All > Technology > Security
The entity in a public key infrastructure (PKI) that is responsible for issuing certificates and exacting compliance to a PKI policy.
- Browse Related Terms: CA (Certification Authority), certification, Certification Practice Statement (CPS), CRL (Certificate Revocation List), Duration, On-Line Certificate Status Protocol (OCSP), Online Certification Status Protocol (OCSP), public key infrastructure (PKI), Re-key (a certificate), Renew (a certificate), Update (a Certificate), X.509 Certificate, X.509 Public Key Certificate
Also listed in:
All > Technology > Security
The method of taking a biometric sample from an end user. Source: FIPS 201
- Browse Related Terms: biometric, Biometric Information, Biometric System, Biometric Template, Capture, Comparison, identifier, Match/matching, Template
All > Technology > Security > Biometrics
The process of collecting a biometric sample from an individual via a sensor. See also submission.
- Browse Related Terms: Capture, Cooperative User, Covert, database, Eavesdropping, end user, Failure to Acquire (FTA), Failure to Enroll (FTE), Indifferent User, Non-cooperative User, Overt, record, Skimming, Submission, Uncooperative User, user
All > Technology > Security
An individual possessing an issued Personal Identity Verification (PIV) card. Source: FIPS 201
- Browse Related Terms: Cardholder, Identity Registration, Identity Verification, interoperability, Mandatory Topography, Off-Card, On-Card, Optional Topography, Parent Organization, Personal Identity Verification Card (PIV Card), Personal Identity Verification Issuance Authority, Standard Topography, topology, Verification
All > Technology > Security
Small FBI Cyber Action Teams made up of computer analysts, forensic investigators and malicious-code experts ready to travel anywhere in the world where a cyber intrusion occurred.
- Browse Related Terms: Blended Attack, Botnet (also zombies), CATS, false positive, information, Intrusion Detection System (IDS), remediation, Sanitization, SPAM, Spyware, Warez
Also listed in:
- All > Technology > Defense
All > Technology > Security
SEE Cipher Block Chaining-Message Authentication Code
- Browse Related Terms: Advanced Encryption Standard (AES), Approved Mode of Operation, Authentication Mode, Block Cipher, CBC/MAC, CCM, Cipher Block Chaining-Message Authentication Code (CBC-MAC), Cipher Suite, Counter with Cipher Block Chaining-Message Authentication Code (CCM), Egress Filtering, Formatting Function, Forward Cipher, Ingress Filtering, mode of operation
All > Technology > Security > Biometrics
A standard that provides the ability for a system to identify, and interface with, multiple biometric systems, and to exchange data between system components.
- Browse Related Terms: Automated Fingerprint Identification System (AFIS), benchmarking, Binning, Biometric System, CBEFF (Common Biometric Exchange Formats Framework), Claim of identity, Comparison, Enrollment, Extraction, Identification, Noise, One-to-many, One-to-one, Probe, Throughput Rate, Verification
All > Technology > Security
SEE Counter with Cipher-Block Chaining-Message Authentication Code
- Browse Related Terms: Advanced Encryption Standard (AES), Approved Mode of Operation, Authentication Mode, Block Cipher, CBC/MAC, CCM, Cipher Block Chaining-Message Authentication Code (CBC-MAC), Cipher Suite, Counter with Cipher Block Chaining-Message Authentication Code (CCM), Egress Filtering, Formatting Function, Forward Cipher, Ingress Filtering, mode of operation
Also listed in:
- All > Technology > Defense
All > Technology > Security
A set of data that uniquely identifies an entity, contains the entitys public key and possibly other information, and is digitally signed by a trusted party, thereby binding the public key to the entity. Additional information in the certificate could specify how the key is used and its cryptoperiod.
- Browse Related Terms: certificate, indication, Multiple Component Incident, Precursor, Public Key Infrastructure, public-key certificate, Trusted Timestamp, User Registration
Also listed in:
- All > Law > E-Discovery
- All > Technology > E-mail > Lotus Domino
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2003
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007
- All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 5.5
- All > Technology > Operating System > Microsoft Windows > Microsoft Windows Server > Microsoft Active Directory
- All > Technology > Parallel Computing > Cloud Computing > Amazon Web Services
- All > Technology > Parallel Computing > Grid Computing
- All > Technology > Search > Enterprise Search
- All > Technology > Telecommunications
All > Technology > Security
A Certification Authority (CA) or a Registration Authority (RA).
- Browse Related Terms: applicant, Binding, Certificate Management Authority (CMA), Certificate Status Authority, Certificate-Related Information, Credentials Service Provider (CSP), cross-certificate, Federal Bridge Certification Authority (FBCA), Federal Bridge Certification Authority Membrane, Intermediate Certification Authority (CA), Policy Mapping, Repository, Responsible Individual, Root Certification Authority, Subordinate Certification Authority (CA), Superior Certification Authority (CA), Trust Anchor, Trust List, Trusted Agent, Trusted Certificate
All > Technology > Security
A Certificate Policy is a specialized form of administrative policy tuned to electronic transactions performed during certificate management. A Certificate Policy addresses all aspects associated with the generation, production, distribution, accounting, compromise recovery and administration of digital certificates. Indirectly, a certificate policy can also govern the transactions conducted using a communications system protected by a certificate-based security system. By controlling critical certificate extensions, such policies and associated enforcement technology can support provision of the security services required by particular applications.
- Browse Related Terms: Accountability, Certificate Policy (CP), Examination, exculpatory evidence, Inculpatory Evidence, Intellectual Property, IT Security Investment, label, reference monitor, Security Control Enhancements, security service, SSL, system administrator, Technical non-repudiation, Trusted Path
All > Technology > Security
Information, such as a subscriber's postal address, that is not included in a certificate. May be used by a Certification Authority (CA) managing certificates.
