Security and Compliance Glossary of Terms

Security and Compliance Glossary of Terms


Access Control - The process of granting or denying specific requests to: 
      1) obtain and use information and related information processing services and 
      2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances). 

Accountability - The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.

Adware - Advertising-supported software is any software package that automatically renders advertisements to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. Unwanted advertisements are considered malware.

Assurance - Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes
      1) functionality that performs correctly,
      2) sufficient protection against unintentional errors (by users or software), and
      3) sufficient resistance to intentional penetration or by-pass

Attack - Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.


Audit - Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures.

Audit log - Chronological record of system activities, including records of system accesses and operations performed in a given period.

Audit record - Individual entry in an audit log related to an audited event.

Authentication - Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system.

Authorization - The official management decision given by a senior official to authorize operation of a system or the common controls inherited by designated organizations systems and to explicitly accept the risk to company operations (including mission, functions, image, and reputation), company assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security and privacy controls. Also known as authorization to operate (ATO).

Authorizing Official (AO) - A senior (federal) official or executive with the authority to formally assume responsibility for operating a system at an acceptable level of risk to company operations (including mission, functions, image, or reputation), company assets, individuals, other organizations, and the Nation.


Availability - Ensuring timely and reliable access to and use of information.

Back Door - An undocumented way of gaining access to computer system. A backdoor is a potential security risk. 

Baseline Configuration - A documented set of specifications for a system, or a configuration item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures. 

Blacklisting - A process used to identify software programs that are not authorized to execute on a system or prohibited Universal Resource Locators (URL)/websites. 

Biometrics - A measurable physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an applicant. Facial images, fingerprints, and iris scan samples are all examples of biometrics. 


Bit - A binary digit having a value of 0 or 1.

Challenge Response Protocol - An authentication protocol where the verifier sends the claimant a challenge (usually a random value or a nonce) that the claimant combines with a secret (often by hashing the challenge and a shared secret together, or by applying a private key operation to the challenge) to generate a response that is sent to the verifier. The verifier can independently verify the response generated by the claimant (such as by re-computing the hash of the challenge and the shared secret and comparing to the response, or performing a public key operation on the response) and establish that the claimant possesses and controls the secret.

Checksum - A value that 1) is computed by a function that is dependent on the content of a data object and 2) is stored or transmitted together with the object, for detecting changes in the data.

Ciphertext - Data in its encrypted form.

Confidentiality - Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

Configuration Management - A collection of activities focused on establishing and maintaining the integrity of information technology products and systems, through control of processes for initializing, changing, and monitoring the configurations of those products and systems throughout the system development life cycle.

Configuration Settings - The set of parameters that can be changed in hardware, software, or firmware that affect the security posture and/or functionality of the system.

Controlled Area - Any area or space for which the organization has confidence that the physical and procedural protections provided are sufficient to meet the requirements established for protecting the information or system.

Controlled Unclassified Information (CUI) - Information that law, regulation, or government wide policy requires to have safeguarding or disseminating controls, excluding information that is classified under Executive Order 13526, Classified National Security Information, December 29, 2009, or any predecessor or successor order, or the Atomic Energy Act of 1954, as amended.

CUI Categories or Subcategories - Those types of information for which laws, regulations, or government wide policies require or permit agencies to exercise safeguarding or dissemination controls, and which the CUI Executive Agent has approved and listed in the CUI Registry.

CUI Executive Agent - The National Archives and Records Administration (NARA), which implements the executive branch-wide CUI Program and oversees federal agency actions to  comply with Executive Order 13556 “Controlled Unclassified Information”. NARA has delegated this authority to the Director of the Information Security Oversight Office (ISOO).

CUI Program - The executive branch-wide program to standardize CUI handling by all federal agencies. The program includes the rules, organization, and procedures for CUI, established by Executive Order 13556, 32 CFR Part 2002, and the CUI Registry.

CUI Registry - The online repository for all information, guidance, policy, and requirements on handling CUI, including everything issued by the CUI Executive Agent other than 32 CFR Part 2002. Among other information, the CUI Registry identifies all approved CUI categories and subcategories, provides general descriptions for each, identifies the basis for controls, establishes markings, and includes guidance on handling procedures.

Countermeasures - Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system.


