home/dictionary/framework/NIST SP 800-27

Dictionary · NIST SP 800-27

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
20 senses under NIST SP 800-27

Nouns

20 senses
accountability

The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.

Assurance

Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software), and (3) sufficient resistance to intentional penetration or by-pass.

Authentication

Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.

Availability

Ensuring timely and reliable access to and use of information.

Confidentiality

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

data integrity

The property that data has not been altered in an unauthorized manner. Data integrity covers data in storage, during processing, and while in transit.

Domain

A set of subjects, their information objects, and a common security policy.

Entity

Either a subject (an active element that operates on information or the system state) or an object (a passive element that contains or receives information).

Integrity

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.

IT Security Architecture

A description of security principles and an overall approach for complying with the principles that drive the system design; i.e., guidelines on the placement and implementation of specific security services within various distributed computing environments.

IT-Related Risk

The net mission/business impact considering 1) the likelihood that a particular threat source will exploit, or trigger, a particular information system vulnerability, and 2) the resulting impact if this should occur. IT-related risks arise from legal liability or mission/business loss due to, but not limited to: - Unauthorized (malicious, non-malicious, or accidental) disclosure, modification, or destruction of information; - Non-malicious errors and omissions; - IT disruptions due to natural or man-made disasters; or - Failure to exercise due care and diligence in the implementation and operation of the IT.

risk analysis

The process of identifying the risks to system security and determining the likelihood of occurrence, the resulting impact, and the additional safeguards that mitigate this impact. Part of risk management and synonymous with risk assessment.

object

A passive entity that contains or receives information.

Security Goals

The five security goals are confidentiality, availability, integrity, accountability, and assurance.

Security Domain

A set of subjects, their information objects, and a common security policy.

Security Service

A capability that supports one, or many, of the security goals. Examples of security services are key management, access control, and authentication.

security policy

The statement of required protection of the information objects.

system integrity

The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.

Threat analysis

The examination of threat sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.

threat

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.