- IncludedBy:authority, registration,
- subassembly
- Related:function,
- subclass
- subcommittee on Automated Information System security
- IncludedBy:National Security Decision Directive 145, computer security, information, system,
- Includes:Automated Information System security,
- Related:authorized, communications, establishment, telecommunications,
- Subcommittee on Information Systems Security
- IncludedBy:computer security, information, system,
- subcommittee on telecommunications security
- IncludedBy:National Security Decision Directive 145, communications, communications security, telecommunications,
- Related:authorized, computer security, establishment, information, system,
- subcontract
- Related:access, classified, requirements,
- subcontractor
- subject
- IncludedBy:Bell-LaPadula security model, TCB subset, access, candidate TCB subset, component reference monitor, covert storage channel, declassification of AIS storage media, exploitable channel, granularity of a requirement, internal security controls, isolation, least privilege, list-oriented, network reference monitor, object reuse, owner, permissions, protection-critical portions of the TCB, read, read access, reference monitor, reference monitor concept, reference validation mechanism, resource encapsulation, restricted area, scope of a requirement, secure state, secure subsystem, security attribute, security-relevant event, simple security condition, simple security property, technical policy, ticket-oriented, transaction, write,
- Includes:domain, evidence subject, internal subject, process, subject matter expert, subject security level, trusted subject,
- Related:Biba Integrity model, Biba model, MISSI user, PIV issuer, RA domains, SAML authentication assertion, TSF scope of control, X.500 Directory, X.509 attribute certificate, X.509 certificate revocation list, X.509 public-key certificate, access control lists, access mode, anti-spoof, attribute certificate, authentication, authenticity, authorized, automated security monitoring, batch process, bind, category, central office of record, certificate, certificate holder, certificate owner, certificate rekey, certificate renewal, certificate update, certificate user, certification path, certify, challenge and reply authentication, ciphertext-only attack, classification guide, collateral information, component, compromised key list, confidentiality, confinement property, contract, controlled area/compound, controlled building, credit check, data integrity, delegation of disclosure authority letter, discretionary access control, distinguished name, end entity, entity, exception, extension, file series, financial disclosure, flow, hash code, hash function, identity, identity theft, identity-based security policy, information, key, key management infrastructure, lead, letter of intent, limited background investigation, local agency check, mandatory access control, minimum background investigation, model, national security system, network, non-repudiation service, object, operation, pass/fail, personality label, personnel security exceptions, personnel security questionnaire, phased periodic reinvestigation, public domain software, public-key, public-key infrastructure, records, references, registration, registration authority, restructuring, reverse engineering, role-based access control, root, root certificate, rule-based security policy, security domain, security label, security level, self-signed certificate, sensitivity label, software reengineering, sponsor, spoofing, statement of reasons, stress testing, system, system entity, target of evaluation, type 1 products, users, validity period, vulnerability,
- Uses:object,
- subject matter expert
- IncludedBy:subject,
- subject security level
- IncludedBy:security, subject,
- Includes:object,
- Related:access, access control, users,
- subnetwork
- IncludedBy:network,
- Related:communications, interface, protocols, system,
- subordinate certification authority
- IncludedBy:authority, certification, multilevel information systems security initiative, public-key infrastructure,
- Related:certificate, key, public-key, role, users,
- subordinate distinguished name
- IncludedBy:distinguished name,
- subprocess
- IncludedBy:process,
- subscriber
- Related:authentication,
- subscriber station
- subset-domain
- IncludedBy:domain, trusted computing base,
- Related:access, access control, evaluation, system,
- subsidiary
- substantial issue information
- IncludedBy:personnel security - issue information,
- substitution
- IncludedBy:threat consequence,
- Related:authorized, entity,
- subsystem
- IncludedBy:system,
- Related:function, information, software, technology,
- subtest
- IncludedBy:test,
- subversion
- IncludedBy:attack, version,
- Related:intrusion, operation,
- suitability of functionality
- IncludedBy:function, target of evaluation,
- Related:assessment, security, security target, target, threat,
- Suite A
- Related:critical,
- Suite B
- Related:security,
- superclass
- superencryption
- IncludedBy:encryption,
- Related:cipher, communications, information, message, operation, process,
- superior certification authority
- IncludedBy:certification,
- supersession
- Related:communications security,
- superuser
- IncludedBy:users,
- Related:authorized, control, file, network, process, system,
- supervisor state
- HasPreferred:executive state,
- supervisory control
- IncludedBy:control,
- Related:computer, program,
- supervisory control and data acquisition
- IncludedBy:control, control systems,
- Related:computer, integrity, operation, process, system,
- supplementary character
- PreferredFor:supplementary check character,
- supplementary check character
- HasPreferred:supplementary character,
- supply chain
- supply chain attack
- IncludedBy:attack,
- Related:software,
- support software
- IncludedBy:software,
- Related:application, computer, function, operation, system,
- supporting information assurance infrastructures
- IncludedBy:assurance,
- suppression measure
- Related:compromise, emanation, emanations security,
- surface warfare
- IncludedBy:warfare,
- surreptitious entry
- IncludedBy:threat,
- Related:authorized, evidence,
- surrogate access
- IncludedBy:access, discretionary access control,
- Related:control,
- survivability
- Related:attack, operation, system,
- suspended state
- IncludedBy:key lifecycle state,
- Related:key, lifecycle,
- suspicious activity report
- Related:assurance, file, fraud, threat,
- suspicious contact
- IncludedBy:threat,
- Related:access, authorized, classified, compromise, illegal, intelligence, target,
- suspicious event
- IncludedBy:incident,
- Related:computer, computer security, security, security incident, validate,
- switched multi-megabit data service
- SWOT analysis
- IncludedBy:analysis, strengths, weaknesses, opportunities, threats,
- Related:identify,
- syllabary
- Related:code,
- symbolic execution
- Related:analysis, program, software,
- symmetric algorithm
- IncludedBy:algorithm, encryption, key,
- Includes:International Data Encryption Algorithm, Rivest Cipher 2, Rivest Cipher 4, Skipjack, data encryption standard, secret key,
- symmetric cryptographic technique
- IncludedBy:cryptographic,
- Related:encryption, key, symmetric cryptography,
- symmetric cryptography
- IncludedBy:cryptography,
- Includes:Blowfish, CAST, advanced encryption standard, data encryption algorithm,
- Related:algorithm, confidentiality, digital signature, encryption, key, key management, message, public-key, risk, signature, symmetric cryptographic technique, symmetric encipherment algorithm, symmetric encryption algorithm, verification,
- symmetric encipherment algorithm
- IncludedBy:algorithm, cipher, encipherment,
- Related:key, symmetric cryptography,
- symmetric encryption algorithm
- IncludedBy:algorithm, encryption,
- Related:cryptographic, key, process, symmetric cryptography,
- symmetric key
- IncludedBy:key,
- Related:algorithm, authentication, code, cryptographic, encryption, message, operation,
- symmetric measure of association
- IncludedBy:association,
- SYN flood
- IncludedBy:synchronous flood,
- Related:connection, denial-of-service, protocols,
- synchronous crypto-operation
- IncludedBy:cryptography, operation,
- Related:system,
- synchronous flood
- IncludedBy:attack,
- Includes:SYN flood,
- Related:code, network, system,
- synchronous transmission
- Related:network,
- syntax
- syntax testing
- IncludedBy:security testing, test,
- Related:system,
- synthetic benchmarks
- Related:program, test,
- system
- Includes:Automated Information System security, COMSEC Material Control System, COMSEC system data, Defense Information System Network, DoD Trusted Computer System Evaluation Criteria, Information Systems Security products and services catalogue, National Communications System, National Security Telecommunications and Information Systems Security Advisory/Information Memorandum, National Security Telecommunications and Information Systems Security Committee, National Security Telecommunications and Information Systems Security Directive, National Security Telecommunications and Information Systems Security Instruction, National Security Telecommunications and Information Systems Security Policy, National Telecommunications and Information Systems Security Advisory Memoranda/Instructions, National Telecommunications and Information Systems Security Directive, National Telecommunications and Information Systems Security Instruction, National Telecommunications and Information Systems Security Policy, Network File System, Open Systems Interconnection Reference model, Secure Data Network System, Subcommittee on Information Systems Security, Terminal Access Controller Access Control System, The Exponential Encryption System, Trusted Computer System Evaluation Criteria, Trusted Systems Interoperability Group, application system, asymmetric encipherment system, asymmetric signature system, authentication system, auto-manual system, automated data processing system, automated information system, automated key management system, automated office support systems, autonomous system, biometric system, bulletin board services (systems), business disruption and system failures, certified information systems security professional, check character system, clean system, coded switch system, computer oracle and password system, computer security subsystem, concealment system, control systems, critical system, critical system files, cryptographic key management system, cryptographic system, cryptosystem analysis, cryptosystem evaluation, cryptosystem review, cryptosystem survey, database management system, decision support systems, defense communications system, defense message system, distributed control system, domain name system, electrical power systems, electronic document management system, electronic funds transfer system, electronic generation, accounting, and distribution system, electronic key management system, elliptic curve cryptosystem, embedded cryptographic system, embedded system, end system, evaluated system, executive information systems, external system exposure, federal telecommunications system, fire suppression system, general support system, general-purpose system, generally accepted system security principles, global command and control system, global positioning system, hardware and system software maintenance, high-impact system, host-based intrusion prevention system, identity management systems, imaging system, improved emergency message automatic transmission system, information system, information system security officer, information systems audit and control association, information systems audit and control foundation, information systems security, information systems security association, information systems security engineering, information systems security equipment modification, information systems security manager, information systems security officer, information systems security product, information systems/technology, information technology system, internal system exposure, intrusion detection system load balancer, intrusion detection systems, intrusion prevention system, kernelized secure operating system, key management system, key management system Agent, key-escrow system, legacy systems, lock-and-key protection system, logical system definition, low-impact system, major information system, manual cryptosystem, message handling system, mission critical system, moderate-impact system, multilevel information systems security initiative, national security system, national telecommunications and information system security directives, network behavior analysis system, network system, network-based intrusion prevention system, off-line cryptosystem, on-line cryptosystem, on-line system, one-time cryptosystem, open system environment, open system interconnection, open system interconnection model, open systems, open systems interconnection, open systems security, operating system, operating system fingerprinting, password system, positive enable system, privacy system, program automated information system security incident support team, protected distribution systems, protected wireline distribution system, protective distribution system, public-key system, real-time system, secure operating system, secure subsystem, signaling system 7, signature system, software system test and evaluation process, stand-alone, shared system, stand-alone, single-user system, state delta verification system, stovepipe systems, subcommittee on Automated Information System security, subsystem, system accreditation, system acquisition plan, system administrator, system administrator privileges, system and data integrity, system assets, system boundary, system design review, system development, system development and acquisition, system development lifecycle, system development methodologies, system entity, system entry, system files, system high, system high mode, system indicator, system integrity, system integrity service, system interconnection, system life, system lifecycle, system low, system owner, system parameter, system profile, system requirement, system resources, system retention/backup, system safety, system security, system security authorization agreement, system security engineering, system security management, system security officer, system security plan, system security policy, system software, system testing, system under test, system verification, system-high security mode, systematic selection with a random start, systems administrator, systems engineering, systems security steering group, systems software, tri-service tactical communications system, trusted computer system, trusted computing system, trusted operating system, trustworthy system, user interface system, water supply system, weapons system, wireless intrusion detection and prevention system,
