summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4949.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc4949.txt')
-rw-r--r--doc/rfc/rfc4949.txt20443
1 files changed, 20443 insertions, 0 deletions
diff --git a/doc/rfc/rfc4949.txt b/doc/rfc/rfc4949.txt
new file mode 100644
index 0000000..7de0187
--- /dev/null
+++ b/doc/rfc/rfc4949.txt
@@ -0,0 +1,20443 @@
+
+
+
+
+
+
+Network Working Group R. Shirey
+Request for Comments: 4949 August 2007
+FYI: 36
+Obsoletes: 2828
+Category: Informational
+
+
+ Internet Security Glossary, Version 2
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The IETF Trust (2007).
+
+RFC Editor Note
+
+ This document is both a major revision and a major expansion of the
+ Security Glossary in RFC 2828. This revised Glossary is an extensive
+ reference that should help the Internet community to improve the
+ clarity of documentation and discussion in an important area of
+ Internet technology. However, readers should be aware of the
+ following:
+
+ (1) The recommendations and some particular interpretations in
+ definitions are those of the author, not an official IETF position.
+ The IETF has not taken a formal position either for or against
+ recommendations made by this Glossary, and the use of RFC 2119
+ language (e.g., SHOULD NOT) in the Glossary must be understood as
+ unofficial. In other words, the usage rules, wording interpretations,
+ and other recommendations that the Glossary offers are personal
+ opinions of the Glossary's author. Readers must judge for themselves
+ whether or not to follow his recommendations, based on their own
+ knowledge combined with the reasoning presented in the Glossary.
+
+ (2) The glossary is rich in the history of early network security
+ work, but it may be somewhat incomplete in describing recent security
+ work, which has been developing rapidly.
+
+
+
+
+
+
+
+
+
+Shirey Informational [Page 1]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+Abstract
+
+ This Glossary provides definitions, abbreviations, and explanations
+ of terminology for information system security. The 334 pages of
+ entries offer recommendations to improve the comprehensibility of
+ written material that is generated in the Internet Standards Process
+ (RFC 2026). The recommendations follow the principles that such
+ writing should (a) use the same term or definition whenever the same
+ concept is mentioned; (b) use terms in their plainest, dictionary
+ sense; (c) use terms that are already well-established in open
+ publications; and (d) avoid terms that either favor a particular
+ vendor or favor a particular technology or mechanism over other,
+ competing techniques that already exist or could be developed.
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Format of Entries ...............................................4
+ 2.1. Order of Entries ...........................................4
+ 2.2. Capitalization and Abbreviations ...........................5
+ 2.3. Support for Automated Searching ............................5
+ 2.4. Definition Type and Context ................................5
+ 2.5. Explanatory Notes ..........................................6
+ 2.6. Cross-References ...........................................6
+ 2.7. Trademarks .................................................6
+ 2.8. The New Punctuation ........................................6
+ 3. Types of Entries ................................................7
+ 3.1. Type "I": Recommended Definitions of Internet Origin .......7
+ 3.2. Type "N": Recommended Definitions of Non-Internet Origin ...8
+ 3.3. Type "O": Other Terms and Definitions To Be Noted ..........8
+ 3.4. Type "D": Deprecated Terms and Definitions .................8
+ 3.5. Definition Substitutions ...................................8
+ 4. Definitions .....................................................9
+ 5. Security Considerations .......................................343
+ 6. Normative Reference ...........................................343
+ 7. Informative References ........................................343
+ 8. Acknowledgments ...............................................364
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shirey Informational [Page 2]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+1. Introduction
+
+ This Glossary is *not* an Internet Standard, and its recommendations
+ represent only the opinions of its author. However, this Glossary
+ gives reasons for its recommendations -- especially for the SHOULD
+ NOTs -- so that readers can judge for themselves what to do.
+
+ This Glossary provides an internally consistent and self-contained
+ set of terms, abbreviations, and definitions -- supported by
+ explanations, recommendations, and references -- for terminology that
+ concerns information system security. The intent of this Glossary is
+ to improve the comprehensibility of written materials that are
+ generated in the Internet Standards Process (RFC 2026) -- i.e., RFCs,
+ Internet-Drafts, and other items of discourse -- which are referred
+ to here as IDOCs. A few non-security, networking terms are included
+ to make the Glossary self-contained, but more complete glossaries of
+ such terms are available elsewhere [A1523, F1037, R1208, R1983].
+
+ This Glossary supports the goals of the Internet Standards Process:
+
+ o Clear, Concise, Easily Understood Documentation
+
+ This Glossary seeks to improve comprehensibility of security-
+ related content of IDOCs. That requires wording to be clear and
+ understandable, and requires the set of security-related terms and
+ definitions to be consistent and self-supporting. Also,
+ terminology needs to be uniform across all IDOCs; i.e., the same
+ term or definition needs to be used whenever and wherever the same
+ concept is mentioned. Harmonization of existing IDOCs need not be
+ done immediately, but it is desirable to correct and standardize
+ terminology when new versions are issued in the normal course of
+ standards development and evolution.
+
+ o Technical Excellence
+
+ Just as Internet Standard (STD) protocols should operate
+ effectively, IDOCs should use terminology accurately, precisely,
+ and unambiguously to enable standards to be implemented correctly.
+
+ o Prior Implementation and Testing
+
+ Just as STD protocols require demonstrated experience and
+ stability before adoption, IDOCs need to use well-established
+ language; and the robustness principle for protocols -- "be
+ liberal in what you accept, and conservative in what you send" --
+ is also applicable to the language used in IDOCs that describe
+ protocols. Using terms in their plainest, dictionary sense (when
+ appropriate) helps to make them more easily understood by
+
+
+
+Shirey Informational [Page 3]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ international readers. IDOCs need to avoid using private, newly
+ invented terms in place of generally accepted terms from open
+ publications. IDOCs need to avoid substituting new definitions
+ that conflict with established ones. IDOCs need to avoid using
+ "cute" synonyms (e.g., "Green Book"), because no matter how
+ popular a nickname may be in one community, it is likely to cause
+ confusion in another.
+
+ However, although this Glossary strives for plain, internationally
+ understood English language, its terms and definitions are biased
+ toward English as used in the United States of America (U.S.).
+ Also, with regard to terminology used by national governments and
+ in national defense areas, the glossary addresses only U.S. usage.
+
+ o Openness, Fairness, and Timeliness
+
+ IDOCs need to avoid using proprietary and trademarked terms for
+ purposes other than referring to those particular systems. IDOCs
+ also need to avoid terms that either favor a particular vendor or
+ favor a particular security technology or mechanism over other,
+ competing techniques that already exist or might be developed in
+ the future. The set of terminology used across the set of IDOCs
+ needs to be flexible and adaptable as the state of Internet
+ security art evolves.
+
+ In support of those goals, this Glossary offers guidance by marking
+ terms and definitions as being either endorsed or deprecated for use
+ in IDOCs. The key words "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY",
+ and "OPTIONAL" are intended to be interpreted the same way as in an
+ Internet Standard (i.e., as specified in RFC 2119 [R2119]). Other
+ glossaries (e.g., [Raym]) list additional terms that deal with
+ Internet security but have not been included in this Glossary because
+ they are not appropriate for IDOCs.
+
+2. Format of Entries
+
+ Section 4 presents Glossary entries in the following manner:
+
+2.1. Order of Entries
+
+ Entries are sorted in lexicographic order, without regard to
+ capitalization. Numeric digits are treated as preceding alphabetic
+ characters, and special characters are treated as preceding digits.
+ Blanks are treated as preceding non-blank characters, except that a
+ hyphen or slash between the parts of a multiword entry (e.g.,
+ "RED/BLACK separation") is treated like a blank.
+
+
+
+
+
+Shirey Informational [Page 4]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ If an entry has multiple definitions (e.g., "domain"), they are
+ numbered beginning with "1", and any of those multiple definitions
+ that are RECOMMENDED for use in IDOCs are presented before other
+ definitions for that entry. If definitions are closely related (e.g.,
+ "threat"), they are denoted by adding letters to a number, such as
+ "1a" and "1b".
+
+2.2. Capitalization and Abbreviations
+
+ Entries that are proper nouns are capitalized (e.g., "Data Encryption
+ Algorithm"), as are other words derived from proper nouns (e.g.,
+ "Caesar cipher"). All other entries are not capitalized (e.g.,
+ "certification authority"). Each acronym or other abbreviation that
+ appears in this Glossary, either as an entry or in a definition or
+ explanation, is defined in this Glossary, except items of common
+ English usage, such as "a.k.a.", "e.g.", "etc.", "i.e.", "vol.",
+ "pp.", and "U.S.".
+
+2.3. Support for Automated Searching
+
+ Each entry is preceded by a dollar sign ($) and a space. This makes
+ it possible to find the defining entry for an item "X" by searching
+ for the character string "$ X", without stopping at other entries in
+ which "X" is used in explanations.
+
+2.4. Definition Type and Context
+
+ Each entry is preceded by a character -- I, N, O, or D -- enclosed in
+ parentheses, to indicate the type of definition (as is explained
+ further in Section 3):
+ - "I" for a RECOMMENDED term or definition of Internet origin.
+ - "N" if RECOMMENDED but not of Internet origin.
+ - "O" for a term or definition that is NOT recommended for use in
+ IDOCs but is something that authors of Internet documents should
+ know about.
+ - "D" for a term or definition that is deprecated and SHOULD NOT be
+ used in Internet documents.
+
+ If a definition is valid only in a specific context (e.g.,
+ "baggage"), that context is shown immediately following the
+ definition type and is enclosed by a pair of slash symbols (/). If
+ the definition is valid only for specific parts of speech, that is
+ shown in the same way (e.g., "archive").
+
+
+
+
+
+
+
+
+Shirey Informational [Page 5]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+2.5. Explanatory Notes
+
+ Some entries have explanatory text that is introduced by one or more
+ of the following keywords:
+ - Deprecated Abbreviation (e.g., "AA")
+ - Deprecated Definition (e.g., "digital certification")
+ - Deprecated Usage (e.g., "authenticate")
+ - Deprecated Term (e.g., "certificate authority")
+ - Pronunciation (e.g., "*-property")
+ - Derivation (e.g., "discretionary access control")
+ - Tutorial (e.g., "accreditation")
+ - Example (e.g., "back door")
+ - Usage (e.g., "access")
+
+ Explanatory text in this Glossary MAY be reused in IDOCs. However,
+ this text is not intended to authoritatively supersede text of an
+ IDOC in which the Glossary entry is already used.
+
+2.6. Cross-References
+
+ Some entries contain a parenthetical remark of the form "(See: X.)",
+ where X is a list of other, related terms. Some entries contain a
+ remark of the form "(Compare: X)", where X is a list of terms that
+ either are antonyms of the entry or differ in some other manner worth
+ noting.
+
+2.7. Trademarks
+
+ All servicemarks and trademarks that appear in this Glossary are used
+ in an editorial fashion and to the benefit of the mark owner, without
+ any intention of infringement.
+
+2.8. The New Punctuation
+
+ This Glossary uses the "new" or "logical" punctuation style favored
+ by computer programmers, as described by Raymond [Raym]: Programmers
+ use pairs of quotation marks the same way they use pairs of
+ parentheses, i.e., as balanced delimiters. For example, if "Alice
+ sends" is a phrase, and so are "Bill receives" and "Eve listens",
+ then a programmer would write the following sentence:
+
+ "Alice sends", "Bill receives", and "Eve listens".
+
+ According to standard American usage, the punctuation in that
+ sentence is incorrect; the continuation commas and the final period
+ should go inside the string quotes, like this:
+
+ "Alice sends," "Bill receives," and "Eve listens."
+
+
+
+Shirey Informational [Page 6]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ However, a programmer would not include a character in a literal
+ string if the character did not belong there, because that could
+ cause an error. For example, suppose a sentence in a draft of a
+ tutorial on the vi editing language looked like this:
+
+ Then delete one line from the file by typing "dd".
+
+ A book editor following standard usage might change the sentence to
+ look like this:
+
+ Then delete one line from the file by typing "dd."
+
+ However, in the vi language, the dot character repeats the last
+ command accepted. So, if a reader entered "dd.", two lines would be
+ deleted instead of one.
+
+ Similarly, use of standard American punctuation might cause
+ misunderstanding in entries in this Glossary. Thus, the new
+ punctuation is used here, and we recommend it for IDOCs.
+
+3. Types of Entries
+
+ Each entry in this Glossary is marked as type I, N, O, or D:
+
+3.1. Type "I": Recommended Definitions of Internet Origin
+
+ The marking "I" indicates two things:
+ - Origin: "I" (as opposed to "N") means either that the Internet
+ Standards Process or Internet community is authoritative for the
+ definition *or* that the term is sufficiently generic that this
+ Glossary can freely state a definition without contradicting a
+ non-Internet authority (e.g., "attack").
+ - Recommendation: "I" (as opposed to "O") means that the term and
+ definition are RECOMMENDED for use in IDOCs. However, some "I"
+ entries may be accompanied by a "Usage" note that states a
+ limitation (e.g., "certification"), and IDOCs SHOULD NOT use the
+ defined term outside that limited context.
+
+ Many "I" entries are proper nouns (e.g., "Internet Protocol") for
+ which the definition is intended only to provide basic information;
+ i.e., the authoritative definition of such terms is found elsewhere.
+ For a proper noun described as an "Internet protocol", please refer
+ to the current edition of "Internet Official Protocol Standards"
+ (Standard 1) for the standardization status of the protocol.
+
+
+
+
+
+
+
+Shirey Informational [Page 7]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+3.2. Type "N": Recommended Definitions of Non-Internet Origin
+
+ The marking "N" indicates two things:
+ - Origin: "N" (as opposed to "I") means that the entry has a non-
+ Internet basis or origin.
+ - Recommendation: "N" (as opposed to "O") means that the term and
+ definition are RECOMMENDED for use in IDOCs, if they are needed at
+ all in IDOCs. Many of these entries are accompanied by a label
+ that states a context (e.g., "package") or a note that states a
+ limitation (e.g., "data integrity"), and IDOCs SHOULD NOT use the
+ defined term outside that context or limit. Some of the contexts
+ are rarely if ever expected to occur in an IDOC (e.g., "baggage").
+ In those cases, the listing exists to make Internet authors aware
+ of the non-Internet usage so that they can avoid conflicts with
+ non-Internet documents.
+
+3.3. Type "O": Other Terms and Definitions To Be Noted
+
+ The marking "O" means that the definition is of non-Internet origin
+ and SHOULD NOT be used in IDOCs *except* in cases where the term is
+ specifically identified as non-Internet.
+
+ For example, an IDOC might mention "BCA" (see: brand certification
+ authority) or "baggage" as an example of some concept; in that case,
+ the document should specifically say "SET(trademark) BCA" or
+ "SET(trademark) baggage" and include the definition of the term.
+
+3.4. Type "D": Deprecated Terms and Definitions
+
+ If this Glossary recommends that a term or definition SHOULD NOT be
+ used in IDOCs, then the entry is marked as type "D", and an
+ explanatory note -- "Deprecated Term", "Deprecated Abbreviation",
+ "Deprecated Definition", or "Deprecated Usage" -- is provided.
+
+3.5. Definition Substitutions
+
+ Some terms have a definition published by a non-Internet authority --
+ a government (e.g., "object reuse"), an industry (e.g., "Secure Data
+ Exchange"), a national authority (e.g., "Data Encryption Standard"),
+ or an international body (e.g., "data confidentiality") -- that is
+ suitable for use in IDOCs. In those cases, this Glossary marks the
+ definition "N", recommending its use in Internet documents.
+
+ Other such terms have definitions that are inadequate or
+ inappropriate for IDOCs. For example, a definition might be outdated
+ or too narrow, or it might need clarification by substituting more
+ careful wording (e.g., "authentication exchange") or explanations,
+ using other terms that are defined in this Glossary. In those cases,
+
+
+
+Shirey Informational [Page 8]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ this Glossary marks the entry "O", and provides an "I" or "N" entry
+ that precedes, and is intended to supersede, the "O" entry.
+
+ In some cases where this Glossary provides a definition to supersede
+ an "O" definition, the substitute is intended to subsume the meaning
+ of the "O" entry and not conflict with it. For the term "security
+ service", for example, the "O" definition deals narrowly with only
+ communication services provided by layers in the OSIRM and is
+ inadequate for the full range of IDOC usage, while the new "I"
+ definition provided by this Glossary can be used in more situations
+ and for more kinds of service. However, the "O" definition is also
+ listed so that IDOC authors will be aware of the context in which the
+ term is used more narrowly.
+
+ When making substitutions, this Glossary attempts to avoid
+ contradicting any non-Internet authority. Still, terminology differs
+ between authorities such as the American Bar Association, OSI, SET,
+ the U.S. DoD, and other authorities; and this Glossary probably is
+ not exactly aligned with any of them.
+
+4. Definitions
+
+ $ *-property
+ (N) Synonym for "confinement property" in the context of the Bell-
+ LaPadula model. Pronunciation: star property.
+
+ $ 3DES
+ (N) See: Triple Data Encryption Algorithm.
+
+ $ A1 computer system
+ (O) /TCSEC/ See: Tutorial under "Trusted Computer System
+ Evaluation Criteria". (Compare: beyond A1.)
+
+ $ AA
+ (D) See: Deprecated Usage under "attribute authority".
+
+ $ ABA Guidelines
+ (N) "American Bar Association (ABA) Digital Signature Guidelines"
+ [DSG], a framework of legal principles for using digital
+ signatures and digital certificates in electronic commerce.
+
+ $ Abstract Syntax Notation One (ASN.1)
+ (N) A standard for describing data objects. [Larm, X680] (See:
+ CMS.)
+
+ Usage: IDOCs SHOULD use the term "ASN.1" narrowly to describe the
+ notation or language called "Abstract Syntax Notation One". IDOCs
+ MAY use the term more broadly to encompass the notation, its
+
+
+
+Shirey Informational [Page 9]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ associated encoding rules (see: BER), and software tools that
+ assist in its use, when the context makes this meaning clear.
+
+ Tutorial: OSIRM defines computer network functionality in layers.
+ Protocols and data objects at higher layers are abstractly defined
+ to be implemented using protocols and data objects from lower
+ layers. A higher layer may define transfers of abstract objects
+ between computers, and a lower layer may define those transfers
+ concretely as strings of bits. Syntax is needed to specify data
+ formats of abstract objects, and encoding rules are needed to
+ transform abstract objects into bit strings at lower layers. OSI
+ standards use ASN.1 for those specifications and use various
+ encoding rules for those transformations. (See: BER.)
+
+ In ASN.1, formal names are written without spaces, and separate
+ words in a name are indicated by capitalizing the first letter of
+ each word except the first word. For example, the name of a CRL is
+ "certificateRevocationList".
+
+ $ ACC
+ (I) See: access control center.
+
+ $ acceptable risk
+ (I) A risk that is understood and tolerated by a system's user,
+ operator, owner, or accreditor, usually because the cost or
+ difficulty of implementing an effective countermeasure for the
+ associated vulnerability exceeds the expectation of loss. (See:
+ adequate security, risk, "second law" under "Courtney's laws".)
+
+ $ access
+ 1a. (I) The ability and means to communicate with or otherwise
+ interact with a system to use system resources either to handle
+ information or to gain knowledge of the information the system
+ contains. (Compare: handle.)
+
+ Usage: The definition is intended to include all types of
+ communication with a system, including one-way communication in
+ either direction. In actual practice, however, passive users might
+ be treated as not having "access" and, therefore, be exempt from
+ most requirements of the system's security policy. (See: "passive
+ user" under "user".)
+
+ 1b. (O) "Opportunity to make use of an information system (IS)
+ resource." [C4009]
+
+ 2. (O) /formal model/ "A specific type of interaction between a
+ subject and an object that results in the flow of information from
+ one to the other." [NCS04]
+
+
+
+Shirey Informational [Page 10]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Access Certificate for Electronic Services (ACES)
+ (O) A PKI operated by the U.S. Government's General Services
+ Administration in cooperation with industry partners. (See: CAM.)
+
+ $ access control
+ 1. (I) Protection of system resources against unauthorized access.
+
+ 2. (I) A process by which use of system resources is regulated
+ according to a security policy and is permitted only by authorized
+ entities (users, programs, processes, or other systems) according
+ to that policy. (See: access, access control service, computer
+ security, discretionary access control, mandatory access control,
+ role-based access control.)
+
+ 3. (I) /formal model/ Limitations on interactions between subjects
+ and objects in an information system.
+
+ 4. (O) "The prevention of unauthorized use of a resource,
+ including the prevention of use of a resource in an unauthorized
+ manner." [I7498-2]
+
+ 5. (O) /U.S. Government/ A system using physical, electronic, or
+ human controls to identify or admit personnel with properly
+ authorized access to a SCIF.
+
+ $ access control center (ACC)
+ (I) A computer that maintains a database (possibly in the form of
+ an access control matrix) defining the security policy for an
+ access control service, and that acts as a server for clients
+ requesting access control decisions.
+
+ Tutorial: An ACC is sometimes used in conjunction with a key
+ center to implement access control in a key-distribution system
+ for symmetric cryptography. (See: BLACKER, Kerberos.)
+
+ $ access control list (ACL)
+ (I) /information system/ A mechanism that implements access
+ control for a system resource by enumerating the system entities
+ that are permitted to access the resource and stating, either
+ implicitly or explicitly, the access modes granted to each entity.
+ (Compare: access control matrix, access list, access profile,
+ capability list.)
+
+ $ access control matrix
+ (I) A rectangular array of cells, with one row per subject and one
+ column per object. The entry in a cell -- that is, the entry for a
+ particular subject-object pair -- indicates the access mode that
+ the subject is permitted to exercise on the object. Each column is
+
+
+
+Shirey Informational [Page 11]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ equivalent to an "access control list" for the object; and each
+ row is equivalent to an "access profile" for the subject.
+
+ $ access control service
+ (I) A security service that protects against a system entity using
+ a system resource in a way not authorized by the system's security
+ policy. (See: access control, discretionary access control,
+ identity-based security policy, mandatory access control, rule-
+ based security policy.)
+
+ Tutorial: This service includes protecting against use of a
+ resource in an unauthorized manner by an entity (i.e., a
+ principal) that is authorized to use the resource in some other
+ manner. (See: insider.) The two basic mechanisms for implementing
+ this service are ACLs and tickets.
+
+ $ access level
+ 1. (D) Synonym for the hierarchical "classification level" in a
+ security level. [C4009] (See: security level.)
+
+ 2. (D) Synonym for "clearance level".
+
+ Deprecated Definitions: IDOCs SHOULD NOT use this term with these
+ definitions because they duplicate the meaning of more specific
+ terms. Any IDOC that uses this term SHOULD provide a specific
+ definition for it because access control may be based on many
+ attributes other than classification level and clearance level.
+
+ $ access list
+ (I) /physical security/ Roster of persons who are authorized to
+ enter a controlled area. (Compare: access control list.)
+
+ $ access mode
+ (I) A distinct type of data processing operation (e.g., read,
+ write, append, or execute, or a combination of operations) that a
+ subject can potentially perform on an object in an information
+ system. [Huff] (See: read, write.)
+
+ $ access policy
+ (I) A kind of "security policy". (See: access, access control.)
+
+ $ access profile
+ (O) Synonym for "capability list".
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because the definition is not widely known.
+
+
+
+
+
+Shirey Informational [Page 12]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ access right
+ (I) Synonym for "authorization"; emphasizes the possession of the
+ authorization by a system entity.
+
+ $ accountability
+ (I) The property of a system or system resource that ensures that
+ the actions of a system entity may be traced uniquely to that
+ entity, which can then be held responsible for its actions. [Huff]
+ (See: audit service.)
+
+ Tutorial: Accountability (a.k.a. individual accountability)
+ typically requires a system ability to positively associate the
+ identity of a user with the time, method, and mode of the user's
+ access to the system. This ability supports detection and
+ subsequent investigation of security breaches. Individual persons
+ who are system users are held accountable for their actions after
+ being notified of the rules of behavior for using the system and
+ the penalties associated with violating those rules.
+
+ $ accounting See: COMSEC accounting.
+
+ $ accounting legend code (ALC)
+ (O) /U.S. Government/ Numeric system used to indicate the minimum
+ accounting controls required for items of COMSEC material within
+ the CMCS. [C4009] (See: COMSEC accounting.)
+
+ $ accreditation
+ (N) An administrative action by which a designated authority
+ declares that an information system is approved to operate in a
+ particular security configuration with a prescribed set of
+ safeguards. [FP102, SP37] (See: certification.)
+
+ Tutorial: An accreditation is usually based on a technical
+ certification of the system's security mechanisms. To accredit a
+ system, the approving authority must determine that any residual
+ risk is an acceptable risk. Although the terms "certification" and
+ "accreditation" are used more in the U.S. DoD and other U.S.
+ Government agencies than in commercial organizations, the concepts
+ apply any place where managers are required to deal with and
+ accept responsibility for security risks. For example, the
+ American Bar Association is developing accreditation criteria for
+ CAs.
+
+ $ accreditation boundary
+ (O) Synonym for "security perimeter". [C4009]
+
+
+
+
+
+
+Shirey Informational [Page 13]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ accreditor
+ (N) A management official who has been designated to have the
+ formal authority to "accredit" an information system, i.e., to
+ authorize the operation of, and the processing of sensitive data
+ in, the system and to accept the residual risk associated with the
+ system. (See: accreditation, residual risk.)
+
+ $ ACES
+ (O) See: Access Certificate for Electronic Services.
+
+ $ ACL
+ (I) See: access control list.
+
+ $ acquirer
+ 1. (O) /SET/ "The financial institution that establishes an
+ account with a merchant and processes payment card authorizations
+ and payments." [SET1]
+
+ 2. (O) /SET/ "The institution (or its agent) that acquires from
+ the card acceptor the financial data relating to the transaction
+ and initiates that data into an interchange system." [SET2]
+
+ $ activation data
+ (N) Secret data, other than keys, that is required to access a
+ cryptographic module. (See: CIK. Compare: initialization value.)
+
+ $ active attack
+ (I) See: secondary definition under "attack".
+
+ $ active content
+ 1a. (I) Executable software that is bound to a document or other
+ data file and that executes automatically when a user accesses the
+ file, without explicit initiation by the user. (Compare: mobile
+ code.)
+
+ Tutorial: Active content can be mobile code when its associated
+ file is transferred across a network.
+
+ 1b. (O) "Electronic documents that can carry out or trigger
+ actions automatically on a computer platform without the
+ intervention of a user. [This technology enables] mobile code
+ associated with a document to execute as the document is
+ rendered." [SP28]
+
+ $ active user
+ (I) See: secondary definition under "system user".
+
+
+
+
+
+Shirey Informational [Page 14]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ active wiretapping
+ (I) A wiretapping attack that attempts to alter data being
+ communicated or otherwise affect data flow. (See: wiretapping.
+ Compare: active attack, passive wiretapping.)
+
+ $ add-on security
+ (N) The retrofitting of protection mechanisms, implemented by
+ hardware or software, in an information system after the system
+ has become operational. [FP039] (Compare: baked-in security.)
+
+ $ adequate security
+ (O) /U.S. DoD/ "Security commensurate with the risk and magnitude
+ of harm resulting from the loss, misuse, or unauthorized access to
+ or modification of information." (See: acceptable risk, residual
+ risk.)
+
+ $ administrative security
+ 1. (I) Management procedures and constraints to prevent
+ unauthorized access to a system. (See: "third law" under
+ "Courtney's laws", manager, operational security, procedural
+ security, security architecture. Compare: technical security.)
+
+ Examples: Clear delineation and separation of duties;
+ configuration control.
+
+ Usage: Administrative security is usually understood to consist of
+ methods and mechanisms that are implemented and executed primarily
+ by people, rather than by automated systems.
+
+ 2. (O) "The management constraints, operational procedures,
+ accountability procedures, and supplemental controls established
+ to provide an acceptable level of protection for sensitive data."
+ [FP039]
+
+ $ administrator
+ 1. (O) /Common Criteria/ A person that is responsible for
+ configuring, maintaining, and administering the TOE in a correct
+ manner for maximum security. (See: administrative security.)
+
+ 2. (O) /ITSEC/ A person in contact with the TOE, who is
+ responsible for maintaining its operational capability.
+
+ $ Advanced Encryption Standard (AES)
+ (N) A U.S. Government standard [FP197] (the successor to DES) that
+ (a) specifies "the AES algorithm", which is a symmetric block
+ cipher that is based on Rijndael and uses key sizes of 128, 192,
+ or 256 bits to operate on a 128-bit block, and (b) states policy
+ for using that algorithm to protect unclassified, sensitive data.
+
+
+
+Shirey Informational [Page 15]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Rijndael was designed to handle additional block sizes
+ and key lengths that were not adopted in the AES. Rijndael was
+ selected by NIST through a public competition that was held to
+ find a successor to the DEA; the other finalists were MARS, RC6,
+ Serpent, and Twofish.
+
+ $ adversary
+ 1. (I) An entity that attacks a system. (Compare: cracker,
+ intruder, hacker.)
+
+ 2. (I) An entity that is a threat to a system.
+
+ $ AES
+ (N) See: Advanced Encryption Standard.
+
+ $ Affirm
+ (O) A formal methodology, language, and integrated set of software
+ tools developed at the University of Southern California's
+ Information Sciences Institute for specifying, coding, and
+ verifying software to produce correct and reliable programs.
+ [Cheh]
+
+ $ aggregation
+ (I) A circumstance in which a collection of information items is
+ required to be classified at a higher security level than any of
+ the items is classified individually. (See: classification.)
+
+ $ AH
+ (I) See: Authentication Header
+
+ $ air gap
+ (I) An interface between two systems at which (a) they are not
+ connected physically and (b) any logical connection is not
+ automated (i.e., data is transferred through the interface only
+ manually, under human control). (See: sneaker net. Compare:
+ gateway.)
+
+ Example: Computer A and computer B are on opposite sides of a
+ room. To move data from A to B, a person carries a disk across the
+ room. If A and B operate in different security domains, then
+ moving data across the air gap may involve an upgrade or downgrade
+ operation.
+
+ $ ALC
+ (O) See: accounting legend code.
+
+
+
+
+
+
+Shirey Informational [Page 16]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ algorithm
+ (I) A finite set of step-by-step instructions for a problem-
+ solving or computation procedure, especially one that can be
+ implemented by a computer. (See: cryptographic algorithm.)
+
+ $ alias
+ (I) A name that an entity uses in place of its real name, usually
+ for the purpose of either anonymity or masquerade.
+
+ $ Alice and Bob
+ (I) The parties that are most often called upon to illustrate the
+ operation of bipartite security protocols. These and other
+ dramatis personae are listed by Schneier [Schn].
+
+ $ American National Standards Institute (ANSI)
+ (N) A private, not-for-profit association that administers U.S.
+ private-sector voluntary standards.
+
+ Tutorial: ANSI has approximately 1,000 member organizations,
+ including equipment users, manufacturers, and others. These
+ include commercial firms, governmental agencies, and other
+ institutions and international entities.
+
+ ANSI is the sole U.S. representative to (a) ISO and (b) (via the
+ U.S. National Committee) the International Electrotechnical
+ Commission (IEC), which are the two major, non-treaty,
+ international standards organizations.
+
+ ANSI provides a forum for ANSI-accredited standards development
+ groups. Among those groups, the following are especially relevant
+ to Internet security:
+ - International Committee for Information Technology
+ Standardization (INCITS) (formerly X3): Primary U.S. focus of
+ standardization in information and communications technologies,
+ encompassing storage, processing, transfer, display,
+ management, organization, and retrieval of information.
+ Example: [A3092].
+ - Accredited Standards Committee X9: Develops, establishes,
+ maintains, and promotes standards for the financial services
+ industry. Example: [A9009].
+ - Alliance for Telecommunications Industry Solutions (ATIS):
+ Develops standards, specifications, guidelines, requirements,
+ technical reports, industry processes, and verification tests
+ for interoperability and reliability of telecommunications
+ networks, equipment, and software. Example: [A1523].
+
+
+
+
+
+
+Shirey Informational [Page 17]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ American Standard Code for Information Interchange (ASCII)
+ (N) A scheme that encodes 128 specified characters -- the numbers
+ 0-9, the letters a-z and A-Z, some basic punctuation symbols, some
+ control codes that originated with Teletype machines, and a blank
+ space -- into the 7-bit binary integers. Forms the basis of the
+ character set representations used in most computers and many
+ Internet standards. [FP001] (See: code.)
+
+ $ Anderson report
+ (O) A 1972 study of computer security that was written by James P.
+ Anderson for the U.S. Air Force [Ande].
+
+ Tutorial: Anderson collaborated with a panel of experts to study
+ Air Force requirements for multilevel security. The study
+ recommended research and development that was urgently needed to
+ provide secure information processing for command and control
+ systems and support systems. The report introduced the reference
+ monitor concept and provided development impetus for computer and
+ network security technology. However, many of the security
+ problems that the 1972 report called "current" still plague
+ information systems today.
+
+ $ anomaly detection
+ (I) An intrusion detection method that searches for activity that
+ is different from the normal behavior of system entities and
+ system resources. (See: IDS. Compare: misuse detection.)
+
+ $ anonymity
+ (I) The condition of an identity being unknown or concealed. (See:
+ alias, anonymizer, anonymous credential, anonymous login,
+ identity, onion routing, persona certificate. Compare: privacy.)
+
+ Tutorial: An application may require security services that
+ maintain anonymity of users or other system entities, perhaps to
+ preserve their privacy or hide them from attack. To hide an
+ entity's real name, an alias may be used; for example, a financial
+ institution may assign account numbers. Parties to transactions
+ can thus remain relatively anonymous, but can also accept the
+ transactions as legitimate. Real names of the parties cannot be
+ easily determined by observers of the transactions, but an
+ authorized third party may be able to map an alias to a real name,
+ such as by presenting the institution with a court order. In other
+ applications, anonymous entities may be completely untraceable.
+
+ $ anonymizer
+ (I) An internetwork service, usually provided via a proxy server,
+ that provides anonymity and privacy for clients. That is, the
+ service enables a client to access servers (a) without allowing
+
+
+
+Shirey Informational [Page 18]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ anyone to gather information about which servers the client
+ accesses and (b) without allowing the accessed servers to gather
+ information about the client, such as its IP address.
+
+ $ anonymous credential
+ (D) /U.S. Government/ A credential that (a) can be used to
+ authenticate a person as having a specific attribute or being a
+ member of a specific group (e.g., military veterans or U.S.
+ citizens) but (b) does not reveal the individual identity of the
+ person that presents the credential. [M0404] (See: anonymity.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it mixes concepts
+ in a potentially misleading way. For example, when the credential
+ is an X.509 certificate, the term could be misunderstood to mean
+ that the certificate was signed by a CA that has a persona
+ certificate. Instead, use "attribute certificate", "organizational
+ certificate", or "persona certificate" depending on what is meant,
+ and provide additional explanations as needed.
+
+ $ anonymous login
+ (I) An access control feature (actually, an access control
+ vulnerability) in many Internet hosts that enables users to gain
+ access to general-purpose or public services and resources of a
+ host (such as allowing any user to transfer data using FTP)
+ without having a pre-established, identity-specific account (i.e.,
+ user name and password). (See: anonymity.)
+
+ Tutorial: This feature exposes a system to more threats than when
+ all the users are known, pre-registered entities that are
+ individually accountable for their actions. A user logs in using a
+ special, publicly known user name (e.g., "anonymous", "guest", or
+ "ftp"). To use the public login name, the user is not required to
+ know a secret password and may not be required to input anything
+ at all except the name. In other cases, to complete the normal
+ sequence of steps in a login protocol, the system may require the
+ user to input a matching, publicly known password (such as
+ "anonymous") or may ask the user for an e-mail address or some
+ other arbitrary character string.
+
+ $ ANSI
+ (N) See: American National Standards Institute.
+
+ $ anti-jam
+ (N) "Measures ensuring that transmitted information can be
+ received despite deliberate jamming attempts." [C4009] (See:
+ electronic security, frequency hopping, jam, spread spectrum.)
+
+
+
+
+
+Shirey Informational [Page 19]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ apex trust anchor
+ (N) The trust anchor that is superior to all other trust anchors
+ in a particular system or context. (See: trust anchor, top CA.)
+
+ $ API
+ (I) See: application programming interface.
+
+ $ APOP
+ (I) See: POP3 APOP.
+
+ $ Application Layer
+ See: Internet Protocol Suite, OSIRM.
+
+ $ application program
+ (I) A computer program that performs a specific function directly
+ for a user (as opposed to a program that is part of a computer
+ operating system and exists to perform functions in support of
+ application programs).
+
+ $ architecture
+ (I) See: security architecture, system architecture.
+
+ $ archive
+ 1a. (I) /noun/ A collection of data that is stored for a
+ relatively long period of time for historical and other purposes,
+ such as to support audit service, availability service, or system
+ integrity service. (Compare: backup, repository.)
+
+ 1b. (I) /verb/ To store data in such a way as to create an
+ archive. (Compare: back up.)
+
+ Tutorial: A digital signature may need to be verified many years
+ after the signing occurs. The CA -- the one that issued the
+ certificate containing the public key needed to verify that
+ signature -- may not stay in operation that long. So every CA
+ needs to provide for long-term storage of the information needed
+ to verify the signatures of those to whom it issues certificates.
+
+ $ ARPANET
+ (I) Advanced Research Projects Agency (ARPA) Network, a pioneer
+ packet-switched network that (a) was designed, implemented,
+ operated, and maintained by BBN from January 1969 until July 1975
+ under contract to the U.S. Government; (b) led to the development
+ of today's Internet; and (c) was decommissioned in June 1990.
+ [B4799, Hafn]
+
+ $ ASCII
+ (N) See: American Standard Code for Information Interchange.
+
+
+
+Shirey Informational [Page 20]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ ASN.1
+ (N) See: Abstract Syntax Notation One.
+
+ $ asset
+ (I) A system resource that is (a) required to be protected by an
+ information system's security policy, (b) intended to be protected
+ by a countermeasure, or (c) required for a system's mission.
+
+ $ association
+ (I) A cooperative relationship between system entities, usually
+ for the purpose of transferring information between them. (See:
+ security association.)
+
+ $ assurance See: security assurance.
+
+ $ assurance level
+ (N) A rank on a hierarchical scale that judges the confidence
+ someone can have that a TOE adequately fulfills stated security
+ requirements. (See: assurance, certificate policy, EAL, TCSEC.)
+
+ Example: U.S. Government guidance [M0404] describes four assurance
+ levels for identity authentication, where each level "describes
+ the [U.S. Federal Government] agency's degree of certainty that
+ the user has presented [a credential] that refers to [the user's]
+ identity." In that guidance, assurance is defined as (a) "the
+ degree of confidence in the vetting process used to establish the
+ identity of the individual to whom the credential was issued" and
+ (b) "the degree of confidence that the individual who uses the
+ credential is the individual to whom the credential was issued."
+
+ The four levels are described as follows:
+ - Level 1: Little or no confidence in the asserted identity.
+ - Level 2: Some confidence in the asserted identity.
+ - Level 3: High confidence in the asserted identity.
+ - Level 4: Very high confidence in the asserted identity.
+
+ Standards for determining these levels are provided in a NIST
+ publication [SP12]. However, as noted there, an assurance level is
+ "a degree of confidence, not a true measure of how secure the
+ system actually is. This distinction is necessary because it is
+ extremely difficult -- and in many cases, virtually impossible --
+ to know exactly how secure a system is."
+
+ $ asymmetric cryptography
+ (I) A modern branch of cryptography (popularly known as "public-
+ key cryptography") in which the algorithms use a pair of keys (a
+ public key and a private key) and use a different component of the
+ pair for each of two counterpart cryptographic operations (e.g.,
+
+
+
+Shirey Informational [Page 21]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ encryption and decryption, or signature creation and signature
+ verification). (See: key pair, symmetric cryptography.)
+
+ Tutorial: Asymmetric algorithms have key management advantages
+ over equivalently strong symmetric ones. First, one key of the
+ pair need not be known by anyone but its owner; so it can more
+ easily be kept secret. Second, although the other key is shared by
+ all entities that use the algorithm, that key need not be kept
+ secret from other, non-using entities; thus, the key-distribution
+ part of key management can be done more easily.
+
+ Asymmetric cryptography can be used to create algorithms for
+ encryption, digital signature, and key agreement:
+ - In an asymmetric encryption algorithm (e.g., "RSA"), when Alice
+ wants to ensure confidentiality for data she sends to Bob, she
+ encrypts the data with a public key provided by Bob. Only Bob
+ has the matching private key that is needed to decrypt the
+ data. (Compare: seal.)
+ - In an asymmetric digital signature algorithm (e.g., "DSA"),
+ when Alice wants to ensure data integrity or provide
+ authentication for data she sends to Bob, she uses her private
+ key to sign the data (i.e., create a digital signature based on
+ the data). To verify the signature, Bob uses the matching
+ public key that Alice has provided.
+ - In an asymmetric key-agreement algorithm (e.g., "Diffie-
+ Hellman-Merkle"), Alice and Bob each send their own public key
+ to the other party. Then each uses their own private key and
+ the other's public key to compute the new key value.
+
+ $ asymmetric key
+ (I) A cryptographic key that is used in an asymmetric
+ cryptographic algorithm. (See: asymmetric cryptography, private
+ key, public key.)
+
+ $ ATIS
+ (N) See: "Alliance for Telecommunications Industry Solutions"
+ under "ANSI".
+
+ $ attack
+ 1. (I) An intentional act by which an entity attempts to evade
+ security services and violate the security policy of a system.
+ That is, an actual assault on system security that derives from an
+ intelligent threat. (See: penetration, violation, vulnerability.)
+
+ 2. (I) A method or technique used in an assault (e.g.,
+ masquerade). (See: blind attack, distributed attack.)
+
+
+
+
+
+Shirey Informational [Page 22]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Attacks can be characterized according to intent:
+ - An "active attack" attempts to alter system resources or affect
+ their operation.
+ - A "passive attack" attempts to learn or make use of information
+ from a system but does not affect system resources of that
+ system. (See: wiretapping.)
+
+ The object of a passive attack might be to obtain data that is
+ needed for an off-line attack.
+ - An "off-line attack" is one in which the attacker obtains data
+ from the target system and then analyzes the data on a
+ different system of the attacker's own choosing, possibly in
+ preparation for a second stage of attack on the target.
+
+ Attacks can be characterized according to point of initiation:
+ - An "inside attack" is one that is initiated by an entity inside
+ the security perimeter (an "insider"), i.e., an entity that is
+ authorized to access system resources but uses them in a way
+ not approved by the party that granted the authorization.
+ - An "outside attack" is initiated from outside the security
+ perimeter, by an unauthorized or illegitimate user of the
+ system (an "outsider"). In the Internet, potential outside
+ attackers range from amateur pranksters to organized criminals,
+ international terrorists, and hostile governments.
+ Attacks can be characterized according to method of delivery:
+ - In a "direct attack", the attacker addresses attacking packets
+ to the intended victim(s).
+ - In an "indirect attack", the attacker addresses packets to a
+ third party, and the packets either have the address(es) of the
+ intended victim(s) as their source address(es) or indicate the
+ intended victim(s) in some other way. The third party responds
+ by sending one or more attacking packets to the intended
+ victims. The attacker can use third parties as attack
+ amplifiers by providing a broadcast address as the victim
+ address (e.g., "smurf attack"). (See: reflector attack.
+ Compare: reflection attack, replay attack.)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shirey Informational [Page 23]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ The term "attack" relates to some other basic security terms as
+ shown in the following diagram:
+
+ + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+
+ | An Attack: | |Counter- | | A System Resource: |
+ | i.e., A Threat Action | | measure | | Target of the Attack |
+ | +----------+ | | | | +-----------------+ |
+ | | Attacker |<==================||<========= | |
+ | | i.e., | Passive | | | | | Vulnerability | |
+ | | A Threat |<=================>||<========> | |
+ | | Agent | or Active | | | | +-------|||-------+ |
+ | +----------+ Attack | | | | VVV |
+ | | | | | Threat Consequences |
+ + - - - - - - - - - - - - + + - - - - + + - - - - - - - - - - -+
+
+ $ attack potential
+ (I) The perceived likelihood of success should an attack be
+ launched, expressed in terms of the attacker's ability (i.e.,
+ expertise and resources) and motivation. (Compare: threat, risk.)
+
+ $ attack sensing, warning, and response
+ (I) A set of security services that cooperate with audit service
+ to detect and react to indications of threat actions, including
+ both inside and outside attacks. (See: indicator.)
+
+ $ attack tree
+ (I) A branching, hierarchical data structure that represents a set
+ of potential approaches to achieving an event in which system
+ security is penetrated or compromised in a specified way. [Moor]
+
+ Tutorial: Attack trees are special cases of fault trees. The
+ security incident that is the goal of the attack is represented as
+ the root node of the tree, and the ways that an attacker could
+ reach that goal are iteratively and incrementally represented as
+ branches and subnodes of the tree. Each subnode defines a subgoal,
+ and each subgoal may have its own set of further subgoals, etc.
+ The final nodes on the paths outward from the root, i.e., the leaf
+ nodes, represent different ways to initiate an attack. Each node
+ other than a leaf is either an AND-node or an OR-node. To achieve
+ the goal represented by an AND-node, the subgoals represented by
+ all of that node's subnodes must be achieved; and for an OR-node,
+ at least one of the subgoals must be achieved. Branches can be
+ labeled with values representing difficulty, cost, or other attack
+ attributes, so that alternative attacks can be compared.
+
+
+
+
+
+
+
+Shirey Informational [Page 24]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ attribute
+ (N) Information of a particular type concerning an identifiable
+ system entity or object. An "attribute type" is the component of
+ an attribute that indicates the class of information given by the
+ attribute; and an "attribute value" is a particular instance of
+ the class of information indicated by an attribute type. (See:
+ attribute certificate.)
+
+ $ attribute authority (AA)
+ 1. (N) A CA that issues attribute certificates.
+
+ 2. (O) "An authority [that] assigns privileges by issuing
+ attribute certificates." [X509]
+
+ Deprecated Usage: The abbreviation "AA" SHOULD NOT be used in an
+ IDOC unless it is first defined in the IDOC.
+
+ $ attribute certificate
+ 1. (I) A digital certificate that binds a set of descriptive data
+ items, other than a public key, either directly to a subject name
+ or to the identifier of another certificate that is a public-key
+ certificate. (See: capability token.)
+
+ 2. (O) "A data structure, digitally signed by an [a]ttribute
+ [a]uthority, that binds some attribute values with identification
+ information about its holder." [X509]
+
+ Tutorial: A public-key certificate binds a subject name to a
+ public key value, along with information needed to perform certain
+ cryptographic functions using that key. Other attributes of a
+ subject, such as a security clearance, may be certified in a
+ separate kind of digital certificate, called an attribute
+ certificate. A subject may have multiple attribute certificates
+ associated with its name or with each of its public-key
+ certificates.
+
+ An attribute certificate might be issued to a subject in the
+ following situations:
+ - Different lifetimes: When the lifetime of an attribute binding
+ is shorter than that of the related public-key certificate, or
+ when it is desirable not to need to revoke a subject's public
+ key just to revoke an attribute.
+ - Different authorities: When the authority responsible for the
+ attributes is different than the one that issues the public-key
+ certificate for the subject. (There is no requirement that an
+ attribute certificate be issued by the same CA that issued the
+ associated public-key certificate.)
+
+
+
+
+Shirey Informational [Page 25]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ audit
+ See: security audit.
+
+ $ audit log
+ (I) Synonym for "security audit trail".
+
+ $ audit service
+ (I) A security service that records information needed to
+ establish accountability for system events and for the actions of
+ system entities that cause them. (See: security audit.)
+
+ $ audit trail
+ (I) See: security audit trail.
+
+ $ AUTH
+ (I) See: POP3 AUTH.
+
+ $ authenticate
+ (I) Verify (i.e., establish the truth of) an attribute value
+ claimed by or for a system entity or system resource. (See:
+ authentication, validate vs. verify, "relationship between data
+ integrity service and authentication services" under "data
+ integrity service".)
+
+ Deprecated Usage: In general English usage, this term is used with
+ the meaning "to prove genuine" (e.g., an art expert authenticates
+ a Michelangelo painting); but IDOCs should restrict usage as
+ follows:
+ - IDOCs SHOULD NOT use this term to refer to proving or checking
+ that data has not been changed, destroyed, or lost in an
+ unauthorized or accidental manner. Instead, use "verify".
+ - IDOCs SHOULD NOT use this term to refer to proving the truth or
+ accuracy of a fact or value such as a digital signature.
+ Instead, use "verify".
+ - IDOCs SHOULD NOT use this term to refer to establishing the
+ soundness or correctness of a construct, such as a digital
+ certificate. Instead, use "validate".
+
+ $ authentication
+ (I) The process of verifying a claim that a system entity or
+ system resource has a certain attribute value. (See: attribute,
+ authenticate, authentication exchange, authentication information,
+ credential, data origin authentication, peer entity
+ authentication, "relationship between data integrity service and
+ authentication services" under "data integrity service", simple
+ authentication, strong authentication, verification, X.509.)
+
+
+
+
+
+Shirey Informational [Page 26]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Security services frequently depend on authentication of
+ the identity of users, but authentication may involve any type of
+ attribute that is recognized by a system. A claim may be made by a
+ subject about itself (e.g., at login, a user typically asserts its
+ identity) or a claim may be made on behalf of a subject or object
+ by some other system entity (e.g., a user may claim that a data
+ object originates from a specific source, or that a data object is
+ classified at a specific security level).
+
+ An authentication process consists of two basic steps:
+ - Identification step: Presenting the claimed attribute value
+ (e.g., a user identifier) to the authentication subsystem.
+ - Verification step: Presenting or generating authentication
+ information (e.g., a value signed with a private key) that acts
+ as evidence to prove the binding between the attribute and that
+ for which it is claimed. (See: verification.)
+
+ $ authentication code
+ (D) Synonym for a checksum based on cryptography. (Compare: Data
+ Authentication Code, Message Authentication Code.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this uncapitalized term as a
+ synonym for any kind of checksum, regardless of whether or not the
+ checksum is cryptographic. Instead, use "checksum", "Data
+ Authentication Code", "error detection code", "hash", "keyed
+ hash", "Message Authentication Code", "protected checksum", or
+ some other recommended term, depending on what is meant.
+
+ The term mixes concepts in a potentially misleading way. The word
+ "authentication" is misleading because the checksum may be used to
+ perform a data integrity function rather than a data origin
+ authentication function.
+
+ $ authentication exchange
+ 1. (I) A mechanism to verify the identity of an entity by means of
+ information exchange.
+
+ 2. (O) "A mechanism intended to ensure the identity of an entity
+ by means of information exchange." [I7498-2]
+
+ $ Authentication Header (AH)
+ (I) An Internet protocol [R2402, R4302] designed to provide
+ connectionless data integrity service and connectionless data
+ origin authentication service for IP datagrams, and (optionally)
+ to provide partial sequence integrity and protection against
+ replay attacks. (See: IPsec. Compare: ESP.)
+
+
+
+
+
+Shirey Informational [Page 27]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Replay protection may be selected by the receiver when a
+ security association is established. AH authenticates the upper-
+ layer PDU that is carried as an IP SDU, and also authenticates as
+ much of the IP PCI (i.e., the IP header) as possible. However,
+ some IP header fields may change in transit, and the value of
+ these fields, when the packet arrives at the receiver, may not be
+ predictable by the sender. Thus, the values of such fields cannot
+ be protected end-to-end by AH; protection of the IP header by AH
+ is only partial when such fields are present.
+
+ AH may be used alone, or in combination with the ESP, or in a
+ nested fashion with tunneling. Security services can be provided
+ between a pair of communicating hosts, between a pair of
+ communicating security gateways, or between a host and a gateway.
+ ESP can provide nearly the same security services as AH, and ESP
+ can also provide data confidentiality service. The main difference
+ between authentication services provided by ESP and AH is the
+ extent of the coverage; ESP does not protect IP header fields
+ unless they are encapsulated by AH.
+
+ $ authentication information
+ (I) Information used to verify an identity claimed by or for an
+ entity. (See: authentication, credential, user. Compare:
+ identification information.)
+
+ Tutorial: Authentication information may exist as, or be derived
+ from, one of the following: (a) Something the entity knows (see:
+ password); (b) something the entity possesses (see: token); (c)
+ something the entity is (see: biometric authentication).
+
+ $ authentication service
+ (I) A security service that verifies an identity claimed by or for
+ an entity. (See: authentication.)
+
+ Tutorial: In a network, there are two general forms of
+ authentication service: data origin authentication service and
+ peer entity authentication service.
+
+ $ authenticity
+ (I) The property of being genuine and able to be verified and be
+ trusted. (See: authenticate, authentication, validate vs. verify.)
+
+ $ authority
+ (D) /PKI/ "An entity [that is] responsible for the issuance of
+ certificates." [X509]
+
+
+
+
+
+
+Shirey Informational [Page 28]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term as a synonym for
+ attribute authority, certification authority, registration
+ authority, or similar terms; the shortened form may cause
+ confusion. Instead, use the full term at the first instance of
+ usage and then, if it is necessary to shorten text, use AA, CA,
+ RA, and other abbreviations defined in this Glossary.
+
+ $ authority certificate
+ (D) "A certificate issued to an authority (e.g. either to a
+ certification authority or to an attribute authority)." [X509]
+ (See: authority.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term because it is
+ ambiguous. Instead, use the full term "certification authority
+ certificate", "attribute authority certificate", "registration
+ authority certificate", etc. at the first instance of usage and
+ then, if it is necessary to shorten text, use AA, CA, RA, and
+ other abbreviations defined in this Glossary.
+
+ $ Authority Information Access extension
+ (I) The private extension defined by PKIX for X.509 certificates
+ to indicate "how to access CA information and services for the
+ issuer of the certificate in which the extension appears.
+ Information and services may include on-line validation services
+ and CA policy data." [R3280] (See: private extension.)
+
+ $ authorization
+ 1a. (I) An approval that is granted to a system entity to access a
+ system resource. (Compare: permission, privilege.)
+
+ Usage: Some synonyms are "permission" and "privilege". Specific
+ terms are preferred in certain contexts:
+ - /PKI/ "Authorization" SHOULD be used, to align with
+ "certification authority" in the standard [X509].
+ - /role-based access control/ "Permission" SHOULD be used, to
+ align with the standard [ANSI].
+ - /computer operating systems/ "Privilege" SHOULD be used, to
+ align with the literature. (See: privileged process, privileged
+ user.)
+
+ Tutorial: The semantics and granularity of authorizations depend
+ on the application and implementation (see: "first law" under
+ "Courtney's laws"). An authorization may specify a particular
+ access mode -- such as read, write, or execute -- for one or more
+ system resources.
+
+ 1b. (I) A process for granting approval to a system entity to
+ access a system resource.
+
+
+
+Shirey Informational [Page 29]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (O) /SET/ "The process by which a properly appointed person or
+ persons grants permission to perform some action on behalf of an
+ organization. This process assesses transaction risk, confirms
+ that a given transaction does not raise the account holder's debt
+ above the account's credit limit, and reserves the specified
+ amount of credit. (When a merchant obtains authorization, payment
+ for the authorized amount is guaranteed -- provided, of course,
+ that the merchant followed the rules associated with the
+ authorization process.)" [SET2]
+
+ $ authorization credential
+ (I) See: /access control/ under "credential".
+
+ $ authorize
+ (I) Grant an authorization to a system entity.
+
+ $ authorized user
+ (I) /access control/ A system entity that accesses a system
+ resource for which the entity has received an authorization.
+ (Compare: insider, outsider, unauthorized user.)
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because the term is used in many ways and could
+ easily be misunderstood.
+
+ $ automated information system
+ See: information system.
+
+ $ availability
+ 1. (I) The property of a system or a system resource being
+ accessible, or usable or operational upon demand, by an authorized
+ system entity, according to performance specifications for the
+ system; i.e., a system is available if it provides services
+ according to the system design whenever users request them. (See:
+ critical, denial of service. Compare: precedence, reliability,
+ survivability.)
+
+ 2. (O) "The property of being accessible and usable upon demand by
+ an authorized entity." [I7498-2]
+
+ 3. (D) "Timely, reliable access to data and information services
+ for authorized users." [C4009]
+
+ Deprecated Definition: IDOCs SHOULD NOT use the term with
+ definition 3; the definition mixes "availability" with
+ "reliability", which is a different property. (See: reliability.)
+
+
+
+
+
+Shirey Informational [Page 30]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Availability requirements can be specified by
+ quantitative metrics, but sometimes are stated qualitatively, such
+ as in the following:
+ - "Flexible tolerance for delay" may mean that brief system
+ outages do not endanger mission accomplishment, but extended
+ outages may endanger the mission.
+ - "Minimum tolerance for delay" may mean that mission
+ accomplishment requires the system to provide requested
+ services in a short time.
+
+ $ availability service
+ (I) A security service that protects a system to ensure its
+ availability.
+
+ Tutorial: This service addresses the security concerns raised by
+ denial-of-service attacks. It depends on proper management and
+ control of system resources, and thus depends on access control
+ service and other security services.
+
+ $ avoidance
+ (I) See: secondary definition under "security".
+
+ $ B1, B2, or B3 computer system
+ (O) /TCSEC/ See: Tutorial under "Trusted Computer System
+ Evaluation Criteria".
+
+ $ back door
+ 1. (I) /COMPUSEC/ A computer system feature -- which may be (a) an
+ unintentional flaw, (b) a mechanism deliberately installed by the
+ system's creator, or (c) a mechanism surreptitiously installed by
+ an intruder -- that provides access to a system resource by other
+ than the usual procedure and usually is hidden or otherwise not
+ well-known. (See: maintenance hook. Compare: Trojan Horse.)
+
+ Example: A way to access a computer other than through a normal
+ login. Such an access path is not necessarily designed with
+ malicious intent; operating systems sometimes are shipped by the
+ manufacturer with hidden accounts intended for use by field
+ service technicians or the vendor's maintenance programmers.
+
+ 2. (I) /cryptography/ A feature of a cryptographic system that
+ makes it easily possible to break or circumvent the protection
+ that the system is designed to provide.
+
+ Example: A feature that makes it possible to decrypt cipher text
+ much more quickly than by brute-force cryptanalysis, without
+ having prior knowledge of the decryption key.
+
+
+
+
+Shirey Informational [Page 31]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ back up
+ (I) /verb/ Create a reserve copy of data or, more generally,
+ provide alternate means to perform system functions despite loss
+ of system resources. (See: contingency plan. Compare: archive.)
+
+ $ backup
+ (I) /noun or adjective/ Refers to alternate means of performing
+ system functions despite loss of system resources. (See:
+ contingency plan).
+
+ Example: A reserve copy of data, preferably one that is stored
+ separately from the original, for use if the original becomes lost
+ or damaged. (Compare: archive.)
+
+ $ bagbiter
+ (D) /slang/ "An entity, such as a program or a computer, that
+ fails to work or that works in a remarkably clumsy manner. A
+ person who has caused some trouble, inadvertently or otherwise,
+ typically by failing to program the computer properly." [NCSSG]
+ (See: flaw.)
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for these concepts. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ baggage
+ (O) /SET/ An "opaque encrypted tuple, which is included in a SET
+ message but appended as external data to the PKCS encapsulated
+ data. This avoids superencryption of the previously encrypted
+ tuple, but guarantees linkage with the PKCS portion of the
+ message." [SET2]
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term to describe a
+ data element, except in the form "SET(trademark) baggage" with the
+ meaning given above.
+
+ $ baked-in security
+ (D) The inclusion of security mechanisms in an information system
+ beginning at an early point in the system's lifecycle, i.e.,
+ during the design phase, or at least early in the implementation
+ phase. (Compare: add-on security.)
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term (unless they also
+ provide a definition like this one). (See: Deprecated Usage under
+ "Green Book".)
+
+
+
+Shirey Informational [Page 32]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ bandwidth
+ (I) The total width of the frequency band that is available to or
+ used by a communication channel; usually expressed in Hertz (Hz).
+ (RFC 3753) (Compare: channel capacity.)
+
+ $ bank identification number (BIN)
+ 1. (O) The digits of a credit card number that identify the
+ issuing bank. (See: primary account number.)
+
+ 2. (O) /SET/ The first six digits of a primary account number.
+
+ $ Basic Encoding Rules (BER)
+ (I) A standard for representing ASN.1 data types as strings of
+ octets. [X690] (See: Distinguished Encoding Rules.)
+
+ Deprecated Usage: Sometimes incorrectly treated as part of ASN.1.
+ However, ASN.1 properly refers only to a syntax description
+ language, and not to the encoding rules for the language.
+
+ $ Basic Security Option
+ (I) See: secondary definition under "IPSO".
+
+ $ bastion host
+ (I) A strongly protected computer that is in a network protected
+ by a firewall (or is part of a firewall) and is the only host (or
+ one of only a few) in the network that can be directly accessed
+ from networks on the other side of the firewall. (See: firewall.)
+
+ Tutorial: Filtering routers in a firewall typically restrict
+ traffic from the outside network to reaching just one host, the
+ bastion host, which usually is part of the firewall. Since only
+ this one host can be directly attacked, only this one host needs
+ to be very strongly protected, so security can be maintained more
+ easily and less expensively. However, to allow legitimate internal
+ and external users to access application resources through the
+ firewall, higher-layer protocols and services need to be relayed
+ and forwarded by the bastion host. Some services (e.g., DNS and
+ SMTP) have forwarding built in; other services (e.g., TELNET and
+ FTP) require a proxy server on the bastion host.
+
+ $ BBN Technologies Corp. (BBN)
+ (O) The research-and-development company (originally called Bolt
+ Baranek and Newman, Inc.) that built the ARPANET.
+
+ $ BCA
+ (O) See: brand certification authority.
+
+
+
+
+
+Shirey Informational [Page 33]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ BCR
+ (O) See: BLACK/Crypto/RED.
+
+ $ BCI
+ (O) See: brand CRL identifier.
+
+ $ Bell-LaPadula model
+ (N) A formal, mathematical, state-transition model of
+ confidentiality policy for multilevel-secure computer systems
+ [Bell]. (Compare: Biba model, Brewer-Nash model.)
+
+ Tutorial: The model, devised by David Bell and Leonard LaPadula at
+ The MITRE Corporation in 1973, characterizes computer system
+ elements as subjects and objects. To determine whether or not a
+ subject is authorized for a particular access mode on an object,
+ the clearance of the subject is compared to the classification of
+ the object. The model defines the notion of a "secure state", in
+ which the only permitted access modes of subjects to objects are
+ in accordance with a specified security policy. It is proven that
+ each state transition preserves security by moving from secure
+ state to secure state, thereby proving that the system is secure.
+ In this model, a multilevel-secure system satisfies several rules,
+ including the "confinement property" (a.k.a. the "*-property"),
+ the "simple security property", and the "tranquility property".
+
+ $ benign
+ 1. (N) /COMSEC/ "Condition of cryptographic data [such] that [the
+ data] cannot be compromised by human access [to the data]."
+ [C4009]
+
+ 2. (O) /COMPUSEC/ See: secondary definition under "trust".
+
+ $ benign fill
+ (N) Process by which keying material is generated, distributed,
+ and placed into an ECU without exposure to any human or other
+ system entity, except the cryptographic module that consumes and
+ uses the material. (See: benign.)
+
+ $ BER
+ (I) See: Basic Encoding Rules.
+
+ $ beyond A1
+ 1. (O) /formal/ A level of security assurance that is beyond the
+ highest level (level A1) of criteria specified by the TCSEC. (See:
+ Tutorial under "Trusted Computer System Evaluation Criteria".)
+
+
+
+
+
+
+Shirey Informational [Page 34]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (O) /informal/ A level of trust so high that it is beyond
+ state-of-the-art technology; i.e., it cannot be provided or
+ verified by currently available assurance methods, and especially
+ not by currently available formal methods.
+
+ $ Biba integrity
+ (N) Synonym for "source integrity".
+
+ $ Biba model
+ (N) A formal, mathematical, state-transition model of integrity
+ policy for multilevel-secure computer systems [Biba]. (See: source
+ integrity. Compare: Bell-LaPadula model.)
+
+ Tutorial: This model for integrity control is analogous to the
+ Bell-LaPadula model for confidentiality control. Each subject and
+ object is assigned an integrity level and, to determine whether or
+ not a subject is authorized for a particular access mode on an
+ object, the integrity level of the subject is compared to that of
+ the object. The model prohibits the changing of information in an
+ object by a subject with a lesser or incomparable level. The rules
+ of the Biba model are duals of the corresponding rules in the
+ Bell-LaPadula model.
+
+ $ billet
+ (N) "A personnel position or assignment that may be filled by one
+ person." [JCP1] (Compare: principal, role, user.)
+
+ Tutorial: In an organization, a "billet" is a populational
+ position, of which there is exactly one instance; but a "role" is
+ functional position, of which there can be multiple instances.
+ System entities are in one-to-one relationships with their
+ billets, but may be in many-to-one and one-to-many relationships
+ with their roles.
+
+ $ BIN
+ (O) See: bank identification number.
+
+ $ bind
+ (I) To inseparably associate by applying some security mechanism.
+
+ Example: A CA creates a public-key certificate by using a digital
+ signature to bind together (a) a subject name, (b) a public key,
+ and usually (c) some additional data items (e.g., "X.509 public-
+ key certificate").
+
+ $ biometric authentication
+ (I) A method of generating authentication information for a person
+ by digitizing measurements of a physical or behavioral
+
+
+
+Shirey Informational [Page 35]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ characteristic, such as a fingerprint, hand shape, retina pattern,
+ voiceprint, handwriting style, or face.
+
+ $ birthday attack
+ (I) A class of attacks against cryptographic functions, including
+ both encryption functions and hash functions. The attacks take
+ advantage of a statistical property: Given a cryptographic
+ function having an N-bit output, the probability is greater than
+ 1/2 that for 2**(N/2) randomly chosen inputs, the function will
+ produce at least two outputs that are identical. (See: Tutorial
+ under "hash function".)
+
+ Derivation: From the somewhat surprising fact (often called the
+ "birthday paradox") that although there are 365 days in a year,
+ the probability is greater than 1/2 that two of more people share
+ the same birthday in any randomly chosen group of 23 people.
+
+ Birthday attacks enable an adversary to find two inputs for which
+ a cryptographic function produces the same cipher text (or find
+ two inputs for which a hash functions produces the same hash
+ result) much faster than a brute-force attack can; and a clever
+ adversary can use such a capability to create considerable
+ mischief. However, no birthday attack can enable an adversary to
+ decrypt a given cipher text (or find a hash input that results in
+ a given hash result) any faster than a brute-force attack can.
+
+ $ bit
+ (I) A contraction of the term "binary digit"; the smallest unit of
+ information storage, which has two possible states or values. The
+ values usually are represented by the symbols "0" (zero) and "1"
+ (one). (See: block, byte, nibble, word.)
+
+ $ bit string
+ (I) A sequence of bits, each of which is either "0" or "1".
+
+ $ BLACK
+ 1. (N) Designation for data that consists only of cipher text, and
+ for information system equipment items or facilities that handle
+ only cipher text. Example: "BLACK key". (See: BCR, color change,
+ RED/BLACK separation. Compare: RED.)
+
+ 2. (O) /U.S. Government/ "Designation applied to information
+ systems, and to associated areas, circuits, components, and
+ equipment, in which national security information is encrypted or
+ is not processed." [C4009]
+
+ 3. (D) Any data that can be disclosed without harm.
+
+
+
+
+Shirey Informational [Page 36]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Definition: IDOCs SHOULD NOT use the term with
+ definition 3 because the definition is ambiguous with regard to
+ whether or not the data is protected.
+
+ $ BLACK/Crypto/RED (BCR)
+ (N) An experimental, end-to-end, network packet encryption system
+ developed in a working prototype form by BBN and the Collins Radio
+ division of Rockwell Corporation in the 1975-1980 time frame for
+ the U.S. DoD. BCR was the first network security system to support
+ TCP/IP traffic, and it incorporated the first DES chips that were
+ validated by the U.S. National Bureau of Standards (now called
+ NIST). BCR also was the first to use a KDC and an ACC to manage
+ connections.
+
+ $ BLACK key
+ (N) A key that is protected with a key-encrypting key and that
+ must be decrypted before use. (See: BLACK. Compare: RED key.)
+
+ $ BLACKER
+ (O) An end-to-end encryption system for computer data networks
+ that was developed by the U.S. DoD in the 1980s to provide host-
+ to-host data confidentiality service for datagrams at OSIRM Layer
+ 3. [Weis] (Compare: CANEWARE, IPsec.)
+
+ Tutorial: Each user host connects to its own bump-in-the-wire
+ encryption device called a BLACKER Front End (BFE, TSEC/KI-111),
+ through which the host connects to the subnetwork. The system also
+ includes two types of centralized devices: one or more KDCs
+ connect to the subnetwork and communicate with assigned sets of
+ BFEs, and one or more ACCs connect to the subnetwork and
+ communicate with assigned KDCs. BLACKER uses only symmetric
+ encryption. A KDC distributes session keys to BFE pairs as
+ authorized by an ACC. Each ACC maintains a database for a set of
+ BFEs, and the database determines which pairs from that set (i.e.,
+ which pairs of user hosts behind the BFEs) are authorized to
+ communicate and at what security levels.
+
+ The BLACKER system is MLS in three ways: (a) The BFEs form a
+ security perimeter around a subnetwork, separating user hosts from
+ the subnetwork, so that the subnetwork can operate at a different
+ security level (possibly a lower, less expensive level) than the
+ hosts. (b) The BLACKER components are trusted to separate
+ datagrams of different security levels, so that each datagram of a
+ given security level can be received only by a host that is
+ authorized for that security level; and thus BLACKER can separate
+ host communities that operate at different security levels. (c)
+ The host side of a BFE is itself MLS and can recognize a security
+ label on each packet, so that an MLS user host can be authorized
+
+
+
+Shirey Informational [Page 37]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ to successively transmit datagrams that are labeled with different
+ security levels.
+
+ $ blind attack
+ (I) A type of network-based attack method that does not require
+ the attacking entity to receive data traffic from the attacked
+ entity; i.e., the attacker does not need to "see" data packets
+ sent by the victim. Example: SYN flood.
+
+ Tutorial: If an attack method is blind, the attacker's packets can
+ carry (a) a false IP source address (making it difficult for the
+ victim to find the attacker) and (b) a different address on every
+ packet (making it difficult for the victim to block the attack).
+ If the attacker needs to receive traffic from the victim, the
+ attacker must either (c) reveal its own IP address to the victim
+ (which enables the victim to find the attacker or block the attack
+ by filtering) or (d) provide a false address and also subvert
+ network routing mechanisms to divert the returning packets to the
+ attacker (which makes the attack more complex, more difficult, or
+ more expensive). [R3552]
+
+ $ block
+ (I) A bit string or bit vector of finite length. (See: bit, block
+ cipher. Compare: byte, word.)
+
+ Usage: An "N-bit block" contains N bits, which usually are
+ numbered from left to right as 1, 2, 3, ..., N.
+
+ $ block cipher
+ (I) An encryption algorithm that breaks plain text into fixed-size
+ segments and uses the same key to transform each plaintext segment
+ into a fixed-size segment of cipher text. Examples: AES, Blowfish,
+ DEA, IDEA, RC2, and SKIPJACK. (See: block, mode. Compare: stream
+ cipher.)
+
+ Tutorial: A block cipher can be adapted to have a different
+ external interface, such as that of a stream cipher, by using a
+ mode of cryptographic operation to package the basic algorithm.
+ (See: CBC, CCM, CFB, CMAC, CTR, DEA, ECB, OFB.)
+
+ $ Blowfish
+ (N) A symmetric block cipher with variable-length key (32 to 448
+ bits) designed in 1993 by Bruce Schneier as an unpatented,
+ license-free, royalty-free replacement for DES or IDEA. [Schn]
+ (See: Twofish.)
+
+
+
+
+
+
+Shirey Informational [Page 38]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ brain-damaged
+ (D) /slang/ "Obviously wrong: extremely poorly designed. Calling
+ something brain-damaged is very extreme. The word implies that the
+ thing is completely unusable, and that its failure to work is due
+ to poor design, not accident." [NCSSG] (See: flaw.)
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ brand
+ 1. (I) A distinctive mark or name that identifies a product or
+ business entity.
+
+ 2. (O) /SET/ The name of a payment card. (See: BCA.)
+
+ Tutorial: Financial institutions and other companies have founded
+ payment card brands, protect and advertise the brands, establish
+ and enforce rules for use and acceptance of their payment cards,
+ and provide networks to interconnect the financial institutions.
+ These brands combine the roles of issuer and acquirer in
+ interactions with cardholders and merchants. [SET1]
+
+ $ brand certification authority (BCA)
+ (O) /SET/ A CA owned by a payment card brand, such as MasterCard,
+ Visa, or American Express. [SET2] (See: certification hierarchy,
+ SET.)
+
+ $ brand CRL identifier (BCI)
+ (O) /SET/ A digitally signed list, issued by a BCA, of the names
+ of CAs for which CRLs need to be processed when verifying
+ signatures in SET messages. [SET2]
+
+ $ break
+ (I) /cryptography/ To successfully perform cryptanalysis and thus
+ succeed in decrypting data or performing some other cryptographic
+ function, without initially having knowledge of the key that the
+ function requires. (See: penetrate, strength, work factor.)
+
+ Usage: This term applies to encrypted data or, more generally, to
+ a cryptographic algorithm or cryptographic system. Also, while the
+ most common use is to refer to completely breaking an algorithm,
+ the term is also used when a method is found that substantially
+ reduces the work factor.
+
+
+
+
+
+
+Shirey Informational [Page 39]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Brewer-Nash model
+ (N) A security model [BN89] to enforce the Chinese wall policy.
+ (Compare: Bell-LaPadula model, Clark-Wilson model.)
+
+ Tutorial: All proprietary information in the set of commercial
+ firms F(1), F(2), ..., F(N) is categorized into mutually exclusive
+ conflict-of-interest classes I(1), I(2), ..., I(M) that apply
+ across all firms. Each firm belongs to exactly one class. The
+ Brewer-Nash model has the following mandatory rules:
+ - Brewer-Nash Read Rule: Subject S can read information object O
+ from firm F(i) only if either (a) O is from the same firm as
+ some object previously read by S *or* (b) O belongs to a class
+ I(i) from which S has not previously read any object. (See:
+ object, subject.)
+ - Brewer-Nash Write Rule: Subject S can write information object
+ O to firm F(i) only if (a) S can read O by the Brewer-Nash Read
+ Rule *and* (b) no object can be read by S from a different firm
+ F(j), no matter whether F(j) belongs to the same class as F(i)
+ or to a different class.
+
+ $ bridge
+ (I) A gateway for traffic flowing at OSIRM Layer 2 between two
+ networks (usually two LANs). (Compare: bridge CA, router.)
+
+ $ bridge CA
+ (I) A PKI consisting of only a CA that cross-certifies with CAs of
+ some other PKIs. (See: cross-certification. Compare: bridge.)
+
+ Tutorial: A bridge CA functions as a hub that enables a
+ certificate user in any of the PKIs that attach to the bridge, to
+ validate certificates issued in the other attached PKIs.
+
+ For example, a bridge CA (BCA) CA1
+ could cross-certify with four ^
+ PKIs that have the roots CA1, |
+ CA2, CA3, and CA4. The cross- v
+ certificates that the roots CA2 <-> BCA <-> CA3
+ exchange with the BCA enable an ^
+ end entity EE1 certified under |
+ under CA1 in PK1 to construct v
+ a certification path needed to CA4
+ validate the certificate of
+ end entity EE2 under CA2, CA1 -> BCA -> CA2 -> EE2
+ or vice versa. CA2 -> BCA -> CA1 -> EE1
+
+
+
+
+
+
+
+Shirey Informational [Page 40]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ British Standard 7799
+ (N) Part 1 of the standard is a code of practice for how to secure
+ an information system. Part 2 specifies the management framework,
+ objectives, and control requirements for information security
+ management systems. [BS7799] (See: ISO 17799.)
+
+ $ browser
+ (I) A client computer program that can retrieve and display
+ information from servers on the World Wide Web. Examples: Netscape
+ Navigator and Microsoft Internet Explorer.
+
+ $ brute force
+ (I) A cryptanalysis technique or other kind of attack method
+ involving an exhaustive procedure that tries a large number of
+ possible solutions to the problem. (See: impossible, strength,
+ work factor.)
+
+ Tutorial: In some cases, brute force involves trying all of the
+ possibilities. For example, for cipher text where the analyst
+ already knows the decryption algorithm, a brute-force technique
+ for finding matching plain text is to decrypt the message with
+ every possible key. In other cases, brute force involves trying a
+ large number of possibilities but substantially fewer than all of
+ them. For example, given a hash function that produces an N-bit
+ hash result, the probability is greater than 1/2 that the analyst
+ will find two inputs that have the same hash result after trying
+ only 2**(N/2) randomly chosen inputs. (See: birthday attack.)
+
+ $ BS7799
+ (N) See: British Standard 7799.
+
+ $ buffer overflow
+ (I) Any attack technique that exploits a vulnerability resulting
+ from computer software or hardware that does not check for
+ exceeding the bounds of a storage area when data is written into a
+ sequence of storage locations beginning in that area.
+
+ Tutorial: By causing a normal system operation to write data
+ beyond the bounds of a storage area, the attacker seeks to either
+ disrupt system operation or cause the system to execute malicious
+ software inserted by the attacker.
+
+ $ buffer zone
+ (I) A neutral internetwork segment used to connect other segments
+ that each operate under a different security policy.
+
+
+
+
+
+
+Shirey Informational [Page 41]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: To connect a private network to the Internet or some
+ other relatively public network, one could construct a small,
+ separate, isolated LAN and connect it to both the private network
+ and the public network; one or both of the connections would
+ implement a firewall to limit the traffic that could pass through
+ the buffer zone.
+
+ $ bulk encryption
+ 1. (I) Encryption of multiple channels by aggregating them into a
+ single transfer path and then encrypting that path. (See:
+ channel.)
+
+ 2. (O) "Simultaneous encryption of all channels of a multichannel
+ telecommunications link." [C4009] (Compare: bulk keying material.)
+
+ Usage: The use of "simultaneous" in definition 2 could be
+ interpreted to mean that multiple channels are encrypted
+ separately but at the same time. However, the common meaning of
+ the term is that multiple data flows are combined into a single
+ stream and then that stream is encrypted as a whole.
+
+ $ bulk key
+ (D) In a few published descriptions of hybrid encryption for SSH,
+ Windows 2000, and other applications, this term refers to a
+ symmetric key that (a) is used to encrypt a relatively large
+ amount of data and (b) is itself encrypted with a public key.
+ (Compare: bulk keying material, session key.)
+
+ Example: To send a large file to Bob, Alice (a) generates a
+ symmetric key and uses it to encrypt the file (i.e., encrypt the
+ bulk of the information that is to be sent) and then (b) encrypts
+ that symmetric key (the "bulk key") with Bob's public key.
+
+ Deprecated Term: IDOCs SHOULD NOT use this term or definition; the
+ term is not well-established and could be confused with the
+ established term "bulk keying material". Instead, use "symmetric
+ key" and carefully explain how the key is applied.
+
+ $ bulk keying material
+ (N) Refers to handling keying material in large quantities, e.g.,
+ as a dataset that contains many items of keying material. (See:
+ type 0. Compare: bulk key, bulk encryption.)
+
+ $ bump-in-the-stack
+ (I) An implementation approach that places a network security
+ mechanism inside the system that is to be protected. (Compare:
+ bump-in-the-wire.)
+
+
+
+
+Shirey Informational [Page 42]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Example: IPsec can be implemented inboard, in the protocol stack
+ of an existing system or existing system design, by placing a new
+ layer between the existing IP layer and the OSIRM Layer 3 drivers.
+ Source code access for the existing stack is not required, but the
+ system that contains the stack does need to be modified [R4301].
+
+ $ bump-in-the-wire
+ (I) An implementation approach that places a network security
+ mechanism outside of the system that is to be protected. (Compare:
+ bump-in-the-stack.)
+
+ Example: IPsec can be implemented outboard, in a physically
+ separate device, so that the system that receives the IPsec
+ protection does not need to be modified at all [R4301]. Military-
+ grade link encryption has mainly been implemented as bump-in-the-
+ wire devices.
+
+ $ business-case analysis
+ (N) An extended form of cost-benefit analysis that considers
+ factors beyond financial metrics, including security factors such
+ as the requirement for security services, their technical and
+ programmatic feasibility, their qualitative benefits, and
+ associated risks. (See: risk analysis.)
+
+ $ byte
+ (I) A fundamental unit of computer storage; the smallest
+ addressable unit in a computer's architecture. Usually holds one
+ character of information and, today, usually means eight bits.
+ (Compare: octet.)
+
+ Usage: Understood to be larger than a "bit", but smaller than a
+ "word". Although "byte" almost always means "octet" today, some
+ computer architectures have had bytes in other sizes (e.g., six
+ bits, nine bits). Therefore, an STD SHOULD state the number of
+ bits in a byte where the term is first used in the STD.
+
+ $ C field
+ (D) See: Compartments field.
+
+ $ C1 or C2 computer system
+ (O) /TCSEC/ See: Tutorial under "Trusted Computer System
+ Evaluation Criteria".
+
+ $ CA
+ (I) See: certification authority.
+
+
+
+
+
+
+Shirey Informational [Page 43]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ CA certificate
+ (D) "A [digital] certificate for one CA issued by another CA."
+ [X509]
+
+ Deprecated Definition: IDOCs SHOULD NOT use the term with this
+ definition; the definition is ambiguous with regard to how the
+ certificate is constructed and how it is intended to be used.
+ IDOCs that use this term SHOULD provide a technical definition for
+ it. (See: certificate profile.)
+
+ Tutorial: There is no single, obvious choice for a technical
+ definition of this term. Different PKIs can use different
+ certificate profiles, and X.509 provides several choices of how to
+ issue certificates to CAs. For example, one possible definition is
+ the following: A v3 X.509 public-key certificate that has a
+ "basicConstraints" extension containing a "cA" value of "TRUE".
+ That would specifically indicate that "the certified public key
+ may be used to verify certificate signatures", i.e., that the
+ private key may be used by a CA.
+
+ However, there also are other ways to indicate such usage. The
+ certificate may have a "key Usage" extension that indicates the
+ purposes for which the public key may be used, and one of the
+ values that X.509 defines for that extension is "keyCertSign", to
+ indicate that the certificate may be used for verifying a CA's
+ signature on certificates. If "keyCertSign" is present in a
+ certificate that also has a "basicConstraints" extension, then
+ "cA" is set to "TRUE" in that extension. Alternatively, a CA could
+ be issued a certificate in which "keyCertSign" is asserted without
+ "basicConstraints" being present; and an entity that acts as a CA
+ could be issued a certificate with "keyUsage" set to other values,
+ either with or without "keyCertSign".
+
+ $ CA domain
+ (N) /PKI/ A security policy domain that "consists of a CA and its
+ subjects [i.e., the entities named in the certificates issued by
+ the CA]. Sometimes referred to as a PKI domain." [PAG] (See:
+ domain.)
+
+ $ Caesar cipher
+ (I) A cipher that is defined for an alphabet of N characters,
+ A(1), A(2), ..., A(N), and creates cipher text by replacing each
+ plaintext character A(i) by A(i+K, mod N) for some 0<K<N+1. [Schn]
+
+ Examples: (a) During the Gallic wars, Julius Caesar used a cipher
+ with K=3. In a Caesar cipher with K=3 for the English alphabet, A
+ is replaced by D, B by E, C by F, ..., W by Z, X by A, Y by B, Z
+
+
+
+
+Shirey Informational [Page 44]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ by C. (b) UNIX systems sometimes include "ROT13" software that
+ implements a Caesar cipher with K=13 (i.e., ROTate by 13).
+
+ $ call back
+ (I) An authentication technique for terminals that remotely access
+ a computer via telephone lines; the host system disconnects the
+ caller and then reconnects on a telephone number that was
+ previously authorized for that terminal.
+
+ $ CAM
+ (O) See: Certificate Arbitrator Module.
+
+ $ CANEWARE
+ (O) An end-to-end encryption system for computer data networks
+ that was developed by the U.S. DoD in the 1980s to provide host-
+ to-host data confidentiality service for datagrams in OSIRM Layer
+ 3. [Roge] (Compare: BLACKER, IPsec.)
+
+ Tutorial: Each user host connects to its own bump-in-the-wire
+ encryption device called a CANEWARE Front End (CFE), through which
+ the host connects to the subnetwork. CANEWARE uses symmetric
+ encryption for CFE-to-CFE traffic, but also uses FIREFLY to
+ establish those session keys. The public-key certificates issued
+ by the FIREFLY system include credentials for mandatory access
+ control. For discretionary access control, the system also
+ includes one or more centralized CANEWARE Control Processors
+ (CCPs) that connect to the subnetwork, maintain a database for
+ discretionary access control authorizations, and communicate those
+ authorizations to assigned sets of CFEs.
+
+ The CANEWARE system is MLS in only two of the three ways that
+ BLACKER is MLS: (a) Like BLACKER BFEs, CFEs form a security
+ perimeter around a subnetwork, separating user hosts from the
+ subnetwork, so that the subnetwork can operate at a different
+ security level than the hosts. (b) Like BLACKER, the CANEWARE
+ components are trusted to separate datagrams of different security
+ levels, so that each datagram of a given security level can be
+ received only by a host that is authorized for that security
+ level; and thus CANEWARE can separate host communities that
+ operate at different security levels. (c) Unlike a BFE, the host
+ side of a CFE is not MLS, and treats all packets received from a
+ user host as being at the same mandatory security level.
+
+ $ capability list
+ (I) /information system/ A mechanism that implements access
+ control for a system entity by enumerating the system resources
+ that the entity is permitted to access and, either implicitly or
+ explicitly, the access modes granted for each resource. (Compare:
+
+
+
+Shirey Informational [Page 45]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ access control list, access control matrix, access profile,
+ capability token.)
+
+ $ capability token
+ (I) A token (usually an unforgeable data object) that gives the
+ bearer or holder the right to access a system resource. Possession
+ of the token is accepted by a system as proof that the holder has
+ been authorized to access the resource indicated by the token.
+ (See: attribute certificate, capability list, credential, digital
+ certificate, ticket, token.)
+
+ $ Capability Maturity Model (CMM)
+ (N) Method for judging the maturity of software processes in an
+ organization and for identifying crucial practices needed to
+ increase process maturity. [Chris] (Compare: Common Criteria.)
