Glossary of Key Information Security Terms (NIST) part 51 / R

studied byStudied by 7 people
5.0(1)
Get a hint
Hint

Remediation Plan –

1 / 19

flashcard set

Earn XP

20 Terms

1

Remediation Plan –

A plan to perform the remediation of one or more threats or vulnerabilities facing an organization’s systems. The plan typically includes options to remove threats and vulnerabilities and priorities for performing the remediation.

New cards
2

Remote Access –

Access to an organizational information system by a user (or an information system acting on behalf of a user) communicating through an external network (e.g., the Internet). Access by users (or information systems) communicating external to an information system security perimeter. The ability for an organization’s users to access its nonpublic computing resources from external locations other than the organization’s facilities. Access to an organization's nonpublic information system by an authorized user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet).

New cards
3

Remote Diagnostics/Maintenance –

Maintenance activities conducted by authorized individuals communicating through an external network (e.g., the Internet).

New cards
4

Remote Maintenance –

Maintenance activities conducted by individuals communicating external to an information system security perimeter. Maintenance activities conducted by individuals communicating through an external network (e.g., the Internet).

New cards
5

Remote Rekeying –

Procedure by which a distant crypto-equipment is rekeyed electrically. See Automatic Remote Rekeying and Manual Remote Rekeying.

New cards
6

Removable Media –

Portable electronic storage media such as magnetic, optical, and solid-state devices, which can be inserted into and removed from a computing device, and that is used to store text, video, audio, and image information. Such devices have no independent processing capabilities. Examples include hard disks, floppy disks, zip drives, compact disks (CDs), thumb drives, pen drives, and similar USB storage devices.

New cards
7

Renew (a certificate) –

The act or process of extending the validity of the data binding asserted by a public key certificate by issuing a new certificate.

New cards
8

Repair Action –

NSA-approved change to a COMSEC end-item that does not affect the original characteristics of the end-item and is provided for optional application by holders. Repair actions are limited to minor electrical and/or mechanical improvements to enhance operation, maintenance, or reliability. They do not require an identification label, marking, or control but must be fully documented by changes to the maintenance manual.

New cards
9

Replay Attacks –

An attack that involves the capture of transmitted authentication or access control information and its subsequent retransmission with the intent of producing an unauthorized effect or gaining unauthorized access.

New cards
10

Repository –

A database containing information and data relating to certificates as specified in a CP; may also be referred to as a directory.

New cards
11

Reserve Keying Material –

Key held to satisfy unplanned needs. See Contingency Key.

New cards
12

Residual Risk –

The remaining potential risk after all IT security measures are applied. There is a residual risk associated with each threat. Portion of risk remaining after security measures have been applied.

New cards
13

Residue –

Data left in storage after information-processing operations are complete, but before degaussing or overwriting has taken place.

New cards
14

Resilience –

The ability to quickly adapt and recover from any known or unknown changes to the environment through holistic implementation of risk management, contingency, and continuity planning. The ability to continue to: (i) operate under adverse conditions or stress, even if in a degraded or debilitated state, while maintaining essential operational capabilities; and (ii) recover to an effective operational posture in a time frame consistent with mission needs.

New cards
15

Resource Encapsulation –

Method by which the reference monitor mediates accesses to an information system resource. Resource is protected and not directly accessible by a subject. Satisfies requirement for accurate auditing of resource usage.

New cards
16

Responder –

The entity that responds to the initiator of the authentication exchange.

New cards
17

Responsible Individual –

A trustworthy person designated by a sponsoring organization to authenticate individual applicants seeking certificates on the basis of their affiliation with the sponsor.

New cards
18

Responsibility to Provide –

An information distribution approach whereby relevant essential information is made readily available and discoverable to the broadest possible pool of potential users.

New cards
19

Restricted Data –

All data concerning (i) design, manufacture, or utilization of atomic weapons; (ii) the production of special nuclear material; or (iii) the use of special nuclear material in the production of energy, but shall not include data declassified or removed from the Restricted Data category pursuant to Section 142 [of the Atomic Energy Act of 1954].

New cards
20

Revoke a Certificate –

To prematurely end the operational period of a certificate effective at a specific date and time.

New cards

Explore top notes

note Note
studied byStudied by 39 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 52 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 292 people
... ago
5.0(1)
note Note
studied byStudied by 160 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (40)
studied byStudied by 31 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 71 people
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 33 people
... ago
5.0(2)
flashcards Flashcard (83)
studied byStudied by 136 people
... ago
5.0(2)
flashcards Flashcard (32)
studied byStudied by 40 people
... ago
5.0(1)
flashcards Flashcard (106)
studied byStudied by 52 people
... ago
5.0(1)
robot