Dictionary · NIST SP 800-12
L2 — definitions grouped by regulatory framework.
Nouns
8 senses- attack signature
A specific sequence of events indicative of an unauthorized access attempt.
- Audit Reduction Tools
Preprocessors designed to reduce the volume of audit records to facilitate manual review. Before a security review, these tools can remove many audit records known to have little security significance. These tools generally remove records generated by specified classes of events, such as records generated by nightly backups.
- End-to-End Encryption
Communications encryption in which data is encrypted when being passed through a network, but routing information remains visible.
- Keystroke Monitoring
The process used to view or record both the keystrokes entered by a computer user and the computer’s response during an interactive session. Keystroke monitoring is usually considered a special case of audit trails.
- least privilege
The security objective of granting users only those accesses they need to perform their official duties.
- Link Encryption
Link encryption encrypts all of the data along a communications path (e.g., a satellite link, telephone circuit, or T1 line). Since link encryption also encrypts routing data, communications nodes need to decrypt the data to continue routing.
- User Account Management
Involves 1) the process of requesting, establishing, issuing, and closing user accounts; 2) tracking users and their respective access authorizations; and 3) managing these functions.
- Privileged Account
Individuals who have access to set “access rights” for users on a given system. Sometimes referred to as system or network administrative accounts.