+
+ Tutorial: The CMM does not specify security evaluation criteria
+ (see: assurance level), but its use may improve security
+ assurance. The CMM describes principles and practices that can
+ improve software processes in terms of evolving from ad hoc
+ processes to disciplined processes. The CMM has five levels:
+ - Initial: Software processes are ad hoc or chaotic, and few are
+ well-defined. Success depends on individual effort and heroics.
+ - Repeatable: Basic project management processes are established
+ to track cost, schedule, and functionality. Necessary process
+ discipline is in place to repeat earlier successes on projects
+ with similar applications.
+ - Defined: Software process for both management and engineering
+ activities is documented, standardized, and integrated into a
+ standard software process for the organization. Each project
+ uses an approved, tailored version of the organization's
+ standard process for developing and maintaining software.
+ - Managed: Detailed measures of software process and product
+ quality are collected. Both software process and products are
+ quantitatively understood and controlled.
+ - Optimizing: Continuous process improvement is enabled by
+ quantitative feedback from the process and from piloting
+ innovative ideas and technologies.
+
+ $ CAPI
+ (I) See: cryptographic application programming interface.
+
+ $ CAPSTONE
+ (N) An integrated microcircuit (in MYK-8x series manufactured by
+ Mykotronx, Inc.) that implements SKIPJACK, KEA, DSA, SHA, and
+ basic mathematical functions needed to support asymmetric
+ cryptography; has a non-deterministic random number generator; and
+ supports key escrow. (See: FORTEZZA. Compare: CLIPPER.)
+
+
+
+Shirey Informational [Page 46]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ card
+ See: cryptographic card, FORTEZZA, payment card, PC card, smart
+ card, token.
+
+ $ card backup
+ See: token backup.
+
+ $ card copy
+ See: token copy.
+
+ $ card restore
+ See: token restore.
+
+ $ cardholder
+ 1. (I) An entity to whom or to which a card has been issued.
+
+ Usage: Usually refers to a living human being, but might refer (a)
+ to a position (see: billet, role) in an organization or (b) to an
+ automated process. (Compare: user.)
+
+ 2. (O) /SET/ "The holder of a valid payment card account and user
+ of software supporting electronic commerce." [SET2] A cardholder
+ is issued a payment card by an issuer. SET ensures that in the
+ cardholder's interactions with merchants, the payment card account
+ information remains confidential. [SET1]
+
+ $ cardholder certificate
+ (O) /SET/ A digital certificate that is issued to a cardholder
+ upon approval of the cardholder's issuing financial institution
+ and that is transmitted to merchants with purchase requests and
+ encrypted payment instructions, carrying assurance that the
+ account number has been validated by the issuing financial
+ institution and cannot be altered by a third party. [SET1]
+
+ $ cardholder certification authority (CCA)
+ (O) /SET/ A CA responsible for issuing digital certificates to
+ cardholders and operated on behalf of a payment card brand, an
+ issuer, or another party according to brand rules. A CCA maintains
+ relationships with card issuers to allow for the verification of
+ cardholder accounts. A CCA does not issue a CRL but does
+ distribute CRLs issued by root CAs, brand CAs, geopolitical CAs,
+ and payment gateway CAs. [SET2]
+
+ $ CAST
+ (N) A design procedure for symmetric encryption algorithms, and a
+ resulting family of algorithms, invented by Carlisle Adams (C.A.)
+ and Stafford Tavares (S.T.). [R2144, R2612]
+
+
+
+
+Shirey Informational [Page 47]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ category
+ (I) A grouping of sensitive information items to which a non-
+ hierarchical restrictive security label is applied to increase
+ protection of the data. (See: formal access approval. Compare:
+ compartment, classification.)
+
+ $ CAW
+ (N) See: certification authority workstation.
+
+ $ CBC
+ (N) See: cipher block chaining.
+
+ $ CCA
+ (O) See: cardholder certification authority.
+
+ $ CCEP
+ (O) See: Commercial COMSEC Endorsement Program.
+
+ $ CCI
+ (O) See: Controlled Cryptographic Item.
+
+ $ CCITT
+ (N) Acronym for French translation of International Telephone and
+ Telegraph Consultative Committee. Now renamed ITU-T.
+
+ $ CCM
+ (N) See: Counter with Cipher Block Chaining-Message Authentication
+ Code.
+
+ $ CERIAS
+ (O) Purdue University's Center for Education and Research in
+ Information Assurance and Security, which includes faculty from
+ multiple schools and departments and takes a multidisciplinary
+ approach to security problems ranging from technical to ethical,
+ legal, educational, communicational, linguistic, and economic.
+
+ $ CERT
+ (I) See: computer emergency response team.
+
+ $ certificate
+ 1. (I) /general English/ A document that attests to the truth of
+ something or the ownership of something.
+
+ 2. (I) /general security/ See: capability token, digital
+ certificate.
+
+ 3. (I) /PKI/ See: attribute certificate, public-key certificate.
+
+
+
+
+Shirey Informational [Page 48]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Certificate Arbitrator Module (CAM)
+ (O) An open-source software module that is designed to be
+ integrated with an application for routing, replying to, and
+ otherwise managing and meditating certificate validation requests
+ between that application and the CAs in the ACES PKI.
+
+ $ certificate authority
+ (D) Synonym for "certification authority".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it suggests
+ careless use of the term "certification authority", which is
+ preferred in PKI standards (e.g., [X509, R3280]).
+
+ $ certificate chain
+ (D) Synonym for "certification path". (See: trust chain.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it duplicates the
+ meaning of a standardized term. Instead, use "certification path".
+
+ $ certificate chain validation
+ (D) Synonym for "certificate validation" or "path validation".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it duplicates the
+ meaning of standardized terms and mixes concepts in a potentially
+ misleading way. Instead, use "certificate validation" or "path
+ validation", depending on what is meant. (See: validate vs.
+ verify.)
+
+ $ certificate creation
+ (I) The act or process by which a CA sets the values of a digital
+ certificate's data fields and signs it. (See: issue.)
+
+ $ certificate expiration
+ (I) The event that occurs when a certificate ceases to be valid
+ because its assigned lifetime has been exceeded. (See: certificate
+ revocation, expire.)
+
+ Tutorial: The assigned lifetime of an X.509 certificate is stated
+ in the certificate itself. (See: validity period.)
+
+ $ certificate extension
+ (I) See: extension.
+
+ $ certificate holder
+ (D) Synonym for the "subject" of a digital certificate. (Compare:
+ certificate owner, certificate user.)
+
+
+
+
+
+Shirey Informational [Page 49]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for the subject of a digital certificate; the term is potentially
+ ambiguous. For example, the term could be misunderstood as
+ referring to a system entity or component, such as a repository,
+ that simply has possession of a copy of the certificate.
+
+ $ certificate management
+ (I) The functions that a CA may perform during the lifecycle of a
+ digital certificate, including the following:
+ - Acquire and verify data items to bind into the certificate.
+ - Encode and sign the certificate.
+ - Store the certificate in a directory or repository.
+ - Renew, rekey, and update the certificate.
+ - Revoke the certificate and issue a CRL.
+ (See: archive management, certificate management, key management,
+ security architecture, token management.)
+
+ $ certificate management authority (CMA)
+ (D) /U.S. DoD/ Used to mean either a CA or an RA. [DoD7, SP32]
+
+ Deprecated Term: IDOCs SHOULD NOT use this term because it is
+ potentially ambiguous, such as in a context involving ICRLs.
+ Instead, use CA, RA, or both, depending on what is meant.
+
+ $ certificate owner
+ (D) Synonym for the "subject" of a digital certificate. (Compare:
+ certificate holder, certificate user.)
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for the subject of a digital certificate; the term is potentially
+ ambiguous. For example, the term could refer to a system entity,
+ such as a corporation, that has purchased a certificate to operate
+ equipment, such as a Web server.
+
+ $ certificate path
+ (D) Synonym for "certification path".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it suggests
+ careless use of "certification path", which is preferred in PKI
+ standards (e.g., [X509, R3280]).
+
+ $ certificate policy
+ (I) "A named set of rules that indicates the applicability of a
+ certificate to a particular community and/or class of application
+ with common security requirements." [X509] (Compare: CPS, security
+ policy.)
+
+
+
+
+
+Shirey Informational [Page 50]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Example: U.S. DoD's certificate policy [DoD7] defined four classes
+ (i.e., assurance levels) for X.509 public-key certificates and
+ defines the applicability of those classes. (See: class 2.)
+
+ Tutorial: A certificate policy can help a certificate user to
+ decide whether a certificate should be trusted in a particular
+ application. "For example, a particular certificate policy might
+ indicate applicability of a type of certificate for the
+ authentication of electronic data interchange transactions for the
+ trading of goods within a given price range." [R3647]
+
+ A v3 X.509 public-key certificate may have a "certificatePolicies"
+ extension that lists certificate policies, recognized by the
+ issuing CA, that apply to the certificate and govern its use. Each
+ policy is denoted by an object identifier and may optionally have
+ certificate policy qualifiers. (See: certificate profile.)
+
+ Each SET certificate specifies at least one certificate policy,
+ that of the SET root CA. SET uses certificate policy qualifiers to
+ point to the actual policy statement and to add qualifying
+ policies to the root policy. (See: SET qualifier.)
+
+ $ certificate policy qualifier
+ (I) Information that pertains to a certificate policy and is
+ included in a "certificatePolicies" extension in a v3 X.509
+ public-key certificate.
+
+ $ certificate profile
+ (I) A specification (e.g., [DoD7, R3280]) of the format and
+ semantics of public-key certificates or attribute certificates,
+ constructed for use in a specific application context by selecting
+ from among options offered by a broader standard. (Compare:
+ protection profile.)
+
+ $ certificate reactivation
+ (I) The act or process by which a digital certificate, that a CA
+ has designated for revocation but not yet listed on a CRL, is
+ returned to the valid state.
+
+ $ certificate rekey
+ 1. (I) The act or process by which an existing public-key
+ certificate has its key value changed by issuing a new certificate
+ with a different (usually new) public key. (See: certificate
+ renewal, certificate update, rekey.)
+
+ Tutorial: For an X.509 public-key certificate, the essence of
+ rekey is that the subject stays the same and a new public key is
+ bound to that subject. Other changes are made, and the old
+
+
+
+Shirey Informational [Page 51]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ certificate is revoked, only as required by the PKI and CPS in
+ support of the rekey. If changes go beyond that, the process is a
+ "certificate update".
+
+ 2. (O) /MISSI/ The act or process by which a MISSI CA creates a
+ new X.509 public-key certificate that is identical to the old one,
+ except the new one has (a) a new, different KEA key or (b) a new,
+ different DSS key or (c) new, different KEA and DSS keys. The new
+ certificate also has a different serial number and may have a
+ different validity period. A new key creation date and maximum key
+ lifetime period are assigned to each newly generated key. If a new
+ KEA key is generated, that key is assigned a new KMID. The old
+ certificate remains valid until it expires, but may not be further
+ renewed, rekeyed, or updated.
+
+ $ certificate renewal
+ (I) The act or process by which the validity of the binding
+ asserted by an existing public-key certificate is extended in time
+ by issuing a new certificate. (See: certificate rekey, certificate
+ update.)
+
+ Tutorial: For an X.509 public-key certificate, this term means
+ that the validity period is extended (and, of course, a new serial
+ number is assigned) but the binding of the public key to the
+ subject and to other data items stays the same. The other data
+ items are changed, and the old certificate is revoked, only as
+ required by the PKI and CPS to support the renewal. If changes go
+ beyond that, the process is a "certificate rekey" or "certificate
+ update".
+
+ $ certificate request
+ (D) Synonym for "certification request".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it suggests
+ careless use of the term "certification request", which is
+ preferred in PKI standards (e.g., see PKCS #10).
+
+ $ certificate revocation
+ (I) The event that occurs when a CA declares that a previously
+ valid digital certificate issued by that CA has become invalid;
+ usually stated with an effective date.
+
+ Tutorial: In X.509, a revocation is announced to potential
+ certificate users by issuing a CRL that mentions the certificate.
+ Revocation and listing on a CRL is only necessary prior to the
+ certificate's scheduled expiration.
+
+
+
+
+
+Shirey Informational [Page 52]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ certificate revocation list (CRL)
+ 1. (I) A data structure that enumerates digital certificates that
+ have been invalidated by their issuer prior to when they were
+ scheduled to expire. (See: certificate expiration, delta CRL,
+ X.509 certificate revocation list.)
+
+ 2. (O) "A signed list indicating a set of certificates that are no
+ longer considered valid by the certificate issuer. In addition to
+ the generic term CRL, some specific CRL types are defined for CRLs
+ that cover particular scopes." [X509]
+
+ $ certificate revocation tree
+ (N) A mechanism for distributing notices of certificate
+ revocations; uses a tree of hash results that is signed by the
+ tree's issuer. Offers an alternative to issuing a CRL, but is not
+ supported in X.509. (See: certificate status responder.)
+
+ $ certificate serial number
+ 1. (I) An integer value that (a) is associated with, and may be
+ carried in, a digital certificate; (b) is assigned to the
+ certificate by the certificate's issuer; and (c) is unique among
+ all the certificates produced by that issuer.
+
+ 2. (O) "An integer value, unique within the issuing CA, [that] is
+ unambiguously associated with a certificate issued by that CA."
+ [X509]
+
+ $ certificate status authority
+ (D) /U.S. DoD/ "A trusted entity that provides on-line
+ verification to a Relying Party of a subject certificate's
+ trustworthiness [should instead say 'validity'], and may also
+ provide additional attribute information for the subject
+ certificate." [DoD7]
+
+ Deprecated Term: IDOCs SHOULD NOT use this term because it is not
+ widely accepted; instead, use "certificate status responder" or
+ "OCSP server", or otherwise explain what is meant.
+
+ $ certificate status responder
+ (N) /FPKI/ A trusted online server that acts for a CA to provide
+ authenticated certificate status information to certificate users
+ [FPKI]. Offers an alternative to issuing a CR. (See: certificate
+ revocation tree, OCSP.)
+
+ $ certificate update
+ (I) The act or process by which non-key data items bound in an
+ existing public-key certificate, especially authorizations granted
+
+
+
+
+Shirey Informational [Page 53]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ to the subject, are changed by issuing a new certificate. (See:
+ certificate rekey, certificate renewal.)
+
+ Usage: For an X.509 public-key certificate, the essence of this
+ process is that fundamental changes are made in the data that is
+ bound to the public key, such that it is necessary to revoke the
+ old certificate. (Otherwise, the process is only a "certificate
+ rekey" or "certificate renewal".)
+
+ $ certificate user
+ 1. (I) A system entity that depends on the validity of information
+ (such as another entity's public key value) provided by a digital
+ certificate. (See: relying party. Compare: /digital certificate/
+ subject.)
+
+ Usage: The depending entity may be a human being or an
+ organization, or a device or process controlled by a human or
+ organization. (See: user.)
+
+ 2. (O) "An entity that needs to know, with certainty, the public
+ key of another entity." [X509]
+
+ 3. (D) Synonym for "subject" of a digital certificate.
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 3; the term could be confused with one of the other two
+ definitions given above.
+
+ $ certificate validation
+ 1. (I) An act or process by which a certificate user establishes
+ that the assertions made by a digital certificate can be trusted.
+ (See: valid certificate, validate vs. verify.)
+
+ 2. (O) "The process of ensuring that a certificate was valid at a
+ given time, including possibly the construction and processing of
+ a certification path [R4158], and ensuring that all certificates
+ in that path were valid (i.e. were not expired or revoked) at that
+ given time." [X509]
+
+ Tutorial: To validate a certificate, a certificate user checks
+ that the certificate is properly formed and signed and is
+ currently in force:
+ - Checks the syntax and semantics: Parses the certificate's
+ syntax and interprets its semantics, applying rules specified
+ for and by its data fields, such as for critical extensions in
+ an X.509 certificate.
+
+
+
+
+
+Shirey Informational [Page 54]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - Checks the signature: Uses the issuer's public key to verify
+ the digital signature of the CA who issued the certificate in
+ question. If the verifier obtains the issuer's public key from
+ the issuer's own public-key certificate, that certificate
+ should be validated, too. That validation may lead to yet
+ another certificate to be validated, and so on. Thus, in
+ general, certificate validation involves discovering and
+ validating a certification path.
+ - Checks currency and revocation: Verifies that the certificate
+ is currently in force by checking that the current date and
+ time are within the validity period (if that is specified in
+ the certificate) and that the certificate is not listed on a
+ CRL or otherwise announced as invalid. (The CRLs also must be
+ checked by a similar validation process.)
+
+ $ certification
+ 1. (I) /information system/ Comprehensive evaluation (usually made
+ in support of an accreditation action) of an information system's
+ technical security features and other safeguards to establish the
+ extent to which the system's design and implementation meet a set
+ of specified security requirements. [C4009, FP102, SP37] (See:
+ accreditation. Compare: evaluation.)
+
+ 2. (I) /digital certificate/ The act or process of vouching for
+ the truth and accuracy of the binding between data items in a
+ certificate. (See: certify.)
+
+ 3. (I) /PKI/ The act or process of vouching for the ownership of a
+ public key by issuing a public-key certificate that binds the key
+ to the name of the entity that possesses the matching private key.
+ Besides binding a key with a name, a public-key certificate may
+ bind those items with other restrictive or explanatory data items.
+ (See: X.509 public-key certificate.)
+
+ 4. (O) /SET/ "The process of ascertaining that a set of
+ requirements or criteria has been fulfilled and attesting to that
+ fact to others, usually with some written instrument. A system
+ that has been inspected and evaluated as fully compliant with the
+ SET protocol by duly authorized parties and process would be said
+ to have been certified compliant." [SET2]
+
+ $ certification authority (CA)
+ 1. (I) An entity that issues digital certificates (especially
+ X.509 certificates) and vouches for the binding between the data
+ items in a certificate.
+
+
+
+
+
+
+Shirey Informational [Page 55]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (O) "An authority trusted by one or more users to create and
+ assign certificates. Optionally the certification authority may
+ create the user's keys." [X509]
+
+ Tutorial: Certificate users depend on the validity of information
+ provided by a certificate. Thus, a CA should be someone that
+ certificate users trust and that usually holds an official
+ position created and granted power by a government, a corporation,
+ or some other organization. A CA is responsible for managing the
+ life cycle of certificates (see: certificate management) and,
+ depending on the type of certificate and the CPS that applies, may
+ be responsible for the lifecycle of key pairs associated with the
+ certificates (see: key management).
+
+ $ certification authority workstation (CAW)
+ (N) A computer system that enables a CA to issue digital
+ certificates and supports other certificate management functions
+ as required.
+
+ $ certification hierarchy
+ 1. (I) A tree-structured (loop-free) topology of relationships
+ between CAs and the entities to whom the CAs issue public-key
+ certificates. (See: hierarchical PKI, hierarchy management.)
+
+ Tutorial: In this structure, one CA is the top CA, the highest
+ level of the hierarchy. (See: root, top CA.) The top CA may issue
+ public-key certificates to one or more additional CAs that form
+ the second-highest level. Each of these CAs may issue certificates
+ to more CAs at the third-highest level, and so on. The CAs at the
+ second-lowest level issue certificates only to non-CA entities
+ that form the lowest level (see: end entity). Thus, all
+ certification paths begin at the top CA and descend through zero
+ or more levels of other CAs. All certificate users base path
+ validations on the top CA's public key.
+
+ 2. (I) /PEM/ A certification hierarchy for PEM has three levels of
+ CAs [R1422]:
+ - The highest level is the "Internet Policy Registration
+ Authority".
+ - A CA at the second-highest level is a "policy certification
+ authority".
+ - A CA at the third-highest level is a "certification authority".
+
+ 3. (O) /MISSI/ A certification hierarchy for MISSI has three or
+ four levels of CAs:
+ - A CA at the highest level, the top CA, is a "policy approving
+ authority".
+
+
+
+
+Shirey Informational [Page 56]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - A CA at the second-highest level is a "policy creation
+ authority".
+ - A CA at the third-highest level is a local authority called a
+ "certification authority".
+ - A CA at the fourth-highest (optional) level is a "subordinate
+ certification authority".
+
+ 4. (O) /SET/ A certification hierarchy for SET has three or four
+ levels of CAs:
+ - The highest level is a "SET root CA".
+ - A CA at the second-highest level is a "brand certification
+ authority".
+ - A CA at the third-highest (optional) level is a "geopolitical
+ certification authority".
+ - A CA at the fourth-highest level is a "cardholder CA", a
+ "merchant CA", or a "payment gateway CA".
+
+ $ certification path
+ 1. (I) A linked sequence of one or more public-key certificates,
+ or one or more public-key certificates and one attribute
+ certificate, that enables a certificate user to verify the
+ signature on the last certificate in the path, and thus enables
+ the user to obtain (from that last certificate) a certified public
+ key, or certified attributes, of the system entity that is the
+ subject of that last certificate. (See: trust anchor, certificate
+ validation, valid certificate.)
+
+ 2. (O) "An ordered sequence of certificates of objects in the
+ [X.500 Directory Information Tree] which, together with the public
+ key of the initial object in the path, can be processed to obtain
+ that of the final object in the path." [R3647, X509]
+
+ Tutorial: The list is "linked" in the sense that the digital
+ signature of each certificate (except possibly the first) is
+ verified by the public key contained in the preceding certificate;
+ i.e., the private key used to sign a certificate and the public
+ key contained in the preceding certificate form a key pair that
+ has previously been bound to the authority that signed.
+
+ The path is the "list of certificates needed to [enable] a
+ particular user to obtain the public key [or attributes] of
+ another [user]." [X509] Here, the word "particular" points out
+ that a certification path that can be validated by one certificate
+ user might not be able to be validated by another. That is because
+ either the first certificate needs to be a trusted certificate or
+ the signature on the first certificate needs to be verifiable by a
+ trusted key (e.g., a root key), but such trust is established only
+
+
+
+
+Shirey Informational [Page 57]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ relative to a "particular" (i.e., specific) user, not absolutely
+ for all users.
+
+ $ certification policy
+ (D) Synonym for either "certificate policy" or "certification
+ practice statement".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ either of those terms; that would be duplicative and would mix
+ concepts in a potentially misleading way. Instead, use either
+ "certificate policy" or "certification practice statement",
+ depending on what is meant.
+
+ $ certification practice statement (CPS)
+ (I) "A statement of the practices which a certification authority
+ employs in issuing certificates." [DSG, R3647] (See: certificate
+ policy.)
+
+ Tutorial: A CPS is a published security policy that can help a
+ certificate user to decide whether a certificate issued by a
+ particular CA can be trusted enough to use in a particular
+ application. A CPS may be (a) a declaration by a CA of the details
+ of the system and practices it uses in its certificate management
+ operations, (b) part of a contract between the CA and an entity to
+ whom a certificate is issued, (c) a statute or regulation
+ applicable to the CA, or (d) a combination of these types
+ involving multiple documents. [DSG]
+
+ A CPS is usually more detailed and procedurally oriented than a
+ certificate policy. A CPS applies to a particular CA or CA
+ community, while a certificate policy applies across CAs or
+ communities. A CA with its single CPS may support multiple
+ certificate policies, which may be used for different application
+ purposes or by different user communities. On the other hand,
+ multiple CAs, each with a different CPS, may support the same
+ certificate policy. [R3647]
+
+ $ certification request
+ (I) An algorithm-independent transaction format (e.g., PKCS #10,
+ RFC 4211) that contains a DN, and a public key or, optionally, a
+ set of attributes, collectively signed by the entity requesting
+ certification, and sent to a CA, which transforms the request to
+ an X.509 public-key certificate or another type of certificate.
+
+ $ certify
+ 1. (I) Issue a digital certificate and thus vouch for the truth,
+ accuracy, and binding between data items in the certificate (e.g.,
+ "X.509 public-key certificate"), such as the identity of the
+
+
+
+Shirey Informational [Page 58]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ certificate's subject and the ownership of a public key. (See:
+ certification.)
+
+ Usage: To "certify a public key" means to issue a public-key
+ certificate that vouches for the binding between the certificate's
+ subject and the key.
+
+ 2. (I) The act by which a CA uses measures to verify the truth,
+ accuracy, and binding between data items in a digital certificate.
+
+ Tutorial: A description of the measures used for verification
+ should be included in the CA's CPS.
+
+ $ CFB
+ (N) See: cipher feedback.
+
+ $ chain
+ (D) See: trust chain.
+
+ $ Challenge Handshake Authentication Protocol (CHAP)
+ (I) A peer entity authentication method (employed by PPP and other
+ protocols, e.g., RFC 3720) that uses a randomly generated
+ challenge and requires a matching response that depends on a
+ cryptographic hash of some combination of the challenge and a
+ secret key. [R1994] (See: challenge-response, PAP.)
+
+ $ challenge-response
+ (I) An authentication process that verifies an identity by
+ requiring correct authentication information to be provided in
+ response to a challenge. In a computer system, the authentication
+ information is usually a value that is required to be computed in
+ response to an unpredictable challenge value, but it might be just
+ a password.
+
+ $ Challenge-Response Authentication Mechanism (CRAM)
+ (I) /IMAP4/ A mechanism [R2195], intended for use with IMAP4
+ AUTHENTICATE, by which an IMAP4 client uses a keyed hash [R2104]
+ to authenticate itself to an IMAP4 server. (See: POP3 APOP.)
+
+ Tutorial: The server includes a unique time stamp in its ready
+ response to the client. The client replies with the client's name
+ and the hash result of applying MD5 to a string formed from
+ concatenating the time stamp with a shared secret that is known
+ only to the client and the server.
+
+ $ channel
+ 1. (I) An information transfer path within a system. (See: covert
+ channel.)
+
+
+
+Shirey Informational [Page 59]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (O) "A subdivision of the physical medium allowing possibly
+ shared independent uses of the medium." (RFC 3753)
+
+ $ channel capacity
+ (I) The total capacity of a link to carry information; usually
+ expressed in bits per second. (RFC 3753) (Compare: bandwidth.)
+
+ Tutorial: Within a given bandwidth, the theoretical maximum
+ channel capacity is given by Shannon's Law. The actual channel
+ capacity is determined by the bandwidth, the coding system used,
+ and the signal-to-noise ratio.
+
+ $ CHAP
+ (I) See: Challenge Handshake Authentication Protocol.
+
+ $ checksum
+ (I) A value that (a) is computed by a function that is dependent
+ on the contents of a data object and (b) is stored or transmitted
+ together with the object, for detecting changes in the data. (See:
+ cyclic redundancy check, data integrity service, error detection
+ code, hash, keyed hash, parity bit, protected checksum.)
+
+ Tutorial: To gain confidence that a data object has not been
+ changed, an entity that later uses the data can independently
+ recompute the checksum value and compare the result with the value
+ that was stored or transmitted with the object.
+
+ Computer systems and networks use checksums (and other mechanisms)
+ to detect accidental changes in data. However, active wiretapping
+ that changes data could also change an accompanying checksum to
+ match the changed data. Thus, some checksum functions by
+ themselves are not good countermeasures for active attacks. To
+ protect against active attacks, the checksum function needs to be
+ well-chosen (see: cryptographic hash), and the checksum result
+ needs to be cryptographically protected (see: digital signature,
+ keyed hash).
+
+ $ Chinese wall policy
+ (I) A security policy to prevent conflict of interest caused by an
+ entity (e.g., a consultant) interacting with competing firms.
+ (See: Brewer-Nash model.)
+
+ Tutorial: All information is categorized into mutually exclusive
+ conflict-of-interest classes I(1), I(2), ..., I(M), and each firm
+ F(1), F(2), ..., F(N) belongs to exactly one class. The policy
+ states that if a consultant has access to class I(i) information
+ from a firm in that class, then the consultant may not access
+ information from another firm in that same class, but may access
+
+
+
+Shirey Informational [Page 60]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ information from another firm that is in a different class. Thus,
+ the policy creates a barrier to communication between firms that
+ are in the same conflict-of-interest class. Brewer and Nash
+ modeled enforcement of this policy [BN89], including dealing with
+ policy violations that could occur because two or more consultants
+ work for the same firm.
+
+ $ chosen-ciphertext attack
+ (I) A cryptanalysis technique in which the analyst tries to
+ determine the key from knowledge of plain text that corresponds to
+ cipher text selected (i.e., dictated) by the analyst.
+
+ $ chosen-plaintext attack
+ (I) A cryptanalysis technique in which the analyst tries to
+ determine the key from knowledge of cipher text that corresponds
+ to plain text selected (i.e., dictated) by the analyst.
+
+ $ CIAC
+ (O) See: Computer Incident Advisory Capability.
+
+ $ CIK
+ (N) See: cryptographic ignition key.
+
+ $ cipher
+ (I) A cryptographic algorithm for encryption and decryption.
+
+ $ cipher block chaining (CBC)
+ (N) A block cipher mode that enhances ECB mode by chaining
+ together blocks of cipher text it produces. [FP081] (See: block
+ cipher, [R1829], [R2405], [R2451], [SP38A].)
+
+ Tutorial: This mode operates by combining (exclusive OR-ing) the
+ algorithm's ciphertext output block with the next plaintext block
+ to form the next input block for the algorithm.
+
+ $ cipher feedback (CFB)
+ (N) A block cipher mode that enhances ECB mode by chaining
+ together the blocks of cipher text it produces and operating on
+ plaintext segments of variable length less than or equal to the
+ block length. [FP081] (See: block cipher, [SP38A].)
+
+ Tutorial: This mode operates by using the previously generated
+ ciphertext segment as the algorithm's input (i.e., by "feeding
+ back" the cipher text) to generate an output block, and then
+ combining (exclusive OR-ing) that output block with the next
+ plaintext segment (block length or less) to form the next
+ ciphertext segment.
+
+
+
+
+Shirey Informational [Page 61]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ cipher text
+ 1. (I) /noun/ Data that has been transformed by encryption so that
+ its semantic information content (i.e., its meaning) is no longer
+ intelligible or directly available. (See: ciphertext. Compare:
+ clear text, plain text.)
+
+ 2. (O) "Data produced through the use of encipherment. The
+ semantic content of the resulting data is not available."
+ [I7498-2]
+
+ $ ciphertext
+ 1. (O) /noun/ Synonym for "cipher text" [I7498-2].
+
+ 2. (I) /adjective/ Referring to cipher text. Usage: Commonly used
+ instead of "cipher-text". (Compare: cleartext, plaintext.)
+
+ $ ciphertext auto-key (CTAK)
+ (D) "Cryptographic logic that uses previous cipher text to
+ generate a key stream." [C4009, A1523] (See: KAK.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it is neither
+ well-known nor precisely defined. Instead, use terms associated
+ with modes that are defined in standards, such as CBC, CFB, and
+ OFB.
+
+ $ ciphertext-only attack
+ (I) A cryptanalysis technique in which the analyst tries to
+ determine the key solely from knowledge of intercepted cipher text
+ (although the analyst may also know other clues, such as the
+ cryptographic algorithm, the language in which the plain text was
+ written, the subject matter of the plain text, and some probable
+ plaintext words.)
+
+ $ ciphony
+ (O) The process of encrypting audio information.
+
+ $ CIPSO
+ (I) See: Common IP Security Option.
+
+ $ CKL
+ (I) See: compromised key list.
+
+ $ Clark-Wilson model
+ (N) A security model [Clark] to maintain data integrity in the
+ commercial world. (Compare: Bell-LaPadula model.)
+
+
+
+
+
+
+Shirey Informational [Page 62]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ class 2, 3, 4, 5
+ (O) /U.S. DoD/ Assurance levels for PKIs, and for X.509 public-key
+ certificates issued by a PKI. [DoD7] (See: "first law" under
+ "Courtney's laws".)
+ - "Class 2": Intended for applications handling unclassified,
+ low-value data in minimally or moderately protected
+ environments.
+ - "Class 3": Intended for applications handling unclassified,
+ medium-value data in moderately protected environments, or
+ handling unclassified or high-value data in highly protected
+ environments, and for discretionary access control of
+ classified data in highly protected environments.
+ - "Class 4": Intended for applications handling unclassified,
+ high-value data in minimally protected environments.
+ - "Class 5": Intended for applications handling classified data
+ in minimally protected environments, and for authentication of
+ material that would affect the security of classified systems.
+
+ The environments are defined as follows:
+ - "Highly protected environment": Networks that are protected
+ either with encryption devices approved by NSA for protection
+ of classified data or via physical isolation, and that are
+ certified for processing system-high classified data, where
+ exposure of unencrypted data is limited to U.S. citizens
+ holding appropriate security clearances.
+ - "Moderately protected environment":
+ -- Physically isolated unclassified, unencrypted networks in
+ which access is restricted based on legitimate need.
+ -- Networks protected by NSA-approved, type 1 encryption,
+ accessible by U.S.-authorized foreign nationals.
+ - "Minimally protected environments": Unencrypted networks
+ connected to either the Internet or NIPRNET, either directly or
+ via a firewall.
+
+ $ Class A1, B3, B2, B1, C2, or C1 computer system
+ (O) /TCSEC/ See: Tutorial under "Trusted Computer System
+ Evaluation Criteria".
+
+ $ classification
+ 1. (I) A grouping of classified information to which a
+ hierarchical, restrictive security label is applied to increase
+ protection of the data from unauthorized disclosure. (See:
+ aggregation, classified, data confidentiality service. Compare:
+ category, compartment.)
+
+ 2. (I) An authorized process by which information is determined to
+ be classified and assigned to a security level. (Compare:
+ declassification.)
+
+
+
+Shirey Informational [Page 63]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: Usually understood to involve data confidentiality, but
+ IDOCs SHOULD make this clear when data also is sensitive in other
+ ways and SHOULD use other terms for those other sensitivity
+ concepts. (See: sensitive information, data integrity.)
+
+ $ classification label
+ (I) A security label that tells the degree of harm that will
+ result from unauthorized disclosure of the labeled data, and may
+ also tell what countermeasures are required to be applied to
+ protect the data from unauthorized disclosure. Example: IPSO.
+ (See: classified, data confidentiality service. Compare: integrity
+ label.)
+
+ Usage: Usually understood to involve data confidentiality, but
+ IDOCs SHOULD make this clear when data also is sensitive in other
+ ways and SHOULD use other terms for those other sensitivity
+ concepts. (See: sensitive information, data integrity.)
+
+ $ classification level
+ (I) A hierarchical level of protection (against unauthorized
+ disclosure) that is required to be applied to certain classified
+ data. (See: classified. Compare: security level.)
+
+ Usage: Usually understood to involve data confidentiality, but
+ IDOCs SHOULD make this clear when data also is sensitive in other
+ ways and SHOULD use other terms for those other sensitivity
+ concepts. (See: sensitive information, data integrity.)
+
+ $ classified
+ 1. (I) Refers to information (stored or conveyed, in any form)
+ that is formally required by a security policy to receive data
+ confidentiality service and to be marked with a security label
+ (which, in some cases, might be implicit) to indicate its
+ protected status. (See: classify, collateral information, SAP,
+ security level. Compare: unclassified.)
+
+ Usage: Usually understood to involve data confidentiality, but
+ IDOCs SHOULD make this clear when data also is sensitive in other
+ ways and SHOULD use other terms for those other sensitivity
+ concepts. (See: sensitive information, data integrity.)
+
+ Mainly used by national governments, especially by the military,
+ but the underlying concept also applies outside of governments.
+
+ 2. (O) /U.S. Government/ "Information that has been determined
+ pursuant to Executive Order 12958 or any predecessor Order, or by
+ the Atomic Energy Act of 1954, as amended, to require protection
+
+
+
+
+Shirey Informational [Page 64]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ against unauthorized disclosure and is marked to indicate its
+ classified status." [C4009]
+
+ $ classify
+ (I) To officially designate an information item or type of
+ information as being classified and assigned to a specific
+ security level. (See: classified, declassify, security level.)
+
+ $ clean system
+ (I) A computer system in which the operating system and
+ application system software and files have been freshly installed
+ from trusted software distribution media. (Compare: secure state.)
+
+ $ clear
+ (D) /verb/ Synonym for "erase". [C4009]
+
+ Deprecated Definition: IDOCs SHOULD NOT use the term with this
+ definition; that could be confused with "clear text" in which
+ information is directly recoverable.
+
+ $ clear text
+ 1. (I) /noun/ Data in which the semantic information content
+ (i.e., the meaning) is intelligible or is directly available,
+ i.e., not encrypted. (See: cleartext, in the clear. Compare:
+ cipher text, plain text.)
+
+ 2. (O) /noun/ "Intelligible data, the semantic content of which is
+ available." [I7498-2]
+
+ 3. (D) /noun/ Synonym for "plain text".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "plain text", because the plain text that is input to an
+ encryption operation may itself be cipher text that was output
+ from a previous encryption operation. (See: superencryption.)
+
+ $ clearance
+ See: security clearance.
+
+ $ clearance level
+ (I) The security level of information to which a security
+ clearance authorizes a person to have access.
+
+ $ cleartext
+ 1. (O) /noun/ Synonym for "clear text" [I7498-2].
+
+ 2. (I) /adjective/ Referring to clear text. Usage: Commonly used
+ instead of "clear-text". (Compare: ciphertext, plaintext.)
+
+
+
+Shirey Informational [Page 65]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 3. (D) /adjective/ Synonym for "plaintext".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "plaintext", because the plaintext data that is input to an
+ encryption operation may itself be ciphertext data that was output
+ from a previous encryption operation. (See: superencryption.)
+
+ $ CLEF
+ (N) See: commercially licensed evaluation facility.
+
+ $ client
+ (I) A system entity that requests and uses a service provided by
+ another system entity, called a "server". (See: server.)
+
+ Tutorial: Usually, it is understood that the client and server are
+ automated components of the system, and the client makes the
+ request on behalf of a human user. In some cases, the server may
+ itself be a client of some other server.
+
+ $ client-server system
+ (I) A distributed system in which one or more entities, called
+ clients, request a specific service from one or more other
+ entities, called servers, that provide the service to the clients.
+
+ Example: The Word Wide Web, in which component servers provide
+ information that is requested by component clients called
+ "browsers".
+
+ $ CLIPPER
+ (N) An integrated microcircuit (in MYK-7x series manufactured by
+ Mykotronx, Inc.) that implements SKIPJACK, has a non-deterministic
+ random number generator, and supports key escrow. (See: Escrowed
+ Encryption Standard. Compare: CLIPPER.)
+
+ Tutorial: The chip was mainly intended for protecting
+ telecommunications over the public switched network. The key
+ escrow scheme for the chip involves a SKIPJACK key that is common
+ to all chips and that protects the unique serial number of the
+ chip, and a second SKIPJACK key unique to the chip that protects
+ all data encrypted by the chip. The second key is escrowed as
+ split key components held by NIST and the U.S. Treasury
+ Department.
+
+ $ closed security environment
+ (O) /U.S. DoD/ A system environment that meets both of the
+ following conditions: (a) Application developers (including
+ maintainers) have sufficient clearances and authorizations to
+ provide an acceptable presumption that they have not introduced
+
+
+
+Shirey Informational [Page 66]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ malicious logic. (b) Configuration control provides sufficient
+ assurance that system applications and the equipment they run on
+ are protected against the introduction of malicious logic prior to
+ and during the operation of applications. [NCS04] (See: "first
+ law" under "Courtney's laws". Compare: open security environment.)
+
+ $ CMA
+ (D) See: certificate management authority.
+
+ $ CMAC
+ (N) A message authentication code [SP38B] that is based on a
+ symmetric block cipher. (See: block cipher.)
+
+ Derivation: Cipher-based MAC. (Compare: HMAC.)
+
+ Tutorial: Because CMAC is based on approved, symmetric-key block
+ ciphers, such as AES, CMAC can be considered a mode of operation
+ for those block ciphers. (See: mode of operation.)
+
+ $ CMCS
+ (O) See: COMSEC Material Control System.
+
+ $ CMM
+ (N) See: Capability Maturity Model.
+
+ $ CMS
+ (I) See: Cryptographic Message Syntax.
+
+ $ code
+ 1. (I) A system of symbols used to represent information, which
+ might originally have some other representation. Examples: ASCII,
+ BER, country code, Morse code. (See: encode, object code, source
+ code.)
+
+ Deprecated Abbreviation: To avoid confusion with definition 1,
+ IDOCs SHOULD NOT use "code" as an abbreviation of "country code",
+ "cyclic redundancy code", "Data Authentication Code", "error
+ detection code", or "Message Authentication Code". To avoid
+ misunderstanding, use the fully qualified term in these other
+ cases, at least at the point of first usage.
+
+ 2. (I) /cryptography/ An encryption algorithm based on
+ substitution; i.e., a system for providing data confidentiality by
+ using arbitrary groups (called "code groups") of letters, numbers,
+ or symbols to represent units of plain text of varying length.
+ (See: codebook, cryptography.)
+
+
+
+
+
+Shirey Informational [Page 67]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Usage: To avoid confusion with definition 1, IDOCs
+ SHOULD NOT use "code" as a synonym for any of the following terms:
+ (a) "cipher", "hash", or other words that mean "a cryptographic
+ algorithm"; (b) "cipher text"; or (c) "encrypt", "hash", or other
+ words that refer to applying a cryptographic algorithm.
+
+ 3. (I) An algorithm based on substitution, but used to shorten
+ messages rather than to conceal their content.
+
+ 4. (I) /computer programming/ To write computer software. (See:
+ object code, source code.)
+
+ Deprecated Abbreviation: To avoid confusion with definition 1,
+ IDOCs SHOULD NOT use "code" as an abbreviation of "object code" or
+ "source code". To avoid misunderstanding, use the fully qualified
+ term in these other cases, at least at the point of first usage.
+
+ $ code book
+ 1. (I) Document containing a systematically arranged list of
+ plaintext units and their ciphertext equivalents. [C4009]
+
+ 2. (I) An encryption algorithm that uses a word substitution
+ technique. [C4009] (See: code, ECB.)
+
+ $ code signing
+ (I) A security mechanism that uses a digital signature to provide
+ data integrity and data origin authentication for software that is
+ being distributed for use. (See: mobile code, trusted
+ distribution.)
+
+ Tutorial: In some cases, the signature on a software module may
+ imply some assertion that the signer makes about the software. For
+ example, a signature may imply that the software has been
+ designed, developed, or tested according to some criterion.
+
+ $ code word
+ (O) /U.S. Government/ A single word that is used as a security
+ label (usually applied to classified information) but which itself
+ has a classified meaning. (See: classified, /U.S. Government/
+ security label.)
+
+ $ COI
+ (I) See: community of interest.
+
+ $ cold start
+ (N) /cryptographic module/ A procedure for initially keying
+ cryptographic equipment. [C4009]
+
+
+
+
+Shirey Informational [Page 68]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ collateral information
+ (O) /U.S. Government/ Information that is classified but is not
+ required to be protected by an SAP. (See: /U.S. Government/
+ classified.)
+
+ $ color change
+ (I) In a system being operated in periods-processing mode, the act
+ of purging all information from one processing period and then
+ changing over to the next processing period. (See: BLACK, RED.)
+
+ $ Commercial COMSEC Evaluation Program (CCEP)
+ (O) "Relationship between NSA and industry in which NSA provides
+ the COMSEC expertise (i.e., standards, algorithms, evaluations,
+ and guidance) and industry provides design, development, and
+ production capabilities to produce a type 1 or type 2 product."
+ [C4009]
+
+ $ commercially licensed evaluation facility (CLEF)
+ (N) An organization that has official approval to evaluate the
+ security of products and systems under the Common Criteria, ITSEC,
+ or some other standard. (Compare: KLIF.)
+
+ $ Committee on National Security Systems (CNSS)
+ (O) /U.S. Government/ A Government, interagency, standing
+ committee of the President's Critical Infrastructure Protection
+ Board. The CNSS is chaired by the Secretary of Defense and
+ provides a forum for the discussion of policy issues, sets
+ national policy, and promulgates direction, operational
+ procedures, and guidance for the security of national security
+ systems. The Secretary of Defense and the Director of Central
+ Intelligence are responsible for developing and overseeing the
+ implementation of Government-wide policies, principles, standards,
+ and guidelines for the security of systems that handle national
+ security information.
+
+ $ Common Criteria for Information Technology Security
+ (N) A standard for evaluating information technology (IT) products
+ and systems. It states requirements for security functions and for
+ assurance measures. [CCIB] (See: CLEF, EAL, packages, protection
+ profile, security target, TOE. Compare: CMM.)
+
+ Tutorial: Canada, France, Germany, the Netherlands, the United
+ Kingdom, and the United States (NIST and NSA) began developing
+ this standard in 1993, based on the European ITSEC, the Canadian
+ Trusted Computer Product Evaluation Criteria (CTCPEC), and the
+ U.S. "Federal Criteria for Information Technology Security" and
+ its precursor, the TCSEC. Work was done in cooperation with
+ ISO/IEC Joint Technical Committee 1 (Information Technology),
+
+
+
+Shirey Informational [Page 69]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Subcommittee 27 (Security Techniques), Working Group 3 (Security
+ Criteria). Version 2.0 of the Criteria has been issued as ISO's
+ International Standard 15408. The U.S. Government intends this
+ standard to supersede both the TCSEC and FIPS PUB 140. (See:
+ NIAP.)
+
+ The standard addresses data confidentiality, data integrity, and
+ availability and may apply to other aspects of security. It
+ focuses on threats to information arising from human activities,
+ malicious or otherwise, but may apply to non-human threats. It
+ applies to security measures implemented in hardware, firmware, or
+ software. It does not apply to (a) administrative security not
+ related directly to technical security, (b) technical physical
+ aspects of security such as electromagnetic emanation control, (c)
+ evaluation methodology or administrative and legal framework under
+ which the criteria may be applied, (d) procedures for use of
+ evaluation results, or (e) assessment of inherent qualities of
+ cryptographic algorithms.
+
+ Part 1, Introduction and General Model, defines general concepts
+ and principles of IT security evaluation; presents a general model
+ of evaluation; and defines constructs for expressing IT security
+ objectives, for selecting and defining IT security requirements,
+ and for writing high-level specifications for products and
+ systems.
+
+ Part 2, Security Functional Requirements, contains a catalog of
+ well-defined and well-understood functional requirement statements
+ that are intended to be used as a standard way of expressing the
+ security requirements for IT products and systems.
+
+ Part 3, Security Assurance Requirements, contains a catalog of
+ assurance components for use as a standard way of expressing such
+ requirements for IT products and systems, and defines evaluation
+ criteria for protection profiles and security targets.
+
+ $ Common IP Security Option (CIPSO)
+ (I) See: secondary definition under "IPSO".
+
+ $ common name
+ (N) A character string that (a) may be a part of the X.500 DN of a
+ Directory object ("commonName" attribute), (b) is a (possibly
+ ambiguous) name by which the object is commonly known in some
+ limited scope (such as an organization), and (c) conforms to the
+ naming conventions of the country or culture with which it is
+ associated. [X520] (See: "subject" and "issuer" under "X.509
+ public-key certificate".)
+
+
+
+
+Shirey Informational [Page 70]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Examples: "Dr. Albert Einstein", "The United Nations", and "12-th
+ Floor Laser Printer".
+
+ $ communications cover
+ (N) "Concealing or altering of characteristic communications
+ patterns to hide information that could be of value to an
+ adversary." [C4009] (See: operations security, traffic-flow
+ confidentiality, TRANSEC.)
+
+ $ communication security (COMSEC)
+ (I) Measures that implement and assure security services in a
+ communication system, particularly those that provide data
+ confidentiality and data integrity and that authenticate
+ communicating entities.
+
+ Usage: COMSEC is usually understood to include (a) cryptography
+ and its related algorithms and key management methods and
+ processes, devices that implement those algorithms and processes,
+ and the lifecycle management of the devices and keying material.
+ Also, COMSEC is sometimes more broadly understood as further
+ including (b) traffic-flow confidentiality, (c) TRANSEC, and (d)
+ steganography [Kahn]. (See: cryptology, signal security.)
+
+ $ community of interest (COI)
+ 1. (I) A set of entities that operate under a common security
+ policy. (Compare: domain.)
+
+ 2. (I) A set of entities that exchange information collaboratively
+ for some purpose.
+
+ $ community risk
+ (N) Probability that a particular vulnerability will be exploited
+ within an interacting population and adversely affect some members
+ of that population. [C4009] (See: Morris worm, risk.)
+
+ $ community string
+ (I) A community name in the form of an octet string that serves as
+ a cleartext password in SNMP version 1 (RFC 1157) and version 2
+ (RFC 1901). (See: password, Simple Network Management Protocol.)
+
+ Tutorial: The SNMPv1 and SNMPv2 protocols have been declared
+ "historic" and have been replaced by the more secure SNMPv3
+ standard (RFCs 3410-3418), which does not use cleartext passwords.
+
+
+
+
+
+
+
+
+Shirey Informational [Page 71]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ compartment
+ 1. (I) A grouping of sensitive information items that require
+ special access controls beyond those normally provided for the
+ basic classification level of the information. (See: compartmented
+ security mode. Compare: category, classification.)
+
+ Usage: The term is usually understood to include the special
+ handling procedures to be used for the information.
+
+ 2. (I) Synonym for "category".
+
+ Deprecated Usage: This Glossary defines "category" with a slightly
+ narrower meaning than "compartment". That is, a security label is
+ assigned to a category because the data owner needs to handle the
+ data as a compartment. However, a compartment could receive
+ special protection in a system without being assigned a category
+ label.
+
+ $ compartmented security mode
+ (N) A mode of system operation wherein all users having access to
+ the system have the necessary security clearance for the single,
+ hierarchical classification level of all data handled by the
+ system, but some users do not have the clearance for a non-
+ hierarchical category of some data handled by the system. (See:
+ category, /system operation/ under "mode", protection level,
+ security clearance.)
+
+ Usage: Usually abbreviated as "compartmented mode". This term was
+ defined in U.S. Government policy on system accreditation. In this
+ mode, a system may handle (a) a single hierarchical classification
+ level and (b) multiple non-hierarchical categories within that
+ level.
+
+ $ Compartments field
+ (I) A 16-bit field (the "C field") that specifies compartment
+ values in the security option (option type 130) of version 4 IP's
+ datagram header format. The valid field values are assigned by the
+ U.S. Government, as specified in RFC 791.
+
+ Deprecated Abbreviation: IDOCs SHOULD NOT use the abbreviation "C
+ field"; the abbreviation is potentially ambiguous. Instead, use
+ "Compartments field".
+
+ $ component
+ See: system component.
+
+
+
+
+
+
+Shirey Informational [Page 72]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ compression
+ (I) A process that encodes information in a way that minimizes the
+ number of resulting code symbols and thus reduces storage space or
+ transmission time.
+
+ Tutorial: A data compression algorithm may be "lossless", i.e.,
+ retain all information that was encoded in the data, so that
+ decompression can recover all the information; or an algorithm may
+ be "lossy". Text usually needs to be compressed losslessly, but
+ images are often compressed with lossy schemes.
+
+ Not all schemes that encode information losslessly for machine
+ processing are efficient in terms of minimizing the number of
+ output bits. For example, ASCII encoding is lossless, but ASCII
+ data can often be losslessly reencoded in fewer bits with other
+ schemes. These more efficient schemes take advantage of some sort
+ of inherent imbalance, redundancy, or repetition in the data, such
+ as by replacing a character string in which all characters are the
+ same by a shorter string consisting of only the single character
+ and a character count.
+
+ Lossless compression schemes cannot effectively reduce the number
+ of bits in cipher text produced by a strong encryption algorithm,
+ because the cipher text is essentially a pseudorandom bit string
+ that does not contain patterns susceptible to reencoding.
+ Therefore, protocols that offer both encryption and compression
+ services (e.g., SSL) need to perform the compression operation
+ before the encryption operation.
+
+ $ compromise
+ See: data compromise, security compromise.
+
+ $ compromise recovery
+ (I) The process of regaining a secure state for a system after
+ detecting that the system has experienced a security compromise.
+
+ $ compromised key list (CKL)
+ (N) /MISSI/ A list that identifies keys for which unauthorized
+ disclosure or alteration may have occurred. (See: compromise.)
+
+ Tutorial: A CKL is issued by a CA, like a CRL is issued. But a CKL
+ lists only KMIDs, not subjects that hold the keys, and not
+ certificates in which the keys are bound.
+
+ $ COMPUSEC
+ (I) See: computer security.
+
+
+
+
+
+Shirey Informational [Page 73]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ computer emergency response team (CERT)
+ (I) An organization that studies computer and network INFOSEC in
+ order to provide incident response services to victims of attacks,
+ publish alerts concerning vulnerabilities and threats, and offer
+ other information to help improve computer and network security.
+ (See: CSIRT, security incident.)
+
+ Examples: CERT Coordination Center at Carnegie Mellon University
+ (sometimes called "the" CERT); CIAC.
+
+ $ Computer Incident Advisory Capability (CIAC)
+ (O) The centralized CSIRT of the U.S. Department of Energy; a
+ member of FIRST.
+
+ $ computer network
+ (I) A collection of host computers together with the subnetwork or
+ internetwork through which they can exchange data.
+
+ Usage: This definition is intended to cover systems of all sizes
+ and types, ranging from the complex Internet to a simple system
+ composed of a personal computer dialing in as a remote terminal of
+ another computer.
+
+ $ computer platform
+ (I) A combination of computer hardware and an operating system
+ (which may consist of software, firmware, or both) for that
+ hardware. (Compare: computer system.)
+
+ $ computer security (COMPUSEC)
+ 1. (I) Measures to implement and assure security services in a
+ computer system, particularly those that assure access control
+ service.
+
+ Usage: Usually refers to internal controls (functions, features,
+ and technical characteristics) that are implemented in software
+ (especially in operating systems); sometimes refers to internal
+ controls implemented in hardware; rarely used to refer to external
+ controls.
+
+ 2. (O) "The protection afforded to an automated information system
+ in order to attain the applicable objectives of preserving the
+ integrity, availability and confidentiality of information system
+ resources (includes hardware, software, firmware,
+ information/data, and telecommunications)." [SP12]
+
+
+
+
+
+
+
+Shirey Informational [Page 74]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ computer security incident response team (CSIRT)
+ (I) An organization "that coordinates and supports the response to
+ security incidents that involve sites within a defined
+ constituency." [R2350] (See: CERT, FIRST, security incident.)
+
+ Tutorial: To be considered a CSIRT, an organization must do as
+ follows: (a) Provide a (secure) channel for receiving reports
+ about suspected security incidents. (b) Provide assistance to
+ members of its constituency in handling the incidents. (c)
+ Disseminate incident-related information to its constituency and
+ other involved parties.
+
+ $ computer security object
+ (I) The definition or representation of a resource, tool, or
+ mechanism used to maintain a condition of security in computerized
+ environments. Includes many items referred to in standards that
+ are either selected or defined by separate user communities.
+ [CSOR] (See: object identifier, Computer Security Objects
+ Register.)
+
+ $ Computer Security Objects Register (CSOR)
+ (N) A service operated by NIST is establishing a catalog for
+ computer security objects to provide stable object definitions
+ identified by unique names. The use of this register will enable
+ the unambiguous specification of security parameters and
+ algorithms to be used in secure data exchanges. (See: object
+ identifier.)
+
+ Tutorial: The CSOR follows registration guidelines established by
+ the international standards community and ANSI. Those guidelines
+ establish minimum responsibilities for registration authorities
+ and assign the top branches of an international registration
+ hierarchy. Under that international registration hierarchy, the
+ CSOR is responsible for the allocation of unique identifiers under
+ the branch: {joint-iso-ccitt(2) country(16) us(840)
+ organization(1) gov(101) csor(3)}.
+
+ $ computer system
+ (I) Synonym for "information system", or a component thereof.
+ (Compare: computer platform.)
+
+ $ Computers At Risk
+ (O) The 1991 report [NRC91] of the System Security Study
+ Committee, sponsored by the U.S. National Academy of Sciences and
+ supported by the Defense Advanced Research Projects Agency of the
+ U.S. DoD. It made many recommendations for industry and
+ governments to improve computer security and trustworthiness. Some
+ of the most important recommendations (e.g., establishing an
+
+
+
+Shirey Informational [Page 75]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Information Security Foundation chartered by the U.S. Government)
+ have not been implemented at all, and others (e.g., codifying
+ Generally Accepted System Security Principles similar to
+ accounting principles) have been implemented but not widely
+ adopted [SP14, SP27].
+
+ $ COMSEC
+ (I) See: communication security.
+
+ $ COMSEC account
+ (O) /U.S. Government/ "Administrative entity, identified by an
+ account number, used to maintain accountability, custody, and
+ control of COMSEC material." [C4009] (See: COMSEC custodian.)
+
+ $ COMSEC accounting
+ (O) /U.S. Government/ The process of creating, collecting, and
+ maintaining data records that describe the status and custody of
+ designated items of COMSEC material. (See: accounting legend
+ code.)
+
+ Tutorial: Almost any secure information system needs to record a
+ security audit trail, but a system that manages COMSEC material
+ needs to record additional data about the status and custody of
+ COMSEC items.
+ - COMSEC tracking: The process of automatically collecting,
+ recording, and managing information that describes the status
+ of designated items of COMSEC material at all times during each
+ product's lifecycle.
+ - COMSEC controlling: The process of supplementing tracking data
+ with custody data, which consists of explicit acknowledgements
+ of system entities that they (a) have received specific COMSEC
+ items and (b) are responsible for preventing exposure of those
+ items.
+
+ For example, a key management system that serves a large customer
+ base needs to record tracking data for the same reasons that a
+ national parcel delivery system does, i.e., to answer the question
+ "Where is that thing now?". If keys are encrypted immediately upon
+ generation and handled only in BLACK form between the point of
+ generation and the point of use, then tracking may be all that is
+ needed. However, in cases where keys are handled at least partly
+ in RED form and are potentially subject to exposure, then tracking
+ needs to be supplemented by controlling.
+
+ Data that is used purely for tracking need be retained only
+ temporarily, until an item's status changes. Data that is used for
+ controlling is retained indefinitely to ensure accountability and
+ support compromise recovery.
+
+
+
+Shirey Informational [Page 76]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ COMSEC boundary
+ (N) "Definable perimeter encompassing all hardware, firmware, and
+ software components performing critical COMSEC functions, such as
+ key generation and key handling and storage." [C4009] (Compare:
+ cryptographic boundary.)
+
+ $ COMSEC custodian
+ (O) /U.S. Government/ "Individual designated by proper authority
+ to be responsible for the receipt, transfer, accounting,
+ safeguarding, and destruction of COMSEC material assigned to a
+ COMSEC account." [C4009]
+
+ $ COMSEC material
+ (N) /U.S. Government/ Items designed to secure or authenticate
+ communications or information in general; these items include (but
+ are not limited to) keys; equipment, devices, documents, firmware,
+ and software that embodies or describes cryptographic logic; and
+ other items that perform COMSEC functions. [C4009] (Compare:
+ keying material.)
+
+ $ COMSEC Material Control System (CMCS)
+ (O) /U.S. Government/ "Logistics and accounting system through
+ which COMSEC material marked 'CRYPTO' is distributed, controlled,
+ and safeguarded." [C4009] (See: COMSEC account, COMSEC custodian.)
+
+ $ confidentiality
+ See: data confidentiality.
+
+ $ concealment system
+ (O) "A method of achieving confidentiality in which sensitive
+ information is hidden by embedding it in irrelevant data." [NCS04]
+ (Compare: steganography.)
+
+ $ configuration control
+ (I) The process of regulating changes to hardware, firmware,
+ software, and documentation throughout the development and
+ operational life of a system. (See: administrative security,
+ harden, trusted distribution.)
+
+ Tutorial: Configuration control helps protect against unauthorized
+ or malicious alteration of a system and thus provides assurance of
+ system integrity. (See: malicious logic.)
+
+ $ confinement property
+ (N) /formal model/ Property of a system whereby a subject has
+ write access to an object only if the classification of the object
+ dominates the clearance of the subject. (See: *-property, Bell-
+ LaPadula model.)
+
+
+
+Shirey Informational [Page 77]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ constraint
+ (I) /access control/ A limitation on the function of an identity,
+ role, or privilege. (See: rule-based access control.)
+
+ Tutorial: In effect, a constraint is a form of security policy and
+ may be either static or dynamic:
+ - "Static constraint": A constraint that must be satisfied at the
+ time the policy is defined, and then continues to be satisfied
+ until the constraint is removed.
+ - "Dynamic constraint": A constraint that may be defined to apply
+ at various times that the identity, role, or other object of
+ the constraint is active in the system.
+
+ $ content filter
+ (I) /World Wide Web/ Application software used to prevent access
+ to certain Web servers, such as by parents who do not want their
+ children to access pornography. (See: filter, guard.)
+
+ Tutorial: The filter is usually browser-based, but could be part
+ of an intermediate cache server. The two basic content filtering
+ techniques are (a) to block a specified list of URLs and (b) to
+ block material that contains specified words and phrases.
+
+ $ contingency plan
+ (I) A plan for emergency response, backup operations, and post-
+ disaster recovery in a system as part of a security program to
+ ensure availability of critical system resources and facilitate
+ continuity of operations in a crisis. [NCS04] (See: availability.)
+
+ $ control zone
+ (O) "The space, expressed in feet of radius, surrounding equipment
+ processing sensitive information, that is under sufficient
+ physical and technical control to preclude an unauthorized entry
+ or compromise." [NCSSG] (Compare: inspectable space, TEMPEST
+ zone.)
+
+ $ controlled access protection
+ (O) /TCSEC/ The level of evaluation criteria for a C2 computer
+ system.
+
+ Tutorial: The major features of the C2 level are individual
+ accountability, audit, access control, and object reuse.
+
+ $ controlled cryptographic item (CCI)
+ (O) /U.S. Government/ "Secure telecommunications or information
+ handling equipment, or associated cryptographic component, that is
+ unclassified but governed by a special set of control
+ requirements." [C4009] (Compare: EUCI.)
+
+
+
+Shirey Informational [Page 78]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: This category of equipment was established in 1985 to
+ promote broad use of secure equipment for protecting both
+ classified and unclassified information in the national interest.
+ CCI equipment uses a classified cryptographic logic, but the
+ hardware or firmware embodiment of that logic is unclassified.
+ Drawings, software implementations, and other descriptions of that
+ logic remain classified. [N4001]
+
+ $ controlled interface
+ (I) A mechanism that facilitates the adjudication of the different
+ security policies of interconnected systems. (See: domain, guard.)
+
+ $ controlled security mode
+ (D) /U.S. DoD/ A mode of system operation wherein (a) two or more
+ security levels of information are allowed to be handled
+ concurrently within the same system when some users having access
+ to the system have neither a security clearance nor need-to-know
+ for some of the data handled by the system, but (b) separation of
+ the users and the classified material on the basis, respectively,
+ of clearance and classification level are not dependent only on
+ operating system control (like they are in multilevel security
+ mode). (See: /system operation/ under "mode", protection level.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term. It was defined in
+ a U.S. Government policy regarding system accreditation and was
+ subsumed by "partitioned security mode" in a later policy. Both
+ terms were dropped in still later policies.
+
+ Tutorial: Controlled mode was intended to encourage ingenuity in
+ meeting data confidentiality requirements in ways less restrictive
+ than "dedicated security mode" and "system-high security mode",
+ but at a level of risk lower than that generally associated with
+ true "multilevel security mode". This was intended to be
+ accomplished by implementation of explicit augmenting measures to
+ reduce or remove a substantial measure of system software
+ vulnerability together with specific limitation of the security
+ clearance levels of users having concurrent access to the system.
+
+ $ controlling authority
+ (O) /U.S. Government/ "Official responsible for directing the
+ operation of a cryptonet and for managing the operational use and
+ control of keying material assigned to the cryptonet." [C4009,
+ N4006]
+
+ $ cookie
+ 1. (I) /HTTP/ Data exchanged between an HTTP server and a browser
+ (a client of the server) to store state information on the client
+ side and retrieve it later for server use.
+
+
+
+Shirey Informational [Page 79]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: An HTTP server, when sending data to a client, may send
+ along a cookie, which the client retains after the HTTP connection
+ closes. A server can use this mechanism to maintain persistent
+ client-side state information for HTTP-based applications,
+ retrieving the state information in later connections. A cookie
+ may include a description of the range of URLs for which the state
+ is valid. Future requests made by the client in that range will
+ also send the current value of the cookie to the server. Cookies
+ can be used to generate profiles of web usage habits, and thus may
+ infringe on personal privacy.
+
+ 2. (I) /IPsec/ Data objects exchanged by ISAKMP to prevent certain
+ denial-of-service attacks during the establishment of a security
+ association.
+
+ 3. (D) /access control/ Synonym for "capability token" or
+ "ticket".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 3; that would duplicate the meaning of better-
+ established terms and mix concepts in a potentially misleading
+ way.
+
+ $ Coordinated Universal Time (UTC)
+ (N) UTC is derived from International Atomic Time (TAI) by adding
+ a number of leap seconds. The International Bureau of Weights and
+ Measures computes TAI once each month by averaging data from many
+ laboratories. (See: GeneralizedTime, UTCTime.)
+
+ $ correction
+ (I) /security/ A system change made to eliminate or reduce the
+ risk of reoccurrence of a security violation or threat
+ consequence. (See: secondary definition under "security".)
+
+ $ correctness
+ (I) "The property of a system that is guaranteed as the result of
+ formal verification activities." [Huff] (See: correctness proof,
+ verification.)
+
+ $ correctness integrity
+ (I) The property that the information represented by data is
+ accurate and consistent. (Compare: data integrity, source
+ integrity.)
+
+ Tutorial: IDOCs SHOULD NOT use this term without providing a
+ definition; the term is neither well-known nor precisely defined.
+ Data integrity refers to the constancy of data values, and source
+ integrity refers to confidence in data values. However,
+
+
+
+Shirey Informational [Page 80]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ correctness integrity refers to confidence in the underlying
+ information that data values represent, and this property is
+ closely related to issues of accountability and error handling.
+
+ $ correctness proof
+ (I) A mathematical proof of consistency between a specification
+ for system security and the implementation of that specification.
+ (See: correctness, formal specification.)
+
+ $ corruption
+ (I) A type of threat action that undesirably alters system
+ operation by adversely modifying system functions or data. (See:
+ disruption.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Tampering": /corruption/ Deliberately altering a system's
+ logic, data, or control information to interrupt or prevent
+ correct operation of system functions. (See: misuse, main entry
+ for "tampering".)
+ - "Malicious logic": /corruption/ Any hardware, firmware, or
+ software (e.g., a computer virus) intentionally introduced into
+ a system to modify system functions or data. (See:
+ incapacitation, main entry for "malicious logic", masquerade,
+ misuse.)
+ - "Human error": /corruption/ Human action or inaction that
+ unintentionally results in the alteration of system functions
+ or data.
+ - "Hardware or software error": /corruption/ Error that results
+ in the alteration of system functions or data.
+ - "Natural disaster": /corruption/ Any "act of God" (e.g., power
+ surge caused by lightning) that alters system functions or
+ data. [FP031 Section 2]
+
+ $ counter
+ 1. (N) /noun/ See: counter mode.
+
+ 2. (I) /verb/ See: countermeasure.
+
+ $ counter-countermeasure
+ (I) An action, device, procedure, or technique used by an attacker
+ to offset a defensive countermeasure.
+
+ Tutorial: For every countermeasure devised to protect computers
+ and networks, some cracker probably will be able to devise a
+ counter-countermeasure. Thus, systems must use "defense in depth".
+
+
+
+
+
+
+Shirey Informational [Page 81]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ counter mode (CTR)
+ (N) A block cipher mode that enhances ECB mode by ensuring that
+ each encrypted block is different from every other block encrypted
+ under the same key. [SP38A] (See: block cipher.)
+
+ Tutorial: This mode operates by first encrypting a generated
+ sequence of blocks, called "counters", that are separate from the
+ input sequence of plaintext blocks which the mode is intended to
+ protect. The resulting sequence of encrypted counters is
+ exclusive-ORed with the sequence of plaintext blocks to produce
+ the final ciphertext output blocks. The sequence of counters must
+ have the property that each counter is different from every other
+ counter for all of the plain text that is encrypted under the same
+ key.
+
+ $ Counter with Cipher Block Chaining-Message Authentication Code
+ (CCM)
+ (N) A block cipher mode [SP38C] that provides both data
+ confidentiality and data origin authentication, by combining the
+ techniques of CTR and a CBC-based message authentication code.
+ (See: block cipher.)
+
+ $ countermeasure
+ (I) An action, device, procedure, or technique that meets or
+ opposes (i.e., counters) a threat, a vulnerability, or an attack
+ by eliminating or preventing it, by minimizing the harm it can
+ cause, or by discovering and reporting it so that corrective
+ action can be taken.
+
+ Tutorial: In an Internet protocol, a countermeasure may take the
+ form of a protocol feature, a component function, or a usage
+ constraint.
+
+ $ country code
+ (I) An identifier that is defined for a nation by ISO. [I3166]
+
+ Tutorial: For each nation, ISO Standard 3166 defines a unique two-
+ character alphabetic code, a unique three-character alphabetic
+ code, and a three-digit code. Among many uses of these codes, the
+ two-character codes are used as top-level domain names.
+
+ $ Courtney's laws
+ (N) Principles for managing system security that were stated by
+ Robert H. Courtney, Jr.
+
+
+
+
+
+
+
+Shirey Informational [Page 82]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Bill Murray codified Courtney's laws as follows: [Murr]
+ - Courtney's first law: You cannot say anything interesting
+ (i.e., significant) about the security of a system except in
+ the context of a particular application and environment.
+ - Courtney's second law: Never spend more money eliminating a
+ security exposure than tolerating it will cost you. (See:
+ acceptable risk, risk analysis.)
+ -- First corollary: Perfect security has infinite cost.
+ -- Second corollary: There is no such thing as zero risk.
+ - Courtney's third law: There are no technical solutions to
+ management problems, but there are management solutions to
+ technical problems.
+
+ $ covert action
+ (I) An operation that is planned and executed in a way that
+ conceals the identity of the operator.
+
+ $ covert channel
+ 1. (I) An unintended or unauthorized intra-system channel that
+ enables two cooperating entities to transfer information in a way
+ that violates the system's security policy but does not exceed the
+ entities' access authorizations. (See: covert storage channel,
+ covert timing channel, out-of-band, tunnel.)
+
+ 2. (O) "A communications channel that allows two cooperating
+ processes to transfer information in a manner that violates the
+ system's security policy." [NCS04]
+
+ Tutorial: The cooperating entities can be either two insiders or
+ an insider and an outsider. Of course, an outsider has no access
+ authorization at all. A covert channel is a system feature that
+ the system architects neither designed nor intended for
+ information transfer.
+
+ $ covert storage channel
+ (I) A system feature that enables one system entity to signal
+ information to another entity by directly or indirectly writing a
+ storage location that is later directly or indirectly read by the
+ second entity. (See: covert channel.)
+
+ $ covert timing channel
+ (I) A system feature that enables one system entity to signal
+ information to another by modulating its own use of a system
+ resource in such a way as to affect system response time observed
+ by the second entity. (See: covert channel.)
+
+ $ CPS
+ (I) See: certification practice statement.
+
+
+
+Shirey Informational [Page 83]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ cracker
+ (I) Someone who tries to break the security of, and gain
+ unauthorized access to, someone else's system, often with
+ malicious intent. (See: adversary, intruder, packet monkey, script
+ kiddy. Compare: hacker.)
+
+ Usage: Was sometimes spelled "kracker". [NCSSG]
+
+ $ CRAM
+ (I) See: Challenge-Response Authentication Mechanism.
+
+ $ CRC
+ (I) See: cyclic redundancy check.
+
+ $ credential
+ 1. (I) /authentication/ "identifier credential": A data object
+ that is a portable representation of the association between an
+ identifier and a unit of authentication information, and that can
+ be presented for use in verifying an identity claimed by an entity
+ that attempts to access a system. Example: X.509 public-key
+ certificate. (See: anonymous credential.)
+
+ 2. (I) /access control/ "authorization credential": A data object
+ that is a portable representation of the association between an
+ identifier and one or more access authorizations, and that can be
+ presented for use in verifying those authorizations for an entity
+ that attempts such access. Example: X.509 attribute certificate.
+ (See: capability token, ticket.)
+
+ 3. (D) /OSIRM/ "Data that is transferred to establish the claimed
+ identity of an entity." [I7498-2]
+
+ Deprecated Definition: IDOCs SHOULD NOT use the term with
+ definition 3. As explained in the tutorial below, an
+ authentication process can involve the transfer of multiple data
+ objects, and not all of those are credentials.
+
+ 4. (D) /U.S. Government/ "An object that is verified when
+ presented to the verifier in an authentication transaction."
+ [M0404]
+
+ Deprecated Definition: IDOCs SHOULD NOT use the term with
+ definition 4; it mixes concepts in a potentially misleading way.
+ For example, in an authentication process, it is the identity that
+ is "verified", not the credential; the credential is "validated".
+ (See: validate vs. verify.)
+
+
+
+
+
+Shirey Informational [Page 84]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: In general English, "credentials" are evidence or
+ testimonials that (a) support a claim of identity or authorization
+ and (b) usually are intended to be used more than once (i.e., a
+ credential's life is long compared to the time needed for one
+ use). Some examples are a policeman's badge, an automobile
+ driver's license, and a national passport. An authentication or
+ access control process that uses a badge, license, or passport is
+ outwardly simple: the holder just shows the thing.
+
+ The problem with adopting this term in Internet security is that
+ an automated process for authentication or access control usually
+ requires multiple steps using multiple data objects, and it might
+ not be immediately obvious which of those objects should get the
+ name "credential".
+
+ For example, if the verification step in a user authentication
+ process employs public-key technology, then the process involves
+ at least three data items: (a) the user's private key, (b) a
+ signed value -- signed with that private key and passed to the
+ system, perhaps in response to a challenge from the system -- and
+ (c) the user's public-key certificate, which is validated by the
+ system and provides the public key needed to verify the signature.
+ - Private key: The private key is *not* a credential, because it
+ is never transferred or presented. Instead, the private key is
+ "authentication information", which is associated with the
+ user's identifier for a specified period of time and can be
+ used in multiple authentications during that time.
+ - Signed value: The signed value is *not* a credential; the
+ signed value is only ephemeral, not long lasting. The OSIRM
+ definition could be interpreted to call the signed value a
+ credential, but that would conflict with general English.
+ - Certificate: The user's certificate *is* a credential. It can
+ be "transferred" or "presented" to any person or process that
+ needs it at any time. A public-key certificate may be used as
+ an "identity credential", and an attribute certificate may be
+ used as an "authorization credential".
+
+ $ critical
+ 1. (I) /system resource/ A condition of a system resource such
+ that denial of access to, or lack of availability of, that
+ resource would jeopardize a system user's ability to perform a
+ primary function or would result in other serious consequences,
+ such as human injury or loss of life. (See: availability,
+ precedence. Compare: sensitive.)
+
+ 2. (N) /extension/ An indication that an application is not
+ permitted to ignore an extension. [X509]
+
+
+
+
+Shirey Informational [Page 85]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Each extension of an X.509 certificate or CRL is flagged
+ as either "critical" or "non-critical". In a certificate, if a
+ computer program does not recognize an extension's type (i.e.,
+ does not implement its semantics), then if the extension is
+ critical, the program is required to treat the certificate as
+ invalid; but if the extension is non-critical, the program is
+ permitted to ignore the extension.
+
+ In a CRL, if a program does not recognize a critical extension
+ that is associated with a specific certificate, the program is
+ required to assume that the listed certificate has been revoked
+ and is no longer valid, and then take whatever action is required
+ by local policy.
+
+ When a program does not recognize a critical extension that is
+ associated with the CRL as a whole, the program is required to
+ assume that all listed certificates have been revoked and are no
+ longer valid. However, since failing to process the extension may
+ mean that the list has not been completed, the program cannot
+ assume that other certificates are valid, and the program needs to
+ take whatever action is therefore required by local policy.
+
+ $ critical information infrastructure
+ (I) Those systems that are so vital to a nation that their
+ incapacity or destruction would have a debilitating effect on
+ national security, the economy, or public health and safety.
+
+ $ CRL
+ (I) See: certificate revocation list.
+
+ $ CRL distribution point
+ (I) See: distribution point.
+
+ $ CRL extension
+ (I) See: extension.
+
+ $ cross-certificate
+ (I) A public-key certificate issued by a CA in one PKI to a CA in
+ another PKI. (See: cross-certification.)
+
+ $ cross-certification
+ (I) The act or process by which a CA in one PKI issues a public-
+ key certificate to a CA in another PKI. [X509] (See: bridge CA.)
+
+ Tutorial: X.509 says that a CA (say, CA1) may issue a "cross-
+ certificate" in which the subject is another CA (say, CA2). X.509
+ calls CA2 the "subject CA" and calls CA1 an "intermediate CA", but
+
+
+
+
+Shirey Informational [Page 86]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ this Glossary deprecates those terms. (See: intermediate CA,
+ subject CA).
+
+ Cross-certification of CA2 by CA1 appears similar to certification
+ of a subordinate CA by a superior CA, but cross-certification
+ involves a different concept. The "subordinate CA" concept applies
+ when both CAs are in the same PKI, i.e., when either (a) CA1 and
+ CA2 are under the same root or (b) CA1 is itself a root. The
+ "cross-certification" concept applies in other cases:
+
+ First, cross-certification applies when two CAs are in different
+ PKIs, i.e., when CA1 and CA2 are under different roots, or perhaps
+ are both roots themselves. Issuing the cross-certificate enables
+ end entities certified under CA1 in PK1 to construct the
+ certification paths needed to validate the certificates of end
+ entities certified under CA2 in PKI2. Sometimes, a pair of cross-
+ certificates is issued -- by CA1 to CA2, and by CA2 to CA1 -- so
+ that an end entity in either PKI can validate certificates issued
+ in the other PKI.
+
+ Second, X.509 says that two CAs in some complex, multi-CA PKI can
+ cross-certify one another to shorten the certification paths
+ constructed by end entities. Whether or not a CA may perform this
+ or any other form of cross-certification, and how such
+ certificates may be used by end entities, should be addressed by
+ the local certificate policy and CPS.
+
+ $ cross-domain solution
+ 1. (D) Synonym for "guard".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ "guard"; this term unnecessarily (and verbosely) duplicates the
+ meaning of the long-established "guard".
+
+ 2. (O) /U.S. Government/ A process or subsystem that provides a
+ capability (which could be either manual or automated) to access
+ two or more differing security domains in a system, or to transfer
+ information between such domains. (See: domain, guard.)
+
+ $ cryptanalysis
+ 1. (I) The mathematical science that deals with analysis of a
+ cryptographic system to gain knowledge needed to break or
+ circumvent the protection that the system is designed to provide.
+ (See: cryptology, secondary definition under "intrusion".)
+
+ 2. (O) "The analysis of a cryptographic system and/or its inputs
+ and outputs to derive confidential variables and/or sensitive data
+ including cleartext." [I7498-2]
+
+
+
+Shirey Informational [Page 87]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Definition 2 states the traditional goal of
+ cryptanalysis, i.e., convert cipher text to plain text (which
+ usually is clear text) without knowing the key; but that
+ definition applies only to encryption systems. Today, the term is
+ used with reference to all kinds of cryptographic algorithms and
+ key management, and definition 1 reflects that. In all cases,
+ however, a cryptanalyst tries to uncover or reproduce someone
+ else's sensitive data, such as clear text, a key, or an algorithm.
+ The basic cryptanalytic attacks on encryption systems are
+ ciphertext-only, known-plaintext, chosen-plaintext, and chosen-
+ ciphertext; and these generalize to the other kinds of
+ cryptography.
+
+ $ crypto, CRYPTO
+ 1. (N) A prefix ("crypto-") that means "cryptographic".
+
+ Usage: IDOCs MAY use this prefix when it is part of a term listed
+ in this Glossary. Otherwise, IDOCs SHOULD NOT use this prefix;
+ instead, use the unabbreviated adjective, "cryptographic".
+
+ 2. (D) In lower case, "crypto" is an abbreviation for the
+ adjective "cryptographic", or for the nouns "cryptography" or
+ "cryptographic component".
+
+ Deprecated Abbreviation: IDOCs SHOULD NOT use this abbreviation
+ because it could easily be misunderstood in some technical sense.
+
+ 3. (O) /U.S. Government/ In upper case, "CRYPTO" is a marking or
+ designator that identifies "COMSEC keying material used to secure
+ or authenticate telecommunications carrying classified or
+ sensitive U.S. Government or U.S. Government-derived information."
+ [C4009] (See: security label, security marking.)
+
+ $ cryptographic
+ (I) An adjective that refers to cryptography.
+
+ $ cryptographic algorithm
+ (I) An algorithm that uses the science of cryptography, including
+ (a) encryption algorithms, (b) cryptographic hash algorithms, (c)
+ digital signature algorithms, and (d) key-agreement algorithms.
+
+ $ cryptographic application programming interface (CAPI)
+ (I) The source code formats and procedures through which an
+ application program accesses cryptographic services, which are
+ defined abstractly compared to their actual implementation.
+ Example, see: PKCS #11, [R2628].
+
+
+
+
+
+Shirey Informational [Page 88]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ cryptographic association
+ (I) A security association that involves the use of cryptography
+ to provide security services for data exchanged by the associated
+ entities. (See: ISAKMP.)
+
+ $ cryptographic boundary
+ (I) See: secondary definition under "cryptographic module".
+
+ $ cryptographic card
+ (I) A cryptographic token in the form of a smart card or a PC
+ card.
+
+ $ cryptographic component
+ (I) A generic term for any system component that involves
+ cryptography. (See: cryptographic module.)
+
+ $ cryptographic hash
+ (I) See: secondary definition under "hash function".
+
+ $ cryptographic ignition key (CIK)
+ 1. (N) A physical (usually electronic) token used to store,
+ transport, and protect cryptographic keys and activation data.
+ (Compare: dongle, fill device.)
+
+ Tutorial: A key-encrypting key could be divided (see: split key)
+ between a CIK and a cryptographic module, so that it would be
+ necessary to combine the two to regenerate the key, use it to
+ decrypt other keys and data contained in the module, and thus
+ activate the module.
+
+ 2. (O) "Device or electronic key used to unlock the secure mode of
+ cryptographic equipment." [C4009] Usage: Abbreviated as "crypto-
+ ignition key".
+
+ $ cryptographic key
+ (I) See: key. Usage: Usually shortened to just "key".
+
+ $ Cryptographic Message Syntax (CMS)
+ (I) An encapsulation syntax (RFC 3852) for digital signatures,
+ hashes, and encryption of arbitrary messages.
+
+ Tutorial: CMS derives from PKCS #7. CMS values are specified with
+ ASN.1 and use BER encoding. The syntax permits multiple
+ encapsulation with nesting, permits arbitrary attributes to be
+ signed along with message content, and supports a variety of
+ architectures for digital certificate-based key management.
+
+
+
+
+
+Shirey Informational [Page 89]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ cryptographic module
+ (I) A set of hardware, software, firmware, or some combination
+ thereof that implements cryptographic logic or processes,
+ including cryptographic algorithms, and is contained within the
+ module's "cryptographic boundary", which is an explicitly defined
+ contiguous perimeter that establishes the physical bounds of the
+ module. [FP140]
+
+ $ cryptographic system
+ 1. (I) A set of cryptographic algorithms together with the key
+ management processes that support use of the algorithms in some
+ application context.
+
+ Usage: IDOCs SHOULD use definition 1 because it covers a wider
+ range of algorithms than definition 2.
+
+ 2. (O) "A collection of transformations from plain text into
+ cipher text and vice versa [which would exclude digital signature,
+ cryptographic hash, and key-agreement algorithms], the particular
+ transformation(s) to be used being selected by keys. The
+ transformations are normally defined by a mathematical algorithm."
+ [X509]
+
+ $ cryptographic token
+ 1. (I) A portable, user-controlled, physical device (e.g., smart
+ card or PCMCIA card) used to store cryptographic information and
+ possibly also perform cryptographic functions. (See: cryptographic
+ card, token.)
+
+ Tutorial: A smart token might implement some set of cryptographic
+ algorithms and might incorporate related key management functions,
+ such as a random number generator. A smart cryptographic token may
+ contain a cryptographic module or may not be explicitly designed
+ that way.
+
+ $ cryptography
+ 1. (I) The mathematical science that deals with transforming data
+ to render its meaning unintelligible (i.e., to hide its semantic
+ content), prevent its undetected alteration, or prevent its
+ unauthorized use. If the transformation is reversible,
+ cryptography also deals with restoring encrypted data to
+ intelligible form. (See: cryptology, steganography.)
+
+ 2. (O) "The discipline which embodies principles, means, and
+ methods for the transformation of data in order to hide its
+ information content, prevent its undetected modification and/or
+ prevent its unauthorized use.... Cryptography determines the
+ methods used in encipherment and decipherment." [I7498-2]
+
+
+
+Shirey Informational [Page 90]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Comprehensive coverage of applied cryptographic
+ protocols and algorithms is provided by Schneier [Schn].
+ Businesses and governments use cryptography to make data
+ incomprehensible to outsiders; to make data incomprehensible to
+ both outsiders and insiders, the data is sent to lawyers for a
+ rewrite.
+
+ $ Cryptoki
+ (N) A CAPI defined in PKCS #11. Pronunciation: "CRYPTO-key".
+ Derivation: Abbreviation of "cryptographic token interface".
+
+ $ cryptology
+ (I) The science of secret communication, which includes both
+ cryptography and cryptanalysis.
+
+ Tutorial: Sometimes the term is used more broadly to denote
+ activity that includes both rendering signals secure (see: signal
+ security) and extracting information from signals (see: signal
+ intelligence) [Kahn].
+
+ $ cryptonet
+ (I) A network (i.e., a communicating set) of system entities that
+ share a secret cryptographic key for a symmetric algorithm. (See:
+ controlling authority.)
+
+ (O) "Stations holding a common key." [C4009]
+
+ $ cryptoperiod
+ (I) The time span during which a particular key value is
+ authorized to be used in a cryptographic system. (See: key
+ management.)
+
+ Usage: This term is long-established in COMPUSEC usage. In the
+ context of certificates and public keys, "key lifetime" and
+ "validity period" are often used instead.
+
+ Tutorial: A cryptoperiod is usually stated in terms of calendar or
+ clock time, but sometimes is stated in terms of the maximum amount
+ of data permitted to be processed by a cryptographic algorithm
+ using the key. Specifying a cryptoperiod involves a tradeoff
+ between the cost of rekeying and the risk of successful
+ cryptoanalysis.