Denial of Service - The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)

Decoding - The conversion of an encoded format back into the original sequence of characters.
Digital Signature - The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1) origin authentication, 2) data integrity, and 3) signer non-repudiation.Encoding - To convert into a coded form; the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized format for efficient transmission or storage.Encryption - The cryptographic transformation of data to produce ciphertext. End-to-End Encryption - Communications encryption in which data is encrypted when being passed through a n etwork, but routing information remains visible. Environment of Operation - The physical surroundings in which a system processes, stores, and transmits information.Executive Agency - An executive department specified in 5 U.S.C., Sec. 105; a military department specified in 5 U.S.C., Sec. 102; an independent establishment as defined in 5 U.S.C., Sec. 104(1); and a wholly owned Government corporation fully subject to the provisions of 31 U.S.C., Chapter 91.

External System (or component) - A system or component of a system that is outside of the authorization boundary established by the organization and for which the organization typically has no direct control over the application of required security controls or the assessment of security control effectiveness. External System Service - A system service that is implemented outside of the authorization boundary of the organizational system (i.e., a service that is used by, but not a part of, the organizational system) and for which the organization typically has no direct control over the application of required security controls or the assessment of security control effectiveness. 

148 This publication is available free of charge from: https://doi.org/10.6028/NIST.HB.162External System Service Provider - A provider of external system services to an organization through a variety of consumer-producer relationships including but not limited to: joint ventures; business partnerships; outsourcing arrangements (i.e., through contracts, interagency agreements, lines of business arrangements); licensing agreements; and/or supply chain exchanges.External Network - A network not controlled by the organization. Federal Information System - An information system used or operated by an executive agency, by a contractor of an executive agency, or by another organization on behalf of an executive agency.FIPS-validated cryptography - A cryptographic module validated by the Cryptographic Module Validation Program (CMVP) to meet requirements specified in FIPS Publication 140-2 (as amended). As a prerequisite to CMVP validation, the cryptographic module is required to employ a cryptographic algorithm implementation that has successfully passed validation testing by the Cryptographic Algorithm Validation Program (CAVP).Firewall - A gateway that limits access between networks in accordance with local security policy.Firmware - Computer programs and data stored in hardware, typically in read-only memory (ROM) or programmable read-only memory (PROM), such that the programs and data cannot be dynamically written or modified during execution of the programs.Gateway - An intermediate system (interface, relay) that attaches to two (or more) computer networks that have similar functions but dissimilar implementations and that enables either one-way or two-way communication between the networks.Hacker - A person who circumvents security and breaks into a network, computer, file, etc., usually with malicious intent.Hardware - The physical components of a system.Identifier - Unique data used to represent a person’s identity and associated attributes. A name or a card number are examples of identifiers. A unique label used by a system to indicate a specific entity, object, or group.Impact - The effect on organizational operations, organizational assets, individuals, other organizations, or the Nation (including the national security interests of the United States) of a loss of confidentiality, integrity, or availability of information or a system.Impact Value - The assessed potential impact resulting from a compromise of the confidentiality of information (e.g., CUI) expressed as a value of low, moderate, or high.Incident - An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of a system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.Industrial Control System (ICS) – A general term that encompasses several types of control systems and associated instrumentation used in industrial production technology, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS),  

149 This publication is available free of charge from: https://doi.org/10.6028/NIST.HB.162and other smaller control system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures. Information - 1) Facts and ideas, which can be represented (encoded) as various forms of data. 2) Knowledge, e.g., data, instructions, in any medium or form that can be communicated betweensystem entities.Information Assurance - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities. Information Flow Control - Procedure to ensure that information transfers within a system are not made in violation of the security policy.Information Resources - Information and related resources, such as personnel, equipment, funds, and information technology.Information Security - The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide confidentiality, integrity, and availability.Information Security Policy - Aggregate of directives, regulations, rules, and practices that prescribes how an organization manages, protects, and distributes information. Information Security Risk - The risk to company operations (including mission, functions, image, reputation), company assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or a system. Information System - A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Note: Information systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.Information Technology - (A) With respect to an executive agency means any equipment or interconnected system or subsystem of equipment, used in the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency, if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency that requires the use - 1) of that equipment or 2) of that equipment to a significant extent in the performance of a service or the furnishing of a product; (B) Includes computers, ancillary equipment (including imaging peripherals, input, output, and storage devices necessary for security and surveillance), peripheral equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services (including support services), and related resources; but (C) does not include any equipmentacquired by a federal contractor incidental to a federal contract.Insider Threat - The threat that an insider will use her/his authorized access, wittingly or unwittingly, to do harm to the security of the United States. This threat can include damage to the  