- Related:Advanced Mobile Phone Service, BLACK, Bell-LaPadula security model, Biba Integrity model, British Standard 7799, C2-attack, C2-protect, COMSEC aid, COMSEC modification, COMSEC module, COMSEC profile, COMSEC survey, Commercial COMSEC Evaluation Program, Common Criteria for Information Technology Security, DNS spoofing, Defense Information Infrastructure, Defensive Information Operations, Directory Access Protocol, DoD Information Technology Security Certification and Accreditation Process, Escrowed Encryption Standard, FIPS PUB 140-1, Federal Criteria for Information Technology Security, Federal Information Processing Standards, Generic Security Service Application Program Interface, Green book, IA architecture, IA-enabled information technlogogy product, IS related risk, IS security architecture, IT default file protection parameters, IT resources, IT security, IT security achitecture, IT security database, IT security incident, IT security plan, IT security policy, IT security product, IT security support functions, IT-related risk, ITU-T, Identification Protocol, Integrated services digital network, International Traffic in Arms Regulations, International organization for standardization, Internet Corporation for Assigned Names and Numbers, Internet worm, Intrusion Detection In Our Time, Java, MISSI user, Message Security Protocol, National Computer Security Center, National Security Agency, National Security Decision Directive 145, OSI architecture, Orange book, PHF, PKIX, POSIX, RED, RED team, RED/BLACK concept, RED/BLACK separation, Red book, SATAN, SCADA server, Star Trek attack, TEMPEST, TSEC nomenclature, Tiger, Tripwire, USENET, X.400, X.500 Directory, Yellow book, acceptable risk, acceptable use policy, acceptance criteria, acceptance inspection, acceptance procedure, acceptance testing, access, access control, access control center, access control lists, access control mechanisms, access control service, access mode, access with limited privileges, accessibility, accountability, accounting legend code, accreditation, accreditation boundary, accreditation disapproval, accreditation package, accreditation phase, accreditation range, acquirer, acquisition strategy, active security testing, add-on security, address spoofing, adequate security, administrative access, adversary, alignment, allowed traffic, anomaly detection, anomaly detection model, anonymous, anonymous and guest login, anonymous login, antivirus software, antivirus tools, application, application controls, application gateway firewall, application level gateway, application program interface, application programming interface, application server attack, application software, application-level firewall, approval/accreditation, architecture, archive, assessment, association, assurance, asymmetric cipher, asymmetric cryptographic technique, asymmetric encryption algorithm, asynchronous attacks, attack, attackers, audit, audit data, audit service, audit trail, audit/review, auditing tool, authenticate, authentication, authentication code, authenticity, authorization, authorization to process, authorize processing, authorized, authorizing official, automated security monitoring, availability, availability service, back up vs. backup, backdoor, backup, backup procedures, banking and finance, banner, baseline controls, bastion host, benchmark, best practices, beyond A1, bias, bit error rate, blue box devices, bomb, boot sector virus, bot-network operators, boundary, boundary host, boundary value, breach, break, browse access protection, buffer overflow, business process reengineering, call back, call back security, capability, cascading, cell, centrally-administered network, certificate, certificate holder, certificate owner, certificate user, certification, certification agent or certifier, certification authority, certification authority workstation, certification phase, certification practice statement, certifier, challenge/response, channel, channel scanning, checksum, cipher, circuit switching, class 2, 3, 4, or 5, clearing, client, client server, closed security environment, code, code book, code group, code vocabulary, cold site, color change, common criteria, common data security, communications, communications profile, communications security, compartmented mode, compensating security controls, compiled viruses, compliance-based, component, compromise, compromised key list, compromising emanations, computer, computer architecture, computer emergency response team, computer emergency response teams' coordination center, computer fraud, computer intrusion, computer network, computer network defense, computer network exploitation, computer operations, audit, and security technology, computer security, computer security incident, computer security intrusion, computing environment, computing security methods, concept of operations, confidentiality, configuration, configuration control, configuration identification, configuration management, consistency, console, console logon, console logs, consumers, contingency plan, contingency planning, control, control server, controlled interface, controlled security mode, controlled sharing, controlled variable, cookies, correctness, correctness proof, corruption, cost-risk analysis, countermeasures, covert channel, covert timing channel, crack, crack root, cracker, cracking, crash, credentials, criminal groups, critical, critical elements, critical infrastructures, criticality, criticality assessment, criticality/sensitivity, cryptanalysis, crypto-security, cryptographic component, cryptonet, cryptoperiod, cybersecurity, cyberspace, daemon, data aggregation, data communications, data confidentiality, data driven attack, data integrity service, data origin authentication service, data reengineering, data transfer device, decipher, dedicated mode, dedicated security mode, default account, default classification, default file protection, defense-in-depth, degausser, degausser products list, deliverable, denial-of-service, descriptive top-level specification, designated approval authority, designated approving authority, designer, developer, dial back, dial-up capability, dial-up line, dictionary attack, digital signature, digital telephony, directory vs. Directory, disaster recovery plan, discrete event simulation, discretionary access control, disruption, distributed computing environment, distributed database, distributed denial-of-service, distributed processing, disturbance, documentation, domain, domain name, dual control, due care, dynamic analysis, economy of mechanism, electromagnetic compatibility, electromagnetic interference, electronic authentication, email, emanation, emanations analysis, emanations security, embedded computer, embedded cryptography, emergency services, emergency shutdown controls, emissions security, encipher, encode, encryption, encryption strength, end entity, end-to-end encryption, end-to-end security, end-user, endorsed tools list, entrapment, entry-level certification, environment, error, evaluated products list, evaluation, evaluation and validation scheme, evaluation assurance level, evaluation criteria, evaluator, event, executive state, expert review team, exploit, exploit tools, exploitable channel, exploitation, exposures, extensibility, external it entity, facility manager, fail safe, fail soft, failure, failure access, failure control, fallback procedures, false acceptance, false acceptance rate, false negative, false positive, false rejection, false rejection rate, fault, fault tolerance, fault tolerant, federated identity, federation, fedwire, fetch protection, field site, file protection, file transfer, firewall, fishbowl, flaw, flaw hypothesis methodology, flooding, flow, fork bomb, formal development methodology, formal method, formal security policy model, formal specification, formal top-level specification, formal verification, forward engineering, frame relay, framework, front-end security filter, full accreditation, full disk encryption, function, functional testing, functionality class, gas and oil production, storage and transportation, gateway, general controls, global information grid, global information infrastructure, global network information environment, global requirements, graduated security, guard, guessing entropy, hackers, hacking, hardware, hardware or software error, hierarchical decomposition, hijacking, hoax, honeypot, host, host-based security, hot site, human error, hypertext markup language, identification, identification and authentication, identity verification, identity-based security policy, impact, impersonation, incapacitation, incident, incident response capability, incomplete parameter checking, independent assessment, independent review and evaluation, individual accountability, individual electronic accountability, information, information assurance, information assurance manager, information assurance officer, information assurance product, information category, information engineering, information environment, information flow, information flow control, information operations, information security, information security testing, information superhighway, information technology, information warfare, infrastructure, insider, instrument, instrumentation, integrity, interconnection security agreements, interface, interface testing, interference, interim accreditation, interim accreditation action plan, interim approval to operate, interim approval to test, internal security controls, internal subject, internet, internet protocol, internet protocol security, internet vs. Internet, internetwork, interoperability, interoperate, intruder, intrusion, intrusion detection, intrusion detection and prevention, intrusion detection tools, intrusion prevention, ip spoofing, isolation, joint task force-computer network defense, kerberos, key center, key management, key management/exchange, key pair, key stream, key-escrow, killer packets, lattice model, leakage, least privilege, level of protection, levels of concern, lifecycle, lifecycle management, link encryption, list-oriented, local-area network, logged in, logging, logic bombs, logical access, login, login prompt, loophole, machine controller, mailbomb, maintenance, major application, malicious code, malicious logic, malware, management controls, management server, mandatory access control, markup language, masquerade, masquerade attack, masquerading, mass mailing worm, mechanisms, media protection, memorandum of understanding, memory resident, message indicator, mid-level certification, middleware, min-entropy, misappropriation, mission critical, misuse, misuse detection model, mobile code, mockingbird, mode of operation, model, modes of operation, multicast, multilevel mode, multilevel secure, multilevel security, multilevel security mode, multipurpose internet mail extensions, multiuser mode of operation, mutual suspicion, mutually suspicious, nak attack, national computer security assessment program, national information assurance partnership, national security information, natural disaster, network, network component, network device, network front-end, network management software, network security, network security officer, network service worm, network services, network sponsor, network trusted computing base, network worm, non-technical countermeasure, normal operation, object, obstruction, octet, off-line attack, one-part code, one-time pad, one-time passwords, one-time tape, open security, open security environment, operation, operational controls, operational integrity, operational risk, operational testing, operations manager, operations security, organizational certificate, overload, overt channel, partitioned security mode, passive, passive fingerprinting, passive security testing, passive threat, passphrase, password cracking, password-locked screensaver, passwords, payload, payment gateway, peer entity authentication service, penetration, penetration signature, penetration study, penetration test, penetration testing, people, per-call key, performance measurement, periods processing, personal communications network, personal identification number, personal security environment, personnel security, phreaker, phreaking, physical access control, physical and environmental protection, physical controls, physical destruction, physical security, piggyback, piggyback attack, piggyback entry, ping of death, platform, plug-in, polymorphism, port scanner, port scanning, portability, positive control material, post-accreditation phase, pre-certification phase, preferred products list, pressure sensor, pretty good privacy, principal accrediting authority, privacy, privacy impact assessment, private communication technology, private decipherment transformation, private key, privilege, privileged, privileged instructions, privileged user, probe, procedural controls, procedural security, process controller, product, product rationale, program manager, programmable logic controller, protection philosophy, protection profile, protection ring, protection-critical portions of the TCB, protocols, prototyping, prove a correspondence, proxy, proxy server, pseudo-flaw, public encipherment transformation, public law 100-235, public-key, public-key certificate, public-key cryptography, public-key cryptography standards, public-key forward secrecy, public-key infrastructure, purge, qualitative risk assessment, quality, quality assurance, quality control, quality function deployment, reciprocal agreement, records, recovery procedures, redundancy, reference monitor, reference validation mechanism, registration, rekey, reliability, relying party, remediation, remote access, remote access software, remote administration tool, remote diagnostics, remote login, remote terminal emulation, repository, repudiation, requirements, reserve requirements, residual risk, resource, response time, restructuring, retro-virus, reverse engineering, review board, review techniques, risk, risk analysis, risk assessment, risk index, risk management, robustness, role, role-based access control, rolling cost forecasting technique, root, rootkit, rules based detection, rules of behavior, ruleset, safety, safety-critical software, salt, sanitize, scalability, scanning, scavenging, screened subnet firewall, secret, sector coordinator, sector liaison, secure configuration management, secure socket layer, secure state, security, security architecture, security audit, security audit trail, security breach, security category, security certification level, security clearance, security compromise, security controls, security domain, security environment, security evaluation, security event, security features, security features users guide, security filter, security flaw, security flow analysis, security gateway, security goals, security incident, security intrusion, security kernel, security label, security management infrastructure, security measures, security mechanism, security model, security net control station, security objectives, security officer, security parameters index, security perimeter, security plan, security policy, security policy model, security purpose, security range, security requirements, security requirements baseline, security safeguards, security service, security specifications, security strength, security target, security test & evaluation, security test and evaluation, security testing, security violation, security-relevant event, sensitive compartmented information, sensitive information, sensor, sensor or monitor, separation of duties, server, signaling, signals analysis, signature, significant change, single sign-on, single-level device, site accreditation, site certification, social engineering, software, software build, software development methodologies, software engineering, software quality assurance, software reengineering, software reliability, software security, source data entry, source program, source selection, specification, spoof, spoofing, spyware, state variable, static analysis, stress testing, structural testing, sub-function, subcommittee on telecommunications security, subject, subnetwork, subset-domain, superuser, supervisory control and data acquisition, support software, survivability, synchronous crypto-operation, synchronous flood, syntax testing, tamper, tampering, target identification and analysis techniques, target of evaluation, technical attack, technical controls, technical countermeasures, technical policy, technical security policy, technical vulnerability, technological attack, technology, technology area, telecommunications, teleprocessing, telnet, temperature sensor, terminal identification, test, test bed, test bed configuration, test cycle, test facility, test key, test report, testability, testing, theft of functionality, think time, thrashing, threat, threat action, threat agent, threat analysis, threat assessment, threat monitoring, ticket, ticket-oriented, tiger team, tokens, top-level certification, top-level specification, total risk, trace packet, traffic analysis, traffic-flow security, transfer time, transmission control protocol, transportation, trapdoor, trespass, trojan horse, trust, trust level, trusted computing base, trusted gateway, trusted identification forwarding, trusted network interpretation, trusted path, trusted process, trusted recovery, tuning, tunneling attack, tunneling router, two-part code, two-person control, two-person integrity, type 1 products, type 2 product, type 3 product, type accreditation, type certification, unauthorized access, under sea warfare, untrusted process, updating, user id, user identifier, user partnership program, user representative, users, usurpation, utility programs, validate vs. verify, validation, value-added network, valve, vendor, verification, verification and validation, verification procedure refinements, violation of permissions, virtual machine, virtual private network, virus, vulnerability, vulnerability analysis, vulnerability assessment, vulnerability audit, war dialer, warehouse attack, web browser cache, wedged, wireless device, wiretapping, work factor, workgroup computing, workstation, world wide web, worm, zombie,