+
+ $ cryptosystem
+ (I) Contraction of "cryptographic system".
+
+ $ cryptovariable
+ (D) Synonym for "key".
+
+
+
+Shirey Informational [Page 91]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Usage: In contemporary COMSEC usage, the term "key" has
+ replaced the term "cryptovariable".
+
+ $ CSIRT
+ (I) See: computer security incident response team.
+
+ $ CSOR
+ (N) See: Computer Security Objects Register.
+
+ $ CTAK
+ (D) See: ciphertext auto-key.
+
+ $ CTR
+ (N) See: counter mode.
+
+ $ cut-and-paste attack
+ (I) An active attack on the data integrity of cipher text,
+ effected by replacing sections of cipher text with other cipher
+ text, such that the result appears to decrypt correctly but
+ actually decrypts to plain text that is forged to the satisfaction
+ of the attacker.
+
+ $ cyclic redundancy check (CRC)
+ (I) A type of checksum algorithm that is not a cryptographic hash
+ but is used to implement data integrity service where accidental
+ changes to data are expected. Sometimes called "cyclic redundancy
+ code".
+
+ $ DAC
+ (N) See: Data Authentication Code, discretionary access control.
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because this abbreviation is ambiguous.
+
+ $ daemon
+ (I) A computer program that is not invoked explicitly but waits
+ until a specified condition occurs, and then runs with no
+ associated user (principal), usually for an administrative
+ purpose. (See: zombie.)
+
+ $ dangling threat
+ (O) A threat to a system for which there is no corresponding
+ vulnerability and, therefore, no implied risk.
+
+ $ dangling vulnerability
+ (O) A vulnerability of a system for which there is no
+ corresponding threat and, therefore, no implied risk.
+
+
+
+
+Shirey Informational [Page 92]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ DASS
+ (I) See: Distributed Authentication Security Service.
+
+ $ data
+ (I) Information in a specific representation, usually as a
+ sequence of symbols that have meaning.
+
+ Usage: Refers to both (a) representations that can be recognized,
+ processed, or produced by a computer or other type of machine, and
+ (b) representations that can be handled by a human.
+
+ $ Data Authentication Algorithm, data authentication algorithm
+ 1. (N) /capitalized/ The ANSI standard for a keyed hash function
+ that is equivalent to DES cipher block chaining with IV = 0.
+ [A9009]
+
+ 2. (D) /not capitalized/ Synonym for some kind of "checksum".
+
+ Deprecated Term: IDOCs SHOULD NOT use the uncapitalized form "data
+ authentication algorithm" as a synonym for any kind of checksum,
+ regardless of whether or not the checksum is based on a hash.
+ Instead, use "checksum", "Data Authentication Code", "error
+ detection code", "hash", "keyed hash", "Message Authentication
+ Code", "protected checksum", or some other specific term,
+ depending on what is meant.
+
+ The uncapitalized term can be confused with the Data
+ Authentication Code and also mixes concepts in a potentially
+ misleading way. The word "authentication" is misleading because
+ the checksum may be used to perform a data integrity function
+ rather than a data origin authentication function.
+
+ $ Data Authentication Code, data authentication code
+ 1. (N) /capitalized/ A specific U.S. Government standard [FP113]
+ for a checksum that is computed by the Data Authentication
+ Algorithm. Usage: a.k.a. Message Authentication Code [A9009].)
+ (See: DAC.)
+
+ 2. (D) /not capitalized/ Synonym for some kind of "checksum".
+
+ Deprecated Term: IDOCs SHOULD NOT use the uncapitalized form "data
+ authentication code" as a synonym for any kind of checksum,
+ regardless of whether or not the checksum is based on the Data
+ Authentication Algorithm. The uncapitalized term can be confused
+ with the Data Authentication Code and also mixes concepts in a
+ potentially misleading way (see: authentication code).
+
+
+
+
+
+Shirey Informational [Page 93]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ data compromise
+ 1. (I) A security incident in which information is exposed to
+ potential unauthorized access, such that unauthorized disclosure,
+ alteration, or use of the information might have occurred.
+ (Compare: security compromise, security incident.)
+
+ 2. (O) /U.S. DoD/ A "compromise" is a "communication or physical
+ transfer of information to an unauthorized recipient." [DoD5]
+
+ 3. (O) /U.S. Government/ "Type of [security] incident where
+ information is disclosed to unauthorized individuals or a
+ violation of the security policy of a system in which unauthorized
+ intentional or unintentional disclosure, modification,
+ destruction, or loss of an object may have occurred." [C4009]
+
+ $ data confidentiality
+ 1. (I) The property that data is not disclosed to system entities
+ unless they have been authorized to know the data. (See: Bell-
+ LaPadula model, classification, data confidentiality service,
+ secret. Compare: privacy.)
+
+ 2. (D) "The property that information is not made available or
+ disclosed to unauthorized individuals, entities, or processes
+ [i.e., to any unauthorized system entity]." [I7498-2].
+
+ Deprecated Definition: The phrase "made available" might be
+ interpreted to mean that the data could be altered, and that would
+ confuse this term with the concept of "data integrity".
+
+ $ data confidentiality service
+ (I) A security service that protects data against unauthorized
+ disclosure. (See: access control, data confidentiality, datagram
+ confidentiality service, flow control, inference control.)
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term as a synonym for
+ "privacy", which is a different concept.
+
+ $ Data Encryption Algorithm (DEA)
+ (N) A symmetric block cipher, defined in the U.S. Government's
+ DES. DEA uses a 64-bit key, of which 56 bits are independently
+ chosen and 8 are parity bits, and maps a 64-bit block into another
+ 64-bit block. [FP046] (See: AES, symmetric cryptography.)
+
+ Usage: This algorithm is usually referred to as "DES". The
+ algorithm has also been adopted in standards outside the
+ Government (e.g., [A3092]).
+
+
+
+
+
+Shirey Informational [Page 94]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ data encryption key (DEK)
+ (I) A cryptographic key that is used to encipher application data.
+ (Compare: key-encrypting key.)
+
+ $ Data Encryption Standard (DES)
+ (N) A U.S. Government standard [FP046] that specifies the DEA and
+ states policy for using the algorithm to protect unclassified,
+ sensitive data. (See: AES.)
+
+ $ data integrity
+ 1. (I) The property that data has not been changed, destroyed, or
+ lost in an unauthorized or accidental manner. (See: data integrity
+ service. Compare: correctness integrity, source integrity.)
+
+ 2. (O) "The property that information has not been modified or
+ destroyed in an unauthorized manner." [I7498-2]
+
+ Usage: Deals with (a) constancy of and confidence in data values,
+ and not with either (b) information that the values represent
+ (see: correctness integrity) or (c) the trustworthiness of the
+ source of the values (see: source integrity).
+
+ $ data integrity service
+ (I) A security service that protects against unauthorized changes
+ to data, including both intentional change or destruction and
+ accidental change or loss, by ensuring that changes to data are
+ detectable. (See: data integrity, checksum, datagram integrity
+ service.)
+
+ Tutorial: A data integrity service can only detect a change and
+ report it to an appropriate system entity; changes cannot be
+ prevented unless the system is perfect (error-free) and no
+ malicious user has access. However, a system that offers data
+ integrity service might also attempt to correct and recover from
+ changes.
+
+ The ability of this service to detect changes is limited by the
+ technology of the mechanisms used to implement the service. For
+ example, if the mechanism were a one-bit parity check across each
+ entire SDU, then changes to an odd number of bits in an SDU would
+ be detected, but changes to an even number of bits would not.
+
+ Relationship between data integrity service and authentication
+ services: Although data integrity service is defined separately
+ from data origin authentication service and peer entity
+ authentication service, it is closely related to them.
+ Authentication services depend, by definition, on companion data
+ integrity services. Data origin authentication service provides
+
+
+
+Shirey Informational [Page 95]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ verification that the identity of the original source of a
+ received data unit is as claimed; there can be no such
+ verification if the data unit has been altered. Peer entity
+ authentication service provides verification that the identity of
+ a peer entity in a current association is as claimed; there can be
+ no such verification if the claimed identity has been altered.
+
+ $ data origin authentication
+ (I) "The corroboration that the source of data received is as
+ claimed." [I7498-2] (See: authentication.)
+
+ $ data origin authentication service
+ (I) A security service that verifies the identity of a system
+ entity that is claimed to be the original source of received data.
+ (See: authentication, authentication service.)
+
+ Tutorial: This service is provided to any system entity that
+ receives or holds the data. Unlike peer entity authentication
+ service, this service is independent of any association between
+ the originator and the recipient, and the data in question may
+ have originated at any time in the past.
+
+ A digital signature mechanism can be used to provide this service,
+ because someone who does not know the private key cannot forge the
+ correct signature. However, by using the signer's public key,
+ anyone can verify the origin of correctly signed data.
+
+ This service is usually bundled with connectionless data integrity
+ service. (See: "relationship between data integrity service and
+ authentication services" under "data integrity service".
+
+ $ data owner
+ (N) The organization that has the final statutory and operational
+ authority for specified information.
+
+ $ data privacy
+ (D) Synonym for "data confidentiality".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it mixes concepts
+ in a potentially misleading way. Instead, use either "data
+ confidentiality" or "privacy" or both, depending on what is meant.
+
+ $ data recovery
+ 1. (I) /cryptanalysis/ A process for learning, from some cipher
+ text, the plain text that was previously encrypted to produce the
+ cipher text. (See: recovery.)
+
+
+
+
+
+Shirey Informational [Page 96]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (I) /system integrity/ The process of restoring information
+ following damage or destruction.
+
+ $ data security
+ (I) The protection of data from disclosure, alteration,
+ destruction, or loss that either is accidental or is intentional
+ but unauthorized.
+
+ Tutorial: Both data confidentiality service and data integrity
+ service are needed to achieve data security.
+
+ $ datagram
+ (I) "A self-contained, independent entity of data [i.e., a packet]
+ carrying sufficient information to be routed from the source
+ [computer] to the destination computer without reliance on earlier
+ exchanges between this source and destination computer and the
+ transporting network." [R1983] Example: A PDU of IP.
+
+ $ datagram confidentiality service
+ (I) A data confidentiality service that preserves the
+ confidentiality of data in a single, independent, packet; i.e.,
+ the service applies to datagrams one-at-a-time. Example: ESP.
+ (See: data confidentiality.)
+
+ Usage: When a protocol is said to provide data confidentiality
+ service, this is usually understood to mean that only the SDU is
+ protected in each packet. IDOCs that use the term to mean that the
+ entire PDU is protected should include a highlighted definition.
+
+ Tutorial: This basic form of network confidentiality service
+ suffices for protecting the data in a stream of packets in both
+ connectionless and connection-oriented protocols. Except perhaps
+ for traffic flow confidentiality, nothing further is needed to
+ protect the confidentiality of data carried by a packet stream.
+ The OSIRM distinguishes between connection confidentiality and
+ connectionless confidentiality. The IPS need not make that
+ distinction, because those services are just instances of the same
+ service (i.e., datagram confidentiality) being offered in two
+ different protocol contexts. (For data integrity service, however,
+ additional effort is needed to protect a stream, and the IPS does
+ need to distinguish between "datagram integrity service" and
+ "stream integrity service".)
+
+ $ datagram integrity service
+ (I) A data integrity service that preserves the integrity of data
+ in a single, independent, packet; i.e., the service applies to
+ datagrams one-at-a-time. (See: data integrity. Compare: stream
+ integrity service.)
+
+
+
+Shirey Informational [Page 97]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: The ability to provide appropriate data integrity is
+ important in many Internet security situations, and so there are
+ different kinds of data integrity services suited to different
+ applications. This service is the simplest kind; it is suitable
+ for connectionless data transfers.
+
+ Datagram integrity service usually is designed only to attempt to
+ detect changes to the SDU in each packet, but it might also
+ attempt to detect changes to some or all of the PCI in each packet
+ (see: selective field integrity). In contrast to this simple,
+ one-at-a-time service, some security situations demand a more
+ complex service that also attempts to detect deleted, inserted, or
+ reordered datagrams within a stream of datagrams (see: stream
+ integrity service).
+
+ $ DEA
+ (N) See: Data Encryption Algorithm.
+
+ $ deception
+ (I) A circumstance or event that may result in an authorized
+ entity receiving false data and believing it to be true. (See:
+ authentication.)
+
+ Tutorial: This is a type of threat consequence, and it can be
+ caused by the following types of threat actions: masquerade,
+ falsification, and repudiation.
+
+ $ decipher
+ (D) Synonym for "decrypt".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "decrypt". However, see usage note under "encryption".
+
+ $ decipherment
+ (D) Synonym for "decryption".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "decryption". However, see the Usage note under "encryption".
+
+ $ declassification
+ (I) An authorized process by which information is declassified.
+ (Compare: classification.)
+
+ $ declassify
+ (I) To officially remove the security level designation of a
+ classified information item or information type, such that the
+ information is no longer classified (i.e., becomes unclassified).
+ (See: classified, classify, security level. Compare: downgrade.)
+
+
+
+Shirey Informational [Page 98]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ decode
+ 1. (I) Convert encoded data back to its original form of
+ representation. (Compare: decrypt.)
+
+ 2. (D) Synonym for "decrypt".
+
+ Deprecated Definition: Encoding is not usually meant to conceal
+ meaning. Therefore, IDOCs SHOULD NOT use this term as a synonym
+ for "decrypt", because that would mix concepts in a potentially
+ misleading way.
+
+ $ decrypt
+ (I) Cryptographically restore cipher text to the plaintext form it
+ had before encryption.
+
+ $ decryption
+ (I) See: secondary definition under "encryption".
+
+ $ dedicated security mode
+ (I) A mode of system operation wherein all users having access to
+ the system possess, for all data handled by the system, both (a)
+ all necessary authorizations (i.e., security clearance and formal
+ access approval) and (b) a need-to-know. (See: /system operation/
+ under "mode", formal access approval, need to know, protection
+ level, security clearance.)
+
+ Usage: Usually abbreviated as "dedicated mode". This mode was
+ defined in U.S. Government policy on system accreditation, but the
+ term is also used outside the Government. In this mode, the system
+ may handle either (a) a single classification level or category of
+ information or (b) a range of levels and categories.
+
+ $ default account
+ (I) A system login account (usually accessed with a user
+ identifier and password) that has been predefined in a
+ manufactured system to permit initial access when the system is
+ first put into service. (See: harden.)
+
+ Tutorial: A default account becomes a serious vulnerability if not
+ properly administered. Sometimes, the default identifier and
+ password are well-known because they are the same in each copy of
+ the system. In any case, when a system is put into service, any
+ default password should immediately be changed or the default
+ account should be disabled.
+
+ $ defense in depth
+ (N) "The siting of mutually supporting defense positions designed
+ to absorb and progressively weaken attack, prevent initial
+
+
+
+Shirey Informational [Page 99]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ observations of the whole position by the enemy, and [enable] the
+ commander to maneuver the reserve." [JP1]
+
+ Tutorial: In information systems, defense in depth means
+ constructing a system's security architecture with layered and
+ complementary security mechanisms and countermeasures, so that if
+ one security mechanism is defeated, one or more other mechanisms
+ (which are "behind" or "beneath" the first mechanism) still
+ provide protection.
+
+ This architectural concept is appealing because it aligns with
+ traditional warfare doctrine, which applies defense in depth to
+ physical, geospatial structures; but applying the concept to
+ logical, cyberspace structures of computer networks is more
+ difficult. The concept assumes that networks have a spatial or
+ topological representation. It also assumes that there can be
+ implemented -- from the "outer perimeter" of a network, through
+ its various "layers" of components, to its "center" (i.e., to the
+ subscriber application systems supported by the network) -- a
+ varied series of countermeasures that together provide adequate
+ protection. However, it is more difficult to map the topology of
+ networks and make certain that no path exists by which an attacker
+ could bypass all defensive layers.
+
+ $ Defense Information Infrastructure (DII)
+ (O) /U.S. DoD/ The U.S. DoD's shared, interconnected system of
+ computers, communications, data, applications, security, people,
+ training, and support structures, serving information needs
+ worldwide. (See: DISN.) Usage: Has evolved to be called the GIG.
+
+ Tutorial: The DII connects mission support, command and control,
+ and intelligence computers and users through voice, data, imagery,
+ video, and multimedia services, and provides information
+ processing and value-added services to subscribers over the DISN.
+ Users' own data and application software are not considered part
+ of the DII.
+
+ $ Defense Information Systems Network (DISN)
+ (O) /U.S. DoD/ The U.S. DoD's consolidated, worldwide, enterprise
+ level telecommunications infrastructure that provides end-to-end
+ information transfer for supporting military operations; a part of
+ the DII. (Compare: GIG.)
+
+ $ degauss
+ 1a. (N) Apply a magnetic field to permanently remove data from a
+ magnetic storage medium, such as a tape or disk [NCS25]. (Compare:
+ erase, purge, sanitize.)
+
+
+
+
+Shirey Informational [Page 100]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 1b. (N) Reduce magnetic flux density to zero by applying a
+ reversing magnetic field. (See: magnetic remanence.)
+
+ $ degausser
+ (N) An electrical device that can degauss magnetic storage media.
+
+ $ DEK
+ (I) See: data encryption key.
+
+ $ delay
+ (I) /packet/ See: secondary definition under "stream integrity
+ service".
+
+ $ deletion
+ (I) /packet/ See: secondary definition under "stream integrity
+ service".
+
+ $ deliberate exposure
+ (I) /threat action/ See: secondary definition under "exposure".
+
+ $ delta CRL
+ (I) A partial CRL that only contains entries for certificates that
+ have been revoked since the issuance of a prior, base CRL [X509].
+ This method can be used to partition CRLs that become too large
+ and unwieldy. (Compare: CRL distribution point.)
+
+ $ demilitarized zone (DMZ)
+ (D) Synonym for "buffer zone".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term because it mixes
+ concepts in a potentially misleading way. (See: Deprecated Usage
+ under "Green Book".)
+
+ $ denial of service
+ (I) The prevention of authorized access to a system resource or
+ the delaying of system operations and functions. (See:
+ availability, critical, flooding.)
+
+ Tutorial: A denial-of-service attack can prevent the normal
+ conduct of business on the Internet. There are four types of
+ solutions to this security problem:
+ - Awareness: Maintaining cognizance of security threats and
+ vulnerabilities. (See: CERT.)
+ - Detection: Finding attacks on end systems and subnetworks.
+ (See: intrusion detection.)
+ - Prevention: Following defensive practices on network-connected
+ systems. (See: [R2827].)
+
+
+
+
+Shirey Informational [Page 101]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - Response: Reacting effectively when attacks occur. (See: CSIRT,
+ contingency plan.)
+
+ $ DES
+ (N) See: Data Encryption Standard.
+
+ $ designated approving authority (DAA)
+ (O) /U.S. Government/ Synonym for "accreditor".
+
+ $ detection
+ (I) See: secondary definition under "security".
+
+ $ deterrence
+ (I) See: secondary definition under "security".
+
+ $ dictionary attack
+ (I) An attack that uses a brute-force technique of successively
+ trying all the words in some large, exhaustive list.
+
+ Examples: Attack an authentication service by trying all possible
+ passwords. Attack an encryption service by encrypting some known
+ plaintext phrase with all possible keys so that the key for any
+ given encrypted message containing that phrase may be obtained by
+ lookup.
+
+ $ Diffie-Hellman
+ $ Diffie-Hellman-Merkle
+ (N) A key-agreement algorithm published in 1976 by Whitfield
+ Diffie and Martin Hellman [DH76, R2631].
+
+ Usage: The algorithm is most often called "Diffie-Hellman".
+ However, in the November 1978 issue of "IEEE Communications
+ Magazine", Hellman wrote that the algorithm "is a public key
+ distribution system, a concept developed by [Ralph C.] Merkle, and
+ hence should be called 'Diffie-Hellman-Merkle' ... to recognize
+ Merkle's equal contribution to the invention of public key
+ cryptography."
+
+ Tutorial: Diffie-Hellman-Merkle does key establishment, not
+ encryption. However, the key that it produces may be used for
+ encryption, for further key management operations, or for any
+ other cryptography.
+
+ The algorithm is described in [R2631] and [Schn]. In brief, Alice
+ and Bob together pick large integers that satisfy certain
+ mathematical conditions, and then use the integers to each
+ separately compute a public-private key pair. They send each other
+ their public key. Each person uses their own private key and the
+
+
+
+Shirey Informational [Page 102]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ other person's public key to compute a key, k, that, because of
+ the mathematics of the algorithm, is the same for each of them.
+ Passive wiretapping cannot learn the shared k, because k is not
+ transmitted, and neither are the private keys needed to compute k.
+
+ The difficulty of breaking Diffie-Hellman-Merkle is considered to
+ be equal to the difficulty of computing discrete logarithms modulo
+ a large prime. However, without additional mechanisms to
+ authenticate each party to the other, a protocol based on the
+ algorithm may be vulnerable to a man-in-the-middle attack.
+
+ $ digest
+ See: message digest.
+
+ $ digital certificate
+ (I) A certificate document in the form of a digital data object (a
+ data object used by a computer) to which is appended a computed
+ digital signature value that depends on the data object. (See:
+ attribute certificate, public-key certificate.)
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term to refer to a
+ signed CRL or CKL. Although the recommended definition can be
+ interpreted to include other signed items, the security community
+ does not use the term with those meanings.
+
+ $ digital certification
+ (D) Synonym for "certification".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this definition unless
+ the context is not sufficient to distinguish between digital
+ certification and another kind of certification, in which case it
+ would be better to use "public-key certification" or another
+ phrase that indicates what is being certified.
+
+ $ digital document
+ (I) An electronic data object that represents information
+ originally written in a non-electronic, non-magnetic medium
+ (usually ink on paper) or is an analogue of a document of that
+ type.
+
+ $ digital envelope
+ (I) A combination of (a) encrypted content data (of any kind)
+ intended for a recipient and (b) the content encryption key in an
+ encrypted form that has been prepared for the use of the
+ recipient.
+
+
+
+
+
+
+Shirey Informational [Page 103]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: In IDOCs, the term SHOULD be defined at the point of first
+ use because, although the term is defined in PKCS #7 and used in
+ S/MIME, it is not widely known.
+
+ Tutorial: Digital enveloping is not simply a synonym for
+ implementing data confidentiality with encryption; digital
+ enveloping is a hybrid encryption scheme to "seal" a message or
+ other data, by encrypting the data and sending both it and a
+ protected form of the key to the intended recipient, so that no
+ one other than the intended recipient can "open" the message. In
+ PKCS #7, it means first encrypting the data using a symmetric
+ encryption algorithm and a secret key, and then encrypting the
+ secret key using an asymmetric encryption algorithm and the public
+ key of the intended recipient. In S/MIME, additional methods are
+ defined for encrypting the content encryption key.
+
+ $ Digital ID(service mark)
+ (D) Synonym for "digital certificate".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term. It is a service
+ mark of a commercial firm, and it unnecessarily duplicates the
+ meaning of a better-established term. (See: credential.)
+
+ $ digital key
+ (D) Synonym for an input parameter of a cryptographic algorithm or
+ other process. (See: key.)
+
+ Deprecated Usage: The adjective "digital" need not be used with
+ "key" or "cryptographic key", unless the context is insufficient
+ to distinguish the digital key from another kind of key, such as a
+ metal key for a door lock.
+
+ $ digital notary
+ (I) An electronic functionary analogous to a notary public.
+ Provides a trusted timestamp for a digital document, so that
+ someone can later prove that the document existed at that point in
+ time; verifies the signature(s) on a signed document before
+ applying the stamp. (See: notarization.)
+
+ $ digital signature
+ 1. (I) A value computed with a cryptographic algorithm and
+ associated with a data object in such a way that any recipient of
+ the data can use the signature to verify the data's origin and
+ integrity. (See: data origin authentication service, data
+ integrity service, signer. Compare: digitized signature,
+ electronic signature.)
+
+
+
+
+
+Shirey Informational [Page 104]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (O) "Data appended to, or a cryptographic transformation of, a
+ data unit that allows a recipient of the data unit to prove the
+ source and integrity of the data unit and protect against forgery,
+ e.g. by the recipient." [I7498-2]
+
+ Tutorial: A digital signature should have these properties:
+ - Be capable of being verified. (See: validate vs. verify.)
+ - Be bound to the signed data object in such a way that if the
+ data is changed, then when an attempt is made to verify the
+ signature, it will be seen as not authentic. (In some schemes,
+ the signature is appended to the signed object as stated by
+ definition 2, but in other it, schemes is not.)
+ - Uniquely identify a system entity as being the signer.
+ - Be under the signer's sole control, so that it cannot be
+ created by any other entity.
+
+ To achieve these properties, the data object is first input to a
+ hash function, and then the hash result is cryptographically
+ transformed using a private key of the signer. The final resulting
+ value is called the digital signature of the data object. The
+ signature value is a protected checksum, because the properties of
+ a cryptographic hash ensure that if the data object is changed,
+ the digital signature will no longer match it. The digital
+ signature is unforgeable because one cannot be certain of
+ correctly creating or changing the signature without knowing the
+ private key of the supposed signer.
+
+ Some digital signature schemes use an asymmetric encryption
+ algorithm (e.g., "RSA") to transform the hash result. Thus, when
+ Alice needs to sign a message to send to Bob, she can use her
+ private key to encrypt the hash result. Bob receives both the
+ message and the digital signature. Bob can use Alice's public key
+ to decrypt the signature, and then compare the plaintext result to
+ the hash result that he computes by hashing the message himself.
+ If the values are equal, Bob accepts the message because he is
+ certain that it is from Alice and has arrived unchanged. If the
+ values are not equal, Bob rejects the message because either the
+ message or the signature was altered in transit.
+
+ Other digital signature schemes (e.g., "DSS") transform the hash
+ result with an algorithm (e.g., "DSA", "El Gamal") that cannot be
+ directly used to encrypt data. Such a scheme creates a signature
+ value from the hash and provides a way to verify the signature
+ value, but does not provide a way to recover the hash result from
+ the signature value. In some countries, such a scheme may improve
+ exportability and avoid other legal constraints on usage. Alice
+ sends the signature value to Bob along with both the message and
+ its hash result. The algorithm enables Bob to use Alice's public
+
+
+
+Shirey Informational [Page 105]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ signature key and the signature value to verify the hash result he
+ receives. Then, as before, he compares that hash result she sent
+ to the one that he computes by hashing the message himself.
+
+ $ Digital Signature Algorithm (DSA)
+ (N) An asymmetric cryptographic algorithm for a digital signature
+ in the form of a pair of large numbers. The signature is computed
+ using rules and parameters such that the identity of the signer
+ and the integrity of the signed data can be verified. (See: DSS.)
+
+ $ Digital Signature Standard (DSS)
+ (N) The U.S. Government standard [FP186] that specifies the DSA.
+
+ $ digital watermarking
+ (I) Computing techniques for inseparably embedding unobtrusive
+ marks or labels as bits in digital data -- text, graphics, images,
+ video, or audio -- and for detecting or extracting the marks
+ later.
+
+ Tutorial: A "digital watermark", i.e., the set of embedded bits,
+ is sometimes hidden, usually imperceptible, and always intended to
+ be unobtrusive. Depending on the particular technique that is
+ used, digital watermarking can assist in proving ownership,
+ controlling duplication, tracing distribution, ensuring data
+ integrity, and performing other functions to protect intellectual
+ property rights. [ACM]
+
+ $ digitized signature
+ (D) Denotes various forms of digitized images of handwritten
+ signatures. (Compare: digital signature).
+
+ Deprecated Term: IDOCs SHOULD NOT use this term without including
+ this definition. This term suggests careless use of "digital
+ signature", which is the term standardized by [I7498-2]. (See:
+ electronic signature.)
+
+ $ DII
+ (O) See: Defense Information Infrastructure.
+
+ $ direct attack
+ (I) See: secondary definition under "attack". (Compare: indirect
+ attack.)
+
+ $ directory, Directory
+ 1. (I) /not capitalized/ Refers generically to a database server
+ or other system that stores and provides access to values of
+ descriptive or operational data items that are associated with the
+ components of a system. (Compare: repository.)
+
+
+
+Shirey Informational [Page 106]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (N) /capitalized/ Refers specifically to the X.500 Directory.
+ (See: DN, X.500.)
+
+ $ Directory Access Protocol (DAP)
+ (N) An OSI protocol [X519] for communication between a Directory
+ User Agent (a type of X.500 client) and a Directory System Agent
+ (a type of X.500 server). (See: LDAP.)
+
+ $ disaster plan
+ (O) Synonym for "contingency plan".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; instead, for
+ consistency and neutrality of language, IDOCs SHOULD use
+ "contingency plan".
+
+ $ disclosure
+ See: unauthorized disclosure. Compare: exposure.
+
+ $ discretionary access control
+ 1a. (I) An access control service that (a) enforces a security
+ policy based on the identity of system entities and the
+ authorizations associated with the identities and (b) incorporates
+ a concept of ownership in which access rights for a system
+ resource may be granted and revoked by the entity that owns the
+ resource. (See: access control list, DAC, identity-based security
+ policy, mandatory access control.)
+
+ Derivation: This service is termed "discretionary" because an
+ entity can be granted access rights to a resource such that the
+ entity can by its own volition enable other entities to access the
+ resource.
+
+ 1b. (O) /formal model/ "A means of restricting access to objects
+ based on the identity of subjects and/or groups to which they
+ belong. The controls are discretionary in the sense that a subject
+ with a certain access permission is capable of passing that
+ permission (perhaps indirectly) on to any other subject." [DoD1]
+
+ $ DISN
+ (O) See: Defense Information Systems Network (DISN).
+
+ $ disruption
+ (I) A circumstance or event that interrupts or prevents the
+ correct operation of system services and functions. (See:
+ availability, critical, system integrity, threat consequence.)
+
+
+
+
+
+
+Shirey Informational [Page 107]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Disruption is a type of threat consequence; it can be
+ caused by the following types of threat actions: incapacitation,
+ corruption, and obstruction.
+
+ $ Distinguished Encoding Rules (DER)
+ (N) A subset of the Basic Encoding Rules that always provides only
+ one way to encode any data structure defined by ASN.1. [X690].
+
+ Tutorial: For a data structure defined abstractly in ASN.1, BER
+ often provides for encoding the structure into an octet string in
+ more than one way, so that two separate BER implementations can
+ legitimately produce different octet strings for the same ASN.1
+ definition. However, some applications require all encodings of a
+ structure to be the same, so that encodings can be compared for
+ equality. Therefore, DER is used in applications in which unique
+ encoding is needed, such as when a digital signature is computed
+ on a structure defined by ASN.1.
+
+ $ distinguished name (DN)
+ (N) An identifier that uniquely represents an object in the X.500
+ Directory Information Tree (DIT) [X501]. (Compare: domain name,
+ identity, naming authority.)
+
+ Tutorial: A DN is a set of attribute values that identify the path
+ leading from the base of the DIT to the object that is named. An
+ X.509 public-key certificate or CRL contains a DN that identifies
+ its issuer, and an X.509 attribute certificate contains a DN or
+ other form of name that identifies its subject.
+
+ $ distributed attack
+ 1a. (I) An attack that is implemented with distributed computing.
+ (See: zombie.)
+
+ 1b. (I) An attack that deploys multiple threat agents.
+
+ $ Distributed Authentication Security Service (DASS)
+ (I) An experimental Internet protocol [R1507] that uses
+ cryptographic mechanisms to provide strong, mutual authentication
+ services in a distributed environment.
+
+ $ distributed computing
+ (I) A technique that disperses a single, logically related set of
+ tasks among a group of geographically separate yet cooperating
+ computers. (See: distributed attack.)
+
+
+
+
+
+
+
+Shirey Informational [Page 108]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ distribution point
+ (I) An X.500 Directory entry or other information source that is
+ named in a v3 X.509 public-key certificate extension as a location
+ from which to obtain a CRL that may list the certificate.
+
+ Tutorial: A v3 X.509 public-key certificate may have a
+ "cRLDistributionPoints" extension that names places to get CRLs on
+ which the certificate might be listed. (See: certificate profile.)
+ A CRL obtained from a distribution point may (a) cover either all
+ reasons for which a certificate might be revoked or only some of
+ the reasons, (b) be issued by either the authority that signed the
+ certificate or some other authority, and (c) contain revocation
+ entries for only a subset of the full set of certificates issued
+ by one CA or (d) contain revocation entries for multiple CAs.
+
+ $ DKIM
+ (I) See: Domain Keys Identified Mail.
+
+ $ DMZ
+ (D) See: demilitarized zone.
+
+ $ DN
+ (N) See: distinguished name.
+
+ $ DNS
+ (I) See: Domain Name System.
+
+ $ doctrine
+ See: security doctrine.
+
+ $ DoD
+ (N) Department of Defense.
+
+ Usage: To avoid international misunderstanding, IDOCs SHOULD use
+ this abbreviation only with a national qualifier (e.g., U.S. DoD).
+
+ $ DOI
+ (I) See: Domain of Interpretation.
+
+ $ domain
+ 1a. (I) /general security/ An environment or context that (a)
+ includes a set of system resources and a set of system entities
+ that have the right to access the resources and (b) usually is
+ defined by a security policy, security model, or security
+ architecture. (See: CA domain, domain of interpretation, security
+ perimeter. Compare: COI, enclave.)
+
+
+
+
+
+Shirey Informational [Page 109]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: A "controlled interface" or "guard" is required to
+ transfer information between network domains that operate under
+ different security policies.
+
+ 1b. (O) /security policy/ A set of users, their information
+ objects, and a common security policy. [DoD6, SP33]
+
+ 1c. (O) /security policy/ A system or collection of systems that
+ (a) belongs to a community of interest that implements a
+ consistent security policy and (b) is administered by a single
+ authority.
+
+ 2. (O) /COMPUSEC/ An operating state or mode of a set of computer
+ hardware.
+
+ Tutorial: Most computers have at least two hardware operating
+ modes [Gass]:
+ - "Privileged" mode: a.k.a. "executive", "master", "system",
+ "kernel", or "supervisor" mode. In this mode, software can
+ execute all machine instructions and access all storage
+ locations.
+ - "Unprivileged" mode: a.k.a. "user", "application", or "problem"
+ mode. In this mode, software is restricted to a subset of the
+ instructions and a subset of the storage locations.
+
+ 3. (O) "A distinct scope within which certain common
+ characteristics are exhibited and common rules are observed."
+ [CORBA]
+
+ 4. (O) /MISSI/ The domain of a MISSI CA is the set of MISSI users
+ whose certificates are signed by the CA.
+
+ 5. (I) /Internet/ That part of the tree-structured name space of
+ the DNS that is at or below the name that specifies the domain. A
+ domain is a subdomain of another domain if it is contained within
+ that domain. For example, D.C.B.A is a subdomain of C.B.A
+
+ 6. (O) /OSI/ An administrative partition of a complex distributed
+ OSI system.
+
+ $ Domain Keys Identified Mail (DKIM)
+ (I) A protocol, which is being specified by the IETF working group
+ of the same name, to provide data integrity and domain-level (see:
+ DNS, domain name) data origin authentication for Internet mail
+ messages. (Compare: PEM.)
+
+ Tutorial: DKIM employs asymmetric cryptography to create a digital
+ signature for an Internet email message's body and selected
+
+
+
+Shirey Informational [Page 110]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ headers (see RFC 1822), and the signature is then carried in a
+ header of the message. A recipient of the message can verify the
+ signature and, thereby, authenticate the identity of the
+ originating domain and the integrity of the signed content, by
+ using a public key belonging to the domain. The key can be
+ obtained from the DNS.
+
+ $ domain name
+ (I) The style of identifier that is defined for subtrees in the
+ Internet DNS -- i.e., a sequence of case-insensitive ASCII labels
+ separated by dots (e.g., "bbn.com") -- and also is used in other
+ types of Internet identifiers, such as host names (e.g.,
+ "rosslyn.bbn.com"), mailbox names (e.g., "rshirey@bbn.com") and
+ URLs (e.g., "http://www.rosslyn.bbn.com/foo"). (See: domain.
+ Compare: DN.)
+
+ Tutorial: The name space of the DNS is a tree structure in which
+ each node and leaf holds records describing a resource. Each node
+ has a label. The domain name of a node is the list of labels on
+ the path from the node to the root of the tree. The labels in a
+ domain name are printed or read left to right, from the most
+ specific (lowest, farthest from the root) to the least specific
+ (highest, closest to the root), but the root's label is the null
+ string. (See: country code.)
+
+ $ Domain Name System (DNS)
+ (I) The main Internet operations database, which is distributed
+ over a collection of servers and used by client software for
+ purposes such as (a) translating a domain name-style host name
+ into an IP address (e.g., "rosslyn.bbn.com" translates to
+ "192.1.7.10") and (b) locating a host that accepts mail for a
+ given mailbox address. (RFC 1034) (See: domain name.)
+
+ Tutorial: The DNS has three major components:
+ - Domain name space and resource records: Specifications for the
+ tree-structured domain name space, and data associated with the
+ names.
+ - Name servers: Programs that hold information about a subset of
+ the tree's structure and data holdings, and also hold pointers
+ to other name servers that can provide information from any
+ part of the tree.
+ - Resolvers: Programs that extract information from name servers
+ in response to client requests; typically, system routines
+ directly accessible to user programs.
+
+ Extensions to the DNS [R4033, R4034, R4035] support (a) key
+ distribution for public keys needed for the DNS and for other
+ protocols, (b) data origin authentication service and data
+
+
+
+Shirey Informational [Page 111]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ integrity service for resource records, (c) data origin
+ authentication service for transactions between resolvers and
+ servers, and (d) access control of records.
+
+ $ domain of interpretation (DOI)
+ (I) /IPsec/ A DOI for ISAKMP or IKE defines payload formats,
+ exchange types, and conventions for naming security-relevant
+ information such as security policies or cryptographic algorithms
+ and modes. Example: See [R2407].
+
+ Derivation: The DOI concept is based on work by the TSIG's CIPSO
+ Working Group.
+
+ $ dominate
+ (I) Security level A is said to "dominate" security level B if the
+ (hierarchical) classification level of A is greater (higher) than
+ or equal to that of B, and A's (nonhierarchical) categories
+ include (as a subset) all of B's categories. (See: lattice,
+ lattice model.)
+
+ $ dongle
+ (I) A portable, physical, usually electronic device that is
+ required to be attached to a computer to enable a particular
+ software program to run. (See: token.)
+
+ Tutorial: A dongle is essentially a physical key used for copy
+ protection of software; that is, the program will not run unless
+ the matching dongle is attached. When the software runs, it
+ periodically queries the dongle and quits if the dongle does not
+ reply with the proper authentication information. Dongles were
+ originally constructed as an EPROM (erasable programmable read-
+ only memory) to be connected to a serial input-output port of a
+ personal computer.
+
+ $ downgrade
+ (I) /data security/ Reduce the security level of data (especially
+ the classification level) without changing the information content
+ of the data. (Compare: downgrade.)
+
+ $ downgrade attack
+ (I) A type of man-in-the-middle attack in which the attacker can
+ cause two parties, at the time they negotiate a security
+ association, to agree on a lower level of protection than the
+ highest level that could have been supported by both of them.
+ (Compare: downgrade.)
+
+
+
+
+
+
+Shirey Informational [Page 112]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ draft RFC
+ (D) A preliminary, temporary version of a document that is
+ intended to become an RFC. (Compare: Internet-Draft.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term. The RFC series is
+ archival in nature and consists only of documents in permanent
+ form. A document that is intended to become an RFC usually needs
+ to be published first as an Internet-Draft (RFC 2026). (See:
+ "Draft Standard" under "Internet Standard".)
+
+ $ Draft Standard
+ (I) See: secondary definition under "Internet Standard".
+
+ $ DSA
+ (N) See: Digital Signature Algorithm.
+
+ $ DSS
+ (N) See: Digital Signature Standard.
+
+ $ dual control
+ (I) A procedure that uses two or more entities (usually persons)
+ operating in concert to protect a system resource, such that no
+ single entity acting alone can access that resource. (See: no-lone
+ zone, separation of duties, split knowledge.)
+
+ $ dual signature
+ (O) /SET/ A single digital signature that protects two separate
+ messages by including the hash results for both sets in a single
+ encrypted value. [SET2]
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term except when
+ qualified as "SET(trademark) dual signature" with this definition.
+
+ Tutorial: Generated by hashing each message separately,
+ concatenating the two hash results, and then hashing that value
+ and encrypting the result with the signer's private key. Done to
+ reduce the number of encryption operations and to enable
+ verification of data integrity without complete disclosure of the
+ data.
+
+ $ dual-use certificate
+ (O) A certificate that is intended for use with both digital
+ signature and data encryption services. [SP32]
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ by identifying the intended uses of the certificate, because there
+ are more than just these two uses mentioned in the NIST
+ publication. A v3 X.509 public-key certificate may have a "key
+
+
+
+Shirey Informational [Page 113]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage" extension, which indicates the purposes for which the
+ public key may be used. (See: certificate profile.)
+
+ $ duty
+ (I) An attribute of a role that obligates an entity playing the
+ role to perform one or more tasks, which usually are essential for
+ the functioning of the system. [Sand] (Compare authorization,
+ privilege. See: role, billet.)
+
+ $ e-cash
+ (O) Electronic cash; money that is in the form of data and can be
+ used as a payment mechanism on the Internet. (See: IOTP.)
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because many different types of electronic cash have been devised
+ with a variety of security mechanisms.
+
+ $ EAP
+ (I) See: Extensible Authentication Protocol.
+
+ $ EAL
+ (O) See: evaluation assurance level.
+
+ $ Easter egg
+ (O) "Hidden functionality within an application program, which
+ becomes activated when an undocumented, and often convoluted, set
+ of commands and keystrokes is entered. Easter eggs are typically
+ used to display the credits for the development team and [are]
+ intended to be non-threatening" [SP28], but Easter eggs have the
+ potential to contain malicious code.
+
+ Deprecated Usage: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ eavesdropping
+ (I) Passive wiretapping done secretly, i.e., without the knowledge
+ of the originator or the intended recipients of the communication.
+
+ $ ECB
+ (N) See: electronic codebook.
+
+ $ ECDSA
+ (N) See: Elliptic Curve Digital Signature Algorithm.
+
+
+
+
+
+
+Shirey Informational [Page 114]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ economy of alternatives
+ (I) The principle that a security mechanism should be designed to
+ minimize the number of alternative ways of achieving a service.
+ (Compare: economy of mechanism.)
+
+ $ economy of mechanism
+ (I) The principle that a security mechanism should be designed to
+ be as simple as possible, so that (a) the mechanism can be
+ correctly implemented and (b) it can be verified that the
+ operation of the mechanism enforces the system's security policy.
+ (Compare: economy of alternatives, least privilege.)
+
+ $ ECU
+ (N) See: end cryptographic unit.
+
+ $ EDI
+ (I) See: electronic data interchange.
+
+ $ EDIFACT
+ (N) See: secondary definition under "electronic data interchange".
+
+ $ EE
+ (D) Abbreviation of "end entity" and other terms.
+
+ Deprecated Abbreviation: IDOCs SHOULD NOT use this abbreviation;
+ there could be confusion among "end entity", "end-to-end
+ encryption", "escrowed encryption standard", and other terms.
+
+ $ EES
+ (O) See: Escrowed Encryption Standard.
+
+ $ effective key length
+ (O) "A measure of strength of a cryptographic algorithm,
+ regardless of actual key length." [IATF] (See: work factor.)
+
+ $ effectiveness
+ (O) /ITSEC/ A property of a TOE representing how well it provides
+ security in the context of its actual or proposed operational use.
+
+ $ El Gamal algorithm
+ (N) An algorithm for asymmetric cryptography, invented in 1985 by
+ Taher El Gamal, that is based on the difficulty of calculating
+ discrete logarithms and can be used for both encryption and
+ digital signatures. [ElGa]
+
+
+
+
+
+
+
+Shirey Informational [Page 115]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ electronic codebook (ECB)
+ (N) A block cipher mode in which a plaintext block is used
+ directly as input to the encryption algorithm and the resultant
+ output block is used directly as cipher text [FP081]. (See: block
+ cipher, [SP38A].)
+
+ $ electronic commerce
+ 1. (I) Business conducted through paperless exchanges of
+ information, using electronic data interchange, electronic funds
+ transfer (EFT), electronic mail, computer bulletin boards,
+ facsimile, and other paperless technologies.
+
+ 2. (O) /SET/ "The exchange of goods and services for payment
+ between the cardholder and merchant when some or all of the
+ transaction is performed via electronic communication." [SET2]
+
+ $ electronic data interchange (EDI)
+ (I) Computer-to-computer exchange, between trading partners, of
+ business data in standardized document formats.
+
+ Tutorial: EDI formats have been standardized primarily by ANSI X12
+ and by EDIFACT (EDI for Administration, Commerce, and
+ Transportation), which is an international, UN-sponsored standard
+ primarily used in Europe and Asia. X12 and EDIFACT are aligning to
+ create a single, global EDI standard.
+
+ $ Electronic Key Management System (EKMS)
+ (O) "Interoperable collection of systems developed by ... the U.S.
+ Government to automate the planning, ordering, generating,
+ distributing, storing, filling, using, and destroying of
+ electronic keying material and the management of other types of
+ COMSEC material." [C4009]
+
+ $ electronic signature
+ (D) Synonym for "digital signature" or "digitized signature".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; there is no
+ current consensus on its definition. Instead, use "digital
+ signature", if that is what was intended
+
+ $ electronic wallet
+ (D) A secure container to hold, in digitized form, some sensitive
+ data objects that belong to the owner, such as electronic money,
+ authentication material, and various types of personal
+ information. (See: IOTP.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term. There is no
+ current consensus on its definition; and some uses and definitions
+
+
+
+Shirey Informational [Page 116]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ may be proprietary. Meanings range from virtual wallets
+ implemented by data structures to physical wallets implemented by
+ cryptographic tokens. (See: Deprecated Usage under "Green Book".)
+
+ $ elliptic curve cryptography (ECC)
+ (I) A type of asymmetric cryptography based on mathematics of
+ groups that are defined by the points on a curve, where the curve
+ is defined by a quadratic equation in a finite field. [Schn]
+
+ Tutorial: ECC is based on mathematics different than that
+ originally used to define the Diffie-Hellman-Merkle algorithm and
+ the DSA, but ECC can be used to define an algorithm for key
+ agreement that is an analog of Diffie-Hellman-Merkle [A9063] and
+ an algorithm for digital signature that is an analog of DSA
+ [A9062]. The mathematical problem upon which ECC is based is
+ believed to be more difficult than the problem upon which Diffie-
+ Hellman-Merkle is based and, therefore, that keys for ECC can be
+ shorter for a comparable level of security. (See: ECDSA.)
+
+ $ Elliptic Curve Digital Signature Algorithm (ECDSA)
+ (N) A standard [A9062] that is the analog, in elliptic curve
+ cryptography, of the Digital Signature Algorithm.
+
+ $ emanation
+ (I) A signal (e.g., electromagnetic or acoustic) that is emitted
+ by a system (e.g., through radiation or conductance) as a
+ consequence (i.e., byproduct) of the system's operation, and that
+ may contain information. (See: emanations security.)
+
+ $ emanations analysis
+ (I) /threat action/ See: secondary definition under
+ "interception".
+
+ $ emanations security (EMSEC)
+ (I) Physical security measures to protect against data compromise
+ that could occur because of emanations that might be received and
+ read by an unauthorized party. (See: emanation, TEMPEST.)
+
+ Usage: Refers either to preventing or limiting emanations from a
+ system and to preventing or limiting the ability of unauthorized
+ parties to receive the emissions.
+
+ $ embedded cryptography
+ (N) "Cryptography engineered into an equipment or system whose
+ basic function is not cryptographic." [C4009]
+
+ $ emergency plan
+ (D) Synonym for "contingency plan".
+
+
+
+Shirey Informational [Page 117]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: IDOCs SHOULD NOT use this term. Instead, for
+ neutrality and consistency of language, use "contingency plan".
+
+ $ emergency response
+ (O) An urgent response to a fire, flood, civil commotion, natural
+ disaster, bomb threat, or other serious situation, with the intent
+ of protecting lives, limiting damage to property, and minimizing
+ disruption of system operations. [FP087] (See: availability, CERT,
+ emergency plan.)
+
+ $ EMSEC
+ (I) See: emanations security.
+
+ $ EMV
+ (N) Abbreviation of "Europay, MasterCard, Visa". Refers to a
+ specification for smart cards that are used as payment cards, and
+ for related terminals and applications. [EMV1, EMV2, EMV3]
+
+ $ Encapsulating Security Payload (ESP)
+ (I) An Internet protocol [R2406, R4303] designed to provide data
+ confidentiality service and other security services for IP
+ datagrams. (See: IPsec. Compare: AH.)
+
+ Tutorial: ESP may be used alone, or in combination with AH, or in
+ a nested fashion with tunneling. Security services can be provided
+ between a pair of communicating hosts, between a pair of
+ communicating security gateways, or between a host and a gateway.
+ The ESP header is encapsulated by the IP header, and the ESP
+ header encapsulates either the upper-layer protocol header
+ (transport mode) or an IP header (tunnel mode). ESP can provide
+ data confidentiality service, data origin authentication service,
+ connectionless data integrity service, an anti-replay service, and
+ limited traffic-flow confidentiality. The set of services depends
+ on the placement of the implementation and on options selected
+ when the security association is established.
+
+ $ encipher
+ (D) Synonym for "encrypt".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "encrypt". However, see Usage note under "encryption".
+
+ $ encipherment
+ (D) Synonym for "encryption".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "encryption". However, see Usage note under "encryption".
+
+
+
+
+Shirey Informational [Page 118]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ enclave
+ 1. (I) A set of system resources that operate in the same security
+ domain and that share the protection of a single, common,
+ continuous security perimeter. (Compare: domain.)
+
+ 2. (D) /U.S. Government/ "Collection of computing environments
+ connected by one or more internal networks under the control of a
+ single authority and security policy, including personnel and
+ physical security." [C4009]
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 2 because the definition applies to what is usually
+ called a "security domain". That is, a security domain is a set of
+ one or more security enclaves.
+
+ $ encode
+ 1. (I) Use a system of symbols to represent information, which
+ might originally have some other representation. Example: Morse
+ code. (See: ASCII, BER.) (See: code, decode.)
+
+ 2. (D) Synonym for "encrypt".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "encrypt"; encoding is not always meant to conceal meaning.
+
+ $ encrypt
+ (I) Cryptographically transform data to produce cipher text. (See:
+ encryption. Compare: seal.)
+
+ $ encryption
+ 1. (I) Cryptographic transformation of data (called "plain text")
+ into a different form (called "cipher text") that conceals the
+ data's original meaning and prevents the original form from being
+ used. The corresponding reverse process is "decryption", a
+ transformation that restores encrypted data to its original form.
+ (See: cryptography.)
+
+ 2. (O) "The cryptographic transformation of data to produce
+ ciphertext." [I7498-2]
+
+ Usage: For this concept, IDOCs SHOULD use the verb "to encrypt"
+ (and related variations: encryption, decrypt, and decryption).
+ However, because of cultural biases involving human burial, some
+ international documents (particularly ISO and CCITT standards)
+ avoid "to encrypt" and instead use the verb "to encipher" (and
+ related variations: encipherment, decipher, decipherment).
+
+
+
+
+
+Shirey Informational [Page 119]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Usually, the plaintext input to an encryption operation
+ is clear text. But in some cases, the plain text may be cipher
+ text that was output from another encryption operation. (See:
+ superencryption.)
+
+ Encryption and decryption involve a mathematical algorithm for
+ transforming data. Besides the data to be transformed, the
+ algorithm has one or more inputs that are control parameters: (a)
+ a key that varies the transformation and, in some cases, (b) an IV
+ that establishes the starting state of the algorithm.
+
+ $ encryption certificate
+ (I) A public-key certificate that contains a public key that is
+ intended to be used for encrypting data, rather than for verifying
+ digital signatures or performing other cryptographic functions.
+
+ Tutorial: A v3 X.509 public-key certificate may have a "keyUsage"
+ extension that indicates the purpose for which the certified
+ public key is intended. (See: certificate profile.)
+
+ $ end cryptographic unit (ECU)
+ 1. (N) Final destination device into which a key is loaded for
+ operational use.
+
+ 2. (N) A device that (a) performs cryptographic functions, (b)
+ typically is part of a larger system for which the device provides
+ security services, and (c), from the viewpoint of a supporting
+ security infrastructure such as a key management system, is the
+ lowest level of identifiable component with which a management
+ transaction can be conducted
+
+ $ end entity
+ 1. (I) A system entity that is the subject of a public-key
+ certificate and that is using, or is permitted and able to use,
+ the matching private key only for purposes other than signing a
+ digital certificate; i.e., an entity that is not a CA.
+
+ 2. (O) "A certificate subject [that] uses its public [sic] key for
+ purposes other than signing certificates." [X509]
+
+ Deprecated Definition: IDOCs SHOULD NOT use definition 2, which is
+ misleading and incomplete. First, that definition should have said
+ "private key" rather than "public key" because certificates are
+ not usefully signed with a public key. Second, the X.509
+ definition is ambiguous regarding whether an end entity may or may
+ not use the private key to sign a certificate, i.e., whether the
+ subject may be a CA. The intent of X.509's authors was that an end
+ entity certificate is not valid for use in verifying a signature
+
+
+
+Shirey Informational [Page 120]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ on an X.509 certificate or X.509 CRL. Thus, it would have been
+ better for the X.509 definition to have said "only for purposes
+ other than signing certificates".
+
+ Usage: Despite the problems in the X.509 definition, the term
+ itself is useful in describing applications of asymmetric
+ cryptography. The way the term is used in X.509 implies that it
+ was meant to be defined, as we have done here, relative to roles
+ that an entity (which is associated with an OSI end system) is
+ playing or is permitted to play in applications of asymmetric
+ cryptography other than the PKI that supports applications.
+
+ Tutorial: Whether a subject can play both CA and non-CA roles,
+ with either the same or different certificates, is a matter of
+ policy. (See: CPS.) A v3 X.509 public-key certificate may have a
+ "basicConstraints" extension containing a "cA" value that
+ specifically "indicates whether or not the public key may be used
+ to verify certificate signatures". (See: certificate profile.)
+
+ $ end system
+ (N) /OSIRM/ A computer that implements all seven layers of the
+ OSIRM and may attach to a subnetwork. Usage: In the IPS context,
+ an end system is called a "host".
+
+ $ end-to-end encryption
+ (I) Continuous protection of data that flows between two points in
+ a network, effected by encrypting data when it leaves its source,
+ keeping it encrypted while it passes through any intermediate
+ computers (such as routers), and decrypting it only when it
+ arrives at the intended final destination. (See: wiretapping.
+ Compare: link encryption.)
+
+ Examples: A few are BLACKER, CANEWARE, IPLI, IPsec, PLI, SDNS,
+ SILS, SSH, SSL, TLS.
+
+ Tutorial: When two points are separated by multiple communication
+ links that are connected by one or more intermediate relays, end-
+ to-end encryption enables the source and destination systems to
+ protect their communications without depending on the intermediate
+ systems to provide the protection.
+
+ $ end user
+ 1. (I) /information system/ A system entity, usually a human
+ individual, that makes use of system resources, primarily for
+ application purposes as opposed to system management purposes.
+
+ 2. (D) /PKI/ Synonym for "end entity".
+
+
+
+
+Shirey Informational [Page 121]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Definition: IDOCs SHOULD NOT use "end user" as a
+ synonym for "end entity", because that would mix concepts in a
+ potentially misleading way.
+
+ $ endorsed-for-unclassified cryptographic item (EUCI)
+ (O) /U.S. Government/ "Unclassified cryptographic equipment that
+ embodies a U.S. Government classified cryptographic logic and is
+ endorsed by NSA for the protection of national security
+ information." [C4009] (Compare: CCI, type 2 product.)
+
+ $ entity
+ See: system entity.
+
+ $ entrapment
+ (I) "The deliberate planting of apparent flaws in a system for the
+ purpose of detecting attempted penetrations or confusing an
+ intruder about which flaws to exploit." [FP039] (See: honey pot.)
+
+ $ entropy
+ 1. (I) An information-theoretic measure (usually stated as a
+ number of bits) of the amount of uncertainty that an attacker
+ faces to determine the value of a secret. [SP63] (See: strength.)
+
+ Example: If a password is said to contain at least 20 bits of
+ entropy, that means that it must be as hard to find the password
+ as to guess a 20-bit random number.
+
+ 2. (I) An information-theoretic measure (usually stated as a
+ number of bits) of the amount of information in a message; i.e.,
+ the minimum number of bits needed to encode all possible meanings
+ of that message. [Schn] (See: uncertainty.)
+
+ $ ephemeral
+ (I) /adjective/ Refers to a cryptographic key or other
+ cryptographic parameter or data object that is short-lived,
+ temporary, or used one time. (See: session key. Compare: static.)
+
+ $ erase
+ 1. (I) Delete stored data. (See: sanitize, zeroize.)
+
+ 2. (O) /U.S. Government/ Delete magnetically stored data in such a
+ way that the data cannot be recovered by ordinary means, but might
+ be recoverable by laboratory methods. [C4009] (Compare: /U.S.
+ Government/ purge.)
+
+ $ error detection code
+ (I) A checksum designed to detect, but not correct, accidental
+ (i.e., unintentional) changes in data.
+
+
+
+Shirey Informational [Page 122]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Escrowed Encryption Standard (EES)
+ (N) A U.S. Government standard [FP185] that specifies how to use a
+ symmetric encryption algorithm (SKIPJACK) and create a Law
+ Enforcement Access Field (LEAF) for implementing part of a key
+ escrow system that enables decryption of telecommunications when
+ interception is lawfully authorized.
+
+ Tutorial: Both SKIPJACK and the LEAF are intended for use in
+ equipment used to encrypt and decrypt sensitive, unclassified,
+ telecommunications data.
+
+ $ ESP
+ (I) See: Encapsulating Security Payload.
+
+ $ Estelle
+ (N) A language (ISO 9074-1989) for formal specification of
+ computer network protocols.
+
+ $ ETSI
+ (N) See: European Telecommunication Standards Institute.
+
+ $ EUCI
+ (O) See: endorsed-for-unclassified cryptographic item.
+
+ $ European Telecommunication Standards Institute (ETSI)
+ (N) An independent, non-profit organization, based in France, that
+ is officially recognized by the European Commission and
+ responsible for standardization of information and communication
+ technologies within Europe.
+
+ Tutorial: ETSI maintains the standards for a number of security
+ algorithms, including encryption algorithms for mobile telephone
+ systems in Europe.
+
+ $ evaluated system
+ (I) A system that has been evaluated against security criteria
+ (for example, against the TCSEC or against a profile based on the
+ Common Criteria).
+
+ $ evaluation
+ (I) Assessment of an information system against defined security
+ criteria (for example, against the TCSEC or against a profile
+ based on the Common Criteria). (Compare: certification.)
+
+ $ evaluation assurance level (EAL)
+ (N) A predefined package of assurance components that represents a
+ point on the Common Criteria's scale for rating confidence in the
+ security of information technology products and systems.
+
+
+
+Shirey Informational [Page 123]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: The Common Criteria defines a scale of seven,
+ hierarchically ordered EALs for rating a TOE. From highest to
+ lowest, they are as follows:
+ - EAL7. Formally verified design and tested.
+ - EAL6. Semiformally verified design and tested.
+ - EAL5. Semiformally designed and tested.
+ - EAL4. Methodically designed, tested, and reviewed.
+ - EAL3. Methodically tested and checked.
+ - EAL2. Structurally tested.
+ - EAL1. Functionally tested.
+
+ An EAL is a consistent, baseline set of requirements. The increase
+ in assurance from EAL to EAL is accomplished by substituting
+ higher assurance components (i.e., criteria of increasing rigor,
+ scope, or depth) from seven assurance classes: (a) configuration
+ management, (b) delivery and operation, (c) development, (d)
+ guidance documents, (e) lifecycle support, (f) tests, and (g)
+ vulnerability assessment.
+
+ The EALs were developed with the goal of preserving concepts of
+ assurance that were adopted from earlier criteria, so that results
+ of previous evaluations would remain relevant. For example, EALs
+ levels 2-7 are generally equivalent to the assurance portions of
+ the TCSEC C2-A1 scale. However, this equivalency should be used
+ with caution. The levels do not derive assurance in the same
+ manner, and exact mappings do not exist.
+
+ $ expire
+ (I) /credential/ Cease to be valid (i.e., change from being valid
+ to being invalid) because its assigned lifetime has been exceeded.
+ (See: certificate expiration.)
+
+ $ exposure
+ (I) A type of threat action whereby sensitive data is directly
+ released to an unauthorized entity. (See: unauthorized
+ disclosure.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Deliberate Exposure": Intentional release of sensitive data to
+ an unauthorized entity.
+ - "Scavenging": Searching through data residue in a system to
+ gain unauthorized knowledge of sensitive data.
+ - "Human error": /exposure/ Human action or inaction that
+ unintentionally results in an entity gaining unauthorized
+ knowledge of sensitive data. (Compare: corruption,
+ incapacitation.)
+ - "Hardware or software error": /exposure/ System failure that
+ unintentionally results in an entity gaining unauthorized
+
+
+
+Shirey Informational [Page 124]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ knowledge of sensitive data. (Compare: corruption,
+ incapacitation.)
+
+ $ Extended Security Option
+ (I) See: secondary definition under "IPSO".
+
+ $ Extensible Authentication Protocol (EAP)
+ (I) An extension framework for PPP that supports multiple,
+ optional authentication mechanisms, including cleartext passwords,
+ challenge-response, and arbitrary dialog sequences. [R3748]
+ (Compare: GSS-API, SASL.)
+
+ Tutorial: EAP typically runs directly over IPS data link protocols
+ or OSIRM Layer 2 protocols, i.e., without requiring IP.
+ Originally, EAP was developed for use in PPP, by a host or router
+ that connects to a network server via switched circuits or dial-up
+ lines. Today, EAP's domain of applicability includes other areas
+ of network access control; it is used in wired and wireless LANs
+ with IEEE 802.1X, and in IPsec with IKEv2. EAP is conceptually
+ related to other authentication mechanism frameworks, such as SASL
+ and GSS-API.
+
+ $ Extensible Markup Language (XML)
+ (N) A version of Standard Generalized Markup Language (ISO 8879)
+ that separately represents a document's content and its structure.
+ XML was designed by W3C for use on the World Wide Web.
+
+ $ extension
+ (I) /protocol/ A data item or a mechanism that is defined in a
+ protocol to extend the protocol's basic or original functionality.
+
+ Tutorial: Many protocols have extension mechanisms, and the use of
+ these extension is usually optional. IP and X.509 are two examples
+ of protocols that have optional extensions. In IP version 4,
+ extensions are called "options", and some of the options have
+ security purposes (see: IPSO).
+
+ In X.509, certificate and CRL formats can be extended to provide
+ methods for associating additional attributes with subjects and
+ public keys and for managing a certification hierarchy:
+ - A "certificate extension": X.509 defines standard extensions
+ that may be included in v3 certificates to provide additional
+ key and security policy information, subject and issuer
+ attributes, and certification path constraints.
+ - A "CRL extension": X.509 defines extensions that may be
+ included in v2 CRLs to provide additional issuer key and name
+ information, revocation reasons and constraints, and
+ information about distribution points and delta CRLs.
+
+
+
+Shirey Informational [Page 125]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - A "private extension": Additional extensions, each named by an
+ OID, can be locally defined as needed by applications or
+ communities. (See: Authority Information Access extension, SET
+ private extensions.)
+
+ $ external controls
+ (I) /COMPUSEC/ Refers to administrative security, personnel
+ security, and physical security. (Compare: internal controls.)
+
+ $ extranet
+ (I) A computer network that an organization uses for application
+ data traffic between the organization and its business partners.
+ (Compare: intranet.)
+
+ Tutorial: An extranet can be implemented securely, either on the
+ Internet or using Internet technology, by constructing the
+ extranet as a VPN.
+
+ $ extraction resistance
+ (O) Ability of cryptographic equipment to resist efforts to
+ extract keying material directly from the equipment (as opposed to
+ gaining knowledge of keying material by cryptanalysis). [C4009]
+
+ $ extrusion detection
+ (I) Monitoring for unauthorized transfers of sensitive information
+ and other communications that originate inside a system's security
+ perimeter and are directed toward the outside; i.e., roughly the
+ opposite of "intrusion detection".
+
+ $ fail-safe
+ 1. (I) Synonym for "fail-secure".
+
+ 2. (I) A mode of termination of system functions that prevents
+ damage to specified system resources and system entities (i.e.,
+ specified data, property, and life) when a failure occurs or is
+ detected in the system (but the failure still might cause a
+ security compromise). (See: failure control.)
+
+ Tutorial: Definitions 1 and 2 are opposing design alternatives.
+ Therefore, IDOCs SHOULD NOT use this term without providing a
+ definition for it. If definition 1 is intended, IDOCs can avoid
+ ambiguity by using "fail-secure" instead.
+
+ $ fail-secure
+ (I) A mode of termination of system functions that prevents loss
+ of secure state when a failure occurs or is detected in the system
+ (but the failure still might cause damage to some system resource
+ or system entity). (See: failure control. Compare: fail-safe.)
+
+
+
+Shirey Informational [Page 126]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ fail-soft
+ (I) Selective termination of affected, non-essential system
+ functions when a failure occurs or is detected in the system.
+ (See: failure control.)
+
+ $ failure control
+ (I) A methodology used to provide fail-safe, fail-secure or fail-
+ soft termination and recovery of system functions. [FP039]
+
+ $ fairness
+ (I) A property of an access protocol for a system resource whereby
+ the resource is made equitably or impartially available to all
+ eligible users. (RFC 3753)
+
+ Tutorial: Fairness can be used to defend against some types of
+ denial-of-service attacks on a system connected to a network.
+ However, this technique assumes that the system can properly
+ receive and process inputs from the network. Therefore, the
+ technique can mitigate flooding but is ineffective against
+ jamming.
+
+ $ falsification
+ (I) A type of threat action whereby false data deceives an
+ authorized entity. (See: active wiretapping, deception.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Substitution": Altering or replacing valid data with false
+ data that serves to deceive an authorized entity.
+ - "Insertion": Introducing false data that serves to deceive an
+ authorized entity.
+
+ $ fault tree
+ (I) A branching, hierarchical data structure that is used to
+ represent events and to determine the various combinations of
+ component failures and human acts that could result in a specified
+ undesirable system event. (See: attack tree, flaw hypothesis
+ methodology.)
+
+ Tutorial: "Fault-tree analysis" is a technique in which an
+ undesired state of a system is specified and the system is studied
+ in the context of its environment and operation to find all
+ credible ways in which the event could occur. The specified fault
+ event is represented as the root of the tree. The remainder of the
+ tree represents AND or OR combinations of subevents, and
+ sequential combinations of subevents, that could cause the root
+ event to occur. The main purpose of a fault-tree analysis is to
+ calculate the probability of the root event, using statistics or
+ other analytical methods and incorporating actual or predicted
+
+
+
+Shirey Informational [Page 127]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ quantitative reliability and maintainability data. When the root
+ event is a security violation, and some of the subevents are
+ deliberate acts intended to achieve the root event, then the fault
+ tree is an attack tree.
+
+ $ FEAL
+ (O) A family of symmetric block ciphers that was developed in
+ Japan; uses a 64-bit block, keys of either 64 or 128 bits, and a
+ variable number of rounds; and has been successfully attacked by
+ cryptanalysts. [Schn]
+
+ $ Federal Information Processing Standards (FIPS)
+ (N) The Federal Information Processing Standards Publication (FIPS
+ PUB) series issued by NIST under the provisions of Section 111(d)
+ of the Federal Property and Administrative Services Act of 1949 as
+ amended by the Computer Security Act of 1987 (Public Law 100-235)
+ as technical guidelines for U.S. Government procurements of
+ information processing system equipment and services. (See:
+ "[FPxxx]" items in Section 7, Informative References.)
+
+ $ Federal Public-key Infrastructure (FPKI)
+ (O) A PKI being planned to establish facilities, specifications,
+ and policies needed by the U.S. Government to use public-key
+ certificates in systems involving unclassified but sensitive
+ applications and interactions between Federal agencies as well as
+ with entities of state and local governments, the business
+ community, and the public. [FPKI]
+
+ $ Federal Standard 1027
+ (N) An U.S. Government document defining emanation, anti-tamper,
+ security fault analysis, and manual key management criteria for
+ DES encryption devices, primary for OSIRM Layer 2. Was renamed
+ "FIPS PUB 140" when responsibility for protecting unclassified,
+ sensitive information was transferred from NSA to NIST, and has
+ since been superseded by newer versions of that standard [FP140].
+
+ $ File Transfer Protocol (FTP)
+ (I) A TCP-based, Application-Layer, Internet Standard protocol
+ (RFC 959) for moving data files from one computer to another.
+
+ $ fill device
+ (N) /COMSEC/ A device used to transfer or store keying material in
+ electronic form or to insert keying material into cryptographic
+ equipment.
+
+ $ filter
+ 1. (I) /noun/ Synonym for "guard". (Compare: content filter,
+ filtering router.)
+
+
+
+Shirey Informational [Page 128]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (I) /verb/ To process a flow of data and selectively block
+ passage or permit passage of individual data items according to a
+ security policy.
+
+ $ filtering router
+ (I) An internetwork router that selectively prevents the passage
+ of data packets according to a security policy. (See: guard.)
+
+ Tutorial: A router usually has two or more physical connections to
+ networks or other systems; and when the router receives a packet
+ on one of those connections, it forwards the packet on a second
+ connection. A filtering router does the same; but it first
+ decides, according to some security policy, whether the packet
+ should be forwarded at all. The policy is implemented by rules
+ (packet filters) loaded into the router. The rules mostly involve
+ values of data packet control fields (especially IP source and
+ destination addresses and TCP port numbers) [R2179]. A filtering
+ router may be used alone as a simple firewall or be used as a
+ component of a more complex firewall.
+
+ $ financial institution
+ (N) "An establishment responsible for facilitating customer-
+ initiated transactions or transmission of funds for the extension
+ of credit or the custody, loan, exchange, or issuance of money."
+ [SET2]
+
+ $ fingerprint
+ 1. (I) A pattern of curves formed by the ridges on a fingertip.
+ (See: biometric authentication. Compare: thumbprint.)
+
+ 2. (D) /PGP/ A hash result ("key fingerprint") used to
+ authenticate a public key or other data. [PGP]
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 2, and SHOULD NOT use this term as a synonym for "hash
+ result" of *any* kind. Either use would mix concepts in a
+ potentially misleading way.
+
+ $ FIPS
+ (N) See: Federal Information Processing Standards.
+
+ $ FIPS PUB 140
+ (N) The U.S. Government standard [FP140] for security requirements
+ to be met by a cryptographic module when the module is used to
+ protect unclassified information in computer and communication
+ systems. (See: Common Criteria, FIPS, Federal Standard 1027.)
+
+
+
+
+
+Shirey Informational [Page 129]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: The standard specifies four increasing levels (from
+ "Level 1" to "Level 4") of requirements to cover a wide range of
+ potential applications and environments. The requirements address
+ basic design and documentation, module interfaces, authorized
+ roles and services, physical security, software security,
+ operating system security, key management, cryptographic
+ algorithms, electromagnetic interference and electromagnetic
+ compatibility (EMI/EMC), and self-testing. NIST and the Canadian
+ Communication Security Establishment jointly certify modules.
+
+ $ FIREFLY
+ (O) /U.S. Government/ "Key management protocol based on public-key
+ cryptography." [C4009]
+
+ $ firewall
+ 1. (I) An internetwork gateway that restricts data communication
+ traffic to and from one of the connected networks (the one said to
+ be "inside" the firewall) and thus protects that network's system
+ resources against threats from the other network (the one that is
+ said to be "outside" the firewall). (See: guard, security
+ gateway.)
+
+ 2. (O) A device or system that controls the flow of traffic
+ between networks using differing security postures. [SP41]
+
+ Tutorial: A firewall typically protects a smaller, secure network
+ (such as a corporate LAN, or even just one host) from a larger
+ network (such as the Internet). The firewall is installed at the
+ point where the networks connect, and the firewall applies policy
+ rules to control traffic that flows in and out of the protected
+ network.
+
+ A firewall is not always a single computer. For example, a
+ firewall may consist of a pair of filtering routers and one or
+ more proxy servers running on one or more bastion hosts, all
+ connected to a small, dedicated LAN (see: buffer zone) between the
+ two routers. The external router blocks attacks that use IP to
+ break security (IP address spoofing, source routing, packet
+ fragments), while proxy servers block attacks that would exploit a
+ vulnerability in a higher-layer protocol or service. The internal
+ router blocks traffic from leaving the protected network except
+ through the proxy servers. The difficult part is defining criteria
+ by which packets are denied passage through the firewall, because
+ a firewall not only needs to keep unauthorized traffic (i.e.,
+ intruders) out, but usually also needs to let authorized traffic
+ pass both in and out.
+
+
+
+
+
+Shirey Informational [Page 130]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ firmware
+ (I) Computer programs and data stored in hardware -- typically in
+ read-only memory (ROM) or programmable read-only memory (PROM) --
+ such that the programs and data cannot be dynamically written or
+ modified during execution of the programs. (See: hardware,
+ software.)
+
+ $ FIRST
+ (N) See: Forum of Incident Response and Security Teams.
+
+ $ flaw
+ 1. (I) An error in the design, implementation, or operation of an
+ information system. A flaw may result in a vulnerability.
+ (Compare: vulnerability.)
+
+ 2. (D) "An error of commission, omission, or oversight in a system
+ that allows protection mechanisms to be bypassed." [NCSSG]
+ (Compare: vulnerability. See: brain-damaged.)
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 2; not every flaw is a vulnerability.
+
+ $ flaw hypothesis methodology
+ (I) An evaluation or attack technique in which specifications and
+ documentation for a system are analyzed to hypothesize flaws in
+ the system. The list of hypothetical flaws is prioritized on the
+ basis of the estimated probability that a flaw exists and,
+ assuming it does, on the ease of exploiting it and the extent of
+ control or compromise it would provide. The prioritized list is
+ used to direct a penetration test or attack against the system.
+ [NCS04] (See: fault tree, flaw.)
+
+ $ flooding
+ 1. (I) An attack that attempts to cause a failure in a system by
+ providing more input than the system can process properly. (See:
+ denial of service, fairness. Compare: jamming.)
+
+ Tutorial: Flooding uses "overload" as a type of "obstruction"
+ intended to cause "disruption".
+
+ 2. (I) The process of delivering data or control messages to every
+ node of a network. (RFC 3753)
+
+ $ flow analysis
+ (I) An analysis performed on a nonprocedural, formal, system
+ specification that locates potential flows of information between
+ system variables. By assigning security levels to the variables,
+ the analysis can find some types of covert channels. [Huff]
+
+
+
+Shirey Informational [Page 131]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ flow control
+ 1. (I) /data security/ A procedure or technique to ensure that
+ information transfers within a system are not made from one
+ security level to another security level, and especially not from
+ a higher level to a lower level. [Denns] (See: covert channel,
+ confinement property, information flow policy, simple security
+ property.)
+
+ 2. (O) /data security/ "A concept requiring that information
+ transfers within a system be controlled so that information in
+ certain types of objects cannot, via any channel within the
+ system, flow to certain other types of objects." [NCSSG]
+
+ $ For Official Use Only (FOUO)
+ (O) /U.S. DoD/ A U.S. Government designation for information that
+ has not been given a security classification pursuant to the
+ criteria of an Executive Order dealing with national security, but
+ which may be withheld from the public because disclosure would
+ cause a foreseeable harm to an interest protected by one of the
+ exemptions stated in the Freedom of Information Act (Section 552
+ of title 5, United States Code). (See: security label, security
+ marking. Compare: classified.)
+
+ $ formal
+ (I) Expressed in a restricted syntax language with defined
+ semantics based on well-established mathematical concepts. [CCIB]
+ (Compare: informal, semiformal.)
+
+ $ formal access approval
+ (O) /U.S. Government/ Documented approval by a data owner to allow
+ access to a particular category of information in a system. (See:
+ category.)
+
+ $ Formal Development Methodology
+ (O) See: Ina Jo.
+
+ $ formal model
+ (I) A security model that is formal. Example: Bell-LaPadula model.
+ [Land] (See: formal, security model.)
+
+ $ formal proof
+ (I) "A complete and convincing mathematical argument, presenting
+ the full logical justification for each step in the proof, for the
+ truth of a theorem or set of theorems." [NCSSG]
+
+ $ formal specification
+ (I) A precise description of the (intended) behavior of a system,
+ usually written in a mathematical language, sometimes for the
+
+
+
+Shirey Informational [Page 132]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ purpose of supporting formal verification through a correctness
+ proof. [Huff] (See: Affirm, Gypsy, HDM, Ina Jo.) (See: formal.)
+
+ Tutorial: A formal specification can be written at any level of
+ detail but is usually a top-level specification.
+
+ $ formal top-level specification
+ (I) "A top-level specification that is written in a formal
+ mathematical language to allow theorems showing the correspondence
+ of the system specification to its formal requirements to be
+ hypothesized and formally proven." [NCS04] (See: formal
+ specification.)
+
+ $ formulary
+ (I) A technique for enabling a decision to grant or deny access to
+ be made dynamically at the time the access is attempted, rather
+ than earlier when an access control list or ticket is created.
+
+ $ FORTEZZA(trademark)
+ (O) A registered trademark of NSA, used for a family of
+ interoperable security products that implement a NIST/NSA-approved
+ suite of cryptographic algorithms for digital signature, hash,
+ encryption, and key exchange. The products include a PC card
+ (which contains a CAPSTONE chip), and compatible serial port
+ modems, server boards, and software implementations.
+
+ $ Forum of Incident Response and Security Teams (FIRST)
+ (N) An international consortium of CSIRTs (e.g., CIAC) that work
+ together to handle computer security incidents and promote
+ preventive activities. (See: CSIRT, security incident.)
+
+ Tutorial: FIRST was founded in 1990 and, as of July 2004, had more
+ than 100 members spanning the globe. Its mission includes:
+ - Provide members with technical information, tools, methods,
+ assistance, and guidance.
+ - Coordinate proactive liaison activities and analytical support.
+ - Encourage development of quality products and services.
+ - Improve national and international information security for
+ governments, private industry, academia, and the individual.
+ - Enhance the image and status of the CSIRT community.
+
+ $ forward secrecy
+ (I) See: perfect forward secrecy.
+
+ $ FOUO
+ (O) See: For Official Use Only.
+
+
+
+
+
+Shirey Informational [Page 133]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ FPKI
+ (O) See: Federal Public-Key Infrastructure.
+
+ $ fraggle attack
+ (D) /slang/ A synonym for "smurf attack".
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term.
+
+ Derivation: The Fraggles are a fictional race of small humanoids
+ (represented as hand puppets in a children's television series,
+ "Fraggle Rock") that live underground.
+
+ $ frequency hopping
+ (N) Repeated switching of frequencies during radio transmission
+ according to a specified algorithm. [C4009] (See: spread
+ spectrum.)
+
+ Tutorial: Frequency hopping is a TRANSEC technique to minimize the
+ potential for unauthorized interception or jamming.
+
+ $ fresh
+ (I) Recently generated; not replayed from some earlier interaction
+ of the protocol.
+
+ Usage: Describes data contained in a PDU that is received and
+ processed for the first time. (See: liveness, nonce, replay
+ attack.)
+
+ $ FTP
+ (I) See: File Transfer Protocol.
+
+ $ gateway
+ (I) An intermediate system (interface, relay) that attaches to two
+ (or more) computer networks that have similar functions but
+ dissimilar implementations and that enables either one-way or two-
+ way communication between the networks. (See: bridge, firewall,
+ guard, internetwork, proxy server, router, and subnetwork.)
+
+ Tutorial: The networks may differ in any of several aspects,
+ including protocols and security mechanisms. When two computer
+ networks differ in the protocol by which they offer service to
+ hosts, a gateway may translate one protocol into the other or
+ otherwise facilitate interoperation of hosts (see: Internet
+ Protocol). In theory, gateways between computer networks are
+ conceivable at any OSIRM layer. In practice, they usually operate
+
+
+
+
+Shirey Informational [Page 134]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ at OSIRM Layer 2 (see: bridge), 3 (see: router), or 7 (see: proxy
+ server).
+
+ $ GCA
+ (O) See: geopolitical certificate authority.
+
+ $ GDOI
+ (O) See: Group Domain of Interpretation.
+
+ $ GeldKarte
+ (O) A smartcard-based, electronic money system that is maintained
+ by the German banking industry, incorporates cryptography, and can
+ be used to make payments via the Internet. (See: IOTP.)
+
+ $ GeneralizedTime
+ (N) The ASN.1 data type "GeneralizedTime" (ISO 8601) contains a
+ calendar date (YYYYMMDD) and a time of day, which is either (a)
+ the local time, (b) the Coordinated Universal Time, or (c) both
+ the local time and an offset that enables Coordinated Universal
+ Time to be calculated. (See: Coordinated Universal Time. Compare:
+ UTCTime.)
+
+ $ Generic Security Service Application Program Interface (GSS-API)
+ (I) An Internet Standard protocol [R2743] that specifies calling
+ conventions by which an application (typically another
+ communication protocol) can obtain authentication, integrity, and
+ confidentiality security services independently of the underlying
+ security mechanisms and technologies, thus enabling the
+ application source code to be ported to different environments.
+ (Compare: EAP, SASL.)
+
+ Tutorial: "A GSS-API caller accepts tokens provided to it by its
+ local GSS-API implementation and transfers the tokens to a peer on
+ a remote system; that peer passes the received tokens to its local
+ GSS-API implementation for processing. The security services
+ available through GSS-API in this fashion are implementable (and
+ have been implemented) over a range of underlying mechanisms based
+ on [symmetric] and [asymmetric cryptography]." [R2743]
+
+ $ geopolitical certificate authority (GCA)
+ (O) /SET/ In a SET certification hierarchy, an optional level that
+ is certified by a BCA and that may certify cardholder CAs,
+ merchant CAs, and payment gateway CAs. Using GCAs enables a brand
+ to distribute responsibility for managing certificates to
+ geographic or political regions, so that brand policies can vary
+ between regions as needed.
+
+
+
+
+
+Shirey Informational [Page 135]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ GIG
+ (O) See: Global Information Grid.
+
+ $ Global Information Grid (GIG)
+ (O) /U.S. DoD/ The GIG is "a globally interconnected, end-to-end
+ set of information capabilities, associated processes and
+ personnel for collecting, processing, storing, disseminating, and
+ managing information on demand to war fighters, policy makers, and
+ support personnel." [IATF] Usage: Formerly referred to as the DII.
+
+ $ good engineering practice(s)
+ (N) A term used to specify or characterize design, implementation,
+ installation, or operating practices for an information system,
+ when a more explicit specification is not possible. Generally
+ understood to refer to the state of the engineering art for
+ commercial systems that have problems and solutions equivalent to
+ the system in question.
+
+ $ granularity
+ 1. (N) /access control/ Relative fineness to which an access
+ control mechanism can be adjusted.
+
+ 2. (N) /data security/ "The size of the smallest protectable unit
+ of information" in a trusted system. [Huff]
+
+ $ Green Book
+ (D) /slang/ Synonym for "Defense Password Management Guideline"
+ [CSC2].
+
+ Deprecated Term: Except as an explanatory appositive, IDOCs SHOULD
+ NOT use this term, regardless of the associated definition.
+ Instead, use the full proper name of the document or, in
+ subsequent references, a conventional abbreviation. (See: Rainbow
+ Series.)
+
+ Deprecated Usage: To improve international comprehensibility of
+ Internet Standards and the Internet Standards Process, IDOCs
+ SHOULD NOT use "cute" synonyms. No matter how clearly understood
+ or popular a nickname may be in one community, it is likely to
+ cause confusion or offense in others. For example, several other
+ information system standards also are called "the Green Book"; the
+ following are some examples:
+ - Each volume of 1992 ITU-T (known at that time as CCITT)
+ standards.
+ - "PostScript Language Program Design", Adobe Systems, Addison-
+ Wesley, 1988.
+ - IEEE 1003.1 POSIX Operating Systems Interface.
+
+
+
+
+Shirey Informational [Page 136]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - "Smalltalk-80: Bits of History, Words of Advice", Glenn
+ Krasner, Addison-Wesley, 1983.
+ - "X/Open Compatibility Guide".
+ - A particular CD-ROM format developed by Phillips.
+
+ $ Group Domain of Interpretation (GDOI)
+ (I) An ISAKMP/IKE domain of interpretation for group key
+ management; i.e., a phase 2 protocol in ISAKMP. [R3547] (See:
+ secure multicast.)
+
+ Tutorial: In this group key management model that extends the
+ ISAKMP standard, the protocol is run between a group member and a
+ "group controller/key server", which establishes security
+ associations [R4301] among authorized group members. The GDOI
+ protocol is itself protected by an ISAKMP phase 1 association.
+
+ For example, multicast applications may use ESP to protect their
+ data traffic. GDOI carries the needed security association
+ parameters for ESP. In this way, GDOI supports multicast ESP with
+ group authentication of ESP packets using a shared, group key.
+
+ $ group identity
+ (I) See: secondary definition under "identity".
+
+ $ group security association
+ (I) "A bundling of [security associations] (SAs) that together
+ define how a group communicates securely. The [group SA] may
+ include a registration protocol SA, a rekey protocol SA, and one
+ or more data security protocol SAs." [R3740]
+
+ $ GSS-API
+ (I) See: Generic Security Service Application Program Interface.
+
+ $ guard
+ (I) A computer system that (a) acts as gateway between two
+ information systems operating under different security policies
+ and (b) is trusted to mediate information data transfers between
+ the two. (See: controlled interface, cross-domain solution,
+ domain, filter. Compare: firewall.)
+
+ Usage: Frequently understood to mean that one system is operating
+ at a higher security level than the other, and that the gateway's
+ purpose is to prevent unauthorized disclosure of data from the
+ higher system to the lower. However, the purpose might also be to
+ protect the data integrity, availability, or general system
+ integrity of one system from threats posed by connecting to the
+ other system. The mediation may be entirely automated or may
+ involve "reliable human review".
+
+
+
+Shirey Informational [Page 137]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ guest login
+ (I) See: anonymous login.
+
+ $ GULS
+ (I) Generic Upper Layer Security service element (ISO 11586), a
+ five-part standard for the exchange of security information and
+ security-transformation functions that protect confidentiality and
+ integrity of application data.
