Glossary of Key Information Security Terms (NIST) part 30 / I

5.0(1)
Studied by 6 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

Last updated 3:58 PM on 10/26/22
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards
IA Infrastructure –
The underlying security framework that lies beyond an enterprise’s defined boundary, but supports its IA and IA-enabled products, its security posture and its risk management plan.
2
New cards
IA Product –
Product whose primary purpose is to provide security services (e.g., confidentiality, authentication, integrity, access control, non-repudiation of data); correct known vulnerabilities; and/or provide layered defense against various categories of non-authorized or malicious penetrations of information systems or networks.
3
New cards
IA-Enabled Information Technology Product –
Product or technology whose primary role is not security, but which provides security services as an associated feature of its intended operating capabilities. Examples include such products as security-enabled Web browsers, screening routers, trusted operating systems, and security-enabled messaging systems.
4
New cards
IA-Enabled Product –
Product whose primary role is not security, but provides security services as an associated feature of its intended operating capabilities. Note: Examples include such products as security-enabled Web browsers, screening routers, trusted operating systems, and security enabling messaging systems.
5
New cards
Identification –
The process of verifying the identity of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system.
6
New cards
Identification –
The process of discovering the true identity (i.e., origin, initial history) of a person or item from the entire collection of similar persons or items. An act or process that presents an identifier to a system so that the system can recognize a system entity (e.g., user, process, or device) and distinguish that entity from all others.
7
New cards
Identifier –
Unique data used to represent a person’s identity and associated attributes. A name or a card number are examples of identifiers. A data object - often, a printable, non-blank character string - that definitively represents a specific identity of a system entity, distinguishing that identity from all others.
8
New cards
Identity –
A set of attributes that uniquely describe a person within a given context. The set of physical and behavioral characteristics by which an individual is uniquely recognizable. The set of attribute values (i.e., characteristics) by which an entity is recognizable and that, within the scope of an identity manager’s responsibility, is sufficient to distinguish that entity from any other entity.
9
New cards
Identity-Based Access Control –
Access control based on the identity of the user (typically relayed as a characteristic of the process acting on behalf of that user) where access authorizations to specific objects are assigned based on user identity.
10
New cards
Identity-Based Security Policy –
A security policy based on the identities and/or attributes of the object (system resource) being accessed and of the subject (user, group of users, process, or device) requesting access.
11
New cards
Identity Binding –
Binding of the vetted claimed identity to the individual (through biometrics) according to the issuing authority.
12
New cards
Identity Proofing –
The process by which a Credentials Service Provider (CSP) and a Registration Authority (RA) collect and verify information about a person for the purpose of issuing credentials to that person.
13
New cards
Identity Proofing –
The process of providing sufficient information (e.g., identity history, credentials, documents) to a Personal Identity Verification Registrar when attempting to establish an identity.
14
New cards
Identity Registration –
The process of making a person’s identity known to the Personal Identity Verification (PIV) system, associating a unique identifier with that identity, and collecting and recording the person’s relevant attributes into the system.
15
New cards
Identity Token –
Smart card, metal key, or other physical object used to authenticate identity.
16
New cards
Identity Validation –
Tests enabling an information system to authenticate users or resources.
17
New cards
Identity Verification –
The process of confirming or denying that a claimed identity is correct by comparing the credentials (something you know, something you have, something you are) of a person requesting access with those previously proven and stored in the PIV Card of system and associated with the identity being claimed.
18
New cards
Identity Verification –
The process of confirming or denying that a claimed identity is correct by comparing the credentials (something you know, something you have, something you are) of a person requesting access with those previously proven and stored in the PIV Card or system and associated with the identity being claimed.
19
New cards
Image –
An exact bit-stream copy of all electronic data on a device, performed in a manner that ensures that the information is not altered.
20
New cards
Imitative Communications Deception –
Introduction of deceptive messages or signals into an adversary's telecommunications signals. See also Communications Deception and Manipulative Communications Deception.

Explore top notes

note
Observation and Critique Exercise
Updated 626d ago
0.0(0)
note
Of Mice and Men - Study Guide
Updated 1275d ago
0.0(0)
note
Mental Health
Updated 323d ago
0.0(0)
note
Chapter 22: Solutions
Updated 1032d ago
0.0(0)
note
WW2 1939-1945
Updated 1386d ago
0.0(0)
note
Chapter 8 - Acids, Bases, and pH
Updated 1437d ago
0.0(0)
note
Observation and Critique Exercise
Updated 626d ago
0.0(0)
note
Of Mice and Men - Study Guide
Updated 1275d ago
0.0(0)
note
Mental Health
Updated 323d ago
0.0(0)
note
Chapter 22: Solutions
Updated 1032d ago
0.0(0)
note
WW2 1939-1945
Updated 1386d ago
0.0(0)
note
Chapter 8 - Acids, Bases, and pH
Updated 1437d ago
0.0(0)

Explore top flashcards

flashcards
Gilded Age Study Guide
74
Updated 729d ago
0.0(0)
flashcards
Semester Exam Revision
182
Updated 478d ago
0.0(0)
flashcards
VOCAB FINAL HAMILTON
83
Updated 1192d ago
0.0(0)
flashcards
Verbs (me-)
41
Updated 1026d ago
0.0(0)
flashcards
Unit 3: Iceland
24
Updated 892d ago
0.0(0)
flashcards
Sociology 2463 Midterm 2
216
Updated 101d ago
0.0(0)
flashcards
Gilded Age Study Guide
74
Updated 729d ago
0.0(0)
flashcards
Semester Exam Revision
182
Updated 478d ago
0.0(0)
flashcards
VOCAB FINAL HAMILTON
83
Updated 1192d ago
0.0(0)
flashcards
Verbs (me-)
41
Updated 1026d ago
0.0(0)
flashcards
Unit 3: Iceland
24
Updated 892d ago
0.0(0)
flashcards
Sociology 2463 Midterm 2
216
Updated 101d ago
0.0(0)