Glossary of Key Information Security Terms (NIST) part 29 / H - I

studied byStudied by 8 people
5.0(1)
Get a hint
Hint

Hardening –

1 / 19

flashcard set

Earn XP

20 Terms

1

Hardening –

Configuring a host’s operating systems and applications to reduce the host’s security weaknesses.

New cards
2

Hardware –

The physical components of an information system. See also Software and Firmware.

New cards
3

Hardwired Key –

Permanently installed key.

New cards
4

Hash Function 1 –

A function that maps a bit string of arbitrary length to a fixed length bit string. Approved hash functions satisfy the following properties: 1) One-Way. It is computationally infeasible to find any input that maps to any prespecified output. 2) Collision Resistant. It is computationally infeasible to find any two distinct inputs that map to the same output.

New cards
5

Hash Function 2 –

A mathematical function that maps a string of arbitrary length (up to a predetermined maximum size) to a fixed length string. A function that maps a bit string of arbitrary length to a fixed length bit string. Approved hash functions are specified in FIPS 180 and are designed to satisfy the following properties: 1. (One-way) It is computationally infeasible to find any input that maps to any new prespecified output, and 2. (Collision resistant) It is computationally infeasible to find any two distinct inputs that map to the same output.

New cards
6

Hash Total –

Value computed on data to detect error or manipulation. See Checksum.

New cards
7

Hash Value –

The result of applying a cryptographic hash function to data (e.g., a message).

New cards
8

Hash-based Message Authentication Code – (HMAC)

A message authentication code that uses a cryptographic key in conjunction with a hash function. A message authentication code that utilizes a keyed hash.

New cards
9

Hashing –

The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data.

New cards
10

Hashword –

Memory address containing hash total.

New cards
11

Health Information Exchange – (HIE)

A health information organization that brings together healthcare stakeholders within a defined geographic area and governs health information exchange among them for the purpose of improving health and care in that community.

New cards
12

High Assurance Guard (HAG) –

An enclave boundary protection device that controls access between a local area network that an enterprise system has a requirement to protect, and an external network that is outside the control of the enterprise system, with a high degree of assurance. A guard that has two basic functional capabilities: a Message Guard and a Directory Guard. The Message Guard provides filter service for message traffic traversing the Guard between adjacent security domains. The Directory Guard provides filter service for directory access and updates traversing the Guard between adjacent security domains.

New cards
13

High Availability –

A failover feature to ensure availability during device or component interruptions.

New cards
14

High Impact –

The loss of confidentiality, integrity, or availability that could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, individuals, other organizations, or the national security interests of the United States; (i.e., 1) causes a severe degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced; 2) results in major damage to organizational assets; 3) results in major financial loss; or 4) results in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries).

New cards
15

High-Impact System –

An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a FIPS 199 potential impact value of high. An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a potential impact value of high.

New cards
16

Honeypot –

A system (e.g., a Web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders and has no authorized users other than its administrators.

New cards
17

Hot Site –

A fully operational offsite data processing facility equipped with hardware and software, to be used in the event of an information system disruption. Backup site that includes phone systems with the phone lines already connected. Networks will also be in place, with any necessary routers and switches plugged in and turned on. Desks will have desktop PCs installed and waiting, and server areas will be replete with the necessary hardware to support business-critical functions. Within a few hours, a hot site can become a fully functioning element of an organization.

New cards
18

Hot Wash –

A debrief conducted immediately after an exercise or test with the staff and participants.

New cards
19

Hybrid Security Control –

A security control that is implemented in an information system in part as a common control and in part as a system-specific control.

New cards
20

IA Architecture –

A description of the structure and behavior for an enterprise’s security processes, information security systems, personnel and organizational sub-units, showing their alignment with the enterprise’s mission and strategic plans.

New cards

Explore top notes

note Note
studied byStudied by 39 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 52 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 292 people
... ago
5.0(1)
note Note
studied byStudied by 160 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (40)
studied byStudied by 31 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 71 people
... ago
5.0(1)
flashcards Flashcard (28)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (23)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 33 people
... ago
5.0(2)
flashcards Flashcard (83)
studied byStudied by 136 people
... ago
5.0(2)
flashcards Flashcard (32)
studied byStudied by 40 people
... ago
5.0(1)
flashcards Flashcard (106)
studied byStudied by 52 people
... ago
5.0(1)
robot