+
+ $ Gypsy verification environment
+ (O) A methodology, language, and integrated set of software tools
+ developed at the University of Texas for specifying, coding, and
+ verifying software to produce correct and reliable programs.
+ [Cheh]
+
+ $ H field
+ (D) See: Deprecated Usage under "Handling Restrictions field".
+
+ $ hack
+ 1a. (I) /verb/ To work on something, especially to program a
+ computer. (See: hacker.)
+
+ 1b. (I) /verb/ To do some kind of mischief, especially to play a
+ prank on, or penetrate, a system. (See: hacker, cracker.)
+
+ 2. (I) /noun/ An item of completed work, or a solution for a
+ problem, that is non-generalizable, i.e., is very specific to the
+ application area or problem being solved.
+
+ Tutorial: Often, the application area or problem involves computer
+ programming or other use of a computer. Characterizing something
+ as a hack can be a compliment, such as when the solution is
+ minimal and elegant; or it can be derogatory, such as when the
+ solution fixes the problem but leaves the system in an
+ unmaintainable state.
+
+ See [Raym] for several other meanings of this term and also
+ definitions of several derivative terms.
+
+ $ hacker
+ 1. (I) Someone with a strong interest in computers, who enjoys
+ learning about them, programming them, and experimenting and
+ otherwise working with them. (See: hack. Compare: adversary,
+ cracker, intruder.)
+
+ Usage: This first definition is the original meaning of the term
+ (circa 1960); it then had a neutral or positive connotation of
+ "someone who figures things out and makes something cool happen".
+
+
+
+Shirey Informational [Page 138]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (O) "An individual who spends an inordinate amount of time
+ working on computer systems for other than professional purposes."
+ [NCSSG]
+
+ 3. (D) Synonym for "cracker".
+
+ Deprecated Usage: Today, the term is frequently (mis)used
+ (especially by journalists) with definition 3.
+
+ $ handle
+ 1. (I) /verb/ Perform processing operations on data, such as
+ receive and transmit, collect and disseminate, create and delete,
+ store and retrieve, read and write, and compare. (See: access.)
+
+ 2. (I) /noun/ An online pseudonym, particularly one used by a
+ cracker; derived from citizens' band radio culture.
+
+ $ handling restriction
+ (I) A type of access control other than (a) the rule-based
+ protections of mandatory access control and (b) the identity-based
+ protections of discretionary access control; usually involves
+ administrative security.
+
+ $ Handling Restrictions field
+ (I) A 16-bit field that specifies a control and release marking in
+ the security option (option type 130) of IP's datagram header
+ format. The valid field values are alphanumeric digraphs assigned
+ by the U.S. Government, as specified in RFC 791.
+
+ Deprecated Abbreviation: IDOCs SHOULD NOT use the abbreviation "H
+ field" because it is potentially ambiguous. Instead, use "Handling
+ Restrictions field".
+
+ $ handshake
+ (I) Protocol dialogue between two systems for identifying and
+ authenticating themselves to each other, or for synchronizing
+ their operations with each other.
+
+ $ Handshake Protocol
+ (I) /TLS/ The TLS Handshake Protocol consists of three parts
+ (i.e., subprotocols) that enable peer entities to agree upon
+ security parameters for the record layer, authenticate themselves
+ to each other, instantiate negotiated security parameters, and
+ report error conditions to each other. [R4346]
+
+
+
+
+
+
+
+Shirey Informational [Page 139]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ harden
+ (I) To protect a system by configuring it to operate in a way that
+ eliminates or mitigates known vulnerabilities. Example: [RSCG].
+ (See: default account.)
+
+ $ hardware
+ (I) The material physical components of an information system.
+ (See: firmware, software.)
+
+ $ hardware error
+ (I) /threat action/ See: secondary definitions under "corruption",
+ "exposure", and "incapacitation".
+
+ $ hardware token
+ See: token.
+
+ $ hash code
+ (D) Synonym for "hash result" or "hash function".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it mixes concepts
+ in a potentially misleading way. A hash result is not a "code",
+ and a hash function does not "encode" in any sense defined by this
+ glossary. (See: hash value, message digest.)
+
+ $ hash function
+ 1. (I) A function H that maps an arbitrary, variable-length bit
+ string, s, into a fixed-length string, h = H(s) (called the "hash
+ result"). For most computing applications, it is desirable that
+ given a string s with H(s) = h, any change to s that creates a
+ different string s' will result in an unpredictable hash result
+ H(s') that is, with high probability, not equal to H(s).
+
+ 2. (O) "A (mathematical) function which maps values from a large
+ (possibly very large) domain into a smaller range. A 'good' hash
+ function is such that the results of applying the function to a
+ (large) set of values in the domain will be evenly distributed
+ (and apparently at random) over the range." [X509]
+
+ Tutorial: A hash function operates on variable-length input (e.g.,
+ a message or a file) and outputs a fixed-length output, which
+ typically is much shorter than most input values. If the algorithm
+ is "good" as described in the "O" definition, then the hash
+ function may be a candidate for use in a security mechanism to
+ detect accidental changes in data, but not necessarily for a
+ mechanism to detect changes made by active wiretapping. (See:
+ Tutorial under "checksum".)
+
+
+
+
+
+Shirey Informational [Page 140]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Security mechanisms require a "cryptographic hash function" (e.g.,
+ MD2, MD4, MD5, SHA-1, Snefru), i.e., a good hash function that
+ also has the one-way property and one of the two collision-free
+ properties:
+ - "One-way property": Given H and a hash result h = H(s), it is
+ hard (i.e., computationally infeasible, "impossible") to find
+ s. (Of course, given H and an input s, it must be relatively
+ easy to compute the hash result H(s).)
+ - "Weakly collision-free property": Given H and an input s, it is
+ hard (i.e., computationally infeasible, "impossible") to find a
+ different input, s', such that H(s) = H(s').
+ - "Strongly collision-free property": Given H, it is hard to find
+ any pair of inputs s and s' such that H(s) = H(s').
+
+ If H produces a hash result N bits long, then to find an s' where
+ H(s') = H(s) for a specific given s, the amount of computation
+ required is O(2**n); i.e., it is necessary to try on the order of
+ 2 to the power n values of s' before finding a collision. However,
+ to simply find any pair of values s and s' that collide, the
+ amount of computation required is only O(2**(n/2)); i.e., after
+ computing H(s) for 2 to the power n/2 randomly chosen values of s,
+ the probability is greater than 1/2 that two of those values have
+ the same hash result. (See: birthday attack.)
+
+ $ hash result
+ 1. (I) The output of a hash function. (See: hash code, hash value.
+ Compare: hash value.)
+
+ 2. (O) "The output produced by a hash function upon processing a
+ message" (where "message" is broadly defined as "a digital
+ representation of data"). [DSG]
+
+ Usage: IDOCs SHOULD avoid the unusual usage of "message" that is
+ seen in the "O" definition.
+
+ $ hash value
+ (D) Synonym for "hash result".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term for the output of
+ a hash function; the term could easily be confused with "hashed
+ value", which means the input to a hash function. (See: hash code,
+ hash result, message digest.)
+
+ $ HDM
+ (O) See: Hierarchical Development Methodology.
+
+
+
+
+
+
+Shirey Informational [Page 141]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Hierarchical Development Methodology (HDM)
+ (O) A methodology, language, and integrated set of software tools
+ developed at SRI International for specifying, coding, and
+ verifying software to produce correct and reliable programs.
+ [Cheh]
+
+ $ hierarchical PKI
+ (I) A PKI architecture based on a certification hierarchy.
+ (Compare: mesh PKI, trust-file PKI.)
+
+ $ hierarchy management
+ (I) The process of generating configuration data and issuing
+ public-key certificates to build and operate a certification
+ hierarchy. (See: certificate management.)
+
+ $ hierarchy of trust
+ (D) Synonym for "certification hierarchy".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it mixes concepts
+ in a potentially misleading way. (See: certification hierarchy,
+ trust, web of trust.)
+
+ $ high-assurance guard
+ (O) "An oxymoron," said Lt. Gen. William H. Campbell, former U.S.
+ Army chief information officer, speaking at an Armed Forces
+ Communications and Electronics Association conference.
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because the term mixes concepts and could easily be misunderstood.
+
+ $ hijack attack
+ (I) A form of active wiretapping in which the attacker seizes
+ control of a previously established communication association.
+ (See: man-in-the-middle attack, pagejacking, piggyback attack.)
+
+ $ HIPAA
+ (N) Health Information Portability and Accountability Act of 1996,
+ a U.S. law (Public Law 104-191) that is intended to protect the
+ privacy of patients' medical records and other health information
+ in all forms, and mandates security for that information,
+ including for its electronic storage and transmission.
+
+ $ HMAC
+ (I) A keyed hash [R2104] that can be based on any iterated
+ cryptographic hash (e.g., MD5 or SHA-1), so that the cryptographic
+ strength of HMAC depends on the properties of the selected
+ cryptographic hash. (See: [R2202, R2403, R2404].)
+
+
+
+
+Shirey Informational [Page 142]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Derivation: Hash-based MAC. (Compare: CMAC.)
+
+ Tutorial: Assume that H is a generic cryptographic hash in which a
+ function is iterated on data blocks of length B bytes. L is the
+ length of the of hash result of H. K is a secret key of length L
+ <= K <= B. The values IPAD and OPAD are fixed strings used as
+ inner and outer padding and defined as follows: IPAD = the byte
+ 0x36 repeated B times, and OPAD = the byte 0x5C repeated B times.
+ HMAC is computed by H(K XOR OPAD, H(K XOR IPAD, inputdata)).
+
+ HMAC has the following goals:
+ - To use available cryptographic hash functions without
+ modification, particularly functions that perform well in
+ software and for which software is freely and widely available.
+ - To preserve the original performance of the selected hash
+ without significant degradation.
+ - To use and handle keys in a simple way.
+ - To have a well-understood cryptographic analysis of the
+ strength of the mechanism based on reasonable assumptions about
+ the underlying hash function.
+ - To enable easy replacement of the hash function in case a
+ faster or stronger hash is found or required.
+
+ $ honey pot
+ (N) A system (e.g., a web server) or system resource (e.g., a file
+ on a server) that is designed to be attractive to potential
+ crackers and intruders, like honey is attractive to bears. (See:
+ entrapment.)
+
+ Usage: It is likely that other cultures use different metaphors
+ for this concept. Therefore, to avoid international
+ misunderstanding, an IDOC SHOULD NOT use this term without
+ providing a definition for it. (See: Deprecated Usage under "Green
+ Book".)
+
+ $ host
+ 1. (I) /general/ A computer that is attached to a communication
+ subnetwork or internetwork and can use services provided by the
+ network to exchange data with other attached systems. (See: end
+ system. Compare: server.)
+
+ 2. (I) /IPS/ A networked computer that does not forward IP packets
+ that are not addressed to the computer itself. (Compare: router.)
+
+ Derivation: As viewed by its users, a host "entertains" them,
+ providing Application-Layer services or access to other computers
+ attached to the network. However, even though some traditional
+ peripheral service devices, such as printers, can now be
+
+
+
+Shirey Informational [Page 143]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ independently connected to networks, they are not usually called
+ hosts.
+
+ $ HTML
+ (I) See: Hypertext Markup Language.
+
+ $ HTTP
+ (I) See: Hypertext Transfer Protocol.
+
+ $ https
+ (I) When used in the first part of a URL (the part that precedes
+ the colon and specifies an access scheme or protocol), this term
+ specifies the use of HTTP enhanced by a security mechanism, which
+ is usually SSL. (Compare: S-HTTP.)
+
+ $ human error
+ (I) /threat action/ See: secondary definitions under "corruption",
+ "exposure", and "incapacitation".
+
+ $ hybrid encryption
+ (I) An application of cryptography that combines two or more
+ encryption algorithms, particularly a combination of symmetric and
+ asymmetric encryption. Examples: digital envelope, MSP, PEM, PGP.
+ (Compare: superencryption.)
+
+ Tutorial: Asymmetric algorithms require more computation than
+ equivalently strong symmetric ones. Thus, asymmetric encryption is
+ not normally used for data confidentiality except to distribute a
+ symmetric key in a hybrid encryption scheme, where the symmetric
+ key is usually very short (in terms of bits) compared to the data
+ file it protects. (See: bulk key.)
+
+ $ hyperlink
+ (I) In hypertext or hypermedia, an information object (such as a
+ word, a phrase, or an image, which usually is highlighted by color
+ or underscoring) that points (i.e., indicates how to connect) to
+ related information that is located elsewhere and can be retrieved
+ by activating the link (e.g., by selecting the object with a mouse
+ pointer and then clicking).
+
+ $ hypermedia
+ (I) A generalization of hypertext; any media that contain
+ hyperlinks that point to material in the same or another data
+ object.
+
+
+
+
+
+
+
+Shirey Informational [Page 144]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ hypertext
+ (I) A computer document, or part of a document, that contains
+ hyperlinks to other documents; i.e., text that contains active
+ pointers to other text. Usually written in HTML and accessed using
+ a web browser. (See: hypermedia.)
+
+ $ Hypertext Markup Language (HTML)
+ (I) A platform-independent system of syntax and semantics (RFC
+ 1866) for adding characters to data files (particularly text
+ files) to represent the data's structure and to point to related
+ data, thus creating hypertext for use in the World Wide Web and
+ other applications. (Compare: XML.)
+
+ $ Hypertext Transfer Protocol (HTTP)
+ (I) A TCP-based, Application-Layer, client-server, Internet
+ protocol (RFC 2616) that is used to carry data requests and
+ responses in the World Wide Web. (See: hypertext.)
+
+ $ IAB
+ (I) See: Internet Architecture Board.
+
+ $ IANA
+ (I) See: Internet Assigned Numbers Authority.
+
+ $ IATF
+ (O) See: Information Assurance Technical Framework.
+
+ $ ICANN
+ (I) See: Internet Corporation for Assigned Names and Numbers.
+
+ $ ICMP
+ (I) See: Internet Control Message Protocol.
+
+ $ ICMP flood
+ (I) A denial-of-service attack that sends a host more ICMP echo
+ request ("ping") packets than the protocol implementation can
+ handle. (See: flooding, smurf.)
+
+ $ ICRL
+ (N) See: indirect certificate revocation list.
+
+ $ IDEA
+ (N) See: International Data Encryption Algorithm.
+
+ $ identification
+ (I) An act or process that presents an identifier to a system so
+ that the system can recognize a system entity and distinguish it
+ from other entities. (See: authentication.)
+
+
+
+Shirey Informational [Page 145]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ identification information
+ (D) Synonym for "identifier"; synonym for "authentication
+ information". (See: authentication, identifying information.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ either of those terms; this term (a) is not as precise as they are
+ and (b) mixes concepts in a potentially misleading way. Instead,
+ use "identifier" or "authentication information", depending on
+ what is meant.
+
+ $ Identification Protocol
+ (I) A client-server Internet protocol [R1413] for learning the
+ identity of a user of a particular TCP connection.
+
+ Tutorial: Given a TCP port number pair, the server returns a
+ character string that identifies the owner of that connection on
+ the server's system. The protocol does not provide an
+ authentication service and is not intended for authorization or
+ access control. At best, it provides additional auditing
+ information with respect to TCP.
+
+ $ identifier
+ (I) A data object -- often, a printable, non-blank character
+ string -- that definitively represents a specific identity of a
+ system entity, distinguishing that identity from all others.
+ (Compare: identity.)
+
+ Tutorial: Identifiers for system entities must be assigned very
+ carefully, because authenticated identities are the basis for
+ other security services, such as access control service.
+
+ $ identifier credential
+ 1. (I) See: /authentication/ under "credential".
+
+ 2. (D) Synonym for "signature certificate".
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because the term is used in many ways and could easily be
+ misunderstood.
+
+ $ identifying information
+ (D) Synonym for "identifier"; synonym for "authentication
+ information". (See: authentication, identification information.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ either of those terms; this term (a) is not as precise as they are
+ and (b) mixes concepts in a potentially misleading way. Instead,
+
+
+
+
+Shirey Informational [Page 146]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ use "identifier" or "authentication information", depending on
+ what is meant.
+
+ $ identity
+ (I) The collective aspect of a set of attribute values (i.e., a
+ set of characteristics) by which a system user or other system
+ entity is recognizable or known. (See: authenticate, registration.
+ Compare: identifier.)
+
+ Usage: An IDOC MAY apply this term to either a single entity or a
+ set of entities. If an IDOC involves both meanings, the IDOC
+ SHOULD use the following terms and definitions to avoid ambiguity:
+ - "Singular identity": An identity that is registered for an
+ entity that is one person or one process.
+ - "Shared identity": An identity that is registered for an entity
+ that is a set of singular entities (1) in which each member is
+ authorized to assume the identity individually and (2) for
+ which the registering system maintains a record of the singular
+ entities that comprise the set. In this case, we would expect
+ each member entity to be registered with a singular identity
+ before becoming associated with the shared identity.
+ - "Group identity": An identity that is registered for an entity
+ (1) that is a set of entities (2) for which the registering
+ system does not maintain a record of singular entities that
+ comprise the set.
+
+ Tutorial: When security services are based on identities, two
+ properties are desirable for the set of attributes used to define
+ identities:
+ - The set should be sufficient to distinguish each entity from
+ all other entities, i.e., to represent each entity uniquely.
+ - The set should be sufficient to distinguish each identity from
+ any other identities of the same entity.
+
+ The second property is needed if a system permits an entity to
+ register two or more concurrent identities. Having two or more
+ identities for the same entity implies that the entity has two
+ separate justifications for registration. In that case, the set of
+ attributes used for identities must be sufficient to represent
+ multiple identities for a single entity.
+
+ Having two or more identities registered for the same entity is
+ different from concurrently associating two different identifiers
+ with the same identity, and also is different from a single
+ identity concurrently accessing the system in two different roles.
+ (See: principal, role-based access control.)
+
+
+
+
+
+Shirey Informational [Page 147]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ When an identity of a user is being registered in a system, the
+ system may require presentation of evidence that proves the
+ identity's authenticity (i.e., that the user has the right to
+ claim or use the identity) and its eligibility (i.e., that the
+ identity is qualified to be registered and needs to be
+ registered).
+
+ The following diagram illustrates how this term relates to some
+ other terms in a PKI system: authentication information,
+ identifier, identifier credential, registration, registered user,
+ subscriber, and user.
+
+ Relationships: === one-to-one, ==> one-to-many, <=> many-to-many.
+ +- - - - - - - - - - - - - - - - - - - - - - - - - - +
+ | PKI System |
+ + - - - - + | +------------------+ +-------------------------+ |
+ | User, | | |Subscriber, i.e., | | Identity of Subscriber | |
+ |i.e., one| | | Registered User, | | is system-unique | |
+ | of the | | | is system-unique | | +---------------------+ | |
+ |following| | | +--------------+ | | | Subscriber | | |
+ | | | | | User's core | | | | Identity's | | |
+ | +-----+ |===| | Registration | |==>| | Registration data | | |
+ | |human| | | | | data, i.e., | | | |+-------------------+| | |
+ | |being| | | | | an entity's | | | || same core data || | |
+ | +-----+ | | | |distinguishing|========|for all Identities || | |
+ | or | | | | attribute | | | || of the same User || | |
+ | +-----+ | | | | values | | +===|+-------------------+| | |
+ | |auto-| | | | +--------------+ | | | +---------------------+ | |
+ | |mated| | | +------------------+ | +------------|------------+ |
+ | |pro- | | | | +=======+ | |
+ | |cess | | | +-------v----|----------------------|------------+ |
+ | +-----+ | | | +----------v---+ +------------v----------+ | |
+ | or | | | |Authentication|<===>|Identifier of Identity | | |
+ |+-------+| | | | Information | | is system-unique | | |
+ || a set || | | +--------------+ +-----------------------+ | |
+ || of || | | Identifier Credential that associates unit of | |
+ || either|| | | Authentication Information with the Identifier | |
+ |+-------+| | +------------------------------------------------+ |
+ + - - - - + + - - - - - - - - - - - - - - - - - - - - - - - - - -+
+
+ $ identity-based security policy
+ (I) "A security policy based on the identities and/or attributes
+ of users, a group of users, or entities acting on behalf of the
+ users and the resources/objects being accessed." [I7498-2] (See:
+ rule-based security policy.)
+
+
+
+
+
+
+Shirey Informational [Page 148]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ identity proofing
+ (I) A process that vets and verifies the information that is used
+ to establish the identity of a system entity. (See: registration.)
+
+ $ IDOC
+ (I) An abbreviation used in this Glossary to refer to a document
+ or other item of written material that is generated in the
+ Internet Standards Process (RFC 2026), i.e., an RFC, an Internet-
+ Draft, or some other item of discourse.
+
+ Deprecated Usage: This abbreviation SHOULD NOT be used in an IDOC
+ unless it is first defined in the IDOC because the abbreviation
+ was invented for this Glossary and is not widely known.
+
+ $ IDS
+ (I) See: intrusion detection system.
+
+ $ IEEE
+ (N) See: Institute of Electrical and Electronics Engineers, Inc.
+
+ $ IEEE 802.10
+ (N) An IEEE committee developing security standards for LANs.
+ (See: SILS.)
+
+ $ IEEE P1363
+ (N) An IEEE working group, Standard for Public-Key Cryptography,
+ engaged in developing a comprehensive reference standard for
+ asymmetric cryptography. Covers discrete logarithm (e.g., DSA),
+ elliptic curve, and integer factorization (e.g., RSA); and covers
+ key agreement, digital signature, and encryption.
+
+ $ IESG
+ (I) See: Internet Engineering Steering Group.
+
+ $ IETF
+ (I) See: Internet Engineering Task Force.
+
+ $ IKE
+ (I) See: IPsec Key Exchange.
+
+ $ IMAP4
+ (I) See: Internet Message Access Protocol, version 4.
+
+ $ IMAP4 AUTHENTICATE
+ (I) An IMAP4 command (better described as a transaction type, or
+ subprotocol) by which an IMAP4 client optionally proposes a
+ mechanism to an IMAP4 server to authenticate the client to the
+ server and provide other security services. (See: POP3.)
+
+
+
+Shirey Informational [Page 149]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: If the server accepts the proposal, the command is
+ followed by performing a challenge-response authentication
+ protocol and, optionally, negotiating a protection mechanism for
+ subsequent POP3 interactions. The security mechanisms that are
+ used by IMAP4 AUTHENTICATE -- including Kerberos, GSS-API, and
+ S/Key -- are described in [R1731].
+
+ $ impossible
+ (O) Cannot be done in any reasonable amount of time. (See: break,
+ brute force, strength, work factor.)
+
+ $ in the clear
+ (I) Not encrypted. (See: clear text.)
+
+ $ Ina Jo
+ (O) A methodology, language, and integrated set of software tools
+ developed at the System Development Corporation for specifying,
+ coding, and verifying software to produce correct and reliable
+ programs. Usage: a.k.a. the Formal Development Methodology. [Cheh]
+
+ $ incapacitation
+ (I) A type of threat action that prevents or interrupts system
+ operation by disabling a system component. (See: disruption.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Malicious logic": In context of incapacitation, any hardware,
+ firmware, or software (e.g., logic bomb) intentionally
+ introduced into a system to destroy system functions or
+ resources. (See: corruption, main entry for "malicious logic",
+ masquerade, misuse.)
+ - "Physical destruction": Deliberate destruction of a system
+ component to interrupt or prevent system operation.
+ - "Human error": /incapacitation/ Action or inaction that
+ unintentionally disables a system component. (See: corruption,
+ exposure.)
+ - "Hardware or software error": /incapacitation/ Error that
+ unintentionally causes failure of a system component and leads
+ to disruption of system operation. (See: corruption, exposure.)
+ - "Natural disaster": /incapacitation/ Any "act of God" (e.g.,
+ fire, flood, earthquake, lightning, or wind) that disables a
+ system component. [FP031 Section 2]
+
+ $ incident
+ See: security incident.
+
+ $ INCITS
+ (N) See: "International Committee for Information Technology
+ Standardization" under "ANSI".
+
+
+
+Shirey Informational [Page 150]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ indicator
+ (N) An action -- either specific, generalized, or theoretical --
+ that an adversary might be expected to take in preparation for an
+ attack. [C4009] (See: "attack sensing, warning, and response".
+ Compare: message indicator.)
+
+ $ indirect attack
+ (I) See: secondary definition under "attack". Compare: direct
+ attack.
+
+ $ indirect certificate revocation list (ICRL)
+ (N) In X.509, a CRL that may contain certificate revocation
+ notifications for certificates issued by CAs other than the issuer
+ (i.e., signer) of the ICRL.
+
+ $ indistinguishability
+ (I) An attribute of an encryption algorithm that is a
+ formalization of the notion that the encryption of some string is
+ indistinguishable from the encryption of an equal-length string of
+ nonsense. (Compare: semantic security.)
+
+ $ inference
+ 1. (I) A type of threat action that reasons from characteristics
+ or byproducts of communication and thereby indirectly accesses
+ sensitive data, but not necessarily the data contained in the
+ communication. (See: traffic analysis, signal analysis.)
+
+ 2. (I) A type of threat action that indirectly gains unauthorized
+ access to sensitive information in a database management system by
+ correlating query responses with information that is already
+ known.
+
+ $ inference control
+ (I) Protection of data confidentiality against inference attack.
+ (See: traffic-flow confidentiality.)
+
+ Tutorial: A database management system containing N records about
+ individuals may be required to provide statistical summaries about
+ subsets of the population, while not revealing sensitive
+ information about a single individual. An attacker may try to
+ obtain sensitive information about an individual by isolating a
+ desired record at the intersection of a set of overlapping
+ queries. A system can attempt to prevent this by restricting the
+ size and overlap of query sets, distorting responses by rounding
+ or otherwise perturbing database values, and limiting queries to
+ random samples. However, these techniques may be impractical to
+ implement or use, and no technique is totally effective. For
+ example, restricting the minimum size of a query set -- that is,
+
+
+
+Shirey Informational [Page 151]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ not responding to queries for which there are fewer than K or more
+ than N-K records that satisfy the query -- usually cannot prevent
+ unauthorized disclosure. An attacker can pad small query sets with
+ extra records, and then remove the effect of the extra records.
+ The formula for identifying the extra records is called the
+ "tracker". [Denns]
+
+ $ INFOCON
+ (O) See: information operations condition
+
+ $ informal
+ (N) Expressed in natural language. [CCIB] (Compare: formal,
+ semiformal.)
+
+ $ information
+ 1. (I) Facts and ideas, which can be represented (encoded) as
+ various forms of data.
+
+ 2. (I) Knowledge -- e.g., data, instructions -- in any medium or
+ form that can be communicated between system entities.
+
+ Tutorial: Internet security could be defined simply as protecting
+ information in the Internet. However, the perceived need to use
+ different protective measures for different types of information
+ (e.g., authentication information, classified information,
+ collateral information, national security information, personal
+ information, protocol control information, sensitive compartmented
+ information, sensitive information) has led to the diversity of
+ terminology listed in this Glossary.
+
+ $ information assurance
+ (N) /U.S. Government/ "Measures that protect and defend
+ information and information systems by ensuring their availability
+ integrity, authentication, confidentiality, and non-repudiation.
+ These measures include providing for restoration of information
+ systems by incorporating protection, detection, and reaction
+ capabilities." [C4009]
+
+ $ Information Assurance Technical Framework (IATF)
+ (O) A publicly available document [IATF], developed through a
+ collaborative effort by organizations in the U.S. Government and
+ industry, and issued by NSA. Intended for security managers and
+ system security engineers as a tutorial and reference document
+ about security problems in information systems and networks, to
+ improve awareness of tradeoffs among available technology
+ solutions and of desired characteristics of security approaches
+ for particular problems. (See: ISO 17799, [SP14].)
+
+
+
+
+Shirey Informational [Page 152]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ information domain
+ (O) See: secondary definition under "domain".
+
+ $ information domain security policy
+ (O) See: secondary definition under "domain".
+
+ $ information flow policy
+ (N) /formal model/ A triple consisting of a set of security levels
+ (or their equivalent security labels), a binary operator that maps
+ each pair of security levels into a security level, and a binary
+ relation on the set that selects a set of pairs of levels such
+ that information is permitted to flow from an object of the first
+ level to an object of the second level. (See: flow control,
+ lattice model.)
+
+ $ information operations condition (INFOCON)
+ (O) /U.S. DoD/ A comprehensive defense posture and response based
+ on the status of information systems, military operations, and
+ intelligence assessments of adversary capabilities and intent.
+ (See: threat)
+
+ Derivation: From DEFCON, i.e., defense condition.
+
+ Tutorial: The U.S. DoD defines five INFOCON levels: NORMAL (normal
+ activity), ALPHA (increased risk of attack), BRAVO (specific risk
+ of attack), CHARLIE (limited attack), and DELTA (general attack).
+
+ $ information security (INFOSEC)
+ (N) Measures that implement and assure security services in
+ information systems, including in computer systems (see: COMPUSEC)
+ and in communication systems (see: COMSEC).
+
+ $ information system
+ (I) An organized assembly of computing and communication resources
+ and procedures -- i.e., equipment and services, together with
+ their supporting infrastructure, facilities, and personnel -- that
+ create, collect, record, process, store, transport, retrieve,
+ display, disseminate, control, or dispose of information to
+ accomplish a specified set of functions. (See: system entity,
+ system resource. Compare: computer platform.)
+
+ $ Information Technology Security Evaluation Criteria (ITSEC)
+ (N) A Standard [ITSEC] jointly developed by France, Germany, the
+ Netherlands, and the United Kingdom for use in the European Union;
+ accommodates a wider range of security assurance and functionality
+ combinations than the TCSEC. Superseded by the Common Criteria.
+
+
+
+
+
+Shirey Informational [Page 153]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ INFOSEC
+ (I) See: information security.
+
+ $ ingress filtering
+ (I) A method [R2827] for countering attacks that use packets with
+ false IP source addresses, by blocking such packets at the
+ boundary between connected networks.
+
+ Tutorial: Suppose network A of an internet service provider (ISP)
+ includes a filtering router that is connected to customer network
+ B, and an attacker in B at IP source address "foo" attempts to
+ send packets with false source address "bar" into A. The false
+ address may be either fixed or randomly changing, and it may
+ either be unreachable or be a forged address that legitimately
+ exists within either B or some other network C. In ingress
+ filtering, the ISP's router blocks all inbound packet that arrive
+ from B with a source address that is not within the range of
+ legitimately advertised addresses for B. This method does not
+ prevent all attacks that can originate from B, but the actual
+ source of such attacks can be more easily traced because the
+ originating network is known.
+
+ $ initialization value (IV)
+ (I) /cryptography/ An input parameter that sets the starting state
+ of a cryptographic algorithm or mode. (Compare: activation data.)
+
+ Tutorial: An IV can be used to synchronize one cryptographic
+ process with another; e.g., CBC, CFB, and OFB use IVs. An IV also
+ can be used to introduce cryptographic variance (see: salt)
+ besides that provided by a key.
+
+ $ initialization vector
+ (D) /cryptography/ Synonym for "initialization value".
+
+ Deprecated Term: To avoid international misunderstanding, IDOCs
+ SHOULD NOT use this term in the context of cryptography because
+ most dictionary definitions of "vector" includes a concept of
+ direction or magnitude, which are irrelevant to cryptographic use.
+
+ $ insertion
+ 1. (I) /packet/ See: secondary definition under "stream integrity
+ service".
+
+ 2. (I) /threat action/ See: secondary definition under
+ "falsification".
+
+ $ inside attack
+ (I) See: secondary definition under "attack". Compare: insider.
+
+
+
+Shirey Informational [Page 154]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ insider
+ 1. (I) A user (usually a person) that accesses a system from a
+ position that is inside the system's security perimeter. (Compare:
+ authorized user, outsider, unauthorized user.)
+
+ Tutorial: An insider has been assigned a role that has more
+ privileges to access system resources than do some other types of
+ users, or can access those resources without being constrained by
+ some access controls that are applied to outside users. For
+ example, a salesclerk is an insider who has access to the cash
+ register, but a store customer is an outsider.
+
+ The actions performed by an insider in accessing the system may be
+ either authorized or unauthorized; i.e., an insider may act either
+ as an authorized user or as an unauthorized user.
+
+ 2. (O) A person with authorized physical access to the system.
+ Example: In this sense, an office janitor is an insider, but a
+ burglar or casual visitor is not. [NRC98]
+
+ 3. (O) A person with an organizational status that causes the
+ system or members of the organization to view access requests as
+ being authorized. Example: In this sense, a purchasing agent is an
+ insider but a vendor is not. [NRC98]
+
+ $ inspectable space
+ (O) /EMSEC/ "Three-dimensional space surrounding equipment that
+ process classified and/or sensitive information within which
+ TEMPEST exploitation is not considered practical or where legal
+ authority to identify and/or remove a potential TEMPEST
+ exploitation exists." [C4009] (Compare: control zone, TEMPEST
+ zone.)
+
+ $ Institute of Electrical and Electronics Engineers, Inc. (IEEE)
+ (N) The IEEE is a not-for-profit association of approximately
+ 300,000 individual members in 150 countries. The IEEE produces
+ nearly one third of the world's published literature in electrical
+ engineering, computers, and control technology; holds hundreds of
+ major, annual conferences; and maintains more than 800 active
+ standards, with many more under development. (See: SILS.)
+
+ $ integrity
+ See: data integrity, datagram integrity service, correctness
+ integrity, source integrity, stream integrity service, system
+ integrity.
+
+
+
+
+
+
+Shirey Informational [Page 155]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ integrity check
+ (D) A computation that is part of a mechanism to provide data
+ integrity service or data origin authentication service. (Compare:
+ checksum.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ "cryptographic hash" or "protected checksum". This term
+ unnecessarily duplicates the meaning of other, well-established
+ terms; this term only mentions integrity, even though the intended
+ service may be data origin authentication; and not every checksum
+ is cryptographically protected.
+
+ $ integrity label
+ (I) A security label that tells the degree of confidence that may
+ be placed in the data, and may also tell what countermeasures are
+ required to be applied to protect the data from alteration and
+ destruction. (See: integrity. Compare: classification label.)
+
+ $ intelligent threat
+ (I) A circumstance in which an adversary has the technical and
+ operational ability to detect and exploit a vulnerability and also
+ has the demonstrated, presumed, or inferred intent to do so. (See:
+ threat.)
+
+ $ interception
+ (I) A type of threat action whereby an unauthorized entity
+ directly accesses sensitive data while the data is traveling
+ between authorized sources and destinations. (See: unauthorized
+ disclosure.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Theft": Gaining access to sensitive data by stealing a
+ shipment of a physical medium, such as a magnetic tape or disk,
+ that holds the data.
+ - "Wiretapping (passive)": Monitoring and recording data that is
+ flowing between two points in a communication system. (See:
+ wiretapping.)
+ - "Emanations analysis": Gaining direct knowledge of communicated
+ data by monitoring and resolving a signal that is emitted by a
+ system and that contains the data but was not intended to
+ communicate the data. (See: emanation.)
+
+ $ interference
+ (I) /threat action/ See: secondary definition under "obstruction".
+
+ $ intermediate CA
+ (D) The CA that issues a cross-certificate to another CA. [X509]
+ (See: cross-certification.)
+
+
+
+Shirey Informational [Page 156]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: IDOCs SHOULD NOT use this term because it is not
+ widely known and mixes concepts in a potentially misleading way.
+ For example, suppose that end entity 1 ("EE1) is in one PKI
+ ("PKI1"), end entity 2 ("EE2) is in another PKI ("PKI2"), and the
+ root in PKI1 ("CA1") cross-certifies the root CA in PKI2 ("CA2").
+ Then, if EE1 constructs the certification path CA1-to-CA2-to-EE2
+ to validate a certificate of EE2, conventional English usage would
+ describe CA2 as being in the "intermediate" position in that path,
+ not CA1.
+
+ $ internal controls
+ (I) /COMPUSEC/ Functions, features, and technical characteristics
+ of computer hardware and software, especially of operating
+ systems. Includes mechanisms to regulate the operation of a
+ computer system with regard to access control, flow control, and
+ inference control. (Compare: external controls.)
+
+ $ International Data Encryption Algorithm (IDEA)
+ (N) A patented, symmetric block cipher that uses a 128-bit key and
+ operates on 64-bit blocks. [Schn] (See: symmetric cryptography.)
+
+ $ International Standard
+ (N) See: secondary definition under "ISO".
+
+ $ International Traffic in Arms Regulations (ITAR)
+ (O) Rules issued by the U.S. State Department, by authority of the
+ Arms Export Control Act (22 U.S.C. 2778), to control export and
+ import of defense articles and defense services, including
+ information security systems, such as cryptographic systems, and
+ TEMPEST suppression technology. (See: type 1 product, Wassenaar
+ Arrangement.)
+
+ $ internet, Internet
+ 1. (I) /not capitalized/ Abbreviation of "internetwork".
+
+ 2. (I) /capitalized/ The Internet is the single, interconnected,
+ worldwide system of commercial, governmental, educational, and
+ other computer networks that share (a) the protocol suite
+ specified by the IAB (RFC 2026) and (b) the name and address
+ spaces managed by the ICANN. (See: Internet Layer, Internet
+ Protocol Suite.)
+
+ Usage: Use with definite article ("the") when using as a noun. For
+ example, say "My LAN is small, but the Internet is large." Don't
+ say "My LAN is small, but Internet is large."
+
+
+
+
+
+
+Shirey Informational [Page 157]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Internet Architecture Board (IAB)
+ (I) A technical advisory group of the ISOC, chartered by the ISOC
+ Trustees to provide oversight of Internet architecture and
+ protocols and, in the context of Internet Standards, a body to
+ which decisions of the IESG may be appealed. Responsible for
+ approving appointments to the IESG from among nominees submitted
+ by the IETF nominating committee. (RFC 2026)
+
+ $ Internet Assigned Numbers Authority (IANA)
+ (I) From the early days of the Internet, the IANA was chartered by
+ the ISOC and the U.S. Government's Federal Network Council to be
+ the central coordination, allocation, and registration body for
+ parameters for Internet protocols. Superseded by ICANN.
+
+ $ Internet Control Message Protocol (ICMP)
+ (I) An Internet Standard protocol (RFC 792) that is used to report
+ error conditions during IP datagram processing and to exchange
+ other information concerning the state of the IP network.
+
+ $ Internet Corporation for Assigned Names and Numbers (ICANN)
+ (I) The non-profit, private corporation that has assumed
+ responsibility for the IP address space allocation, protocol
+ parameter assignment, DNS management, and root server system
+ management functions formerly performed under U.S. Government
+ contract by IANA and other entities.
+
+ Tutorial: The IPS, as defined by the IETF and the IESG, contains
+ numerous parameters, such as Internet addresses, domain names,
+ autonomous system numbers, protocol numbers, port numbers,
+ management information base OIDs, including private enterprise
+ numbers, and many others. The Internet community requires that the
+ values used in these parameter fields be assigned uniquely. ICANN
+ makes those assignments as requested and maintains a registry of
+ the current values.
+
+ ICANN was formed in October 1998, by a coalition of the Internet's
+ business, technical, and academic communities. The U.S. Government
+ designated ICANN to serve as the global consensus entity with
+ responsibility for coordinating four key functions for the
+ Internet: allocation of IP address space, assignment of protocol
+ parameters, management of the DNS, and management of the DNS root
+ server system.
+
+ $ Internet-Draft
+ (I) A working document of the IETF, its areas, and its working
+ groups. (RFC 2026) (Compare: RFC.)
+
+
+
+
+
+Shirey Informational [Page 158]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: The term is customarily hyphenated when used either as a
+ adjective or a noun, even though the latter is not standard
+ English punctuation.
+
+ Tutorial: An Internet-Draft is not an archival document like an
+ RFC is. Instead, an Internet-Draft is a preliminary or working
+ document that is valid for a maximum of six months and may be
+ updated, replaced, or made obsolete by other documents at any
+ time. It is inappropriate to use an Internet-Draft as reference
+ material or to cite it other than as a "work in progress".
+ Although most of the Internet-Drafts are produced by the IETF, any
+ interested organization may request to have its working documents
+ published as Internet-Drafts.
+
+ $ Internet Engineering Steering Group (IESG)
+ (I) The part of the ISOC responsible for technical management of
+ IETF activities and administration of the Internet Standards
+ Process according to procedures approved by the ISOC Trustees.
+ Directly responsible for actions along the "standards track",
+ including final approval of specifications as Internet Standards.
+ Composed of IETF Area Directors and the IETF chairperson, who also
+ chairs the IESG. (RFC 2026)
+
+ $ Internet Engineering Task Force (IETF)
+ (I) A self-organized group of people who make contributions to the
+ development of Internet technology. The principal body engaged in
+ developing Internet Standards, although not itself a part of the
+ ISOC. Composed of Working Groups, which are arranged into Areas
+ (such as the Security Area), each coordinated by one or more Area
+ Directors. Nominations to the IAB and the IESG are made by a
+ committee selected at random from regular IETF meeting attendees
+ who have volunteered. (RFCs 2026, 3935) [R2323]
+
+ $ Internet Key Exchange (IKE)
+ (I) An Internet, IPsec, key-establishment protocol [R4306] for
+ putting in place authenticated keying material (a) for use with
+ ISAKMP and (b) for other security associations, such as in AH and
+ ESP.
+
+ Tutorial: IKE is based on three earlier protocol designs: ISAKMP,
+ OAKLEY, and SKEME.
+
+ $ Internet Layer
+ (I) See: Internet Protocol Suite.
+
+ $ Internet Message Access Protocol, version 4 (IMAP4)
+ (I) An Internet protocol (RFC 2060) by which a client workstation
+ can dynamically access a mailbox on a server host to manipulate
+
+
+
+Shirey Informational [Page 159]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ and retrieve mail messages that the server has received and is
+ holding for the client. (See: POP3.)
+
+ Tutorial: IMAP4 has mechanisms for optionally authenticating a
+ client to a server and providing other security services. (See:
+ IMAP4 AUTHENTICATE.)
+
+ $ Internet Open Trading Protocol (IOTP)
+ (I) An Internet protocol [R2801] proposed as a general framework
+ for Internet commerce, able to encapsulate transactions of various
+ proprietary payment systems (e.g., GeldKarte, Mondex, SET, Visa
+ Cash). Provides optional security services by incorporating
+ various Internet security mechanisms (e.g., MD5) and protocols
+ (e.g., TLS).
+
+ $ Internet Policy Registration Authority (IPRA)
+ (I) An X.509-compliant CA that is the top CA of the Internet
+ certification hierarchy operated under the auspices of the ISOC
+ [R1422]. (See: /PEM/ under "certification hierarchy".)
+
+ $ Internet Private Line Interface (IPLI)
+ (O) A successor to the PLI, updated to use TCP/IP and newer
+ military-grade COMSEC equipment (TSEC/KG-84). The IPLI was a
+ portable, modular system that was developed for use in tactical,
+ packet-radio networks. (See: end-to-end encryption.)
+
+ $ Internet Protocol (IP)
+ (I) An Internet Standard, Internet-Layer protocol that moves
+ datagrams (discrete sets of bits) from one computer to another
+ across an internetwork but does not provide reliable delivery,
+ flow control, sequencing, or other end-to-end services that TCP
+ provides. IP version 4 (IPv4) is specified in RFC 791, and IP
+ version 6 (IPv6) is specified in RFC 2460. (See: IP address,
+ TCP/IP.)
+
+ Tutorial: If IP were used in an OSIRM stack, IP would be placed at
+ the top of Layer 3, above other Layer 3 protocols in the stack.
+
+ In any IPS stack, IP is always present in the Internet Layer and
+ is always placed at the top of that layer, on top of any other
+ protocols that are used in that layer. In some sense, IP is the
+ only protocol specified for the IPS Internet Layer; other
+ protocols used there, such as AH and ESP, are just IP variations.
+
+ $ Internet Protocol security
+ See: IP Security Protocol.
+
+
+
+
+
+Shirey Informational [Page 160]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Internet Protocol Security Option (IPSO)
+ (I) Refers to one of three types of IP security options, which are
+ fields that may be added to an IP datagram for carrying security
+ information about the datagram. (Compare: IPsec.)
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term without a
+ modifier to indicate which of the following three types is meant:
+ - "DoD Basic Security Option" (IP option type 130): Defined for
+ use on U.S. DoD common-use data networks. Identifies the DoD
+ classification level at which the datagram is to be protected
+ and the protection authorities whose rules apply to the
+ datagram. (A "protection authority" is a National Access
+ Program (e.g., GENSER, SIOP-ESI, SCI, NSA, Department of
+ Energy) or Special Access Program that specifies protection
+ rules for transmission and processing of the information
+ contained in the datagram.) [R1108]
+ - "DoD Extended Security Option" (IP option type 133): Permits
+ additional security labeling information, beyond that present
+ in the Basic Security Option, to be supplied in the datagram to
+ meet the needs of registered authorities. [R1108]
+ - "Common IP Security Option" (CIPSO) (IP option type 134):
+ Designed by TSIG to carry hierarchic and non-hierarchic
+ security labels. (Formerly called "Commercial IP Security
+ Option"; a version 2.3 draft was published 9 March 1993 as an
+ Internet-Draft but did not advance to RFC form.) [CIPSO]
+
+ $ Internet Protocol Suite (IPS)
+ (I) The set of network communication protocols that are specified
+ by the IETF, and approved as Internet Standards by the IESG,
+ within the oversight of the IAB. (See: OSIRM Security
+ Architecture. Compare: OSIRM.)
+
+ Usage: This set of protocols is popularly known as "TCP/IP"
+ because TCP and IP are its most basic and important components.
+
+ For clarity, this Glossary refers to IPS protocol layers by name
+ and capitalizes those names, and refers to OSIRM protocol layers
+ by number.
+
+ Tutorial: The IPS does have architectural principles [R1958], but
+ there is no Internet Standard that defines a layered IPS reference
+ model like the OSIRM. Still, Internet community literature has
+ referred (inconsistently) to IPS layers since early in the
+ Internet's development [Padl].
+
+
+
+
+
+
+
+Shirey Informational [Page 161]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ This Glossary treats the IPS as having five protocol layers --
+ Application, Transport, Internet, Network Interface, and Network
+ Hardware (or Network Substrate) -- which are illustrated in the
+ following diagram:
+
+ OSIRM Layers Examples IPS Layers Examples
+ ------------------ --------------- --------------- --------------
+ Message Format: P2 [X420] Message Format: ARPA (RFC 822)
+ +----------------+ +-------------+
+ |7.Application | P1 [X419] | Application | SMTP (RFC 821)
+ +----------------+ - - - - - - | |
+ |6.Presentation | [I8823] | |
+ +----------------+ - - - - - - | |
+ |5.Session | [I8327] +-------------+
+ +----------------+ - - - - - - | Transport | TCP (RFC 793)
+ |4.Transport | TP4 [I8073] | |
+ +----------------+ - - - - - - +-------------+
+ |3.Network | CLNP [I8473] | Internet | IP (RFC 791)
+ | | +-------------+
+ | | | Network | IP over IEEE
+ +----------------+ - - - - - - | Interface | 802 (RFC 1042)
+ |2.Data Link | +-------------+
+ | | LLC [I8802-2] - Network - The IPS does
+ | | MAC [I8802-3] - Hardware - not include
+ +----------------+ - (or Network - standards for
+ |1.Physical | Baseband - Substrate) - this layer.
+ +----------------+ Signaling [Stal] + - - - - - - +
+
+ The diagram approximates how the five IPS layers align with the
+ seven OSIRM layers, and it offers examples of protocol stacks that
+ provide roughly equivalent electronic mail service over a private
+ LAN that uses baseband signaling.
+
+ - IPS Application Layer: The user runs an application program.
+ The program selects the data transport service it needs --
+ either a sequence of data messages or a continuous stream of
+ data -- and hands application data to the Transport Layer for
+ delivery.
+
+ - IPS Transport Layer: This layer divides application data into
+ packets, adds a destination address to each, and communicates
+ them end-to-end -- from one application program to another --
+ optionally regulating the flow and ensuring reliable (error-
+ free and sequenced) delivery.
+
+ - IPS Internet Layer: This layer carries transport packets in IP
+ datagrams. It moves each datagram independently, from its
+ source computer to its addressed destination computer, routing
+
+
+
+Shirey Informational [Page 162]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ the datagram through a sequence of networks and relays and
+ selecting appropriate network interfaces en route.
+
+ - IPS Network Interface Layer: This layer accepts datagrams for
+ transmission over a specific network. This layer specifies
+ interface conventions for carrying IP over OSIRM Layer 3
+ protocols and over Media Access Control sublayer protocols of
+ OSIRM Layer 2. An example is IP over IEEE 802 (RFD 1042).
+
+ - IPS Network Hardware Layer: This layer consists of specific,
+ physical communication media. However, the IPS does not specify
+ its own peer-to-peer protocols in this layer. Instead, the
+ layering conventions specified by the Network Interface Layer
+ use Layer 2 and Layer 3 protocols that are specified by bodies
+ other than the IETF. That is, the IPS addresses *inter*-network
+ functions and does not address *intra*-network functions.
+
+ The two models are most dissimilar in the upper layers, where the
+ IPS model does not include Session and Presentation layers.
+ However, this omission causes fewer functional differences between
+ the models than might be imagined, and the differences have
+ relatively few security implications:
+
+ - Formal separation of OSIRM Layers 5, 6, and 7 is not needed in
+ implementations; the functions of these layers sometimes are
+ mixed in a single software unit, even in protocols in the OSI
+ suite.
+
+ - Some OSIRM Layer 5 services -- for example, connection
+ termination -- are built into TCP, and the remaining Layer 5
+ and 6 functions are built into IPS Application-Layer protocols
+ where needed.
+
+ - The OSIRM does not place any security services in Layer 5 (see:
+ OSIRM Security Architecture).
+
+ - The lack of an explicit Presentation Layer in the IPS sometimes
+ makes it simpler to implement security in IPS applications. For
+ example, a primary function of Layer 6 is to convert data
+ between internal and external forms, using a transfer syntax to
+ unambiguously encode data for transmission. If an OSIRM
+ application encrypts data to protect against disclosure during
+ transmission, the transfer encoding must be done before the
+ encryption. If an application does encryption, as is done in
+ OSI message handling and directory service protocols, then
+ Layer 6 functions must be replicated in Layer 7. [X400, X500].
+
+
+
+
+
+Shirey Informational [Page 163]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ The two models are most alike at the top of OSIRM Layer 3, where
+ the OSI Connectionless Network Layer Protocol (CLNP) and the IPS
+ IP are quite similar. Connection-oriented security services
+ offered in OSIRM Layer 3 are inapplicable in the IPS, because the
+ IPS Internet Layer lacks the explicit, connection-oriented service
+ offered in the OSIRM.
+
+ $ Internet Security Association and Key Management Protocol (ISAKMP)
+ (I) An Internet IPsec protocol [R2408] to negotiate, establish,
+ modify, and delete security associations, and to exchange key
+ generation and authentication data, independent of the details of
+ any specific key generation technique, key establishment protocol,
+ encryption algorithm, or authentication mechanism.
+
+ Tutorial: ISAKMP supports negotiation of security associations for
+ protocols at all IPS layers. By centralizing management of
+ security associations, ISAKMP reduces duplicated functionality
+ within each protocol. ISAKMP can also reduce connection setup
+ time, by negotiating a whole stack of services at once. Strong
+ authentication is required on ISAKMP exchanges, and a digital
+ signature algorithm based on asymmetric cryptography is used
+ within ISAKMP's authentication component.
+
+ ISAKMP negotiations are conducted in two "phases":
+ - "Phase 1 negotiation". A phase 1 negotiation establishes a
+ security association to be used by ISAKMP to protect its own
+ protocol operations.
+ - "Phase 2 negotiation". A phase 2 negotiation (which is
+ protected by a security association that was established by a
+ phase 1 negotiation) establishes a security association to be
+ used to protect the operations of a protocol other than ISAKMP,
+ such as ESP.
+
+ $ Internet Society (ISOC)
+ (I) A professional society concerned with Internet development
+ (including technical Internet Standards); with how the Internet is
+ and can be used; and with social, political, and technical issues
+ that result. The ISOC Board of Trustees approves appointments to
+ the IAB from among nominees submitted by the IETF nominating
+ committee. (RFC 2026)
+
+ $ Internet Standard
+ (I) A specification, approved by the IESG and published as an RFC,
+ that is stable and well-understood, is technically competent, has
+ multiple, independent, and interoperable implementations with
+ substantial operational experience, enjoys significant public
+ support, and is recognizably useful in some or all parts of the
+ Internet. (RFC 2026) (Compare: RFC.)
+
+
+
+Shirey Informational [Page 164]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: The "Internet Standards Process" is an activity of the
+ ISOC and is organized and managed by the IAB and the IESG. The
+ process is concerned with all protocols, procedures, and
+ conventions used in or by the Internet, whether or not they are
+ part of the IPS. The "Internet Standards Track" has three levels
+ of increasing maturity: Proposed Standard, Draft Standard, and
+ Standard. (Compare: ISO, W3C.)
+
+ $ internetwork
+ (I) A system of interconnected networks; a network of networks.
+ Usually shortened to "internet". (See: internet, Internet.)
+
+ Tutorial: An internet can be built using OSIRM Layer 3 gateways to
+ implement connections between a set of similar subnetworks. With
+ dissimilar subnetworks, i.e., subnetworks that differ in the Layer
+ 3 protocol service they offer, an internet can be built by
+ implementing a uniform internetwork protocol (e.g., IP) that
+ operates at the top of Layer 3 and hides the underlying
+ subnetworks' heterogeneity from hosts that use communication
+ services provided by the internet. (See: router.)
+
+ $ intranet
+ (I) A computer network, especially one based on Internet
+ technology, that an organization uses for its own internal (and
+ usually private) purposes and that is closed to outsiders. (See:
+ extranet, VPN.)
+
+ $ intruder
+ (I) An entity that gains or attempts to gain access to a system or
+ system resource without having authorization to do so. (See:
+ intrusion. Compare: adversary, cracker, hacker.)
+
+ $ intrusion
+ 1. (I) A security event, or a combination of multiple security
+ events, that constitutes a security incident in which an intruder
+ gains, or attempts to gain, access to a system or system resource
+ without having authorization to do so. (See: IDS.)
+
+ 2. (I) A type of threat action whereby an unauthorized entity
+ gains access to sensitive data by circumventing a system's
+ security protections. (See: unauthorized disclosure.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Trespass": Gaining physical access to sensitive data by
+ circumventing a system's protections.
+ - "Penetration": Gaining logical access to sensitive data by
+ circumventing a system's protections.
+
+
+
+
+Shirey Informational [Page 165]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - "Reverse engineering": Acquiring sensitive data by
+ disassembling and analyzing the design of a system component.
+ - "Cryptanalysis": Transforming encrypted data into plain text
+ without having prior knowledge of encryption parameters or
+ processes. (See: main entry for "cryptanalysis".)
+
+ $ intrusion detection
+ (I) Sensing and analyzing system events for the purpose of
+ noticing (i.e., becoming aware of) attempts to access system
+ resources in an unauthorized manner. (See: anomaly detection, IDS,
+ misuse detection. Compare: extrusion detection.) [IDSAN, IDSSC,
+ IDSSE, IDSSY]
+
+ Usage: This includes the following subtypes:
+ - "Active detection": Real-time or near-real-time analysis of
+ system event data to detect current intrusions, which result in
+ an immediate protective response.
+ - "Passive detection": Off-line analysis of audit data to detect
+ past intrusions, which are reported to the system security
+ officer for corrective action. (Compare: security audit.)
+
+ $ intrusion detection system (IDS)
+ 1. (N) A process or subsystem, implemented in software or
+ hardware, that automates the tasks of (a) monitoring events that
+ occur in a computer network and (b) analyzing them for signs of
+ security problems. [SP31] (See: intrusion detection.)
+
+ 2. (N) A security alarm system to detect unauthorized entry.
+ [DC6/9].
+
+ Tutorial: Active intrusion detection processes can be either host-
+ based or network-based:
+ - "Host-based": Intrusion detection components -- traffic sensors
+ and analyzers -- run directly on the hosts that they are
+ intended to protect.
+ - "Network-based": Sensors are placed on subnetwork components,
+ and analysis components run either on subnetwork components or
+ hosts.
+
+ $ invalidity date
+ (N) An X.509 CRL entry extension that "indicates the date at which
+ it is known or suspected that the [revoked certificate's private
+ key] was compromised or that the certificate should otherwise be
+ considered invalid." [X509].
+
+ Tutorial: This date may be earlier than the revocation date in the
+ CRL entry, and may even be earlier than the date of issue of
+ earlier CRLs. However, the invalidity date is not, by itself,
+
+
+
+Shirey Informational [Page 166]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ sufficient for purposes of non-repudiation service. For example,
+ to fraudulently repudiate a validly generated signature, a private
+ key holder may falsely claim that the key was compromised at some
+ time in the past.
+
+ $ IOTP
+ (I) See: Internet Open Trading Protocol.
+
+ $ IP
+ (I) See: Internet Protocol.
+
+ $ IP address
+ (I) A computer's internetwork address that is assigned for use by
+ IP and other protocols.
+
+ Tutorial: An IP version 4 address (RFC 791) has four 8-bit parts
+ and is written as a series of four decimal numbers separated by
+ periods. Example: The address of the host named "rosslyn.bbn.com"
+ is 192.1.7.10.
+
+ An IP version 6 address (RFC 2373) has eight 16-bit parts and is
+ written as eight hexadecimal numbers separated by colons.
+ Examples: 1080:0:0:0:8:800:200C:417A and
+ FEDC:BA98:7654:3210:FEDC:BA98:7654:3210.
+
+ $ IP Security Option
+ (I) See: Internet Protocol Security Option.
+
+ $ IP Security Protocol (IPsec)
+ 1a. (I) The name of the IETF working group that is specifying an
+ architecture [R2401, R4301] and set of protocols to provide
+ security services for IP traffic. (See: AH, ESP, IKE, SAD, SPD.
+ Compare: IPSO.)
+
+ 1b. (I) A collective name for the IP security architecture [R4301]
+ and associated set of protocols (primarily AH, ESP, and IKE).
+
+ Usage: In IDOCs that use the abbreviation "IPsec", the letters
+ "IP" SHOULD be in uppercase, and the letters "sec" SHOULD NOT.
+
+ Tutorial: The security services provided by IPsec include access
+ control service, connectionless data integrity service, data
+ origin authentication service, protection against replays
+ (detection of the arrival of duplicate datagrams, within a
+ constrained window), data confidentiality service, and limited
+ traffic-flow confidentiality. IPsec specifies (a) security
+ protocols (AH and ESP), (b) security associations (what they are,
+ how they work, how they are managed, and associated processing),
+
+
+
+Shirey Informational [Page 167]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ (c) key management (IKE), and (d) algorithms for authentication
+ and encryption. Implementation of IPsec is optional for IP version
+ 4, but mandatory for IP version 6. (See: transport mode, tunnel
+ mode.)
+
+ $ IPLI
+ (I) See: Internet Private Line Interface.
+
+ $ IPRA
+ (I) See: Internet Policy Registration Authority.
+
+ $ IPS
+ (I) See: Internet Protocol Suite.
+
+ $ IPsec
+ (I) See: IP Security Protocol.
+
+ $ IPSO
+ (I) See: Internet Protocol Security Option.
+
+ $ ISAKMP
+ (I) See: Internet Security Association and Key Management
+ Protocol.
+
+ $ ISO
+ (I) International Organization for Standardization, a voluntary,
+ non-treaty, non-governmental organization, established in 1947,
+ with voting members that are designated standards bodies of
+ participating nations and non-voting observer organizations.
+ (Compare: ANSI, IETF, ITU-T, W3C.)
+
+ Tutorial: Legally, ISO is a Swiss, non-profit, private
+ organization. ISO and the IEC (the International Electrotechnical
+ Commission) form the specialized system for worldwide
+ standardization. National bodies that are members of ISO or IEC
+ participate in developing international standards through ISO and
+ IEC technical committees that deal with particular fields of
+ activity. Other international governmental and non-governmental
+ organizations, in liaison with ISO and IEC, also take part. (ANSI
+ is the U.S. voting member of ISO. ISO is a class D member of ITU-
+ T.)
+
+ The ISO standards development process has four levels of
+ increasing maturity: Working Draft (WD), Committee Draft (CD),
+ Draft International Standard (DIS), and International Standard
+ (IS). (Compare: "Internet Standards Track" under "Internet
+ Standard".) In information technology, ISO and IEC have a joint
+ technical committee, ISO/IEC JTC 1. DISs adopted by JTC 1 are
+
+
+
+Shirey Informational [Page 168]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ circulated to national bodies for voting, and publication as an IS
+ requires approval by at least 75% of the national bodies casting a
+ vote.
+
+ $ ISO 17799
+ (N) An International Standard that is a code of practice, derived
+ from Part 1 of British Standard 7799, for managing the security of
+ information systems in an organization. This standard does not
+ provide definitive or specific material on any security topic. It
+ provides general guidance on a wide variety of topics, but
+ typically does not go into depth. (See: IATF, [SP14].)
+
+ $ ISOC
+ (I) See: Internet Society.
+
+ $ issue
+ (I) /PKI/ Generate and sign a digital certificate (or a CRL) and,
+ usually, distribute it and make it available to potential
+ certificate users (or CRL users). (See: certificate creation.)
+
+ Usage: The term "issuing" is usually understood to refer not only
+ to creating a digital certificate (or a CRL) but also to making it
+ available to potential users, such as by storing it in a
+ repository or other directory or otherwise publishing it. However,
+ the ABA [DSG] explicitly limits this term to the creation process
+ and excludes any related publishing or distribution process.
+
+ $ issuer
+ 1. (I) /certificate, CRL/ The CA that signs a digital certificate
+ or CRL.
+
+ Tutorial: An X.509 certificate always includes the issuer's name.
+ The name may include a common name value.
+
+ 2. (O) /payment card, SET/ "The financial institution or its agent
+ that issues the unique primary account number to the cardholder
+ for the payment card brand." [SET2]
+
+ Tutorial: The institution that establishes the account for a
+ cardholder and issues the payment card also guarantees payment for
+ authorized transactions that use the card in accordance with card
+ brand regulations and local legislation. [SET1]
+
+ $ ITAR
+ (O) See: International Traffic in Arms Regulations.
+
+ $ ITSEC
+ (N) See: Information Technology System Evaluation Criteria.
+
+
+
+Shirey Informational [Page 169]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ ITU-T
+ (N) International Telecommunications Union, Telecommunication
+ Standardization Sector (formerly "CCITT"), a United Nations treaty
+ organization that is composed mainly of postal, telephone, and
+ telegraph authorities of the member countries and that publishes
+ standards called "Recommendations". (See: X.400, X.500.)
+
+ Tutorial: The Department of State represents the United States.
+ ITU-T works on many kinds of communication systems. ITU-T
+ cooperates with ISO on communication protocol standards, and many
+ Recommendations in that area are also published as an ISO standard
+ with an ISO name and number.
+
+ $ IV
+ (I) See: initialization value.
+
+ $ jamming
+ (N) An attack that attempts to interfere with the reception of
+ broadcast communications. (See: anti-jam, denial of service.
+ Compare: flooding.)
+
+ Tutorial: Jamming uses "interference" as a type of "obstruction"
+ intended to cause "disruption". Jamming a broadcast signal is
+ typically done by broadcasting a second signal that receivers
+ cannot separate from the first one. Jamming is mainly thought of
+ in the context of wireless communication, but also can be done in
+ some wired technologies, such as LANs that use contention
+ techniques to share a broadcast medium.
+
+ $ KAK
+ (D) See: key-auto-key. (Compare: KEK.)
+
+ $ KDC
+ (I) See: Key Distribution Center.
+
+ $ KEA
+ (N) See: Key Exchange Algorithm.
+
+ $ KEK
+ (I) See: key-encrypting key. (Compare: KAK.)
+
+ $ Kerberos
+ (I) A system developed at the Massachusetts Institute of
+ Technology that depends on passwords and symmetric cryptography
+ (DES) to implement ticket-based, peer entity authentication
+ service and access control service distributed in a client-server
+ network environment. [R4120, Stei] (See: realm.)
+
+
+
+
+Shirey Informational [Page 170]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Kerberos was originally developed by Project Athena and
+ is named for the mythical three-headed dog that guards Hades. The
+ system architecture includes authentication servers and ticket-
+ granting servers that function as an ACC and a KDC.
+
+ RFC 4556 describes extensions to the Kerberos specification that
+ modify the initial authentication exchange between a client and
+ the KDC. The extensions employ public-key cryptography to enable
+ the client and KDC to mutually authenticate and establish shared,
+ symmetric keys that are used to complete the exchange. (See:
+ PKINIT.)
+
+ $ kernel
+ (I) A small, trusted part of a system that provides services on
+ which the other parts of the system depend. (See: security
+ kernel.)
+
+ $ Kernelized Secure Operating System (KSOS)
+ (O) An MLS computer operating system, designed to be a provably
+ secure replacement for UNIX Version 6, and consisting of a
+ security kernel, non-kernel security-related utility programs, and
+ optional UNIX application development and support environments.
+ [Perr]
+
+ Tutorial: KSOS-6 was the implementation on a SCOMP. KSOS-11 was
+ the implementation by Ford Aerospace and Communications
+ Corporation on the DEC PDP-11/45 and PDP-11/70 computers.
+
+ $ key
+ 1a. (I) /cryptography/ An input parameter used to vary a
+ transformation function performed by a cryptographic algorithm.
+ (See: private key, public key, storage key, symmetric key, traffic
+ key. Compare: initialization value.)
+
+ 1b. (O) /cryptography/ Used in singular form as a collective noun
+ referring to keys or keying material. Example: A fill device can
+ be used transfer key between two cryptographic devices.
+
+ 2. (I) /anti-jam/ An input parameter used to vary a process that
+ determines patterns for an anti-jam measure. (See: frequency
+ hopping, spread spectrum.)
+
+ Tutorial: A key is usually specified as a sequence of bits or
+ other symbols. If a key value needs to be kept secret, the
+ sequence of symbols that comprise it should be random, or at least
+ pseudorandom, because that makes the key harder for an adversary
+ to guess. (See: brute-force attack, cryptanalysis, strength.)
+
+
+
+
+Shirey Informational [Page 171]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ key agreement (algorithm or protocol)
+ 1. (I) A key establishment method (especially one involving
+ asymmetric cryptography) by which two or more entities, without
+ prior arrangement except a public exchange of data (such as public
+ keys), each can generate the same key value. That is, the method
+ does not send a secret from one entity to the other; instead, both
+ entities, without prior arrangement except a public exchange of
+ data, can compute the same secret value, but that value cannot be
+ computed by other, unauthorized entities. (See: Diffie-Hellman-
+ Merkle, key establishment, KEA, MQV. Compare: key transport.)
+
+ 2. (O) "A method for negotiating a key value on line without
+ transferring the key, even in an encrypted form, e.g., the Diffie-
+ Hellman technique." [X509] (See: Diffie-Hellman-Merkle.)
+
+ 3. (O) "The procedure whereby two different parties generate
+ shared symmetric keys such that any of the shared symmetric keys
+ is a function of the information contributed by all legitimate
+ participants, so that no party [alone] can predetermine the value
+ of the key." [A9042]
+
+ Example: A message originator and the intended recipient can each
+ use their own private key and the other's public key with the
+ Diffie-Hellman-Merkle algorithm to first compute a shared secret
+ value and, from that value, derive a session key to encrypt the
+ message.
+
+ $ key authentication
+ (N) "The assurance of the legitimate participants in a key
+ agreement [i.e., in a key-agreement protocol] that no non-
+ legitimate party possesses the shared symmetric key." [A9042]
+
+ $ key-auto-key (KAK)
+ (D) "Cryptographic logic [i.e., a mode of operation] using
+ previous key to produce key." [C4009, A1523] (See: CTAK,
+ /cryptographic operation/ under "mode".)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it is neither
+ well-known nor precisely defined. Instead, use terms associated
+ with modes that are defined in standards, such as CBC, CFB, and
+ OFB.
+
+ $ key center
+ (I) A centralized, key-distribution process (used in symmetric
+ cryptography), usually a separate computer system, that uses
+ master keys (i.e., KEKs) to encrypt and distribute session keys
+ needed by a community of users.
+
+
+
+
+Shirey Informational [Page 172]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: An ANSI standard [A9017] defines two types of key
+ center: "key distribution center" and "key translation center".
+
+ $ key confirmation
+ (N) "The assurance [provided to] the legitimate participants in a
+ key establishment protocol that the [parties that are intended to
+ share] the symmetric key actually possess the shared symmetric
+ key." [A9042]
+
+ $ key distribution
+ (I) A process that delivers a cryptographic key from the location
+ where it is generated to the locations where it is used in a
+ cryptographic algorithm. (See: key establishment, key management.)
+
+ $ key distribution center (KDC)
+ 1. (I) A type of key center (used in symmetric cryptography) that
+ implements a key-distribution protocol to provide keys (usually,
+ session keys) to two (or more) entities that wish to communicate
+ securely. (Compare: key translation center.)
+
+ 2. (N) "COMSEC facility generating and distributing key in
+ electrical form." [C4009]
+
+ Tutorial: A KDC distributes keys to Alice and Bob, who (a) wish to
+ communicate with each other but do not currently share keys, (b)
+ each share a KEK with the KDC, and (c) may not be able to generate
+ or acquire keys by themselves. Alice requests the keys from the
+ KDC. The KDC generates or acquires the keys and makes two
+ identical sets. The KDC encrypts one set in the KEK it shares with
+ Alice, and sends that encrypted set to Alice. The KDC encrypts the
+ second set in the KEK it shares with Bob, and either (a) sends
+ that encrypted set to Alice for her to forward to Bob or (b) sends
+ it directly to Bob (although the latter option is not supported in
+ the ANSI standard [A9017]).
+
+ $ key encapsulation
+ (N) A key recovery technique for storing knowledge of a
+ cryptographic key by encrypting it with another key and ensuring
+ that only certain third parties called "recovery agents" can
+ perform the decryption operation to retrieve the stored key. Key
+ encapsulation typically permits direct retrieval of a secret key
+ used to provide data confidentiality. (Compare: key escrow.)
+
+ $ key-encrypting key (KEK)
+ (I) A cryptographic key that (a) is used to encrypt other keys
+ (either DEKs or other TEKs) for transmission or storage but (b)
+ (usually) is not used to encrypt application data. Usage:
+ Sometimes called "key-encryption key".
+
+
+
+Shirey Informational [Page 173]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ key escrow
+ (N) A key recovery technique for storing knowledge of a
+ cryptographic key or parts thereof in the custody of one or more
+ third parties called "escrow agents", so that the key can be
+ recovered and used in specified circumstances. (Compare: key
+ encapsulation.)
+
+ Tutorial: Key escrow is typically implemented with split knowledge
+ techniques. For example, the Escrowed Encryption Standard [FP185]
+ entrusts two components of a device-unique split key to separate
+ escrow agents. The agents provide the components only to someone
+ legally authorized to conduct electronic surveillance of
+ telecommunications encrypted by that specific device. The
+ components are used to reconstruct the device-unique key, and it
+ is used to obtain the session key needed to decrypt
+ communications.
+
+ $ key establishment (algorithm or protocol)
+ 1. (I) A procedure that combines the key-generation and key-
+ distribution steps needed to set up or install a secure
+ communication association.
+
+ 2. (I) A procedure that results in keying material being shared
+ among two or more system entities. [A9042, SP56]
+
+ Tutorial: The two basic techniques for key establishment are "key
+ agreement" and "key transport".
+
+ $ Key Exchange Algorithm (KEA)
+ (N) A key-agreement method [SKIP, R2773] that is based on the
+ Diffie-Hellman-Merkle algorithm and uses 1024-bit asymmetric keys.
+ (See: CAPSTONE, CLIPPER, FORTEZZA, SKIPJACK.)
+
+ Tutorial: KEA was developed by NSA and formerly classified at the
+ U.S. DoD "Secret" level. On 23 June 1998, the NSA announced that
+ KEA had been declassified.
+
+ $ key generation
+ (I) A process that creates the sequence of symbols that comprise a
+ cryptographic key. (See: key management.)
+
+ $ key generator
+ 1. (I) An algorithm that uses mathematical rules to
+ deterministically produce a pseudorandom sequence of cryptographic
+ key values.
+
+ 2. (I) An encryption device that incorporates a key-generation
+ mechanism and applies the key to plain text to produce cipher text
+
+
+
+Shirey Informational [Page 174]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ (e.g., by exclusive OR-ing (a) a bit-string representation of the
+ key with (b) a bit-string representation of the plaintext).
+
+ $ key length
+ (I) The number of symbols (usually stated as a number of bits)
+ needed to be able to represent any of the possible values of a
+ cryptographic key. (See: key space.)
+
+ $ key lifetime
+ 1. (D) Synonym for "cryptoperiod".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 1 because a key's cryptoperiod may be only a part of
+ the key's lifetime. A key could be generated at some time prior to
+ when its cryptoperiod begins and might not be destroyed (i.e.,
+ zeroized) until some time after its cryptoperiod ends.
+
+ 2. (O) /MISSI/ An attribute of a MISSI key pair that specifies a
+ time span that bounds the validity period of any MISSI X.509
+ public-key certificate that contains the public component of the
+ pair. (See: cryptoperiod.)
+
+ $ key loader
+ (N) Synonym for "fill device".
+
+ $ key loading and initialization facility (KLIF)
+ (N) A place where ECU hardware is activated after being
+ fabricated. (Compare: CLEF.)
+
+ Tutorial: Before going to its KLIF, an ECU is not ready to be
+ fielded, usually because it is not yet able to receive DEKs. The
+ KLIF employs trusted processes to complete the ECU by installing
+ needed data such as KEKs, seed values, and, in some cases,
+ cryptographic software. After KLIF processing, the ECU is ready
+ for deployment.
+
+ $ key management
+ 1a. (I) The process of handling keying material during its life
+ cycle in a cryptographic system; and the supervision and control
+ of that process. (See: key distribution, key escrow, keying
+ material, public-key infrastructure.)
+
+ Usage: Usually understood to include ordering, generating,
+ storing, archiving, escrowing, distributing, loading, destroying,
+ auditing, and accounting for the material.
+
+ 1b. (O) /NIST/ "The activities involving the handling of
+ cryptographic keys and other related security parameters (e.g.,
+
+
+
+Shirey Informational [Page 175]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ IVs, counters) during the entire life cycle of the keys, including
+ their generation, storage, distribution, entry and use, deletion
+ or destruction, and archiving." [FP140, SP57]
+
+ 2. (O) /OSIRM/ "The generation, storage, distribution, deletion,
+ archiving and application of keys in accordance with a security
+ policy." [I7498-2]
+
+ $ Key Management Protocol (KMP)
+ (N) A protocol to establish a shared symmetric key between a pair
+ (or a group) of users. (One version of KMP was developed by SDNS,
+ and another by SILS.) Superseded by ISAKMP and IKE.
+
+ $ key material
+ (D) Synonym for "keying material".
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term as a synonym for
+ "keying material".
+
+ $ key pair
+ (I) A set of mathematically related keys -- a public key and a
+ private key -- that are used for asymmetric cryptography and are
+ generated in a way that makes it computationally infeasible to
+ derive the private key from knowledge of the public key. (See:
+ Diffie-Hellman-Merkle, RSA.)
+
+ Tutorial: A key pair's owner discloses the public key to other
+ system entities so they can use the key to (a) encrypt data, (b)
+ verify a digital signature, or (c) generate a key with a key-
+ agreement algorithm. The matching private key is kept secret by
+ the owner, who uses it to (a') decrypt data, (b') generate a
+ digital signature, or (c') generate a key with a key-agreement
+ algorithm.
+
+ $ key recovery
+ 1. (I) /cryptanalysis/ A process for learning the value of a
+ cryptographic key that was previously used to perform some
+ cryptographic operation. (See: cryptanalysis, recovery.)
+
+ 2. (I) /backup/ Techniques that provide an intentional, alternate
+ means to access the key used for data confidentiality service in
+ an encrypted association. [DoD4] (Compare: recovery.)
+
+ Tutorial: It is assumed that the cryptographic system includes a
+ primary means of obtaining the key through a key-establishment
+ algorithm or protocol. For the secondary means, there are two
+ classes of key recovery techniques: key encapsulation and key
+ escrow.
+
+
+
+Shirey Informational [Page 176]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ key space
+ (I) The range of possible values of a cryptographic key; or the
+ number of distinct transformations supported by a particular
+ cryptographic algorithm. (See: key length.)
+
+ $ key translation center
+ (I) A type of key center that implements a key-distribution
+ protocol (based on symmetric cryptography) to convey keys between
+ two (or more) parties who wish to communicate securely. (Compare:
+ key distribution center.)
+
+ Tutorial: A key translation center transfers keys for future
+ communication between Bob and Alice, who (a) wish to communicate
+ with each other but do not currently share keys, (b) each share a
+ KEK with the center, and (c) have the ability to generate or
+ acquire keys by themselves. Alice generates or acquires a set of
+ keys for communication with Bob. Alice encrypts the set in the KEK
+ she shares with the center and sends the encrypted set to the
+ center. The center decrypts the set, reencrypts the set in the KEK
+ it shares with Bob, and either (a) sends that reencrypted set to
+ Alice for her to forward to Bob or (b) sends it directly to Bob
+ (although direct distribution is not supported in the ANSI
+ standard [A9017]).
+
+ $ key transport (algorithm or protocol)
+ 1. (I) A key establishment method by which a secret key is
+ generated by a system entity in a communication association and
+ securely sent to another entity in the association. (Compare: key
+ agreement.)
+
+ Tutorial: Either (a) one entity generates a secret key and
+ securely sends it to the other entity, or (b) each entity
+ generates a secret value and securely sends it to the other
+ entity, where the two values are combined to form a secret key.
+ For example, a message originator can generate a random session
+ key and then use the RSA algorithm to encrypt that key with the
+ public key of the intended recipient.
+
+ 2. (O) "The procedure to send a symmetric key from one party to
+ other parties. As a result, all legitimate participants share a
+ common symmetric key in such a way that the symmetric key is
+ determined entirely by one party." [A9042]
+
+ $ key update
+ 1. (I) Derive a new key from an existing key. (Compare: rekey.)
+
+ 2. (O) Irreversible cryptographic process that modifies a key to
+ produce a new key. [C4009]
+
+
+
+Shirey Informational [Page 177]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ key validation
+ 1. (I) "The procedure for the receiver of a public key to check
+ that the key conforms to the arithmetic requirements for such a
+ key in order to thwart certain types of attacks." [A9042] (See:
+ weak key)
+
+ 2. (D) Synonym for "certificate validation".
+
+ Deprecated Usage: IDOCs SHOULD NOT use the term as a synonym for
+ "certificate validation"; that would unnecessarily duplicate the
+ meaning of the latter term and mix concepts in a potentially
+ misleading way. In validating an X.509 public-key certificate, the
+ public key contained in the certificate is normally treated as an
+ opaque data object.
+
+ $ keyed hash
+ (I) A cryptographic hash (e.g., [R1828]) in which the mapping to a
+ hash result is varied by a second input parameter that is a
+ cryptographic key. (See: checksum.)
+
+ Tutorial: If the input data object is changed, a new,
+ corresponding hash result cannot be correctly computed without
+ knowledge of the secret key. Thus, the secret key protects the
+ hash result so it can be used as a checksum even when there is a
+ threat of an active attack on the data. There are two basic types
+ of keyed hash:
+ - A function based on a keyed encryption algorithm. Example: Data
+ Authentication Code.
+ - A function based on a keyless hash that is enhanced by
+ combining (e.g., by concatenating) the input data object
+ parameter with a key parameter before mapping to the hash
+ result. Example: HMAC.
+
+ $ keying material
+ 1. (I) Data that is needed to establish and maintain a
+ cryptographic security association, such as keys, key pairs, and
+ IVs.
+
+ 2. (O) "Key, code, or authentication information in physical or
+ magnetic form." [C4009] (Compare: COMSEC material.)
+
+ $ keying material identifier (KMID)
+ 1. (I) An identifier assigned to an item of keying material.
+
+ 2. (O) /MISSI/ A 64-bit identifier that is assigned to a key pair
+ when the public key is bound in a MISSI X.509 public-key
+ certificate.
+
+
+
+
+Shirey Informational [Page 178]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Khafre
+ (N) A patented, symmetric block cipher designed by Ralph C. Merkle
+ as a plug-in replacement for DES. [Schn]
+
+ Tutorial: Khafre was designed for efficient encryption of small
+ amounts of data. However, because Khafre does not precompute
+ tables used for encryption, it is slower than Khufu for large
+ amounts of data.
+
+ $ Khufu
+ (N) A patented, symmetric block cipher designed by Ralph C. Merkle
+ as a plug-in replacement for DES. [Schn]
+
+ Tutorial: Khufu was designed for fast encryption of large amounts
+ of data. However, because Khufu precomputes tables used in
+ encryption, it is less efficient than Khafre for small amounts of
+ data.
+
+ $ KLIF
+ (N) See: key loading and initialization facility.
+
+ $ KMID
+ (I) See: keying material identifier.
+
+ $ known-plaintext attack
+ (I) A cryptanalysis technique in which the analyst tries to
+ determine the key from knowledge of some plaintext-ciphertext
+ pairs (although the analyst may also have other clues, such as
+ knowing the cryptographic algorithm).
+
+ $ kracker
+ (O) Old spelling for "cracker".
+
+ $ KSOS, KSOS-6, KSOS-11
+ (O) See: Kernelized Secure Operating System.
+
+ $ L2F
+ (N) See: Layer 2 Forwarding Protocol.
+
+ $ L2TP
+ (N) See: Layer 2 Tunneling Protocol.
+
+ $ label
+ See: time stamp, security label.
+
+
+
+
+
+
+
+Shirey Informational [Page 179]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ laboratory attack
+ (O) "Use of sophisticated signal recovery equipment in a
+ laboratory environment to recover information from data storage
+ media." [C4009]
+
+ $ LAN
+ (I) Abbreviation for "local area network" [R1983]. (See: [FP191].)
+
+ $ land attack
+ (I) A denial-of-service attack that sends an IP packet that (a)
+ has the same address in both the Source Address and Destination
+ Address fields and (b) contains a TCP SYN packet that has the same
+ port number in both the Source Port and Destination Port fields.
+
+ Derivation: This single-packet attack was named for "land", the
+ program originally published by the cracker who invented this
+ exploit. Perhaps that name was chosen because the inventor thought
+ of multi-packet (i.e., flooding) attacks as arriving by sea.
+
+ $ Language of Temporal Ordering Specification (LOTOS)
+ (N) A language (ISO 8807-1990) for formal specification of
+ computer network protocols; describes the order in which events
+ occur.
+
+ $ lattice
+ (I) A finite set together with a partial ordering on its elements
+ such that for every pair of elements there is a least upper bound
+ and a greatest lower bound.
+
+ Example: A lattice is formed by a finite set S of security levels
+ -- i.e., a set S of all ordered pairs (x,c), where x is one of a
+ finite set X of hierarchically ordered classification levels X(1),
+ non-hierarchical categories C(1), ..., C(M) -- together with the
+ "dominate" relation. Security level (x,c) is said to "dominate"
+ (x',c') if and only if (a) x is greater (higher) than or equal to
+ x' and (b) c includes at least all of the elements of c'. (See:
+ dominate, lattice model.)
+
+ Tutorial: Lattices are used in some branches of cryptography, both
+ as a basis for hard computational problems upon which
+ cryptographic algorithms can be defined, and also as a basis for
+ attacks on cryptographic algorithms.
+
+ $ lattice model
+ 1. (I) A description of the semantic structure formed by a finite
+ set of security levels, such as those used in military
+ organizations. (See: dominate, lattice, security model.)
+
+
+
+
+Shirey Informational [Page 180]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (I) /formal model/ A model for flow control in a system, based
+ on the lattice that is formed by the finite security levels in a
+ system and their partial ordering. [Denn]
+
+ $ Law Enforcement Access Field (LEAF)
+ (N) A data item that is automatically embedded in data encrypted
+ by devices (e.g., CLIPPER chip) that implement the Escrowed
+ Encryption Standard.
+
+ $ Layer 1, 2, 3, 4, 5, 6, 7
+ (N) See: OSIRM.
+
+ $ Layer 2 Forwarding Protocol (L2F)
+ (N) An Internet protocol (originally developed by Cisco
+ Corporation) that uses tunneling of PPP over IP to create a
+ virtual extension of a dial-up link across a network, initiated by
+ the dial-up server and transparent to the dial-up user. (See:
+ L2TP.)
+
+ $ Layer 2 Tunneling Protocol (L2TP)
+ (N) An Internet client-server protocol that combines aspects of
+ PPTP and L2F and supports tunneling of PPP over an IP network or
+ over frame relay or other switched network. (See: VPN.)
+
+ Tutorial: PPP can in turn encapsulate any OSIRM Layer 3 protocol.
+ Thus, L2TP does not specify security services; it depends on
+ protocols layered above and below it to provide any needed
+ security.
+
+ $ LDAP
+ (I) See: Lightweight Directory Access Protocol.
+
+ $ least common mechanism
+ (I) The principle that a security architecture should minimize
+ reliance on mechanisms that are shared by many users.
+
+ Tutorial: Shared mechanisms may include cross-talk paths that
+ permit a breach of data security, and it is difficult to make a
+ single mechanism operate in a correct and trusted manner to the
+ satisfaction of a wide range of users.
+
+ $ least privilege
+ (I) The principle that a security architecture should be designed
+ so that each system entity is granted the minimum system resources
+ and authorizations that the entity needs to do its work. (Compare:
+ economy of mechanism, least trust.)
+
+
+
+
+
+Shirey Informational [Page 181]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: This principle tends to limit damage that can be caused
+ by an accident, error, or unauthorized act. This principle also
+ tends to reduce complexity and promote modularity, which can make
+ certification easier and more effective. This principle is similar
+ to the principle of protocol layering, wherein each layer provides
+ specific, limited communication services, and the functions in one
+ layer are independent of those in other layers.
+
+ $ least trust
+ (I) The principle that a security architecture should be designed
+ in a way that minimizes (a) the number of components that require
+ trust and (b) the extent to which each component is trusted.
+ (Compare: least privilege, trust level.)
+
+ $ legacy system
+ (I) A system that is in operation but will not be improved or
+ expanded while a new system is being developed to supersede it.
+
+ $ legal non-repudiation
+ (I) See: secondary definition under "non-repudiation".