- system accreditation
- IncludedBy:accreditation, system,
- Related:application, operation,
- system acquisition plan
- IncludedBy:system,
- system administrator
- IncludedBy:system,
- Related:assurance, audit, backup, control, information assurance officer, operation, policy, requirements, security, standard, users,
- system administrator privileges
- IncludedBy:system,
- Related:file,
- system and data integrity
- IncludedBy:integrity, system,
- Related:control, operation, security, software,
- system assets
- IncludedBy:system,
- Related:communications, resource, software,
- system boundary
- IncludedBy:boundary, system,
- system design review
- IncludedBy:system,
- system development
- IncludedBy:system,
- Related:analysis,
- system development and acquisition
- IncludedBy:system,
- Related:control, security,
- system development lifecycle
- IncludedBy:development, system,
- Related:computer, security testing, test,
- system development methodologies
- IncludedBy:system,
- Includes:software development methodologies,
- Related:analysis, software,
- system entity
- IncludedBy:entity, system,
- Related:authentication, information, object, process, role, subject,
- system entry
- IncludedBy:access control, system,
- Related:access, authentication,
- system files
- IncludedBy:file, system,
- Related:computer, function, security, users,
- system high
- Antonym:system low,
- IncludedBy:modes of operation, system, system-high security mode,
- Related:security,
- system high mode
- IncludedBy:system,
- Related:access, access control, computer security, information, operation, process, program, security, users,
- system indicator
- IncludedBy:system,
- Related:cryptographic system, cryptography, encryption, identify, key, message,
- system integrity
- IncludedBy:integrity, system,
- Related:authorized, computer, function, operation, quality, resource, users,
- system integrity service
- IncludedBy:integrity, system,
- Related:authorized, resource, security,
- system interconnection
- IncludedBy:connection, system,
- Related:control, operation, requirements, security,
- system life
- IncludedBy:system,
- Related:resource, software,
- system lifecycle
- IncludedBy:system,
- Related:computer,
- system low
- Antonym:system high,
- IncludedBy:modes of operation, system,
- Related:information, operation, process, resource, security, software,
- system of records
- Related:control,
- system owner
- IncludedBy:owner, system,
- Related:development, operation, users,
- system parameter
- IncludedBy:system,
- Related:computer, property,
- system profile
- IncludedBy:file, profile, system,
- Related:security,
- system requirement
- IncludedBy:requirements, system,
- Related:users,
- system resources
- IncludedBy:resource, system,
- Related:access, access control, automated information system, file, program, router, users,
- system retention/backup
- IncludedBy:availability, backup, system,
- Related:critical, information, process, resource, software,
- system safety
- IncludedBy:system,
- Related:damage, software,
- system security
- IncludedBy:information systems security, system,
- Related:information,
- system security authorization agreement
- IncludedBy:authorization, requirements, security, system,
- Includes:system security plan,
- Related:connection, countermeasures, identify, operation, program, risk, threat, vulnerability,
- system security engineering
- IncludedBy:information systems security, system,
- Related:information,
- system security management
- IncludedBy:security, system,
- system security officer
- IncludedBy:officer, security, system,
- Includes:information system security officer,
- Related:audit, authority, authorized, computer, function, information, owner, policy, program, role, users,
- system security plan
- IncludedBy:system, system security authorization agreement,
- Related:control, management, privacy, risk,
- system security policy
- IncludedBy:policy, security policy, system,
- Related:information, resource,
- system software
- IncludedBy:software, system,
- Related:access, access control, application, computer, control, file, operation, program, security,
- system testing
- IncludedBy:security testing, system, test,
- Related:identify, recovery,
- system under test
- IncludedBy:system, test,
- system verification
- IncludedBy:system, verification,
- system-high security mode
- IncludedBy:modes of operation, multilevel security mode, system,
- Includes:system high,
- Related:access, access control, accreditation, authorization, authorized, classification levels, classified, dedicated security mode, information, operation, policy, process, software, trust, users,
- system-specific security control
- IncludedBy:control, security,
- systematic declassification review
- Related:classified,
- systematic selection with a random start
- IncludedBy:random, system,
- systems administrator
- IncludedBy:system,
- systems engineering
- IncludedBy:system,
- Related:application, operation, process, test,
- systems security steering group
- IncludedBy:security, system,
- Related:communications, communications security, computer security, information, intelligence, policy, telecommunications,
- systems software
- IncludedBy:software, system,
- Related:application, communications, computer, control, process, program, update,
- T-1 line
- tactical approval to operate
- Related:security,
- tactical data
- tactical edge
- Related:availability, risk, threat, users,
- tactical sensitive compartmented information facility
- tactical special access program facility
- IncludedBy:access,
- tactical terminal
- tactical trunk encryption device
- IncludedBy:encryption,
- tailored security control baseline
- IncludedBy:control, security,
- tailoring (assessment procedures)
- Related:requirements,
- tailoring
- Related:control, security,
- tamper
- IncludedBy:encryption, security, threat consequence,
- Includes:anti-tamper, anti-tamper executive agent, tamper resisting, tampering,
- Related:Clipper chip, Federal Standard 1027, TCB subset, authorized, computer security, control, cryptographic, denial-of-service, function, information, operation, personal security environment, protective technologies, quadrant, reference monitor, reference validation mechanism, signed applet, smartcards, system, trusted foundry, trusted platform module chip,
- tamper resisting
- IncludedBy:tamper,
- Related:authorized, technology,
- tampering
- IncludedBy:attack, tamper,
- Related:authorized, function, system,
- target
- Includes:security target, target identification and analysis techniques, target of evaluation, target vulnerability validation techniques,
- Related:Defense Travel Briefing, European Information Technology Security Evaluation Criteria, Office of Foreign Assets Control, TOE security policy, acceptance procedure, account aggregation, active security testing, administration documentation, administrator, advanced persistent threats, adversary, advisory, architectural design, assurance, assurance level, attack, attribute-based access control, automated security incident measurement, binding of functionality, component, computer network exploitation, configuration, configuration control, construction, controlled information, correctness, counterintelligence assessment, critical mechanism, cross site scripting, deliverable, deliverables list, delivery, detailed design, developer, development environment, development process, documentation, ease of use, effectiveness, electronic warfare support, end-user, evaluation, evaluation assurance, evasion, external it entity, functionality class, implementation, intrusion detection systems, intrusion prevention system, message passing, network sniffing, object, operating procedure, operating system fingerprinting, operation, operational documentation, operational environment, pagejacking, passive security testing, penetration testing, production, programming languages and compilers, protection profile, proximity sensor, rating, reference monitor, requirements, risk, scenario, screen scraping, secure copy, security enforcing, security environment threat list, security functions, security objectives, security relevant, social engineering, strength of mechanisms, suitability of functionality, suspicious contact, technical threat analysis, threat, threat source, tool, trusted path, uniform resource identifier, user documentation, vulnerability, vulnerability assessment,
- target identification and analysis techniques
- IncludedBy:analysis, identification, target,
- Related:application, information, information security, security, security testing, system, test, vulnerability,
- target of evaluation
- IncludedBy:evaluation, target, trusted computing base,
- Includes:European Information Technology Security Evaluation Criteria, IT security certification, SOF-basic, SOF-high, SOF-medium, TOE resource, TOE security functions, TOE security functions interface, TOE security policy, TOE security policy model, TSF data, TSF scope of control, acceptance procedure, administration documentation, administrator, architectural design, asset, assurance, binding of functionality, component, configuration, configuration control, connectivity, construction, construction of TOE requirements, critical mechanism, deliverables list, delivery, detailed design, developer, development environment, development process, documentation, ease of use, end-user, external it entity, formal model of security policy, functionality, functionality class, human user, implementation, inter-TSF transfers, internal TOE transfer, internal communication channel, operating procedure, operation, operational documentation, operational environment, penetration testing, production, programming languages and compilers, reference monitor, requirements, requirements for procedures and standards, resource, role, security enforcing, security functions, security objectives, security relevant, security target, strength of function, strength of mechanisms, suitability of functionality, tool, transfers outside TSF control, user documentation, vulnerability, vulnerability assessment,
- Related:criteria, security, subject, system, users,
- target vulnerability validation techniques
- IncludedBy:target, validation, vulnerability,
- Related:access, analysis, identification, information, information security, passwords, security, security testing, test,
- task
- TCB subset
- IncludedBy:trusted computing base,
- Includes:object, subject,
- Related:access, access control, analysis, control, policy, software, tamper, test,
- tcpwrapper
- IncludedBy:security software,
- Related:access, access control, authorized, network, software,
- tear line
- Related:classified, foreign, intelligence,
- technical attack
- IncludedBy:attack,
- Related:software, system, users,
- technical controls
- IncludedBy:control,
- Related:application, countermeasures, information, security, security controls, software, system,
- technical countermeasures
- IncludedBy:countermeasures, security,
- Related:access, audit, authentication, information, information security, network, process, software, system,
- technical data
- Related:classified,
- technical non-repudiation
- Related:security,
- technical policy
- IncludedBy:access control, policy,
- Includes:object, subject,
- Related:access, computer, system, trust,
- technical reference model
- technical review board
- technical security
- IncludedBy:security,
- Related:foreign,
- technical security controls
- IncludedBy:control, security,
- Related:software,
- technical security policy
- IncludedBy:policy, security policy,
- Includes:object,
- Related:control, information, process, resource, software, system, threat,
- technical surveillance countermeasures
- IncludedBy:countermeasures,
- Related:security,
- technical surveillance countermeasures inspection
- IncludedBy:countermeasures,
- Related:security,
- technical surveillance countermeasures surveys and evaluations
- IncludedBy:countermeasures, evaluation,
- Related:security,
- technical threat analysis
- IncludedBy:analysis, threat,
- Related:intelligence, target,
- technical vulnerability
- IncludedBy:vulnerability,
- Related:computer, damage, exploit, owner, process, risk, software, system, users,
- technical vulnerability information
- IncludedBy:information, vulnerability,
- Related:code,
- technological attack
- IncludedBy:attack,
- Related:access, access control, control, software, system, users,
- technology
- Includes:Common Criteria for Information Technology Security, Common Criteria for Information Technology Security Evaluation, DoD Information Technology Security Certification and Accreditation Process, European Information Technology Security Evaluation Criteria, Federal Criteria for Information Technology Security, IA-enabled information technology product, Information Technology Security Evaluation Criteria, National Institute of Standards and Technology, center for information technology excellence, computer operations, audit, and security technology, control objectives for information and related technology, information systems/technology, information technology, information technology system, private communication technology, push technology, technology area, technology gap, wireless technology,
- Related:Defensive Information Operations, Digital Signature Standard, Federal Criteria Vol. I, Federal Information Processing Standards, Guidelines and Recommendations for Security Incident Processing, IA-enabled information technlogogy product, IT-related risk, International Traffic in Arms Regulations, International organization for standardization, Internet Engineering Task Force, PCMCIA, Scope of Accreditation, access, access control, antivirus tools, approved technologies list, archive, assurance, asynchronous transfer mode, beyond A1, broadband network, cellular transmission, chief information agency officer, chief information officer, code division multiple access, collaborative computing, common criteria, common criteria version 1.0, common criteria version 2.0, computer related crime, container, control, correctness, countermeasures, criteria, cyberattack, cyberspace, data encryption standard, defense-in-depth, digital telephony, electronic commerce, emanations security, extranet, facilities, false negative, false positive, frame relay, graduated security, information assurance product, information category, information resources, intranet, intrusion, kerberos, key-escrow system, major application, national information assurance partnership, personal communications network, phreaking, process, proximity, public law 100-235, quadrant, risk management, scoping guidance, secure multipurpose internet mail extensions, security, security policy, should, social engineering, software, subsystem, system, tamper resisting, tokens, tunneling, vendor, vulnerability, web vs. Web,
- technology area
- IncludedBy:technology,
- Related:IT security, application, communications, computer security, criteria, evaluation, function, network, router, security, system, telecommunications,
- technology control plan
