Glossary of Key Information Security Terms (NIST) part 50 / R

studied byStudied by 2 people
5.0(1)
Get a hint
Hint

Records –

1 / 19

flashcard set

Earn XP

20 Terms

1

Records –

The recordings (automated and/or manual) of evidence of activities performed or results achieved (e.g., forms, reports, test results), which serve as a basis for verifying that the organization and the information system are performing as intended. Also used to refer to units of related data fields (i.e., groups of data fields that can be accessed by a program and that contain the complete set of information on particular items).

New cards
2

Records Management –

The process for tagging information for records-keeping requirements as mandated in the Federal Records Act and the National Archival and Records Requirements.

New cards
3

Recovery Point Objective –

The point in time to which data must be recovered after an outage.

New cards
4

Recovery Time Objective –

The overall length of time an information system’s components can be in the recovery phase before negatively impacting the organization’s mission or mission/business functions.

New cards
5

Recovery Procedures –

Actions necessary to restore data files of an information system and computational capability after a system failure.

New cards
6

RED –

In cryptographic systems, refers to information or messages that contain sensitive or classified information that is not encrypted. See also BLACK.

New cards
7

Red Signal –

Any electronic emission (e.g., plain text, key, key stream, subkey stream, initial fill, or control signal) that would divulge national security information if recovered.

New cards
8

Red Team –

A group of people authorized and organized to emulate a potential adversary’s attack or exploitation capabilities against an enterprise’s security posture. The Red Team’s objective is to improve enterprise Information Assurance by demonstrating the impacts of successful attacks and by demonstrating what works for the defenders (i.e., the Blue Team) in an operational environment.

New cards
9

Red Team Exercise –

An exercise, reflecting real-world conditions, that is conducted as a simulated adversarial attempt to compromise organizational missions and/or business processes to provide a comprehensive assessment of the security capability of the information system and organization.

New cards
10

Red/Black Concept –

Separation of electrical and electronic circuits, components, equipment, and systems that handle unencrypted information (Red), in electrical form, from those that handle encrypted information (Black) in the same form.

New cards
11

Reference Monitor –

The security engineering term for IT functionality that— 1) controls all access, 2) cannot be bypassed, 3) is tamper-resistant, and 4) provides confidence that the other three items are true. Concept of an abstract machine that enforces Target of Evaluation (TOE) access control policies.

New cards
12

Registration –

The process through which a party applies to become a subscriber of a Credentials Service Provider (CSP) and a Registration Authority validates the identity of that party on behalf of the CSP. The process through which an Applicant applies to become a Subscriber of a CSP and an RA validates the identity of the Applicant on behalf of the CSP.

New cards
13

Registration Authority (RA) –

A trusted entity that establishes and vouches for the identity of a Subscriber to a CSP. The RA may be an integral part of a CSP, or it may be independent of a CSP, but it has a relationship to the CSP(s).

New cards
14

Registration Authority – (RA)

Organization responsible for assignment of unique identifiers to registered objects.

New cards
15

Rekey –

To change the value of a cryptographic key that is being used in a cryptographic system/application.

New cards
16

Rekey (a certificate) –

To change the value of a cryptographic key that is being used in a cryptographic system application; this normally entails issuing a new certificate on the new public key.

New cards
17

Release Prefix –

Prefix appended to the short title of U.S.-produced keying material to indicate its foreign releasability. "A" designates material that is releasable to specific allied nations, and "U.S." designates material intended exclusively for U. S. use.

New cards
18

Relying Party –

An entity that relies upon the subscriber’s credentials, typically to process a transaction or grant access to information or a system. An entity that relies upon the Subscriber's token and credentials or a Verifier's assertion of a Claimant’s identity, typically to process a transaction or grant access to information or a system.

New cards
19

Remanence –

Residual information remaining on storage media after clearing. See Magnetic Remanence and Clearing.

New cards
20

Remediation –

The act of correcting a vulnerability or eliminating a threat. Three possible types of remediation are installing a patch, adjusting configuration settings, or uninstalling a software application. The act of mitigating a vulnerability or a threat.

New cards

Explore top notes

note Note
studied byStudied by 11 people
... ago
5.0(2)
note Note
studied byStudied by 3906 people
... ago
4.7(25)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 17 people
... ago
5.0(1)
note Note
studied byStudied by 58 people
... ago
4.5(2)
note Note
studied byStudied by 60 people
... ago
5.0(1)
note Note
studied byStudied by 3 people
... ago
5.0(1)
note Note
studied byStudied by 108 people
... ago
5.0(4)

Explore top flashcards

flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (31)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (86)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (56)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (77)
studied byStudied by 254 people
... ago
5.0(3)
flashcards Flashcard (38)
studied byStudied by 9 people
... ago
5.0(1)
flashcards Flashcard (101)
studied byStudied by 28 people
... ago
5.0(2)
robot