+
+ $ leap of faith
+ 1. (I) /general security/ Operating a system as though it began
+ operation in a secure state, even though it cannot be proven that
+ such a state was established (i.e., even though a security
+ compromise might have occurred at or before the time when
+ operation began).
+
+ 2. (I) /COMSEC/ The initial part, i.e., the first communication
+ step, or steps, of a protocol that is vulnerable to attack
+ (especially a man-in-the-middle attack) during that part but, if
+ that part is completed without being attacked, is subsequently not
+ vulnerable in later steps (i.e., results in a secure communication
+ association for which no man-in-the-middle attack is possible).
+
+ Usage: This term is listed in English dictionaries, but their
+ definitions are broad and can be interpreted in many ways in
+ Internet contexts. Similarly, the definition stated here can be
+ interpreted in several ways. Therefore, IDOCs that use this term
+ (especially IDOCs that are protocol specifications) SHOULD state a
+ more specific definition for it.
+
+ Tutorial: In a protocol, a leap of faith typically consists of
+ accepting a claim of peer identity, data origin, or data integrity
+ without authenticating that claim. When a protocol includes such a
+ step, the protocol might also be designed so that if a man-in-
+ the-middle attack succeeds during the vulnerable first part, then
+ the attacker must remain in the middle for all subsequent
+
+
+
+Shirey Informational [Page 182]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ exchanges or else one of the legitimate parties will be able to
+ detect the attack.
+
+ $ level of concern
+ (N) /U.S. DoD/ A rating assigned to an information system that
+ indicates the extent to which protective measures, techniques, and
+ procedures must be applied. (See: critical, sensitive, level of
+ robustness.)
+
+ $ level of robustness
+ (N) /U.S. DoD/ A characterization of (a) the strength of a
+ security function, mechanism, service, or solution and (b) the
+ assurance (or confidence) that it is implemented and functioning.
+ [Cons, IATF] (See: level of concern.)
+
+ $ Liberty Alliance
+ (O) An international consortium of more than 150 commercial,
+ nonprofit, and governmental organizations that was created in 2001
+ to address technical, business, and policy problems of identity
+ and identity-based Web services and develop a standard for
+ federated network identity that supports current and emerging
+ network devices.
+
+ $ Lightweight Directory Access Protocol (LDAP)
+ (I) An Internet client-server protocol (RFC 3377) that supports
+ basic use of the X.500 Directory (or other directory servers)
+ without incurring the resource requirements of the full Directory
+ Access Protocol (DAP).
+
+ Tutorial: Designed for simple management and browser applications
+ that provide simple read/write interactive directory service.
+ Supports both simple authentication and strong authentication of
+ the client to the directory server.
+
+ $ link
+ 1a. (I) A communication facility or physical medium that can
+ sustain data communications between multiple network nodes, in the
+ protocol layer immediately below IP. (RFC 3753)
+
+ 1b. (I) /subnetwork/ A communication channel connecting subnetwork
+ relays (especially one between two packet switches) that is
+ implemented at OSIRM Layer 2. (See: link encryption.)
+
+ Tutorial: The relay computers assume that links are logically
+ passive. If a computer at one end of a link sends a sequence of
+ bits, the sequence simply arrives at the other end after a finite
+ time, although some bits may have been changed either accidentally
+ (errors) or by active wiretapping.
+
+
+
+Shirey Informational [Page 183]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (I) /World Wide Web/ See: hyperlink.
+
+ $ link encryption
+ (I) Stepwise (link-by-link) protection of data that flows between
+ two points in a network, provided by encrypting data separately on
+ each network link, i.e., by encrypting data when it leaves a host
+ or subnetwork relay and decrypting when it arrives at the next
+ host or relay. Each link may use a different key or even a
+ different algorithm. [R1455] (Compare: end-to-end encryption.)
+
+ $ liveness
+ (I) A property of a communication association or a feature of a
+ communication protocol that provides assurance to the recipient of
+ data that the data is being freshly transmitted by its originator,
+ i.e., that the data is not being replayed, by either the
+ originator or a third party, from a previous transmission. (See:
+ fresh, nonce, replay attack.)
+
+ $ logic bomb
+ (I) Malicious logic that activates when specified conditions are
+ met. Usually intended to cause denial of service or otherwise
+ damage system resources. (See: Trojan horse, virus, worm.)
+
+ $ login
+ 1a. (I) An act by which a system entity establishes a session in
+ which the entity can use system resources. (See: principal,
+ session.)
+
+ 1b. (I) An act by which a system user has its identity
+ authenticated by the system. (See: principal, session.)
+
+ Usage: Usually understood to be accomplished by providing an
+ identifier and matching authentication information (e.g., a
+ password) to a security mechanism that authenticates the user's
+ identity; but sometimes refers to establishing a connection with a
+ server when no authentication or specific authorization is
+ involved.
+
+ Derivation: Refers to "log" file, a security audit trail that
+ records (a) security events, such as the beginning of a session,
+ and (b) the names of the system entities that initiate events.
+
+ $ long title
+ (O) /U.S. Government/ "Descriptive title of [an item of COMSEC
+ material]." [C4009] (Compare: short title.)
+
+
+
+
+
+
+Shirey Informational [Page 184]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ low probability of detection
+ (I) Result of TRANSEC measures used to hide or disguise a
+ communication.
+
+ $ low probability of intercept
+ (I) Result of TRANSEC measures used to prevent interception of a
+ communication.
+
+ $ LOTOS
+ (N) See: Language of Temporal Ordering Specification.
+
+ $ MAC
+ (N) See: mandatory access control, Message Authentication Code.
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because this abbreviation is ambiguous.
+
+ $ magnetic remanence
+ (N) Magnetic representation of residual information remaining on a
+ magnetic medium after the medium has been cleared. [NCS25] (See:
+ clear, degauss, purge.)
+
+ $ main mode
+ (I) See: /IKE/ under "mode".
+
+ $ maintenance hook
+ (N) "Special instructions (trapdoors) in software allowing easy
+ maintenance and additional feature development. Since maintenance
+ hooks frequently allow entry into the code without the usual
+ checks, they are a serious security risk if they are not removed
+ prior to live implementation." [C4009] (See: back door.)
+
+ $ malicious logic
+ (I) Hardware, firmware, or software that is intentionally included
+ or inserted in a system for a harmful purpose. (See: logic bomb,
+ Trojan horse, spyware, virus, worm. Compare: secondary definitions
+ under "corruption", "incapacitation", "masquerade", and "misuse".)
+
+ $ malware
+ (D) A contraction of "malicious software". (See: malicious logic.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it is not listed
+ in most dictionaries and could confuse international readers.
+
+ $ MAN
+ (I) metropolitan area network.
+
+
+
+
+
+Shirey Informational [Page 185]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ man-in-the-middle attack
+ (I) A form of active wiretapping attack in which the attacker
+ intercepts and selectively modifies communicated data to
+ masquerade as one or more of the entities involved in a
+ communication association. (See: hijack attack, piggyback attack.)
+
+ Tutorial: For example, suppose Alice and Bob try to establish a
+ session key by using the Diffie-Hellman-Merkle algorithm without
+ data origin authentication service. A "man in the middle" could
+ (a) block direct communication between Alice and Bob and then (b)
+ masquerade as Alice sending data to Bob, (c) masquerade as Bob
+ sending data to Alice, (d) establish separate session keys with
+ each of them, and (e) function as a clandestine proxy server
+ between them to capture or modify sensitive information that Alice
+ and Bob think they are sending only to each other.
+
+ $ manager
+ (I) A person who controls the service configuration of a system or
+ the functional privileges of operators and other users. (See:
+ administrative security. Compare: operator, SSO, user.)
+
+ $ mandatory access control
+ 1. (I) An access control service that enforces a security policy
+ based on comparing (a) security labels, which indicate how
+ sensitive or critical system resources are, with (b) security
+ clearances, which indicate that system entities are eligible to
+ access certain resources. (See: discretionary access control, MAC,
+ rule-based security policy.)
+
+ Derivation: This kind of access control is called "mandatory"
+ because an entity that has clearance to access a resource is not
+ permitted, just by its own volition, to enable another entity to
+ access that resource.
+
+ 2. (O) "A means of restricting access to objects based on the
+ sensitivity (as represented by a label) of the information
+ contained in the objects and the formal authorization (i.e.,
+ clearance) of subjects to access information of such sensitivity."
+ [DoD1]
+
+ $ manipulation detection code
+ (D) Synonym for "checksum".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ "checksum"; the word "manipulation" implies protection against
+ active attacks, which an ordinary checksum might not provide.
+ Instead, if such protection is intended, use "protected checksum"
+ or some particular type thereof, depending on which is meant. If
+
+
+
+Shirey Informational [Page 186]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ such protection is not intended, use "error detection code" or
+ some specific type of checksum that is not protected.
+
+ $ marking
+ See: time stamp, security marking.
+
+ $ MARS
+ (O) A symmetric, 128-bit block cipher with variable key length
+ (128 to 448 bits), developed by IBM as a candidate for the AES.
+
+ $ Martian
+ (D) /slang/ A packet that arrives unexpectedly at the wrong
+ address or on the wrong network because of incorrect routing or
+ because it has a non-registered or ill-formed IP address. [R1208]
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ masquerade
+ (I) A type of threat action whereby an unauthorized entity gains
+ access to a system or performs a malicious act by illegitimately
+ posing as an authorized entity. (See: deception.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Spoof": Attempt by an unauthorized entity to gain access to a
+ system by posing as an authorized user.
+ - "Malicious logic": In context of masquerade, any hardware,
+ firmware, or software (e.g., Trojan horse) that appears to
+ perform a useful or desirable function, but actually gains
+ unauthorized access to system resources or tricks a user into
+ executing other malicious logic. (See: corruption,
+ incapacitation, main entry for "malicious logic", misuse.)
+
+ $ MCA
+ (O) See: merchant certification authority.
+
+ $ MD2
+ (N) A cryptographic hash [R1319] that produces a 128-bit hash
+ result, was designed by Ron Rivest, and is similar to MD4 and MD5
+ but slower.
+
+ Derivation: Apparently, an abbreviation of "message digest", but
+ that term is deprecated by this Glossary.
+
+
+
+
+
+
+Shirey Informational [Page 187]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ MD4
+ (N) A cryptographic hash [R1320] that produces a 128-bit hash
+ result and was designed by Ron Rivest. (See: Derivation under
+ "MD2", SHA-1.)
+
+ $ MD5
+ (N) A cryptographic hash [R1321] that produces a 128-bit hash
+ result and was designed by Ron Rivest to be an improved version of
+ MD4. (See: Derivation under "MD2".)
+
+ $ merchant
+ (O) /SET/ "A seller of goods, services, and/or other information
+ who accepts payment for these items electronically." [SET2] A
+ merchant may also provide electronic selling services and/or
+ electronic delivery of items for sale. With SET, the merchant can
+ offer its cardholders secure electronic interactions, but a
+ merchant that accepts payment cards is required to have a
+ relationship with an acquirer. [SET1, SET2]
+
+ $ merchant certificate
+ (O) /SET/ A public-key certificate issued to a merchant. Sometimes
+ used to refer to a pair of such certificates where one is for
+ digital signature use and the other is for encryption.
+
+ $ merchant certification authority (MCA)
+ (O) /SET/ A CA that issues digital certificates to merchants and
+ is operated on behalf of a payment card brand, an acquirer, or
+ another party according to brand rules. Acquirers verify and
+ approve requests for merchant certificates prior to issuance by
+ the MCA. An MCA does not issue a CRL, but does distribute CRLs
+ issued by root CAs, brand CAs, geopolitical CAs, and payment
+ gateway CAs. [SET2]
+
+ $ mesh PKI
+ (I) A non-hierarchical PKI architecture in which there are several
+ trusted CAs rather than a single root. Each certificate user bases
+ path validations on the public key of one of the trusted CAs,
+ usually the one that issued that user's own public-key
+ certificate. Rather than having superior-to-subordinate
+ relationships between CAs, the relationships are peer-to-peer, and
+ CAs issue cross-certificates to each other. (Compare: hierarchical
+ PKI, trust-file PKI.)
+
+ $ Message Authentication Code (MAC), message authentication code
+ 1. (N) /capitalized/ A specific ANSI standard for a checksum that
+ is computed with a keyed hash that is based on DES. [A9009] Usage:
+ a.k.a. Data Authentication Code, which is a U.S. Government
+ standard. [FP113] (See: MAC.)
+
+
+
+Shirey Informational [Page 188]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (D) /not capitalized/ Synonym for "error detection code".
+
+ Deprecated Term: IDOCs SHOULD NOT use the uncapitalized form
+ "message authentication code". Instead, use "checksum", "error
+ detection code", "hash", "keyed hash", "Message Authentication
+ Code", or "protected checksum", depending on what is meant. (See:
+ authentication code.)
+
+ The uncapitalized form mixes concepts in a potentially misleading
+ way. The word "message" is misleading because it implies that the
+ mechanism is particularly suitable for or limited to electronic
+ mail (see: Message Handling Systems). The word "authentication" is
+ misleading because the mechanism primarily serves a data integrity
+ function rather than an authentication function. The word "code"
+ is misleading because it implies that either encoding or
+ encryption is involved or that the term refers to computer
+ software.
+
+ $ message digest
+ (D) Synonym for "hash result". (See: cryptographic hash.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ "hash result"; this term unnecessarily duplicates the meaning of
+ the other, more general term and mixes concepts in a potentially
+ misleading way. The word "message" is misleading because it
+ implies that the mechanism is particularly suitable for or limited
+ to electronic mail (see: Message Handling Systems).
+
+ $ message handling system
+ (D) Synonym for the Internet electronic mail system.
+
+ Deprecated Term: IDOCs SHOULD NOT use this term, because it could
+ be confused with Message Handling System. Instead, use "Internet
+ electronic mail" or some other, more specific term.
+
+ $ Message Handling System
+ (O) An ITU-T system concept that encompasses the notion of
+ electronic mail but defines more comprehensive OSI systems and
+ services that enable users to exchange messages on a store-and-
+ forward basis. (The ISO equivalent is "Message Oriented Text
+ Interchange System".) (See: X.400.)
+
+ $ message indicator
+ 1. (D) /cryptographic function/ Synonym for "initialization
+ value". (Compare: indicator.)
+
+ 2. (D) "Sequence of bits transmitted over a communications system
+ for synchronizing cryptographic equipment." [C4009]
+
+
+
+Shirey Informational [Page 189]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ "initialization value"; the term mixes concepts in a potentially
+ misleading way. The word "message" is misleading because it
+ suggests that the mechanism is specific to electronic mail. (See:
+ Message Handling System.)
+
+ $ message integrity check
+ $ message integrity code (MIC)
+ (D) Synonyms for some form of "checksum".
+
+ Deprecated Term: IDOCs SHOULD NOT use these terms for any form of
+ checksum. Instead, use "checksum", "error detection code", "hash",
+ "keyed hash", "Message Authentication Code", or "protected
+ checksum", depending on what is meant.
+
+ These two terms mix concepts in potentially misleading ways. The
+ word "message" is misleading because it suggests that the
+ mechanism is particularly suitable for or limited to electronic
+ mail. The word "integrity" is misleading because the checksum may
+ be used to perform a data origin authentication function rather
+ than an integrity function. The word "code" is misleading because
+ it suggests either that encoding or encryption is involved or that
+ the term refers to computer software.
+
+ $ Message Security Protocol (MSP)
+ (N) A secure message handling protocol [SDNS7] for use with X.400
+ and Internet mail protocols. Developed by NSA's SDNS program and
+ used in the U.S. DoD's Defense Message System.
+
+ $ meta-data
+ (I) Descriptive information about a data object; i.e., data about
+ data, or data labels that describe other data. (See: security
+ label. Compare: metadata)
+
+ Tutorial: Meta-data can serve various management purposes:
+ - System management: File name, type, size, creation date.
+ - Application management: Document title, version, author.
+ - Usage management: Data categories, keywords, classifications.
+
+ Meta-data can be associated with a data object in two basic ways:
+ - Explicitly: Be part of the data object (e.g., a header field of
+ a data file or packet) or be linked to the object.
+ - Implicitly: Be associated with the data object because of some
+ other, explicit attribute of the object.
+
+ $ metadata, Metadata(trademark), METADATA(trademark)
+ (D) Proprietary variants of "meta-data". (See: SPAM(trademark).)
+
+
+
+
+Shirey Informational [Page 190]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Usage: IDOCs SHOULD NOT use these unhypenated forms;
+ IDOCs SHOULD use only the uncapitalized, hyphenated "meta-data".
+ The terms "Metadata" and "METADATA" are claimed as registered
+ trademarks (numbers 1,409,260 and 2,185,504) owned by The Metadata
+ Company, originally known as Metadata Information Partners, a
+ company founded by Jack Myers. The status of "metadata" is
+ unclear.
+
+ $ MHS
+ (N) See: message handling system.
+
+ $ MIC
+ (D) See: message integrity code.
+
+ $ MIME
+ (I) See: Multipurpose Internet Mail Extensions.
+
+ $ MIME Object Security Services (MOSS)
+ (I) An Internet protocol [R1848] that applies end-to-end
+ encryption and digital signature to MIME message content, using
+ symmetric cryptography for encryption and asymmetric cryptography
+ for key distribution and signature. MOSS is based on features and
+ specifications of PEM. (See: S/MIME.)
+
+ $ Minimum Interoperability Specification for PKI Components (MISPC)
+ (N) A technical description to provide a basis for interoperation
+ between PKI components from different vendors; consists primarily
+ of a profile of certificate and CRL extensions and a set of
+ transactions for PKI operation. [SP15]
+
+ $ misappropriation
+ (I) A type of threat action whereby an entity assumes unauthorized
+ logical or physical control of a system resource. (See:
+ usurpation.)
+
+ Usage: This type of threat action includes the following subtypes:
+ - Theft of data: Unauthorized acquisition and use of data
+ contained in a system.
+ - Theft of service: Unauthorized use of a system service.
+ - Theft of functionality: Unauthorized acquisition of actual
+ hardware, firmware, or software of a system component.
+
+ $ MISPC
+ (N) See: Minimum Interoperability Specification for PKI
+ Components.
+
+
+
+
+
+
+Shirey Informational [Page 191]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ MISSI
+ (O) Multilevel Information System Security Initiative, an NSA
+ program to encourage development of interoperable, modular
+ products for constructing secure network information systems in
+ support of a wide variety of U.S. Government missions. (See: MSP,
+ SP3, SP4.)
+
+ $ MISSI user
+ (O) /MISSI/ A system entity that is the subject of one or more
+ MISSI X.509 public-key certificates issued under a MISSI
+ certification hierarchy. (See: personality.)
+
+ Tutorial: MISSI users include both end users and the authorities
+ that issue certificates. A MISSI user is usually a person but may
+ be a machine or other automated process. Machines that are
+ required to operate nonstop may be issued their own certificates
+ to avoid downtime needed to exchange the FORTEZZA cards of machine
+ operators at shift changes.
+
+ $ mission
+ (I) A statement of a (relatively long-term) duty or (relatively
+ short-term) task that is assigned to an organization or system,
+ indicates the purpose and objectives of the duty or task, and may
+ indicate the actions to be taken to achieve it.
+
+ $ mission critical
+ (I) A condition of a system service or other system resource such
+ that denial of access to, or lack of availability of, the resource
+ would jeopardize a system user's ability to perform a primary
+ mission function or would result in other serious consequences.
+ (See: Critical. Compare: mission essential.)
+
+ $ mission essential
+ (O) /U.S. DoD/ Refers to materiel that is authorized and available
+ to combat, combat support, combat service support, and combat
+ readiness training forces to accomplish their assigned missions.
+ [JP1] (Compare: mission critical.)
+
+ $ misuse
+ 1. (I) The intentional use (by authorized users) of system
+ resources for other than authorized purposes. Example: An
+ authorized system administrator creates an unauthorized account
+ for a friend. (See: misuse detection.)
+
+ 2. (I) A type of threat action that causes a system component to
+ perform a function or service that is detrimental to system
+ security. (See: usurpation.)
+
+
+
+
+Shirey Informational [Page 192]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: This type of threat action includes the following subtypes:
+ - "Tampering": /misuse/ Deliberately altering a system's logic,
+ data, or control information to cause the system to perform
+ unauthorized functions or services. (See: corruption, main
+ entry for "tampering".)
+ - "Malicious logic": /misuse/ Any hardware, firmware, or software
+ intentionally introduced into a system to perform or control
+ execution of an unauthorized function or service. (See:
+ corruption, incapacitation, main entry for "malicious logic",
+ masquerade.)
+ - "Violation of authorizations": Action by an entity that exceeds
+ the entity's system privileges by executing an unauthorized
+ function. (See: authorization.)
+
+ $ misuse detection
+ (I) An intrusion detection method that is based on rules that
+ specify system events, sequences of events, or observable
+ properties of a system that are believed to be symptomatic of
+ security incidents. (See: IDS, misuse. Compare: anomaly
+ detection.)
+
+ $ MLS
+ (I) See: multilevel secure
+
+ $ mobile code
+ 1a. (I) Software that originates from a remote server, is
+ transmitted across a network, and is loaded onto and executed on a
+ local client system without explicit initiation by the client's
+ user and, in some cases, without that user's knowledge. (Compare:
+ active content.)
+
+ Tutorial: One form of mobile code is active content in a file that
+ is transferred across a network.
+
+ 1b. (O) /U.S. DoD/ "Software modules obtained from remote systems,
+ transferred across a network, and then downloaded and executed on
+ local systems without explicit installation or execution by the
+ recipient." [JP1]
+
+ 2a. (O) /U.S. DoD/ Technology that enables the creation of
+ executable information that can be delivered to an information
+ system and directly executed on any hardware/software architecture
+ that has an appropriate host execution environment.
+
+ 2b. (O) "Programs (e.g., script, macro, or other portable
+ instruction) that can be shipped unchanged to a heterogeneous
+ collection of platforms and executed with identical semantics"
+ [SP28]. (See: active content.)
+
+
+
+Shirey Informational [Page 193]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Mobile code might be malicious. Using techniques such as
+ "code signing" and a "sandbox" can reduce the risks of receiving
+ and executing mobile code.
+
+ $ mode
+ $ mode of operation
+ 1. (I) /cryptographic operation/ A technique for enhancing the
+ effect of a cryptographic algorithm or adapting the algorithm for
+ an application, such as applying a block cipher to a sequence of
+ data blocks or a data stream. (See: CBC, CCM, CMAC, CFB, CTR, ECB,
+ OFB.)
+
+ 2. (I) /system operation/ A type of security policy that states
+ the range of classification levels of information that a system is
+ permitted to handle and the range of clearances and authorizations
+ of users who are permitted to access the system. (See:
+ compartmented security mode, controlled security mode, dedicated
+ security mode, multilevel security mode, partitioned security
+ mode, system-high security mode. Compare: protection level.)
+
+ 3. (I) /IKE/ IKE refers to its various types of ISAKMP-scripted
+ exchanges of messages as "modes". Among these are the following:
+ - "Main mode": One of IKE's two phase 1 modes. (See: ISAKMP.)
+ - "Quick mode": IKE's only phase 2 mode. (See: ISAKMP.)
+
+ $ model
+ See: formal model, security model.
+
+ $ modulus
+ (I) The defining constant in modular arithmetic, and usually a
+ part of the public key in asymmetric cryptography that is based on
+ modular arithmetic. (See: Diffie-Hellman-Merkle, RSA.)
+
+ $ Mondex
+ (O) A smartcard-based electronic money system that incorporates
+ cryptography and can be used to make payments via the Internet.
+ (See: IOTP.)
+
+ $ Morris Worm
+ (I) A worm program that flooded the ARPANET in November 1988,
+ causing problems for thousands of hosts. [R1135] (See: community
+ risk, worm)
+
+ $ MOSS
+ (I) See: MIME Object Security Services.
+
+
+
+
+
+
+Shirey Informational [Page 194]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ MQV
+ (N) A key-agreement protocol [Mene] that was proposed by A.J.
+ Menezes, M. Qu, and S.A. Vanstone in 1995 and is based on the
+ Diffie-Hellman-Merkle algorithm.
+
+ $ MSP
+ (N) See: Message Security Protocol.
+
+ $ multicast security
+ See: secure multicast
+
+ $ Multics
+ (N) MULTiplexed Information and Computing Service, an MLS computer
+ timesharing system designed and implemented during 1965-69 by a
+ consortium including Massachusetts Institute of Technology,
+ General Electric, and Bell Laboratories, and later offered
+ commercially by Honeywell.
+
+ Tutorial: Multics was one of the first large, general-purpose,
+ operating systems to include security as a primary goal from the
+ inception of the design and development and was rated in TCSEC
+ Class B2. Its many innovative hardware and software security
+ mechanisms (e.g., protection ring) were adopted by later systems.
+
+ $ multilevel secure (MLS)
+ (I) Describes an information system that is trusted to contain,
+ and maintain separation between, resources (particularly stored
+ data) of different security levels. (Examples: BLACKER, CANEWARE,
+ KSOS, Multics, SCOMP.)
+
+ Usage: Usually understood to mean that the system permits
+ concurrent access by users who differ in their access
+ authorizations, while denying users access to resources for which
+ they lack authorization.
+
+ $ multilevel security mode
+ 1. (N) A mode of system operation wherein (a) two or more security
+ levels of information are allowed to be to be handled concurrently
+ within the same system when some users having access to the system
+ have neither a security clearance nor need-to-know for some of the
+ data handled by the system and (b) separation of the users and the
+ classified material on the basis, respectively, of clearance and
+ classification level are dependent on operating system control.
+ (See: /system operation/ under "mode", need to know, protection
+ level, security clearance. Compare: controlled mode.)
+
+
+
+
+
+
+Shirey Informational [Page 195]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: Usually abbreviated as "multilevel mode". This term was
+ defined in U.S. Government policy regarding system accreditation,
+ but the term is also used outside the Government.
+
+ 2. (O) A mode of system operation in which all three of the
+ following statements are true: (a) Some authorized users do not
+ have a security clearance for all the information handled in the
+ system. (b) All authorized users have the proper security
+ clearance and appropriate specific access approval for the
+ information to which they have access. (c) All authorized users
+ have a need-to-know only for information to which they have
+ access. [C4009] (See: formal access approval, protection level.)
+
+ $ Multipurpose Internet Mail Extensions (MIME)
+ (I) An Internet protocol (RFC 2045) that enhances the basic format
+ of Internet electronic mail messages (RFC 822) (a) to enable
+ character sets other than U.S. ASCII to be used for textual
+ headers and content and (b) to carry non-textual and multi-part
+ content. (See: S/MIME.)
+
+ $ mutual suspicion
+ (I) The state that exists between two interacting system entities
+ in which neither entity can trust the other to function correctly
+ with regard to some security requirement.
+
+ $ name
+ (I) Synonym for "identifier".
+
+ $ naming authority
+ (O) /U.S. DoD/ An organizational entity responsible for assigning
+ DNs and for assuring that each DN is meaningful and unique within
+ its domain. [DoD9]
+
+ $ National Computer Security Center (NCSC)
+ (O) A U.S. DoD organization, housed in NSA, that has
+ responsibility for encouraging widespread availability of trusted
+ systems throughout the U.S. Federal Government. It has established
+ criteria for, and performed evaluations of, computer and network
+ systems that have a TCB. (See: Rainbow Series, TCSEC.)
+
+ $ National Information Assurance Partnership (NIAP)
+ (N) A joint initiative of NIST and NSA to enhance the quality of
+ commercial products for information security and increase consumer
+ confidence in those products through objective evaluation and
+ testing methods.
+
+
+
+
+
+
+Shirey Informational [Page 196]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: NIAP is registered, through the U.S. DoD, as a National
+ Performance Review Reinvention Laboratory. NIAP functions include
+ the following:
+ - Developing tests, test methods, and other tools that developers
+ and testing laboratories may use to improve and evaluate
+ security products.
+ - Collaborating with industry and others on research and testing
+ programs.
+ - Using the Common Criteria to develop protection profiles and
+ associated test sets for security products and systems.
+ - Cooperating with the NIST National Voluntary Laboratory
+ Accreditation Program to develop a program to accredit private-
+ sector laboratories for the testing of information security
+ products using the Common Criteria.
+ - Working to establish a formal, international mutual recognition
+ scheme for a Common Criteria-based evaluation.
+
+ $ National Institute of Standards and Technology (NIST)
+ (N) A U.S. Department of Commerce organization that promotes U.S.
+ economic growth by working with industry to develop and apply
+ technology, measurements, and standards. Has primary U.S.
+ Government responsibility for INFOSEC standards for sensitive
+ unclassified information. (See: ANSI, DES, DSA, DSS, FIPS, NIAP,
+ NSA.)
+
+ $ National Reliability and Interoperability Council (NRIC)
+ (N) An advisory committee chartered by the U.S. Federal
+ Communications Commission (FCC), with participation by network
+ service providers and vendors, to provide recommendations to the
+ FCC for assuring reliability, interoperability, robustness, and
+ security of wireless, wireline, satellite, cable, and public data
+ communication networks.
+
+ $ national security
+ (O) /U.S. Government/ The national defense or foreign relations of
+ the United States of America.
+
+ $ National Security Agency (NSA)
+ (N) A U.S. DoD organization that has primary U.S. Government
+ responsibility for INFOSEC standards for classified information
+ and for sensitive unclassified information handled by national
+ security systems. (See: FORTEZZA, KEA, MISSI, national security
+ system, NIAP, NIST, SKIPJACK.)
+
+ $ national security information
+ (O) /U.S. Government/ Information that has been determined,
+ pursuant to Executive Order 12958 or any predecessor order, to
+ require protection against unauthorized disclosure. [C4009]
+
+
+
+Shirey Informational [Page 197]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ national security system
+ (O) /U.S. Government/ Any Government-operated information system
+ for which the function, operation, or use (a) involves
+ intelligence activities; (b) involves cryptologic activities
+ related to national security; (c) involves command and control of
+ military forces; (d) involves equipment that is an integral part
+ of a weapon or weapon system; or (e) is critical to the direct
+ fulfillment of military or intelligence missions and does not
+ include a system that is to be used for routine administrative and
+ business applications (including payroll, finance, logistics, and
+ personnel management applications). [Title 40 U.S.C. Section 1552,
+ Information Technology Management Reform Act of 1996.] (See: type
+ 2 product.)
+
+ $ natural disaster
+ (I) /threat action/ See: secondary definitions under "corruption"
+ and "incapacitation".
+
+ $ NCSC
+ (O) See: National Computer Security Center.
+
+ $ need to know, need-to-know
+ (I) The necessity for access to, knowledge of, or possession of
+ specific information required to carry out official duties.
+
+ Usage: The compound "need-to-know" is commonly used as either an
+ adjective or a noun.
+
+ Tutorial: The need-to-know criterion is used in security
+ procedures that require a custodian of sensitive information,
+ prior to disclosing the information to someone else, to establish
+ that the intended recipient has proper authorization to access the
+ information.
+
+ $ network
+ (I) An information system comprised of a collection of
+ interconnected nodes. (See: computer network.)
+
+ $ Network Hardware Layer
+ (I) See: Internet Protocol Suite.
+
+ $ Network Interface Layer
+ (I) See: Internet Protocol Suite.
+
+ $ Network Layer Security Protocol (NLSP).
+ (N) An OSI protocol (IS0 11577) for end-to-end encryption services
+ at the top of OSIRM Layer 3. NLSP is derived from SP3 but is more
+ complex. (Compare: IPsec.)
+
+
+
+Shirey Informational [Page 198]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Network Substrate Layer
+ (I) Synonym for "Network Hardware Layer".
+
+ $ network weaving
+ (I) A penetration technique in which an intruder avoids detection
+ and traceback by using multiple, linked, communication networks to
+ access and attack a system. [C4009]
+
+ $ NIAP
+ (N) See: National Information Assurance Partnership.
+
+ $ nibble
+ (D) Half of a byte (i.e., usually, 4 bits).
+
+ Deprecated Term: To avoid international misunderstanding, IDOCs
+ SHOULD NOT use this term; instead, state the size of the block
+ explicitly (e.g., "4-bit block"). (See: Deprecated Usage under
+ "Green Book".)
+
+ $ NIPRNET
+ (O) The U.S. DoD's common-use Non-Classified Internet Protocol
+ Router Network; the part of the Internet that is wholly controlled
+ by the U.S. DoD and is used for official DoD business.
+
+ $ NIST
+ (N) See: National Institute of Standards and Technology.
+
+ $ NLSP
+ (N) See: Network Layer Security Protocol
+
+ $ no-lone zone
+ (I) A room or other space or area to which no person may have
+ unaccompanied access and that, when occupied, is required to be
+ occupied by two or more appropriately authorized persons. [C4009]
+ (See: dual control.)
+
+ $ no-PIN ORA (NORA)
+ (O) /MISSI/ An organizational RA that operates in a mode in which
+ the ORA performs no card management functions and, therefore, does
+ not require knowledge of either the SSO PIN or user PIN for an end
+ user's FORTEZZA PC card.
+
+ $ node
+ (I) A collection of related subsystems located on one or more
+ computer platforms at a single site. (See: site.)
+
+
+
+
+
+
+Shirey Informational [Page 199]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ nonce
+ (I) A random or non-repeating value that is included in data
+ exchanged by a protocol, usually for the purpose of guaranteeing
+ liveness and thus detecting and protecting against replay attacks.
+ (See: fresh.)
+
+ $ non-critical
+ See: critical.
+
+ $ non-repudiation service
+ 1. (I) A security service that provide protection against false
+ denial of involvement in an association (especially a
+ communication association that transfers data). (See: repudiation,
+ time stamp.)
+
+ Tutorial: Two separate types of denial are possible -- an entity
+ can deny that it sent a data object, or it can deny that it
+ received a data object -- and, therefore, two separate types of
+ non-repudiation service are possible. (See: non-repudiation with
+ proof of origin, non-repudiation with proof of receipt.)
+
+ 2. (D) "Assurance [that] the sender of data is provided with proof
+ of delivery and the recipient is provided with proof of the
+ sender's identity, so neither can later deny having processed the
+ data." [C4009]
+
+ Deprecated Definition: IDOCs SHOULD NOT use definition 2 because
+ it bundles two security services -- non-repudiation with proof of
+ origin, and non-repudiation with proof of receipt -- that can be
+ provided independently of each other.
+
+ Usage: IDOCs SHOULD distinguish between the technical aspects and
+ the legal aspects of a non-repudiation service:
+ - "Technical non-repudiation": Refers to the assurance a relying
+ party has that if a public key is used to validate a digital
+ signature, then that signature had to have been made by the
+ corresponding private signature key. [SP32]
+ - "Legal non-repudiation": Refers to how well possession or
+ control of the private signature key can be established. [SP32]
+
+ Tutorial: Non-repudiation service does not prevent an entity from
+ repudiating a communication. Instead, the service provides
+ evidence that can be stored and later presented to a third party
+ to resolve disputes that arise if and when a communication is
+ repudiated by one of the entities involved.
+
+
+
+
+
+
+Shirey Informational [Page 200]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Ford describes the six phases of a complete non-repudiation
+ service and uses "critical action" to refer to the act of
+ communication that is the subject of the service [For94, For97]:
+
+ -------- -------- -------- -------- -------- . --------
+ Phase 1: Phase 2: Phase 3: Phase 4: Phase 5: . Phase 6:
+ Request Generate Transfer Verify Retain . Resolve
+ Service Evidence Evidence Evidence Evidence . Dispute
+ -------- -------- -------- -------- -------- . --------
+
+ Service Critical Evidence Evidence Archive . Evidence
+ Request => Action => Stored => Is => Evidence . Is
+ Is Made Occurs For Later Tested In Case . Verified
+ and Use | ^ Critical . ^
+ Evidence v | Action Is . |
+ Is +-------------------+ Repudiated . |
+ Generated |Verifiable Evidence|------> ... . ----+
+ +-------------------+
+
+ Phase / Explanation
+ -------------------
+ 1. Request service: Before the critical action, the service
+ requester asks, either implicitly or explicitly, to have
+ evidence of the action be generated.
+ 2. Generate evidence: When the critical action occurs, evidence is
+ generated by a process involving the potential repudiator and
+ possibly also a trusted third party.
+ 3. Transfer evidence: The evidence is transferred to the requester
+ or stored by a third party, for later use (if needed).
+ 4. Verify evidence: The entity that holds the evidence tests it to
+ be sure that it will suffice if a dispute arises.
+ 5. Retain evidence: The evidence is retained for possible future
+ retrieval and use.
+ 6. Resolve dispute: In this phase, which occurs only if the
+ critical action is repudiated, the evidence is retrieved from
+ storage, presented, and verified to resolve the dispute.
+
+ $ non-repudiation with proof of origin
+ (I) A security service that provides the recipient of data with
+ evidence that proves the origin of the data, and thus protects the
+ recipient against an attempt by the originator to falsely deny
+ sending the data. (See: non-repudiation service.)
+
+ Tutorial: This service is a strong version of data origin
+ authentication service. This service can not only verify the
+ identity of a system entity that is the original source of
+ received data; it can also provide proof of that identity to a
+ third party.
+
+
+
+Shirey Informational [Page 201]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ non-repudiation with proof of receipt
+ (I) A security service that provides the originator of data with
+ evidence that proves the data was received as addressed, and thus
+ protects the originator against an attempt by the recipient to
+ falsely deny receiving the data. (See: non-repudiation service.)
+
+ $ non-volatile media
+ (I) Storage media that, once written into, provide stable storage
+ of information without an external power supply. (Compare:
+ permanent storage, volatile media.)
+
+ $ NORA
+ (O) See: no-PIN ORA.
+
+ $ notarization
+ (I) Registration of data under the authority or in the care of a
+ trusted third party, thus making it possible to provide subsequent
+ assurance of the accuracy of characteristics claimed for the data,
+ such as content, origin, time of existence, and delivery.
+ [I7498-2] (See: digital notary.)
+
+ $ NRIC
+ (N) See: Network Reliability and Interoperability Council.
+
+ $ NSA
+ (N) See: National Security Agency
+
+ $ null
+ (N) /encryption/ "Dummy letter, letter symbol, or code group
+ inserted into an encrypted message to delay or prevent its
+ decryption or to complete encrypted groups for transmission or
+ transmission security purposes." [C4009]
+
+ $ NULL encryption algorithm
+ (I) An algorithm [R2410] that is specified as doing nothing to
+ transform plaintext data; i.e., a no-op. It originated because ESP
+ always specifies the use of an encryption algorithm for
+ confidentiality. The NULL encryption algorithm is a convenient way
+ to represent the option of not applying encryption in ESP (or in
+ any other context where a no-op is needed). (Compare: null.)
+
+ $ OAKLEY
+ (I) A key establishment protocol (proposed for IPsec but
+ superseded by IKE) based on the Diffie-Hellman-Merkle algorithm
+ and designed to be a compatible component of ISAKMP. [R2412]
+
+ Tutorial: OAKLEY establishes a shared key with an assigned
+ identifier and associated authenticated identities for parties;
+
+
+
+Shirey Informational [Page 202]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ i.e., OAKLEY provides authentication service to ensure the
+ entities of each other's identity, even if the Diffie-Hellman-
+ Merkle exchange is threatened by active wiretapping. Also, it
+ provides public-key forward secrecy for the shared key and
+ supports key updates, incorporation of keys distributed by out-of-
+ band mechanisms, and user-defined abstract group structures for
+ use with Diffie-Hellman-Merkle.
+
+ $ object
+ (I) /formal model/ Trusted-system modeling usage: A system
+ component that contains or receives information. (See: Bell-
+ LaPadula model, object reuse, trusted system.)
+
+ $ object identifier (OID)
+ 1. (N) An official, globally unique name for a thing, written as a
+ sequence of integers (which are formed and assigned as defined in
+ the ASN.1 standard) and used to reference the thing in abstract
+ specifications and during negotiation of security services in a
+ protocol.
+
+ 2. (O) "A value (distinguishable from all other such values)
+ [that] is associated with an object." [X680]
+
+ Tutorial: Objects named by OIDs are leaves of the object
+ identifier tree (which is similar to but different from the X.500
+ Directory Information Tree). Each arc (i.e., each branch of the
+ tree) is labeled with a non-negative integer. An OID is the
+ sequence of integers on the path leading from the root of the tree
+ to a named object.
+
+ The OID tree has three arcs immediately below the root: {0} for
+ use by ITU-T, {1} for use by ISO, and {2} for use by both jointly.
+ Below ITU-T are four arcs, where {0 0} is for ITU-T
+ recommendations. Below {0 0} are 26 arcs, one for each series of
+ recommendations starting with the letters A to Z, and below these
+ are arcs for each recommendation. Thus, the OID for ITU-T
+ Recommendation X.509 is {0 0 24 509}. Below ISO are four arcs,
+ where {1 0 }is for ISO standards, and below these are arcs for
+ each ISO standard. Thus, the OID for ISO/IEC 9594-8 (the ISO
+ number for X.509) is {1 0 9594 8}.
+
+ ANSI registers organization names below the branch {joint-iso-
+ ccitt(2) country(16) US(840) organization(1) gov(101) csor(3)}.
+ The NIST CSOR records PKI objects below the branch {joint-iso-itu-
+ t(2) country(16) us(840) organization (1) gov(101) csor(3)}. The
+ U.S. DoD registers INFOSEC objects below the branch {joint-iso-
+ itu-t(2) country(16) us(840) organization(1) gov(101) dod(2)
+ infosec(1)}.
+
+
+
+Shirey Informational [Page 203]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ The IETF's Public-Key Infrastructure (pkix) Working Group
+ registers PKI objects below the branch {iso(1) identified-
+ organization(3) dod(6) internet(1) security(5) mechanisms(5)
+ pkix(7)}. [R3280]
+
+ $ object reuse
+ (N) /COMPUSEC/ Reassignment and reuse of an area of a storage
+ medium (e.g., random-access memory, floppy disk, magnetic tape)
+ that once contained sensitive data objects. Before being
+ reassigned for use by a new subject, the area needs to be erased
+ or, in some cases, purged. [NCS04] (See: object.)
+
+ $ obstruction
+ (I) A type of threat action that interrupts delivery of system
+ services by hindering system operations. (See: disruption.)
+
+ Tutorial: This type of threat action includes the following
+ subtypes:
+ - "Interference": Disruption of system operations by blocking
+ communication of user data or control information. (See:
+ jamming.)
+ - "Overload": Hindrance of system operation by placing excess
+ burden on the performance capabilities of a system component.
+ (See: flooding.)
+
+ $ OCSP
+ (I) See: Online Certificate Status Protocol.
+
+ $ octet
+ (I) A data unit of eight bits. (Compare: byte.)
+
+ Usage: This term is used in networking (especially in OSI
+ standards) in preference to "byte", because some systems use
+ "byte" for data storage units of a size other than eight bits.
+
+ $ OFB
+ (N) See: output feedback.
+
+ $ off-line attack
+ (I) See: secondary definition under "attack".
+
+ $ ohnosecond
+ (D) That minuscule fraction of time in which you realize that your
+ private key has been compromised.
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term; it is a joke for
+ English speakers. (See: Deprecated Usage under "Green Book".)
+
+
+
+
+Shirey Informational [Page 204]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ OID
+ (N) See: object identifier.
+
+ $ Online Certificate Status Protocol (OCSP)
+ (I) An Internet protocol [R2560] used by a client to obtain from a
+ server the validity status and other information about a digital
+ certificate. (Mentioned in [X509] but not specified there.)
+
+ Tutorial: In some applications, such as those involving high-value
+ commercial transactions, it may be necessary either (a) to obtain
+ certificate revocation status that is timelier than is possible
+ with CRLs or (b) to obtain other kinds of status information. OCSP
+ may be used to determine the current revocation status of a
+ digital certificate, in lieu of or as a supplement to checking
+ against a periodic CRL. An OCSP client issues a status request to
+ an OCSP server and suspends acceptance of the certificate in
+ question until the server provides a response.
+
+ $ one-time pad
+ 1. (N) A manual encryption system in the form of a paper pad for
+ one-time use.
+
+ 2. (I) An encryption algorithm in which the key is a random
+ sequence of symbols and each symbol is used for encryption only
+ one time -- i.e., used to encrypt only one plaintext symbol and
+ thus produce only one ciphertext symbol -- and a copy of the key
+ is used similarly for decryption.
+
+ Tutorial: To ensure one-time use, the copy of the key used for
+ encryption is destroyed after use, as is the copy used for
+ decryption. This is the only encryption algorithm that is truly
+ unbreakable, even given unlimited resources for cryptanalysis
+ [Schn], but key management costs and synchronization problems make
+ it impractical except in special situations.
+
+ $ one-time password, One-Time Password (OTP)
+ 1. (I) /not capitalized/ A "one-time password" is a simple
+ authentication technique in which each password is used only once
+ as authentication information that verifies an identity. This
+ technique counters the threat of a replay attack that uses
+ passwords captured by wiretapping.
+
+ 2. (I) /capitalized/ "One-Time Password" is an Internet protocol
+ [R2289] that is based on S/KEY and uses a cryptographic hash
+ function to generate one-time passwords for use as authentication
+ information in system login and in other processes that need
+ protection against replay attacks.
+
+
+
+
+Shirey Informational [Page 205]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ one-way encryption
+ (I) Irreversible transformation of plain text to cipher text, such
+ that the plain text cannot be recovered from the cipher text by
+ other than exhaustive procedures even if the cryptographic key is
+ known. (See: brute force, encryption.)
+
+ $ one-way function
+ (I) "A (mathematical) function, f, [that] is easy to compute, but
+ which for a general value y in the range, it is computationally
+ difficult to find a value x in the domain such that f(x) = y.
+ There may be a few values of y for which finding x is not
+ computationally difficult." [X509]
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term as a synonym for
+ "cryptographic hash".
+
+ $ onion routing
+ (I) A system that can be used to provide both (a) data
+ confidentiality and (b) traffic-flow confidentiality for network
+ packets, and also provide (c) anonymity for the source of the
+ packets.
+
+ Tutorial: The source, instead of sending a packet directly to the
+ intended destination, sends it to an "onion routing proxy" that
+ builds an anonymous connection through several other "onion
+ routers" to the destination. The proxy defines a route through the
+ "onion routing network" by encapsulating the original payload in a
+ layered data packet called an "onion", in which each layer defines
+ the next hop in the route and each layer is also encrypted. Along
+ the route, each onion router that receives the onion peels off one
+ layer; decrypts that layer and reads from it the address of the
+ next onion router on the route; pads the remaining onion to some
+ constant size; and sends the padded onion to that next router.
+
+ $ open security environment
+ (O) /U.S. DoD/ A system environment that meets at least one of the
+ following two conditions: (a) Application developers (including
+ maintainers) do not have sufficient clearance or authorization to
+ provide an acceptable presumption that they have not introduced
+ malicious logic. (b) Configuration control does not provide
+ sufficient assurance that applications and the equipment are
+ protected against the introduction of malicious logic prior to and
+ during the operation of system applications. [NCS04] (See: "first
+ law" under "Courtney's laws". Compare: closed security
+ environment.)
+
+
+
+
+
+
+Shirey Informational [Page 206]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ open storage
+ (N) /U.S. Government/ "Storage of classified information within an
+ accredited facility, but not in General Services Administration
+ approved secure containers, while the facility is unoccupied by
+ authorized personnel." [C4009]
+
+ $ Open Systems Interconnection (OSI) Reference Model (OSIRM)
+ (N) A joint ISO/ITU-T standard [I7498-1] for a seven-layer,
+ architectural communication framework for interconnection of
+ computers in networks. (See: OSIRM Security Architecture. Compare:
+ Internet Protocol Suite.)
+
+ Tutorial: OSIRM-based standards include communication protocols
+ that are mostly incompatible with the IPS, but also include
+ security models, such as X.509, that are used in the Internet.
+
+ The OSIRM layers, from highest to lowest, are (7) Application, (6)
+ Presentation, (5) Session, (4) Transport, (3) Network, (2) Data
+ Link, and (1) Physical.
+
+ Usage: This Glossary refers to OSIRM layers by number to avoid
+ confusing them with IPS layers, which are referred to by name.
+
+ Some unknown person described how the OSIRM layers correspond to
+ the seven deadly sins:
+
+ 7. Wrath: Application is always angry with the mess it sees below
+ itself. (Hey! Who is it to be pointing fingers?)
+ 6. Sloth: Presentation is too lazy to do anything productive by
+ itself.
+ 5. Lust: Session is always craving and demanding what truly
+ belongs to Application's functionality.
+ 4. Avarice: Transport wants all of the end-to-end functionality.
+ (Of course, it deserves it, but life isn't fair.)
+ 3. Gluttony: (Connection-Oriented) Network is overweight and
+ overbearing after trying too often to eat Transport's lunch.
+ 2. Envy: Poor Data Link is always starved for attention. (With
+ Asynchronous Transfer Mode, maybe now it is feeling less
+ neglected.)
+ 1. Pride: Physical has managed to avoid much of the controversy,
+ and nearly all of the embarrassment, suffered by the others.
+
+ John G. Fletcher described how the OSIRM layers correspond to Snow
+ White's dwarf friends:
+
+ 7. Doc: Application acts as if it is in charge, but sometimes
+ muddles its syntax.
+
+
+
+
+Shirey Informational [Page 207]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 6. Sleepy: Presentation is indolent, being guilty of the sin of
+ Sloth.
+ 5. Dopey: Session is confused because its charter is not very
+ clear.
+ 4. Grumpy: Transport is irritated because Network has encroached
+ on Transport's turf.
+ 3. Happy: Network smiles for the same reason that Transport is
+ irritated.
+ 2. Sneezy: Data Link makes loud noises in the hope of attracting
+ attention.
+ 1. Bashful: Physical quietly does its work, unnoticed by the
+ others.
+
+ $ operational integrity
+ (I) Synonym for "system integrity"; this synonym emphasizes the
+ actual performance of system functions rather than just the
+ ability to perform them.
+
+ $ operational security
+ 1. (I) System capabilities, or performance of system functions,
+ that are needed either (a) to securely manage a system or (b) to
+ manage security features of a system. (Compare: operations
+ security (OPSEC).)
+
+ Usage: IDOCs that use this term SHOULD state a definition because
+ (a) the definition provided here is general and vague and (b) the
+ term could easily be confused with "operations security", which is
+ a different concept.
+
+ Tutorial: For example, in the context of an Internet service
+ provider, the term could refer to capabilities to manage network
+ devices in the event of attacks, simplify troubleshooting, keep
+ track of events that affect system integrity, help analyze sources
+ of attacks, and provide administrators with control over network
+ addresses and protocols to help mitigate the most common attacks
+ and exploits. [R3871]
+
+ 2. (D) Synonym for "administrative security".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "administrative security". Any type of security may affect
+ system operations; therefore, the term may be misleading. Instead,
+ use "administrative security", "communication security", "computer
+ security", "emanations security", "personnel security", "physical
+ security", or whatever specific type is meant. (See: security
+ architecture. Compare: operational integrity, OPSEC.)
+
+
+
+
+
+Shirey Informational [Page 208]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ operations security (OPSEC)
+ (I) A process to identify, control, and protect evidence of the
+ planning and execution of sensitive activities and operations, and
+ thereby prevent potential adversaries from gaining knowledge of
+ capabilities and intentions. (See: communications cover. Compare:
+ operational security.)
+
+ $ operator
+ (I) A person who has been authorized to direct selected functions
+ of a system. (Compare: manager, user.)
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because a system operator may or may not be treated as a "user".
+
+ $ OPSEC
+ 1. (I) Abbreviation for "operations security".
+
+ 2. (D) Abbreviation for "operational security".
+
+ Deprecated Usage: IDOCs SHOULD NOT use this abbreviation for
+ "operational security" (as defined in this Glossary), because its
+ use for "operations security" has been well established for many
+ years, particular in the military community.
+
+ $ ORA
+ See: organizational registration authority.
+
+ $ Orange Book
+ (D) /slang/ Synonym for "Trusted Computer System Evaluation
+ Criteria" [CSC1, DoD1].
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term as a synonym for
+ "Trusted Computer System Evaluation Criteria" [CSC1, DoD1].
+ Instead, use the full, proper name of the document or, in
+ subsequent references, the abbreviation "TCSEC". (See: Deprecated
+ Usage under "Green Book".)
+
+ $ organizational certificate
+ 1. (I) An X.509 public-key certificate in which the "subject"
+ field contains the name of an institution or set (e.g., a
+ business, government, school, labor union, club, ethnic group,
+ nationality, system, or group of individuals playing the same
+ role), rather than the name of an individual person or device.
+ (Compare: persona certificate, role certificate.)
+
+ Tutorial: Such a certificate might be issued for one of the
+ following purposes:
+
+
+
+
+Shirey Informational [Page 209]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - To enable an individual to prove membership in the
+ organization.
+ - To enable an individual to represent the organization, i.e., to
+ act in its name and with its powers or permissions.
+
+ 2. (O) /MISSI/ A type of MISSI X.509 public-key certificate that
+ is issued to support organizational message handling for the U.S.
+ DoD's Defense Message System.
+
+ $ organizational registration authority (ORA)
+ 1. (I) /PKI/ An RA for an organization.
+
+ 2. (O) /MISSI/ An end entity that (a) assists a PCA, CA, or SCA to
+ register other end entities, by gathering, verifying, and entering
+ data and forwarding it to the signing authority and (b) may also
+ assist with card management functions. An ORA is a local
+ administrative authority, and the term refers both to the role and
+ to the person who plays that role. An ORA does not sign
+ certificates, CRLs, or CKLs. (See: no-PIN ORA, SSO-PIN ORA, user-
+ PIN ORA.)
+
+ $ origin authentication
+ (D) Synonym for "data origin authentication". (See:
+ authentication, data origin authentication.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it suggests
+ careless use of the internationally standardized term "data origin
+ authentication" and also could be confused with "peer entity
+ authentication."
+
+ $ origin authenticity
+ (D) Synonym for "data origin authentication". (See: authenticity,
+ data origin authentication.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it suggests
+ careless use of the internationally standardized term "data origin
+ authentication" and mixes concepts in a potentially misleading
+ way.
+
+ $ OSI, OSIRM
+ (N) See: Open Systems Interconnection Reference Model.
+
+ $ OSIRM Security Architecture
+ (N) The part of the OSIRM [I7498-2] that specifies the security
+ services and security mechanisms that can be applied to protect
+ communications between two systems. (See: security architecture.)
+
+
+
+
+
+Shirey Informational [Page 210]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: This part of the OSIRM includes an allocation of
+ security services to protocol layers. The following table shows
+ which security services (see definitions in this Glossary) are
+ permitted by the OSIRM in each of its layers. (Also, an
+ application process that operates above the Application Layer may
+ itself provide security services.) Similarly, the table suggests
+ which services are suitable for each IPS layer. However,
+ explaining and justifying these allocations is beyond the scope of
+ this Glossary.
+
+ Legend for Table Entries:
+ O = Yes, [I7498-2] permits the service in this OSIRM layer.
+ I = Yes, the service can be incorporated in this IPS layer.
+ * = This layer subsumed by Application Layer in IPS.
+
+ IPS Protocol Layers +-----------------------------------------+
+ |Network| Net |In-| Trans | Application |
+ | H/W |Inter|ter| -port | |
+ | |-face|net| | |
+ OSIRM Protocol Layers +-----------------------------------------+
+ | 1 | 2 | 3 | 4 | 5 | 6 | 7 |
+ Confidentiality +-----------------------------------------+
+ - Datagram | O I | O I | O I | O I | | O * | O I |
+ - Selective Field | | | I | | | O * | O I |
+ - Traffic Flow | O | | O | | | | O |
+ -- Full | I | | | | | | |
+ -- Partial | | I | I | | | | I |
+ Integrity +-----------------------------------------+
+ - Datagram | I | I | O I | O I | | | O I |
+ - Selective Field | | | I | | | | O I |
+ - Stream | | | O I | O I | | | O I |
+ Authentication +-----------------------------------------+
+ - Peer Entity | | I | O I | O I | | | O I |
+ - Data Origin | | I | O I | O I | | | O I |
+ Access Control +-----------------------------------------+
+ - type as appropriate | | I | O I | O I | | | O I |
+ Non-Repudiation +-----------------------------------------+
+ - of Origin | | | | | | | O I |
+ - of Receipt | | | | | | | O I |
+ +-----------------------------------------+
+
+ $ OTAR
+ (N) See: over-the-air rekeying.
+
+ $ OTP
+ (I) See: One-Time Password.
+
+
+
+
+
+Shirey Informational [Page 211]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ out-of-band
+ (I) /adjective, adverb/ Information transfer using a channel or
+ method that is outside (i.e., separate from or different from) the
+ main channel or normal method.
+
+ Tutorial: Out-of-band mechanisms are often used to distribute
+ shared secrets (e.g., a symmetric key) or other sensitive
+ information items (e.g., a root key) that are needed to initialize
+ or otherwise enable the operation of cryptography or other
+ security mechanisms. Example: Using postal mail to distribute
+ printed or magnetic media containing symmetric cryptographic keys
+ for use in Internet encryption devices. (See: key distribution.)
+
+ $ output feedback (OFB)
+ (N) A block cipher mode that modifies ECB mode to operate on
+ plaintext segments of variable length less than or equal to the
+ block length. [FP081] (See: block cipher, [SP38A].)
+
+ Tutorial: This mode operates by directly using the algorithm's
+ previously generated output block as the algorithm's next input
+ block (i.e., by "feeding back" the output block) and combining
+ (exclusive OR-ing) the output block with the next plaintext
+ segment (of block length or less) to form the next ciphertext
+ segment.
+
+ $ outside attack
+ (I) See: secondary definition under "attack". Compare: outsider.)
+
+ $ outsider
+ (I) A user (usually a person) that accesses a system from a
+ position that is outside the system's security perimeter.
+ (Compare: authorized user, insider, unauthorized user.)
+
+ Tutorial: The actions performed by an outsider in accessing the
+ system may be either authorized or unauthorized; i.e., an outsider
+ may act either as an authorized user or as an unauthorized user.
+
+ $ over-the-air rekeying (OTAR)
+ (N) Changing a key in a remote cryptographic device by sending a
+ new key directly to the device via a channel that the device is
+ protecting. [C4009]
+
+ $ overload
+ (I) /threat action/ See: secondary definition under "obstruction".
+
+ $ P1363
+ (N) See: IEEE P1363.
+
+
+
+
+Shirey Informational [Page 212]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ PAA
+ (O) See: policy approving authority.
+
+ $ package
+ (N) /Common Criteria/ A reusable set of either functional or
+ assurance components, combined in a single unit to satisfy a set
+ of identified security objectives. (Compare: protection profile.)
+
+ Example: The seven EALs defined in Part 3 of the Common Criteria
+ are predefined assurance packages.
+
+ Tutorial: A package is a combination of security requirement
+ components and is intended to be reusable in the construction of
+ either more complex packages or protection profiles and security
+ targets. A package expresses a set of either functional or
+ assurance requirements that meet some particular need, expressed
+ as a set of security objectives.
+
+ $ packet
+ (I) A block of data that is carried from a source to a destination
+ through a communication channel or, more generally, across a
+ network. (Compare: datagram, PDU.)
+
+ $ packet filter
+ (I) See: secondary definition under "filtering router".
+
+ $ packet monkey
+ (D) /slang/ Someone who floods a system with packets, creating a
+ denial-of-service condition for the system's users. (See:
+ cracker.)
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ pagejacking
+ (D) /slang/ A contraction of "Web page hijacking". A masquerade
+ attack in which the attacker copies (steals) a home page or other
+ material from the target server, rehosts the page on a server the
+ attacker controls, and causes the rehosted page to be indexed by
+ the major Web search services, thereby diverting browsers from the
+ target server to the attacker's server.
+
+ Deprecated Term: IDOCs SHOULD NOT use this contraction. The term
+ is not listed in most dictionaries and could confuse international
+ readers. (See: Deprecated Usage under "Green Book".)
+
+
+
+
+Shirey Informational [Page 213]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ PAN
+ (O) See: primary account number.
+
+ $ PAP
+ (I) See: Password Authentication Protocol.
+
+ $ parity bit
+ (I) A checksum that is computed on a block of bits by computing
+ the binary sum of the individual bits in the block and then
+ discarding all but the low-order bit of the sum. (See: checksum.)
+
+ $ partitioned security mode
+ (N) A mode of system operation wherein all users having access to
+ the system have the necessary security clearances for all data
+ handled by the system, but some users might not have either formal
+ access approval or need-to-know for all the data. (See: /system
+ operation/ under "mode", formal access approval, need to know,
+ protection level, security clearance.)
+
+ Usage: Usually abbreviated as "partitioned mode". This term was
+ defined in U.S. Government policy on system accreditation.
+
+ $ PASS
+ (N) See: personnel authentication system string.
+
+ $ passive attack
+ (I) See: secondary definition under "attack".
+
+ $ passive user
+ (I) See: secondary definition under "system user".
+
+ $ passive wiretapping
+ (I) A wiretapping attack that attempts only to observe a
+ communication flow and gain knowledge of the data it contains, but
+ does not alter or otherwise affect that flow. (See: wiretapping.
+ Compare: passive attack, active wiretapping.)
+
+ $ password
+ 1a. (I) A secret data value, usually a character string, that is
+ presented to a system by a user to authenticate the user's
+ identity. (See: authentication information, challenge-response,
+ PIN, simple authentication.)
+
+ 1b. (O) "A character string used to authenticate an identity."
+ [CSC2]
+
+
+
+
+
+
+Shirey Informational [Page 214]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 1c. (O) "A string of characters (letters, numbers, and other
+ symbols) used to authenticate an identity or to verify access
+ authorization." [FP140]
+
+ 1d. (O) "A secret that a claimant memorizes and uses to
+ authenticate his or her identity. Passwords are typically
+ character strings." [SP63]
+
+ Tutorial: A password is usually paired with a user identifier that
+ is explicit in the authentication process, although in some cases
+ the identifier may be implicit. A password is usually verified by
+ matching it to a stored value held by the access control system
+ for that identifier.
+
+ Using a password as authentication information is based on
+ assuming that the password is known only by the system entity for
+ which the identity is being authenticated. Therefore, in a network
+ environment where wiretapping is possible, simple authentication
+ that relies on transmission of static (i.e., repetitively used)
+ passwords in cleartext form is inadequate. (See: one-time
+ password, strong authentication.)
+
+ $ Password Authentication Protocol (PAP)
+ (I) A simple authentication mechanism in PPP. In PAP, a user
+ identifier and password are transmitted in cleartext form. [R1334]
+ (See: CHAP.)
+
+ $ password sniffing
+ (D) /slang/ Passive wiretapping to gain knowledge of passwords.
+ (See: Deprecated Usage under "sniffing".)
+
+ $ path discovery
+ (I) For a digital certificate, the process of finding a set of
+ public-key certificates that comprise a certification path from a
+ trusted key to that specific certificate.
+
+ $ path validation
+ (I) The process of validating (a) all of the digital certificates
+ in a certification path and (b) the required relationships between
+ those certificates, thus validating the contents of the last
+ certificate on the path. (See: certificate validation.)
+
+ Tutorial: To promote interoperable PKI applications in the
+ Internet, RFC 3280 specifies a detailed algorithm for validation
+ of a certification path.
+
+
+
+
+
+
+Shirey Informational [Page 215]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ payment card
+ (N) /SET/ Collectively refers "to credit cards, debit cards,
+ charge cards, and bank cards issued by a financial institution and
+ which reflects a relationship between the cardholder and the
+ financial institution." [SET2]
+
+ $ payment gateway
+ (O) /SET/ A system operated by an acquirer, or a third party
+ designated by an acquirer, to provide electronic commerce services
+ to the merchants in support of the acquirer, and which interfaces
+ to the acquirer to support the authorization, capture, and
+ processing of merchant payment messages, including payment
+ instructions from cardholders. [SET1, SET2]
+
+ $ payment gateway certification authority (SET PCA)
+ (O) /SET/ A CA that issues digital certificates to payment
+ gateways and is operated on behalf of a payment card brand, an
+ acquirer, or another party according to brand rules. A SET PCA
+ issues a CRL for compromised payment gateway certificates. [SET2]
+ (See: PCA.)
+
+ $ PC card
+ (N) A type of credit card-sized, plug-in peripheral device that
+ was originally developed to provide memory expansion for portable
+ computers, but is also used for other kinds of functional
+ expansion. (See: FORTEZZA, PCMCIA.)
+
+ Tutorial: The international PC Card Standard defines a non-
+ proprietary form factor in three sizes -- Types I, II, and III --
+ each of which have a 68-pin interface between the card and the
+ socket into which it plugs. All three types have the same length
+ and width, roughly the size of a credit card, but differ in their
+ thickness from 3.3 to 10.5 mm. Examples include storage modules,
+ modems, device interface adapters, and cryptographic modules.
+
+ $ PCA
+ (D) Abbreviation of various kinds of "certification authority".
+ (See: Internet policy certification authority, (MISSI) policy
+ creation authority, (SET) payment gateway certification
+ authority.)
+
+ Deprecated Usage: An IDOC that uses this abbreviation SHOULD
+ define it at the point of first use.
+
+ $ PCI
+ (N) See: "protocol control information" under "protocol data
+ unit".
+
+
+
+
+Shirey Informational [Page 216]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ PCMCIA
+ (N) Personal Computer Memory Card International Association, a
+ group of manufacturers, developers, and vendors, founded in 1989
+ to standardize plug-in peripheral memory cards for personal
+ computers and now extended to deal with any technology that works
+ in the PC Card form factor. (See: PC card.)
+
+ $ PDS
+ (N) See: protective distribution system.
+
+ $ PDU
+ (N) See: protocol data unit.
+
+ $ peer entity authentication
+ (I) "The corroboration that a peer entity in an association is the
+ one claimed." [I7498-2] (See: authentication.)
+
+ $ peer entity authentication service
+ (I) A security service that verifies an identity claimed by or for
+ a system entity in an association. (See: authentication,
+ authentication service.)
+
+ Tutorial: This service is used at the establishment of, or at
+ times during, an association to confirm the identity of one entity
+ to another, thus protecting against a masquerade by the first
+ entity. However, unlike data origin authentication service, this
+ service requires an association to exist between the two entities,
+ and the corroboration provided by the service is valid only at the
+ current time that the service is provided. (See: "relationship
+ between data integrity service and authentication services" under
+ "data integrity service").
+
+ $ PEM
+ (I) See: Privacy Enhanced Mail.
+
+ $ penetrate
+ 1a. (I) Circumvent a system's security protections. (See: attack,
+ break, violation.)
+
+ 1b. (I) Successfully and repeatedly gain unauthorized access to a
+ protected system resource. [Huff]
+
+ $ penetration
+ (I) /threat action/ See: secondary definition under "intrusion".
+
+
+
+
+
+
+
+Shirey Informational [Page 217]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ penetration test
+ (I) A system test, often part of system certification, in which
+ evaluators attempt to circumvent the security features of a
+ system. [NCS04, SP42] (See: tiger team.)
+
+ Tutorial: Penetration testing evaluates the relative vulnerability
+ of a system to attacks and identifies methods of gaining access to
+ a system by using tools and techniques that are available to
+ adversaries. Testing may be performed under various constraints
+ and conditions, including a specified level of knowledge of the
+ system design and implementation. For a TCSEC evaluation, testers
+ are assumed to have all system design and implementation
+ documentation, including source code, manuals, and circuit
+ diagrams, and to work under no greater constraints than those
+ applied to ordinary users.
+
+ $ perfect forward secrecy
+ (I) For a key agreement protocol, the property that compromises
+ long-term keying material does not compromise session keys that
+ were previously derived from the long-term material. (Compare:
+ public-key forward secrecy.)
+
+ Usage: Some existing RFCs use this term but either do not define
+ it or do not define it precisely. While preparing this Glossary,
+ we found this to be a muddled area. Experts did not agree. For all
+ practical purposes, the literature defines "perfect forward
+ secrecy" by stating the Diffie-Hellman-Merkle algorithm. The term
+ "public-key forward secrecy" (suggested by Hilarie Orman) and the
+ definition stated for it in this Glossary were crafted to be
+ compatible with current Internet documents, yet be narrow and
+ leave room for improved terminology.
+
+ Challenge to the Internet security community: We need a taxonomy
+ of terms and definitions to cover the basic properties discussed
+ here for the full range of cryptographic algorithms and protocols
+ used in Internet Standards:
+
+ Involvement of session keys vs. long-term keys: Experts disagree
+ about the basic ideas involved:
+ - One concept of "forward secrecy" is that, given observations of
+ the operation of a key establishment protocol up to time t, and
+ given some of the session keys derived from those protocol
+ runs, you cannot derive unknown past session keys or future
+ session keys.
+ - A related property is that, given observations of the protocol
+ and knowledge of the derived session keys, you cannot derive
+ one or more of the long-term private keys.
+
+
+
+
+Shirey Informational [Page 218]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - The "I" definition presented above involves a third concept of
+ "forward secrecy" that refers to the effect of the compromise
+ of long-term keys.
+ - All three concepts involve the idea that a compromise of "this"
+ encryption key is not supposed to compromise the "next" one.
+ There also is the idea that compromise of a single key will
+ compromise only the data protected by the single key. In
+ Internet literature, the focus has been on protection against
+ decryption of back traffic in the event of a compromise of
+ secret key material held by one or both parties to a
+ communication.
+
+ Forward vs. backward: Experts are unhappy with the word "forward",
+ because compromise of "this" encryption key also is not supposed
+ to compromise the "previous" one, which is "backward" rather than
+ forward. In S/KEY, if the key used at time t is compromised, then
+ all keys used prior to that are compromised. If the "long-term"
+ key (i.e., the base of the hashing scheme) is compromised, then
+ all keys past and future are compromised; thus, you could say that
+ S/KEY has neither forward nor backward secrecy.
+
+ Asymmetric cryptography vs. symmetric: Experts disagree about
+ forward secrecy in the context of symmetric cryptographic systems.
+ In the absence of asymmetric cryptography, compromise of any long-
+ term key seems to compromise any session key derived from the
+ long-term key. For example, Kerberos isn't forward secret, because
+ compromising a client's password (thus compromising the key shared
+ by the client and the authentication server) compromises future
+ session keys shared by the client and the ticket-granting server.
+
+ Ordinary forward secrecy vs. "perfect" forward secret: Experts
+ disagree about the difference between these two. Some say there is
+ no difference, and some say that the initial naming was
+ unfortunate and suggest dropping the word "perfect". Some suggest
+ using "forward secrecy" for the case where one long-term private
+ key is compromised, and adding "perfect" for when both private
+ keys (or, when the protocol is multi-party, all private keys) are
+ compromised.
+
+ Acknowledgements: Bill Burr, Burt Kaliski, Steve Kent, Paul Van
+ Oorschot, Jonathan Trostle, Michael Wiener, and, especially,
+ Hilarie Orman contributed ideas to this discussion.
+
+ $ perimeter
+ See: security perimeter.
+
+
+
+
+
+
+Shirey Informational [Page 219]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ periods processing
+ (I) A mode of system operation in which information of different
+ sensitivities is processed at distinctly different times by the
+ same system, with the system being properly purged or sanitized
+ between periods. (See: color change.)
+
+ Tutorial: The security mode of operation and maximum
+ classification of data handled by the system is established for an
+ interval of time and then is changed for the following interval of
+ time. A period extends from the secure initialization of the
+ system to the completion of any purging of sensitive data handled
+ by the system during the period.
+
+ $ permanent storage
+ (I) Non-volatile media that, once written into, can never be
+ completely erased.
+
+ $ permission
+ 1a. (I) Synonym for "authorization". (Compare: privilege.)
+
+ 1b. (N) An authorization or set of authorizations to perform
+ security-relevant functions in the context of role-based access
+ control. [ANSI]
+
+ Tutorial: A permission is a positively stated authorization for
+ access that (a) can be associated with one or more roles and (b)
+ enables a user in a role to access a specified set of system
+ resources by causing a specific set of system actions to be
+ performed on the resources.
+
+ $ persona certificate
+ (I) An X.509 certificate issued to a system entity that wishes to
+ use a persona to conceal its true identity when using PEM or other
+ Internet services that depend on PKI support. (See: anonymity.)
+ [R1422]
+
+ Tutorial: PEM designers intended that (a) a CA issuing persona
+ certificates would explicitly not be vouching for the identity of
+ the system entity to whom the certificate is issued, (b) such
+ certificates would be issued only by CAs subordinate to a policy
+ CA having a policy stating that purpose (i.e., that would warn
+ relying parties that the "subject" field DN represented only a
+ persona and not a true, vetted user identity), and (c) the CA
+ would not need to maintain records binding the true identity of
+ the subject to the certificate.
+
+
+
+
+
+
+Shirey Informational [Page 220]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ However, the PEM designers also intended that a CA issuing persona
+ certificates would establish procedures (d) to enable "the holder
+ of a PERSONA certificate to request that his certificate be
+ revoked" and (e) to ensure that it did not issue the same subject
+ DN to multiple users. The latter condition implies that a persona
+ certificate is not an organizational certificate unless the
+ organization has just one member or representative.
+
+ $ personal identification number (PIN)
+ 1a. (I) A character string used as a password to gain access to a
+ system resource. (See: authentication information.)
+
+ Example: A cryptographic token typically requires its user to
+ enter a PIN in order to access information stored in the token and
+ invoke the token's cryptographic functions.
+
+ 1b. (O) An alphanumeric code or password used to authenticate an
+ identity.
+
+ Tutorial: Despite the words "identification" and "number", a PIN
+ seldom serves as a user identifier, and a PIN's characters are not
+ necessarily all numeric. Retail banking applications use 4-digit
+ numeric user PINs, but the FORTEZZA PC card uses 12-character
+ alphanumeric SSO PINs. (See: SSO PIN, user PIN.)
+
+ A better name for this concept would have been "personnel
+ authentication system string" (PASS), in which case, an
+ alphanumeric character string for this purpose would have been
+ called, obviously, a "PASSword".
+
+ $ personal information
+ (I) Information about a particular person, especially information
+ of an intimate or critical nature, that could cause harm or pain
+ to that person if disclosed to unauthorized parties. Examples:
+ medical record, arrest record, credit report, academic transcript,
+ training report, job application, credit card number, Social
+ Security number. (See: privacy.)
+
+ $ personality
+ 1. (I) Synonym for "principal".
+
+ 2. (O) /MISSI/ A set of MISSI X.509 public-key certificates that
+ have the same subject DN, together with their associated private
+ keys and usage specifications, that is stored on a FORTEZZA PC
+ card to support a role played by the card's user.
+
+ Tutorial: When a card's user selects a personality to use in a
+ FORTEZZA-aware application, the data determines behavior traits
+
+
+
+Shirey Informational [Page 221]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ (the personality) of the application. A card's user may have
+ multiple personalities on the card. Each has a "personality
+ label", a user-friendly character string that applications can
+ display to the user for selecting or changing the personality to
+ be used. For example, a military user's card might contain three
+ personalities: GENERAL HALFTRACK, COMMANDER FORT SWAMPY, and NEW
+ YEAR'S EVE PARTY CHAIRMAN. Each personality includes one or more
+ certificates of different types (such as DSA versus RSA), for
+ different purposes (such as digital signature versus encryption),
+ or with different authorizations.
+
+ $ personnel authentication system string (PASS)
+ (N) See: Tutorial under "personal identification number".
+
+ $ personnel security
+ (I) Procedures to ensure that persons who access a system have
+ proper clearance, authorization, and need-to-know as required by
+ the system's security policy. (See: security architecture.)
+
+ $ PGP(trademark)
+ (O) See: Pretty Good Privacy(trademark).
+
+ $ phase 1 negotiation
+ $ phase 2 negotiation
+ (I) /ISAKMP/ See: secondary definition under "Internet Security
+ Association and Key Management Protocol".
+
+ $ phishing
+ (D) /slang/ A technique for attempting to acquire sensitive data,
+ such as bank account numbers, through a fraudulent solicitation in
+ email or on a Web site, in which the perpetrator masquerades as a
+ legitimate business or reputable person. (See: social
+ engineering.)
+
+ Derivation: Possibly from "phony fishing"; the solicitation
+ usually involves some kind of lure or bait to hook unwary
+ recipients. (Compare: phreaking.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it is not listed
+ in most dictionaries and could confuse international readers.
+ (See: Deprecated Usage under "Green Book".)
+
+ $ Photuris
+ (I) A UDP-based, key establishment protocol for session keys,
+ designed for use with the IPsec protocols AH and ESP. Superseded
+ by IKE.
+
+
+
+
+
+Shirey Informational [Page 222]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ phreaking
+ (D) A contraction of "telephone breaking". An attack on or
+ penetration of a telephone system or, by extension, any other
+ communication or information system. [Raym]
+
+ Deprecated Term: IDOCs SHOULD NOT use this contraction; it is not
+ listed in most dictionaries and could confuse international
+ readers. (See: Deprecated Usage under "Green Book".)
+
+ $ physical destruction
+ (I) /threat action/ See: secondary definition under
+ "incapacitation".
+
+ $ physical security
+ (I) Tangible means of preventing unauthorized physical access to a
+ system. Examples: Fences, walls, and other barriers; locks, safes,
+ and vaults; dogs and armed guards; sensors and alarm bells.
+ [FP031, R1455] (See: security architecture.)
+
+ $ piggyback attack
+ (I) A form of active wiretapping in which the attacker gains
+ access to a system via intervals of inactivity in another user's
+ legitimate communication connection. Sometimes called a "between-
+ the-lines" attack. (See: hijack attack, man-in-the-middle attack.)
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because the term could confuse international
+ readers.
+
+ $ PIN
+ (I) See: personal identification number.
+
+ $ ping of death
+ (D) A denial-of-service attack that sends an improperly large ICMP
+ echo request packet (a "ping") with the intent of causing the
+ destination system to fail. (See: ping sweep, teardrop.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; instead, use
+ "ping packet overflow attack" or some other term that is specific
+ with regard to the attack mechanism.
+
+ Tutorial: This attack seeks to exploit an implementation
+ vulnerability. The IP specification requires hosts to be prepared
+ to accept datagrams of up to 576 octets, but also permits IP
+ datagrams to be up to 65,535 octets long. If an IP implementation
+ does not properly handle very long IP packets, the ping packet may
+ overflow the input buffer and cause a fatal system error.
+
+
+
+
+Shirey Informational [Page 223]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ ping sweep
+ (I) An attack that sends ICMP echo requests ("pings") to a range
+ of IP addresses, with the goal of finding hosts that can be probed
+ for vulnerabilities. (See: ping of death. Compare: port scan.)
+
+ $ PKCS
+ (N) See: Public-Key Cryptography Standards.
+
+ $ PKCS #5
+ (N) A standard [PKC05] (see: RFC 2898) from the PKCS series;
+ defines a method for encrypting an octet string with a secret key
+ derived from a password.
+
+ Tutorial: Although the method can be used for arbitrary octet
+ strings, its intended primary application in public-key
+ cryptography is for encrypting private keys when transferring them
+ from one computer system to another, as described in PKCS #8.
+
+ $ PKCS #7
+ (N) A standard [PKC07] (see: RFC 2315) from the PKCS series;
+ defines a syntax for data that may have cryptography applied to
+ it, such as for digital signatures and digital envelopes. (See:
+ CMS.)
+
+ $ PKCS #10
+ (N) A standard [PKC10] (see: RFC 2986) from the PKCS series;
+ defines a syntax for certification requests. (See: certification
+ request.)
+
+ Tutorial: A PKCS #10 request contains a DN and a public key, and
+ may contain other attributes, and is signed by the entity making
+ the request. The request is sent to a CA, who converts it to an
+ X.509 public-key certificate (or some other form), and returns it,
+ possibly in PKCS #7 format.
+
+ $ PKCS #11
+ (N) A standard [PKC11] from the PKCS series; defines CAPI called
+ "Cryptoki" for devices that hold cryptographic information and
+ perform cryptographic functions.
+
+ $ PKI
+ (I) See: public-key infrastructure.
+
+ $ PKINIT
+ (I) Abbreviation for "Public Key Cryptography for Initial
+ Authentication in Kerberos" (RFC 4556). (See: Tutorial under
+ "Kerberos".)
+
+
+
+
+Shirey Informational [Page 224]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ PKIX
+ 1a. (I) A contraction of "Public-Key Infrastructure (X.509)", the
+ name of the IETF working group that is specifying an architecture
+ [R3280] and set of protocols [R4210] to provide X.509-based PKI
+ services for the Internet.
+
+ 1b. (I) A collective name for that Internet PKI architecture and
+ associated set of protocols.
+
+ Tutorial: The goal of PKIX is to facilitate the use of X.509
+ public-key certificates in multiple Internet applications and to
+ promote interoperability between different implementations that
+ use those certificates. The resulting PKI is intended to provide a
+ framework that supports a range of trust and hierarchy
+ environments and a range of usage environments. PKIX specifies (a)
+ profiles of the v3 X.509 public-key certificate standards and the
+ v2 X.509 CRL standards for the Internet, (b) operational protocols
+ used by relying parties to obtain information such as certificates
+ or certificate status, (c) management protocols used by system
+ entities to exchange information needed for proper management of
+ the PKI, and (d) information about certificate policies and CPSs,
+ covering the areas of PKI security not directly addressed in the
+ rest of PKIX.
+
+ $ plain text
+ 1. (I) /noun/ Data that is input to an encryption process. (See:
+ plaintext. Compare: cipher text, clear text.)
+
+ 2. (D) /noun/ Synonym for "clear text".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "clear text". Sometimes plain text that is input to an
+ encryption operation is clear text, but other times plain text is
+ cipher text that was output from a previous encryption operation.
+ (See: superencryption.)
+
+ $ plaintext
+ 1. (O) /noun/ Synonym for "plain text".
+
+ 2. (I) /adjective/ Referring to plain text. Usage: Commonly used
+ instead of "plain-text". (Compare: ciphertext, cleartext.)
+
+ 3. (D) /noun/ Synonym for "cleartext".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "cleartext". Cleartext data is, by definition, not encrypted;
+ but plaintext data that is input to an encryption operation may be
+
+
+
+
+Shirey Informational [Page 225]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ cleartext data or may be ciphertext data that was output from a
+ previous encryption operation. (See: superencryption.)
+
+ $ PLI
+ (I) See: Private Line Interface.
+
+ $ PMA
+ (N) See: policy management authority.
+
+ $ Point-to-Point Protocol (PPP)
+ (I) An Internet Standard protocol (RFC 1661) for encapsulation and
+ full-duplex transportation of protocol data packets in OSIRM Layer
+ 3 over an OSIRM Layer 2 link between two peers, and for
+ multiplexing different Layer 3 protocols over the same link.
+ Includes optional negotiation to select and use a peer entity
+ authentication protocol to authenticate the peers to each other
+ before they exchange Layer 3 data. (See: CHAP, EAP, PAP.)
+
+ $ Point-to-Point Tunneling Protocol (PPTP)
+ (I) An Internet client-server protocol (RFC 2637) (originally
+ developed by Ascend and Microsoft) that enables a dial-up user to
+ create a virtual extension of the dial-up link across a network by
+ tunneling PPP over IP. (See: L2TP.)
+
+ Tutorial: PPP can encapsulate any IPS Network Interface Layer
+ protocol or OSIRM Layer 3 protocol. Therefore, PPTP does not
+ specify security services; it depends on protocols above and below
+ it to provide any needed security. PPTP makes it possible to
+ divorce the location of the initial dial-up server (i.e., the PPTP
+ Access Concentrator, the client, which runs on a special-purpose
+ host) from the location at which the dial-up protocol (PPP)
+ connection is terminated and access to the network is provided
+ (i.e., at the PPTP Network Server, which runs on a general-purpose
+ host).
+
+ $ policy
+ 1a. (I) A plan or course of action that is stated for a system or
+ organization and is intended to affect and direct the decisions
+ and deeds of that entity's components or members. (See: security
+ policy.)
+
+ 1b. (O) A definite goal, course, or method of action to guide and
+ determine present and future decisions, that is implemented or
+ executed within a particular context, such as within a business
+ unit. [R3198]
+
+ Deprecated Abbreviation: IDOCs SHOULD NOT use "policy" as an
+ abbreviation of either "security policy" or "certificate policy".
+
+
+
+Shirey Informational [Page 226]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Instead, to avoid misunderstanding, use a fully qualified term, at
+ least at the point of first usage.
+
+ Tutorial: The introduction of new technology to replace
+ traditional systems can result in new systems being deployed
+ without adequate policy definition and before the implications of
+ the new technology are fully understand. In some cases, it can be
+ difficult to establish policies for new technology before the
+ technology has been operationally tested and evaluated. Thus,
+ policy changes tend to lag behind technological changes, such that
+ either old policies impede the technical innovation, or the new
+ technology is deployed without adequate policies to govern its
+ use.
+
+ When new technology changes the ways that things are done, new
+ "procedures" must be defined to establish operational guidelines
+ for using the technology and achieving satisfactory results, and
+ new "practices" must be established for managing new systems and
+ monitoring results. Practices and procedures are more directly
+ coupled to actual systems and business operations than are
+ polices, which tend to be more abstract.
+ - "Practices" define how a system is to be managed and what
+ controls are in place to monitor the system and detect abnormal
+ behavior or quality problems. Practices are established to
+ ensure that a system is managed in compliance with stated
+ policies. System audits are primarily concerned with whether or
+ not practices are being followed. Auditors evaluate the
+ controls to make sure they conform to accepted industry
+ standards, and then confirm that controls are in place and that
+ control measurements are being gathered. Audit trails are
+ examples of control measurements that are recorded as part of
+ system operations.
+ - "Procedures" define how a system is operated, and relate
+ closely to issues of what technology is used, who the operators
+ are, and how the system is deployed physically. Procedures
+ define both normal and abnormal operating circumstances.
+ - For every control defined by a practice statement, there should
+ be corresponding procedures to implement the control and
+ provide ongoing measurement of the control parameters.
+ Conversely, procedures require management practices to insure
+ consistent and correct operational behavior.
+
+ $ policy approval authority
+ (D) /PKI/ Synonym for "policy management authority". [PAG]
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as synonym for
+ "policy management authority". The term suggests a limited,
+ passive role that is not typical of PMAs.
+
+
+
+Shirey Informational [Page 227]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ policy approving authority (PAA)
+ (O) /MISSI/ The top-level signing authority of a MISSI
+ certification hierarchy. The term refers both to that
+ authoritative office or role and to the person who plays that
+ role. (See: policy management authority, root registry.)