150 This publication is available free of charge from: https://doi.org/10.6028/NIST.HB.162United States through espionage, terrorism, unauthorized disclosure, or through the loss or degradation of departmental resources or capabilities.Integrity - Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.Internal Network - A network where establishment, maintenance, and provisioning of security controls are under the direct control of organizational employees or contractors; or the cryptographic encapsulation or similar security technology implemented between organization controlled endpoints, provides the same effect (with regardto confidentiality and integrity). An internal network is typically organization-owned, yet may be organization- controlled while not being organization-owned.Intrusion Detection System (IDS) - Software that automates the intrusion detection process. Key - A parameter used in conjunction with a cryptographic algorithm that determines its operation. Examples applicable to this Standard include: 1) the computation of a digital signature from data, and 2) the verification of a digital signature.Key Management - The activities involving the handling of cryptographic keys and other related security parameters (e.g., initialization vectors) during the entire lifecycle of the keys, includingtheir generation, storage, establishment, entry and output, use, and destruction. Keystroke Monitoring - The process used to view or record both the keystrokes entered by a computer user and the computer’s response during an interactive session. Keystroke monitoring is usually considered a special case of audit trails.Least Privilege - The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform itsfunction. Link Encryption - Encryption of information between nodes of a communications system.Local Access - Access to an organizational system by a user (or process acting on behalf of a user) communicating through a direct connection without the use of a network. Logic Bomb - A piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. Malicious Code - Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of a system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.Malware - See Malicious Code. Media - Physical devices or writing surfaces including, but not limited to, magnetic tapes, optical disks, magnetic disks, Large-Scale Integration (LSI) memory chips, and printouts (but not including display media) onto which information is recorded, stored, or printed within a system.Mobile Code - Software programs or parts of programs obtained from remote systems, transmitted across a network, and executed on a local system without explicit installation or execution by the recipient. 

151 This publication is available free of charge from: https://doi.org/10.6028/NIST.HB.162Mobile Device - A portable computing device that has a small-form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection (e.g., wirelessly transmit or receive information); possesses local, non-removable/removable data storage; and includes a self-contained power source. Mobile devices may also include voice communication capabilities, onboard sensors that allow the devices to capture information, or built-in features that synchronize local data with remote locations. Examples include smartphones, tablets, and E-readers.Multifactor Authentication - Authentication using two or more different factors to achieve authentication. Factors include something you know (e.g., PIN, password); something you have (e.g., cryptographic identification device, token); or something you are (e.g., biometric).Network - A system implemented with a collection of interconnected components. Suchcomponents may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.Network Access - Access to a system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, internet).Node - In data communication, a physical network node may either be a data communication equipment (DCE) such as a modem, hub, bridge or switch; or a data terminal equipment (DTE) such as a digital telephone handset, a printer or a computer, workstation, or a server. Nonce - A time-varying value that has at most a negligible chance of repeating – for example, a random value that is generated anew for each use, a timestamp, a sequence number, or some combination of these. Nonfederal Organization - An entity that owns, operates, or maintains a nonfederal informationsystem. Nonfederal System - A system that does not meet the criteria for a federal system.Nonlocal Maintenance - Maintenance activities conducted by individuals communicating through a network, either an external network (e.g., the internet) or an internal network.Password - A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.Penetration Performance Testing - A test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of a system.Phishing - A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.Portable Storage Device - A system component that can be inserted into and removed from a system, and that is used to store data or information (e.g., text, video, audio, and/or image data). Such components are typically implemented on magnetic, optical, or solid state devices (e.g., floppy disks, compact/digital video disks, flash/ thumb drives, external hard disk drives, and flash memory cards/drives that contain nonvolatile memory).Potential Impact - The loss of confidentiality, integrity, or availability could be expected to have: 1) a limited adverse effect (FIPS Publication 199 low); 2) a serious adverse effect (FIPS  