- Related:access, foreign, risk,
- technology critical
- IncludedBy:critical,
- Related:security,
- technology gap
- IncludedBy:technology, threat,
- technology transfer
- Related:foreign,
- telecommunications
- IncludedBy:communications,
- Includes:National Security Telecommunications Advisory Committee, National Security Telecommunications and Information Systems Security Advisory/Information Memorandum, National Security Telecommunications and Information Systems Security Committee, National Security Telecommunications and Information Systems Security Directive, National Security Telecommunications and Information Systems Security Instruction, National Security Telecommunications and Information Systems Security Policy, National Telecommunications and Information Administration, National Telecommunications and Information Systems Security Advisory Memoranda/Instructions, National Telecommunications and Information Systems Security Directive, National Telecommunications and Information Systems Security Instruction, National Telecommunications and Information Systems Security Policy, diplomatic telecommunications service, federal telecommunications system, global telecommunications service, government emergency telecommunications service, national telecommunications and information system security directives, subcommittee on telecommunications security, telecommunications security,
- Related:CCI equipment, COMSEC aid, COMSEC equipment, COMSEC material, COMSEC module, COMSEC monitoring, CRYPTO, Defense Information Infrastructure, Escrowed Encryption Standard, IT resources, ITU-T, National Security Decision Directive 145, TEMPEST, bit error rate, bulk encryption, communications security, component, controlled cryptographic item, cracker, cybersecurity, cyberspace, deception, delegated development program, emissions security, end-to-end encryption, extraction resistance, frequency hopping, information, information and communications, information processing standard, information technology, key recovery, line conditioning, line conduction, major application, manipulative communications deception, mission critical, national security system, network, per-call key, privacy system, process, protected communications, reliability, secure communications, signaling, spread spectrum, subcommittee on Automated Information System security, system, systems security steering group, technology area, teleprocessing, transmission security, users, war dialer,
- telecommunications and automated information systems security
- IncludedBy:security,
- telecommunications security
- IncludedBy:communications, communications security, information systems security, telecommunications,
- telecommuting
- Related:communications, computer, software,
- telemetry
- Related:analysis,
- telemetry intelligence
- IncludedBy:intelligence,
- Related:analysis, foreign,
- teleprocessing
- IncludedBy:process,
- Related:application, communications, computer, function, information, interface, system, telecommunications,
- telework
- telnet
- IncludedBy:internet,
- Related:application, computer, login, network, protocols, remote access software, standard, system,
- temperature sensor
- Related:system,
- TEMPEST
- IncludedBy:preferred products list, security,
- Includes:Endorsed TEMPEST Products List, TEMPEST Endorsement Program, TEMPEST advisory group, TEMPEST shielded, TEMPEST test, TEMPEST zone, certified TEMPEST technical authority, compromising emanations, emanation, emanations security, emissions security, equipment radiation TEMPEST zone, soft TEMPEST,
- Related:International Traffic in Arms Regulations, approval/accreditation, communications, compromise, computer, control, information, inspectable space, optional modification, standard, system, telecommunications, vulnerability,
- TEMPEST advisory group
- IncludedBy:TEMPEST, advisory,
- TEMPEST approved
- Related:requirements, security,
- TEMPEST Endorsement Program
- IncludedBy:TEMPEST, program,
- TEMPEST shielded
- IncludedBy:TEMPEST,
- Related:compromise,
- TEMPEST test
- IncludedBy:TEMPEST, test,
- Related:compromise, emanation, emanations security,
- TEMPEST zone
- IncludedBy:TEMPEST,
- TEMPEST zoned equipment
- Related:security,
- temporary access eligibility
- IncludedBy:access,
- Related:interim access authorization, interim security clearance, requirements,
- temporary help/job shopper
- Related:access, classified,
- temporary records
- term rule-based security policy
- IncludedBy:policy, security,
- Related:access, access control, resource, users,
- Terminal Access Controller Access Control System
- IncludedBy:access, control, control systems, internet, security protocol, system,
- Related:authentication, authorization, computer, connection, encryption, function, network, passwords, protocols, router, verification,
- terminal hijacking
- IncludedBy:attack,
- Related:TTY watcher, control, derf, hijack attack, users,
- terminal identification
- IncludedBy:identification,
- Related:identify, system,
- terrorism
- Related:threat,
- terrorists
- IncludedBy:threat,
- Related:critical, damage, information, security,
- test
- IncludedBy:assurance, audit, risk management,
- Includes:Common Criteria Testing Laboratory, Common Criteria Testing Program, TEMPEST test, acceptance testing, active security testing, ad hoc testing, ad-lib test, approved test methods list, black-box testing, boundary value testing, certification test and evaluation, conformance testing, covert testing, environmental failure testing, exhaustive testing, external security testing, functional test case design, functional testing, implementation under test, information security testing, integrated test facility, integration test, interface testing, interim approval to test, internal security testing, mutation testing, negative tests, operational testing, overt testing, passive security testing, penetration test, penetration testing, pilot testing, regression testing, reliability qualification tests, security test & evaluation, security test and evaluation, security testing, smart testing, software system test and evaluation process, stress testing, structural testing, subtest, syntax testing, system testing, system under test, test bed, test bed configuration, test case, test case generator, test case specification, test case suite, test coverage, test cycle, test design, test driver, test environment, test execution, test facility, test generator, test item, test key, test log, test method, test plan, test procedure, test report, test result analyzer, test strategy, test suite, testability, tester, testing, unit testing, white-box testing,
- Related:CASE tools, FIPS PUB 140-1, RED team, Rivest-Shamir-Adleman algorithm, Scope of Accreditation, TCB subset, abend, acceptance inspection, accreditation, allowed traffic, approved technologies list, assured software, authentication, bebugging, benchmark, bit forwarding rate, blue team, boundary value analysis, boundary value coverage, branch coverage, certificate, certification, certification authority, change management, code coverage, commercial off-the-shelf software, component, computer-assisted audit technique, concurrent connections, configuration management, conformance, connection establishment, connection teardown, contingency plan, control, coverage, credentials, development assurance, error guessing, exercised, flaw hypothesis methodology, goodput, homed, hot wash, identify, identity validation, independent validation and verification, information processing standard, instrument, lattice, lattice model, logging, message digest, monitoring and evaluation, mutation analysis, national information assurance partnership, non-repudiation service, oracle, password cracker, patch management, path coverage, point of control and observation, process, protection profile, pseudo-random number generator, public-key certificate, random, records, reference monitor, reference validation mechanism, remote terminal emulation, review techniques, rules of engagement, ruleset, sample, security certification level, security event, security functions, security requirements, security target, sensitivity analysis, simulation modeling, sneaker, software development, software lifecycle, sponsor, statement coverage, synthetic benchmarks, system, system development lifecycle, systems engineering, target identification and analysis techniques, target vulnerability validation techniques, tiger team, time-stamping service, trusted certificate, trusted process, unit, unit of transfer, users, validate, validate vs. verify, validation, verification,
- Synonym:analysis,
- test bed
- IncludedBy:test,
- Related:application, program, software, system,
- test bed configuration
- IncludedBy:test,
- Related:software, system, test case generator, test case specification, version,
- test case
- IncludedBy:test,
- Related:object, program, software development, test procedure,
- test case generator
- IncludedBy:test,
- Related:code, criteria, software, test bed configuration, test generator,
- test case specification
- IncludedBy:test,
- Related:test bed configuration,
- test case suite
- IncludedBy:test,
- Related:software,
- test coverage
- IncludedBy:test,
- Related:requirements, software,
- test cycle
- IncludedBy:test,
- Related:code, security testing, software, software development, system, users,
- test design
- IncludedBy:test,
- Related:identify, software, software development,
- test driver
- IncludedBy:test,
- test environment
- IncludedBy:test,
- Related:software,
- test execution
- IncludedBy:test,
- Related:process, software,
- test facility
- IncludedBy:test,
- Related:application, process, security testing, software development, system, validation,
- test generator
- IncludedBy:test,
- Related:program, test case generator,
- test item
- IncludedBy:test,
- Related:object, security testing, software,
- test key
- IncludedBy:key, test,
- Related:communications security, security testing, system,
- test log
- IncludedBy:test,
- test method
- IncludedBy:test,
- Related:criteria, evaluation,
- test plan
- IncludedBy:test,
- Related:process, resource, risk, security testing, software,
- test procedure
- IncludedBy:test,
- Related:evaluation, operation, test case,
- test report
- IncludedBy:test,
- Related:security testing, system,
- test result analyzer
- IncludedBy:test,
- Related:software,
- test strategy
- IncludedBy:test,
- Related:criteria,
- test suite
- IncludedBy:test,
- Related:software,
- testability
- IncludedBy:software requirement, test,
- Related:computer, criteria, establishment, function, program, software, system,
- tester
- IncludedBy:test,
- Related:program, software,
- testing
- IncludedBy:security testing, test,
- Related:dynamic analysis, evaluation, process, software, system,
- The Exponential Encryption System
- IncludedBy:encryption, system,
- Related:authentication, cryptographic, cryptography, digital signature, function, key, public-key, signature,
- theft
- IncludedBy:illegal, threat consequence,
- Includes:identity theft, theft of data, theft of functionality, theft of service,
- Related:access, access control, account fraud, computer abuse, criminal groups, password shadowing, phishing, physical security, social engineering, unclassified controlled nuclear information,
- theft of data
- IncludedBy:theft, threat consequence,
- Related:authorized,
- theft of functionality
- IncludedBy:function, theft, threat consequence,
- Related:authorized, software, system,
- theft of service
- IncludedBy:theft, threat consequence,
- Related:authorized, entity,
- thermostat
- Related:control,
- think time
- Related:response, system, users,
- third party trusted host model
- IncludedBy:kerberos, model, trust,
- Includes:ticket,
- Related:authentication, key, passwords,
- thrashing
- Related:computer, function, operation, resource, system,
- threat
- Antonym:security software,
- IncludedBy:component operations, risk,
- Includes:CGI scripts, Chernobyl packet, PHF, PHF hack, RED signal, abuse of privilege, acceptable level of risk, advanced persistent threats, adversary threat strategy, ankle-biter, attack, blue box devices, bomb, bot-network operators, breach, buffer overflow, bug, chain letter, classified information spillage, code amber, code red, compromised key list, compromising emanations, computer abuse, computer related crime, countermeasures, crack, crash, criminal groups, dangling threat, dark-side hacker, deadlock, deadly embrace, derf, dumpster diving, emanation, espionage, ethernet meltdown, exploit, exploitable channel, failed logon, failure access, fault, flaw, foe, fork bomb, fraud, generic threat, hackers, hoax, hybrid threat, inappropriate usage, incident, incomplete parameter checking, infection, information systems security, information systems security engineering, information warfare, inside threat, insider, intelligent threat, intercept, leakage, letterbomb, loophole, lurking, macro virus, mailbomb, malicious applets, malicious code, malicious intruder, malicious program, memory scavenging, mission needs statement, mockingbird, nations, outside threat, outside(r) threat, passive threat, password cracker, perceived collection threat, phage, phishers, phracker, phreaker, piggyback entry, promiscuous mode, prowler, pseudo-flaw, psychological operations, residual risk, retro-virus, salami technique, security breach, security environment threat list, security flaw, security threat, security violation, snake oil, snarf, sneaker, sniffing, spam, spammers, stealth probe, strengths, weaknesses, opportunities, threats, surreptitious entry, suspicious contact, technical threat analysis, technology gap, terrorists, threat action, threat agent, threat analysis, threat assessment, threat consequence, threat event, threat monitoring, threat scenario, threat shifting, threat source, time bomb, trap, trapdoor, troll, unauthorized access, unlimited network analyzer, vulnerability, war dialer, war dialing, wedged, zombie,
- Related:Common Criteria for Information Technology Security, IS related risk, IT-related risk, OAKLEY, RED team, Tiger, access, access control, adversary, advisory, anonymous login, authorized, blacklist, blue team, computer, computer emergency response team, counterintelligence, counterintelligence assessment, criminal, critical, criticality, damage, defense, disaster plan, easter egg, effectiveness, electronic warfare support, emergency plan, emergency response, enterprise risk management, entity, environment of operation, evaluation assurance, false negative, firewall, foreign, function, graduated security, high impact, hybrid warfare, information, information protection policy, information security, information sharing and analysis center, infrastructure assurance, infrastructure protection, integrity, joint task force-computer network defense, keyed hash, law enforcement sensitive, level of protection, levels of concern, likelihood of occurrence, malicious, moderate impact, national computer security assessment program, national intelligence, network, network behavior analysis system, network sniffing, object, one-time passwords, operating system fingerprinting, operation, operations security, operations security process, passive, physical and environmental protection, physical security, port scanner, post-accreditation phase, predisposing condition, privacy protection, product rationale, qualitative risk assessment, radio frequency jamming, remediation, remediation plan, resource starvation, response force, risk analysis, risk assessment, risk identification, risk value, robustness, rogue device, security architecture, security level, security objectives, security policy, security target, signature, situational awareness, sound masking system, special access program, suitability of functionality, suspicious activity report, system, system security authorization agreement, tactical edge, target, technical security policy, terrorism, tiger team, tinkerbell program, total risk, triangulation, web bug,
- threat action
- IncludedBy:threat,
- Related:attack, security, system, threat consequence,