- Browse Related Terms: applicant, Binding, Certificate Management Authority (CMA), Certificate Status Authority, Certificate-Related Information, Credentials Service Provider (CSP), cross-certificate, Federal Bridge Certification Authority (FBCA), Federal Bridge Certification Authority Membrane, Intermediate Certification Authority (CA), Policy Mapping, Repository, Responsible Individual, Root Certification Authority, Subordinate Certification Authority (CA), Superior Certification Authority (CA), Trust Anchor, Trust List, Trusted Agent, Trusted Certificate
All > Technology > Security
A trusted entity that provides on-line verification to a Relying Party of a subject certificate's trustworthiness, and may also provide additional attribute information for the subject certificate.
- Browse Related Terms: applicant, Binding, Certificate Management Authority (CMA), Certificate Status Authority, Certificate-Related Information, Credentials Service Provider (CSP), cross-certificate, Federal Bridge Certification Authority (FBCA), Federal Bridge Certification Authority Membrane, Intermediate Certification Authority (CA), Policy Mapping, Repository, Responsible Individual, Root Certification Authority, Subordinate Certification Authority (CA), Superior Certification Authority (CA), Trust Anchor, Trust List, Trusted Agent, Trusted Certificate
All > Technology > Security
The process of verifying the correctness of a statement or claim and issuing a certificate as to its correctness.
Also listed in:
- All > Business > H-1B Visa
- All > Law > Common Legal Terms
- All > Law > Court
- All > Technology > Defense
- All > Technology > E-mail > Lotus Domino
- All > Technology > Telecommunications
- All > Travel > Tourism
All > Technology > Security
The individual, group, or organization responsible for conducting a security certification.
- Browse Related Terms: Certification Agent, Certification Authority Facility, Federal Bridge Certification Authority Operational Authority, Federal Public Key Infrastructure Policy Authority (FPKI PA), Local Registration Authority (LRA), Policy Management Authority (PMA), Principal Certification Authority (CA), Revoke a Certificate, security domain
Also listed in:
All > Technology > Security
A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. Accreditation is the official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls.
- Browse Related Terms: Accreditation, Accrediting Authority, authorization, Authorize Processing, Authorizing Official, Certification and Accreditation (C&A), Cyber warriors, Identity, Risk, Risk Assessment, Security Accreditation, Security Authorization
All > Technology > Security
The collection of equipment, personnel, procedures and structures that are used by a Certification Authority to perform certificate issuance and revocation.
- Browse Related Terms: Certification Agent, Certification Authority Facility, Federal Bridge Certification Authority Operational Authority, Federal Public Key Infrastructure Policy Authority (FPKI PA), Local Registration Authority (LRA), Policy Management Authority (PMA), Principal Certification Authority (CA), Revoke a Certificate, security domain
All > Technology > Security
A statement of the practices that a Certification Authority employs in issuing, suspending, revoking and renewing certificates and providing access to them, in accordance with specific requirements (i.e., requirements specified in this Certificate Policy, or requirements specified in a contract for services).
- Browse Related Terms: CA (Certification Authority), certification, Certification Practice Statement (CPS), CRL (Certificate Revocation List), Duration, On-Line Certificate Status Protocol (OCSP), Online Certification Status Protocol (OCSP), public key infrastructure (PKI), Re-key (a certificate), Renew (a certificate), Update (a Certificate), X.509 Certificate, X.509 Public Key Certificate
All > Technology > Security
A process that tracks the movement of evidence through its collection, safeguarding, and analysis lifecycle by documenting each person who handled the evidence, the date/time it was collected or transferred, and the purpose for the transfer.
- Browse Related Terms: access, application, Baselining, chain of custody, Computer Security Object (CSO), Computer Security Objects Register, Control Information, Denial of Service (DoS), Information Resources, information system, Metrics, records, security label, System, System Interconnection
Also listed in:
- All > Law > E-Discovery
- All > Law > Forensic Science
- All > Technology > Records Management
All > Technology > Security > Biometrics
A method used to confirm the presence of a person by eliciting direct responses from the individual. Responses can be either voluntary or involuntary. In a voluntary response, the end user will consciously react to something that the system presents. In an involuntary response, the end user's body automatically responds to a stimulus. A challenge response can be used to protect the system against attacks. See also liveness detection.
- Browse Related Terms: Attempt, Challenge Response, Identity Governance, Identity Management, Impostor, Liveness Detection, Mimic, Population, Spoofing, Threat, Vulnerability
All > Technology > Security
An authentication protocol where the verifier sends the claimant a challenge (usually a random value or a nonce) that the claimant combines with a shared secret (often by hashing the challenge and secret together) to generate a response that is sent to the verifier. The verifier knows the shared secret and can independently compute the response and compare it with the response generated by the claimant. If the two are the same, the claimant is considered to have successfully authenticated himself. When the shared secret is a cryptographic key, such protocols are generally secure against eavesdroppers. When the shared secret is a password, an eavesdropper does not directly intercept the password itself, but the eavesdropper may be able to find the password with an off-line password guessing attack.
- Browse Related Terms: Authentication Code, Challenge-Response Protocol, File Integrity Checker, Hash-based Message Authentication Code (HMAC), IP address, Keyed-hash based message authentication code (HMAC), Message Authentication Code (MAC), Message Digest, nonce, Secure Hash Algorithm (SHA-1), SHA-1, Traffic Analysis, Virus Hoax