All > Technology > Security
Non-linear substitution table used in several byte substitution transformations and in the Key Expansion routine to perform a one for one substitution of a byte value.
- Browse Related Terms: Block, Cipher, Cipher Key, Digital Evidence, Digital Signature, Encryption, Inverse Cipher, Key Expansion, Round Key, S-box, state
All > Technology > Security
A set of specifications for securing electronic mail. Secure/ Multipurpose Internet Mail Extensions (S/MIME) is based upon the widely used MIME standard and describes a protocol for adding cryptographic security services through MIME encapsulation of digitally signed and encrypted objects. The basic security services offered by S/MIME are authentication, non-repudiation of origin, message integrity, and message privacy. Optional security services include signed receipts, security labels, secure mailing lists, and an extended method of identifying the signers certificate(s).
- Browse Related Terms: Digital Signature Algorithm, Dual-Use Certificate, Misnamed Files, S/MIME, Secure/Multipurpose Internet Mail Extensions (S/MIME), Signature Certificate, Signature Generation, Signature Verification, Signed Data, Unsigned data
All > Technology > Security
Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices.
- Browse Related Terms: assurance, Baseline Security, Cybersecurity, High Impact System, Incident, Information Assurance, Information Security, IT Security Goal, IT Security Metrics, Low Impact System, Malware, Moderate Impact System, Naming Authority, Potential Impact, Safeguards, Security Category, Security Controls, Security Goals, Security Objective, Security Requirements, sensitivity, Trustworthy System
All > Technology > Security
A non-secret value that is used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker.
- Browse Related Terms: Cryptographic Token, Entropy, Ephemeral Keys, key pair, Plaintext Key, private key, public key, Public Key (Asymmetric) Cryptographic Algorithm, Salt, Secret Key, Static Keys, Symmetric Key
Also listed in:
- All > Technology > Defense
All > Technology > Security
A method of isolating application modules into distinct fault domains enforced by software. The technique allows untrusted programs written in an unsafe language, such as C, to be executed safely within the single virtual address space of an application. Untrusted machine interpretable code modules are transformed so that all memory accesses are confined to code and data segments within their fault domain. Access to system resources can also be controlled through a unique identifier associated with each domain.
- Browse Related Terms: Access Authority, Attack Signature, Brute Force Password Attack, Confidentiality, Distributed Denial of Service (DDoS), Inside Threat, Integrity, Outside Threat, Sandboxing, Software-Based Fault Isolation, unauthorized disclosure
All > Technology > Security
Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs.
- Browse Related Terms: Blended Attack, Botnet (also zombies), CATS, false positive, information, Intrusion Detection System (IDS), remediation, Sanitization, SPAM, Spyware, Warez
All > Technology > Security
Sending packets or requests to another system to gain information to be used in a subsequent attack.
- Browse Related Terms: Buffer Overflow, Cracking (also Crackers), Hacker, IDS Host-Based, Keystroke Monitoring, Min-Entropy, Password Protected, Rootkit, scanning, script kiddie, Signature, Victim
Also listed in:
- All > Law > E-Discovery
- All > Technology > GIS
- All > Technology > Telecommunications
All > Technology > Security > Biometrics
One of the three types of performance evaluations. The primary goal of a scenario evaluation is to measure performance of a biometric system operating in a specific application. See also technology evaluation, operational evaluation.
- Browse Related Terms: Closed-set Identification, Cumulative Match Characteristic (CMC), Detection and Identification Rate, Gallery, Identification Rate, Neural Net/Neural Network, Open-set Identification, Operational Evaluation, Scenario Evaluation, Technology Evaluation, Threshold, US-VISIT (U.S. Visitor and Immigrant Status Indicator Technology), Watchlist
All > Technology > Security
Specific factors related to technology, infrastructure, public access, scalability, common security controls, and risk that can be considered by organizations in the applicability and implementation of individual security controls in the security control baseline.
- Browse Related Terms: Compensating Controls, Compensating Security Controls, Configuration Control, Controlled Interface, domain, Due Care, General Support System, Management Controls, Operational Controls, Protective Distribution System, Scoping Guidance, Security Control Baseline, System-specific Security Control, Technical Controls
All > Technology > Security
An unsophisticated cracker who uses cracking tools found on the Internet to gain access to poorly protected computer systems.
- Browse Related Terms: Buffer Overflow, Cracking (also Crackers), Hacker, IDS Host-Based, Keystroke Monitoring, Min-Entropy, Password Protected, Rootkit, scanning, script kiddie, Signature, Victim
Also listed in:
- All > Technology > Programming > Perl
All > Technology > Security
A cryptographic key, used with a secret key cryptographic algorithm, that is uniquely associated with one or more entities and should not be made public.