- threat agent
- IncludedBy:threat,
- Related:exploit, information, operation, system, vulnerability,
- threat analysis
- IncludedBy:analysis, risk analysis, threat,
- Related:adversary, countermeasures, identify, information, operation, security, system, vulnerability,
- threat assessment
- IncludedBy:assessment, threat,
- Related:countermeasures, damage, evaluation, identification, information, intelligence, process, system,
- threat consequence
- IncludedBy:risk management, threat,
- Includes:corruption, cryptanalysis, deception, deliberate exposure, disruption, emanations analysis, exposures, false denial of origin, false denial of receipt, falsification, hardware or software error, human error, incapacitation, inference, insertion, interception, interference, intrusion, malicious logic, masquerade, misappropriation, misuse, natural disaster, obstruction, overload, penetration, physical destruction, repudiation, reverse engineering, scavenging, signals analysis, spoof, substitution, tamper, theft, theft of data, theft of functionality, theft of service, traffic analysis, trespass, usurpation, violation of permissions, wiretapping,
- Related:access control, attack, encryption, security violation, threat action,
- threat event
- IncludedBy:threat,
- Related:analysis,
- threat monitoring
- IncludedBy:risk management, threat,
- Includes:audit trail,
- Related:analysis, assessment, audit, information, system,
- threat scenario
- IncludedBy:threat,
- threat shifting
- IncludedBy:threat,
- Related:control, security,
- threat source
- IncludedBy:threat,
- Related:target, vulnerability,
- threshold
- thumbprint
- IncludedBy:biometric authentication,
- Related:hash,
- ticket
- IncludedBy:credentials, third party trusted host model,
- Related:access, access control, certificate, control, cryptography, entity, identity, key, model, passwords, resource, system,
- ticket-oriented
- Antonym:list-oriented,
- IncludedBy:authorization,
- Includes:object, subject,
- Related:access, access control, authorized, computer, system,
- tier 1
- tier 2
- Tiger
- IncludedBy:security software,
- Related:software, system, threat,
- tiger team
- Related:attack, computer, officer, security, security testing, sneaker, system, test, threat,
- time bomb
- IncludedBy:threat,
- Related:authorized, code, computer, logic bombs, malicious, program,
- time compliance data
- time division multiple access
- IncludedBy:access, security,
- time stamp
- Includes:time-stamp requester, time-stamp token, time-stamp verifier, time-stamping authority, time-stamping service, trusted time stamp, trusted time stamping authority,
- time variant parameter
- Related:entity, message, random,
- time-and-materials contract
- Related:users,
- time-compliance date
- Related:communications security, operation,
- time-dependent password
- IncludedBy:passwords,
- time-stamp requester
- IncludedBy:time stamp,
- Related:authority, entity, trust,
- time-stamp token
- IncludedBy:time stamp, tokens,
- Related:backup, cryptographic, cryptography,
- time-stamp verifier
- IncludedBy:time stamp,
- Related:entity, process, trust, verification,
- time-stamping authority
- IncludedBy:authority, time stamp,
- Related:evidence, trust,
- time-stamping service
- IncludedBy:time stamp,
- Related:evidence, signature, test, validation,
- time-to-recover
- timing attacks
- IncludedBy:attack,
- Related:access, access control, computer, operation, process,
- timing channel
- HasPreferred:covert channel,
- tinkerbell program
- IncludedBy:program, security software,
- Related:connection, login, network, threat,
- to-be-process model
- IncludedBy:model, process,
- Related:business process, function,
- TOE resource
- IncludedBy:resource, target of evaluation,
- TOE security functions
- IncludedBy:function, object, resource, security attribute, target of evaluation,
- Includes:TOE security functions interface, TSF data, TSF scope of control, inter-TSF transfers, secret, strength of function, transfers outside TSF control, trusted path, user data,
- Related:policy, software, trusted channel,
- TOE security functions interface
- IncludedBy:TOE security functions, function, interface, target of evaluation,
- Related:access, access control, application, information, program, resource,
- TOE security policy
- IncludedBy:policy, security policy, target of evaluation,
- Includes:object, trusted path,
- Related:target,
- TOE security policy model
- IncludedBy:model, policy, security, target of evaluation,
- token authenticator
- Related:control, message, protocols,
- token backup
- IncludedBy:availability, backup, tokens,
- PreferredFor:card backup,
- Related:damage, information, operation,
- token copy
- IncludedBy:tokens,
- Related:information, key, operation, security,
- token device
- IncludedBy:tokens,
- Related:identification, information,
- token management
- IncludedBy:tokens,
- Related:availability, backup, certificate, control, function, key, key management, operation, process, security, users,
- token restore
- IncludedBy:tokens,
- Related:operation, security,
- token storage key
- IncludedBy:key, tokens,
- Related:cryptography, security,
- tokens
- IncludedBy:Secure Electronic Transaction, key,
- Includes:NRD token, NRO token, NRS token, NRT token, authentication token, cryptographic card, cryptographic token, dongle, hash token, identity token, key token, non-repudiation token, notarization token, personal identity verification card, security token, smartcards, time-stamp token, token backup, token copy, token device, token management, token restore, token storage key,
- PreferredFor:hardware token,
- Related:3-factor authentication, Europay, MasterCard, Visa, Fortezza, Generic Security Service Application Program Interface, PKCS #11, X.509, access, access control, authentication, capability, card initialization, card personalization, cardholder certificate, cardholder certification authority, certificate, challenge/response, class 2, 3, 4, or 5, computer, control, cryptographic, cryptographic ignition key, domain parameter, encryption, entity, function, identity, information, message, notary, object, passwords, personal security environment, process, program, protocols, public-key, public-key infrastructure, registration authority, resource, secret, security, social engineering, system, technology, users, validate, witness,
- tolerable error
- toluene
- Related:damage,
- tool
- IncludedBy:target of evaluation,
- Related:target,
- top CA
- IncludedBy:public-key infrastructure,
- Related:certification, trust,
- TOP SECRET
- IncludedBy:classification levels,
- Related:authorized, damage, security,
- top-level certification
- IncludedBy:certification,
- Related:availability, confidentiality, integrity, system,
- top-level security objectives
- IncludedBy:object, security, top-level specification,
- top-level specification
- IncludedBy:development process,
- Includes:descriptive top-level specification, formal top-level specification, top-level security objectives,
- Related:function, model, requirements, security, system,
- topical areas
- Related:control, object,
- topology
- Related:flow, information, network,
- total quality management
- IncludedBy:quality,
- Related:business process, process,
- total risk
- IncludedBy:risk,
- Related:system, threat, vulnerability,
- trace a correspondence
- trace packet
- Related:control, network, system,
- traceability
- Related:attack, process,
- traceroute
- IncludedBy:internet,
- Related:computer, information, operation,
- tracking cookie
- Related:computer, file, profile, users,
- tradecraft identity
- IncludedBy:identity,
- traditional INFOSEC program
- IncludedBy:program,
- Related:authorized, development,
- traffic analysis
- IncludedBy:analysis, threat consequence,
- Related:adversary, attack, cipher, communications, cryptography, encryption, flow, information, intelligence, system, traffic flow confidentiality, traffic padding, users,
- traffic encryption key
- IncludedBy:encryption, key,
- Related:cipher,
- traffic flow confidentiality
- IncludedBy:confidentiality, flow,
- Related:analysis, traffic analysis,
- traffic load
- Related:message, network,
- traffic padding
- Related:communications, cryptography, message, traffic analysis,
- traffic-flow security
- IncludedBy:flow, security,
- Related:communications, cryptographic system, cryptography, message, system,
- trailer
- Related:message,
- training (information security)
- IncludedBy:security,
- training assessment
- Related:evaluation,
- training effectiveness
- training effectiveness evaluation
- IncludedBy:evaluation,
- Related:security,
- tranquility
- IncludedBy:Bell-LaPadula security model,
- Includes:object,
- Related:model, process, property, security,
- tranquility property
- HasPreferred:Bell-LaPadula security model,
- transaction
- IncludedBy:database management system,
- Includes:subject,
- Related:access, access control, computer, information,
- transaction file
- IncludedBy:file,
- Related:network, process,
- transaction intermediary
- Related:entity, trust,
- transfer device
- Related:network,
- transfer time
- Related:network, system,
- transferred records
- transfers outside TSF control
- IncludedBy:TOE security functions, control, target of evaluation,
- transmission
- Related:authorized, classified, information, integrity, network,
- transmission control protocol
- IncludedBy:control, internet, protocols,
- Related:application, computer, computer network, connection, network, standard, system,
- transmission control protocol/internet protocol
- IncludedBy:control, internet, protocols,
- transmission medium
- Related:network,
- transmission security
- IncludedBy:security,
- Related:analysis, application, communications, communications security, confidentiality, control, information, network, telecommunications,
- transmission security key
- IncludedBy:key, security,
- transport
- Related:cryptographic, domain, key, process,
- transport layer security
- IncludedBy:internet, security,
- Related:Transport Layer Security Protocol, application, authentication, protocols, secure socket layer, version,
- Transport Layer Security Protocol
- IncludedBy:protocols, security protocol,
- Related:encryption, standard, transport layer security,
- transport mode
- Related:internet protocol security, internet security protocol,
- transport mode vs. tunnel mode
- IncludedBy:internet protocol security, tunnel,
- Related:association, communications, gateway, internet security protocol, protocols,
- transportation
- IncludedBy:critical infrastructures,
- Related:critical, role, security, system,
- transportation plan
- Related:classified,
- transshipping activity
- trap
- IncludedBy:threat,
- Related:fault, message, security software,
- trapdoor
- IncludedBy:threat,
- Related:access, access control, algorithm, attack, authorized, code, computer, control, cryptographic, cryptography, entity, function, information, key, message, program, random, security, software, system,
- Synonym:backdoor,
- trashing
- HasPreferred:dumpster diving,
- tree diagram
- trespass
- IncludedBy:threat consequence,
- Related:access, access control, authorized, system,
- tri-homed
- IncludedBy:homed,
- Related:attack, compromise, interface, security,
- tri-service tactical communications system
- IncludedBy:communications, system,
- triangulation
- Related:identify, threat,
- trigger
- Related:file, program, users, virus,
- triple DES
- Related:algorithm, cipher, digital signature, encryption, internet protocol security, internet security protocol, key, signature,
- Tripwire
- IncludedBy:security software,
- Related:file, identify, information, software, system,
- trojan horse
- IncludedBy:exploit, malicious code,
- Includes:virus,
- Related:access, access control, attack, authorization, authorized, code, computer, entity, file, function, information, integrity, internet, malicious, process, program, security, software, system, users, vulnerability, worm,
- troll
- IncludedBy:threat,
- Related:message, response,
- trunk
- trunk encryption device
- IncludedBy:encryption,
- trust
- Includes:Canadian Trusted Computer Product Evaluation Criteria, DoD Trusted Computer System Evaluation Criteria, Trusted Computer System Evaluation Criteria, Trusted Network Interpretation Environment Guideline, Trusted Products Evaluation Program, Trusted Systems Interoperability Group, bilateral trust, certification authority, confidence, directly trusted CA, directly trusted CA key, hierarchy of trust, least trust, session key, third party trusted host model, trust anchor, trust anchor store, trust chain, trust hierarchy, trust level, trust list, trust relationship, trust-file PKI, trusted agent, trusted certificate, trusted facility manual, trusted foundry, trusted functionality, trusted identification forwarding, trusted key, trusted network interpretation, trusted operating system, trusted platform module chip, trusted process, trusted recovery, trusted third party, trusted time stamp, trusted time stamping authority, trustworthiness, trustworthy system, tunneling router, untrusted process, virtual network perimeter, web of trust,
- Related:Biba model, Common Criteria for Information Technology Security, Federal Criteria for Information Technology Security, IA-enabled information technlogogy product, IA-enabled product, Internet Architecture Board, Internet Engineering Steering Group, Internet Society, NIAP Common Criteria Evaluation and Validation Scheme, National Computer Security Center, National Computer Security Center glossary, Orange book, PKIX, Red book, X.509, Yellow book, accountability, accreditation, accreditation authority, accreditation range, adjudication, algorithm, analysis, assured software, attribute authority, audit, authentic signature, authentication, authenticity, authority, authorization, binding, certificate policy, certificate status authority, certificate status responder, certificate validation, certification, certification authority workstation, certification path, certification practice statement, clean system, clearance, code, common security, component, compromise, controlled access protection, credential service provider, credentials service provider, criteria, cross-certificate, cryptographic product, data integrity, delivery authority, demilitarized zone, derogatory information, descriptive top-level specification, digital notary, domain modulus, dominated by, endorsed tools list, enterprise risk management, entity, escrow, evaluated products list, evidence, evidence requester, external it entity, foreign interest, foreign person, function, guard, identity, information, information assurance, information sharing environment, integrity, inter-TSF transfers, internal vulnerability, kerberos, key, key distribution center, key generation exponent, key recovery, key translation centre, key-escrow, key-escrow system, labeled security protections, mandatory access control, mesh PKI, minimum background investigation, modes of operation, monitor, multilevel device, multiple facility organization, multiple security levels, mutual suspicion, network component, non-repudiation service, notarization, notary, path discovery, penetration testing, personal security environment, personalization service, personnel security, personnel security determination, personnel security program, personnel security questionnaire, policy, privileged process, privileged user, process, public-key certificate, public-key infrastructure, recover, registration authority, repository, responsible individual, role, root, root certification authority, sandboxing, secure hypertext transfer protocol, security assertion markup language, security clearance, security evaluation, security filter, security gateway, security kernel, security perimeter, security policy model, security zone, security-compliant channel, sensitivity label, single sign-on, single-level device, social engineering, software-based fault isolation, source integrity, source program, spoofing, system, system-high security mode, technical policy, time-stamp requester, time-stamp verifier, time-stamping authority, top CA, transaction intermediary, tunneled VPN, unfavorable personnel security determination, users, valid certificate, validate, validate vs. verify, validation, web vs. Web,