+
+ Tutorial: A MISSI PAA (a) registers MISSI PCAs and signs their
+ X.509 public-key certificates, (b) issues CRLs but does not issue
+ a CKL, and (c) may issue cross-certificates to other PAAs.
+
+ $ policy authority
+ (D) /PKI/ Synonym for "policy management authority". [PAG]
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as synonym for
+ "policy management authority". The term is unnecessarily vague and
+ thus may be confused with other PKI entities, such as CAs and RAs,
+ that enforce of apply various aspects of PKI policy.
+
+ $ policy certification authority (Internet PCA)
+ (I) An X.509-compliant CA at the second level of the Internet
+ certification hierarchy, under the IPRA. Each PCA operates under
+ its published security policy (see: certificate policy, CPS) and
+ within constraints established by the IPRA for all PCAs. [R1422].
+ (See: policy creation authority.)
+
+ $ policy creation authority (MISSI PCA)
+ (O) /MISSI/ The second level of a MISSI certification hierarchy;
+ the administrative root of a security policy domain of MISSI users
+ and other, subsidiary authorities. The term refers both to that
+ authoritative office or role and to the person who fills that
+ office. (See: policy certification authority.)
+
+ Tutorial: A MISSI PCA's certificate is issued by a PAA. The PCA
+ registers the CAs in its domain, defines their configurations, and
+ issues their X.509 public-key certificates. (The PCA may also
+ issue certificates for SCAs, ORAs, and other end entities, but a
+ PCA does not usually do this.) The PCA periodically issues CRLs
+ and CKLs for its domain.
+
+ $ policy management authority (PMA)
+ (I) /PKI/ A person, role, or organization within a PKI that is
+ responsible for (a) creating or approving the content of the
+ certificate policies and CPSs that are used in the PKI; (b)
+ ensuring the administration of those policies; and (c) approving
+ any cross-certification or interoperability agreements with CAs
+ external to the PKI and any related policy mappings. The PMA may
+ also be the accreditor for the PKI as a whole or for some of its
+
+
+
+
+Shirey Informational [Page 228]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ components or applications. [DoD9, PAG] (See: policy approving
+ authority.)
+
+ Example: In the U.S. Department of Defense, an organization called
+ the Policy Management Authority is responsible for DoD PKI [DoD9].
+
+ $ policy mapping
+ (I) "Recognizing that, when a CA in one domain certifies a CA in
+ another domain, a particular certificate policy in the second
+ domain may be considered by the authority of the first domain to
+ be equivalent (but not necessarily identical in all respects) to a
+ particular certificate policy in the first domain." [X509]
+
+ $ policy rule
+ (I) A building block of a security policy; it (a) defines a set of
+ system conditions and (b) specifies a set of system actions that
+ are to be performed if those conditions occur. [R3198]
+
+ $ POP3
+ (I) See: Post Office Protocol, version 3.
+
+ $ POP3 APOP
+ (I) A POP3 command (better described as a transaction type, or
+ subprotocol) by which a POP3 client optionally uses a keyed hash
+ (based on MD5) to authenticate itself to a POP3 server and,
+ depending on the server implementation, to protect against replay
+ attacks. (See: CRAM, POP3 AUTH, IMAP4 AUTHENTICATE.)
+
+ Tutorial: The server includes a unique time stamp in its greeting
+ to the client. The subsequent APOP command sent by the client to
+ the server contains the client's name and the hash result of
+ applying MD5 to a string formed from both the time stamp and a
+ shared secret value that is known only to the client and the
+ server. APOP was designed to provide an alternative to using
+ POP3's USER and PASS (i.e., password) command pair, in which the
+ client sends a cleartext password to the server.
+
+ $ POP3 AUTH
+ (I) A POP3 command [R1734] (better described as a transaction
+ type, or subprotocol) by which a POP3 client optionally proposes a
+ mechanism to a POP3 server to authenticate the client to the
+ server and provide other security services. (See: POP3 APOP, IMAP4
+ AUTHENTICATE.)
+
+ Tutorial: If the server accepts the proposal, the command is
+ followed by performing a challenge-response authentication
+ protocol and, optionally, negotiating a protection mechanism for
+
+
+
+
+Shirey Informational [Page 229]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ subsequent POP3 interactions. The security mechanisms used by POP3
+ AUTH are those used by IMAP4.
+
+ $ port scan
+ (I) A technique that sends client requests to a range of service
+ port addresses on a host. (See: probe. Compare: ping sweep.)
+
+ Tutorial: A port scan can be used for pre-attack surveillance,
+ with the goal of finding an active port and subsequently
+ exploiting a known vulnerability of that port's service. A port
+ scan can also be used as a flooding attack.
+
+ $ positive authorization
+ (I) The principle that a security architecture should be designed
+ so that access to system resources is permitted only when
+ explicitly granted; i.e., in the absence of an explicit
+ authorization that grants access, the default action shall be to
+ refuse access. (See: authorization, access.)
+
+ $ POSIX
+ (N) Portable Operating System Interface for Computer Environments,
+ a standard [FP151, I9945] (originally IEEE Standard P1003.1) that
+ defines an operating system interface and environment to support
+ application portability at the source code level. It is intended
+ to be used by both application developers and system implementers.
+
+ Tutorial: P1003.1 supports security functionality like that on
+ most UNIX systems, including discretionary access control and
+ privileges. IEEE Draft Standard P1003.6 specifies additional
+ functionality not provided in the base standard, including (a)
+ discretionary access control, (b) audit trail mechanisms, (c)
+ privilege mechanisms, (d) mandatory access control, and (e)
+ information label mechanisms.
+
+ $ Post Office Protocol, version 3 (POP3)
+ (I) An Internet Standard protocol (RFC 1939) by which a client
+ workstation can dynamically access a mailbox on a server host to
+ retrieve mail messages that the server has received and is holding
+ for the client. (See: IMAP4.)
+
+ Tutorial: POP3 has mechanisms for optionally authenticating a
+ client to a server and providing other security services. (See:
+ POP3 APOP, POP3 AUTH.)
+
+ $ PPP
+ (I) See: Point-to-Point Protocol.
+
+
+
+
+
+Shirey Informational [Page 230]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ PPTP
+ (I) See: Point-to-Point Tunneling Protocol.
+
+ $ preauthorization
+ (N) /PKI/ A CAW feature that enables certification requests to be
+ automatically validated against data provided in advance to the CA
+ by an authorizing entity.
+
+ $ precedence
+ 1. (I) /information system/ A ranking assigned to events or data
+ objects that determines the relative order in which they are
+ processed.
+
+ 2. (N) /communication system/ A designation assigned to a
+ communication (i.e., packet, message, data stream, connection,
+ etc.) by the originator to state the importance or urgency of that
+ communication versus other communications, and thus indicate to
+ the transmission system the relative order of handling, and
+ indicate to the receiver the order in which the communication is
+ to be noted. [F1037] (See: availability, critical, preemption.)
+
+ Example: The "Precedence" subfield of the "Type of Service" field
+ of the IPv4 header supports the following designations (in
+ descending order of importance): 111 Network Control, 110
+ Internetwork Control, 101 CRITIC/ECP (Critical Intelligence
+ Communication/Emergency Command Precedence), 100 Flash Override,
+ 011 Flash, 010 Immediate, 001 Priority, and 000 Routine. These
+ designations were adopted from U.S. DoD systems that existed
+ before ARPANET.
+
+ $ preemption
+ (N) The seizure, usually automatic, of system resources that are
+ being used to serve a lower-precedence communication, in order to
+ serve immediately a higher-precedence communication. [F1037]
+
+ $ Pretty Good Privacy(trademark) (PGP(trademark))
+ (O) Trademarks of Network Associates, Inc., referring to a
+ computer program (and related protocols) that uses cryptography to
+ provide data security for electronic mail and other applications
+ on the Internet. (Compare: DKIM, MOSS, MSP, PEM, S/MIME.)
+
+ Tutorial: PGP encrypts messages with a symmetric algorithm
+ (originally, IDEA in CFB mode), distributes the symmetric keys by
+ encrypting them with an asymmetric algorithm (originally, RSA),
+ and creates digital signatures on messages with a cryptographic
+ hash and an asymmetric encryption algorithm (originally, MD5 and
+ RSA). To establish ownership of public keys, PGP depends on the
+ "web of trust".
+
+
+
+Shirey Informational [Page 231]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ prevention
+ (I) See: secondary definition under "security".
+
+ $ primary account number (PAN)
+ (O) /SET/ "The assigned number that identifies the card issuer and
+ cardholder. This account number is composed of an issuer
+ identification number, an individual account number
+ identification, and an accompanying check digit as defined by ISO
+ 7812-1985." [SET2, I7812] (See: bank identification number.)
+
+ Tutorial: The PAN is embossed, encoded, or both on a magnetic-
+ strip-based credit card. The PAN identifies the issuer to which a
+ transaction is to be routed and the account to which it is to be
+ applied unless specific instructions indicate otherwise. The
+ authority that assigns the BIN part of the PAN is the American
+ Bankers Association.
+
+ $ principal
+ (I) A specific identity claimed by a user when accessing a system.
+
+ Usage: Usually understood to be an identity that is registered in
+ and authenticated by the system; equivalent to the notion of login
+ account identifier. Each principal is normally assigned to a
+ single user, but a single user may be assigned (or attempt to use)
+ more than one principal. Each principal can spawn one or more
+ subjects, but each subject is associated with only one principal.
+ (Compare: role, subject, user.)
+
+ (I) /Kerberos/ A uniquely identified (i.e., uniquely named) client
+ or server instance that participates in a network communication.
+
+ $ priority
+ (I) /information system/ Precedence for processing an event or
+ data object, determined by security importance or other factors.
+ (See: precedence.)
+
+ $ privacy
+ 1. (I) The right of an entity (normally a person), acting in its
+ own behalf, to determine the degree to which it will interact with
+ its environment, including the degree to which the entity is
+ willing to share its personal information with others. (See:
+ HIPAA, personal information, Privacy Act of 1974. Compare:
+ anonymity, data confidentiality.) [FP041]
+
+ 2. (O) "The right of individuals to control or influence what
+ information related to them may be collected and stored and by
+ whom and to whom that information may be disclosed." [I7498-2]
+
+
+
+
+Shirey Informational [Page 232]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 3. (D) Synonym for "data confidentiality".
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term as a synonym
+ for "data confidentiality" or "data confidentiality service",
+ which are different concepts. Privacy is a reason for security
+ rather than a kind of security. For example, a system that stores
+ personal data needs to protect the data to prevent harm,
+ embarrassment, inconvenience, or unfairness to any person about
+ whom data is maintained, and to protect the person's privacy. For
+ that reason, the system may need to provide data confidentiality
+ service.
+
+ Tutorial: The term "privacy" is used for various separate but
+ related concepts, including bodily privacy, territorial privacy,
+ personal information privacy, and communication privacy. IDOCs are
+ expected to address only communication privacy, which in this
+ Glossary is defined primarily by "data confidentiality" and
+ secondarily by "data integrity".
+
+ IDOCs are not expected to address information privacy, but this
+ Glossary provides definition 1 for that concept because personal
+ information privacy is often confused with communication privacy.
+ IDOCs are not expected to address bodily privacy or territorial
+ privacy, and this Glossary does not define those concepts because
+ they are not easily confused with communication privacy.
+
+ $ Privacy Act of 1974
+ (O) A U.S. Federal law (Section 552a of Title 5, United States
+ Code) that seeks to balance the U.S. Government's need to maintain
+ data about individuals with the rights of individuals to be
+ protected against unwarranted invasions of their privacy stemming
+ from federal agencies' collection, maintenance, use, and
+ disclosure of personal data. (See: privacy.)
+
+ Tutorial: In 1974, the U.S. Congress was concerned with the
+ potential for abuses that could arise from the Government's
+ increasing use of computers to store and retrieve personal data.
+ Therefore, the Act has four basic policy objectives:
+ - To restrict disclosure of personally identifiable records
+ maintained by Federal agencies.
+ - To grant individuals increased rights of access to Federal
+ agency records maintained on themselves.
+ - To grant individuals the right to seek amendment of agency
+ records maintained on themselves upon a showing that the
+ records are not accurate, relevant, timely, or complete.
+ - To establish a code of "fair information practices" that
+ requires agencies to comply with statutory norms for
+ collection, maintenance, and dissemination of records.
+
+
+
+Shirey Informational [Page 233]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Privacy Enhanced Mail (PEM)
+ (I) An Internet protocol to provide data confidentiality, data
+ integrity, and data origin authentication for electronic mail.
+ [R1421, R1422]. (Compare: DKIM, MOSS, MSP, PGP, S/MIME.)
+
+ Tutorial: PEM encrypts messages with a symmetric algorithm
+ (originally, DES in CBC mode), provides distribution for the
+ symmetric keys by encrypting them with an asymmetric algorithm
+ (originally, RSA), and signs messages with an asymmetric
+ encryption algorithm over a cryptographic hash (originally, RSA
+ over either MD2 or MD5). To establish ownership of public keys,
+ PEM uses a certification hierarchy, with X.509 public-key
+ certificates and X.509 CRLs that are signed with an asymmetric
+ encryption algorithm over a cryptographic hash (originally, RSA
+ over MD2).
+
+ PEM is designed to be compatible with a wide range of key
+ management methods, but is limited to specifying security services
+ only for text messages and, like MOSS, has not been widely
+ implemented in the Internet.
+
+ $ private component
+ (I) Synonym for "private key".
+
+ Deprecated Usage: In most cases, IDOCs SHOULD NOT use this term;
+ instead, to avoid confusing readers, use "private key". However,
+ the term MAY be used when discussing a key pair; e.g., "A key pair
+ has a public component and a private component."
+
+ $ private extension
+ (I) See: secondary definition under "extension".
+
+ $ private key
+ 1. (I) The secret component of a pair of cryptographic keys used
+ for asymmetric cryptography. (See: key pair, public key, secret
+ key.)
+
+ 2. (O) In a public key cryptosystem, "that key of a user's key
+ pair which is known only by that user." [X509]
+
+ $ Private Line Interface (PLI)
+ (I) The first end-to-end packet encryption system for a computer
+ network, developed by BBN starting in 1975 for the U.S. DoD,
+ incorporating U.S. Government-furnished, military-grade COMSEC
+ equipment (TSEC/KG-34). [B1822] (Compare: IPLI.)
+
+
+
+
+
+
+Shirey Informational [Page 234]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ privilege
+ 1a. (I) /access control/ A synonym for "authorization". (See
+ authorization. Compare: permission.)
+
+ 1b. (I) /computer platform/ An authorization to perform a
+ security-relevant function in the context of a computer's
+ operating system.
+
+ $ privilege management infrastructure
+ (O) "The infrastructure able to support the management of
+ privileges in support of a comprehensive authorization service and
+ in relationship with a" PKI; i.e., processes concerned with
+ attribute certificates. [X509]
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term with this
+ definition. This definition is vague, and there is no consensus on
+ a more specific one.
+
+ $ privileged process
+ (I) A computer process that is authorized (and, therefore,
+ trusted) to perform some security-relevant functions that ordinary
+ processes are not. (See: privilege, trusted process.)
+
+ $ privileged user
+ (I) An user that has access to system control, monitoring, or
+ administration functions. (See: privilege, /UNIX/ under "root",
+ superuser, user.)
+
+ Tutorial: Privileged users include the following types:
+ - Users with near or complete control of a system, who are
+ authorized to set up and administer user accounts, identifiers,
+ and authentication information, or are authorized to assign or
+ change other users' access to system resources.
+ - Users that are authorized to change control parameters (e.g.,
+ network addresses, routing tables, processing priorities) on
+ routers, multiplexers, and other important equipment.
+ - Users that are authorized to monitor or perform troubleshooting
+ for a system's security functions, typically using special
+ tools and features that are not available to ordinary users.
+
+ $ probe
+ (I) /verb/ A technique that attempts to access a system to learn
+ something about the system. (See: port scan.)
+
+ Tutorial: The purpose of a probe may be offensive, e.g., an
+ attempt to gather information for circumventing the system's
+ protections; or the purpose may be defensive, e.g., to verify that
+ the system is working properly.
+
+
+
+Shirey Informational [Page 235]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ procedural security
+ (D) Synonym for "administrative security".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ "administrative security". The term may be misleading because any
+ type of security may involve procedures, and procedures may be
+ either external to the system or internal. Instead, use
+ "administrative security", "communication security", "computer
+ security", "emanations security", "personnel security", "physical
+ security", or whatever specific type is meant. (See: security
+ architecture.)
+
+ $ profile
+ See: certificate profile, protection profile.
+
+ $ proof-of-possession protocol
+ (I) A protocol whereby a system entity proves to another that it
+ possesses and controls a cryptographic key or other secret
+ information. (See: zero-knowledge proof.)
+
+ $ proprietary
+ (I) Refers to information (or other property) that is owned by an
+ individual or organization and for which the use is restricted by
+ that entity.
+
+ $ protected checksum
+ (I) A checksum that is computed for a data object by means that
+ protect against active attacks that would attempt to change the
+ checksum to make it match changes made to the data object. (See:
+ digital signature, keyed hash, Tutorial under "checksum".)
+
+ $ protective packaging
+ (N) "Packaging techniques for COMSEC material that discourage
+ penetration, reveal a penetration has occurred or was attempted,
+ or inhibit viewing or copying of keying material prior to the time
+ it is exposed for use." [C4009] (See: tamper-evident, tamper-
+ resistant. Compare: QUADRANT.)
+
+ $ protection authority
+ (I) See: secondary definition under "Internet Protocol Security
+ Option".
+
+ $ protection level
+ (N) /U.S. Government/ An indication of the trust that is needed in
+ a system's technical ability to enforce security policy for
+ confidentiality. (Compare: /system operation/ under "mode of
+ operation".)
+
+
+
+
+Shirey Informational [Page 236]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: An organization's security policy could define
+ protection levels that are based on comparing (a) the sensitivity
+ of information handled by a system to (b) the authorizations of
+ users that receive information from the system without manual
+ intervention and reliable human review. For each level, the policy
+ could specify security features and assurances that must be
+ included in any system that was intended to operate at that level.
+
+ Example: Given some set of data objects that are classified at one
+ or more hierarchical levels and in one or more non-hierarchical
+ categories, the following table defines five protection levels for
+ systems that would handle that data. Beginning with PL1 and
+ evolving to PL5, each successive level would require stronger
+ features and assurances to handle the dataset. (See: clearance,
+ formal access approval, and need-to-know.)
+
+ Lowest Clearance Formal Access Need-To-Know
+ Among All Users Approval of Users of Users
+ +-------------------+-------------------+-------------------+
+ PL5 | Some user has no | [Does not matter.]| [Does not matter.]|
+ High | clearance at all. | | |
+ +-------------------+-------------------+-------------------+
+ PL4 | All are cleared | [Does not matter.]| [Does not matter.]|
+ | for some data. | | |
+ +-------------------+-------------------+-------------------+
+ PL3 | All are cleared | Some not approved | [Does not matter.]|
+ | for all data. | for all data. | |
+ +-------------------+-------------------+-------------------+
+ PL2 | All are cleared | All are approved | Some don't need to|
+ | for all data. | for all data. | to know all data. |
+ +-------------------+-------------------+-------------------+
+ PL1 | All are cleared | All are approved | All have a need |
+ Low | for all data. | for all data. | to know all data. |
+ +-------------------+-------------------+-------------------+
+
+ Each of these protection levels can be viewed as being equivalent to
+ one or more modes of system operation defined in this Glossary:
+ - PL5 is equivalent to multilevel security mode.
+ - PL4 is equivalent to either multilevel or compartmented
+ security mode, depending on the details of users' clearances.
+ - PL3 is equivalent to partitioned security mode.
+ - PL2 is equivalent to system-high security mode.
+ - PL1 is equivalent to dedicated security mode.
+
+ $ protection profile
+ (N) /Common Criteria/ An implementation-independent set of
+ security requirements for a category of targets of evaluation that
+
+
+
+
+Shirey Informational [Page 237]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ meet specific consumer needs. [CCIB] Example: [IDSAN]. (See:
+ target of evaluation. Compare: certificate profile, package.)
+
+ Tutorial: A protection profile (PP) is the kind of document used
+ by consumers to specify functional requirements they want in a
+ product, and a security target (ST) is the kind of document used
+ by vendors to make functional claims about a product.
+
+ A PP is intended to be a reusable statement of product security
+ needs, which are known to be useful and effective, for a set of
+ information technology security products that could be built. A PP
+ contains a set of security requirements, preferably taken from the
+ catalogs in Parts 2 and 3 of the Common Criteria, and should
+ include an EAL. A PP could be developed by user communities,
+ product developers, or any other parties interested in defining a
+ common set of requirements.
+
+ $ protection ring
+ (I) One of a hierarchy of privileged operation modes of a system
+ that gives certain access rights to processes authorized to
+ operate in that mode. (See: Multics.)
+
+ $ protective distribution system (PDS)
+ (N) A wireline or fiber-optic communication system used to
+ transmit cleartext classified information through an area of
+ lesser classification or control. [N7003]
+
+ $ protocol
+ 1a. (I) A set of rules (i.e., formats and procedures) to implement
+ and control some type of association (e.g., communication) between
+ systems. Example: Internet Protocol.
+
+ 1b. (I) A series of ordered computing and communication steps that
+ are performed by two or more system entities to achieve a joint
+ objective. [A9042]
+
+ $ protocol control information (PCI)
+ (N) See: secondary definition under "protocol data unit".
+
+ $ protocol data unit (PDU)
+ (N) A data packet that is defined for peer-to-peer transfers in a
+ protocol layer.
+
+ Tutorial: A PDU consists of two disjoint subsets of data: the SDU
+ and the PCI. (Although these terms -- PDU, SDU, and PCI --
+ originated in the OSIRM, they are also useful and permissible in
+ an IPS context.)
+
+
+
+
+Shirey Informational [Page 238]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - The "service data unit" (SDU) in a packet is data that the
+ protocol transfers between peer protocol entities on behalf of
+ the users of that layer's services. For Layers 1 through 6, the
+ layer's users are peer protocol entities at a higher layer; for
+ Layer 7, the users are application entities outside the scope
+ of the OSIRM.
+ - The "protocol control information" (PCI) in a packet is data
+ that peer protocol entities exchange between themselves to
+ control their joint operation of the layer.
+
+ $ protocol suite
+ (I) A complementary collection of communication protocols used in
+ a computer network. (See: IPS, OSI.)
+
+ $ proxy
+ 1. (I) A computer process that acts on behalf of a user or client.
+
+ 2. (I) A computer process -- often used as, or as part of, a
+ firewall -- that relays application transactions or a protocol
+ between client and server computer systems, by appearing to the
+ client to be the server and appearing to the server to be the
+ client. (See: SOCKS.)
+
+ Tutorial: In a firewall, a proxy server usually runs on a bastion
+ host, which may support proxies for several applications and
+ protocols (e.g., FTP, HTTP, and TELNET). Instead of a client in
+ the protected enclave connecting directly to an external server,
+ the internal client connects to the proxy server, which in turn
+ connects to the external server. The proxy server waits for a
+ request from inside the firewall, forwards the request to the
+ server outside the firewall, gets the response, then sends the
+ response back to the client. The proxy may be transparent to the
+ clients, or they may need to connect first to the proxy server,
+ and then use that association to also initiate a connection to the
+ real server.
+
+ Proxies are generally preferred over SOCKS for their ability to
+ perform caching, high-level logging, and access control. A proxy
+ can provide security service beyond that which is normally part of
+ the relayed protocol, such as access control based on peer entity
+ authentication of clients, or peer entity authentication of
+ servers when clients do not have that ability. A proxy at OSIRM
+ Layer 7 can also provide finer-grained security service than can a
+ filtering router at Layer 3. For example, an FTP proxy could
+ permit transfers out of, but not into, a protected network.
+
+
+
+
+
+
+Shirey Informational [Page 239]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ proxy certificate
+ (I) An X.509 public-key certificate derived from an end-entity
+ certificate, or from another proxy certificate, for the purpose of
+ establishing proxies and delegating authorizations in the context
+ of a PKI-based authentication system. [R3820]
+
+ Tutorial: A proxy certificate has the following properties:
+ - It contains a critical extension that (a) identifies it as a
+ proxy certificate and (b) may contain a certification path
+ length constraint and policy constraints.
+ - It contains the public component of a key pair that is distinct
+ from that associated with any other certificate.
+ - It is signed by the private component of a key pair that is
+ associated with an end-entity certificate or another proxy
+ certificate.
+ - Its associated private key can be used to sign only other proxy
+ certificates (not end-entity certificates).
+ - Its "subject" DN is derived from its "issuer" DN and is unique.
+ - Its "issuer" DN is the "subject" DN of an end-entity
+ certificate or another proxy certificate.
+
+ $ pseudorandom
+ (I) A sequence of values that appears to be random (i.e.,
+ unpredictable) but is actually generated by a deterministic
+ algorithm. (See: compression, random, random number generator.)
+
+ $ pseudorandom number generator
+ (I) See: secondary definition under "random number generator".
+
+ $ public component
+ (I) Synonym for "public key".
+
+ Deprecated Usage: In most cases, IDOCs SHOULD NOT use this term;
+ to avoid confusing readers, use "private key" instead. However,
+ the term MAY be used when discussing a key pair; e.g., "A key pair
+ has a public component and a private component."
+
+ $ public key
+ 1. (I) The publicly disclosable component of a pair of
+ cryptographic keys used for asymmetric cryptography. (See: key
+ pair. Compare: private key.)
+
+ 2. (O) In a public key cryptosystem, "that key of a user's key
+ pair which is publicly known." [X509]
+
+
+
+
+
+
+
+Shirey Informational [Page 240]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ public-key certificate
+ 1. (I) A digital certificate that binds a system entity's
+ identifier to a public key value, and possibly to additional,
+ secondary data items; i.e., a digitally signed data structure that
+ attests to the ownership of a public key. (See: X.509 public-key
+ certificate.)
+
+ 2. (O) "The public key of a user, together with some other
+ information, rendered unforgeable by encipherment with the private
+ key of the certification authority which issued it." [X509]
+
+ Tutorial: The digital signature on a public-key certificate is
+ unforgeable. Thus, the certificate can be published, such as by
+ posting it in a directory, without the directory having to protect
+ the certificate's data integrity.
+
+ $ public-key cryptography
+ (I) Synonym for "asymmetric cryptography".
+
+ $ Public-Key Cryptography Standards (PKCS)
+ (N) A series of specifications published by RSA Laboratories for
+ data structures and algorithms used in basic applications of
+ asymmetric cryptography. [PKCS] (See: PKCS #5 through PKCS #11.)
+
+ Tutorial: The PKCS were begun in 1991 in cooperation with industry
+ and academia, originally including Apple, Digital, Lotus,
+ Microsoft, Northern Telecom, Sun, and MIT. Today, the
+ specifications are widely used, but they are not sanctioned by an
+ official standards organization, such as ANSI, ITU-T, or IETF. RSA
+ Laboratories retains sole decision-making authority over the PKCS.
+
+ $ public-key forward secrecy (PFS)
+ (I) For a key-agreement protocol based on asymmetric cryptography,
+ the property that ensures that a session key derived from a set of
+ long-term public and private keys will not be compromised if one
+ of the private keys is compromised in the future. (See: Usage note
+ and other discussion under "perfect forward secrecy".)
+
+ $ public-key Kerberos
+ (I) See: Tutorial under "Kerberos", PKINIT.
+
+ $ public-key infrastructure (PKI)
+ 1. (I) A system of CAs (and, optionally, RAs and other supporting
+ servers and agents) that perform some set of certificate
+ management, archive management, key management, and token
+ management functions for a community of users in an application of
+ asymmetric cryptography. (See: hierarchical PKI, mesh PKI,
+ security management infrastructure, trust-file PKI.)
+
+
+
+Shirey Informational [Page 241]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (I) /PKIX/ The set of hardware, software, people, policies, and
+ procedures needed to create, manage, store, distribute, and revoke
+ digital certificates based on asymmetric cryptography.
+
+ Tutorial: The core PKI functions are (a) to register users and
+ issue their public-key certificates, (b) to revoke certificates
+ when required, and (c) to archive data needed to validate
+ certificates at a much later time. Key pairs for data
+ confidentiality may be generated (and perhaps escrowed) by CAs or
+ RAs, but requiring a PKI client to generate its own digital
+ signature key pair helps maintain system integrity of the
+ cryptographic system, because then only the client ever possesses
+ the private key it uses. Also, an authority may be established to
+ approve or coordinate CPSs, which are security policies under
+ which components of a PKI operate.
+
+ A number of other servers and agents may support the core PKI, and
+ PKI clients may obtain services from them, such as certificate
+ validation services. The full range of such services is not yet
+ fully understood and is evolving, but supporting roles may include
+ archive agent, certified delivery agent, confirmation agent,
+ digital notary, directory, key escrow agent, key generation agent,
+ naming agent who ensures that issuers and subjects have unique
+ identifiers within the PKI, repository, ticket-granting agent,
+ time-stamp agent, and validation agent.
+
+ $ purge
+ 1. (I) Synonym for "erase".
+
+ 2. (O) /U.S. Government/ Use degaussing or other methods to render
+ magnetically stored data unusable and irrecoverable by any means,
+ including laboratory methods. [C4009] (Compare: /U.S. Government/
+ erase.)
+
+ $ QUADRANT
+ (O) /U.S. Government/ Short name for technology and methods that
+ protect cryptographic equipment by making the equipment tamper-
+ resistant. [C4009] (Compare: protective packaging, TEMPEST.)
+
+ Tutorial: Equipment cannot be made completely tamper-proof, but it
+ can be made tamper-resistant or tamper-evident.
+
+ $ qualified certificate
+ (I) A public-key certificate that has the primary purpose of
+ identifying a person with a high level of assurance, where the
+ certificate meets some qualification requirements defined by an
+ applicable legal framework, such as the European Directive on
+ Electronic Signature. [R3739]
+
+
+
+Shirey Informational [Page 242]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ quick mode
+ (I) See: /IKE/ under "mode".
+
+ $ RA
+ (I) See: registration authority.
+
+ $ RA domains
+ (I) A feature of a CAW that allows a CA to divide the
+ responsibility for certificate requests among multiple RAs.
+
+ Tutorial: This ability might be used to restrict access to private
+ authorization data that is provided with a certificate request,
+ and to distribute the responsibility to review and approve
+ certificate requests in high-volume environments. RA domains might
+ segregate certificate requests according to an attribute of the
+ certificate's subject, such as an organizational unit.
+
+ $ RADIUS
+ (I) See: Remote Authentication Dial-In User Service.
+
+ $ Rainbow Series
+ (O) /COMPUSEC/ A set of more than 30 technical and policy
+ documents with colored covers, issued by the NCSC, that discuss in
+ detail the TCSEC and provide guidance for meeting and applying the
+ criteria. (See: Green Book, Orange Book, Red Book, Yellow Book.)
+
+ $ random
+ (I) In essence, "random" means "unpredictable". [SP22, Knut,
+ R4086] (See: cryptographic key, pseudorandom.)
+ - "Random sequence": A sequence in which each successive value is
+ obtained merely by chance and does not depend on the preceding
+ values of the sequence. In a random sequence of bits, each bit
+ is unpredictable; i.e., (a) the probability of each bit being a
+ "0" or "1" is 1/2, and (b) the value of each bit is independent
+ of any other bit in the sequence.
+ - "Random value": An individual value that is unpredictable;
+ i.e., each value in the total population of possibilities has
+ equal probability of being selected.
+
+ $ random number generator
+ (I) A process that is invoked to generate a random sequence of
+ values (usually a sequence of bits) or an individual random value.
+
+ Tutorial: There are two basic types of generators. [SP22]
+ - "(True) random number generator": It uses one or more non-
+ deterministic bit sources (e.g., electrical circuit noise,
+ timing of human processes such as key strokes or mouse
+ movements, semiconductor quantum effects, and other physical
+
+
+
+Shirey Informational [Page 243]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ phenomena) and a processing function that formats the bits, and
+ it outputs a sequence of values that is unpredictable and
+ uniformly distributed.
+ - "Pseudorandom number generator": It uses a deterministic
+ computational process (usually implemented by software) that
+ has one or more inputs called "seeds", and it outputs a
+ sequence of values that appears to be random according to
+ specified statistical tests.
+
+ $ RBAC
+ (N) See: role-based access control, rule-based access control.
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because the abbreviation is ambiguous.
+
+ $ RC2, RC4, RC6
+ (N) See: Rivest Cipher #2, #4, #6.
+
+ $ read
+ (I) /security model/ A system operation that causes a flow of
+ information from an object to a subject. (See: access mode.
+ Compare: write.)
+
+ $ realm
+ (I) /Kerberos/ A domain consisting of a set of Kerberized clients,
+ Kerberized application servers, and one or more Kerberos
+ authentication servers and ticket-granting servers that support
+ the clients and applications, all operating under the same
+ security policy. (See: domain.)
+
+ $ recovery
+ 1. (I) /cryptography/ The process of learning or obtaining
+ cryptographic data or plain text through cryptanalysis. (See: key
+ recovery, data recovery.)
+
+ 2a. (I) /system integrity/ The process of restoring a secure state
+ in a system after there has been an accidental failure or a
+ successful attack. (See: secondary definition under "security",
+ system integrity.)
+
+ 2b. (I) /system integrity/ The process of restoring an information
+ system's assets and operation following damage or destruction.
+ (See: contingency plan.)
+
+ $ RED
+ 1. (N) Designation for data that consists only of clear text, and
+ for information system equipment items and facilities that handle
+
+
+
+
+Shirey Informational [Page 244]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ clear text. Example: "RED key". (See: BCR, color change, RED/BLACK
+ separation. Compare: BLACK.)
+
+ Derivation: From the practice of marking equipment with colors to
+ prevent operational errors.
+
+ 2. (O) /U.S. Government/ Designation applied to information
+ systems, and to associated areas, circuits, components, and
+ equipment, "in which unencrypted national security information is
+ being processed." [C4009]
+
+ $ RED/BLACK separation
+ (N) An architectural concept for cryptographic systems that
+ strictly separates the parts of a system that handle plain text
+ (i.e., RED information) from the parts that handle cipher text
+ (i.e., BLACK information). (See: BLACK, RED.)
+
+ $ Red Book
+ (D) /slang/ Synonym for "Trusted Network Interpretation of the
+ Trusted Computer System Evaluation Criteria" [NCS05].
+
+ Deprecated Term: IDOCs SHOULD NOT use this term. Instead, use the
+ full proper name of the document or, in subsequent references, a
+ more conventional abbreviation, e.g., TNI-TCSEC. (See: TCSEC,
+ Rainbow Series, Deprecated Usage under "Green Book".)
+
+ $ RED key
+ (N) A cleartext key, which is usable in its present form (i.e., it
+ does not need to be decrypted before being used). (See: RED.
+ Compare: BLACK key.)
+
+ $ reference monitor
+ (I) "An access control concept that refers to an abstract machine
+ that mediates all accesses to objects by subjects." [NCS04] (See:
+ security kernel.)
+
+ Tutorial: This concept was described in the Anderson report. A
+ reference monitor should be (a) complete (i.e., it mediates every
+ access), (b) isolated (i.e., it cannot be modified by other system
+ entities), and (c) verifiable (i.e., small enough to be subjected
+ to analysis and tests to ensure that it is correct).
+
+ $ reflection attack
+ (I) An attack in which a valid data transmission is replayed to
+ the originator by an attacker who intercepts the original
+ transmission. (Compare: indirect attack, replay attack.)
+
+
+
+
+
+Shirey Informational [Page 245]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ reflector attack
+ (D) Synonym for "indirect attack".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it could be
+ confused with "reflection attack", which is a different concept.
+
+ $ registered user
+ (I) A system entity that is authorized to receive a system's
+ products and services or otherwise access system resources. (See:
+ registration, user.)
+
+ $ registration
+ 1. (I) /information system/ A system process that (a) initializes
+ an identity (of a system entity) in the system, (b) establishes an
+ identifier for that identity, (c) may associate authentication
+ information with that identifier, and (d) may issue an identifier
+ credential (depending on the type of authentication mechanism
+ being used). (See: authentication information, credential,
+ identifier, identity, identity proofing.)
+
+ 2. (I) /PKI/ An administrative act or process whereby an entity's
+ name and other attributes are established for the first time at a
+ CA, prior to the CA issuing a digital certificate that has the
+ entity's name as the subject. (See: registration authority.)
+
+ Tutorial: Registration may be accomplished either directly, by the
+ CA, or indirectly, by a separate RA. An entity is presented to the
+ CA or RA, and the authority either records the name(s) claimed for
+ the entity or assigns the entity's name(s). The authority also
+ determines and records other attributes of the entity that are to
+ be bound in a certificate (such as a public key or authorizations)
+ or maintained in the authority's database (such as street address
+ and telephone number). The authority is responsible, possibly
+ assisted by an RA, for verifying the entity's identity and vetting
+ the other attributes, in accordance with the CA's CPS.
+
+ Among the registration issues that a CPS may address are the
+ following [R3647]:
+ - How a claimed identity and other attributes are verified.
+ - How organization affiliation or representation is verified.
+ - What forms of names are permitted, such as X.500 DN, domain
+ name, or IP address.
+ - Whether names are required to be meaningful or unique, and
+ within what domain.
+ - How naming disputes are resolved, including the role of
+ trademarks.
+ - Whether certificates are issued to entities that are not
+ persons.
+
+
+
+Shirey Informational [Page 246]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - Whether a person is required to appear before the CA or RA, or
+ can instead be represented by an agent.
+ - Whether and how an entity proves possession of the private key
+ matching a public key.
+
+ $ registration authority (RA)
+ 1. (I) An optional PKI entity (separate from the CAs) that does
+ not sign either digital certificates or CRLs but has
+ responsibility for recording or verifying some or all of the
+ information (particularly the identities of subjects) needed by a
+ CA to issue certificates and CRLs and to perform other certificate
+ management functions. (See: ORA, registration.)
+
+ 2. (I) /PKIX/ An optional PKI component, separate from the CA(s).
+ The functions that the RA performs will vary from case to case but
+ may include identity authentication and name assignment, key
+ generation and archiving of key pairs, token distribution, and
+ revocation reporting. [R4210]
+
+ Tutorial: Sometimes, a CA may perform all certificate management
+ functions for all end users for which the CA signs certificates.
+ Other times, such as in a large or geographically dispersed
+ community, it may be necessary or desirable to offload secondary
+ CA functions and delegate them to an assistant, while the CA
+ retains the primary functions (signing certificates and CRLs). The
+ tasks that are delegated to an RA by a CA may include personal
+ authentication, name assignment, token distribution, revocation
+ reporting, key generation, and archiving.
+
+ An RA is an optional PKI entity, separate from the CA, that is
+ assigned secondary functions. The duties assigned to RAs vary from
+ case to case but may include the following:
+ - Verifying a subject's identity, i.e., performing personal
+ authentication functions.
+ - Assigning a name to a subject. (See: distinguished name.)
+ - Verifying that a subject is entitled to have the attributes
+ requested for a certificate.
+ - Verifying that a subject possesses the private key that matches
+ the public key requested for a certificate.
+ - Performing functions beyond mere registration, such as
+ generating key pairs, distributing tokens, handling revocation
+ reports, and archiving data. (Such functions may be assigned to
+ a PKI component that is separate from both the CA and the RA.)
+
+ 3. (O) /SET/ "An independent third-party organization that
+ processes payment card applications for multiple payment card
+ brands and forwards applications to the appropriate financial
+ institutions." [SET2]
+
+
+
+Shirey Informational [Page 247]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ regrade
+ (I) Deliberately change the security level (especially the
+ hierarchical classification level) of information in an authorized
+ manner. (See: downgrade, upgrade.)
+
+ $ rekey
+ (I) Change the value of a cryptographic key that is being used in
+ an application of a cryptographic system. (See: certificate
+ rekey.)
+
+ Tutorial: Rekey is required at the end of a cryptoperiod or key
+ lifetime.
+
+ $ reliability
+ (I) The ability of a system to perform a required function under
+ stated conditions for a specified period of time. (Compare:
+ availability, survivability.)
+
+ $ reliable human review
+ (I) Any manual, automated, or hybrid process or procedure that
+ ensures that a human examines a digital object, such as text or an
+ image, to determine whether the object may be permitted, according
+ to some security policy, to be transferred across a controlled
+ interface. (See: guard.)
+
+ $ relying party
+ (I) Synonym for "certificate user".
+
+ Usage: Used in a legal context to mean a recipient of a
+ certificate who acts in reliance on that certificate. (See: ABA
+ Guidelines.)
+
+ $ remanence
+ (I) Residual information that can be recovered from a storage
+ medium after clearing. (See: clear, magnetic remanence, purge.)
+
+ $ Remote Authentication Dial-In User Service (RADIUS)
+ (I) An Internet protocol [R2865] for carrying dial-in users'
+ authentication information and configuration information between a
+ shared, centralized authentication server (the RADIUS server) and
+ a network access server (the RADIUS client) that needs to
+ authenticate the users of its network access ports. (See: TACACS.)
+
+ User presents authentication and possibly other information to the
+ RADIUS client (e.g., health information regarding the user
+ device).
+
+
+
+
+
+Shirey Informational [Page 248]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: A user presents authentication information and possibly
+ other information to the RADIUS client, and the client passes that
+ information to the RADIUS server. The server authenticates the
+ client using a shared secret value and checks the presented
+ information, and then returns to the client all authorization and
+ configuration information needed by the client to serve the user.
+
+ $ renew
+ See: certificate renewal.
+
+ $ reordering
+ (I) /packet/ See: secondary definition under "stream integrity
+ service".
+
+ $ replay attack
+ (I) An attack in which a valid data transmission is maliciously or
+ fraudulently repeated, either by the originator or by a third
+ party who intercepts the data and retransmits it, possibly as part
+ of a masquerade attack. (See: active wiretapping, fresh, liveness,
+ nonce. Compare: indirect attack, reflection attack.)
+
+ $ repository
+ 1. (I) A system for storing and distributing digital certificates
+ and related information (including CRLs, CPSs, and certificate
+ policies) to certificate users. (Compare: archive, directory.)
+
+ 2. (O) "A trustworthy system for storing and retrieving
+ certificates or other information relevant to certificates." [DSG]
+
+ Tutorial: A certificate is published to those who might need it by
+ putting it in a repository. The repository usually is a publicly
+ accessible, on-line server. In the FPKI, for example, the expected
+ repository is a directory that uses LDAP, but also may be an X.500
+ Directory that uses DAP, or an HTTP server, or an FTP server that
+ permits anonymous login.
+
+ $ repudiation
+ 1. (I) Denial by a system entity that was involved in an
+ association (especially a communication association that transfers
+ data) of having participated in the relationship. (See:
+ accountability, non-repudiation service.)
+
+ 2. (I) A type of threat action whereby an entity deceives another
+ by falsely denying responsibility for an act. (See: deception.)
+
+
+
+
+
+
+
+Shirey Informational [Page 249]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: This type of threat action includes the following subtypes:
+ - False denial of origin: Action whereby an originator denies
+ responsibility for sending data.
+ - False denial of receipt: Action whereby a recipient denies
+ receiving and possessing data.
+
+ 3. (O) /OSIRM/ "Denial by one of the entities involved in a
+ communication of having participated in all or part of the
+ communication." [I7498-2]
+
+ $ Request for Comment (RFC)
+ 1. (I) One of the documents in the archival series that is the
+ official channel for IDOCs and other publications of the Internet
+ Engineering Steering Group, the Internet Architecture Board, and
+ the Internet community in general. (RFC 2026, 2223) (See: Internet
+ Standard.)
+
+ 2. (D) A popularly misused synonym for a document on the Internet
+ Standards Track, i.e., an Internet Standard, Draft Standard, or
+ Proposed Standard. (See: Internet Standard.)
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 2 because many other types of documents also are
+ published as RFCs.
+
+ $ residual risk
+ (I) The portion of an original risk or set of risks that remains
+ after countermeasures have been applied. (Compare: acceptable
+ risk, risk analysis.)
+
+ $ restore
+ See: card restore.
+
+ $ reverse engineering
+ (I) /threat action/ See: secondary definition under "intrusion".
+
+ $ revocation
+ See: certificate revocation.
+
+ $ revocation date
+ (N) /X.509/ In a CRL entry, a date-time field that states when the
+ certificate revocation occurred, i.e., when the CA declared the
+ digital certificate to be invalid. (See: invalidity date.)
+
+ Tutorial: The revocation date may not resolve some disputes
+ because, in the worst case, all signatures made during the
+ validity period of the certificate may have to be considered
+ invalid. However, it may be desirable to treat a digital signature
+
+
+
+Shirey Informational [Page 250]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ as valid even though the private key used to sign was compromised
+ after the signing. If more is known about when the compromise
+ actually occurred, a second date-time, an "invalidity date", can
+ be included in an extension of the CRL entry.
+
+ $ revocation list
+ See: certificate revocation list.
+
+ $ revoke
+ (I) See: certificate revocation.
+
+ $ RFC
+ (I) See: Request for Comment.
+
+ $ Rijndael
+ (N) A symmetric, block cipher that was designed by Joan Daemen and
+ Vincent Rijmen as a candidate for the AES, and that won that
+ competition. [Daem] (See: Advanced Encryption Standard.)
+
+ $ risk
+ 1. (I) An expectation of loss expressed as the probability that a
+ particular threat will exploit a particular vulnerability with a
+ particular harmful result. (See: residual risk.)
+
+ 2. (O) /SET/ "The possibility of loss because of one or more
+ threats to information (not to be confused with financial or
+ business risk)." [SET2]
+
+ Tutorial: There are four basic ways to deal with a risk [SP30]:
+ - "Risk avoidance": Eliminate the risk by either countering the
+ threat or removing the vulnerability. (Compare: "avoidance"
+ under "security".)
+ - "Risk transference": Shift the risk to another system or
+ entity; e.g., buy insurance to compensate for potential loss.
+ - "Risk limitation": Limit the risk by implementing controls that
+ minimize resulting loss.
+ - "Risk assumption": Accept the potential for loss and continue
+ operating the system.
+
+ $ risk analysis
+ (I) An assessment process that systematically (a) identifies
+ valuable system resources and threats to those resources, (b)
+ quantifies loss exposures (i.e., loss potential) based on
+ estimated frequencies and costs of occurrence, and (c)
+ (optionally) recommends how to allocate available resources to
+ countermeasures so as to minimize total exposure. (See: risk
+ management, business-case analysis. Compare: threat analysis.)
+
+
+
+
+Shirey Informational [Page 251]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Usually, it is financially and technically infeasible to
+ avoid or transfer all risks (see: "first corollary" of "second
+ law" under "Courtney's laws"), and some residual risks will
+ remain, even after all available countermeasures have been
+ deployed (see: "second corollary" of "second law" under
+ "Courtney's laws"). Thus, a risk analysis typically lists risks in
+ order of cost and criticality, thereby determining where
+ countermeasures should be applied first. [FP031, R2196]
+
+ In some contexts, it is infeasible or inadvisable to attempt a
+ complete or quantitative risk analysis because needed data, time,
+ and expertise are not available. Instead, basic answers to
+ questions about threats and risks may be already built into
+ institutional security policies. For example, U.S. DoD policies
+ for data confidentiality "do not explicitly itemize the range of
+ expected threats" but instead "reflect an operational approach ...
+ by stating the particular management controls that must be used to
+ achieve [confidentiality] ... Thus, they avoid listing threats,
+ which would represent a severe risk in itself, and avoid the risk
+ of poor security design implicit in taking a fresh approach to
+ each new problem". [NRC91]
+
+ $ risk assumption
+ (I) See: secondary definition under "risk".
+
+ $ risk avoidance
+ (I) See: secondary definition under "risk".
+
+ $ risk limitation
+ (I) See: secondary definition under "risk".
+
+ $ risk management
+ 1. (I) The process of identifying, measuring, and controlling
+ (i.e., mitigating) risks in information systems so as to reduce
+ the risks to a level commensurate with the value of the assets
+ protected. (See: risk analysis.)
+
+ 2. (I) The process of controlling uncertain events that may affect
+ information system resources.
+
+ 3. (O) "The total process of identifying, controlling, and
+ mitigating information system-related risks. It includes risk
+ assessment; cost-benefit analysis; and the selection,
+ implementation, test, and security evaluation of safeguards. This
+ overall system security review considers both effectiveness and
+ efficiency, including impact on the mission and constraints due to
+ policy, regulations, and laws." [SP30]
+
+
+
+
+Shirey Informational [Page 252]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ risk transference
+ (I) See: secondary definition under "risk".
+
+ $ Rivest Cipher #2 (RC2)
+ (N) A proprietary, variable-key-length block cipher invented by
+ Ron Rivest for RSA Data Security, Inc.
+
+ $ Rivest Cipher #4 (RC4)
+ (N) A proprietary, variable-key-length stream cipher invented by
+ Ron Rivest for RSA Data Security, Inc.
+
+ $ Rivest Cipher #6 (RC6)
+ (N) A symmetric, block cipher with 128-bit or longer key length,
+ developed by Ron Rivest for RSA Data Security, Inc. as a candidate
+ for the AES.
+
+ $ Rivest-Shamir-Adleman (RSA)
+ (N) An algorithm for asymmetric cryptography, invented in 1977 by
+ Ron Rivest, Adi Shamir, and Leonard Adleman [RSA78].
+
+ Tutorial: RSA uses exponentiation modulo the product of two large
+ prime numbers. The difficulty of breaking RSA is believed to be
+ equivalent to the difficulty of factoring integers that are the
+ product of two large prime numbers of approximately equal size.
+
+ To create an RSA key pair, randomly choose two large prime
+ numbers, p and q, and compute the modulus, n = pq. Randomly choose
+ a number e, the public exponent, that is less than n and
+ relatively prime to (p-1)(q-1). Choose another number d, the
+ private exponent, such that ed-1 evenly divides (p-1)(q-1). The
+ public key is the set of numbers (n,e), and the private key is the
+ set (n,d).
+
+ It is assumed to be difficult to compute the private key (n,d)
+ from the public key (n,e). However, if n can be factored into p
+ and q, then the private key d can be computed easily. Thus, RSA
+ security depends on the assumption that it is computationally
+ difficult to factor a number that is the product of two large
+ prime numbers. (Of course, p and q are treated as part of the
+ private key, or else are destroyed after computing n.)
+
+ For encryption of a message, m, to be sent to Bob, Alice uses
+ Bob's public key (n,e) to compute m**e (mod n) = c. She sends c to
+ Bob. Bob computes c**d (mod n) = m. Only Bob knows d, so only Bob
+ can compute c**d (mod n) to recover m.
+
+ To provide data origin authentication of a message, m, to be sent
+ to Bob, Alice computes m**d (mod n) = s, where (d,n) is Alice's
+
+
+
+Shirey Informational [Page 253]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ private key. She sends m and s to Bob. To recover the message that
+ only Alice could have sent, Bob computes s**e (mod n) = m, where
+ (e,n) is Alice's public key.
+
+ To ensure data integrity in addition to data origin authentication
+ requires extra computation steps in which Alice and Bob use a
+ cryptographic hash function h (see: digital signature). Alice
+ computes the hash value h(m) = v, and then encrypts v with her
+ private key to get s. She sends m and s. Bob receives m' and s',
+ either of which might have been changed from the m and s that
+ Alice sent. To test this, he decrypts s' with Alice's public key
+ to get v'. He then computes h(m') = v". If v' equals v", Bob is
+ assured that m' is the same m that Alice sent.
+
+ $ robustness
+ (N) See: level of robustness.
+
+ $ role
+ 1. (I) A job function or employment position to which people or
+ other system entities may be assigned in a system. (See: role-
+ based access control. Compare: duty, billet, principal, user.)
+
+ 2. (O) /Common Criteria/ A pre-defined set of rules establishing
+ the allowed interactions between a user and the TOE.
+
+ $ role-based access control
+ (I) A form of identity-based access control wherein the system
+ entities that are identified and controlled are functional
+ positions in an organization or process. [Sand] (See:
+ authorization, constraint, identity, principal, role.)
+
+ Tutorial: Administrators assign permissions to roles as needed to
+ perform functions in the system. Administrators separately assign
+ user identities to roles. When a user accesses the system in an
+ identity (for which the user has been registered) and initiates a
+ session using a role (to which the user has been assigned), then
+ the permissions that have been assigned to the role are available
+ to be exercised by the user.
+
+ The following diagram shows that role-based access control
+ involves five different relationships: (a) administrators assign
+ identities to roles, (b) administrators assign permissions to
+ roles, (c) administrators assign roles to roles, (d) users select
+ identities in sessions, and (e) users select roles in sessions.
+ Security policies may define constraints on these assignments and
+ selections.
+
+
+
+
+
+Shirey Informational [Page 254]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ (c) Permission Inheritance Assignments (i.e., Role Hierarchy)
+ [Constraints]
+ +=====+
+ | |
+ (a) Identity v v (b) Permission
+ +----------+ Assignments +-------+ Assignments +----------+
+ |Identities|<=============>| Roles |<=============>|Permissions|
+ +----------+ [Constraints] +-------+ [Constraints] +----------+
+ | | ^ ^
+ | | +-----------+ | | +---------------------+
+ | | | +-------+ | | | | Legend |
+ | +====>|Session|=====+ | | |
+ | | +-------+ | | | One-to-One |
+ | | ... | | | =================== |
+ | | +-------+ | | | |
+ +========>|Session|=========+ | One-to-Many |
+ (d) Identity | +-------+ | (e) Role | ==================> |
+ Selections | | Selections | |
+ [Constraints]| Access |[Constraints] | Many-to-Many |
+ | Sessions | | <=================> |
+ +-----------+ +---------------------+
+
+ $ role certificate
+ (I) An organizational certificate that is issued to a system
+ entity that is a member of the set of users that have identities
+ that are assigned to the same role. (See: role-based access
+ control.)
+
+ $ root, root CA
+ 1. (I) /PKI/ A CA that is directly trusted by an end entity. (See:
+ trust anchor, trusted CA.)
+
+ 2. (I) /hierarchical PKI/ The CA that is the highest level (most
+ trusted) CA in a certification hierarchy; i.e., the authority upon
+ whose public key all certificate users base their validation of
+ certificates, CRLs, certification paths, and other constructs.
+ (See: top CA.)
+
+ Tutorial: The root CA in a certification hierarchy issues public-
+ key certificates to one or more additional CAs that form the
+ second-highest level. Each of these CAs may issue certificates to
+ more CAs at the third-highest level, and so on. To initialize
+ operation of a hierarchical PKI, the root's initial public key is
+ securely distributed to all certificate users in a way that does
+ not depend on the PKI's certification relationships, i.e., by an
+ out-of-band procedure. The root's public key may be distributed
+ simply as a numerical value, but typically is distributed in a
+ self-signed certificate in which the root is the subject. The
+
+
+
+Shirey Informational [Page 255]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ root's certificate is signed by the root itself because there is
+ no higher authority in a certification hierarchy. The root's
+ certificate is then the first certificate in every certification
+ path.
+
+ 3. (I) /DNS/ The base of the tree structure that defines the name
+ space for the Internet DNS. (See: domain name.)
+
+ 4. (O) /MISSI/ A name previously used for a MISSI policy creation
+ authority, which is not a root as defined above for general usage,
+ but is a CA at the second level of the MISSI hierarchy,
+ immediately subordinate to a MISSI policy approving authority.
+
+ 5. (O) /UNIX/ A user account (a.k.a. "superuser") that has all
+ privileges (including all security-related privileges) and thus
+ can manage the system and its other user accounts.
+
+ $ root certificate
+ 1. (I) /PKI/ A certificate for which the subject is a root. (See:
+ trust anchor certificate, trusted certificate.)
+
+ 2. (I) /hierarchical PKI/ The self-signed public-key certificate
+ at the top of a certification hierarchy.
+
+ $ root key
+ (I) /PKI/ A public key for which the matching private key is held
+ by a root. (See: trust anchor key, trusted key.)
+
+ $ root registry
+ (O) /MISSI/ A name previously used for a MISSI PAA.
+
+ $ ROT13
+ (I) See: secondary definition under "Caesar cipher".
+
+ $ router
+ 1a. (I) /IP/ A networked computer that forwards IP packets that
+ are not addressed to the computer itself. (Compare: host.)
+
+ 1b. (I) /IPS/ A gateway that operates in the IPS Internet Layer to
+ connect two or more subnetworks.
+
+ 1c. (N) /OSIRM/ A computer that is a gateway between two networks
+ at OSIRM Layer 3 and that relays and directs data packets through
+ that internetwork. (Compare: bridge, proxy.)
+
+ $ RSA
+ (N) See: Rivest-Shamir-Adleman.
+
+
+
+
+Shirey Informational [Page 256]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ rule
+ See: policy rule.
+
+ $ rule-based security policy
+ (I) "A security policy based on global rules [i.e., policy rules]
+ imposed for all users. These rules usually rely on comparison of
+ the sensitivity of the resource being accessed and the possession
+ of corresponding attributes of users, a group of users, or
+ entities acting on behalf of users." [I7498-2] (Compare: identity-
+ based security policy, policy rule, RBAC.)
+
+ $ rules of behavior
+ (I) A body of security policy that has been established and
+ implemented concerning the responsibilities and expected behavior
+ of entities that have access to a system. (Compare: [R1281].)
+
+ Tutorial: For persons employed by a corporation or government, the
+ rules might cover such matters as working at home, remote access,
+ use of the Internet, use of copyrighted works, use of system
+ resources for unofficial purpose, assignment and limitation of
+ system privileges, and individual accountability.
+
+ $ S field
+ (D) See: Security Level field.
+
+ $ S-BGP
+ (I) See: Secure BGP.
+
+ $ S-HTTP
+ (I) See: Secure Hypertext Transfer Protocol.
+
+ $ S/Key
+ (I) A security mechanism that uses a cryptographic hash function
+ to generate a sequence of 64-bit, one-time passwords for remote
+ user login. [R1760]
+
+ Tutorial: The client generates a one-time password by applying the
+ MD4 cryptographic hash function multiple times to the user's
+ secret key. For each successive authentication of the user, the
+ number of hash applications is reduced by one. (Thus, an intruder
+ using wiretapping cannot compute a valid password from knowledge
+ of one previously used.) The server verifies a password by hashing
+ the currently presented password (or initialization value) one
+ time and comparing the hash result with the previously presented
+ password.
+
+ $ S/MIME
+ (I) See: Secure/MIME.
+
+
+
+Shirey Informational [Page 257]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ SAD
+ (I) See: Security Association Database.
+
+ $ safety
+ (I) The property of a system being free from risk of causing harm
+ (especially physical harm) to its system entities. (Compare:
+ security.)
+
+ $ SAID
+ (I) See: security association identifier.
+
+ $ salami swindle
+ (D) /slang/ "Slicing off a small amount from each transaction.
+ This kind of theft was made worthwhile by automation. Given a high
+ transaction flow, even rounding down to the nearest cent and
+ putting the 'extra' in a bogus account can be very profitable."
+ [NCSSG]
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ salt
+ (I) A data value used to vary the results of a computation in a
+ security mechanism, so that an exposed computational result from
+ one instance of applying the mechanism cannot be reused by an
+ attacker in another instance. (Compare: initialization value.)
+
+ Example: A password-based access control mechanism might protect
+ against capture or accidental disclosure of its password file by
+ applying a one-way encryption algorithm to passwords before
+ storing them in the file. To increase the difficulty of off-line,
+ dictionary attacks that match encrypted values of potential
+ passwords against a copy of the password file, the mechanism can
+ concatenate each password with its own random salt value before
+ applying the one-way function.
+
+ $ SAML
+ (N) See: Security Assertion Markup Language (SAML).
+
+ $ sandbox
+ (I) A restricted, controlled execution environment that prevents
+ potentially malicious software, such as mobile code, from
+ accessing any system resources except those for which the software
+ is authorized.
+
+
+
+
+
+Shirey Informational [Page 258]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ sanitize
+ 1. (I) Delete sensitive data from a file, device, or system. (See:
+ erase, zeroize.)
+
+ 2. (I) Modify data so as to be able either (a) to completely
+ declassify it or (b) to downgrade it to a lower security level.
+
+ $ SAP
+ (O) See: special access program.
+
+ $ SASL
+ (I) See: Simple Authentication and Security Layer.
+
+ $ SCA
+ (I) See: subordinate certification authority.
+
+ $ scavenging
+ (I) /threat action/ See: secondary definition under "exposure".
+
+ $ SCI
+ (O) See: sensitive compartmented information.
+
+ $ SCIF
+ (O) See: sensitive compartmented information facility.
+
+ $ SCOMP
+ (N) Secure COMmunications Processor; an enhanced, MLS version of
+ the Honeywell Level 6 minicomputer. It was the first system to be
+ rated in TCSEC Class A1. (See: KSOS.)
+
+ $ screen room
+ (D) /slang/ Synonym for "shielded enclosure" in the context of
+ electromagnetic emanations. (See: EMSEC, TEMPEST.)
+
+ Deprecated Term: To avoid international misunderstanding, IDOCs
+ SHOULD NOT use this term.
+
+ $ screening router
+ (I) Synonym for "filtering router".
+
+ $ script kiddy
+ (D) /slang/ A cracker who is able to use existing attack
+ techniques (i.e., to read scripts) and execute existing attack
+ software, but is unable to invent new exploits or manufacture the
+ tools to perform them; pejoratively, an immature or novice
+ cracker.
+
+
+
+
+
+Shirey Informational [Page 259]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ SDE
+ (N) See: Secure Data Exchange.
+
+ $ SDNS
+ (O) See: Secure Data Network System.
+
+ $ SDU
+ (N) See: "service data unit" under "protocol data unit".
+
+ $ seal
+ 1. (I) To use asymmetric cryptography to encrypt plain text with a
+ public key in such a way that only the holder of the matching
+ private key can learn what was the plain text. [Chau] (Compare:
+ shroud, wrap.)
+
+ Deprecated Usage: An IDOC SHOULD NOT use this term with definition
+ 1 unless the IDOC includes the definition, because the definition
+ is not widely known and the concept can be expressed by using
+ other, standard terms. Instead, use "salt and encrypt" or other
+ terminology that is specific with regard to the mechanism being
+ used.
+
+ Tutorial: The definition does *not* say "only the holder of the
+ matching private key can decrypt the ciphertext to learn what was
+ the plaintext"; sealing is stronger than that. If Alice simply
+ encrypts a plaintext P with a public key K to produce ciphertext C
+ = K(P), then if Bob guesses that P = X, Bob could verify the guess
+ by checking whether K(P) = K(X). To "seal" P and block Bob's
+ guessing attack, Alice could attach a long string R of random bits
+ to P before encrypting to produce C = K(P,R); if Bob guesses that
+ P = X, Bob can only test the guess by also guessing R. (See:
+ salt.)
+
+ 2. (D) To use cryptography to provide data integrity service for a
+ data object. (See: sign.)
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 2. Instead, use a term that is more specific with
+ regard to the mechanism used to provide the data integrity
+ service; e.g., use "sign" when the mechanism is digital signature.
+
+
+
+
+
+
+Shirey Informational [Page 260]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ secret
+ 1a. (I) /adjective/ The condition of information being protected
+ from being known by any system entities except those that are
+ intended to know it. (See: data confidentiality.)
+
+ 1b. (I) /noun/ An item of information that is protected thusly.
+
+ Usage: This term applies to symmetric keys, private keys, and
+ passwords.
+
+ $ secret key
+ (D) A key that is kept secret or needs to be kept secret.
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it mixes concepts
+ in a potentially misleading way. In the context of asymmetric
+ cryptography, IDOCs SHOULD use "private key". In the context of
+ symmetric cryptography, the adjective "secret" is unnecessary
+ because all keys must be kept secret.
+
+ $ secret-key cryptography
+ (D) Synonym for "symmetric cryptography".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it could be
+ confused with "asymmetric cryptography", in which the private key
+ is kept secret.
+
+ Derivation: Symmetric cryptography is sometimes called "secret-key
+ cryptography" because entities that share the key, such as the
+ originator and the recipient of a message, need to keep the key
+ secret from other entities.
+
+ $ Secure BGP (S-BGP)
+ (I) A project of BBN Technologies, sponsored by the U.S. DoD's
+ Defense Advanced Research Projects Agency, to design and
+ demonstrate an architecture to secure the Border Gateway Protocol
+ (RFC 1771) and to promote deployment of that architecture in the
+ Internet.
+
+ Tutorial: S-BGP incorporates three security mechanisms:
+ - A PKI supports authentication of ownership of IP address
+ blocks, autonomous system (AS) numbers, an AS's identity, and a
+ BGP router's identity and its authorization to represent an AS.
+ This PKI parallels and takes advantage of the Internet's
+ existing IP address and AS number assignment system.
+ - A new, optional, BGP transitive path attribute carries digital
+ signatures (in "attestations") covering the routing information
+ in a BGP UPDATE. These signatures along with certificates from
+ the S-BGP PKI enable the receiver of a BGP routing UPDATE to
+
+
+
+Shirey Informational [Page 261]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ validate the attribute and gain trust in the address prefixes
+ and path information that it contains.
+ - IPsec provides data and partial sequence integrity, and enables
+ BGP routers to authenticate each other for exchanges of BGP
+ control traffic.
+
+ $ Secure Data Exchange (SDE)
+ (N) A LAN security protocol defined by the IEEE 802.10 standard.
+
+ $ Secure Data Network System (SDNS)
+ (O) An NSA program that developed security protocols for
+ electronic mail (see: MSP), OSIRM Layer 3 (see: SP3), OSIRM Layer
+ 4 (see: SP4), and key establishment (see: KMP).
+
+ $ secure distribution
+ (I) See: trusted distribution.
+
+ $ Secure Hash Algorithm (SHA)
+ (N) A cryptographic hash function (specified in SHS) that produces
+ an output (see: "hash result") -- of selectable length of either
+ 160, 224, 256, 384, or 512 bits -- for input data of any length <
+ 2**64 bits.
+
+ $ Secure Hash Standard (SHS)
+ (N) The U.S. Government standard [FP180] that specifies SHA.
+
+ $ Secure Hypertext Transfer Protocol (S-HTTP)
+ (I) An Internet protocol [R2660] for providing client-server
+ security services for HTTP communications. (Compare: https.)
+
+ Tutorial: S-HTTP was originally specified by CommerceNet, a
+ coalition of businesses interested in developing the Internet for
+ commercial uses. Several message formats may be incorporated into
+ S-HTTP clients and servers, particularly CMS and MOSS. S-HTTP
+ supports choice of security policies, key management mechanisms,
+ and cryptographic algorithms through option negotiation between
+ parties for each transaction. S-HTTP supports modes of operation
+ for both asymmetric and symmetric cryptography. S-HTTP attempts to
+ avoid presuming a particular trust model, but it attempts to
+ facilitate multiply rooted, hierarchical trust and anticipates
+ that principals may have many public-key certificates.
+
+ $ Secure/MIME (S/MIME)
+ (I) Secure/Multipurpose Internet Mail Extensions, an Internet
+ protocol [R3851] to provide encryption and digital signatures for
+ Internet mail messages.
+
+
+
+
+
+Shirey Informational [Page 262]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ secure multicast
+ (I) Refers generally to providing security services for multicast
+ groups of various types (e.g., 1-to-N and M-to-N) and to classes
+ of protocols used to protect multicast packets.
+
+ Tutorial: Multicast applications include video broadcast and
+ multicast file transfer, and many of these applications require
+ network security services. The Multicast Security Reference
+ Framework [R3740] covers three functional areas:
+ - Multicast data handling: Security-related treatment of
+ multicast data by the sender and the receiver.
+ - Group key management: Secure distribution and refreshment of
+ keying material. (See: Group Domain of Interpretation.)
+ - Multicast security policy: Policy translation and
+ interpretation across the multiple administrative domains that
+ typically are spanned by a multicast application.
+
+ $ Secure Shell(trademark) (SSH(trademark))
+ (N) Refers to a protocol for secure remote login and other secure
+ network services.
+
+ Usage: On the Web site of SSH Communication Security Corporation,
+ at http://www.ssh.com/legal_notice.html, it says, "SSH [and] the
+ SSH logo ... are either trademarks or registered trademarks of
+ SSH." This Glossary seeks to make readers aware of this trademark
+ claim but takes no position on its validity.
+
+ Tutorial: SSH has three main parts:
+ - Transport layer protocol: Provides server authentication,
+ confidentiality, and integrity; and can optionally provide
+ compression. This layer typically runs over a TCP connection,
+ but might also run on top of any other reliable data stream.
+ - User authentication protocol: Authenticates the client-side
+ user to the server. It runs over the transport layer protocol.
+ - Connection protocol: Multiplexes the encrypted tunnel into
+ several logical channels. It runs over the user authentication
+ protocol.
+
+ $ Secure Sockets Layer (SSL)
+ (N) An Internet protocol (originally developed by Netscape
+ Communications, Inc.) that uses connection-oriented end-to-end
+ encryption to provide data confidentiality service and data
+ integrity service for traffic between a client (often a web
+ browser) and a server, and that can optionally provide peer entity
+ authentication between the client and the server. (See: Transport
+ Layer Security.)
+
+
+
+
+
+Shirey Informational [Page 263]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: SSL has two layers; SSL's lower layer, the SSL Record
+ Protocol, is layered on top of an IPS Transport-Layer protocol and
+ encapsulates protocols that run in the upper layer. The upper-
+ layer protocols are the three SSL management protocols -- SSL
+ Handshake Protocol, SSL Change Cipher Spec Protocol, or SSL Alert
+ Protocol -- and some Application-Layer protocol (e.g., HTTP).
+
+ The SSL management protocols provide asymmetric cryptography for
+ server authentication (verifying the server's identity to the
+ client) and optional client authentication (verifying the client's
+ identity to the server), and also enable them, before the
+ application protocol transmits or receives data, to negotiate a
+ symmetric encryption algorithm and secret session key (to use for
+ data confidentiality service) and a keyed hash (to use for data
+ integrity service).
+
+ SSL is independent of the application it encapsulates, and any
+ application can layer on top of SSL transparently. However, many
+ Internet applications might be better served by IPsec.
+
+ $ secure state
+ 1a. (I) A system condition in which the system is in conformance
+ with the applicable security policy. (Compare: clean system,
+ transaction.)
+
+ 1b. (I) /formal model/ A system condition in which no subject can
+ access any object in an unauthorized manner. (See: secondary
+ definition under "Bell-LaPadula model".)
+
+ $ security
+ 1a. (I) A system condition that results from the establishment and
+ maintenance of measures to protect the system.
+
+ 1b. (I) A system condition in which system resources are free from
+ unauthorized access and from unauthorized or accidental change,
+ destruction, or loss. (Compare: safety.)
+
+ 2. (I) Measures taken to protect a system.
+
+ Tutorial: Parker [Park] suggests that providing a condition of
+ system security may involve the following six basic functions,
+ which overlap to some extent:
+ - "Deterrence": Reducing an intelligent threat by discouraging
+ action, such as by fear or doubt. (See: attack, threat action.)
+ - "Avoidance": Reducing a risk by either reducing the value of
+ the potential loss or reducing the probability that the loss
+ will occur. (See: risk analysis. Compare: "risk avoidance"
+ under "risk".)
+
+
+
+Shirey Informational [Page 264]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - "Prevention": Impeding or thwarting a potential security
+ violation by deploying a countermeasure.
+ - "Detection": Determining that a security violation is
+ impending, is in progress, or has recently occurred, and thus
+ make it possible to reduce the potential loss. (See: intrusion
+ detection.)
+ - "Recovery": Restoring a normal state of system operation by
+ compensating for a security violation, possibly by eliminating
+ or repairing its effects. (See: contingency plan, main entry
+ for "recovery".)
+ - "Correction": Changing a security architecture to eliminate or
+ reduce the risk of reoccurrence of a security violation or
+ threat consequence, such as by eliminating a vulnerability.
+
+ $ security architecture
+ (I) A plan and set of principles that describe (a) the security
+ services that a system is required to provide to meet the needs of
+ its users, (b) the system components required to implement the
+ services, and (c) the performance levels required in the
+ components to deal with the threat environment (e.g., [R2179]).
+ (See: defense in depth, IATF, OSIRM Security Architecture,
+ security controls, Tutorial under "security policy".)
+
+ Tutorial: A security architecture is the result of applying the
+ system engineering process. A complete system security
+ architecture includes administrative security, communication
+ security, computer security, emanations security, personnel
+ security, and physical security. A complete security architecture
+ needs to deal with both intentional, intelligent threats and
+ accidental threats.
+
+ $ Security Assertion Markup Language (SAML)
+ (N) A protocol consisting of XML-based request and response
+ message formats for exchanging security information, expressed in
+ the form of assertions about subjects, between on-line business
+ partners. [SAML]
+
+ $ security association
+ 1. (I) A relationship established between two or more entities to
+ enable them to protect data they exchange. (See: association,
+ ISAKMP, SAD. Compare: session.)
+
+ Tutorial: The relationship is represented by a set of data that is
+ shared between the entities and is agreed upon and considered a
+ contract between them. The data describes how the associated
+ entities jointly use security services. The relationship is used
+ to negotiate characteristics of security mechanisms, but the
+
+
+
+
+Shirey Informational [Page 265]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ relationship is usually understood to exclude the mechanisms
+ themselves.
+
+ 2. (I) /IPsec/ A simplex (uni-directional) logical connection
+ created for security purposes and implemented with either AH or
+ ESP (but not both). The security services offered by a security
+ association depend on the protocol (AH or ESP), the IPsec mode
+ (transport or tunnel), the endpoints, and the election of optional
+ services within the protocol. A security association is identified
+ by a triple consisting of (a) a destination IP address, (b) a
+ protocol (AH or ESP) identifier, and (c) a Security Parameter
+ Index.
+
+ 3. (O) "A set of policy and cryptographic keys that provide
+ security services to network traffic that matches that policy".
+ [R3740] (See: cryptographic association, group security
+ association.)
+
+ 4. (O) "The totality of communications and security mechanisms and
+ functions (e.g., communications protocols, security protocols,
+ security mechanisms and functions) that securely binds together
+ two security contexts in different end systems or relay systems
+ supporting the same information domain." [DoD6]
+
+ $ Security Association Database (SAD)
+ (I) /IPsec/ In an IPsec implementation that operates in a network
+ node, a database that contains parameters to describe the status
+ and operation of each of the active security associations that the
+ node has established with other nodes. Separate inbound and
+ outbound SADs are needed because of the directionality of IPsec
+ security associations. [R4301] (Compare: SPD.)
+
+ $ security association identifier (SAID)
+ (I) A data field in a security protocol (such as NLSP or SDE),
+ used to identify the security association to which a PDU is bound.
+ The SAID value is usually used to select a key for decryption or
+ authentication at the destination. (See: Security Parameter
+ Index.)
+
+ $ security assurance
+ 1. (I) An attribute of an information system that provides grounds
+ for having confidence that the system operates such that the
+ system's security policy is enforced. (Compare: trust.)
+
+ 2. (I) A procedure that ensures a system is developed and operated
+ as intended by the system's security policy.
+
+
+
+
+
+Shirey Informational [Page 266]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 3. (D) "The degree of confidence one has that the security
+ controls operate correctly and protect the system as intended."
+ [SP12]
+
+ Deprecated Definition: IDOCs SHOULD NOT use definition 3; it is a
+ definition for "assurance level" rather than for "assurance".
+
+ 4. (D) /U.S. Government, identity authentication/ The (a) "degree
+ of confidence in the vetting process used to establish the
+ identity of the individual to whom the [identity] credential was
+ issued" and the (b) "degree of confidence that the individual who
+ uses the credential is the individual to whom the credential was
+ issued". [M0404]
+
+ Deprecated Definition: IDOCs SHOULD NOT use definition 4; it mixes
+ concepts in a potentially misleading way. Part "a" is a definition
+ for "assurance level" (rather than "security assurance") of an
+ identity registration process; and part "b" is a definition for
+ "assurance level" (rather than "security assurance") of an
+ identity authentication process. Also, the processes of
+ registration and authentication should be defined and designed
+ separately to ensure clarity in certification.
+
+ $ security audit
+ (I) An independent review and examination of a system's records
+ and activities to determine the adequacy of system controls,
+ ensure compliance with established security policy and procedures,
+ detect breaches in security services, and recommend any changes
+ that are indicated for countermeasures. [I7498-2, NCS01] (Compare:
+ accounting, intrusion detection.)
+
+ Tutorial: The basic audit objective is to establish accountability
+ for system entities that initiate or participate in security-
+ relevant events and actions. Thus, means are needed to generate
+ and record a security audit trail and to review and analyze the
+ audit trail to discover and investigate security violations.
+
+ $ security audit trail
+ (I) A chronological record of system activities that is sufficient
+ to enable the reconstruction and examination of the sequence of
+ environments and activities surrounding or leading to an
+ operation, procedure, or event in a security-relevant transaction
+ from inception to final results. [NCS04] (See: security audit.)
+
+ $ security by obscurity
+ (O) Attempting to maintain or increase security of a system by
+ keeping secret the design or construction of a security mechanism.
+
+
+
+
+Shirey Informational [Page 267]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: This approach has long been discredited in cryptography,
+ where the phrase refers to trying to keep an algorithm secret,
+ rather than just concealing the keys [Schn]. One must assume that
+ mass-produced or widely fielded cryptographic devices eventually
+ will be lost or stolen and, therefore, that the algorithms will be
+ reverse engineered and become known to the adversary. Thus, one
+ should rely on only those algorithms and protocols that are strong
+ enough to have been published widely, and have been peer reviewed
+ for long enough that their flaws have been found and removed. For
+ example, NIST used a long, public process to select AES to replace
+ DES.
+
+ In computer and network security, the principle of "no security by
+ obscurity" also applies to security mechanisms other than
+ cryptography. For example, if the design and implementation of a
+ protocol for access control are strong, then reading the
+ protocol's source code should not enable you to find a way to
+ evade the protection and penetrate the system.
+
+ $ security class
+ (D) Synonym for "security level".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term. Instead, use
+ "security level", which is more widely established and understood.
+
+ $ security clearance
+ (I) A determination that a person is eligible, under the standards
+ of a specific security policy, for authorization to access
+ sensitive information or other system resources. (See: clearance
+ level.)
+
+ $ security compromise
+ (I) A security violation in which a system resource is exposed, or
+ is potentially exposed, to unauthorized access. (Compare: data
+ compromise, exposure, violation.)
+
+ $ security controls
+ (N) The management, operational, and technical controls
+ (safeguards or countermeasures) prescribed for an information
+ system which, taken together, satisfy the specified security
+ requirements and adequately protect the confidentiality,
+ integrity, and availability of the system and its information.
+ [FP199] (See: security architecture.)
+
+ $ security doctrine
+ (I) A specified set of procedures or practices that direct or
+ provide guidance for how to comply with security policy. (Compare:
+ security mechanism, security policy.)
+
+
+
+Shirey Informational [Page 268]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: Security policy and security doctrine are closely
+ related. However, policy deals mainly with strategy, and doctrine
+ deals with tactics.
+
+ Security doctrine is often understood to refer mainly to
+ administrative security, personnel security, and physical
+ security. For example, security mechanisms and devices that
+ implement them are normally designed to operate in a limited range
+ of environmental and administrative conditions, and these
+ conditions must be met to complement and ensure the technical
+ protection afforded by the hardware, firmware, and software in the
+ devices. Security doctrine specifies how to achieve those
+ conditions. (See: "first law" under "Courtney's laws".)
+
+ $ security domain
+ (I) See: domain.
+
+ $ security environment
+ (I) The set of external entities, procedures, and conditions that
+ affect secure development, operation, and maintenance of a system.
+ (See: "first law" under "Courtney's laws".)
+
+ $ security event
+ (I) An occurrence in a system that is relevant to the security of
+ the system. (See: security incident.)
+
+ Tutorial: The term covers both events that are security incidents
+ and those that are not. In a CA workstation, for example, a list
+ of security events might include the following:
+ - Logging an operator into or out of the system.
+ - Performing a cryptographic operation, e.g., signing a digital
+ certificate or CRL.
+ - Performing a cryptographic card operation: creation, insertion,
+ removal, or backup.
+ - Performing a digital certificate lifecycle operation: rekey,
+ renewal, revocation, or update.
+ - Posting a digital certificate to an X.500 Directory.
+ - Receiving a key compromise notification.
+ - Receiving an improper certification request.
+ - Detecting an alarm condition reported by a cryptographic
+ module.
+ - Failing a built-in hardware self-test or a software system
+ integrity check.
+
+ $ security fault analysis
+ (I) A security analysis, usually performed on hardware at the
+ level of gate logic, gate-by-gate, to determine the security
+ properties of a device when a hardware fault is encountered.
+
+
+
+Shirey Informational [Page 269]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ security function
+ (I) A function in a system that is relevant to the security of the
+ system; i.e., a system function that must operate correctly to
+ ensure adherence to the system's security policy.
+
+ $ security gateway
+ 1. (I) An internetwork gateway that separates trusted (or
+ relatively more trusted) hosts on one side from untrusted (or less
+ trusted) hosts on the other side. (See: firewall and guard.)
+
+ 2. (O) /IPsec/ "An intermediate system that implements IPsec
+ protocols." [R4301]
+
+ Tutorial: IPsec's AH or ESP can be implemented on a gateway
+ between a protected network and an unprotected network, to provide
+ security services to the protected network's hosts when they
+ communicate across the unprotected network to other hosts and
+ gateways.
+
+ $ security incident
+ 1. (I) A security event that involves a security violation. (See:
+ CERT, security event, security intrusion, security violation.)
+
+ Tutorial: In other words, a security event in which the system's
+ security policy is disobeyed or otherwise breached.
+
+ 2. (D) "Any adverse event [that] compromises some aspect of
+ computer or network security." [R2350]
+
+ Deprecated Definition: IDOCs SHOULD NOT use definition 2 because
+ (a) a security incident may occur without actually being harmful
+ (i.e., adverse) and because (b) this Glossary defines "compromise"
+ more narrowly in relation to unauthorized access.
+
+ 3. (D) "A violation or imminent threat of violation of computer
+ security policies, acceptable use policies, or standard computer
+ security practices." [SP61]
+
+ Deprecated Definition: IDOCs SHOULD NOT use definition 3 because
+ it mixes concepts in way that does not agree with common usage; a
+ security incident is commonly thought of as involving a
+ realization of a threat (see: threat action), not just a threat.
+
+ $ security intrusion
+ (I) A security event, or a combination of multiple security
+ events, that constitutes a security incident in which an intruder
+ gains, or attempts to gain, access to a system or system resource
+ without having authorization to do so.
+
+
+
+Shirey Informational [Page 270]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ security kernel
+ (I) "The hardware, firmware, and software elements of a trusted
+ computing base that implement the reference monitor concept. It
+ must mediate all accesses, be protected from modification, and be
+ verifiable as correct." [NCS04] (See: kernel, TCB.)
+
+ Tutorial: A security kernel is an implementation of a reference
+ monitor for a given hardware base. [Huff]
+
+ $ security label
+ (I) An item of meta-data that designates the value of one or more
+ security-relevant attributes (e.g., security level) of a system
+ resource. (See: [R1457]. Compare: security marking.)
+
+ Deprecated usage: To avoid confusion, IDOCs SHOULD NOT use
+ "security label" for "security marking", or vice versa, even
+ though that is commonly done (including in some national and
+ international standards that should know better).
+
+ Tutorial: Humans and automated security mechanisms use a security
+ label of a system resource to determine, according to applicable
+ security policy, how to control access to the resource (and they
+ affix appropriate, matching security markings to physical
+ instances of the resource). Security labels are most often used to
+ support data confidentiality policy, and sometimes used to support
+ data integrity policy.
+
+ As explained in [R1457], the form that is taken by security labels
+ of a protocol's packets varies depending on the OSIRM layer in
+ which the protocol operates. Like meta-data generally, a security
+ label of a data packet may be either explicit (e.g., IPSO) or
+ implicit (e.g., Alice treats all messages received from Bob as
+ being labeled "Not For Public Release"). In a connectionless
+ protocol, every packet might have an explicit label; but in a
+ connection-oriented protocol, all packets might have the same
+ implicit label that is determined at the time the connection is
+ established.
+
+ Both classified and unclassified system resources may require a
+ security label. (See: FOUO.)
+
+ $ security level
+ (I) The combination of a hierarchical classification level and a
+ set of non-hierarchical category designations that represents how
+ sensitive a specified type or item of information is. (See:
+ dominate, lattice model. Compare: classification level.)
+
+
+
+
+
+Shirey Informational [Page 271]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: IDOCs that use this term SHOULD state a definition for it.
+ The term is usually understood to involve sensitivity to
+ disclosure, but it also is used in many other ways and could
+ easily be misunderstood.
+
+ $ Security Level field
+ (I) A 16-bit field that specifies a security level value in the
+ security option (option type 130) of version 4 IP's datagram
+ header format.
+
+ Deprecated Abbreviation: IDOCs SHOULD NOT use the abbreviation "S
+ field", which is potentially ambiguous.
+
+ $ security management infrastructure (SMI)
+ (I) System components and activities that support security policy
+ by monitoring and controlling security services and mechanisms,
+ distributing security information, and reporting security events.
+
+ Tutorial: The associated functions are as follows [I7498-4]:
+ - Controlling (granting or restricting) access to system
+ resources: This includes verifying authorizations and
+ identities, controlling access to sensitive security data, and
+ modifying access priorities and procedures in the event of
+ attacks.
+ - Retrieving (gathering) and archiving (storing) security
+ information: This includes logging security events and
+ analyzing the log, monitoring and profiling usage, and
+ reporting security violations.
+ - Managing and controlling the encryption process: This includes
+ performing the functions of key management and reporting on key
+ management problems. (See: PKI.)
+
+ $ security marking
+ (I) A physical marking that is bound to an instance of a system
+ resource and that represents a security label of the resource,
+ i.e., that names or designates the value of one or more security-
+ relevant attributes of the resource. (Compare: security label.)
+
+ Tutorial: A security label may be represented by various
+ equivalent markings depending on the physical form taken by the
+ labeled resource. For example, a document could have a marking
+ composed of a bit pattern [FP188] when the document is stored
+ electronically as a file in a computer, and also a marking of
+ printed alphabetic characters when the document is in paper form.
+
+
+
+
+
+
+
+Shirey Informational [Page 272]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ security mechanism
+ (I) A method or process (or a device incorporating it) that can be
+ used in a system to implement a security service that is provided
+ by or within the system. (See: Tutorial under "security policy".
+ Compare: security doctrine.)
+
+ Usage: Usually understood to refer primarily to components of
+ communication security, computer security, and emanation security.