152 This publication is available free of charge from: https://doi.org/10.6028/NIST.HB.162Publication 199 moderate); or 3) a severe or catastrophic adverse effect (FIPS Publication 199 high) on organizational operations, organizational assets, or individuals. Private Key - A cryptographic key, used with a public key cryptographic algorithm, that is uniquely associated with an entity and is not made public. Privilege - A right granted to an individual, a program, or a process.Privileged Account - A system account with authorizations of a privileged user. Privileged User - A user that is authorized (and therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform.Public Key - A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public.Public Key Cryptography - Encryption system that uses a public-private key pair for encryption and/or digital signature.Public Key Infrastructure (PKI) - A Framework that is established to issue, maintain, and revoke public key certificates.Ransomware - Ransomware is a type of malware that blocks access to a device or data until a ransom is paid. Reciprocity - Mutual agreement among participating enterprises to accept each other’s security assessments to reuse information system resources and/or to accept each other’s assessed securityposture to share information. Records - The recordings (automated and/or manual) of evidence of activities performed or results achieved (e.g., forms, reports, test results), which serve as a basis for verifying that theorganization and the system are performing as intended. Also, used to refer to units of related data fields (i.e., groups of data fields that can be accessed by a program and that contain thecomplete set of information on particular items).Remote Access - Access to an organizational system by a user (or a process acting on behalf of a user) communicating through an external network (e.g., the internet).Remote Maintenance - Maintenance activities conducted by individuals communicating through an external network (e.g., the internet).Replay Resistance - Protection against the capture of transmitted authentication or access control information and its subsequent retransmission with the intent of producing an unauthorized effect or gaining unauthorized access. Risk - A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: 1) the adverse impacts that would arise if the circumstance or event occurs and 2) the likelihood of occurrence. Note: System-related security risks are those risks that arise from the loss of confidentiality, integrity, or availability of information or systems and reflect the potential adverse impacts to company operations (including mission, functions, image, or reputation), company assets, individuals, other organizations, and the Nation. Adverse impacts to the Nation include, for example, compromises to systems that support critical  

153 This publication is available free of charge from: https://doi.org/10.6028/NIST.HB.162infrastructure applications or are paramount to government continuity of operations as defined by the Department of Homeland Security. Risk Assessment - The process of identifying risks to company operations (including mission, functions, image, and reputation), company assets, individuals, other organizations, and the Nation, resulting from the operation of a system. Part of risk management, incorporates threatand vulnerability analyses, and considers mitigations provided by security controls planned or in place. Synonymous with Risk Analysis. Risk Management - The program and supporting processes to manage information security risk to company operations (including mission, functions, image, reputation), company assets, individuals, other organizations, and the Nation, and includes: 1) establishing the context for risk-related activities, 2) assessing risk, 3) responding to risk once determined, and 4) monitoring risk over time.Risk Management Framework (RMF) - A structured approach used to oversee and manage risk for an enterprise. Role - A job function or employment position to which people or other system entities may be assigned in a system.Safeguards - Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for a system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures. Sanitization - Actions taken to render data written on media unrecoverable by both ordinary and, for some forms of sanitization, extraordinary means. Process to remove information from media such that data recovery is not possible. It includes removing all classified labels, markings, and activity logs.Secret Key - A cryptographic key, used with a secret key cryptographic algorithm, that is uniquely associated with one or more entities and should not be made public. Security - A condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that should form part of the enterprise’s risk management approach.Security Control Assessment - The testing and/or evaluation of the management, operational, and technical security controls in a system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.Security Controls - The management, operational, and technical controls, i.e., safeguards or countermeasures) prescribed for a system to protect the confidentiality, integrity, and availability of the system and its information. Security Engineering - An interdisciplinary approach and means to enable the realization of secure systems. It focuses on defining customer needs, security protection requirements, and required functionality early in the systems development life cycle, documenting requirements, and then proceeding with design, synthesis, and system validation while considering the complete problem.Security Functionality - The security-related features, functions, mechanisms, services,procedures, and architectures implemented within organizational systems or the environments in which those systems operate.Security Functions - The hardware, software, or firmware of the system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based.Security Label - The means used to associate a set of security attributes with a specific information object as part of the data structure for that object. Security Relevance - Functions or mechanisms that are relied upon, directly or indirectly, to enforce a security policy that governs confidentiality, integrity, and availability protections.Sensitivity - A measure of the importance assigned to information by its owner for the purpose of denoting its need for protection. Signature - A recognizable, distinguishing pattern associated with an attack, such as a binary string in a virus or a particular set of keystrokes used to gain unauthorized access to a system.SMiShing (SMS phishing) - A security attack in which the user is tricked into downloading a Trojan horse, virus, or other malware onto his cellular phone or other mobile device.Spam - Electronic junk mail or the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.Split Tunneling - The process of allowing a remote user or device to establish a non-remote connection with a system and simultaneously communicate via some other connection to a resource in an external network. This method of network access enables a user to access remotedevices (e.g., a networked printer) at the same time as accessing uncontrolled networks.Spyware - Software that is secretly or surreptitiously installed into a system to gather information on individuals or organizations without their knowledge; a type of malicious code.Supplemental Guidance - Statements used to provide additional explanatory information for security controls or security control enhancements.System - Any organized assembly of resources and procedures united and regulated by interaction or interdependence to accomplish a set of specific functions. Note: Systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems. System Component - A discrete, identifiable information technology asset (hardware, software, firmware) that represents a building block of a system. System components include commercial information technology products. System Integrity - The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental. 

