Glossary of Key Information Security Terms (NIST) part 28 / F - G - H

4.7(3)
Studied by 30 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

Last updated 3:54 PM on 10/26/22
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards
Formal Method –
Mathematical argument which verifies that the system satisfies a mathematically-described security policy.
2
New cards
Formal Proof –
Complete and convincing mathematical argument presenting the full logical justification for each proof step and for the truth of a theorem or set of theorems.
3
New cards
Formal Security Policy –
Mathematically-precise statement of a security policy.
4
New cards
Formatting Function –
The function that transforms the payload, associated data, and nonce into a sequence of complete blocks.
5
New cards
Forward Cipher –
One of the two functions of the block cipher algorithm that is determined by the choice of a cryptographic key. The term “forward cipher operation” is used for TDEA, while the term “forward transformation” is used for DEA.
6
New cards
Frequency Hopping –
Repeated switching of frequencies during radio transmission according to a specified algorithm, to minimize unauthorized interception or jamming of telecommunications.
7
New cards
Full Disk Encryption (FDE) –
The process of encrypting all the data on the hard disk drive used to boot a computer, including the computer’s operating system, and permitting access to the data only after successful authentication with the full disk encryption product.
8
New cards
Full Maintenance –
Complete diagnostic repair, modification, and overhaul of COMSEC equipment, including repair of defective assemblies by piece part replacement. See Limited Maintenance.
9
New cards
Functional Testing –
Segment of security testing in which advertised security mechanisms of an information system are tested under operational conditions.
10
New cards
Gateway –
Interface providing compatibility between networks by converting transmission speeds, protocols, codes, or security measures.
11
New cards
General Support System –
An interconnected set of information resources under the same direct management control that shares common functionality. It normally includes hardware, software, information, data, applications, communications, and people.
12
New cards
Global Information Grid (GIG) –
The globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. Non-GIG IT includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network.
13
New cards
Global Information Infrastructure – (GII)
Worldwide interconnections of the information systems of all countries, international and multinational organizations, and international commercial communications.
14
New cards
Graduated Security –
A security system that provides several levels (e.g., low, moderate, high) of protection based on threats, risks, available technology, support services, time, human concerns, and economics.
15
New cards
Group Authenticator –
Used, sometimes in addition to a sign-on authenticator, to allow access to specific data or functions that may be shared by all members of a particular group.
16
New cards
Guard (System) –
A mechanism limiting the exchange of information between information systems or subsystems.
17
New cards
Guessing Entropy –
A measure of the difficulty that an Attacker has to guess the average password used in a system. In this document, entropy is stated in bits. When a password has n-bits of guessing entropy then an attacker has as much difficulty guessing the average password as in guessing an n-bit random quantity. The attacker is assumed to know the actual password frequency distribution.
18
New cards
Hacker –
Unauthorized user who attempts to or gains access to an information system.
19
New cards
Handshaking Procedures –
Dialogue between two information systems for synchronizing, identifying, and authenticating themselves to one another.
20
New cards
Hard Copy Key –
Physical keying material, such as printed key lists, punched or printed key tapes, or programmable, read-only memories (PROM).

Explore top notes

note
Honors Chemistry 2020-21
Updated 765d ago
0.0(0)
note
TheCell7e Ch12 Lecture
Updated 467d ago
0.0(0)
note
Chapter 23: Lipids
Updated 1259d ago
0.0(0)
note
Digestion and Absorption
Updated 891d ago
0.0(0)
note
Romantyzm
Updated 185d ago
0.0(0)
note
Object pronouns
Updated 1183d ago
0.0(0)
note
Honors Chemistry 2020-21
Updated 765d ago
0.0(0)
note
TheCell7e Ch12 Lecture
Updated 467d ago
0.0(0)
note
Chapter 23: Lipids
Updated 1259d ago
0.0(0)
note
Digestion and Absorption
Updated 891d ago
0.0(0)
note
Romantyzm
Updated 185d ago
0.0(0)
note
Object pronouns
Updated 1183d ago
0.0(0)

Explore top flashcards

flashcards
ASD 3 Repaso B Vocabulario
91
Updated 940d ago
0.0(0)
flashcards
La Llorona Vocab
45
Updated 1042d ago
0.0(0)
flashcards
Soph L1 Vocab
300
Updated 695d ago
0.0(0)
flashcards
Korean Hangul~!
44
Updated 1227d ago
0.0(0)
flashcards
APES Unit 1 Test Review
47
Updated 927d ago
0.0(0)
flashcards
Spanish Numbers (0-100)
111
Updated 913d ago
0.0(0)
flashcards
ASD 3 Repaso B Vocabulario
91
Updated 940d ago
0.0(0)
flashcards
La Llorona Vocab
45
Updated 1042d ago
0.0(0)
flashcards
Soph L1 Vocab
300
Updated 695d ago
0.0(0)
flashcards
Korean Hangul~!
44
Updated 1227d ago
0.0(0)
flashcards
APES Unit 1 Test Review
47
Updated 927d ago
0.0(0)
flashcards
Spanish Numbers (0-100)
111
Updated 913d ago
0.0(0)