+
+ Examples: Authentication exchange, checksum, digital signature,
+ encryption, and traffic padding.
+
+ $ security model
+ (I) A schematic description of a set of entities and relationships
+ by which a specified set of security services are provided by or
+ within a system. Example: Bell-LaPadula model, OSIRM. (See:
+ Tutorial under "security policy".)
+
+ $ security parameters index (SPI)
+ 1. (I) /IPsec/ A 32-bit identifier used to distinguish among
+ security associations that terminate at the same destination (IP
+ address) and use the same security protocol (AH or ESP). Carried
+ in AH and ESP to enable the receiving system to determine under
+ which security association to process a received packet.
+
+ 2. (I) /mobile IP/ A 32-bit index identifying a security
+ association from among the collection of associations that are
+ available between a pair of nodes, for application to mobile IP
+ protocol messages that the nodes exchange.
+
+ $ security perimeter
+ (I) A physical or logical boundary that is defined for a domain or
+ enclave and within which a particular security policy or security
+ architecture applies. (See: insider, outsider.)
+
+ $ security policy
+ 1. (I) A definite goal, course, or method of action to guide and
+ determine present and future decisions concerning security in a
+ system. [NCS03, R3198] (Compare: certificate policy.)
+
+ 2a. (I) A set of policy rules (or principles) that direct how a
+ system (or an organization) provides security services to protect
+ sensitive and critical system resources. (See: identity-based
+ security policy, policy rule, rule-based security policy, rules of
+ behavior. Compare: security architecture, security doctrine,
+ security mechanism, security model, [R1281].)
+
+
+
+
+
+Shirey Informational [Page 273]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2b. (O) A set of rules to administer, manage, and control access
+ to network resources. [R3060, R3198]
+
+ 2c. (O) /X.509/ A set of rules laid down by an authority to govern
+ the use and provision of security services and facilities.
+
+ 2d. (O) /Common Criteria/ A set of rules that regulate how assets
+ are managed, protected, and distributed within a TOE.
+
+ Tutorial: Ravi Sandhu suggests that security policy is one of four
+ layers of the security engineering process (as shown in the
+ following diagram). Each layer provides a different view of
+ security, ranging from what services are needed to how services
+ are implemented.
+
+ What Security Services
+ Should Be Provided? +- - - - - - - - - - - - -+
+ ^ +- - - - - - - - - - - -| Mission Functions View |
+ | | Security Policy |- - - - - - - - - - - - -+
+ | +- - - - - - - - - - - -| Domain Practices View |
+ | | Security Model |- - - - - - - - - - - - -+
+ | +- - - - - - - - - - - -| Enclave Services View |
+ | | Security Architecture |- - - - - - - - - - - - -+
+ | +- - - - - - - - - - - -| Agent Mechanisms View |
+ | | Security Mechanism |- - - - - - - - - - - - -+
+ v +- - - - - - - - - - - -| Platform Devices View |
+ How Are Security +- - - - - - - - - - - - -+
+ Services Implemented?
+
+ We suggest that each of Sandhu's four layers is a mapping between
+ two points of view that differ in their degree of abstraction,
+ according to the perspectives of various participants in system
+ design, development, and operation activities, as follows:.
+ - Mission functions view: The perspective of a user of system
+ resources. States time-phased protection needs for resources
+ and identifies sensitive and critical resources -- networks,
+ hosts, applications, and databases. Independent of rules and
+ practices used to achieve protection.
+ - Domain practices view: The perspective of an enterprise manager
+ who sets protection standards for resources. States rules and
+ practices for protection. Identifies domain members; i.e.,
+ entities (users/providers) and resources (including data
+ objects). Independent of system topology. Not required to be
+ hierarchical.
+ - Enclave services view: The perspective of a system designer who
+ allocates security functions to major components. Assigns
+ security services to system topology structures and their
+
+
+
+
+Shirey Informational [Page 274]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ contents. Independent of security mechanisms. Hierarchical
+ across all domains.
+ - Agent mechanisms view: The perspective of a system engineer who
+ specifies security mechanisms to implement security services.
+ Specifies mechanisms to be used by protocol, database, and
+ application engines. Independent of type and manufacture of
+ platforms and other physical devices.
+ - Platform devices view: The perspective of an as-built
+ description of the system in operation. Specifies exactly how
+ to build or assemble the system, and also specifies procedures
+ for operating the system.
+
+ $ Security Policy Database (SPD)
+ (I) /IPsec/ In an IPsec implementation operating in a network
+ node, a database that contains parameters that specify policies
+ set by a user or administrator to determine what IPsec services,
+ if any, are to be provided to IP datagrams sent or received by the
+ node, and in what fashion they are provided. For each datagram,
+ the SPD specifies one of three choices: discard the datagram,
+ apply IPsec services (e.g., AH or ESP), or bypass IPsec. Separate
+ inbound and outbound SPDs are needed because of the directionality
+ of IPsec security associations. [R4301] (Compare: SAD.)
+
+ $ Security Protocol 3 (SP3)
+ (O) A protocol [SDNS3] developed by SDNS to provide connectionless
+ data security at the top of OSIRM Layer 3. (Compare: IPsec, NLSP.)
+
+ $ Security Protocol 4 (SP4)
+ (O) A protocol [SDNS4] developed by SDNS to provide either
+ connectionless or end-to-end connection-oriented data security at
+ the bottom of OSIRM Layer 4. (See: TLSP.)
+
+ $ security-relevant event
+ (D) Synonym for "security event".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it is wordy.
+
+ $ security-sensitive function
+ (D) Synonym for "security function".
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it is wordy.
+
+ $ security service
+ 1. (I) A processing or communication service that is provided by a
+ system to give a specific kind of protection to system resources.
+ (See: access control service, audit service, availability service,
+ data confidentiality service, data integrity service, data origin
+
+
+
+
+Shirey Informational [Page 275]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ authentication service, non-repudiation service, peer entity
+ authentication service, system integrity service.)
+
+ Tutorial: Security services implement security policies, and are
+ implemented by security mechanisms.
+
+ 2. (O) "A service, provided by a layer of communicating open
+ systems, [that] ensures adequate security of the systems or the
+ data transfers." [I7498-2]
+
+ $ security situation
+ (I) /ISAKMP/ The set of all security-relevant information (e.g.,
+ network addresses, security classifications, manner of operation
+ such as normal or emergency) that is needed to decide the security
+ services that are required to protect the association that is
+ being negotiated.
+
+ $ security target
+ (N) /Common Criteria/ A set of security requirements and
+ specifications to be used as the basis for evaluation of an
+ identified TOE.
+
+ Tutorial: A security target (ST) is a statement of security claims
+ for a particular information technology security product or
+ system, and is the basis for agreement among all parties as to
+ what security the product or system offers. An ST parallels the
+ structure of a protection profile, but has additional elements
+ that include product-specific detailed information. An ST contains
+ a summary specification, which defines the specific measures taken
+ in the product or system to meet the security requirements.
+
+ $ security token
+ (I) See: token.
+
+ $ security violation
+ (I) An act or event that disobeys or otherwise breaches security
+ policy. (See: compromise, penetration, security incident.)
+
+ $ seed
+ (I) A value that is an input to a pseudorandom number generator.
+
+ $ selective-field confidentiality
+ (I) A data confidentiality service that preserves confidentiality
+ for one or more parts (i.e., fields) of each packet. (See:
+ selective-field integrity.)
+
+ Tutorial: Data confidentiality service usually is applied to
+ entire SDUs, but some situations might require protection of only
+
+
+
+Shirey Informational [Page 276]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ part of each packet. For example, when Alice uses a debit card at
+ an automated teller machine (ATM), perhaps only her PIN is
+ enciphered for confidentiality when her transaction request is
+ transmitted from the ATM to her bank's computer.
+
+ In any given operational situation, there could be many different
+ reasons for using selective field confidentiality. In the ATM
+ example, there are at least four possibilities: The service may
+ provide a fail-safe mode of operation, ensuring that the bank can
+ still process transactions (although with some risk) even when the
+ encryption system fails. It may make messages easier to work with
+ when doing system fault isolation. It may avoid problems with laws
+ that prevent shipping enciphered data across international
+ borders. It may improve efficiency by reducing processing load at
+ a central computer site.
+
+ $ selective-field integrity
+ (I) A data integrity service that preserves integrity for one or
+ more parts (i.e., fields) of each packet. (See: selective-field
+ confidentiality.)
+
+ Tutorial: Data integrity service may be implemented in a protocol
+ to protect the SDU part of packets, the PCI part, or both.
+ - SDU protection: When service is provided for SDUs, it usually
+ is applied to entire SDUs, but it might be applied only to
+ parts of SDUs in some situations. For example, an IPS
+ Application-Layer protocol might need protection of only part
+ of each packet, and this might enable faster processing.
+ - PCI protection: To prevent active wiretapping, it might be
+ desirable to apply data integrity service to the entire PCI,
+ but some PCI fields in some protocols need to be mutable in
+ transit. For example, the "Time to Live" field in IPv4 is
+ changed each time a packet passes through a router in the
+ Internet Layer. Thus, the value that the field will have when
+ the packet arrives at its destination is not predictable by the
+ sender and cannot be included in a checksum computed by the
+ sender. (See: Authentication Header.)
+
+ $ self-signed certificate
+ (I) A public-key certificate for which the public key bound by the
+ certificate and the private key used to sign the certificate are
+ components of the same key pair, which belongs to the signer.
+ (Compare: root certificate.)
+
+ Tutorial: In a self-signed X.509 public-key certificate, the
+ issuer's DN is the same as the subject's DN.
+
+
+
+
+
+Shirey Informational [Page 277]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ semantic security
+ (I) An attribute of an encryption algorithm that is a
+ formalization of the notion that the algorithm not only hides the
+ plain text but also reveals no partial information about the plain
+ text; i.e., whatever is computable about the plain text when given
+ the cipher text, is also computable without the cipher text.
+ (Compare: indistinguishability.)
+
+ $ semiformal
+ (I) Expressed in a restricted syntax language with defined
+ semantics. [CCIB] (Compare: formal, informal.)
+
+ $ sensitive
+ (I) A condition of a system resource such that the loss of some
+ specified property of that resource, such as confidentiality or
+ integrity, would adversely affect the interests or business of its
+ owner or user. (See: sensitive information. Compare: critical.)
+
+ $ sensitive compartmented information (SCI)
+ (O) /U.S. Government/ Classified information concerning or derived
+ from intelligence sources, methods, or analytical processes, which
+ is required to be handled within formal control systems
+ established by the Director of Central Intelligence. [C4009] (See:
+ compartment, SAP, SCIF. Compare: collateral information.)
+
+ $ sensitive compartmented information facility (SCIF)
+ (O) /U.S. Government/ "An accredited area, room, group of rooms,
+ building, or installation where SCI may be stored, used,
+ discussed, and/or processed." [C4009] (See: SCI. Compare: shielded
+ enclosure.)
+
+ $ sensitive information
+ 1. (I) Information for which (a) disclosure, (b) alteration, or
+ (c) destruction or loss could adversely affect the interests or
+ business of its owner or user. (See: data confidentiality, data
+ integrity, sensitive. Compare: classified, critical.)
+
+ 2. (O) /U.S. Government/ Information for which (a) loss, (b)
+ misuse, (c) unauthorized access, or (d) unauthorized modification
+ could adversely affect the national interest or the conduct of
+ federal programs, or the privacy to which individuals are entitled
+ under the Privacy Act of 1974, but that has not been specifically
+ authorized under criteria established by an Executive Order or an
+ Act of Congress to be kept classified in the interest of national
+ defense or foreign policy.
+
+ Tutorial: Systems that are not U.S. national security systems, but
+ contain sensitive U.S. Federal Government information, must be
+
+
+
+Shirey Informational [Page 278]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ protected according to the Computer Security Act of 1987 (Public
+ Law 100-235). (See: national security.)
+
+ $ sensitivity label
+ (D) Synonym for "classification label".
+
+ Deprecated term: IDOCs SHOULD NOT use this term because the
+ definition of "sensitive" involves not only data confidentiality,
+ but also data integrity.
+
+ $ sensitivity level
+ (D) Synonym for "classification level".
+
+ Deprecated term: IDOCs SHOULD NOT use this term because the
+ definition of "sensitive" involves not only data confidentiality,
+ but also data integrity.
+
+ $ separation of duties
+ (I) The practice of dividing the steps in a system process among
+ different individual entities (i.e., different users or different
+ roles) so as to prevent a single entity acting alone from being
+ able to subvert the process. Usage: a.k.a. "separation of
+ privilege". (See: administrative security, dual control.)
+
+ $ serial number
+ See: certificate serial number.
+
+ $ Serpent
+ (O) A symmetric, 128-bit block cipher designed by Ross Anderson,
+ Eli Biham, and Lars Knudsen as a candidate for the AES.
+
+ $ server
+ (I) A system entity that provides a service in response to
+ requests from other system entities called clients.
+
+ $ service data unit (SDU)
+ (N) See: secondary definition under "protocol data unit".
+
+ $ session
+ 1a. (I) /computer usage/ A continuous period of time, usually
+ initiated by a login, during which a user accesses a computer
+ system.
+
+ 1b. (I) /computer activity/ The set of transactions or other
+ computer activities that are performed by or for a user during a
+ period of computer usage.
+
+
+
+
+
+Shirey Informational [Page 279]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 2. (I) /access control/ A temporary mapping of a principal to one
+ or more roles. (See: role-based access control.)
+
+ Tutorial: A user establishes a session as a principal and
+ activates some subset of roles to which the principal has been
+ assigned. The authorizations available to the principal in the
+ session are the union of the permissions of all the roles
+ activated in the session. Each session is associated with a single
+ principal and, therefore, with a single user. A principal may have
+ multiple, concurrent sessions and may activate a different set of
+ roles in each session.
+
+ 3. (I) /computer network/ A persistent but (normally) temporary
+ association between a user agent (typically a client) and a second
+ process (typically a server). The association may persist across
+ multiple exchanges of data, including multiple connections.
+ (Compare: security association.)
+
+ $ session key
+ (I) In the context of symmetric encryption, a key that is
+ temporary or is used for a relatively short period of time. (See:
+ ephemeral, KDC, session. Compare: master key.)
+
+ Tutorial: A session key is used for a defined period of
+ communication between two system entities or components, such as
+ for the duration of a single connection or transaction set; or the
+ key is used in an application that protects relatively large
+ amounts of data and, therefore, needs to be rekeyed frequently.
+
+ $ SET(trademark)
+ (O) See: SET Secure Electronic Transaction(trademark).
+
+ $ SET private extension
+ (O) One of the private extensions defined by SET for X.509
+ certificates. Carries information about hashed root key,
+ certificate type, merchant data, cardholder certificate
+ requirements, encryption support for tunneling, or message support
+ for payment instructions.
+
+ $ SET qualifier
+ (O) A certificate policy qualifier that provides information about
+ the location and content of a SET certificate policy.
+
+ Tutorial: Besides the policies and qualifiers inherited from its
+ own certificate, each CA in the SET certification hierarchy may
+ add one qualifying statement to the root policy when the CA issues
+ a certificate. The additional qualifier is a certificate policy
+ for that CA. Each policy in a SET certificate may have these
+
+
+
+Shirey Informational [Page 280]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ qualifiers: (a) a URL where a copy of the policy statement may be
+ found; (b) an electronic mail address where a copy of the policy
+ statement may be found; (c) a hash result of the policy statement,
+ computed using the indicated algorithm; and (d) a statement
+ declaring any disclaimers associated with the issuing of the
+ certificate.
+
+ $ SET Secure Electronic Transaction(trademark) or SET(trademark)
+ (N) A protocol developed jointly by MasterCard International and
+ Visa International and published as an open standard to provide
+ confidentiality of transaction information, payment integrity, and
+ authentication of transaction participants for payment card
+ transactions over unsecured networks, such as the Internet. [SET1]
+ (See: acquirer, brand, cardholder, dual signature, electronic
+ commerce, IOTP, issuer, merchant, payment gateway, third party.)
+
+ Tutorial: This term and acronym are trademarks of SETCo.
+ MasterCard and Visa announced the SET standard on 1 February 1996.
+
+ $ SETCo
+ (O) Abbreviation of "SET Secure Electronic Transaction LLC",
+ formed on 19 December 1997 by MasterCard and Visa for implementing
+ the SET Secure Electronic Transaction(trademark) standard. A later
+ memorandum of understanding added American Express and JCB Credit
+ Card Company as co-owners of SETCo.
+
+ $ SHA, SHA-1, SHA-2
+ (N) See: Secure Hash Algorithm.
+
+ $ shared identity
+ (I) See: secondary definition under "identity".
+
+ $ shared secret
+ (D) Synonym for "cryptographic key" or "password".
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because the term is used in many ways and could
+ easily be misunderstood.
+
+ $ shielded enclosure
+ (O) "Room or container designed to attenuate electromagnetic
+ radiation, acoustic signals, or emanations." [C4009] (See:
+ emanation. Compare: SCIF.)
+
+ $ short title
+ (O) "Identifying combination of letters and numbers assigned to
+ certain items of COMSEC material to facilitate handling,
+ accounting, and controlling." [C4009] (Compare: KMID, long title.)
+
+
+
+Shirey Informational [Page 281]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ shroud
+ (D) /verb/ To encrypt a private key, possibly in concert with a
+ policy that prevents the key from ever being available in
+ cleartext form beyond a certain, well-defined security perimeter.
+ [PKC12] (See: encrypt. Compare: seal, wrap.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as defined here;
+ the definition duplicates the meaning of other, standard terms.
+ Instead, use "encrypt" or other terminology that is specific with
+ regard to the mechanism being used.
+
+ $ SHS
+ (N) See: Secure Hash Standard.
+
+ $ sign
+ (I) Create a digital signature for a data object. (See: signer.)
+
+ $ signal analysis
+ (I) Gaining indirect knowledge (inference) of communicated data by
+ monitoring and analyzing a signal that is emitted by a system and
+ that contains the data but is not intended to communicate the
+ data. (See: emanation. Compare: traffic analysis.)
+
+ $ signal intelligence
+ (I) The science and practice of extracting information from
+ signals. (See: signal security.)
+
+ $ signal security
+ (N) (I) The science and practice of protecting signals. (See:
+ cryptology, security.)
+
+ Tutorial: The term "signal" denotes (a) communication in almost
+ any form and also (b) emanations for other purposes, such as
+ radar. Signal security is opposed by signal intelligence, and each
+ discipline includes opposed sub-disciplines as follows [Kahn]:
+
+ Signal Security Signal Intelligence
+ ------------------------------ ---------------------------------
+ 1. Communication Security 1. Communication Intelligence
+ 1a. Cryptography 1a. Cryptanalysis
+ 1b. Traffic Security 1b. Traffic Analysis
+ 1c. Steganography 1c. Detection and Interception
+ 2. Electronic Security 2. Electronic Intelligence
+ 2a. Emission Security 2a. Electronic Reconnaissance
+ 2b. Counter-Countermeasures 2b. Countermeasures
+ ------------------------------ ---------------------------------
+
+
+
+
+
+Shirey Informational [Page 282]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ signature
+ (O) A symbol or process adopted or executed by a system entity
+ with present intention to declare that a data object is genuine.
+ (See: digital signature, electronic signature.)
+
+ $ signature certificate
+ (I) A public-key certificate that contains a public key that is
+ intended to be used for verifying digital signatures, rather than
+ for encrypting data or performing other cryptographic functions.
+
+ Tutorial: A v3 X.509 public-key certificate may have a "keyUsage"
+ extension that indicates the purpose for which the certified
+ public key is intended. (See: certificate profile.)
+
+ $ signed receipt
+ (I) An S/MIME service [R2634] that (a) provides, to the originator
+ of a message, proof of delivery of the message and (b) enables the
+ originator to demonstrate to a third party that the recipient was
+ able to verify the signature of the original message.
+
+ Tutorial: The receipt is bound to the original message by a
+ signature; consequently, the service may be requested only for a
+ message that is signed. The receipt sender may optionally also
+ encrypt the receipt to provide confidentiality between the receipt
+ sender and the receipt recipient.
+
+ $ signer
+ (N) A human being or organization entity that uses a private key
+ to sign (i.e., create a digital signature on) a data object. [DSG]
+
+ $ SILS
+ (N) See: Standards for Interoperable LAN/MAN Security.
+
+ $ simple authentication
+ 1. (I) An authentication process that uses a password as the
+ information needed to verify an identity claimed for an entity.
+ (Compare: strong authentication.)
+
+ 2. (O) "Authentication by means of simple password arrangements."
+ [X509]
+
+ $ Simple Authentication and Security Layer (SASL)
+ (I) An Internet specification [R2222, R4422] for adding
+ authentication service to connection-based protocols. (Compare:
+ EAP, GSS-API.)
+
+
+
+
+
+
+Shirey Informational [Page 283]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: To use SASL, a protocol includes a command for
+ authenticating a user to a server and for optionally negotiating
+ protection of subsequent protocol interactions. The command names
+ a registered security mechanism. SASL mechanisms include Kerberos,
+ GSS-API, S/KEY, and others. Some protocols that use SASL are IMAP4
+ and POP3.
+
+ $ Simple Key Management for Internet Protocols (SKIP)
+ (I) A key-distribution protocol that uses hybrid encryption to
+ convey session keys that are used to encrypt data in IP packets.
+ (See: SKIP reference in [R2356].)
+
+ Tutorial: SKIP was designed by Ashar Aziz and Whitfield Diffie at
+ Sun Microsystems and proposed as the standard key management
+ protocol for IPsec, but IKE was chosen instead. Although IKE is
+ mandatory for an IPsec implementation, the use of SKIP is not
+ excluded.
+
+ SKIP uses the Diffie-Hellman-Merkle algorithm (or could use
+ another key-agreement algorithm) to generate a key-encrypting key
+ for use between two entities. A session key is used with a
+ symmetric algorithm to encrypt data in one or more IP packets that
+ are to be sent from one entity to the other. A symmetric KEK is
+ established and used to encrypt the session key, and the encrypted
+ session key is placed in a SKIP header that is added to each IP
+ packet that is encrypted with that session key.
+
+ $ Simple Mail Transfer Protocol (SMTP)
+ (I) A TCP-based, Application-Layer, Internet Standard protocol
+ (RFC 821) for moving electronic mail messages from one computer to
+ another.
+
+ $ Simple Network Management Protocol (SNMP)
+ (I) A (usually) UDP-based, Application-Layer, Internet Standard
+ protocol (RFCs 3410-3418) for conveying management information
+ between system components that act as managers and agents.
+
+ $ Simple Public Key Infrastructure (SPKI)
+ (I) A set of experimental concepts (RFCs 2692, 2693) that were
+ proposed as alternatives to the concepts standardized in PKIX.
+
+ $ simple security property
+ (N) /formal model/ Property of a system whereby a subject has read
+ access to an object only if the clearance of the subject dominates
+ the classification of the object. See: Bell-LaPadula model.
+
+
+
+
+
+
+Shirey Informational [Page 284]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ single sign-on
+ 1. (I) An authentication subsystem that enables a user to access
+ multiple, connected system components (such as separate hosts on a
+ network) after a single login at only one of the components. (See:
+ Kerberos.)
+
+ 2. (O) /Liberty Alliance/ A security subsystem that enables a user
+ identity to be authenticated at an identity provider -- i.e., at a
+ service that authenticates and asserts the user's identity -- and
+ then have that authentication be honored by other service
+ providers.
+
+ Tutorial: A single sign-on subsystem typically requires a user to
+ log in once at the beginning of a session, and then during the
+ session transparently grants access by the user to multiple,
+ separately protected hosts, applications, or other system
+ resources, without further login action by the user (unless, of
+ course, the user logs out). Such a subsystem has the advantages of
+ being user friendly and enabling authentication to be managed
+ consistently across an entire enterprise. Such a subsystem also
+ has the disadvantage of requiring all the accessed components to
+ depend on the security of the same authentication information.
+
+ $ singular identity
+ (I) See: secondary definition under "identity".
+
+ $ site
+ (I) A facility -- i.e., a physical space, room, or building
+ together with its physical, personnel, administrative, and other
+ safeguards -- in which system functions are performed. (See:
+ node.)
+
+ $ situation
+ (I) See: security situation.
+
+ $ SKEME
+ (I) A key-distribution protocol from which features were adapted
+ for IKE. [SKEME]
+
+ $ SKIP
+ (I) See: Simple Key Management for Internet Protocols.
+
+ $ SKIPJACK
+ (N) A type 2, 64-bit block cipher [SKIP, R2773] with a key size of
+ 80 bits. (See: CAPSTONE, CLIPPER, FORTEZZA, Key Exchange
+ Algorithm.)
+
+
+
+
+
+Shirey Informational [Page 285]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: SKIPJACK was developed by NSA and formerly classified at
+ the U.S. DoD "Secret" level. On 23 June 1998, NSA announced that
+ SKIPJACK had been declassified.
+
+ $ slot
+ (O) /MISSI/ One of the FORTEZZA PC card storage areas that are
+ each able to hold an X.509 certificate plus other data, including
+ the private key that is associated with a public-key certificate.
+
+ $ smart card
+ (I) A credit-card sized device containing one or more integrated
+ circuit chips that perform the functions of a computer's central
+ processor, memory, and input/output interface. (See: PC card,
+ smart token.)
+
+ Usage: Sometimes this term is used rather strictly to mean a card
+ that closely conforms to the dimensions and appearance of the kind
+ of plastic credit card issued by banks and merchants. At other
+ times, the term is used loosely to include cards that are larger
+ than credit cards, especially cards that are thicker, such as PC
+ cards.
+
+ $ smart token
+ (I) A device that conforms to the definition of "smart card"
+ except that rather than having the standard dimensions of a credit
+ card, the token is packaged in some other form, such as a military
+ dog tag or a door key. (See: smart card, cryptographic token.)
+
+ $ SMI
+ (I) See: security management infrastructure.
+
+ $ SMTP
+ (I) See: Simple Mail Transfer Protocol.
+
+ $ smurf attack
+ (D) /slang/ A denial-of-service attack that uses IP broadcast
+ addressing to send ICMP ping packets with the intent of flooding a
+ system. (See: fraggle attack, ICMP flood.)
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term.
+
+ Derivation: The Smurfs are a fictional race of small, blue
+ creatures that were created by a cartoonist. Perhaps the inventor
+ of this attack thought that a swarm of ping packets resembled a
+ gang of smurfs. (See: Deprecated Usage under "Green Book".)
+
+
+
+
+Shirey Informational [Page 286]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: The attacker sends ICMP echo request ("ping") packets
+ that appear to originate not from the attacker's own IP address,
+ but from the address of the host or router that is the target of
+ the attack. Each packet is addressed to an IP broadcast address,
+ e.g., to all IP addresses in a given network. Thus, each echo
+ request that is sent by the attacker results in many echo
+ responses being sent to the target address. This attack can
+ disrupt service at a particular host, at the hosts that depend on
+ a particular router, or in an entire network.
+
+ $ sneaker net
+ (D) /slang/ A process that transfers data between systems only
+ manually, under human control; i.e., a data transfer process that
+ involves an air gap.
+
+ Deprecated Term: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term.
+
+ $ Snefru
+ (N) A public-domain, cryptographic hash function (a.k.a. "The
+ Xerox Secure Hash Function") designed by Ralph C. Merkle at Xerox
+ Corporation. Snefru can produce either a 128-bit or 256-bit output
+ (i.e., hash result). [Schn] (See: Khafre, Khufu.)
+
+ $ sniffing
+ (D) /slang/ Synonym for "passive wiretapping"; most often refers
+ to capturing and examining the data packets carried on a LAN.
+ (See: password sniffing.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it unnecessarily
+ duplicates the meaning of a term that is better established. (See:
+ Deprecated Usage under "Green Book".
+
+ $ SNMP
+ (I) See: Simple Network Management Protocol.
+
+ $ social engineering
+ (D) Euphemism for non-technical or low-technology methods, often
+ involving trickery or fraud, that are used to attack information
+ systems. Example: phishing.
+
+ Deprecated Term: IDOCs SHOULD NOT use this term; it is too vague.
+ Instead, use a term that is specific with regard to the means of
+ attack, e.g., blackmail, bribery, coercion, impersonation,
+ intimidation, lying, or theft.
+
+
+
+
+
+Shirey Informational [Page 287]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ SOCKS
+ (I) An Internet protocol [R1928] that provides a generalized proxy
+ server that enables client-server applications (e.g., TELNET, FTP,
+ or HTTP; running over either TCP or UDP) to use the services of a
+ firewall.
+
+ Tutorial: SOCKS is layered under the IPS Application Layer and
+ above the Transport Layer. When a client inside a firewall wishes
+ to establish a connection to an object that is reachable only
+ through the firewall, it uses TCP to connect to the SOCKS server,
+ negotiates with the server for the authentication method to be
+ used, authenticates with the chosen method, and then sends a relay
+ request. The SOCKS server evaluates the request, typically based
+ on source and destination addresses, and either establishes the
+ appropriate connection or denies it.
+
+ $ soft TEMPEST
+ (O) The use of software techniques to reduce the radio frequency
+ information leakage from computer displays and keyboards. [Kuhn]
+ (See: TEMPEST.)
+
+ $ soft token
+ (D) A data object that is used to control access or authenticate
+ authorization. (See: token.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as defined here;
+ the definition duplicates the meaning of other, standard terms.
+ Instead, use "attribute certificate" or another term that is
+ specific with regard to the mechanism being used.
+
+ $ software
+ (I) Computer programs (which are stored in and executed by
+ computer hardware) and associated data (which also is stored in
+ the hardware) that may be dynamically written or modified during
+ execution. (Compare: firmware.)
+
+ $ software error
+ (I) /threat action/ See: secondary definitions under "corruption",
+ "exposure", and "incapacitation".
+
+ $ SORA
+ (O) See: SSO-PIN ORA.
+
+ $ source authentication
+ (D) Synonym for "data origin authentication" or "peer entity
+ authentication". (See: data origin authentication, peer entity
+ authentication).
+
+
+
+
+Shirey Informational [Page 288]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: IDOCs SHOULD NOT use this term because it is
+ ambiguous and, in either meaning, duplicates the meaning of
+ internationally standardized terms. If the intent is to
+ authenticate the original creator or packager of data received,
+ then use "data origin authentication". If the intent is to
+ authenticate the identity of the sender of data in the current
+ instance, then use "peer entity authentication".
+
+ $ source integrity
+ (I) The property that data is trustworthy (i.e., worthy of
+ reliance or trust), based on the trustworthiness of its sources
+ and the trustworthiness of any procedures used for handling data
+ in the system. Usage: a.k.a. Biba integrity. (See: integrity.
+ Compare: correctness integrity, data integrity.)
+
+ Tutorial: For this kind of integrity, there are formal models of
+ unauthorized modification (see: Biba model) that logically
+ complement the more familiar models of unauthorized disclosure
+ (see: Bell-LaPadula model). In these models, objects are labeled
+ to indicate the credibility of the data they contain, and there
+ are rules for access control that depend on the labels.
+
+ $ SP3
+ (O) See: Security Protocol 3.
+
+ $ SP4
+ (O) See: Security Protocol 4.
+
+ $ spam
+ 1a. (I) /slang verb/ To indiscriminately send unsolicited,
+ unwanted, irrelevant, or inappropriate messages, especially
+ commercial advertising in mass quantities.
+
+ 1b. (I) /slang noun/ Electronic "junk mail". [R2635]
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term in uppercase
+ letters, because SPAM(trademark) is a trademark of Hormel Foods
+ Corporation. Hormel says, "We do not object to use of this slang
+ term [spam] to describe [unsolicited advertising email], although
+ we do object to the use of our product image in association with
+ that term. Also, if the term is to be used, it SHOULD be used in
+ all lower-case letters to distinguish it from our trademark SPAM,
+ which SHOULD be used with all uppercase letters." (See: metadata.)
+
+ Tutorial: In sufficient volume, spam can cause denial of service.
+ (See: flooding.) According to Hormel, the term was adopted as a
+ result of a Monty Python skit in which a group of Vikings sang a
+ chorus of 'SPAM, SPAM, SPAM ...' in an increasing crescendo,
+
+
+
+Shirey Informational [Page 289]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ drowning out other conversation. This lyric became a metaphor for
+ the unsolicited advertising messages that threaten to overwhelm
+ other discourse on the Internet.
+
+ $ SPD
+ (I) See: Security Policy Database.
+
+ $ special access program (SAP)
+ (O) /U.S. Government/ "Sensitive program, [that is] approved in
+ writing by a head of agency with [i.e., who has] original top
+ secret classification authority, [and] that imposes need-to-know
+ and access controls beyond those normally provided for access to
+ Confidential, Secret, or Top Secret information. The level of
+ controls is based on the criticality of the program and the
+ assessed hostile intelligence threat. The program may be an
+ acquisition program, an intelligence program, or an operations and
+ support program." [C4009] (See: formal access approval, SCI.
+ Compare: collateral information.)
+
+ $ SPI
+ (I) See: Security Parameters Index.
+
+ $ SPKI
+ (I) See: Simple Public Key Infrastructure.
+
+ $ split key
+ (I) A cryptographic key that is generated and distributed as two
+ or more separate data items that individually convey no knowledge
+ of the whole key that results from combining the items. (See: dual
+ control, split knowledge.)
+
+ $ split knowledge
+ 1. (I) A security technique in which two or more entities
+ separately hold data items that individually do not convey
+ knowledge of the information that results from combining the
+ items. (See: dual control, split key.)
+
+ 2. (O) "A condition under which two or more entities separately
+ have key components [that] individually convey no knowledge of the
+ plaintext key [that] will be produced when the key components are
+ combined in the cryptographic module." [FP140]
+
+ $ spoof
+ (I) /threat action/ See: secondary definition under "masquerade".
+
+ $ spoofing attack
+ (I) Synonym for "masquerade attack".
+
+
+
+
+Shirey Informational [Page 290]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ spread spectrum
+ (N) A TRANSEC technique that transmits a signal in a bandwidth
+ much greater than the transmitted information needs. [F1037]
+ Example: frequency hopping.
+
+ Tutorial: Usually uses a sequential, noise-like signal structure
+ to spread the normally narrowband information signal over a
+ relatively wide band of frequencies. The receiver correlates the
+ signals to retrieve the original information signal. This
+ technique decreases potential interference to other receivers,
+ while achieving data confidentiality and increasing immunity of
+ spread spectrum receivers to noise and interference.
+
+ $ spyware
+ (D) /slang/ Software that an intruder has installed
+ surreptitiously on a networked computer to gather data from that
+ computer and send it through the network to the intruder or some
+ other interested party. (See: malicious logic, Trojan horse.)
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because the term is used in many ways and could
+ easily be misunderstood.
+
+ Tutorial: Some examples of the types of data that might be
+ gathered by spyware are application files, passwords, email
+ addresses, usage histories, and keystrokes. Some examples of
+ motivations for gathering the data are blackmail, financial fraud,
+ identity theft, industrial espionage, market research, and
+ voyeurism.
+
+ $ SSH(trademark)
+ (N) See: Secure Shell(trademark).
+
+ $ SSL
+ (I) See: Secure Sockets Layer.
+
+ $ SSO
+ (I) See: system security officer.
+
+ $ SSO PIN
+ (O) /MISSI/ One of two PINs that control access to the functions
+ and stored data of a FORTEZZA PC card. Knowledge of the SSO PIN
+ enables a card user to perform the FORTEZZA functions intended for
+ use by an end user and also the functions intended for use by a
+ MISSI CA. (See: user PIN.)
+
+
+
+
+
+
+Shirey Informational [Page 291]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ SSO-PIN ORA (SORA)
+ (O) /MISSI/ A MISSI organizational RA that operates in a mode in
+ which the ORA performs all card management functions and,
+ therefore, requires knowledge of the SSO PIN for FORTEZZA PC cards
+ issued to end users.
+
+ $ Standards for Interoperable LAN/MAN Security (SILS)
+ 1. (N) The IEEE 802.10 standards committee. (See: [FP191].)
+
+ 2. (N) A set of IEEE standards, which has eight parts: (a) Model,
+ including security management, (b) Secure Data Exchange protocol,
+ (c) Key Management, (d) [has been incorporated in (a)], (e) SDE
+ Over Ethernet 2.0, (f) SDE Sublayer Management, (g) SDE Security
+ Labels, and (h) SDE PICS Conformance. Parts b, e, f, g, and h are
+ incorporated in IEEE Standard 802.10-1998.
+
+ $ star property
+ (N) See: *-property.
+
+ $ Star Trek attack
+ (D) /slang/ An attack that penetrates your system where no attack
+ has ever gone before.
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term; it is a joke for
+ Trekkies. (See: Deprecated Usage under "Green Book".)
+
+ $ static
+ (I) /adjective/ Refers to a cryptographic key or other parameter
+ that is relatively long-lived. (Compare: ephemeral.)
+
+ $ steganography
+ (I) Methods of hiding the existence of a message or other data.
+ This is different than cryptography, which hides the meaning of a
+ message but does not hide the message itself. Examples: For
+ classic, physical methods, see [Kahn]; for modern, digital
+ methods, see [John]. (See: cryptology. Compare: concealment
+ system, digital watermarking.)
+
+ $ storage channel
+ (I) See: covert storage channel.
+
+ $ storage key
+ (I) A cryptographic key used by a device for protecting
+ information that is being maintained in the device, as opposed to
+ protecting information that is being transmitted between devices.
+ (See: cryptographic token, token copy. Compare: traffic key.)
+
+
+
+
+
+Shirey Informational [Page 292]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ stream cipher
+ (I) An encryption algorithm that breaks plain text into a stream
+ of successive elements (usually, bits) and encrypts the n-th
+ plaintext element with the n-th element of a parallel key stream,
+ thus converting the plaintext stream into a ciphertext stream.
+ [Schn] (See: block cipher.)
+
+ $ stream integrity service
+ (I) A data integrity service that preserves integrity for a
+ sequence of data packets, including both (a) bit-by-bit datagram
+ integrity of each individual packet in the set and (b) packet-by-
+ packet sequential integrity of the set as a whole. (See: data
+ integrity. Compare: datagram integrity service.)
+
+ Tutorial: Some internetwork applications need only datagram
+ integrity, but others require that an entire stream of packets be
+ protected against insertion, reordering, deletion, and delay:
+ - "Insertion": The destination receives an additional packet that
+ was not sent by the source.
+ - "Reordering": The destination receives packets in a different
+ order than that in which they were sent by the source.
+ - "Deletion": A packet sent by the source is not ever delivered
+ to the intended destination.
+ - "Delay": A packet is detained for some period of time at a
+ relay, thus hampering and postponing the packet's normal timely
+ delivery from source to destination.
+
+ $ strength
+ 1. (I) /cryptography/ A cryptographic mechanism's level of
+ resistance to attacks [R3766]. (See: entropy, strong, work
+ factor.)
+
+ 2. (N) /Common Criteria/ "Strength of function" is a
+ "qualification of a TOE security function expressing the minimum
+ efforts assumed necessary to defeat its expected security behavior
+ by directly attacking its underlying security mechanisms": (See:
+ strong.)
+ - Basic: "A level of the TOE strength of function where analysis
+ shows that the function provides adequate protection against
+ casual breach of TOE security by attackers possessing a low
+ attack potential."
+ - Medium: "... against straightforward or intentional breach ...
+ by attackers possessing a moderate attack potential."
+ - High: "... against deliberately planned or organized breach ...
+ by attackers possessing a high attack potential."
+
+
+
+
+
+
+Shirey Informational [Page 293]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ strong
+ 1. (I) /cryptography/ Used to describe a cryptographic algorithm
+ that would require a large amount of computational power to defeat
+ it. (See: strength, work factor, weak key.)
+
+ 2. (I) /COMPUSEC/ Used to describe a security mechanism that would
+ be difficult to defeat. (See: strength, work factor.)
+
+ $ strong authentication
+ 1. (I) An authentication process that uses a cryptographic
+ security mechanism -- particularly public-key certificates -- to
+ verify the identity claimed for an entity. (Compare: simple
+ authentication.)
+
+ 2. (O) "Authentication by means of cryptographically derived
+ credentials." [X509]
+
+ $ subject
+ 1a. (I) A process in a computer system that represents a principal
+ and that executes with the privileges that have been granted to
+ that principal. (Compare: principal, user.)
+
+ 1b. (I) /formal model/ A system entity that causes information to
+ flow among objects or changes the system state; technically, a
+ process-domain pair. A subject may itself be an object relative to
+ some other subject; thus, the set of subjects in a system is a
+ subset of the set of objects. (See: Bell-LaPadula model, object.)
+
+ 2. (I) /digital certificate/ The name (of a system entity) that is
+ bound to the data items in a digital certificate; e.g., a DN that
+ is bound to a key in a public-key certificate. (See: X.509.)
+
+ $ subject CA
+ (D) The CA that is the subject of a cross-certificate issued by
+ another CA. [X509] (See: cross-certification.)
+
+ Deprecated Term: IDOCs SHOULD NOT use this term because it is not
+ widely known and could be misunderstood. Instead, say "the CA that
+ is the subject of the cross-certificate".
+
+ $ subnetwork
+ (N) An OSI term for a system of packet relays and connecting links
+ that implement OSIRM layer 2 or 3 to provide a communication
+ service that interconnects attached end systems. Usually, the
+ relays are all of the same type (e.g., X.25 packet switches, or
+ interface units in an IEEE 802.3 LAN). (See: gateway, internet,
+ router.)
+
+
+
+
+Shirey Informational [Page 294]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ subordinate CA (SCA)
+ 1. (I) A CA whose public-key certificate is issued by another
+ (superior) CA. (See: certification hierarchy. Compare: cross-
+ certification.)
+
+ 2. (O) /MISSI/ The fourth-highest (i.e., bottom) level of a MISSI
+ certification hierarchy; a MISSI CA whose public-key certificate
+ is signed by a MISSI CA rather than by a MISSI PCA. A MISSI SCA is
+ the administrative authority for a subunit of an organization,
+ established when it is desirable to organizationally distribute or
+ decentralize the CA service. The term refers both to that
+ authoritative office or role, and to the person who fills that
+ office. A MISSI SCA registers end users and issues their
+ certificates and may also register ORAs, but may not register
+ other CAs. An SCA periodically issues a CRL.
+
+ $ subordinate DN
+ (I) An X.500 DN is subordinate to another X.500 DN if it begins
+ with a set of attributes that is the same as the entire second DN
+ except for the terminal attribute of the second DN (which is
+ usually the name of a CA). For example, the DN <C=FooLand, O=Gov,
+ OU=Treasurer, CN=DukePinchpenny> is subordinate to the DN
+ <C=FooLand, O=Gov, CN=KingFooCA>.
+
+ $ subscriber
+ (I) /PKI/ A user that is registered in a PKI and, therefore, can
+ be named in the "subject" field of a certificate issued by a CA in
+ that PKI. (See: registration, user.)
+
+ Usage: This term is needed to distinguish registered users from
+ two other kinds of PKI users:
+ - Users that access the PKI but are not identified to it: For
+ example, a relying party may access a PKI repository to obtain
+ the certificate of some other party. (See: access.)
+ - Users that do not access the PKI: For example, a relying party
+ (see: certificate user) may use a digital certificate that was
+ obtained from a database that is not part of the PKI that
+ issued the certificate.
+
+ $ substitution
+ 1. (I) /cryptography/ A method of encryption in which elements of
+ the plain text retain their sequential position but are replaced
+ by elements of cipher text. (Compare: transposition.)
+
+ 2. (I) /threat action/ See: secondary definition under
+ "falsification".
+
+
+
+
+
+Shirey Informational [Page 295]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ subsystem
+ (I) A collection of related system components that together
+ perform a system function or deliver a system service.
+
+ $ superencryption
+ (I) An encryption operation for which the plaintext input to be
+ transformed is the ciphertext output of a previous encryption
+ operation. (Compare: hybrid encryption.)
+
+ $ superuser
+ (I) /UNIX/ Synonym for "root".
+
+ $ survivability
+ (I) The ability of a system to remain in operation or existence
+ despite adverse conditions, including natural occurrences,
+ accidental actions, and attacks. (Compare: availability,
+ reliability.)
+
+ $ swIPe
+ (I) An encryption protocol for IP that provides confidentiality,
+ integrity, and authentication and can be used for both end-to-end
+ and intermediate-hop security. [Ioan] (Compare: IPsec.)
+
+ Tutorial: The swIPe protocol is an IP predecessor that is
+ concerned only with encryption mechanisms; policy and key
+ management are handled outside the protocol.
+
+ $ syllabary
+ (N) /encryption/ A list of individual letters, combinations of
+ letters, or syllables, with their equivalent code groups, used for
+ spelling out proper names or other unusual words that are not
+ present in the basic vocabulary (i.e., are not in the codebook) of
+ a code used for encryption.
+
+ $ symmetric cryptography
+ (I) A branch of cryptography in which the algorithms use the same
+ key for both of two counterpart cryptographic operations (e.g.,
+ encryption and decryption). (See: asymmetric cryptography.
+ Compare: secret-key cryptography.)
+
+ Tutorial: Symmetric cryptography has been used for thousands of
+ years [Kahn]. A modern example is AES.
+
+ Symmetric cryptography has a disadvantage compared to asymmetric
+ cryptography with regard to key distribution. For example, when
+ Alice wants to ensure confidentiality for data she sends to Bob,
+ she encrypts the data with a key, and Bob uses the same key to
+ decrypt. However, keeping the shared key secret entails both cost
+
+
+
+Shirey Informational [Page 296]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ and risk when the key is distributed to both Alice and Bob. (See:
+ key distribution, key management.)
+
+ $ symmetric key
+ (I) A cryptographic key that is used in a symmetric cryptographic
+ algorithm. (See: symmetric cryptography.)
+
+ $ SYN flood
+ (I) A denial-of-service attack that sends a large number of TCP
+ SYN (synchronize) packets to a host with the intent of disrupting
+ the operation of that host. (See: blind attack, flooding.)
+
+ Tutorial: This attack seeks to exploit a vulnerability in the TCP
+ specification or in a TCP implementation. Normally, two hosts use
+ a three-way exchange of packets to establish a TCP connection: (a)
+ host 1 requests a connection by sending a SYN packet to host 2;
+ (b) host 2 replies by sending a SYN-ACK (acknowledgement) packet
+ to host 1; and (c) host 1 completes the connection by sending an
+ ACK packet to host 2. To attack host 2, host 1 can send a series
+ of TCP SYNs, each with a different phony source address. ([R2827]
+ discusses how to use packet filtering to prevent such attacks from
+ being launched from behind an Internet service provider's
+ aggregation point.) Host 2 treats each SYN as a request from a
+ separate host, replies to each with a SYN-ACK, and waits to
+ receive the matching ACKs. (The attacker can use random or
+ unreachable sources addresses in the SYN packets, or can use
+ source addresses that belong to third parties, that then become
+ secondary victims.)
+
+ For each SYN-ACK that is sent, the TCP process in host 2 needs
+ some memory space to store state information while waiting for the
+ matching ACK to be returned. If the matching ACK never arrives at
+ host 2, a timer associated with the pending SYN-ACK will
+ eventually expire and release the space. But if host 1 (or a
+ cooperating group of hosts) can rapidly send many SYNs to host 2,
+ host 2 will need to store state information for many pending SYN-
+ ACKs and may run out of space. This can prevent host 2 from
+ responding to legitimate connection requests from other hosts or
+ even, if there are flaws in host 2's TCP implementation, crash
+ when the available space is exhausted.
+
+ $ synchronization
+ (I) Any technique by which a receiving (decrypting) cryptographic
+ process attains an internal state that matches the transmitting
+ (encrypting) process, i.e., has the appropriate keying material to
+ process the cipher text and is correctly initialized to do so.
+
+
+
+
+
+Shirey Informational [Page 297]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ system
+ (I) Synonym for "information system".
+
+ Usage: This is a generic definition, and is the one with which the
+ term is used in this Glossary. However, IDOCs that use the term,
+ especially IDOCs that are protocol specifications, SHOULD state a
+ more specific definition. Also, IDOCs that specify security
+ features, services, and assurances need to define which system
+ components and system resources are inside the applicable security
+ perimeter and which are outside. (See: security architecture.)
+
+ $ system architecture
+ (N) The structure of system components, their relationships, and
+ the principles and guidelines governing their design and evolution
+ over time. [DoD10] (Compare: security architecture.)
+
+ $ system component
+ 1. (I) A collection of system resources that (a) forms a physical
+ or logical part of the system, (b) has specified functions and
+ interfaces, and (c) is treated (e.g., by policies or
+ specifications) as existing independently of other parts of the
+ system. (See: subsystem.)
+
+ 2. (O) /ITSEC/ An identifiable and self-contained part of a TOE.
+
+ Usage: Component is a relative term because components may be
+ nested; i.e., one component of a system may be a part of another
+ component of that system.
+
+ Tutorial: Components can be characterized as follows:
+ - A "physical component" has mass and takes up space.
+ - A "logical component" is an abstraction used to manage and
+ coordinate aspects of the physical environment, and typically
+ represents a set of states or capabilities of the system.
+
+ $ system entity
+ (I) An active part of a system -- a person, a set of persons
+ (e.g., some kind of organization), an automated process, or a set
+ of processes (see: subsystem) -- that has a specific set of
+ capabilities. (Compare: subject, user.)
+
+ $ system high
+ (I) The highest security level at which a system operates, or is
+ capable of operating, at a particular time or in a particular
+ environment. (See: system-high security mode.)
+
+
+
+
+
+
+Shirey Informational [Page 298]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ system-high security mode
+ (I) A mode of system operation wherein all users having access to
+ the system possess all necessary authorizations (both security
+ clearance and formal access approval) for all data handled by the
+ system, but some users might not have need-to-know for all the
+ data. (See: /system operation/ under "mode", formal access
+ approval, protection level, security clearance.)
+
+ Usage: Usually abbreviated as "system-high mode". This mode was
+ defined in U.S. DoD policy that applied to system accreditation,
+ but the term is widely used outside the Government.
+
+ $ system integrity
+ 1. (I) An attribute or quality "that a system has when it can
+ perform its intended function in a unimpaired manner, free from
+ deliberate or inadvertent unauthorized manipulation." [C4009,
+ NCS04] (See: recovery, system integrity service.)
+
+ 2. (D) "Quality of an [information system] reflecting the logical
+ correctness and reliability of the operating system; the logical
+ completeness of the hardware and software implementing the
+ protection mechanisms; and the consistency of the data structures
+ and occurrence of the stored data." [from an earlier version of
+ C4009]
+
+ Deprecated Definition: IDOCs SHOULD NOT use definition 2 because
+ it mixes several concepts in a potentially misleading way.
+ Instead, IDOCs should use the term with definition 1 and,
+ depending on what is meant, couple the term with additional, more
+ specifically descriptive and informative terms, such as
+ "correctness", "reliability", and "data integrity".
+
+ $ system integrity service
+ (I) A security service that protects system resources in a
+ verifiable manner against unauthorized or accidental change, loss,
+ or destruction. (See: system integrity.)
+
+ $ system low
+ (I) The lowest security level supported by a system at a
+ particular time or in a particular environment. (Compare: system
+ high.)
+
+ $ system resource
+ (I) Data contained in an information system; or a service provided
+ by a system; or a system capacity, such as processing power or
+ communication bandwidth; or an item of system equipment (i.e.,
+
+
+
+
+
+Shirey Informational [Page 299]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ hardware, firmware, software, or documentation); or a facility
+ that houses system operations and equipment. (See: system
+ component.)
+
+ $ system security officer (SSO)
+ (I) A person responsible for enforcement or administration of the
+ security policy that applies to a system. (Compare: manager,
+ operator.)
+
+ $ system user
+ (I) A system entity that consumes a product or service provided by
+ the system, or that accesses and employs system resources to
+ produce a product or service of the system. (See: access, [R2504].
+ Compare: authorized user, manager, operator, principal, privileged
+ user, subject, subscriber, system entity, unauthorized user.)
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because the term is used in many ways and could easily be
+ misunderstood:
+ - This term usually refers to an entity that has been authorized
+ to access the system, but the term sometimes is used without
+ regard for whether access is authorized.
+ - This term usually refers to a living human being acting either
+ personally or in an organizational role. However, the term also
+ may refer to an automated process in the form of hardware,
+ software, or firmware; to a set of persons; or to a set of
+ processes.
+ - IDOCs SHOULD NOT use the term to refer to a mixed set
+ containing both persons and processes. This exclusion is
+ intended to prevent situations that might cause a security
+ policy to be interpreted in two different and conflicting ways.
+
+ A system user can be characterized as direct or indirect:
+ - "Passive user": A system entity that is (a) outside the
+ system's security perimeter *and* (b) can receive output from
+ the system but cannot provide input or otherwise interact with
+ the system.
+ - "Active user": A system entity that is (a) inside the system's
+ security perimeter *or* (b) can provide input or otherwise
+ interact with the system.
+
+ $ TACACS
+ (I) See: Terminal Access Controller (TAC) Access Control System.
+
+ $ TACACS+
+ (I) A TCP-based protocol that improves on TACACS by separating the
+ functions of authentication, authorization, and accounting and by
+ encrypting all traffic between the network access server and
+
+
+
+Shirey Informational [Page 300]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ authentication server. TACACS+ is extensible to allow any
+ authentication mechanism to be used with TACACS+ clients.
+
+ $ tamper
+ (I) Make an unauthorized modification in a system that alters the
+ system's functioning in a way that degrades the security services
+ that the system was intended to provide. (See: QUADRANT. Compare:
+ secondary definitions under "corruption" and "misuse".)
+
+ $ tamper-evident
+ (I) A characteristic of a system component that provides evidence
+ that an attack has been attempted on that component or system.
+
+ Usage: Usually involves physical evidence. (See: tamper.)
+
+ $ tamper-resistant
+ (I) A characteristic of a system component that provides passive
+ protection against an attack. (See: tamper.)
+
+ Usage: Usually involves physical means of protection.
+
+ $ tampering
+ (I) /threat action/ See: secondary definitions under "corruption"
+ and "misuse".
+
+ $ target of evaluation (TOE)
+ (N) /Common Criteria/ An information technology product or system
+ that is the subject of a security evaluation, together with the
+ product's associated administrator and user documentation.
+ (Compare: protection profile.)
+
+ Tutorial: The security characteristics of the target of evaluation
+ (TOE) are described in specific terms by a corresponding security
+ target, or in more general terms by a protection profile. In
+ Common Criteria philosophy, it is important that a TOE be
+ evaluated against the specific set of criteria expressed in the
+ target. This evaluation consists of rigorous analysis and testing
+ performed by an accredited, independent laboratory. The scope of a
+ TOE evaluation is set by the EAL and other requirements specified
+ in the target. Part of this process is an evaluation of the target
+ itself, to ensure that it is correct, complete, and internally
+ consistent and can be used as the baseline for the TOE evaluation.
+
+ $ TCB
+ (N) See: trusted computing base.
+
+ $ TCC field
+ (I) See: Transmission Control Code field.
+
+
+
+Shirey Informational [Page 301]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ TCG
+ (N) See: Trusted Computing Group.
+
+ $ TCP
+ (I) See: Transmission Control Protocol.
+
+ $ TCP/IP
+ (I) Synonym for "Internet Protocol Suite".
+
+ $ TCSEC
+ (N) See: Trusted Computer System Evaluation Criteria. (Compare:
+ TSEC.)
+
+ $ TDEA
+ (I) See: Triple Data Encryption Algorithm.
+
+ $ teardrop attack
+ (D) /slang/ A denial-of-service attack that sends improperly
+ formed IP packet fragments with the intent of causing the
+ destination system to fail.
+
+ Deprecated Term: IDOCs that use this term SHOULD state a
+ definition for it because the term is often used imprecisely and
+ could easily be misunderstood. (See: Deprecated Usage under "Green
+ Book".)
+
+ $ technical non-repudiation
+ (I) See: (secondary definition under) non-repudiation.
+
+ $ technical security
+ (I) Security mechanisms and procedures that are implemented in and
+ executed by computer hardware, firmware, or software to provide
+ automated protection for a system. (See: security architecture.
+ Compare: administrative security.)
+
+ $ Telecommunications Security Word System (TSEC)
+ (O) /U.S. Government/ A terminology for designating
+ telecommunication security equipment. (Compare: TCSEC.)
+
+ Tutorial: A TSEC designator has the following parts:
+ - Prefix "TSEC/" for items and systems, or suffix "/TSEC" for
+ assemblies. (Often omitted when the context is clear.)
+ - First letter, for function: "C" COMSEC equipment system, "G"
+ general purpose, "K" cryptographic, "H" crypto-ancillary, "M"
+ manufacturing, "N" noncryptographic, "S" special purpose.
+ - Second letter, for type or purpose: "G" key generation, "I"
+ data transmission, "L" literal conversion, "N" signal
+ conversion, "O" multipurpose, "P" materials production, "S"
+
+
+
+Shirey Informational [Page 302]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ special purpose, "T" testing or checking, "U" television, "W"
+ teletypewriter, "X" facsimile, "Y" speech.
+ - Optional third letter, used only in designations of assemblies,
+ for type or purpose: "A" advancing, "B" base or cabinet, "C"
+ combining, "D" drawer or panel, "E" strip or chassis, "F" frame
+ or rack, "G" key generator, "H" keyboard, "I" translator or
+ reader, "J" speech processing, "K" keying or permuting, "L"
+ repeater, "M" memory or storage, "O" observation, "P" power
+ supply or converter, "R" receiver, "S" synchronizing, "T"
+ transmitter, "U" printer, "V" removable COMSEC component, "W"
+ logic programmer/programming, "X" special purpose.
+ - Model number, usually two or three digits, assigned
+ sequentially within each letter combination (e.g., KG-34, KG-
+ 84).
+ - Optional suffix letter, used to designate a version. First
+ version has no letter, next version has "A" (e.g., KG-84, KG-
+ 84A), etc.
+
+ $ TELNET
+ (I) A TCP-based, Application-Layer, Internet Standard protocol
+ (RFC 854) for remote login from one host to another.
+
+ $ TEMPEST
+ 1. (N) Short name for technology and methods for protecting
+ against data compromise due to electromagnetic emanations from
+ electrical and electronic equipment. [Army, Russ] (See:
+ inspectable space, soft TEMPEST, TEMPEST zone. Compare: QUADRANT)
+
+ 2. (O) /U.S. Government/ "Short name referring to investigation,
+ study, and control of compromising emanations from IS equipment."
+ [C4009]
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term as a synonym for
+ "electromagnetic emanations security"; instead, use EMSEC. Also,
+ the term is NOT an acronym for Transient Electromagnetic Pulse
+ Surveillance Technology.
+
+ Tutorial: The U.S. Federal Government issues security policies
+ that (a) state specifications and standards for techniques to
+ reduce the strength of emanations from systems and reduce the
+ ability of unauthorized parties to receive and make use of
+ emanations and (b) state rules for applying those techniques.
+ Other nations presumably do the same.
+
+ $ TEMPEST zone
+ (O) "Designated area [i.e., a physical volume] within a facility
+ where equipment with appropriate TEMPEST characteristics ... may
+
+
+
+
+Shirey Informational [Page 303]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ be operated." [C4009] (See: emanation security, TEMPEST. Compare:
+ control zone, inspectable space.)
+
+ Tutorial: The strength of an electromagnetic signal decreases in
+ proportion to the square of the distance between the source and
+ the receiver. Therefore, EMSEC for electromagnetic signals can be
+ achieved by a combination of (a) reducing the strength of
+ emanations to a defined level and (b) establishing around that
+ equipment an appropriately sized physical buffer zone from which
+ unauthorized entities are excluded. By making the zone large
+ enough, it is possible to limit the signal strength available to
+ entities outside the zone to a level lower than can be received
+ and read with known, state-of-the-art methods. Typically, the need
+ for and size of a TEMPEST zone established by a security policy
+ depends not only on the measured level of signal emitted by
+ equipment, but also on the perceived threat level in the
+ equipment's environment.
+
+ $ Terminal Access Controller (TAC) Access Control System (TACACS)
+ (I) A UDP-based authentication and access control protocol [R1492]
+ in which a network access server receives an identifier and
+ password from a remote terminal and passes them to a separate
+ authentication server for verification. (See: TACACS+.)
+
+ Tutorial: TACACS can provide service not only for network access
+ servers but also routers and other networked computing devices via
+ one or more centralized authentication servers. TACACS was
+ originally developed for ARPANET and has evolved for use in
+ commercial equipment.
+
+ $ TESS
+ (I) See: The Exponential Encryption System.
+
+ $ The Exponential Encryption System (TESS)
+ (I) A system of separate but cooperating cryptographic mechanisms
+ and functions for the secure authenticated exchange of
+ cryptographic keys, the generation of digital signatures, and the
+ distribution of public keys. TESS uses asymmetric cryptography,
+ based on discrete exponentiation, and a structure of self-
+ certified public keys. [R1824]
+
+ $ theft
+ (I) /threat action/ See: secondary definitions under
+ "interception" and "misappropriation".
+
+ $ threat
+ 1a. (I) A potential for violation of security, which exists when
+ there is an entity, circumstance, capability, action, or event
+
+
+
+Shirey Informational [Page 304]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ that could cause harm. (See: dangling threat, INFOCON level,
+ threat action, threat agent, threat consequence. Compare: attack,
+ vulnerability.)
+
+ 1b. (N) Any circumstance or event with the potential to adversely
+ affect a system through unauthorized access, destruction,
+ disclosure, or modification of data, or denial of service. [C4009]
+ (See: sensitive information.)
+
+ Usage: (a) Frequently misused with the meaning of either "threat
+ action" or "vulnerability". (b) In some contexts, "threat" is used
+ more narrowly to refer only to intelligent threats; for example,
+ see definition 2 below. (c) In some contexts, "threat" is used
+ more broadly to cover both definition 1 and other concepts, such
+ as in definition 3 below.
+
+ Tutorial: A threat is a possible danger that might exploit a
+ vulnerability. Thus, a threat may be intentional or not:
+ - "Intentional threat": A possibility of an attack by an
+ intelligent entity (e.g., an individual cracker or a criminal
+ organization).
+ - "Accidental threat": A possibility of human error or omission,
+ unintended equipment malfunction, or natural disaster (e.g.,
+ fire, flood, earthquake, windstorm, and other causes listed in
+ [FP031]).
+
+ The Common Criteria characterizes a threat in terms of (a) a
+ threat agent, (b) a presumed method of attack, (c) any
+ vulnerabilities that are the foundation for the attack, and (d)
+ the system resource that is attacked. That characterization agrees
+ with the definitions in this Glossary (see: diagram under
+ "attack").
+
+ 2. (O) The technical and operational ability of a hostile entity
+ to detect, exploit, or subvert a friendly system and the
+ demonstrated, presumed, or inferred intent of that entity to
+ conduct such activity.
+
+ Tutorial: To be likely to launch an attack, an adversary must have
+ (a) a motive to attack, (b) a method or technical ability to make
+ the attack, and (c) an opportunity to appropriately access the
+ targeted system.
+
+ 3. (D) "An indication of an impending undesirable event." [Park]
+
+ Deprecated Definition: IDOCs SHOULD NOT use this term with
+ definition 3 because the definition is ambiguous; the definition
+ was intended to include the following three meanings:
+
+
+
+Shirey Informational [Page 305]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - "Potential threat": A possible security violation; i.e., the
+ same as definition 1.
+ - "Active threat": An expression of intent to violate security.
+ (Context usually distinguishes this meaning from the previous
+ one.)
+ - "Accomplished threat" or "actualized threat": That is, a threat
+ action. Deprecated Usage: IDOCs SHOULD NOT use the term
+ "threat" with this meaning; instead, use "threat action".
+
+ $ threat action
+ (I) A realization of a threat, i.e., an occurrence in which system
+ security is assaulted as the result of either an accidental event
+ or an intentional act. (See: attack, threat, threat consequence.)
+
+ Tutorial: A complete security architecture deals with both
+ intentional acts (i.e., attacks) and accidental events [FP031].
+ (See: various kinds of threat actions defined under the four kinds
+ of "threat consequence".)
+
+ $ threat agent
+ (I) A system entity that performs a threat action, or an event
+ that results in a threat action.
+
+ $ threat analysis
+ (I) An analysis of the threat actions that might affect a system,
+ primarily emphasizing their probability of occurrence but also
+ considering their resulting threat consequences. Example: RFC
+ 3833. (Compare: risk analysis.)
+
+ $ threat consequence
+ (I) A security violation that results from a threat action.
+
+ Tutorial: The four basic types of threat consequence are
+ "unauthorized disclosure", "deception", "disruption", and
+ "usurpation". (See main Glossary entries of each of these four
+ terms for lists of the types of threat actions that can result in
+ these consequences.)
+
+ $ thumbprint
+ 1. (I) A pattern of curves formed by the ridges on the tip of a
+ thumb. (See: biometric authentication, fingerprint.)
+
+ 2. (D) Synonym for some type of "hash result". (See: biometric
+ authentication. Compare: fingerprint.)
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term with definition 2
+ because that meaning mixes concepts in a potentially misleading
+ way.
+
+
+
+Shirey Informational [Page 306]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ ticket
+ (I) Synonym for "capability token".
+
+ Tutorial: A ticket is usually granted by a centralized access
+ control server (ticket-granting agent) to authorize access to a
+ system resource for a limited time. Tickets can be implemented
+ with either symmetric cryptography (see: Kerberos) or asymmetric
+ cryptography (see: attribute certificate).
+
+ $ tiger team
+ (O) A group of evaluators employed by a system's managers to
+ perform penetration tests on the system.
+
+ Deprecated Usage: It is likely that other cultures use different
+ metaphors for this concept. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. (See: Deprecated
+ Usage under "Green Book".)
+
+ $ time stamp
+ 1. (I) /noun/ With respect to a data object, a label or marking in
+ which is recorded the time (time of day or other instant of
+ elapsed time) at which the label or marking was affixed to the
+ data object. (See: Time-Stamp Protocol.)
+
+ 2. (O) /noun/ "With respect to a recorded network event, a data
+ field in which is recorded the time (time of day or other instant
+ of elapsed time) at which the event took place." [A1523]
+
+ Tutorial: A time stamp can be used as evidence to prove that a
+ data object existed (or that an event occurred) at or before a
+ particular time. For example, a time stamp might be used to prove
+ that a digital signature based on a private key was created while
+ the corresponding public-key certificate was valid, i.e., before
+ the certificate either expired or was revoked. Establishing this
+ proof would enable the certificate to be used after its expiration
+ or revocation, to verify a signature that was created earlier.
+ This kind of proof is required as part of implementing PKI
+ services, such as non-repudiation service, and long-term security
+ services, such as audit.
+
+ $ Time-Stamp Protocol
+ (I) An Internet protocol (RFC 3161) that specifies how a client
+ requests and receives a time stamp from a server for a data object
+ held by the client.
+
+ Tutorial: The protocol describes the format of (a) a request sent
+ to a time-stamp authority and (b) the response that is returned
+ containing a time stamp. The authority creates the stamp by
+
+
+
+Shirey Informational [Page 307]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ concatenating (a) a hash value of the input data object with (b) a
+ UTC time value and other parameters (policy OID, serial number,
+ indication of time accuracy, nonce, DN of the authority, and
+ various extensions), and then signing that dataset with the
+ authority's private key as specified in CMS. Such an authority
+ typically would operate as a trusted third-party service, but
+ other operational models might be used.
+
+ $ timing channel
+ (I) See: covert timing channel.
+
+ $ TKEY
+ (I) A mnemonic referring to an Internet protocol (RFC 2930) for
+ establishing a shared secret key between a DNS resolver and a DNS
+ name server. (See: TSIG.)
+
+ $ TLS
+ (I) See: Transport Layer Security.
+
+ $ TLSP
+ (N) See: Transport Layer Security Protocol.
+
+ $ TOE
+ (N) See: target of evaluation.
+
+ $ token
+ 1. (I) /cryptography/ See: cryptographic token. (Compare: dongle.)
+
+ 2. (I) /access control/ An object that is used to control access
+ and is passed between cooperating entities in a protocol that
+ synchronizes use of a shared resource. Usually, the entity that
+ currently holds the token has exclusive access to the resource.
+ (See: capability token.)
+
+ Usage: This term is heavily overloaded in the computing
+ literature; therefore, IDOCs SHOULD NOT use this term with any
+ definition other than 1 or 2.
+
+ 3a. (D) /authentication/ A data object or a physical device used
+ to verify an identity in an authentication process.
+
+ 3b. (D) /U.S. Government/ Something that the claimant in an
+ authentication process (i.e., the entity that claims an identity)
+ possesses and controls, and uses to prove the claim during the
+ verification step of the process. [SP63]
+
+ Deprecated usage: IDOCs SHOULD NOT use this term with definitions
+ 3a and 3b; instead, use more specifically descriptive and
+
+
+
+Shirey Informational [Page 308]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ informative terms such as "authentication information" or
+ "cryptographic token", depending on what is meant.
+
+ NIST defines four types of claimant tokens for electronic
+ authentication in an information system [SP63]. IDOCs SHOULD NOT
+ use these four NIST terms; they mix concepts in potentially
+ confusing ways and duplicate the meaning of better-established
+ terms. These four terms can be avoided by using more specifically
+ descriptive terms as follows:
+ - NIST "hard token": A hardware device that contains a protected
+ cryptographic key. (This is a type of "cryptographic token",
+ and the key is a type of "authentication information".)
+ - NIST "one-time password device token": A personal hardware
+ device that generates one-time passwords. (One-time passwords
+ are typically generated cryptographically. Therefore, this is a
+ type of "cryptographic token", and the key is a type of
+ "authentication information".)
+ - NIST "soft token": A cryptographic key that typically is stored
+ on disk or some other magnetic media. (The key is a type of
+ "authentication information"; "authentication key" would be a
+ better description.)
+ - NIST "password token": A secret data value that the claimant
+ memorizes. (This is a "password" that is being used as
+ "authentication information".)
+
+ $ token backup
+ (I) A token management operation that stores sufficient
+ information in a database (e.g., in a CAW) to recreate or restore
+ a security token (e.g., a smart card) if it is lost or damaged.
+
+ $ token copy
+ (I) A token management operation that copies all the personality
+ information from one security token to another. However, unlike in
+ a token restore operation, the second token is initialized with
+ its own, different local security values such as PINs and storage
+ keys.
+
+ $ token management
+ (I) The process that includes initializing security tokens (e.g.,
+ "smart card"), loading data into the tokens, and controlling the
+ tokens during their lifecycle. May include performing key
+ management and certificate management functions; generating and
+ installing PINs; loading user personality data; performing card
+ backup, card copy, and card restore operations; and updating
+ firmware.
+
+
+
+
+
+
+Shirey Informational [Page 309]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ token restore
+ (I) A token management operation that loads a security token with
+ data for the purpose of recreating (duplicating) the contents
+ previously held by that or another token. (See: recovery.)
+
+ $ token storage key
+ (I) A cryptographic key used to protect data that is stored on a
+ security token.
+
+ $ top CA
+ (I) Synonym for "root" in a certification hierarchy. (See: apex
+ trust anchor.)
+
+ $ top-level specification
+ (I) "A non-procedural description of system behavior at the most
+ abstract level; typically a functional specification that omits
+ all implementation details." [NCS04] (See: formal top-level
+ specification, Tutorial under "security policy".)
+
+ Tutorial: A top-level specification is at a level of abstraction
+ below "security model" and above "security architecture" (see:
+ Tutorial under "security policy").
+
+ A top-level specification may be descriptive or formal:
+ - "Descriptive top-level specification": One that is written in a
+ natural language like English or an informal design notation.
+ - "Formal top-level specification": One that is written in a
+ formal mathematical language to enable theorems to be proven
+ that show that the specification correctly implements a set of
+ formal requirements or a formal security model. (See:
+ correctness proof.)
+
+ $ TPM
+ (N) See: Trusted Platform Module.
+
+ $ traceback
+ (I) Identification of the source of a data packet. (See:
+ masquerade, network weaving.)
+
+ $ tracker
+ (N) An attack technique for achieving unauthorized disclosure from
+ a statistical database. [Denns] (See: Tutorial under "inference
+ control".)
+
+ $ traffic analysis
+ 1. (I) Gaining knowledge of information by inference from
+ observable characteristics of a data flow, even if the information
+ is not directly available (e.g., when the data is encrypted).
+
+
+
+Shirey Informational [Page 310]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ These characteristics include the identities and locations of the
+ source(s) and destination(s) of the flow, and the flow's presence,
+ amount, frequency, and duration of occurrence. The object of the
+ analysis might be information in SDUs, information in the PCI, or
+ both. (See: inference, traffic-flow confidentiality, wiretapping.
+ Compare: signal analysis.)
+
+ 2. (O) "The inference of information from observation of traffic
+ flows (presence, absence, amount, direction, and frequency)."
+ [I7498-2]
+
+ $ traffic-flow analysis
+ (I) Synonym for "traffic analysis".
+
+ $ traffic-flow confidentiality (TFC)
+ 1. (I) A data confidentiality service to protect against traffic
+ analysis. (See: communications cover.)
+
+ 2. (O) "A confidentiality service to protect against traffic
+ analysis." [I7498-2]
+
+ Tutorial: Confidentiality concerns involve both direct and
+ indirect disclosure of data, and the latter includes traffic
+ analysis. However, operational considerations can make TFC
+ difficult to achieve. For example, if Alice sends a product idea
+ to Bob in an email message, she wants data confidentiality for the
+ message's content, and she might also want to conceal the
+ destination of the message to hide Bob's identity from her
+ competitors. However, the identity of the intended recipient, or
+ at least a network address for that recipient, needs to be made
+ available to the mail system. Thus, complex forwarding schemes may
+ be needed to conceal the ultimate destination as the message
+ travels through the open Internet (see: onion routing).
+
+ Later, if Alice uses an ATM during a clandestine visit to
+ negotiate with Bob, she might prefer that her bank conceal the
+ origin of her transaction, because knowledge of the ATM's location
+ might allow a competitor to infer Bob's identity. The bank, on the
+ other hand, might prefer to protect only Alice's PIN (see:
+ selective-field confidentiality).
+
+ A TFC service can be either full or partial:
+ - "Full TFC": This type of service conceals all traffic
+ characteristics.
+ - "Partial TFC": This type of service either (a) conceals some
+ but not all of the characteristics or (b) does not completely
+ conceal some characteristic.
+
+
+
+
+Shirey Informational [Page 311]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ On point-to-point data links, full TFC can be provided by
+ enciphering all PDUs and also generating a continuous, random data
+ stream to seamlessly fill all gaps between PDUs. To a wiretapper,
+ the link then appears to be carrying an unbroken stream of
+ enciphered data. In other cases -- including on a shared or
+ broadcast medium, or end-to-end in a network -- only partial TFC
+ is possible, and that may require a combination of techniques. For
+ example, a LAN that uses "carrier sense multiple access with
+ collision detection" (CSMA/CD; a.k.a. "listen while talk") to
+ control access to the medium, relies on detecting intervals of
+ silence, which prevents using full TFC. Partial TFC can be
+ provided on that LAN by measures such as adding spurious PDUs,
+ padding PDUs to a constant size, or enciphering addresses just
+ above the Physical Layer; but these measures reduce the efficiency
+ with which the LAN can carry traffic. At higher protocol layers,
+ SDUs can be protected, but addresses and other items of PCI must
+ be visible at the layers below.
+
+ $ traffic key
+ (I) A cryptographic key used by a device for protecting
+ information that is being transmitted between devices, as opposed
+ to protecting information that being is maintained in the device.
+ (Compare: storage key.)
+
+ $ traffic padding
+ (I) "The generation of spurious instances of communication,
+ spurious data units, and/or spurious data within data units."
+ [I7498-2]
+
+ $ tranquility property
+ (N) /formal model/ Property of a system whereby the security level
+ of an object cannot change while the object is being processed by
+ the system. (See: Bell-LaPadula model.)
+
+ $ transaction
+ 1. (I) A unit of interaction between an external entity and a
+ system, or between components within a system, that involves a
+ series of system actions or events.
+
+ 2. (O) "A discrete event between user and systems that supports a
+ business or programmatic purpose." [M0404]
+
+ Tutorial: To maintain secure state, transactions need to be
+ processed coherently and reliably. Usually, they need to be
+ designed to be atomic, consistent, isolated, and durable [Gray]:
+ - "Atomic": All actions and events that comprise the transaction
+ are guaranteed to be completed successfully, or else the result
+ is as if none at all were executed.
+
+
+
+Shirey Informational [Page 312]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - "Consistent": The transaction satisfies correctness constraints
+ defined for the data that is being processed.
+ - "Isolated": If two transactions are performed concurrently,
+ they do not interfere with each other, and it appears as though
+ the system performs one at a time.
+ - "Durable": System state and transaction semantics survive
+ system failures.
+
+ $ TRANSEC
+ (I) See: transmission security.
+
+ $ Transmission Control Code field (TCC field)
+ (I) A data field that provides a means to segregate traffic and
+ define controlled communities of interest in the security option
+ (option type = 130) of IPv4's datagram header format. The TCC
+ values are alphanumeric trigraphs assigned by the U.S. Government
+ as specified in RFC 791.
+
+ $ Transmission Control Protocol (TCP)
+ (I) An Internet Standard, Transport-Layer protocol (RFC 793) that
+ reliably delivers a sequence of datagrams from one computer to
+ another in a computer network. (See: TCP/IP.)
+
+ Tutorial: TCP is designed to fit into a layered suite of protocols
+ that support internetwork applications. TCP assumes it can obtain
+ a simple but potentially unreliable end-to-end datagram service
+ (such as IP) from the lower-layer protocols.
+
+ $ transmission security (TRANSEC)
+ (I) COMSEC measures that protect communications from interception
+ and exploitation by means other than cryptanalysis. Example:
+ frequency hopping. (Compare: anti-jam, traffic flow
+ confidentiality.)
+
+ $ Transport Layer
+ See: Internet Protocol Suite, OSIRM.
+
+ $ Transport Layer Security (TLS)
+ (I) TLS is an Internet protocol [R4346] that is based on, and very
+ similar to, SSL Version 3.0. (Compare: TLSP.)
+
+ Tutorial: The TLS protocol is misnamed. The name misleadingly
+ suggests that TLS is situated in the IPS Transport Layer, but TLS
+ is always layered above a reliable Transport-Layer protocol
+ (usually TCP) and either layered immediately below or integrated
+ with an Application-Layer protocol (often HTTP).
+
+
+
+
+
+Shirey Informational [Page 313]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Transport Layer Security Protocol (TLSP)
+ (N) An end-to-end encryption protocol (ISO 10736) that provides
+ security services at the bottom of OSIRM Layer 4, i.e., directly
+ above Layer 3. (Compare: TLS.)
+
+ Tutorial: TLSP evolved directly from SP4.
+
+ $ transport mode
+ (I) One of two ways to apply AH or ESP to protect data packets; in
+ this mode, the IPsec protocol encapsulates (i.e., the protection
+ applies to) the packets of an IPS Transport-Layer protocol (e.g.,
+ TCP, UDP), which normally is carried directly above IP in an IPS
+ protocol stack. (Compare: tunnel mode.)
+
+ Tutorial: An IPsec transport-mode security association is always
+ between two hosts; neither end has the role of a security gateway.
+ Whenever either end of an IPsec security association is a security
+ gateway, the association is required to be in tunnel mode.
+
+ $ transposition
+ (I) /cryptography/ A method of encryption in which elements of the
+ plain text retain their original form but undergo some change in
+ their sequential position. (Compare: substitution.)
+
+ $ trap door
+ (I) Synonym for "back door".
+
+ $ trespass
+ (I) /threat action/ See: secondary definition under "intrusion".
+
+ $ Triple Data Encryption Algorithm
+ (I) A block cipher that transforms each 64-bit plaintext block by
+ applying the DEA three successive times, using either two or three
+ different keys for an effective key length of 112 or 168 bits.
+ [A9052, SP67]
+
+ Example: A variation proposed for IPsec's ESP uses a 168-bit key,
+ consisting of three independent 56-bit values used by the DEA, and
+ a 64-bit initialization vector. Each datagram contains an IV to
+ ensure that each received datagram can be decrypted even when
+ other datagrams are dropped or a sequence of datagrams is
+ reordered in transit. [R1851]
+
+ $ triple-wrapped
+ (I) /S-MIME/ Data that has been signed with a digital signature,
+ then encrypted, and then signed again. [R2634]
+
+
+
+
+
+Shirey Informational [Page 314]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Trojan horse
+ (I) A computer program that appears to have a useful function, but
+ also has a hidden and potentially malicious function that evades
+ security mechanisms, sometimes by exploiting legitimate
+ authorizations of a system entity that invokes the program. (See:
+ malware, spyware. Compare: logic bomb, virus, worm.)
+
+ $ trust
+ 1. (I) /information system/ A feeling of certainty (sometimes
+ based on inconclusive evidence) either (a) that the system will
+ not fail or (b) that the system meets its specifications (i.e.,
+ the system does what it claims to do and does not perform unwanted
+ functions). (See: trust level, trusted system, trustworthy system.
+ Compare: assurance.)
+
+ Tutorial: Components of a system can be grouped into three classes
+ of trust [Gass]:
+ - "Trusted": The component is responsible for enforcing security
+ policy on other components; the system's security depends on
+ flawless operation of the component. (See: trusted process.)
+ - "Benign": The component is not responsible for enforcing
+ security policy, but it has sensitive authorizations. It must
+ be trusted not to intentionally violate security policy, but
+ security violations are assumed to be accidental and not likely
+ to affect overall system security.
+ - "Untrusted": The component is of unknown or suspicious
+ provenance and must be treated as deliberately malicious. (See:
+ malicious logic.)
+
+ 2. (I) /PKI/ A relationship between a certificate user and a CA in
+ which the user acts according to the assumption that the CA
+ creates only valid digital certificates.
+
+ Tutorial: "Generally, an entity is said to 'trust' a second entity
+ when the first entity makes the assumption that the second entity
+ will behave exactly as the first entity expects. This trust may
+ apply only for some specific function. The key role of trust in
+ [X.509] is to describe the relationship between an entity [i.e., a
+ certificate user] and a [CA]; an entity shall be certain that it
+ can trust the CA to create only valid and reliable certificates."
+ [X509]
+
+ $ trust anchor
+ (I) /PKI/ An established point of trust (usually based on the
+ authority of some person, office, or organization) from which a
+ certificate user begins the validation of a certification path.
+ (See: apex trust anchor, path validation, trust anchor CA, trust
+ anchor certificate, trust anchor key.)
+
+
+
+Shirey Informational [Page 315]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because it is used in various ways in existing IDOCs and other PKI
+ literature. The literature almost always uses this term in a sense
+ that is equivalent to this definition, but usage often differs
+ with regard to what constitutes the point of trust.
+
+ Tutorial: A trust anchor may be defined as being based on a public
+ key, a CA, a public-key certificate, or some combination or
+ variation of those:
+
+ - 1. A public key as a point of trust: Although a certification
+ path is defined as beginning with a "sequence of public-key
+ certificates", an implementation of a path validation process
+ might not explicitly handle a root certificate as part of the
+ path, but instead begin the process by using a trusted root key
+ to verify the signature on a certificate that was issued by the
+ root.
+
+ Therefore, "trust anchor" is sometimes defined as just a public
+ key. (See: root key, trust anchor key, trusted key.)
+
+ - 2. A CA as a point of trust: A trusted public key is just one
+ of the data elements needed for path validation; the IPS path
+ validation algorithm [R3280] also needs the name of the CA to
+ which that key belongs, i.e., the DN of the issuer of the first
+ X.509 certificate to be validated on the path. (See: issue.)
+
+ Therefore, "trust anchor" is sometimes defined as either just a
+ CA (where some public key is implied) or as a CA together with
+ a specified public key belonging to that CA. (See: root, trust
+ anchor CA, trusted CA.)
+
+ Example: "A public key and the name of a [CA] that is used to
+ validate the first certificate in a sequence of certificates.
+ The trust anchor public key is used to verify the signature on
+ a certificate issued by a trust anchor [CA]." [SP57]
+
+ - 3. A public-key certificate as a point of trust: Besides the
+ trusted CA's public key and name, the path validation algorithm
+ needs to know the digital signature algorithm and any
+ associated parameters with which the public key is used, and
+ also any constraints that have been placed on the set of paths
+ that may be validated using the key. All of this information is
+ available from a CA's public-key certificate.
+
+ Therefore, "trust anchor" is sometimes defined as a public-key
+ certificate of a CA. (See: root certificate, trust anchor
+ certificate, trusted certificate.)
+
+
+
+Shirey Informational [Page 316]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - 4. Combinations: Combinations and variations of the first three
+ definitions are also used in the PKI literature.
+
+ Example: "trust anchor information". The IPS standard for path
+ validation [R3280] specifies the information that describes "a
+ CA that serves as a trust anchor for the certification path.
+ The trust anchor information includes: (a) the trusted issuer
+ name, (b) the trusted public key algorithm, (c) the trusted
+ public key, and (d) optionally, the trusted public key
+ parameters associated with the public key. The trust anchor
+ information may be provided to the path processing procedure in
+ the form of a self-signed certificate. The trusted anchor
+ information is trusted because it was delivered to the path
+ processing procedure by some trustworthy out-of-band procedure.
+ If the trusted public key algorithm requires parameters, then
+ the parameters are provided along with the trusted public key."
+
+ $ trust anchor CA
+ (I) A CA that is the subject of a trust anchor certificate or
+ otherwise establishes a trust anchor key. (See: root, trusted CA.)
+
+ Tutorial: The selection of a CA to be a trust anchor is a matter
+ of policy. Some of the possible choices include (a) the top CA in
+ a hierarchical PKI, (b) the CA that issued the verifier's own
+ certificate, or (c) any other CA in a network PKI. Different
+ applications may rely on different trust anchors, or may accept
+ paths that begin with any of a set of trust anchors. The IPS path
+ validation algorithm is the same, regardless of the choice.
+
+ $ trust anchor certificate
+ (I) A public-key certificate that is used to provide the first
+ public key in a certification path. (See: root certificate, trust
+ anchor, trusted certificate.)
+
+ $ trust anchor key
+ (I) A public key that is used as the first public key in a
+ certification path. (See: root key, trust anchor, trusted public
+ key.)
+
+ $ trust anchor information
+ (I) See: secondary definition under "trust anchor".
+
+ $ trust chain
+ (D) Synonym for "certification path". (See: trust anchor, trusted
+ certificate.)