155 This publication is available free of charge from: https://doi.org/10.6028/NIST.HB.162System Security Plan - Formal document that provides an overview of the security requirements for the system and describes the security controls in place or planned for meeting those requirements.Tailoring - The process by which a security control baseline is modified based on: 1) the application of scoping guidance, 2) the specification of compensating security controls, if needed, and 3) the specification of organization-defined parameters in the security controls via explicit assignment and selection statements.


Threat - Any circumstance or event with the potential to adversely impact company operations (including mission, functions, image, or reputation), company assets, individuals, other organizations, or the Nation through a system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

Threat Event - An event or situation that has the potential for causing undesirable consequences or impact.

Token - Something that the claimant possesses and controls (typically a key or password) that is used to authenticate the claimant’s identity.

Trojan Horse - A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

Trusted Computing Base - Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.


Trustworthy System Computer - Hardware, software and procedures that -
      1) are reasonably secure from intrusion and misuse,
      2) provide a reasonable level of availability, reliability, and correct operation, and
      3) are reasonably suited to performing their intended functions and
      4) adhere to generally accepted security procedures.

User - Individual, or a process acting on behalf of an individual, authorized to access a system.

Validation - Confirmation (through the provision of strong, sound, objective evidence) that requirements for a specific intended use or application have been fulfilled (e.g., a trustworthy credential has been presented, or data or information has been formatted in accordance with a defined set of rules, or a specific process has demonstrated that an entity under consideration meets, in all respects, its defined attributes.)

Virus - A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk. See Malicious Code.

Vishing - The fraudulent practice of making phone calls or leaving voice messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as bank details and credit card numbers.

Vulnerability - Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source. 

Whitelisting - A process used to identify software programs that are authorized to execute on a system or authorized Universal Resource Locators (URL)/websites.

Wireless Technology - Technology that permits the transfer of information between separated points without physical connection.

Worm - A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. See Malicious Code. 


    • Related Articles

    • What is the NIST 800-171 Standard for DoD Contractors?

      Defense Federal Acquisition Regulation Supplement (DFARS) clause 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting, requires contractors and subcontractors to provide ‘adequate security’ to safeguard covered defense ...
    • CMMC SC.5.230 - Enforce port and Protocol Compliance

      Requirement text: SC.5.230: Enforce port and protocol compliance. DISCUSSION FROM SOURCE: CMMC Malicious actors are able to perform command and control and exfiltration of data by running their own protocols over well-known ports or by hijacking ...
    • Systems and Communications Protection: SP 800-171 Security Family 3.13

      System and communications protection requirements provide an array of safeguards for the system. Some of the requirements in this family address the confidentiality information at rest and in transit. The protection of confidentiality can be provided ...
    • Security Assessment: SP 800-171 Security Family 3.12

      A security requirement assessment is the testing and/or evaluation of the management, operational, and technical security requirements on a system to determine the extent to which the requirements are implemented correctly, operating as intended, and ...
    • Personnel Security: SP 800-171 Security Family 3.9

      Users play a vital role in protecting a system as many important issues in information security involve users, designers, implementers, and managers. How these individuals interact with the system and the level of access they need to do their jobs ...