- trust anchor
- IncludedBy:trust,
- Related:certification, key, public-key, security, software,
- trust anchor store
- IncludedBy:trust,
- trust chain
- IncludedBy:trust,
- Related:certification, public-key infrastructure,
- trust hierarchy
- IncludedBy:trust,
- Related:certification, public-key infrastructure, standard,
- trust level
- IncludedBy:classification levels, trust,
- Related:analysis, computer, security, standard, system,
- trust list
- IncludedBy:trust,
- trust relationship
- IncludedBy:trust,
- Related:access, access control, domain, resource,
- trust-file PKI
- IncludedBy:file, public-key infrastructure, trust,
- Related:application, certificate, certification, key, public-key, software, users,
- trusted agent
- IncludedBy:trust,
- Related:authorized, certification, entity, identification, interface, process, registration,
- trusted certificate
- IncludedBy:certificate, trust,
- Related:certification, file, key, public-key, security testing, test, users, validation,
- trusted channel
- IncludedBy:channel, trusted computing base,
- Related:TOE security functions, confidence, function, information, integrity, operation, policy, privacy, security, software,
- Synonym:security-compliant channel,
- trusted computer system
- IncludedBy:National Computer Security Center, computer, system, trusted computing base,
- Includes:beyond A1,
- Related:accreditation, accreditation range, assurance, classified, evaluated products list, information, integrity, network component, process, security policy model, software, trusted network interpretation,
- Synonym:trusted computing system, trusted operating system,
- Trusted Computer System Evaluation Criteria
- IncludedBy:Common Criteria for Information Technology Security Evaluation, computer, criteria, evaluation, system, trust,
- Includes:rainbow series, trusted computing base,
- Related:assurance, classified, computer security, control, process, requirements, security, software, standard,
- trusted computing base
- IncludedBy:Trusted Computer System Evaluation Criteria, protection profile,
- Includes:NTCB partition, TCB subset, access control, candidate TCB subset, dependency, depends, exploitable channel, formal security policy model, global requirements, granularity of a requirement, local requirements, monolithic TCB, network trusted computing base, output, primitive, protection-critical portions of the TCB, reference validation mechanism, scope of a requirement, subset-domain, target of evaluation, trusted channel, trusted computer system, trusted computing system, trusted distribution, trusted gateway, trusted path, trusted software, trusted subject,
- Related:authorized, computer, policy, security, software, system, users,
- trusted computing system
- IncludedBy:security, system, trusted computing base,
- Related:assurance, confidence, security software,
- Synonym:trusted computer system,
- trusted distribution
- IncludedBy:trusted computing base,
- Related:software, update,
- trusted facility manual
- IncludedBy:trust,
- trusted foundry
- IncludedBy:trust,
- Related:assurance, classified, tamper,
- trusted functionality
- IncludedBy:function, security policy, trust,
- Related:criteria, policy,
- trusted gateway
- IncludedBy:Common Criteria for Information Technology Security Evaluation, firewall, gateway, trusted computing base,
- Related:access, access control, application, communications, criteria, information, internet, resource, risk, software, system,
- trusted identification forwarding
- IncludedBy:identification, trust,
- Related:access, access control, authorized, connection, information, network, operation, system, users, validate,
- trusted key
- IncludedBy:key, trust,
- Related:certificate, certification, file, public-key, public-key infrastructure, users,
- trusted network interpretation
- IncludedBy:network, trust,
- Related:assurance, computer, computer security, criteria, evaluation, requirements, security, system, trusted computer system,
- Trusted Network Interpretation Environment Guideline
- IncludedBy:network, trust,
- trusted operating system
- IncludedBy:system, trust,
- Related:requirements, security,
- Synonym:trusted computer system,
- trusted path
- IncludedBy:TOE security functions, TOE security policy, trusted computing base,
- Related:communications security, computer, confidence, cryptographic, cryptography, evaluation, function, information, module, policy, process, software, system, target, users,
- trusted platform module chip
- IncludedBy:module, trust,
- Related:computer, cryptographic, information, key, operation, tamper,
- trusted process
- Antonym:untrusted process,
- IncludedBy:process, security policy, trust,
- Related:attack, malicious, network, policy, risk, router, system, test,
- Trusted Products Evaluation Program
- IncludedBy:evaluation, program, trust,
- trusted recovery
- IncludedBy:recovery, trust,
- Related:compromise, system,
- trusted software
- IncludedBy:software, trusted computing base,
- trusted subject
- IncludedBy:Bell-LaPadula security model, security policy, subject, trusted computing base,
- Includes:object,
- Related:access, access control, information, model, policy, property,
- Trusted Systems Interoperability Group
- IncludedBy:interoperability, system, trust,
- Related:computer, users,
- trusted third party
- IncludedBy:trust,
- Related:authentication, authority, public-key infrastructure, security,
- trusted time stamp
- IncludedBy:time stamp, trust,
- Related:authority, information,
- trusted time stamping authority
- IncludedBy:authority, time stamp, trust,
- Related:evidence,
- trustworthiness
- IncludedBy:trust,
- Related:security,
- trustworthy system
- IncludedBy:system, trust,
- Related:availability, computer, function, intrusion, operation, security, software,
- TSEC
- Related:security,
- TSEC nomenclature
- Related:communications security, identify, system,
- TSF data
- IncludedBy:TOE security functions, target of evaluation,
- Related:operation,
- TSF scope of control
- IncludedBy:TOE security functions, control, target of evaluation,
- Related:subject,
- TTY watcher
- IncludedBy:attack,
- Related:interface, terminal hijacking,
- tuning
- Related:intrusion, intrusion detection, system,
- tunnel
- IncludedBy:Secure Electronic Transaction, internet,
- Includes:Layer 2 Tunneling Protocol, point-to-point tunneling protocol, transport mode vs. tunnel mode, tunnel mode, tunneled VPN, tunneled password protocol, tunneling, tunneling attack, tunneling router,
- Related:SET private extension, algorithm, authentication header, communications, computer, computer network, encapsulating security payload, encryption, gateway, message, network, protocols, public-key infrastructure, secure shell, security association, virtual private network,
- tunnel mode
- IncludedBy:internet protocol security, tunnel,
- Related:internet security protocol,
- tunneled password protocol
- IncludedBy:passwords, protocols, tunnel,
- Related:certificate, cryptographic, key, public-key,
- tunneled VPN
- IncludedBy:tunnel, virtual private network,
- Related:network, trust,
- tunneling
- IncludedBy:tunnel, virtual private network,
- Related:connection, message, network, protocols, technology,
- tunneling attack
- IncludedBy:attack, tunnel,
- Related:system,
- tunneling router
- IncludedBy:router, security, trust, tunnel,
- Related:network, system,
- turnaround time
- Related:availability, function,
- twisted-pair wire
- two-part code
- IncludedBy:code,
- Related:system,
- two-person control
- IncludedBy:control,
- Related:authorized, cryptography, process, requirements, security, system,
- two-person integrity
- IncludedBy:integrity,
- Related:access, access control, authorized, communications security, key, security, system,
- Type 1 key
- IncludedBy:key,
- Related:classified, cryptographic, information, security,
- type 1 products
- Related:algorithm, classified, cryptographic, information, key, process, security, subject, system, users,
- Type 2 key
- IncludedBy:key,
- Related:classified, cryptographic, information, security,
- type 2 product
- Related:algorithm, classified, cryptographic, information, key, process, security, system,
- type 3 key
- IncludedBy:key,
- Related:classified, cryptographic, information,
- type 3 product
- Related:algorithm, assurance, classified, cryptographic, information, key, module, standard, system,
- Type 4 key
- IncludedBy:key,
- Related:cryptographic, function,
- Type 4 product
- Related:algorithm, cryptographic,
- type accepted telephone
- Related:security,
- type accreditation
- IncludedBy:accreditation,
- Related:application, operation, requirements, software, system,
- type certification
- IncludedBy:certification,
- Related:accreditation, evaluation, information, process, requirements, security, system,
- Type I cryptography
- IncludedBy:cryptography,
- Related:National Security Agency, algorithm, classified, cryptographic, information,
- Type II cryptography
- IncludedBy:cryptography,
- Related:National Security Agency, algorithm, classified, code, cryptographic, information,
- Type III cryptography
- IncludedBy:cryptography,
- Related:algorithm, cryptographic, information, process, standard,
- type time
- Related:computer, users,
- U.S. citizen
- HasPreferred:United States citizen,
- U.S. person
- Related:United States citizen, United States national, association, control, foreign,
- U.S.-controlled facility
- IncludedBy:control,
- Related:access, access control, authorized,
- U.S.-controlled space
- IncludedBy:control,
- Related:access, access control, authorized, key,
- umbrella special access program
- IncludedBy:access,
- unacknowledged special access program
- IncludedBy:access,
- Related:classified, compromise, risk, vulnerability,
- unauthorized access
- IncludedBy:access, authorized, threat,
- Related:SOCKS, access control mechanisms, access control service, adequate security, application, between-the-lines-entry, computer intrusion, computer security intrusion, covert channel analysis, data compromise, failure access, fetch protection, file protection, firewall, information systems security, intrusion, intrusion detection tools, major application, malicious logic, motivation, network security, penetration, physical and environmental protection, physical security, piggyback, piggyback entry, probe, procedural security, protected network, resource, security compromise, security incident, security violation, segregation of duties, sensitive information, signature, system, vulnerability,
- unauthorized disclosure
- IncludedBy:authorized, risk,
- Related:access, classified, exposures, information,
- unauthorized person
- IncludedBy:authorized,
- Related:access, classified,
- unclassified
- IncludedBy:classified,
- Related:authorized, information,
- unclassified controlled nuclear information
- IncludedBy:classified,
- Related:authorized, illegal, theft,
- unclassified internet protocol router network
- IncludedBy:classified, network,
- Related:access, users,
- unclassified sensitive
- IncludedBy:classified,
- Related:access, authorized, foreign, privacy, sensitive but unclassified information,
- unconventional warfare
- IncludedBy:warfare,
- Related:intelligence, version,
- under sea warfare
- IncludedBy:warfare,
- Related:control, system,
- undercover operation
- Related:identity,
- underflow
- IncludedBy:flow,
- undesired signal data emanations
- IncludedBy:emanations security, risk,
- unencrypted
- Related:encryption,
- unfavorable administrative action
- Related:security,
- unfavorable personnel security determination
- IncludedBy:security,
- Related:access, authorization, classified, trust,
- unforgeable
- Related:authorized, certificate, cryptographic, cryptography, digital signature, fraud, function, key, property, public-key, public-key infrastructure, signature, users,
- unified network
- IncludedBy:network,
- Related:security, users,
- uniform resource identifier
- IncludedBy:internet, resource,
- Related:identification, identify, object, protocols, target,
- uniform resource locator
- IncludedBy:internet, resource,
- Related:access, access control, archive, domain, file, information, object, protocols,
- uniform resource name
- IncludedBy:internet, resource,
- Related:availability,
- unilateral authentication
- IncludedBy:authentication,
- Related:assurance, attack, entity, identity, mutual authentication, vulnerability,
- uninterruptible power supply
- Related:failure,
- unique interswitch rekeying key
- IncludedBy:key, rekey,
- unit
- Related:code, computer, program, software, test,
- unit of transfer
- Related:application, association, bit forwarding rate, connection, establishment, firewall, revoked state, security, test, users,
- unit testing
- IncludedBy:security testing, test,
- Related:software,
- United States
- United States and its Territorial Areas
- United States citizen
- PreferredFor:U.S. citizen,
- Related:U.S. person, United States national, alien, cleared escort, dual citizen, foreign contact, guard, limited access authorization, nations, random procurement, site security manager,
- United States national
- PreferredFor:National of the United States,
- Related:U.S. person, United States citizen, foreign,
- unlimited network analyzer
- IncludedBy:network, threat,
- unprotected network
- Antonym:protected network,
- IncludedBy:demilitarized zone, firewall, network,
- Related:access, access control, control, policy, ruleset, users,
- unscheduled records
- unsigned data
- Related:authentication,
- untrusted process
- Antonym:trusted process,
- IncludedBy:process, risk, trust,
- Related:code, malicious, operation, policy, system,
- update (a certificate)
- Related:authorization,
- update (key)
- IncludedBy:key,
- update
- Includes:certificate update, key update, update access,
- Related:Advanced Mobile Phone Service, Internet Draft, OAKLEY, X.509 certificate revocation list, accreditation phase, certificate management, certificate rekey, certificate renewal, issuing authority, key, patch, process, push technology, real-time system, rolling cost forecasting technique, router flapping, security event, software release, systems software, trusted distribution, validation service,
- update access
- IncludedBy:access, update,
- Related:program, software,
- updating
- Related:communications security, cryptographic, cryptography, key, process, system,
- upgrade
- Related:authorized, classified, security,
- upload
- Related:computer, file, process,
- US-CERT
- Related:attack, cyberspace, security,
- usage security policy
- IncludedBy:policy, security policy,
- USENET
- IncludedBy:internet,
- Related:access, connection, system,
- user agent
- IncludedBy:users,
- user data
- IncludedBy:TOE security functions, users,
- Related:operation,
- user data protocol
- IncludedBy:internet, protocols, users,
- PreferredFor:user datagram protocol,
- Related:application, communications, computer, control, flow, network, program, standard,
- user datagram protocol
- HasPreferred:user data protocol,
- IncludedBy:users,
- user documentation
- IncludedBy:target of evaluation, users,
- Related:information, target,
- user id
- IncludedBy:users,
- Includes:group user id,
- Related:computer, identify, system,
- Synonym:user identifier,
- user id revalidation
- IncludedBy:users, validation,
- Related:process,
- user identification
- IncludedBy:users,
- user identifier
- IncludedBy:users,
- Related:authentication, identify, passwords, process, system,
- Synonym:user id,
- user initialization
- Related:software,
- user interface
- IncludedBy:interface, users,
- Related:computer, key,
- user interface system
- IncludedBy:interface, system, users,
- user partnership program
- IncludedBy:program, users,
- Related:application, authorization, cryptography, development, information, security, system,
- user PIN
- IncludedBy:multilevel information systems security initiative, users,
