Glossary of Key Information Security Terms (NIST) part 48 / P

studied byStudied by 2 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 19

flashcard set

Earn XP

20 Terms

1

Privileged Process –

A computer process that is authorized (and, therefore, trusted) to perform security-relevant functions that ordinary processes are not authorized to perform.

New cards
2

Privileged User –

A user that is authorized (and, therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform.

New cards
3

Probe –

A technique that attempts to access a system to learn something about the system.

New cards
4

Product Source Node (PSN) –

The Key Management Infrastructure core node that provides central generation of cryptographic key material.

New cards
5

Production Model –

INFOSEC equipment in its final mechanical and electrical form.

New cards
6

Profiling –

Measuring the characteristics of expected activity so that changes to it can be more easily identified.

New cards
7

Promiscuous Mode –

A configuration setting for a network interface card that causes it to accept all incoming packets that it sees, regardless of their intended destinations.

New cards
8

Proprietary Information (PROPIN) –

Material and information relating to or associated with a company's products, business, or activities, including but not limited to financial information; data or statements; trade secrets; product research and development; existing and future product designs and performance specifications; marketing plans or techniques; schematics; client lists; computer programs; processes; and know-how that has been clearly identified and properly marked by the company as proprietary information, trade secrets, or company confidential information. The information must have been developed by the company and not be available to the government or to the public without restriction from another source.

New cards
9

Protected Distribution System (PDS) –

Wire line or fiber optic system that includes adequate safeguards and/or countermeasures (e.g., acoustic, electric, electromagnetic, and physical) to permit its use for the transmission of unencrypted information through an area of lesser classification or control.

New cards
10

Protection Philosophy –

Informal description of the overall design of an information system delineating each of the protection mechanisms employed. Combination of formal and informal techniques, appropriate to the evaluation class, used to show the mechanisms are adequate to enforce the security policy.

New cards
11

Protection Profile –

Common Criteria specification that represents an implementation-independent set of security requirements for a category of Target of Evaluations (TOE) that meets specific consumer needs.

New cards
12

Protective Distribution System –

Wire line or fiber optic system that includes adequate safeguards and/or countermeasures (e.g., acoustic, electric, electromagnetic, and physical) to permit its use for the transmission of unencrypted information.

New cards
13

Protective Packaging –

Packaging techniques for COMSEC material that discourage penetration, reveal a penetration has occurred or was attempted, or inhibit viewing or copying of keying material prior to the time it is exposed for use.

New cards
14

Protective Technologies –

Special tamper-evident features and materials employed for the purpose of detecting tampering and deterring attempts to compromise, modify, penetrate, extract, or substitute information processing equipment and keying material.

New cards
15

Protocol –

Set of rules and formats, semantic and syntactic, permitting information systems to exchange information.

New cards
16

Protocol Data Unit –

A unit of data specified in a protocol and consisting of protocol information and, possibly, user data.

New cards
17

Protocol Entity –

Entity that follows a set of rules and formats (semantic and syntactic) that determines the communication behavior of other entities.

New cards
18

Proxy –

A proxy is an application that “breaks” the connection between client and server. The proxy accepts certain types of traffic entering or leaving a network and processes it and forwards it. This effectively closes the straight path between the internal and external networks making it more difficult for an attacker to obtain internal addresses and other details of the organization’s internal network. Proxy servers are available for common Internet services; for example, a Hyper Text Transfer Protocol (HTTP) proxy used for Web access, and a Simple Mail Transfer Protocol (SMTP) proxy used for email.

New cards
19

Proxy Agent –

A software application running on a firewall or on a dedicated proxy server that is capable of filtering a protocol and routing it between the interfaces of the device.

New cards
20

Proxy Server –

A server that services the requests of its clients by forwarding those requests to other servers.

New cards
robot