A specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, and security management) defined by an organization or in some instances, by a specific law, executive order, directive, policy, or regulation.
(1) The value of information is dependent on who needs the information (i.e., insider or outsider of an organization) and its worth to this person. (2) A qualitative measure of the importance of the information based upon factors such as level of robustness of the information assurance controls allocated to the protection of information based upon mission criticality, the sensitivity (e.g., classification and compartmentalization) of the information, releasability to other entities, perishability/longevity of the information (e.g., short life data versus long life data), and potential impact of loss of confidentiality, integrity, and availability of the information.
Software unit that provides application functionality not related to business functionality, such as error/message handling, audit trails, or security.
(1) Filtering of incoming network traffic. (2) Blocking incoming packets that should not enter a network. (3) The process of blocking incoming packets that use obviously false IP addresses, such as reserved source addresses.
(1) A situation in which an information system or an application system receives protection from security controls (or portions of security controls) that are implemented by other entities either internal or external to the organization where the system resides. (2) A mechanism that allows objects of a class to acquire part of their definition from another class (called a super class). Inheritance can be regarded as a method for sharing a behavioral description.
A process of copying the resident operating system into the computer’s read memory.
(1) A non-secret binary vector used in defining the starting point of an encryption process within a cryptographic algorithm. (2) A data block that some modes of operation require as an additional initial input.
A sensor deployed so that the network traffic it is monitoring must pass through it.
A data block that is an input to either the forward cipher function or the inverse cipher function of the block cipher algorithm.
An attack originating from inside a protected network, either malicious or nonmalicious.
A facility for exchanging messages in real-time with other people over the Internet and tracking the progress of the conversation.
A worldwide digital communications network evolving from existing telephone services. The goal of ISDN is to replace the current analog telephone system with totally digital switching and transmission facilities capable of carrying data ranging from voice to computer transmission, music, and video. Computers and other devices are connected to ISDN lines through simple, standardized interfaces. When fully implemented, ISDN is expected to provide users with faster, more extensive communications services in data, video, and voice.
A process to confirm that program units are linked together and that they interface with files or databases correctly. This is a management and preventive control.
(1) The property that protected and sensitive data has not been modified or deleted in an unauthorized and undetected manner. (2) Preservation of the original quality and accuracy of data in written or electronic form. (3) Guarding against improper information modification or destruction, (4) Ensuring information nonrepudiation and authenticity. (5) The ability to detect even minute changes in the data.
A level of trustworthiness associated with a subject or object.
Useful artistic, technical, and/or industrial information, knowledge or ideas that convey ownership and control of tangible or virtual usage and/or representation.
An entity that intends to generate digital signatures in the future.
The process of slipping in between communications and hijacking communications channels.
The act of impeding or denying the use of a computer system resource to a user.
The common boundary between independent systems or modules where communication takes place.