- Related:Fortezza, access, access control, control, function, identification,
- user profile
- IncludedBy:file, profile, risk management, users,
- user registration
- Related:security,
- user representative
- IncludedBy:users,
- Related:authorized, communications security, information, interface, key, operation, process, requirements, security, system,
- user-PIN ORA
- IncludedBy:multilevel information systems security initiative, users,
- Related:Fortezza, function,
- users
- IncludedBy:accountability, data source, security-relevant event,
- Includes:MISSI user, access control, authorization, authorized user, certificate user, closed user group, directory user agent, end-user, end-user computing, graphical-user interface, group of users, human user, key management user agent, multiuser mode of operation, privileged user, remote authentication dial-in user service, security features users guide, stand-alone, single-user system, superuser, user PIN, user agent, user data, user data protocol, user datagram protocol, user documentation, user id, user id revalidation, user identification, user identifier, user interface, user interface system, user partnership program, user profile, user representative, user-PIN ORA,
- PreferredFor:customer,
- Related:Advanced Mobile Phone Service, American National Standards Institute, Defense Information Infrastructure, Defense Information Systems Network, Directory Access Protocol, Gypsy verification environment, IP splicing/hijacking, IT security incident, IT security policy, IT security support functions, Identification Protocol, Integrated services digital network, Internet Protocol Security Option, Key Management Protocol, Layer 2 Forwarding Protocol, OAKLEY, OSI architecture, PHF hack, POP3 APOP, Password Authentication Protocol, S/Key, SSO PIN, SSO-PIN ORA, Sensitive Information Computer Security Act of 1987, Simple Authentication and Security Layer, Trusted Systems Interoperability Group, X.500 Directory, X.509 certificate revocation list, abuse of privilege, acceptable use policy, acceptance criteria, acceptance testing, access, access category, access control lists, access level, access profile, access type, access with limited privileges, accreditation boundary, active wiretapping, administrative account, anomaly, anomaly detection, anomaly detection model, anonymity, anonymous, anonymous login, application, application program interface, application server attack, architecture, assurance, attack, attribute certificate, audit trail, authenticate, authentication, authentication code, authentication data, authentication mechanism, authenticity, authority, automated logon sequences, automatic log-on, availability, availability of data, backdoor, bastion host, benchmark, between-the-lines-entry, biometric measurement, biometric system, blacklist, boundary, browse access protection, capture, cardholder, certificate, certificate policy, certificate revocation, certificate revocation list, certificate status responder, certificate validation, certification, certification authority, certification hierarchy, certification path, certification practice statement, chain letter, challenge/response, classification levels, client, client server, cloud computing, cold start, command authority, community of interest, compartmented mode, compromised key list, computer, computer cryptography, concurrency control, concurrent connections, confidentiality, connection, connection maintenance, console, console logon, consumers, content filtering, control, controlled access protection, controlled security mode, corporate security policy, correctness, crack, critical, cross-certification, cryptographic token, cybersecurity, data driven attack, data integrity service, database management system, dedicated mode, dedicated security mode, default account, denial-of-service, device registration manager, dial-up capability, dictionary attack, direct shipment, disaster recovery, discretionary access control, documentation, domain, domain name system, ease of use, electrical power systems, electronic authentication, electronic key entry, email packages, email security software, encapsulation, encryption software, energy-efficient computer equipment, enterprise service, entity, environment, ethernet sniffing, executive state, external system exposure, extranet, failed logon, false acceptance, false acceptance rate, federated identity, federation, file, firewall, fishbowl, frame relay, framing, frequency division multiple access, general support system, gopher, granularity of a requirement, group, guard, hackers, handshaking procedures, hijacking, hoax, honeypot, host, hyperlink, identification, identification and authentication, identification authentication, identity, identity credential, identity credential issuer, identity validation, identity-based security policy, impersonation, independent validation and verification, individual accountability, individual electronic accountability, information, information security, information systems security, integrity policy, intelligence cycle, interface, interference, internal subject, internet, internet vs. Internet, intranet, issue, kerberos, key, key center, key management device, key management infrastructure, keys used to encrypt and decrypt files, keystroke monitoring, leapfrog attack, least privilege, local authority, local logon, local management device/key processor, local-area network, logging, logical access, logical access control, logical perimeter, login prompt, major application, malicious logic, mandatory access control, masquerading, mass-market software, mesh PKI, message handling system, min-entropy, mobile code, mockingbird, mode of operation, modes of operation, multi-releasable, multilevel mode, multilevel secure, multilevel security mode, multiple access rights terminal, national information assurance partnership, national information infrastructure, natural benchmark, network, network component, network services, no-PIN ORA, node, non-discretionary security, non-organizational user, office information system, officer, on-demand scanning, open system environment, operations manager, organizational maintenance, organizational registration authority, owner, packet filter, partitioned security mode, password-locked screensaver, passwords, patch management, peer-to-peer communication, penetration test, penetration testing, periods processing, persistent cookie, personal identification number, personality label, personnel registration manager, phishing, piggyback, piggyback attack, piggyback entry, point-to-point tunneling protocol, policy, policy creation authority, portability, primary services node (prsn), privacy, privacy programs, private key, privileged access, privileged accounts, probe, process, profile, program, programmable logic controller, protection ring, protocol analyzer, proxy, proxy server, public-key, public-key certificate, public-key cryptography, public-key infrastructure, push technology, quality, rapid application development, registration authority, relying party, remote access, remote login, remote logon, repository, requirements, resource, responsibility to provide, risk index, role, root, rule-based security policy, scope of a requirement, secrecy policy, secret, secure data device, secure shell, secure socket layer, security architecture, security attribute, security banner, security concept of operations, security domain, security features, security level, security policy, security testing, security violation, security-relevant change, sensitive, session hijack attack, shared account, single sign-on, site information assurance manager, smartcards, sniffer, social engineering, software product, software requirement, specialized boundary host, spoof, spoofing, spyware, stand-alone, shared system, subject, subject security level, subordinate certification authority, system, system administrator, system files, system high mode, system integrity, system owner, system requirement, system resources, system security officer, system-high security mode, tactical edge, target of evaluation, technical attack, technical vulnerability, technological attack, telecommunications, term rule-based security policy, terminal hijacking, test, test cycle, think time, time-and-materials contract, token management, tokens, tracking cookie, traffic analysis, trigger, trojan horse, trust, trust-file PKI, trusted certificate, trusted computing base, trusted identification forwarding, trusted key, trusted path, type 1 products, type time, unclassified internet protocol router network, unforgeable, unified network, unit of transfer, unprotected network, validate vs. verify, vendor, verification, virtual private network, virus, virus-detection tool, vulnerability, web bug, weblinking, wide-area network, wiki, workstation, world wide web, worm,
- usurpation
- IncludedBy:threat consequence,
- Related:authorized, control, entity, function, system,
- UTCTime
- Related:GeneralizedTime, coordinated universal time,
- utility
- IncludedBy:critical infrastructures,
- Related:program,
- utility programs
- IncludedBy:program,
- Related:computer, file, operation, software, system,
- v1 certificate
- IncludedBy:certificate,
- Related:X.509, key, public-key, version,
- v1 CRL
- IncludedBy:public-key infrastructure,
- Related:X.509, certificate, version,
- v2 certificate
- IncludedBy:certificate,
- Related:X.509, key, public-key, version,
- v2 CRL
- IncludedBy:public-key infrastructure,
- Related:X.509, certificate, version,
- v3 certificate
- IncludedBy:certificate,
- Related:X.509, key, public-key, version,
- vaccines
- IncludedBy:security software,
- Related:program, signature, virus-detection tool,
- valid certificate
- IncludedBy:certificate,
- Related:backup, trust, validate,
- valid data element
- valid signature
- IncludedBy:signature,
- Related:certificate, digital signature, public-key infrastructure, validate,
- validate
- Includes:corroborate, validate vs. verify, validated products list,
- Related:algorithm, application, authenticate, authority revocation list, cardholder certificate, certificate, certificate revocation list, certificate validation, certification authority, certification path, circuit level gateway, cross-certification, cryptographic, domain, identity credential issuer, identity proofing, key, non-repudiation, non-repudiation information, pre-authorization, process, public-key, public-key infrastructure, registration, security, suspicious event, test, tokens, trust, trusted identification forwarding, valid certificate, valid signature, validation, verifier, web of trust,
- validate vs. verify
- IncludedBy:National Institute of Standards and Technology, validate,
- Related:authentication, backup, certificate, certification, cryptographic, cryptography, digital signature, entity, evidence, identification, identity, information, internet, key, module, process, public-key, public-key infrastructure, security, signature, system, test, trust, users, validation, verification, verification and validation,
- validated products list
- IncludedBy:national information assurance partnership, validate,
- Related:authority, certificate, criteria, evaluation, information, validation,
- validation
- IncludedBy:development process, evaluation,
- Includes:NIAP Common Criteria Evaluation and Validation Scheme, Validation Certificate, certificate chain validation, certificate validation, conformant validation certificate, data validation, evaluation and validation scheme, identity validation, independent validation and verification, key validation, path validation, reference validation mechanism, software verification and validation, target vulnerability validation techniques, user id revalidation, validation report, validation service, verification and validation,
- Related:Common Criteria Testing Laboratory, Common Criteria Testing Program, IT Security Evaluation Criteria, IT Security Evaluation Methodology, NIAP Oversight Body, National Voluntary Laboratory Accreditation Program, Scope of Accreditation, application, application controls, assurance, authentication, certificate, certification hierarchy, designated, designated laboratories list, designating authority, designation policy, evaluation technical report, evidence, extensible markup language, identity management systems, mesh PKI, monitoring and evaluation, physical access control, pre-certification phase, process, program, public-key infrastructure, quality, requirements, response, security, software, standard, system, test, test facility, time-stamping service, trust, trusted certificate, validate, validate vs. verify, validated products list,
- Synonym:verification,
- Validation Certificate
- IncludedBy:Common Criteria Testing Laboratory, certificate, validation,
- validation report
- IncludedBy:validation,
- Related:criteria, evidence,
- validation service
- IncludedBy:validation,
- Related:authority, entity, update,
- validity period
- IncludedBy:public-key infrastructure,
- Related:backup, certificate, key, public-key, subject,
- value analysis
- IncludedBy:analysis,
- Related:quality,
- value proposition
- value-added
- Related:process,
- value-added network
- IncludedBy:network,
- Related:computer, computer network, electronic data interchange, system, version,
- valve
- Related:flow, system,
- variable sampling
- variance
- variant
- Related:code,
- vault
- Related:access, authorized,
- vaulting
- Related:availability, backup, computer, computer network, information, process, recovery, risk,
- vendor
- Related:computer, entity, internet, router, software, system, technology, users,
- verification
- IncludedBy:development process, evaluation, security testing,
- Includes:Gypsy verification environment, domain verification exponent, formal verification, identity verification, independent validation and verification, object, personal identity verification, personal identity verification card, public accreditation verification exponent, public verification key, signature verification, software verification and validation, state delta verification system, system verification, verification and validation, verification function, verification key, verification procedure refinements, verification process, verification techniques,
- Related:PIV issuer, PKIX private extension, Terminal Access Controller Access Control System, access, access control, analysis, application, assessment, asymmetric cryptographic technique, asymmetric keys, asymmetric signature system, audit, authentication, binding, biometric system, cardholder certification authority, certification phase, certify, code, comparisons, component, computing security methods, control, correctness, cryptographic key, data integrity service, data origin authentication, digital signature, dual signature, endorsed tools list, entity, formal development methodology, formal proof, formal top-level specification, identification, identity, identity management systems, information, integrity, key, model, non-repudiation policy, policy, pre-certification phase, private accreditation exponent, process, public-key, public-key certificate, public-key derivation function, public-key system, requirements, security certification level, signature system, software, symmetric cryptography, system, test, time-stamp verifier, users, validate vs. verify, verified name, verifier,
- Synonym:validation,
- verification and validation
- IncludedBy:validation, verification,
- Related:process, requirements, software, system, validate vs. verify,
- verification function
- IncludedBy:function, verification,
- Related:key, process,
- verification key
- IncludedBy:key, verification,
- Related:cryptographic, entity, process, signature,
- verification procedure refinements
- IncludedBy:verification,
- Related:operation, system,
- verification process
- IncludedBy:process, verification,
- Related:domain, key, message, signature,
- verification techniques
- IncludedBy:verification,
- Related:control, process, requirements, security,
- verified name
- Related:entity, identity, verification, verifier,