- Browse Related Terms: Cryptographic Token, Entropy, Ephemeral Keys, key pair, Plaintext Key, private key, public key, Public Key (Asymmetric) Cryptographic Algorithm, Salt, Secret Key, Static Keys, Symmetric Key
Also listed in:
All > Technology > Security
A cryptographic algorithm that uses a single secret key for both encryption and decryption.
- Browse Related Terms: Asymmetric Keys, Cryptography, key, Link Encryption, Plaintext, Public (Asymmetric) Key Encryption, Secret (Symmetric) Key Encryption, Secret Key (symmetric) Cryptographic Algorithm, Symmetric Encryption Algorithm
All > Technology > Security
A secret value that used to initialize a pseudorandom number generator. The resulting value from the random number generator remains secret or private.
- Browse Related Terms: Approved Security Function, Authentication protocol, Automated Password Generator, Compromise, Cryptographic Key, Cryptographic Module, Cryptoperiod, Decryption, FIPS Approved Security Method, Key Generation Material, Key Management, Secret Seed, User Initialization
All > Technology > Security
This is the traditional method used for encryption. The same key is used for both encryption and decryption. Only the party or parties that exchange secret messages know the secret key. The biggest problem with symmetric key encryption is securely distributing the keys. Public key techniques are now often used to distribute the symmetric keys.
- Browse Related Terms: Asymmetric Keys, Cryptography, key, Link Encryption, Plaintext, Public (Asymmetric) Key Encryption, Secret (Symmetric) Key Encryption, Secret Key (symmetric) Cryptographic Algorithm, Symmetric Encryption Algorithm
All > Technology > Security
A communication protocol that provides the appropriate confidentiality, authentication and content integrity protection.
- Browse Related Terms: authenticity, Entity, Kerberos, Man-in-the-middle Attack (MitM), Off-line Attack, On-line Attack, Passive Attack, password, Personal Identification Number (PIN), Practice Statement, Proof of Possession Protocol (PoP Protocol), Protocol Run, Secure Communication Protocol, Shared Secret, Subscriber, Token, Transport Layer Security (TLS), Tunneled Password Protocol, Verifier Impersonation Attack
All > Technology > Security
The Secure Hash Algorithm defined in Federal Information Processing Standard 180-1.
- Browse Related Terms: Authentication Code, Challenge-Response Protocol, File Integrity Checker, Hash-based Message Authentication Code (HMAC), IP address, Keyed-hash based message authentication code (HMAC), Message Authentication Code (MAC), Message Digest, nonce, Secure Hash Algorithm (SHA-1), SHA-1, Traffic Analysis, Virus Hoax
All > Technology > Security
A set of specifications for securing electronic mail. S/MIME is based upon the widely used MIME standard [MIME] and describes a protocol for adding cryptographic security services through MIME encapsulation of digitally signed and encrypted objects. The basic security services offered by S/MIME are authentication, non-repudiation of origin, message integrity, and message privacy. Optional security services include signed receipts, security labels, secure mailing lists, and an extended method of identifying the signers certificate(s).
- Browse Related Terms: Digital Signature Algorithm, Dual-Use Certificate, Misnamed Files, S/MIME, Secure/Multipurpose Internet Mail Extensions (S/MIME), Signature Certificate, Signature Generation, Signature Verification, Signed Data, Unsigned data
All > Technology > Security
Secure Sockets Layer is a protocol developed by Netscape for transmitting private documents via the Internet. SSL works by using a public key to encrypt data that's transferred over the SSL connection. Most web browsers support SSL, and many web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https: instead of http:. TLS is an Internet standard based on SSL version 3.0. There are only very minor differences between SSL and TLS.
- Browse Related Terms: Ciphertext, Cryptology, Data Encryption Algorithm (DEA), Data Encryption Standard (DES), Encrypted Key, Encrypted Network, Encryption Certificate, end-to-end encryption, Escrow, Initialization Vector (IV), Key Bundle, Key Wrap, Payload, Rijndael, Secure Socket Layer and Transport Layer Security (SSL and TSL), Triple DES
All > Technology > Security
The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls.
- Browse Related Terms: Accreditation, Accrediting Authority, authorization, Authorize Processing, Authorizing Official, Certification and Accreditation (C&A), Cyber warriors, Identity, Risk, Risk Assessment, Security Accreditation, Security Authorization
All > Technology > Security
A specification for encoding security assertions in the Extensible Markup Language (XML).
- Browse Related Terms: Behavioral Outcome, Cryptographic Module Security Policy, Cryptographic Strength, Profiling, Security Assertion Markup Language (SAML), Subsystem, Training Assessment, Training Effectiveness