- verifier
- Related:authentication, control, entity, evidence, function, identity, man-in-the-middle attack, protocols, validate, verification, verified name, zero-knowledge password protocol,
- verifier impersonation attack
- IncludedBy:impersonation,
- Related:authentication, information, protocols,
- version
- Includes:Internet Message Access Protocol, version 4, Post Office Protocol, version 3, common criteria version 1.0, common criteria version 2.0, conversion, subversion, version scanning,
- Related:COMSEC equipment, Common Criteria for Information Technology Security, European Information Technology Security Evaluation Criteria, Federal Criteria Vol. I, IP address, Internet Engineering Task Force, Key Management Protocol, MD5, X.509 attribute certificate, X.509 authority revocation list, X.509 certificate revocation list, X.509 public-key certificate, banner grabbing, baseline, business areas, community string, compromise, controlled security mode, encryption, encryption algorithm, error, function, host-based security, internet protocol, internet protocol security, laptop computer, lines of business, non-repudiation service, pilot testing, point-to-point tunneling protocol, preproduction model, proxy server, reverse engineering, secure multipurpose internet mail extensions, secure socket layer, simple network management protocol, software, software build, software release, source data entry, sub-function, test bed configuration, transport layer security, unconventional warfare, v1 CRL, v1 certificate, v2 CRL, v2 certificate, v3 certificate, value-added network, worm,
- version scanning
- IncludedBy:version,
- Related:application, process,
- victim
- Related:attack,
- view
- IncludedBy:database management system,
- view definition
- IncludedBy:database management system,
- violation
- HasPreferred:security violation,
- violation of permissions
- IncludedBy:threat consequence,
- Related:authorized, entity, function, system,
- virtual departments or divisions
- Related:information,
- virtual machine
- Related:software, system,
- virtual mall
- IncludedBy:world wide web,
- Related:internet,
- virtual network perimeter
- IncludedBy:network, security, trust,
- virtual password
- IncludedBy:passwords,
- Related:requirements,
- virtual private network
- IncludedBy:internet, key, network, privacy, security protocol,
- Includes:point-to-point tunneling protocol, session key, tunneled VPN, tunneling,
- Related:assurance, authentication, communications, computer, computer network, control, encryption, extranet, gateway, information, integrity, public-key, resource, system, tunnel, users,
- virus
- IncludedBy:exploit, malicious code, software, trojan horse,
- Includes:antivirus software, antivirus tools, boot sector virus, compiled viruses, file infector virus, interpreted virus, macro virus, multipartite virus, retro-virus, virus definitions, virus hoax, virus scanner, virus signature, virus-detection tool,
- Related:access, access control, application, attack, clean system, code, computer, file, infection, logic bombs, malicious, malicious logic, malware, memory resident, obfuscation technique, overwriting, payload, phage, program, push technology, replicator, security label, signature, system, trigger, users, worm,
- virus definitions
- IncludedBy:virus,
- Related:algorithm, countermeasures, malware, signature,
- virus hoax
- IncludedBy:virus,
- Related:message,
- virus scanner
- IncludedBy:security software, virus,
- Related:program, risk, software,
- Synonym:virus-detection tool,
- virus signature
- IncludedBy:attack signature recognition, signature, virus,
- Related:application, file, software,
- virus-detection tool
- IncludedBy:security software, virus,
- Related:computer, risk, software, users, vaccines,
- Synonym:virus scanner,
- vishing
- IncludedBy:exploit,
- Related:criminal, internet, message, phishing, protocols, security,
- vision
- volatile memory components
- voting securities
- vulnerability
- Antonym:security software,
- IncludedBy:target of evaluation, threat,
- Includes:areas of potential compromise, common vulnerabilities and exposures, computer security technical vulnerability reporting program, dangling vulnerability, exploitation, exploitation of vulnerability, implementation vulnerability, internal vulnerability, national vulnerability database, operational vulnerability information, target vulnerability validation techniques, technical vulnerability, technical vulnerability information, vulnerability analysis, vulnerability assessment, vulnerability audit, vulnerability scanning,
- Related:IS related risk, IT security incident, IT-related risk, MEI resource elements, RED team, SATAN, TEMPEST, acceptable level of risk, access, access control, acknowledged special access program, active security testing, adversary, analysis, application, assessment, attack, audit, audit/review, authentication, authorization, authorized, availability, blue team, certification agent or certifier, common misuse scoring system, community risk, compromise, computer, computer emergency response team, confidentiality, control, controlled security mode, cost/benefit analysis, countermeasures, critical, critical asset, cross site scripting, cryptosystem evaluation, cyberattack, dangling threat, emergency shutdown controls, exploit, exploit tools, failure, firewall, flow, generic threat, incident, information, information assurance, information assurance product, information security, information sharing and analysis center, information systems security engineering, infrastructure protection, integrity, intelligent threat, kerberos, level of protection, levels of concern, likelihood of occurrence, malicious, mission critical, misuse detection model, national computer security assessment program, network, network service worm, non-technical countermeasure, object, operation, operations security, operations security process, owner, penetration testing, physical security, ping sweep, policy, port scan, privileged, process, program, protocols, qualitative risk assessment, remediation, resource, review techniques, risk analysis, risk assessment, risk identification, risk management, risk value, robustness, rules based detection, security, security audit, security countermeasures, security incident, security threat, software, software assurance, standard, subject, system, system security authorization agreement, target, target identification and analysis techniques, technology, threat agent, threat analysis, threat source, total risk, trojan horse, unacknowledged special access program, unauthorized access, unilateral authentication, users,
- vulnerability analysis
- IncludedBy:analysis, risk analysis, vulnerability,
- Related:adversary, audit, critical, gap analysis, identify, information, security, system,
- Synonym:vulnerability assessment,
- vulnerability assessment
- IncludedBy:assessment, target of evaluation, vulnerability,
- Related:adversary, analysis, application, attack, compromise, control, countermeasures, critical, identification, identify, information, process, resource, security, security target, system, target,
- Synonym:vulnerability analysis,
- vulnerability audit
- IncludedBy:audit, vulnerability,
- Related:critical, identify, information, process, system,
- vulnerability scanning
- IncludedBy:vulnerability,
- waived special access program
- IncludedBy:access,
- waiver
- IncludedBy:risk management,
- Related:IT security, program, requirements,
- war dialer
- IncludedBy:threat,
- Related:communications, computer, program, system, telecommunications, war dialing,
- war dialing
- IncludedBy:threat,
- Related:connection, program, war dialer,
- war driving
- IncludedBy:exploit,
- Related:access, authorized, computer, computer network,
- warehouse attack
- IncludedBy:attack,
- Related:compromise, system,
- warfare
- Includes:acoustic warfare, antisubmarine warfare, biological warfare, chemical warfare, command and control warfare, directed-energy warfare, electronic warfare, electronic warfare support, guerrilla warfare, hybrid warfare, information warfare, irregular warfare, mine warfare, multinational warfare, naval coastal warfare, naval expeditionary warfare, naval special warfare, nuclear warfare, surface warfare, unconventional warfare, under sea warfare,
- Related:hybrid threat,
- warm site
- Wassenaar Arrangement
- Related:control, information, key, operation, risk, security,
- water supply system
- IncludedBy:critical infrastructures, system,
- Related:application, critical,
- watermarking
- HasPreferred:digital watermarking,
- weapons of mass destruction
- weapons system
- IncludedBy:system,
- web browser cache
- IncludedBy:world wide web,
- Related:access, access control, file, network, system,
- web browser plug-in
- web bug
- Related:information, threat, users,
- web content filtering software
- IncludedBy:software,
- Related:access, program,
- web of trust
- IncludedBy:trust,
- Includes:certificate, pretty good privacy,
- Related:file, key, network, public-key, public-key infrastructure, validate,
- web risk assessment
- IncludedBy:assessment, risk,
- Related:process,
- web server
- IncludedBy:world wide web,
- Related:computer, internet, process, software,
- web vs. Web
- IncludedBy:world wide web,
- Related:network, technology, trust,
- weblinking
- IncludedBy:world wide web,
- Related:users,
- website
- IncludedBy:world wide web,
- Related:access, access control, function, information, resource,
- website hosting
- IncludedBy:world wide web,
- Related:computer, internet, process,
- wedged
- IncludedBy:threat,
- Related:operation, software, system,
- white team
- Related:attack, security,
- white-box testing
- IncludedBy:security testing, test,
- Related:computer, function, module, program, software development,
- whitelist
- Related:application,
- wi-fi protected access-2
- IncludedBy:access,
- Related:security,
- wide area information service
- IncludedBy:information, internet,
- wide-area network
- IncludedBy:network,
- Related:access, access control, communications, computer network, local-area network, users,
- wiki
- Related:users,
- wimax
- Related:access,
- wired equivalent privacy
- IncludedBy:privacy,
- Related:security,
- wireless access point
- IncludedBy:access,
- wireless application protocol
- IncludedBy:application, protocols,
- Related:standard, standard generalized markup language,
- wireless device
- Related:control, system,
- wireless gateway server
- IncludedBy:gateway,
- Related:access, access control, computer, computer network, message,
- wireless intrusion detection and prevention system
- IncludedBy:intrusion, intrusion detection, system,
- Related:identify, protocols,
- wireless local area network
- IncludedBy:network,
- Related:security,
- wireless technology
- IncludedBy:technology,
- Related:connection, information,
- wiretapping
- IncludedBy:attack, threat consequence,
- Includes:active wiretapping, passive wiretapping,
- Related:access, access control, communications, connection, flow, gateway, information, network, system,
- witness
- Related:entity, evidence, hash, identity, tokens,
- word
- Related:function, hash,
- work breakdown structure
- work factor
- Related:countermeasures, cryptographic, cryptography, resource, risk, security, system,
- work product
- Related:file, process,
- work program
- IncludedBy:program,
- Related:audit, object,
- workcraft identity
- IncludedBy:identity,
- workflow
- IncludedBy:flow,
- Related:automated information system, information, process,
- workgroup computing
- Related:application, flow, software, system,
- working papers
- Related:classified,
- workload
- Related:automated information system, business process, function,
- workstation
- IncludedBy:automated information system,
- Related:access, access control, application, computer, information, key, process, program, system, users,
- world class organizations
- Related:business process, critical, model, process,
- world wide web
- IncludedBy:internet,
- Includes:CGI scripts, browser, common gateway interface, hyperlink, hypertext markup language, hypertext transfer protocol, secure hypertext transfer protocol, secure socket layer, virtual mall, web browser cache, web server, web vs. Web, weblinking, website, website hosting,
- Related:access, access control, applet, application, certificate, certificate owner, cookies, hypertext, information, link, pagejacking, plug-in modules, pop-up box, protocols, proxy server, push technology, retrieval, system, users,
- worm
- IncludedBy:exploit, internet, malicious code,
- Includes:Internet worm, mass mailing worm, morris worm, network service worm, network worm,
- Related:code, communications, computer, connection, distributed denial-of-service, infection, information, malicious, malware, module, network, process, program, replicator, resource, system, trojan horse, users, version, virus,
- wrap
- Related:confidentiality, cryptography, encryption, object, standard,
- write
- Includes:object, subject,
- Related:access, flow, information, operation,
- write access
- IncludedBy:access,
- Includes:object,
- write protect
- write-blocker
- X.400
- Related:email, message, standard, system,
- X.500
- HasPreferred:X.500 Directory,
- X.500 Directory
- PreferredFor:X.500,
- Related:X.509, application, certificate, information, key, object, process, public-key, public-key infrastructure, standard, subject, system, users,
- X.509
- IncludedBy:public-key infrastructure,
- Includes:X.509 attribute certificate, X.509 authority revocation list, X.509 certificate, X.509 certificate revocation list, X.509 public-key certificate,
- Related:CA certificate, Internet Policy Registration Authority, MISSI user, Open Systems Interconnection Reference model, PKCS #10, PKIX, SET private extension, X.500 Directory, authentication, certificate, certificate policy, certificate policy qualifier, certificate rekey, certificate renewal, certificate revocation, certificate revocation tree, certificate status responder, certificate update, certificate validation, certification authority, certification path, certification request, common name, critical, delta CRL, distinguished name, distribution point, encryption certificate, end entity, entity, extension, indirect certificate revocation list, invalidity date, issuer, key, key lifetime, key material identifier, object identifier, organizational certificate, personality label, policy approving authority, policy certification authority, policy creation authority, privacy enhanced mail, public-key, revocation date, self-signed certificate, signature certificate, slot, tokens, trust, v1 CRL, v1 certificate, v2 CRL, v2 certificate, v3 certificate,
- X.509 attribute certificate
- IncludedBy:X.509, certificate,
- Related:algorithm, digital signature, key, public-key, signature, subject, version,
- X.509 authority revocation list
- IncludedBy:X.509, authority, public-key infrastructure, revocation,
- Related:certificate, version,
- X.509 certificate
- IncludedBy:X.509, certificate,
- Related:key, public-key,
- X.509 certificate revocation list
- IncludedBy:X.509, certificate, public-key infrastructure, revocation,
- Related:algorithm, backup, digital signature, key, public-key, revoked state, signature, subject, update, users, version,
- X.509 public-key certificate
- IncludedBy:X.509, certificate, key, public-key,
- Related:algorithm, certification, digital signature, entity, signature, subject, version,
- Yellow book
- IncludedBy:rainbow series,
- Related:computer, computer security, criteria, evaluation, requirements, security, system, trust,
- zero fill
- Related:zeroize,
- zero-day exploit
- IncludedBy:exploit,
- Related:cyberspace, security,
- zero-knowledge password protocol
- IncludedBy:passwords, protocols,
- Related:authentication, verifier,
- zeroization
- Related:FIPS PUB 140-1, recovery,
- Synonym:zeroize,
- zeroize
- Related:FIPS PUB 140-1, cryptographic, cryptography, key, module, recovery, zero fill,
- Synonym:zeroization,
- zombie
- IncludedBy:threat,
- Related:attack, program, system,
- zone of control
- IncludedBy:control,