+
+
+
+
+
+
+Shirey Informational [Page 317]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: IDOCs SHOULD NOT use this term, because it
+ unnecessarily duplicates the meaning of the internationally
+ standardized term.
+
+ Also, the term mixes concepts in a potentially misleading way.
+ Having "trust" involves factors unrelated to simply verifying
+ signatures and performing other tests as specified by a standard
+ algorithm for path validation (e.g., RFC 3280). Thus, even if a
+ user is able to validate a certification path algorithmically, the
+ user still might distrust one of the CAs that issued certificates
+ in that path or distrust some other aspects of the PKI.
+
+ $ trust-file PKI
+ (I) A non-hierarchical PKI in which each certificate user has its
+ own local file (which is used by application software) of trust
+ anchors, i.e., either public keys or public-key certificates that
+ the user trusts as starting points for certification paths. (See:
+ trust anchor, web of trust. Compare: hierarchical PKI, mesh PKI.)
+
+ Example: Popular browsers are distributed with an initial file of
+ trust anchor certificates, which often are self-signed
+ certificates. Users can add certificates to the file or delete
+ from it. The file may be directly managed by the user, or the
+ user's organization may manage it from a centralized server.
+
+ $ trust hierarchy
+ (D) Synonym for "certification hierarchy".
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term because it mixes
+ concepts in a potentially misleading way, and because a trust
+ hierarchy could be implemented in other ways. (See: trust, trust
+ chain, web of trust.)
+
+ $ trust level
+ (N) A characterization of a standard of security protection to be
+ met by an information system. (See: Common Criteria, TCSEC.)
+
+ Tutorial: A trust level is based not only on (a) the presence of
+ security mechanisms, but also on the use of (b) systems
+ engineering discipline to properly structure the system and (c)
+ implementation analysis to ensure that the system provides an
+ appropriate degree of trust.
+
+ $ trusted
+ (I) See: secondary definition under "trust".
+
+
+
+
+
+
+Shirey Informational [Page 318]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ trusted CA
+ (I) A CA upon which a certificate user relies as issuing valid
+ certificates; especially a CA that is used as a trust anchor CA.
+ (See: certification path, root, trust anchor CA, validation.)
+
+ Tutorial. This trust is transitive to the extent that the X.509
+ certificate extensions permit; that is, if a trusted CA issues a
+ certificate to another CA, a user that trusts the first CA also
+ trusts the second CA if the user succeeds in validating the
+ certificate path (see: path validation).
+
+ $ trusted certificate
+ (I) A digital certificate that a certificate user accepts as being
+ valid "a priori", i.e., without testing the certificate to
+ validate it as the final certificate on a certification path;
+ especially a certificate that is used as a trust anchor
+ certificate. (See: certification path, root certificate, trust
+ anchor certificate, trust-file PKI, validation.)
+
+ Tutorial: The acceptance of a certificate as trusted is a matter
+ of policy and choice. Usually, a certificate is accepted as
+ trusted because the user obtained it by reliable, out-of-band
+ means that cause the user to believe the certificate accurately
+ binds its subject's name to the subject's public key or other
+ attribute values. Many choices are possible; e.g., a trusted
+ public-key certificate might be (a) the root certificate in a
+ hierarchical PKI, (b) the certificate of the CA that issued the
+ user's own certificate in a mesh PKI, or (c) a certificate
+ provided with an application that uses a trust-file PKI.
+
+ $ Trusted Computer System Evaluation Criteria (TCSEC)
+ (N) A standard for evaluating the security provided by operating
+ systems [CSC1, DoD1]. Known as the "Orange Book" because of the
+ color of its cover; first document in the Rainbow Series. (See:
+ Common Criteria, Deprecated Usage under "Green Book", Orange Book,
+ trust level, trusted system. Compare: TSEC.)
+
+ Tutorial: The TCSEC defines classes of hierarchically ordered
+ assurance levels for rating computer systems. From highest to
+ lowest, the classes are as follows:
+ - Division A: Verified protection.
+ Beyond A1 Beyond current technology. (See: beyond A1.)
+ Class A1 Verified design. (See: SCOMP.)
+ - Division B: Mandatory protection.
+ Class B3 Security domains.
+ Class B2 Structured protection. (See: Multics.)
+ Class B1 Labeled security protection.
+
+
+
+
+Shirey Informational [Page 319]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ - Division C: Discretionary protection.
+ Class C2 Controlled access protection.
+ Class C1 Discretionary security protection.
+ - Division D: Minimal protection, i.e., has been evaluated but
+ does not meet the requirements for a higher evaluation class.
+
+ $ trusted computing base (TCB)
+ (N) "The totality of protection mechanisms within a computer
+ system, including hardware, firmware, and software, the
+ combination of which is responsible for enforcing a security
+ policy." [NCS04] (See: "trusted" under "trust". Compare: TPM.)
+
+ $ Trusted Computing Group (TCG)
+ (N) A not-for-profit, industry standards organization formed to
+ develop, define, and promote open standards for hardware-enabled
+ trusted computing and security technologies, including hardware
+ building blocks and software interfaces, across multiple
+ platforms, peripherals, and devices. (See: TPM, trusted system.
+ Compare: TSIG.)
+
+ $ trusted distribution
+ (I) /COMPUSEC/ "A trusted method for distributing the TCB
+ hardware, software, and firmware components, both originals and
+ updates, that provides methods for protecting the TCB from
+ modification during distribution and for detection of any changes
+ to the TCB that may occur." [NCS04] (See: code signing,
+ configuration control.)
+
+ $ trusted key
+ (D) Abbreviation for "trusted public key" and also for other types
+ of keys. (See: root key, trust anchor key.)
+
+ Deprecated Usage: IDOCs SHOULD either (a) state a definition for
+ this term or (b) use a different, less ambiguous term. This term
+ is ambiguous when it stands alone; e.g., it could refer to a
+ trusted public key or to a private key or symmetric key that is
+ believed to be secure (i.e., not compromised).
+
+ $ trusted path
+ 1a. (I) /COMPUSEC/ A mechanism by which a computer system user can
+ communicate directly and reliably with the TCB and that can only
+ be activated by the user or the TCB and cannot be imitated by
+ untrusted software within the computer. [NCS04]
+
+ 1b. (I) /COMSEC/ A mechanism by which a person or process can
+ communicate directly with a cryptographic module and that can only
+ be activated by the person, process, or module, and cannot be
+ imitated by untrusted software within the module. [FP140]
+
+
+
+Shirey Informational [Page 320]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Trusted Platform Module (TPM)
+ (N) The name of a specification, published by the TCG, for a
+ microcontroller that can store secured information; and also the
+ general name of implementations of that specification. (Compare:
+ TCB.)
+
+ $ trusted process
+ (I) A system component that has privileges that enable it to
+ affect the state of system security and that can, therefore,
+ through incorrect or malicious execution, violate the system's
+ security policy. (See: privileged process, trusted system.)
+
+ $ trusted public key
+ (I) A public key upon which a user relies; especially a public key
+ that is used as a trust anchor key. (See: certification path, root
+ key, trust anchor key, validation.)
+
+ Tutorial: A trusted public key could be (a) the root key in a
+ hierarchical PKI, (b) the key of the CA that issued the user's own
+ certificate in a mesh PKI, or (c) any key accepted by the user in
+ a trust-file PKI.
+
+ $ trusted recovery
+ (I) A process that, after a system has experienced a failure or an
+ attack, restores the system to normal operation (or to a secure
+ state) without causing a security compromise. (See: recovery.)
+
+ $ trusted subnetwork
+ (I) A subnetwork containing hosts and routers that trust each
+ other not to engage in active or passive attacks. (There also is
+ an assumption that the underlying communication channels, such as
+ telephone lines or a LAN, are protected from attack.)
+
+ $ trusted system
+ 1. (I) /information system/ A system that operates as expected,
+ according to design and policy, doing what is required -- despite
+ environmental disruption, human user and operator errors, and
+ attacks by hostile parties -- and not doing other things [NRC98].
+ (See: trust level, trusted process. Compare: trustworthy.)
+
+ 2. (N) /multilevel secure/ "A [trusted system is a] system that
+ employs sufficient hardware and software assurance measures to
+ allow its use for simultaneous processing of a range of sensitive
+ or classified information." [NCS04] (See: multilevel security
+ mode.)
+
+
+
+
+
+
+Shirey Informational [Page 321]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ Trusted Systems Interoperability Group (TSIG)
+ (N) A forum of computer vendors, system integrators, and users
+ devoted to promoting interoperability of trusted computer systems.
+ (See: trusted system. Compare: TCG.)
+
+ $ trustworthy system
+ 1. (I) A system that not only is trusted, but also warrants that
+ trust because the system's behavior can be validated in some
+ convincing way, such as through formal analysis or code review.
+ (See: trust. Compare: trusted.)
+
+ 2. (O) /Digital Signature Guidelines/ "Computer hardware,
+ software, and procedures that: (a) are reasonably secure from
+ intrusion and misuse; (b) provide a reasonably reliable level of
+ availability, reliability, and correct operation; (c) are
+ reasonably suited to performing their intended functions; and (d)
+ adhere to generally accepted security principles." [DSG]
+
+ $ TSEC
+ (O) See: Telecommunications Security Nomenclature System.
+ (Compare: TCSEC.)
+
+ $ TSIG
+ 1. (N) See: Trusted System Interoperability Group.
+
+ 2. (I) A mnemonic (presumed to be derived from "Transaction
+ SIGnature") referring to an Internet protocol (RFC 2845) for data
+ origin authentication and data integrity for certain DNS
+ operations. (See: TKEY.)
+
+ $ tunnel
+ 1. (I) A communication channel created in a computer network by
+ encapsulating (i.e., layering) a communication protocol's data
+ packets in (i.e., above) a second protocol that normally would be
+ carried above, or at the same layer as, the first one. (See: L2TP,
+ tunnel mode, VPN. Compare: covert channel.)
+
+ Tutorial: Tunneling can involve almost any two IPS protocol
+ layers. For example, a TCP connection between two hosts could
+ conceivably be carried above SMTP (i.e., in SMTP messages) as a
+ covert channel to evade access controls that a security gateway
+ applies to the normal TCP layer that is below SMTP.
+
+ Usually, however, a tunnel is a logical point-to-point link --
+ i.e., an OSIRM Layer 2 connection -- created by encapsulating the
+ Layer 2 protocol in one of the following three types of IPS
+ protocols: (a) an IPS Transport-Layer protocol (such as TCP), (b)
+ an IPS Network-Layer or Internet-Layer protocol (such as IP), or
+
+
+
+Shirey Informational [Page 322]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ (c) another Layer 2 protocol. In many cases, the encapsulation is
+ accomplished with an extra, intermediate protocol (i.e., a
+ "tunneling protocol"; e.g., L2TP) that is layered below the
+ tunneled Layer 2 protocol and above the encapsulating protocol.
+
+ Tunneling can be used to move data between computers that use a
+ protocol not supported by the network connecting them. Tunneling
+ also can enable a computer network to use the services of a second
+ network as though the second network were a set of point-to-point
+ links between the first network's nodes. (See: VPN.)
+
+ 2. (O) /SET/ The name of a SET private extension that indicates
+ whether the CA or the payment gateway supports passing encrypted
+ messages to the cardholder through the merchant. If so, the
+ extension lists OIDs of symmetric encryption algorithms that are
+ supported.
+
+ $ tunnel mode
+ (I) One of two ways to apply the IPsec protocols (AH and ESP) to
+ protect data packets; in this mode, the IPsec protocol
+ encapsulates (i.e., the protection applies to) IP packets, rather
+ than the packets of higher-layer protocols. (See: tunnel. Compare:
+ transport mode.)
+
+ Tutorial: Each end of a tunnel-mode security association may be
+ either a host or a security gateway. Whenever either end of an
+ IPsec security association is a security gateway, the association
+ is required to be in tunnel mode.
+
+ $ two-person control
+ (I) The close surveillance and control of a system, a process, or
+ materials (especially with regard to cryptography) at all times by
+ a minimum of two appropriately authorized persons, each capable of
+ detecting incorrect and unauthorized procedures with respect to
+ the tasks to be performed and each familiar with established
+ security requirements. (See: dual control, no-lone zone.)
+
+ $ Twofish
+ (O) A symmetric, 128-bit block cipher with variable key length
+ (128, 192, or 256 bits), developed by Counterpane Labs as a
+ candidate for the AES. (See: Blowfish.)
+
+ $ type 0 product
+ (O) /cryptography, U.S. Government/ Classified cryptographic
+ equipment endorsed by NSA for use (when appropriately keyed) in
+ electronically distributing bulk keying material.
+
+
+
+
+
+Shirey Informational [Page 323]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ type 1 key
+ (O) /cryptography, U.S. Government/ "Generated and distributed
+ under the auspices of NSA for use in a cryptographic device for
+ the protection of classified and sensitive national security
+ information." [C4009]
+
+ $ type 1 product
+ (O) /cryptography, U.S. Government/ "Cryptographic equipment,
+ assembly or component classified or certified by NSA for
+ encrypting and decrypting classified and sensitive national
+ security information when appropriately keyed. Developed using
+ established NSA business processes and containing NSA approved
+ algorithms. Used to protect systems requiring the most stringent
+ protection mechanisms." [C4009]
+
+ Tutorial: The current definition of this term is less specific
+ than an earlier version: "Classified or controlled cryptographic
+ item endorsed by the NSA for securing classified and sensitive
+ U.S. Government information, when appropriately keyed. The term
+ refers only to products, and not to information, key, services, or
+ controls. Type 1 products contain classified NSA algorithms. They
+ are available to U.S. Government users, their contractors, and
+ federally sponsored non-U.S. Government activities subject to
+ export restrictions in accordance with International Traffic in
+ Arms Regulation." [from an earlier version of C4009] (See: ITAR.)
+
+ $ type 2 key
+ (O) /cryptography, U.S. Government/ "Generated and distributed
+ under the auspices of NSA for use in a cryptographic device for
+ the protection of unclassified national security information."
+ [C4009]
+
+ $ type 2 product
+ (O) /cryptography, U.S. Government/ "Cryptographic equipment,
+ assembly, or component certified by NSA for encrypting or
+ decrypting sensitive national security information when
+ appropriately keyed. Developed using established NSA business
+ processes and containing NSA approved algorithms. Used to protect
+ systems requiring protection mechanisms exceeding best commercial
+ practices including systems used for the protection of
+ unclassified national security information." [C4009]
+
+ Tutorial: The current definition of this term is less specific
+ than an earlier version: "Unclassified cryptographic equipment,
+ assembly, or component, endorsed by the NSA, for use in national
+ security systems as defined in Title 40 U.S.C. Section 1452."
+ [from an earlier version of C4009] (See: national security system.
+ Compare: EUCI.)
+
+
+
+Shirey Informational [Page 324]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ type 3 key
+ (O) /cryptography, U.S. Government/ "Used in a cryptographic
+ device for the protection of unclassified sensitive information,
+ even if used in a Type 1 or Type 2 product." [C4009]
+
+ $ type 3 product
+ (O) /cryptography, U.S. Government/ "Unclassified cryptographic
+ equipment, assembly, or component used, when appropriately keyed,
+ for encrypting or decrypting unclassified sensitive U.S.
+ Government or commercial information, and to protect systems
+ requiring protection mechanisms consistent with standard
+ commercial practices. Developed using established commercial
+ standards and containing NIST approved cryptographic
+ algorithms/modules or successfully evaluated by the National
+ Information Assurance Partnership (NIAP)." [C4009]
+
+ $ type 4 key
+ (O) /cryptography, U.S. Government/ "Used by a cryptographic
+ device in support of its Type 4 functionality; i.e., any provision
+ of key that lacks U.S. Government endorsement or oversight."
+ [C4009]
+
+ $ type 4 product
+ (O) /cryptography, U.S. Government/ "Unevaluated commercial
+ cryptographic equipment, assemblies, or components that neither
+ NSA nor NIST certify for any Government usage. These products are
+ typically delivered as part of commercial offerings and are
+ commensurate with the vendor's commercial practices. These
+ products may contain either vendor proprietary algorithms,
+ algorithms registered by NIST, or algorithms registered by NIST
+ and published in a FIPS." [C4009]
+
+ $ UDP
+ (I) See: User Datagram Protocol.
+
+ $ UDP flood
+ (I) A denial-of-service attack that takes advantage of (a) one
+ system's UDP test function that generates a series of characters
+ for each packet it receives and (b) another system's UPD test
+ function that echoes any character it receives; the attack
+ connects (a) to (b) to cause a nonstop flow of data between the
+ two systems. (See: flooding.)
+
+ $ unauthorized disclosure
+ (I) A circumstance or event whereby an entity gains access to
+ information for which the entity is not authorized.
+
+
+
+
+
+Shirey Informational [Page 325]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Tutorial: This type of threat consequence can be caused by the
+ following types of threat actions: exposure, interception,
+ inference, and intrusion. Some methods of protecting against this
+ consequence include access control, flow control, and inference
+ control. (See: data confidentiality.)
+
+ $ unauthorized user
+ (I) /access control/ A system entity that accesses a system
+ resource for which the entity has not received an authorization.
+ (See: user. Compare: authorized user, insider, outsider.)
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because the term is used in many ways and could easily be
+ misunderstood.
+
+ $ uncertainty
+ (N) An information-theoretic measure (usually stated as a number
+ of bits) of the minimum amount of plaintext information that needs
+ to be recovered from cipher text to learn the entire plain text
+ that was encrypted. [SP63] (See: entropy.)
+
+ $ unclassified
+ (I) Not classified. (Compare: FOUO.)
+
+ $ unencrypted
+ (I) Not encrypted.
+
+ $ unforgeable
+ (I) /cryptography/ The property of a cryptographic data structure
+ (i.e., a data structure that is defined using one or more
+ cryptographic functions, e.g., "digital certificate") that makes
+ it computationally infeasible to construct (i.e., compute) an
+ unauthorized but correct value of the structure without having
+ knowledge of one of more keys.
+
+ Tutorial: This definition is narrower than general English usage,
+ where "unforgeable" means unable to be fraudulently created or
+ duplicated. In that broader sense, anyone can forge a digital
+ certificate containing any set of data items whatsoever by
+ generating the to-be-signed certificate and signing it with any
+ private key whatsoever. But for PKI purposes, the forged data
+ structure is invalid if it is not signed with the true private key
+ of the claimed issuer; thus, the forgery will be detected when a
+ certificate user uses the true public key of the claimed issuer to
+ verify the signature.
+
+
+
+
+
+
+Shirey Informational [Page 326]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ uniform resource identifier (URI)
+ (I) A type of formatted identifier (RFC 3986) that encapsulates
+ the name of an Internet object, and labels it with an
+ identification of the name space, thus producing a member of the
+ universal set of names in registered name spaces and of addresses
+ referring to registered protocols or name spaces.
+
+ Example: HTML uses URIs to identify the target of hyperlinks.
+
+ Usage: "A URI can be classified as a locator (see: URL), a name
+ (see: URN), or both. ... Instances of URIs from any given scheme
+ may have the characteristics of names or locators or both, often
+ depending on the persistence and care in the assignment of
+ identifiers by the naming authority, rather than on any quality of
+ the scheme." IDOCs SHOULD "use the general term 'URI' rather than
+ the more restrictive terms 'URL' and 'URN'." (RFC 3986)
+
+ $ uniform resource locator (URL)
+ (I) A URI that describes the access method and location of an
+ information resource object on the Internet. (See: Usage under
+ "URI". Compare: URN.)
+
+ Tutorial: The term URL "refers to the subset of URIs that, besides
+ identifying a resource, provide a means of locating the resource
+ by describing its primary access mechanism (e.g., its network
+ 'location')." (RFC 3986)
+
+ A URL provides explicit instructions on how to access the named
+ object. For example,
+ "ftp://bbnarchive.bbn.com/foo/bar/picture/cambridge.zip" is a URL.
+ The part before the colon specifies the access scheme or protocol,
+ and the part after the colon is interpreted according to that
+ access method. Usually, two slashes after the colon indicate the
+ host name of a server (written as a domain name). In an FTP or
+ HTTP URL, the host name is followed by the path name of a file on
+ the server. The last (optional) part of a URL may be either a
+ fragment identifier that indicates a position in the file, or a
+ query string.
+
+ $ uniform resource name (URN)
+ (I) A URI with the properties of a name. (See: Usage under "URI".
+ Compare: URL.)
+
+ Tutorial: The term URN "has been used historically to refer to
+ both URIs under the "urn" scheme (RFC 2141), which are required to
+ remain globally unique and persistent even when the resource
+ ceases to exist or becomes unavailable, and to any other URI with
+ the properties of a name." (RFC 3986)
+
+
+
+Shirey Informational [Page 327]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ untrusted
+ (I) See: secondary definition under "trust".
+
+ $ untrusted process
+ 1. (I) A system component that is not able to affect the state of
+ system security through incorrect or malicious operation. Example:
+ A component that has its operations confined by a security kernel.
+ (See: trusted process.)
+
+ 2. (I) A system component that (a) has not been evaluated or
+ examined for adherence to a specified security policy and,
+ therefore, (b) must be assumed to contain logic that might attempt
+ to circumvent system security.
+
+ $ UORA
+ (O) See: user-PIN ORA.
+
+ $ update
+ See: "certificate update" and "key update".
+
+ $ upgrade
+ (I) /data security/ Increase the classification level of data
+ without changing the information content of the data. (See:
+ classify, downgrade, regrade.)
+
+ $ URI
+ (I) See: uniform resource identifier.
+
+ $ URL
+ (I) See: uniform resource locator.
+
+ $ URN
+ (I) See: uniform resource name.
+
+ $ user
+ See: system user.
+
+ Usage: IDOCs that use this term SHOULD state a definition for it
+ because the term is used in many ways and could easily be
+ misunderstood.
+
+ $ user authentication service
+ (I) A security service that verifies the identity claimed by an
+ entity that attempts to access the system. (See: authentication,
+ user.)
+
+
+
+
+
+
+Shirey Informational [Page 328]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ User Datagram Protocol (UDP)
+ (I) An Internet Standard, Transport-Layer protocol (RFC 768) that
+ delivers a sequence of datagrams from one computer to another in a
+ computer network. (See: UPD flood.)
+
+ Tutorial: UDP assumes that IP is the underlying protocol. UDP
+ enables application programs to send transaction-oriented data to
+ other programs with minimal protocol mechanism. UDP does not
+ provide reliable delivery, flow control, sequencing, or other end-
+ to-end service guarantees that TCP does.
+
+ $ user identifier
+ (I) See: identifier.
+
+ $ user identity
+ (I) See: identity.
+
+ $ user PIN
+ (O) /MISSI/ One of two PINs that control access to the functions
+ and stored data of a FORTEZZA PC card. Knowledge of the user PIN
+ enables a card user to perform the FORTEZZA functions that are
+ intended for use by an end user. (See: PIN. Compare: SSO PIN.)
+
+ $ user-PIN ORA (UORA)
+ (O) /MISSI/ A MISSI organizational RA that operates in a mode in
+ which the ORA performs only the subset of card management
+ functions that are possible with knowledge of the user PIN for a
+ FORTEZZA PC card. (See: no-PIN ORA, SSO-PIN ORA.)
+
+ $ usurpation
+ (I) A circumstance or event that results in control of system
+ services or functions by an unauthorized entity. This type of
+ threat consequence can be caused by the following types of threat
+ actions: misappropriation, misuse. (See: access control.)
+
+ $ UTCTime
+ (N) The ASN.1 data type "UTCTime" contains a calendar date
+ (YYMMDD) and a time to a precision of either one minute (HHMM) or
+ one second (HHMMSS), where the time is either (a) Coordinated
+ Universal Time or (b) the local time followed by an offset that
+ enables Coordinated Universal Time to be calculated. (See:
+ Coordinated Universal Time. Compare: GeneralizedTime.)
+
+ Usage: If you care about centuries or millennia, you probably need
+ to use the GeneralizedTime data type instead of UTCTime.
+
+
+
+
+
+
+Shirey Informational [Page 329]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ v1 certificate
+ (N) An abbreviation that ambiguously refers to either an "X.509
+ public-key certificate in version 1 format" or an "X.509 attribute
+ certificate in version 1 format".
+
+ Deprecated Usage: IDOCs MAY use this term as an abbreviation of
+ "version 1 X.509 public-key certificate", but only after using the
+ full term at the first instance. Otherwise, the term is ambiguous,
+ because X.509 specifies both v1 public-key certificates and v1
+ attribute certificates. (See: X.509 attribute certificate, X.509
+ public-key certificate.)
+
+ $ v1 CRL
+ (N) Abbreviation of "X.509 CRL in version 1 format".
+
+ Usage: IDOCs MAY use this abbreviation, but SHOULD use the full
+ term at its first occurrence and define the abbreviation there.
+
+ $ v2 certificate
+ (N) Abbreviation of "X.509 public-key certificate in version 2
+ format".
+
+ Usage: IDOCs MAY use this abbreviation, but SHOULD use the full
+ term at its first occurrence and define the abbreviation there.
+
+ $ v2 CRL
+ (N) Abbreviation of "X.509 CRL in version 2 format".
+
+ Usage: IDOCs MAY use this abbreviation, but SHOULD use the full
+ term at its first occurrence and define the abbreviation there.
+
+ $ v3 certificate
+ (N) Abbreviation of "X.509 public-key certificate in version 3
+ format".
+
+ Usage: IDOCs MAY use this abbreviation, but SHOULD use the full
+ term at its first occurrence and define the abbreviation there.
+
+ $ valid certificate
+ 1. (I) A digital certificate that can be validated successfully.
+ (See: validate, verify.)
+
+ 2. (I) A digital certificate for which the binding of the data
+ items can be trusted.
+
+ $ valid signature
+ (D) Synonym for "verified signature".
+
+
+
+
+Shirey Informational [Page 330]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: IDOCs SHOULD NOT use this synonym. This Glossary
+ recommends saying "validate the certificate" and "verify the
+ signature"; therefore, it would be inconsistent to say that a
+ signature is "valid". (See: validate, verify.)
+
+ $ validate
+ 1. (I) Establish the soundness or correctness of a construct.
+ Example: certificate validation. (See: validate vs. verify.)
+
+ 2. (I) To officially approve something, sometimes in relation to a
+ standard. Example: NIST validates cryptographic modules for
+ conformance with [FP140].
+
+ $ validate vs. verify
+ Usage: To ensure consistency and align with ordinary English
+ usage, IDOCs SHOULD comply with the following two rules:
+ - Rule 1: Use "validate" when referring to a process intended to
+ establish the soundness or correctness of a construct (e.g.,
+ "certificate validation"). (See: validate.)
+ - Rule 2: Use "verify" when referring to a process intended to
+ test or prove the truth or accuracy of a fact or value (e.g.,
+ "authenticate"). (See: verify.)
+
+ Tutorial: The Internet security community sometimes uses these two
+ terms inconsistently, especially in a PKI context. Most often,
+ however, we say "verify the signature" but say "validate the
+ certificate". That is, we "verify" atomic truths but "validate"
+ data structures, relationships, and systems that are composed of
+ or depend on verified items. This usage has a basis in Latin:
+
+ The word "valid" derives from a Latin word that means "strong".
+ Thus, to validate means to check that a construct is sound. For
+ example, a certificate user validates a public-key certificate to
+ establish trust in the binding that the certificate asserts
+ between an identity and a key. This can include checking various
+ aspects of the certificate's construction, such as verifying the
+ digital signature on the certificate by performing calculations,
+ verifying that the current time is within the certificate's
+ validity period, and validating a certification path involving
+ additional certificates.
+
+ The word "verify" derives from a Latin word that means "true".
+ Thus, to verify means to check the truth of an assertion by
+ examining evidence or performing tests. For example, to verify an
+ identity, an authentication process examines identification
+ information that is presented or generated. To validate a
+ certificate, a certificate user verifies the digital signature on
+ the certificate by performing calculations, verifies that the
+
+
+
+Shirey Informational [Page 331]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ current time is within the certificate's validity period, and may
+ need to validate a certification path involving additional
+ certificates.
+
+ $ validation
+ (I) See: validate vs. verify.
+
+ $ validity period
+ (I) /PKI/ A data item in a digital certificate that specifies the
+ time period for which the binding between data items (especially
+ between the subject name and the public key value in a public-key
+ certificate) is valid, except if the certificate appears on a CRL
+ or the key appears on a CKL. (See: cryptoperiod, key lifetime.)
+
+ $ value-added network (VAN)
+ (I) A computer network or subnetwork (usually a commercial
+ enterprise) that transmits, receives, and stores EDI transactions
+ on behalf of its users.
+
+ Tutorial: A VAN may also provide additional services, ranging from
+ EDI format translation, to EDI-to-FAX conversion, to integrated
+ business systems.
+
+ $ VAN
+ (I) See: value-added network.
+
+ $ verification
+ 1. (I) /authentication/ The process of examining information to
+ establish the truth of a claimed fact or value. (See: validate vs.
+ verify, verify. Compare: authentication.)
+
+ 2. (N) /COMPUSEC/ The process of comparing two levels of system
+ specification for proper correspondence, such as comparing a
+ security model with a top-level specification, a top-level
+ specification with source code, or source code with object code.
+ [NCS04]
+
+ $ verified design
+ (O) See: TCSEC Class A1.
+
+ $ verify
+ (I) To test or prove the truth or accuracy of a fact or value.
+ (See: validate vs. verify, verification. Compare: authenticate.)
+
+ $ vet
+ (I) /verb/ To examine or evaluate thoroughly. (Compare:
+ authenticate, identity proofing, validate, verify.)
+
+
+
+
+Shirey Informational [Page 332]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ violation
+ See: security violation.
+
+ $ virtual private network (VPN)
+ (I) A restricted-use, logical (i.e., artificial or simulated)
+ computer network that is constructed from the system resources of
+ a relatively public, physical (i.e., real) network (e.g., the
+ Internet), often by using encryption (located at hosts or
+ gateways), and often by tunneling links of the virtual network
+ across the real network. (See: tunnel.)
+
+ Tutorial: A VPN is generally less expensive to build and operate
+ than a dedicated real network, because the virtual network shares
+ the cost of system resources with other users of the underlying
+ real network. For example, if a corporation has LANs at several
+ different sites, each connected to the Internet by a firewall, the
+ corporation could create a VPN by using encrypted tunnels to
+ connect from firewall to firewall across the Internet.
+
+ $ virus
+ (I) A self-replicating (and usually hidden) section of computer
+ software (usually malicious logic) that propagates by infecting --
+ i.e., inserting a copy of itself into and becoming part of --
+ another program. A virus cannot run by itself; it requires that
+ its host program be run to make the virus active.
+
+ $ Visa Cash
+ (O) A smartcard-based electronic money system that incorporates
+ cryptography and can be used to make payments via the Internet.
+ (See: IOTP.)
+
+ $ volatile media
+ (I) Storage media that require an external power supply to
+ maintain stored information. (Compare: non-volatile media,
+ permanent storage.)
+
+ $ VPN
+ (I) See: virtual private network.
+
+ $ vulnerability
+ (I) A flaw or weakness in a system's design, implementation, or
+ operation and management that could be exploited to violate the
+ system's security policy. (See: harden.)
+
+ Tutorial: A system can have three types of vulnerabilities: (a)
+ vulnerabilities in design or specification; (b) vulnerabilities in
+ implementation; and (c) vulnerabilities in operation and
+ management. Most systems have one or more vulnerabilities, but
+
+
+
+Shirey Informational [Page 333]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ this does not mean that the systems are too flawed to use. Not
+ every threat results in an attack, and not every attack succeeds.
+ Success depends on the degree of vulnerability, the strength of
+ attacks, and the effectiveness of any countermeasures in use. If
+ the attacks needed to exploit a vulnerability are very difficult
+ to carry out, then the vulnerability may be tolerable. If the
+ perceived benefit to an attacker is small, then even an easily
+ exploited vulnerability may be tolerable. However, if the attacks
+ are well understood and easily made, and if the vulnerable system
+ is employed by a wide range of users, then it is likely that there
+ will be enough motivation for someone to launch an attack.
+
+ $ W3
+ (D) Synonym for WWW.
+
+ Deprecated Abbreviation: This abbreviation could be confused with
+ W3C; use "WWW" instead.
+
+ $ W3C
+ (N) See: World Wide Web Consortium.
+
+ $ war dialer
+ (I) /slang/ A computer program that automatically dials a series
+ of telephone numbers to find lines connected to computer systems,
+ and catalogs those numbers so that a cracker can try to break the
+ systems.
+
+ Deprecated Usage: IDOCs that use this term SHOULD state a
+ definition for it because the term could confuse international
+ readers.
+
+ $ Wassenaar Arrangement
+ (N) The Wassenaar Arrangement on Export Controls for Conventional
+ Arms and Dual-Use Goods and Technologies is a global, multilateral
+ agreement approved by 33 countries in July 1996 to contribute to
+ regional and international security and stability, by promoting
+ information exchange concerning, and greater responsibility in,
+ transfers of arms and dual-use items, thus preventing
+ destabilizing accumulations. (See: International Traffic in Arms
+ Regulations.)
+
+ Tutorial: The Arrangement began operations in September 1996 with
+ headquarters in Vienna. The participating countries were
+ Argentina, Australia, Austria, Belgium, Bulgaria, Canada, Czech
+ Republic, Denmark, Finland, France, Germany, Greece, Hungary,
+ Ireland, Italy, Japan, Luxembourg, Netherlands, New Zealand,
+ Norway, Poland, Portugal, Republic of Korea, Romania, Russian
+
+
+
+
+Shirey Informational [Page 334]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Federation, Slovak Republic, Spain, Sweden, Switzerland, Turkey,
+ Ukraine, United Kingdom, and United States.
+
+ Participating countries seek through their national policies to
+ ensure that transfers do not contribute to the development or
+ enhancement of military capabilities that undermine the goals of
+ the arrangement, and are not diverted to support such
+ capabilities. The countries maintain effective export controls for
+ items on the agreed lists, which are reviewed periodically to
+ account for technological developments and experience gained.
+ Through transparency and exchange of views and information,
+ suppliers of arms and dual-use items can develop common
+ understandings of the risks associated with their transfer and
+ assess the scope for coordinating national control policies to
+ combat these risks. Members provide semi-annual notification of
+ arms transfers, covering seven categories derived from the UN
+ Register of Conventional Arms. Members also report transfers or
+ denials of transfers of certain controlled dual-use items.
+ However, the decision to transfer or deny transfer of any item is
+ the sole responsibility of each participating country. All
+ measures undertaken with respect to the arrangement are in
+ accordance with national legislation and policies and are
+ implemented on the basis of national discretion.
+
+ $ watermarking
+ See: digital watermarking.
+
+ $ weak key
+ (I) In the context of a particular cryptographic algorithm, a key
+ value that provides poor security. (See: strong.)
+
+ Example: The DEA has four "weak keys" [Schn] for which encryption
+ produces the same result as decryption. It also has ten pairs of
+ "semi-weak keys" [Schn] (a.k.a. "dual keys" [FP074]) for which
+ encryption with one key in the pair produces the same result as
+ decryption with the other key.
+
+ $ web, Web
+ 1. (I) /not capitalized/ IDOCs SHOULD NOT capitalize "web" when
+ using the term (usually as an adjective) to refer generically to
+ technology -- such as web browsers, web servers, HTTP, and HTML --
+ that is used in the Web or similar networks.
+
+ 2. (I) /capitalized/ IDOCs SHOULD capitalize "Web" when using the
+ term (as either a noun or an adjective) to refer specifically to
+ the World Wide Web. (Similarly, see: internet.)
+
+
+
+
+
+Shirey Informational [Page 335]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: IDOCs SHOULD NOT use "web" or "Web" in a way that might
+ confuse these definitions with the PGP "web of trust". When using
+ Web as an abbreviation for "World Wide Web", IDOCs SHOULD fully
+ spell out the term at the first instance of usage.
+
+ $ web of trust
+ (D) /PGP/ A PKI architecture in which each certificate user
+ defines their own trust anchor(s) by depending on personal
+ relationships. (See: trust anchor. Compare: hierarchical PKI, mesh
+ PKI.)
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term except with
+ reference to PGP. This term mixes concepts in potentially
+ misleading ways; e.g., this architecture does not depend on World
+ Wide Web technology. Instead of this term, IDOCs MAY use "trust-
+ file PKI". (See: web, Web).
+
+ Tutorial: This type of architecture does not usually include
+ public repositories of certificates. Instead, each certificate
+ user builds their own, private repository of trusted public keys
+ by making personal judgments about being able to trust certain
+ people to be holding properly certified keys of other people. It
+ is this set of person-to-person relationships from which the
+ architecture gets its name.
+
+ $ web server
+ (I) A software process that runs on a host computer connected to a
+ network and responds to HTTP requests made by client web browsers.
+
+ $ WEP
+ (N) See: Wired Equivalency Protocol.
+
+ $ Wired Equivalent Privacy (WEP)
+ (N) A cryptographic protocol that is defined in the IEEE 802.11
+ standard and encapsulates the packets on wireless LANs. Usage:
+ a.k.a. "Wired Equivalency Protocol".
+
+ Tutorial: The WEP design, which uses RC4 to encrypt both the plain
+ text and a CRC, has been shown to be flawed in multiple ways; and
+ it also has often suffered from flawed implementation and
+ management.
+
+ $ wiretapping
+ (I) An attack that intercepts and accesses information contained
+ in a data flow in a communication system. (See: active
+ wiretapping, end-to-end encryption, passive wiretapping, secondary
+ definition under "interception".)
+
+
+
+
+Shirey Informational [Page 336]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Usage: Although the term originally referred to making a
+ mechanical connection to an electrical conductor that links two
+ nodes, it is now used to refer to accessing information from any
+ sort of medium used for a link or even from a node, such as a
+ gateway or subnetwork switch.
+
+ Tutorial: Wiretapping can be characterized according to intent:
+ - "Active wiretapping" attempts to alter the data or otherwise
+ affect the flow.
+ - "Passive wiretapping" only attempts to observe the data flow
+ and gain knowledge of information contained in it.
+
+ $ work factor
+ 1a. (I) /COMPUSEC/ The estimated amount of effort or time that can
+ be expected to be expended by a potential intruder to penetrate a
+ system, or defeat a particular countermeasure, when using
+ specified amounts of expertise and resources. (See: brute force,
+ impossible, strength.)
+
+ 1b. (I) /cryptography/ The estimated amount of computing power and
+ time needed to break a cryptographic system. (See: brute force,
+ impossible, strength.)
+
+ $ World Wide Web ("the Web", WWW)
+ (N) The global, hypermedia-based collection of information and
+ services that is available on Internet servers and is accessed by
+ browsers using Hypertext Transfer Protocol and other information
+ retrieval mechanisms. (See: web vs. Web, [R2084].)
+
+ $ World Wide Web Consortium (W3C)
+ (N) Created in October 1994 to develop and standardize protocols
+ to promote the evolution and interoperability of the Web, and now
+ consisting of hundreds of member organizations (commercial firms,
+ governmental agencies, schools, and others).
+
+ Tutorial: W3C Recommendations are developed through a process
+ similar to that of the standards published by other organizations,
+ such as the IETF. The W3 Recommendation Track (i.e., standards
+ track) has four levels of increasing maturity: Working, Candidate
+ Recommendation, Proposed Recommendation, and W3C Recommendation.
+ W3C Recommendations are similar to the standards published by
+ other organizations. (Compare: Internet Standard, ISO.)
+
+ $ worm
+ (I) A computer program that can run independently, can propagate a
+ complete working version of itself onto other hosts on a network,
+ and may consume system resources destructively. (See: mobile code,
+ Morris Worm, virus.)
+
+
+
+Shirey Informational [Page 337]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ $ wrap
+ 1. (N) To use cryptography to provide data confidentiality service
+ for keying material. (See: encrypt, wrapping algorithm, wrapping
+ key. Compare: seal, shroud.)
+
+ 2. (D) To use cryptography to provide data confidentiality service
+ for data in general.
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term with definition 2
+ because that duplicates the meaning of the more widely understood
+ "encrypt".
+
+ $ wrapping algorithm
+ (N) An encryption algorithm that is specifically intended for use
+ in encrypting keys. (See: KEK, wrap.)
+
+ $ wrapping key
+ (N) Synonym for "KEK". (See: encrypt. Compare: seal, shroud.)
+
+ $ write
+ (I) /security model/ A system operation that causes a flow of
+ information from a subject to an object. (See: access mode.
+ Compare: read.)
+
+ $ WWW
+ (I) See: World Wide Web.
+
+ $ X.400
+ (N) An ITU-T Recommendation [X400] that is one part of a joint
+ ITU-T/ISO multi-part standard (X.400-X.421) that defines the
+ Message Handling Systems. (The ISO equivalent is IS 10021, parts
+ 1-7.) (See: Message Handling Systems.)
+
+ $ X.500
+ (N) An ITU-T Recommendation [X500] that is one part of a joint
+ ITU-T/ISO multi-part standard (X.500-X.525) that defines the X.500
+ Directory, a conceptual collection of systems that provide
+ distributed directory capabilities for OSI entities, processes,
+ applications, and services. (The ISO equivalent is IS 9594-1 and
+ related standards, IS 9594-x.) (See: directory vs. Directory,
+ X.509.)
+
+ Tutorial: The X.500 Directory is structured as a tree (the
+ Directory Information Tree), and information is stored in
+ directory entries. Each entry is a collection of information about
+ one object, and each object has a DN. A directory entry is
+ composed of attributes, each with a type and one or more values.
+ For example, if a PKI uses the Directory to distribute
+
+
+
+Shirey Informational [Page 338]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ certificates, then the X.509 public-key certificate of an end user
+ is normally stored as a value of an attribute of type
+ "userCertificate" in the Directory entry that has the DN that is
+ the subject of the certificate.
+
+ $ X.509
+ (N) An ITU-T Recommendation [X509] that defines a framework to
+ provide and support data origin authentication and peer entity
+ authentication, including formats for X.509 public-key
+ certificates, X.509 attribute certificates, and X.509 CRLs. (The
+ ISO equivalent is IS 9498-4.) (See: X.500.)
+
+ Tutorial: X.509 describes two "levels" of authentication: "simple
+ authentication" and "strong authentication". It recommends, "While
+ simple authentication offers some limited protection against
+ unauthorized access, only strong authentication should be used as
+ the basis for providing secure services."
+
+ $ X.509 attribute certificate
+ (N) An attribute certificate in the version 1 (v1) format defined
+ by X.509. (The v1 designation for an X.509 attribute certificate
+ is disjoint from the v1 designation for an X.509 public-key
+ certificate, and from the v1 designation for an X.509 CRL.)
+
+ Tutorial: An X.509 attribute certificate has a "subject" field,
+ but the attribute certificate is a separate data structure from
+ that subject's public-key certificate. A subject may have multiple
+ attribute certificates associated with each of its public-key
+ certificates, and an attribute certificate may be issued by a
+ different CA than the one that issued the associated public-key
+ certificate.
+
+ An X.509 attribute certificate contains a sequence of data items
+ and has a digital signature that is computed from that sequence.
+ Besides the signature, an attribute certificate contains items 1
+ through 9 listed below:
+
+ 1. version Identifies v1.
+ 2. subject Is one of the following:
+ 2a. baseCertificateID Issuer and serial number of an
+ X.509 public-key certificate.
+ 2b. subjectName DN of the subject.
+ 3. issuer DN of the issuer (the CA who signed).
+ 4. signature OID of algorithm that signed the cert.
+ 5. serialNumber Certificate serial number;
+ an integer assigned by the issuer.
+ 6. attCertValidityPeriod Validity period; a pair of UTCTime
+ values: "not before" and "not after".
+
+
+
+Shirey Informational [Page 339]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 7. attributes Sequence of attributes describing the
+ subject.
+ 8. issuerUniqueId Optional, when a DN is not sufficient.
+ 9. extensions Optional.
+
+ $ X.509 certificate
+ (N) Synonym for "X.509 public-key certificate".
+
+ Usage: IDOCs MAY use this term as an abbreviation of "X.509
+ public-key certificate", but only after using the full term at the
+ first instance. Otherwise, the term is ambiguous, because X.509
+ specifies both public-key certificates and attribute certificates.
+ (See: X.509 attribute certificate, X.509 public-key certificate.)
+
+ Deprecated Usage: IDOCs SHOULD NOT use this term as an
+ abbreviation of "X.509 attribute certificate", because the term is
+ much more commonly used to mean "X.509 public-key certificate"
+ and, therefore, is likely to be misunderstood.
+
+ $ X.509 certificate revocation list (CRL)
+ (N) A CRL in one of the formats defined by X.509 -- version 1 (v1)
+ or version 2 (v2). (The v1 and v2 designations for an X.509 CRL
+ are disjoint from the v1 and v2 designations for an X.509 public-
+ key certificate, and from the v1 designation for an X.509
+ attribute certificate.) (See: certificate revocation.)
+
+ Usage: IDOCs SHOULD NOT refer to an X.509 CRL as a digital
+ certificate; however, note that an X.509 CRL does meet this
+ Glossary's definition of "digital certificate". That is, like a
+ digital certificate, an X.509 CRL makes an assertion and is signed
+ by a CA. But instead of binding a key or other attributes to a
+ subject, an X.509 CRL asserts that certain previously issued,
+ X.509 certificates have been revoked.
+
+ Tutorial: An X.509 CRL contains a sequence of data items and has a
+ digital signature computed on that sequence. Besides the
+ signature, both v1 and v2 contain items 2 through 6b listed below.
+ Version 2 contains item 1 and may optionally contain 6c and 7.
+
+ 1. version Optional. If present, identifies v2.
+ 2. signature OID of the algorithm that signed CRL.
+ 3. issuer DN of the issuer (the CA who signed).
+ 4. thisUpdate A UTCTime value.
+ 5. nextUpdate A UTCTime value.
+ 6. revokedCertificates 3-tuples of 6a, 6b, and (optional) 6c:
+ 6a. userCertificate A certificate's serial number.
+ 6b. revocationDate UTCTime value for the revocation date.
+ 6c. crlEntryExtensions Optional.
+
+
+
+Shirey Informational [Page 340]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ 7. crlExtensions Optional.
+
+ $ X.509 public-key certificate
+ (N) A public-key certificate in one of the formats defined by
+ X.509 -- version 1 (v1), version 2 (v2), or version 3 (v3). (The
+ v1 and v2 designations for an X.509 public-key certificate are
+ disjoint from the v1 and v2 designations for an X.509 CRL, and
+ from the v1 designation for an X.509 attribute certificate.)
+
+ Tutorial: An X.509 public-key certificate contains a sequence of
+ data items and has a digital signature computed on that sequence.
+ Besides the signature, all three versions contain items 1 through
+ 7 listed below. Only v2 and v3 certificates may also contain items
+ 8 and 9, and only v3 may contain item 10.
+
+ 1. version Identifies v1, v2, or v3.
+ 2. serialNumber Certificate serial number;
+ an integer assigned by the issuer.
+ 3. signature OID of algorithm that was used to
+ sign the certificate.
+ 4. issuer DN of the issuer (the CA who signed).
+ 5. validity Validity period; a pair of UTCTime
+ values: "not before" and "not after".
+ 6. subject DN of entity who owns the public key.
+ 7. subjectPublicKeyInfo Public key value and algorithm OID.
+ 8. issuerUniqueIdentifier Defined for v2, v3; optional.
+ 9. subjectUniqueIdentifier Defined for v2, v2; optional.
+ 10. extensions Defined only for v3; optional.
+
+ $ X9
+ (N) See: "Accredited Standards Committee X9" under "ANSI".
+
+ $ XML
+ (N) See: Extensible Markup Language.
+
+ $ XML-Signature.
+ (N) A W3C Recommendation (i.e., approved standard) that specifies
+ XML syntax and processing rules for creating and representing
+ digital signatures (based on asymmetric cryptography) that can be
+ applied to any digital content (i.e., any data object) including
+ other XML material.
+
+ $ Yellow Book
+ (D) /slang/ Synonym for "Computer Security Requirements: Guidance
+ for Applying the [U.S.] Department of Defense Trusted Computer
+ System Evaluation Criteria in Specific Environments" [CSC3] (See:
+ "first law" under "Courtney's laws".)
+
+
+
+
+Shirey Informational [Page 341]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ Deprecated Term: IDOCs SHOULD NOT use this term as a synonym for
+ that or any other document. Instead, use the full proper name of
+ the document or, in subsequent references, a conventional
+ abbreviation. (See: Deprecated Usage under "Green Book", Rainbow
+ Series.)
+
+ $ zero-knowledge proof
+ (I) /cryptography/ A proof-of-possession protocol whereby a system
+ entity can prove possession of some information to another entity,
+ without revealing any of that information. (See: proof-of-
+ possession protocol.)
+
+ $ zeroize
+ 1. (I) Synonym for "erase". (See: sanitize.) Usage: Particularly
+ with regard to erasing keys that are stored in a cryptographic
+ module.
+
+ 2. (O) Erase electronically stored data by altering the contents
+ of the data storage so as to prevent the recovery of the data.
+ [FP140]
+
+ 3. (O) "To remove or eliminate the key from a cryptoequipment or
+ fill device." [C4009]
+
+ Usage: The phrase "zeroize the device" normally is used to mean
+ erasing all keys stored in the device, but sometimes means erasing
+ all keying material in the device, or all cryptographic
+ information in the device, or even all sensitive information in
+ the device.
+
+ $ zombie
+ (I) /slang/ An Internet host computer that has been
+ surreptitiously penetrated by an intruder that installed malicious
+ daemon software to cause the host to operate as an accomplice in
+ attacking other hosts, particularly in distributed attacks that
+ attempt denial of service through flooding.
+
+ Deprecated Usage: Other cultures likely use different metaphorical
+ terms (such as "robot") for this concept, and some use this term
+ for different concepts. Therefore, to avoid international
+ misunderstanding, IDOCs SHOULD NOT use this term. Instead, use
+ "compromised, coopted computer" or other explicitly descriptive
+ terminology. (See: Deprecated Usage under "Green Book".)
+
+ $ zone of control
+ (O) /EMSEC/ Synonym for "inspectable space". [C4009] (See:
+ TEMPEST.)
+
+
+
+
+Shirey Informational [Page 342]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+5. Security Considerations
+
+ This document mainly defines security terms and recommends how to use
+ them. It also provides limited tutorial information about security
+ aspects of Internet protocols, but it does not describe in detail the
+ vulnerabilities of, or threats to, specific protocols and does not
+ definitively describe mechanisms that protect specific protocols.
+
+6. Normative Reference
+
+ [R2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+7. Informative References
+
+ This Glossary focuses on the Internet Standards Process. Therefore,
+ this set of informative references emphasizes international,
+ governmental, and industrial standards documents. Some RFCs that are
+ especially relevant to Internet security are mentioned in Glossary
+ entries in square brackets (e.g., "[R1457]" in the entry for
+ "security label") and are listed here; some other RFCs are mentioned
+ in parentheses (e.g., "(RFC 959)" in the entry for "File Transport
+ Protocol") but are not listed here.
+
+ [A1523] American National Standards Institute, "American National
+ Standard Telecom Glossary", ANSI T1.523-2001.
+
+ [A3092] ---, "American National Standard Data Encryption Algorithm",
+ ANSI X3.92-1981, 30 December 1980.
+
+ [A9009] ---, "Financial Institution Message Authentication
+ (Wholesale)", ANSI X9.9-1986, 15 August 1986.
+
+ [A9017] ---, "Financial Institution Key Management (Wholesale)",
+ X9.17, 4 April 1985. (Defines procedures for manual and
+ automated management of keying material and uses DES to
+ provide key management for a variety of operational
+ environments.)
+
+ [A9042] ---, "Public key Cryptography for the Financial Service
+ Industry: Agreement of Symmetric Keys Using Diffie-Hellman
+ and MQV Algorithms", X9.42, 29 January 1999. (See: Diffie-
+ Hellman-Merkle.)
+
+ [A9052] ---, "Triple Data Encryption Algorithm Modes of Operation",
+ X9.52-1998, ANSI approval 9 November 1998.
+
+
+
+
+
+Shirey Informational [Page 343]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [A9062] ---, "Public Key Cryptography for the Financial Services
+ Industry: The Elliptic Curve Digital Signature Algorithm
+ (ECDSA)", X9.62-1998, ANSI approval 7 January 1999.
+
+ [A9063] ---, "Public Key Cryptography for the Financial Services
+ Industry: Key Agreement and Key Transport Using Elliptic
+ Curve Cryptography", X9.63-2001.
+
+ [ACM] Association for Computing Machinery, "Communications of the
+ ACM", July 1998 issue with: M. Yeung, "Digital
+ Watermarking"; N. Memom and P. Wong, "Protecting Digital
+ Media Content"; and S. Craver, B.-L. Yeo, and M. Yeung,
+ "Technical Trials and Legal Tribulations".
+
+ [Ande] Anderson, J., "Computer Security Technology Planning Study",
+ ESD-TR-73-51, Vols. I and II, USAF Electronics Systems Div.,
+ Bedford, MA, October 1972. (Available as AD-758206/772806,
+ National Technical Information Service, Springfield, VA.)
+
+ [ANSI] American National Standards Institute, "Role Based Access
+ Control", Secretariat, Information Technology Industry
+ Council, BSR INCITS 359, DRAFT, 10 November 2003.
+
+ [Army] U.S. Army Corps of Engineers, "Electromagnetic Pulse (EMP)
+ and Tempest Protection for Facilities", EP 1110-3-2, 31
+ December 1990.
+
+ [B1822] Bolt Baranek and Newman Inc., "Appendix H: Interfacing a
+ Host to a Private Line Interface", in "Specifications for
+ the Interconnection of a Host and an IMP", BBN Report No.
+ 1822, revised, December 1983.
+
+ [B4799] ---, "A History of the Arpanet: The First Decade", BBN
+ Report No. 4799, April 1981.
+
+ [Bell] Bell, D. and L. LaPadula, "Secure Computer Systems:
+ Mathematical Foundations and Model", M74-244, The MITRE
+ Corporation, Bedford, MA, May 1973. (Available as AD-771543,
+ National Technical Information Service, Springfield, VA.)
+
+ [Biba] K. Biba, "Integrity Considerations for Secure Computer
+ Systems", ESD-TR-76-372, USAF Electronic Systems Division,
+ Bedford, MA, April 1977.
+
+ [BN89] Brewer, D. and M. Nash, "The Chinese wall security policy",
+ in "Proceedings of IEEE Symposium on Security and Privacy",
+ May 1989, pp. 205-214.
+
+
+
+
+Shirey Informational [Page 344]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [BS7799] British Standards Institution, "Information Security
+ Management, Part 1: Code of Practice for Information
+ Security Management", BS 7799-1:1999, 15 May 1999.
+
+ ---, "Information Security Management, Part 2: Specification
+ for Information Security Management Systems", BS 7799-
+ 2:1999, 15 May 1999.
+
+ [C4009] Committee on National Security Systems (U.S. Government),
+ "National Information Assurance (IA) Glossary", CNSS
+ Instruction No. 4009, revised June 2006.
+
+ [CCIB] Common Criteria Implementation Board, "Common Criteria for
+ Information Technology Security Evaluation, Part 1:
+ Introduction and General Model", version 2.0, CCIB-98-026,
+ May 1998.
+
+ [Chau] D. Chaum, "Untraceable Electronic Mail, Return Addresses,
+ and Digital Pseudonyms", in "Communications of the ACM",
+ vol. 24, no. 2, February 1981, pp. 84-88.
+
+ [Cheh] Cheheyl, M., Gasser, M., Huff, G., and J. Millen, "Verifying
+ Security", in "ACM Computing Surveys", vol. 13, no. 3,
+ September 1981, pp. 279-339.
+
+ [Chris] Chrissis, M. et al, 1993. "SW-CMM [Capability Maturity Model
+ for Software Version", Release 3.0, Software Engineering
+ Institute, Carnegie Mellon University, August 1996.
+
+ [CIPSO] Trusted Systems Interoperability Working Group, "Common IP
+ Security Option", version 2.3, 9 March 1993.
+
+ [Clark] Clark, D. and D. Wilson, "A Comparison of Commercial and
+ Military computer Security Policies", in "Proceedings of the
+ IEEE Symposium on Security and Privacy", April 1987, pp.
+ 184-194.
+
+ [Cons] NSA, "Consistency Instruction Manual for Development of U.S.
+ Government Protection Profiles for Use in Basic Robustness
+ Environments", Release 2.0, 1 March 2004
+
+ [CORBA] Object Management Group, Inc., "CORBAservices: Common Object
+ Service Specification", December 1998.
+
+ [CSC1] U.S. DoD Computer Security Center, "Department of Defense
+ Trusted Computer System Evaluation Criteria", CSC-STD-001-
+ 83, 15 August 1983. (Superseded by [DoD1].)
+
+
+
+
+Shirey Informational [Page 345]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [CSC2] ---, "Department of Defense Password Management Guideline",
+ CSC-STD-002-85, 12 April 1985.
+
+ [CSC3] ---, "Computer Security Requirements: Guidance for Applying
+ the Department of Defense Trusted Computer System Evaluation
+ Criteria in Specific Environments", CSC-STD-003-85, 25 June
+ 1985.
+
+ [CSOR] U.S. Department of Commerce, "General Procedures for
+ Registering Computer Security Objects", National Institute
+ of Standards Interagency Report 5308, December 1993.
+
+ [Daem] Daemen, J. and V. Rijmen, "Rijndael, the advanced encryption
+ standard", in "Dr. Dobb's Journal", vol. 26, no. 3, March
+ 2001, pp. 137-139.
+
+ [DC6/9] Director of Central Intelligence, "Physical Security
+ Standards for Sensitive Compartmented Information
+ Facilities", DCI Directive 6/9, 18 November 2002.
+
+ [Denn] Denning, D., "A Lattice Model of Secure Information Flow",
+ in "Communications of the ACM", vol. 19, no. 5, May 1976,
+ pp. 236-243.
+
+ [Denns] Denning, D. and P. Denning, "Data Security", in "ACM
+ Computing Surveys", vol. 11, no. 3, September 1979, pp. 227-
+ 249.
+
+ [DH76] Diffie, W. and M. Hellman, "New Directions in Cryptography",
+ in "IEEE Transactions on Information Theory", vol. IT-22,
+ no. 6, November 1976, pp. 644-654. (See: Diffie-Hellman-
+ Merkle.)
+
+ [DoD1] U.S. DoD, "Department of Defense Trusted Computer System
+ Evaluation Criteria", DoD 5200.28-STD, 26 December 1985.
+ (Supersedes [CSC1].) (Superseded by DoD Directive 8500.1.)
+
+ [DoD4] ---, "NSA Key Recovery Assessment Criteria", 8 June 1998.
+
+ [DoD5] ---, Directive 5200.1, "DoD Information Security Program",
+ 13 December 1996.
+
+ [DoD6] ---, "Department of Defense Technical Architecture Framework
+ for Information Management, Volume 6: Department of Defense
+ (DoD) Goal Security Architecture", Defense Information
+ Systems Agency, Center for Standards, version 3.0, 15 April
+ 1996.
+
+
+
+
+Shirey Informational [Page 346]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [DoD7] ---, "X.509 Certificate Policy for the United States
+ Department of Defense", version 7, 18 December 2002.
+ (Superseded by [DoD9].)
+
+ [DoD9] ---, "X.509 Certificate Policy for the United States
+ Department of Defense", version 9, 9 February 2005.
+
+ [DoD10] ---, "DoD Architecture Framework, Version 1: Deskbook", 9
+ February 2004.
+
+ [DSG] American Bar Association, "Digital Signature Guidelines:
+ Legal Infrastructure for Certification Authorities and
+ Secure Electronic Commerce", Chicago, IL, 1 August 1996.
+ (See: [PAG].)
+
+ [ElGa] El Gamal, T., "A Public-Key Cryptosystem and a Signature
+ Scheme Based on Discrete Logarithms", in "IEEE Transactions
+ on Information Theory", vol. IT-31, no. 4, 1985, pp. 469-
+ 472.
+
+ [EMV1] Europay International S.A., MasterCard International
+ Incorporated, and Visa International Service Association,
+ "EMV '96 Integrated Circuit Card Specification for Payment
+ Systems", version 3.1.1, 31 May 1998.
+
+ [EMV2] ---, "EMV '96 Integrated Circuit Card Terminal Specification
+ for Payment Systems", version 3.1.1, 31 May 1998.
+
+ [EMV3] ---, "EMV '96 Integrated Circuit Card Application
+ Specification for Payment Systems", version 3.1.1, 31 May
+ 1998.
+
+ [F1037] U.S. General Services Administration, "Glossary of
+ Telecommunications Terms", FED STD 1037C, 7 August 1996.
+
+ [For94] Ford, W., "Computer Communications Security: Principles,
+ Standard Protocols and Techniques", ISBN 0-13-799453-2,
+ 1994.
+
+ [For97] --- and M. Baum, "Secure Electronic Commerce: Building the
+ Infrastructure for Digital Signatures and Encryption", ISBN
+ 0-13-476342-4, 1994.
+
+ [FP001] U.S. Department of Commerce, "Code for Information
+ Interchange", Federal Information Processing Standards
+ Publication (FIPS PUB) 1, 1 November 1968.
+
+
+
+
+
+Shirey Informational [Page 347]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [FP031] ---, "Guidelines for Automatic Data Processing Physical
+ Security and Risk Management", FIPS PUB 31, June 1974.
+
+ [FP039] ---, "Glossary for Computer Systems Security", FIPS PUB 39,
+ 15 February 1976.
+
+ [FP041] ---, "Computer Security Guidelines for Implementing the
+ Privacy Act of 1974", FIPS PUB 41, 30 May 1975.
+
+ [FP046] ---, "Data Encryption Standard (DES)", FIPS PUB 46-3, 25
+ October 1999.
+
+ [FP074] ---, "Data Encryption Standard (DES)", FIPS PUB 46-3, 25
+ October 1999.
+
+ [FP081] ---, "DES Modes of Operation", FIPS PUB 81, 2 December 1980.
+
+ [FP087] ---, "Guidelines for ADP Contingency Planning", FIPS PUB 87,
+ 27 March 1981.
+
+ [FP102] ---, "Guideline for Computer Security Certification and
+ Accreditation", FIPS PUB 102, 27 September 1983.
+
+ [FP113] ---, "Computer Data Authentication", FIPS PUB 113, 30 May
+ 1985.
+
+ [FP140] ---, "Security Requirements for Cryptographic Modules", FIPS
+ PUB 140-2, 25 May 2001; with change notice 4, 3 December
+ 2002.
+
+ [FP151] ---, "Portable Operating System Interface (POSIX) -- System
+ Application Program Interface [C Language]", FIPS PUB 151-2,
+ 12 May 1993
+
+ [FP180] ---, "Secure Hash Standard", FIPS PUB 180-2, August 2000;
+ with change notice 1, 25 February 2004.
+
+ [FP185] ---, "Escrowed Encryption Standard", FIPS PUB 185, 9
+ February 1994.
+
+ [FP186] ---, "Digital Signature Standard (DSS)", FIPS PUB 186-2, 27
+ June 2000; with change notice 1, 5 October 2001.
+
+ [FP188] ---, "Standard Security Label for Information Transfer",
+ FIPS PUB 188, 6 September 1994.
+
+ [FP191] ---, "Guideline for the Analysis of Local Area Network
+ Security", FIPS PUB 191, 9 November 1994.
+
+
+
+Shirey Informational [Page 348]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [FP197] ---, "Advanced Encryption Standard", FIPS PUB 197, 26
+ November 2001.
+
+ [FP199] ---, "Standards for Security Categorization of Federal
+ Information and Information Systems ", FIPS PUB 199,
+ December 2003.
+
+ [FPKI] ---, "Public Key Infrastructure (PKI) Technical
+ Specifications: Part A -- Technical Concept of Operations",
+ NIST, 4 September 1998.
+
+ [Gass] Gasser, M., "Building a Secure Computer System", Van
+ Nostrand Reinhold Company, New York, 1988, ISBN 0-442-
+ 23022-2.
+
+ [Gray] Gray, J. and A. Reuter, "Transaction Processing: Concepts
+ and Techniques", Morgan Kaufmann Publishers, Inc., 1993.
+
+ [Hafn] Hafner, K. and M. Lyon, "Where Wizards Stay Up Late: The
+ Origins of the Internet", Simon & Schuster, New York, 1996.
+
+ [Huff] Huff, G., "Trusted Computer Systems -- Glossary", MTR 8201,
+ The MITRE Corporation, March 1981.
+
+ [I3166] International Standards Organization, "Codes for the
+ Representation of Names of Countries and Their Subdivisions,
+ Part 1: Country Codes", ISO 3166-1:1997.
+
+ ---, "Codes for the Representation of Names of Countries and
+ Their Subdivisions, Part 2: Country Subdivision Codes",
+ ISO/DIS 3166-2.
+
+ ---, "Codes for the Representation of Names of Countries and
+ Their Subdivisions, Part 3: Codes for Formerly Used Names of
+ Countries", ISO/DIS 3166-3.
+
+ [I7498-1] ---, "Information Processing Systems -- Open Systems
+ Interconnection Reference Model, [Part 1:] Basic Reference
+ Model", ISO/IEC 7498-1. (Equivalent to ITU-T Recommendation
+ X.200.)
+
+ [I7498-2] ---, "Information Processing Systems -- Open Systems
+ Interconnection Reference Model, Part 2: Security
+ Architecture", ISO/IEC 7499-2.
+
+ [I7498-4] ---, "Information Processing Systems -- Open Systems
+ Interconnection Reference Model, Part 4: Management
+ Framework", ISO/IEC 7498-4.
+
+
+
+Shirey Informational [Page 349]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [I7812] ---, "Identification cards -- Identification of Issuers,
+ Part 1: Numbering System", ISO/IEC 7812-1:1993
+
+ ---, "Identification cards -- Identification of Issuers,
+ Part 2: Application and Registration Procedures", ISO/IEC
+ 7812-2:1993.
+
+ [I8073] ---, "Information Processing Systems -- Open Systems
+ Interconnection, Transport Protocol Specification", ISO IS
+ 8073.
+
+ [I8327] ---, "Information Processing Systems -- Open Systems
+ Interconnection, Session Protocol Specification", ISO IS
+ 8327.
+
+ [I8473] ---, "Information Processing Systems -- Open Systems
+ Interconnection, Protocol for Providing the Connectionless
+ Network Service", ISO IS 8473.
+
+ [I8802-2] ---, "Information Processing Systems -- Local Area
+ Networks, Part 2: Logical Link Control", ISO IS 8802-2.
+ (Equivalent to IEEE 802.2.)
+
+ [I8802-3] ---, "Information Processing Systems -- Local Area
+ Networks, Part 3: Carrier Sense Multiple Access with
+ Collision Detection (CSMA/CD) Access Method and Physical
+ Layer Specifications", ISO IS 8802-3. (Equivalent to IEEE
+ 802.3.)
+
+ [I8823] ---, "Information Processing Systems -- Open Systems
+ Interconnection -- Connection-Oriented Presentation Protocol
+ Specification", ISO IS 8823.
+
+ [I9945] "Portable Operating System Interface for Computer
+ Environments", ISO/IEC 9945-1: 1990.
+
+ [IATF] NSA, "Information Assurance Technical Framework", Release 3,
+ NSA, September 2000. (See: IATF.)
+
+ [IDSAN] ---, "Intrusion Detection System Analyzer Protection
+ Profile", version 1.1, NSA, 10 December 2001.
+
+ [IDSSC] ---, "Intrusion Detection System Scanner Protection
+ Profile", version 1.1, NSA, 10 December 2001.
+
+ [IDSSE] ---, "Intrusion Detection System Sensor Protection Profile",
+ version 1.1, NSA, 10 December 2001.
+
+
+
+
+Shirey Informational [Page 350]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [IDSSY] ---, "Intrusion Detection System", version 1.4, NSA, 4
+ February 2002.
+
+ [Ioan] Ioannidis, J. and M. Blaze, "The Architecture and
+ Implementation of Network Layer Security in UNIX", in "UNIX
+ Security IV Symposium", October 1993, pp. 29-39.
+
+ [ITSEC] "Information Technology Security Evaluation Criteria
+ (ITSEC): Harmonised Criteria of France, Germany, the
+ Netherlands, and the United Kingdom", version 1.2, U.K.
+ Department of Trade and Industry, June 1991.
+
+ [JP1] U.S. DoD, "Department of Defense Dictionary of Military and
+ Associated Terms", Joint Publication 1-02, as amended
+ through 13 June 2007.
+
+ [John] Johnson, N. and S. Jajodia, "Exploring Steganography; Seeing
+ the Unseen", in "IEEE Computer", February 1998, pp. 26-34.
+
+ [Kahn] Kahn, D., "The Codebreakers: The Story of Secret Writing",
+ The Macmillan Company, New York, 1967.
+
+ [Knut] Knuth, D., Chapter 3 ("Random Numbers") of Volume 2
+ ("Seminumerical Algorithms") of "The Art of Computer
+ Programming", Addison-Wesley, Reading, MA, 1969.
+
+ [Kuhn] Kuhn, M. and R. Anderson, "Soft Tempest: Hidden Data
+ Transmission Using Electromagnetic Emanations", in David
+ Aucsmith, ed., "Information Hiding, Second International
+ Workshop, IH'98", Portland, Oregon, USA, 15-17 April 1998,
+ LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 124-142.
+
+ [Land] Landwehr, C., "Formal Models for Computer Security", in "ACM
+ Computing Surveys", vol. 13, no. 3, September 1981, pp. 247-
+ 278.
+
+ [Larm] Larmouth, J., "ASN.1 Complete", Open System Solutions, 1999
+ (a freeware book).
+
+ [M0404] U.S. Office of Management and Budget, "E-Authentication
+ Guidance for Federal Agencies", Memorandum M-04-04, 16
+ December 2003.
+
+ [Mene] Menezes, A. et al, "Some Key Agreement Protocols Providing
+ Implicit Authentication", in "The 2nd Workshop on Selected
+ Areas in Cryptography", 1995.
+
+
+
+
+
+Shirey Informational [Page 351]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [Moor] Moore, A. et al, "Attack Modeling for Information Security
+ and Survivability", Carnegie Mellon University / Software
+ Engineering Institute, CMU/SEI-2001-TN-001, March 2001.
+
+ [Murr] Murray, W., "Courtney's Laws of Security", in "Infosecurity
+ News", March/April 1993, p. 65.
+
+ [N4001] National Security Telecommunications and Information System
+ Security Committee, "Controlled Cryptographic Items",
+ NSTISSI No. 4001, 25 March 1985.
+
+ [N4006] ---, "Controlled Cryptographic Items", NSTISSI No. 4006, 2
+ December 1991.
+
+ [N7003] ---, "Protective Distribution Systems", NSTISSI No. 7003, 13
+ December 1996.
+
+ [NCS01] National Computer Security Center, "A Guide to Understanding
+ Audit in Trusted Systems", NCSC-TG-001, 1 June 1988. (See:
+ Rainbow Series.)
+
+ [NCS03] ---, "Information System Security Policy Guideline", I942-
+ TR-003, version 1, July 1994. (See: Rainbow Series.)
+
+ [NCS04] ---, "Glossary of Computer Security Terms", NCSC-TG-004,
+ version 1, 21 October 1988. (See: Rainbow Series.)
+
+ [NCS05] ---, "Trusted Network Interpretation of the Trusted Computer
+ System Evaluation Criteria", NCSC-TG-005, version 1, 31 July
+ 1987. (See: Rainbow Series.)
+
+ [NCS25] ---, "A Guide to Understanding Data Remanence in Automated
+ Information Systems", NCSC-TG-025, version 2, September
+ 1991. (See: Rainbow Series.)
+
+ [NCSSG] National Computer Security Center, "COMPUSECese: Computer
+ Security Glossary", NCSC-WA-001-85, Edition 1, 1 October
+ 1985. (See: Rainbow Series.)
+
+ [NRC91] National Research Council, "Computers At Risk: Safe
+ Computing in the Information Age", National Academy Press,
+ 1991.
+
+ [NRC98] Schneider, F., ed., "Trust in Cyberspace", National Research
+ Council, National Academy of Sciences, 1998.
+
+ [Padl] Padlipsky, M., "The Elements of Networking Style", 1985,
+ ISBN 0-13-268111-0.
+
+
+
+Shirey Informational [Page 352]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [PAG] American Bar Association, "PKI Assessment Guidelines",
+ version 1.0, 10 May 2002. (See: [DSG].)
+
+ [Park] Parker, D., "Computer Security Management", ISBN 0-8359-
+ 0905-0, 1981
+
+ [Perr] Perrine, T. et al, "An Overview of the Kernelized Secure
+ Operating System (KSOS)", in "Proceedings of the 7th DoD/NBS
+ Computer Security Conference", 24-26 September 1984.
+
+ [PGP] Garfinkel, S.. "PGP: Pretty Good Privacy", O'Reilly &
+ Associates, Inc., Sebastopol, CA, 1995.
+
+ [PKCS] Kaliski Jr., B., "An Overview of the PKCS Standards", RSA
+ Data Security, Inc., 3 June 1991.
+
+ [PKC05] RSA Laboratories, "PKCS #5: Password-Based Encryption
+ Standard ", version 1.5, 1 November 1993. (See: RFC 2898.)
+
+ [PKC07] ---, "PKCS #7: Cryptographic Message Syntax Standard",
+ version 1.5, 1 November 1993. (See: RFC 2315.)
+
+ [PKC10] ---, "PKCS #10: Certification Request Syntax Standard",
+ version 1.0, 1 November 1993.
+
+ [PKC11] ---, "PKCS #11: Cryptographic Token Interface Standard",
+ version 1.0, 28 April 1995.
+
+ [PKC12] ---, "PKCS #12: Personal Information Exchange Syntax",
+ version 1.0, 24 June 1995.
+
+ [R1108] Kent, S., "U.S. Department of Defense Security Options for
+ the Internet Protocol", RFC 1108, November 1991.
+
+ [R1135] Reynolds, J., "The Helminthiasis of the Internet", RFC 1135,
+ December 1989
+
+ [R1208] Jacobsen, O. and D. Lynch, "A Glossary of Networking Terms",
+ RFC 1208, March 1991.
+
+ [R1281] Pethia, R., Crocker, S., and B. Fraser, "Guidelines for
+ Secure Operation of the Internet", RFC 1281, November 1991.
+
+ [R1319] Kaliski, B., "The MD2 Message-Digest Algorithm", RFC 1319,
+ April 1992.
+
+ [R1320] Rivest, R., "The MD4 Message-Digest Algorithm", RFC 1320,
+ April 1992.
+
+
+
+Shirey Informational [Page 353]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [R1321] ---, "The MD5 Message-Digest Algorithm", RFC 1321, April
+ 1992.
+
+ [R1334] Lloyd, B. and W. Simpson, "PPP Authentication Protocols",
+ RFC 1334, October 1992.
+
+ [R1413] St. Johns, M., "Identification Protocol", RFC 1413, February
+ 1993.
+
+ [R1421] Linn, J., "Privacy Enhancement for Internet Electronic Mail,
+ Part I: Message Encryption and Authentication Procedures",
+ RFC 1421, February 1993.
+
+ [R1422] Kent, S., "Privacy Enhancement for Internet Electronic Mail,
+ Part II: Certificate-Based Key Management", RFC 1422,
+ February 1993.
+
+ [R1455] Eastlake 3rd, D., "Physical Link Security Type of Service",
+ RFC 1455, May 1993.
+
+ [R1457] Housley, R., "Security Label Framework for the Internet",
+ RFC 1457, May 1993.
+
+ [R1492] Finseth, C., "An Access Control Protocol, Sometimes Called
+ TACACS", RFC 1492, July 1993.
+
+ [R1507] Kaufman, C., "DASS: Distributed Authentication Security
+ Service", RFC 1507, September 1993.
+
+ [R1731] Myers, J., "IMAP4 Authentication Mechanisms", RFC 1731,
+ December 1994.
+
+ [R1734] ---, "POP3 AUTHentication Command", RFC 1734, Dec, 1994.
+
+ [R1760] Haller, N., "The S/KEY One-Time Password System", RFC 1760,
+ February 1995.
+
+ [R1824] Danisch, H., "The Exponential Security System TESS: An
+ Identity-Based Cryptographic Protocol for Authenticated Key-
+ Exchange (E.I.S.S.-Report 1995/4)", RFC 1824, August 1995.
+
+ [R1828] Metzger, P. and W. Simpson, "IP Authentication using Keyed
+ MD5", RFC 1828, August 1995.
+
+ [R1829] Karn, P., Metzger, P., and W. Simpson, "The ESP DES-CBC
+ Transform", RFC 1829, August 1995.
+
+
+
+
+
+Shirey Informational [Page 354]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [R1848] Crocker, S., Freed, N., Galvin, J., and S. Murphy, "MIME
+ Object Security Services", RFC 1848, October 1995.
+
+ [R1851] Karn, P., Metzger, P., and W. Simpson, "The ESP Triple DES
+ Transform", RFC 1851, September 1995.
+
+ [R1928] Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., and L.
+ Jones, "SOCKS Protocol Version 5", RFC 1928, March 1996.
+
+ [R1958] Carpenter, B., "Architectural Principles of the Internet",
+ RFC 1958, June 1996.
+
+ [R1983] Malkin, G., "Internet Users' Glossary", FYI 18, RFC 1983,
+ August 1996.
+
+ [R1994] Simpson, W., "PPP Challenge Handshake Authentication
+ Protocol (CHAP)", RFC 1994, August 1996.
+
+ [R2078] Linn, J., "Generic Security Service Application Program
+ Interface, Version 2", RFC 2078, January 1997. (Superseded
+ by RFC 2743.)
+
+ [R2084] Bossert, G., Cooper, S., and W. Drummond, "Considerations
+ for Web Transaction Security", RFC 2084, January 1997.
+
+ [R2104] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-
+ Hashing for Message Authentication", RFC 2104, February
+ 1997.
+
+ [R2144] Adams, C., "The CAST-128 Encryption Algorithm", RFC 2144,
+ May 1997.
+
+ [R2179] Gwinn, A., "Network Security For Trade Shows", RFC 2179,
+ July 1997.
+
+ [R2195] Klensin, J., Catoe, R., and P. Krumviede, "IMAP/POP
+ AUTHorize Extension for Simple Challenge/Response", RFC
+ 2195, September 1997.
+
+ [R2196] Fraser, B., "Site Security Handbook", FYI 8, RFC 2196,
+ September 1997.
+
+ [R2202] Cheng, P. and R. Glenn, "Test Cases for HMAC-MD5 and HMAC-
+ SHA-1", RFC 2202, Sep. 1997.
+
+ [R2222] Myers, J., "Simple Authentication and Security Layer
+ (SASL)", RFC 2222, October 1997.
+
+
+
+
+Shirey Informational [Page 355]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [R2289] Haller, N., Metz, C., Nesser, P., and M. Straw, "A One-Time
+ Password System", STD 61, RFC 2289, February 1998.
+
+ [R2323] Ramos, A., "IETF Identification and Security Guidelines",
+ RFC 2323, 1 April 1998. (Intended for humorous entertainment
+ -- "please laugh loud and hard" -- and does not contain
+ serious security information.)
+
+ [R2350] Brownlee, N. and E. Guttman, "Expectations for Computer
+ Security Incident Response", BCP 21, RFC 2350, June 1998.
+
+ [R2356] Montenegro, G. and V. Gupta, "Sun's SKIP Firewall Traversal
+ for Mobile IP", RFC 2356, June 1998.
+
+ [R2401] Kent, S. and R. Atkinson, "Security Architecture for the
+ Internet Protocol", RFC 2401, November 1998.
+
+ [R2402] ---, "IP Authentication Header", RFC 2402, November 1998.
+
+ [R2403] Madson, C. and R. Glenn, "The Use of HMAC-MD5-96 within ESP
+ and AH", RFC 2403, November 1998.
+
+ [R2404] ---, "The Use of HMAC-SHA-1-96 within ESP and AH", RFC 2404,
+ November 1998.
+
+ [R2405] Madson, C. and N. Doraswamy, "The ESP DES-CBC Cipher
+ Algorithm With Explicit IV", RFC 2405, November 1998.
+
+ [R2406] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload
+ (ESP)", RFC 2406, November 1998.
+
+ [R2407] Piper, D. "The Internet IP Security Domain of Interpretation
+ for ISAKMP", RFC 2407, November 1998.
+
+ [R2408] Maughan, D., Schertler, M., Schneider, M., and J. Turner,
+ "Internet Security Association and Key Management Protocol
+ (ISAKMP)", RFC 2408, November 1998.
+
+ [R2410] Glenn, R. and S. Kent, "The NULL Encryption Algorithm and
+ Its Use With IPsec", RFC 2410, November 1998.
+
+ [R2412] Orman, H., "The OAKLEY Key Determination Protocol", RFC
+ 2412, November 1998.
+
+ [R2451] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher
+ Algorithms", RFC 2451, November 1998.
+
+
+
+
+
+Shirey Informational [Page 356]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [R2504] Guttman, E., Leong, L., and G. Malkin, "Users' Security
+ Handbook", RFC 2504, February 1999.
+
+ [R2560] Myers, M., Ankney, R., Malpani, A., Galperin, S., and C.
+ Adams, "X.509 Internet Public Key Infrastructure Online
+ Certificate Status Protocol - OCSP", RFC 2560, June 1999.
+
+ [R2612] Adams, C. and J. Gilchrist, "The CAST-256 Encryption
+ Algorithm", RFC 2612, June 1999.
+
+ [R2628] Smyslov, V., "Simple Cryptographic Program Interface (Crypto
+ API)", RFC 2628, June 1999.
+
+ [R2631] Rescorla, E., "Diffie-Hellman Key Agreement Method", RFC
+ 2631, June 1999. (See: Diffie-Hellman-Merkle.)
+
+ [R2634] Hoffman, P., "Enhanced Security Services for S/MIME", RFC
+ 2634, June 1999.
+
+ [R2635] Hambridge, S. and A. Lunde, "DON'T SPEW: A Set of Guidelines
+ for Mass Unsolicited Mailings and Postings", RFC 2635, June
+ 1999.
+
+ [R2660] Rescorla, E. and A. Schiffman, "The Secure HyperText
+ Transfer Protocol", RFC 2660, August 1999.
+
+ [R2743] Linn, J., "Generic Security Service Application Program
+ Interface Version 2, Update 1", RFC 2743, January 2000.
+
+ [R2773] Housley, R., Yee, P., and W. Nace, "Encryption using KEA and
+ SKIPJACK", RFC 2773, February 2000.
+
+ [R2801] Burdett, D., "Internet Open Trading Protocol - IOTP, Version
+ 1.0", RFC 2801, April 2000.
+
+ [R2827] Ferguson, P. and D. Senie, "Network Ingress Filtering:
+ Defeating Denial of Service Attacks which employ IP Source
+ Address Spoofing", BCP 38, RFC 2827, May 2000.
+
+ [R2865] Rigney, C., Willens, S., Rubens, A., and W. Simpson, "Remote
+ Authentication Dial In User Service (RADIUS)", RFC 2865,
+ June 2000.
+
+ [R3060] Moore, B., Ellesson, E., Strassner, J., and A. Westerinen,
+ "Policy Core Information Model -- Version 1 Specification",
+ RFC 3060, February 2001.
+
+
+
+
+
+Shirey Informational [Page 357]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [R3198] Westerinen, A., Schnizlein, J., Strassner, J., Scherling,
+ M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry,
+ J., and S. Waldbusser, "Terminology for Policy-Based
+ Management", RFC 3198, November 2001.
+
+ [R3280] Housley, R., Polk, W., Ford, W., and D. Solo, "Internet
+ X.509 Public Key Infrastructure Certificate and Certificate
+ Revocation List (CRL) Profile", RFC 3280, April 2002.
+
+ [R3547] Baugher, M., Weis, B., Hardjono, T., and H. Harney, "Group
+ Domain of Interpretation", RFC 3547, July 2003.
+
+ [R3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC Text
+ on Security Considerations", RFC 3552, July 2003.
+
+ [R3647] Chokhani, S., Ford, W., Sabett, R., Merrill, C., and S. Wu,
+ "Internet X.509 Public Key Infrastructure Certificate Policy
+ and Certification Practices Framework", RFC 3647, November
+ 2003.
+
+ [R3739] Santesson, S., Nystrom, M., and T. Polk, "Internet X.509
+ Public Key Infrastructure: Qualified Certificates Profile",
+ RFC 3739, March 2004.
+
+ [R3740] Hardjono, T. and B. Weis, "The Multicast Group Security
+ Architecture", RFC 3740, March 2004.
+
+ [R3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
+ Levkowetz, "Extensible Authentication Protocol (EAP)", RFC
+ 3748, June 2004.
+
+ [R3766] Orman, H. and P. Hoffman, "Determining Strengths For Public
+ Keys Used For Exchanging Symmetric Keys", BCP 86, RFC 3766,
+ April 2004.
+
+ [R3820] Tuecke, S., Welch, V., Engert, D., Pearlman, L., and M.
+ Thompson, "Internet X.509 Public Key Infrastructure (PKI)
+ Proxy Certificate Profile", RFC 3820, June 2004.
+
+ [R3851] Ramsdell, B., "Secure/Multipurpose Internet Mail Extensions
+ (S/MIME) Version 3.1 Message Specification", RFC 3851, July
+ 2004.
+
+ [R3871] Jones, G., "Operational Security Requirements for Large
+ Internet Service Provider (ISP) IP Network Infrastructure",
+ RFC 3871, September 2004.
+
+
+
+
+
+Shirey Informational [Page 358]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [R4033] Arends, R., Austein, R., Larson, M., Massey, D., and S.
+ Rose, "DNS Security Introduction and Requirements", RFC
+ 4033, March 2005.
+
+ [R4034] Arends, R., Austein, R., Larson, M., Massey, D., and S.
+ Rose, "Resource Records for the DNS Security Extensions",
+ RFC 4034, March 2005.
+
+ [R4035] Arends, R., Austein, R., Larson, M., Massey, D., and S.
+ Rose, "Protocol Modifications for the DNS Security
+ Extensions", RFC 4035, March 2005.
+
+ [R4086] Eastlake, D., 3rd, Schiller, J., and S. Crocker, "Randomness
+ Requirements for Security", BCP 106, RFC 4086, June 2005.
+
+ [R4120] Neuman, C., Yu, T., Hartman, S., and K. Raeburn, "The
+ Kerberos Network Authentication Service (V5)", RFC 4120,
+ July 2005.
+
+ [R4158] Cooper, M., Dzambasow, Y., Hesse, P., Joseph, S., and R.
+ Nicholas, "Internet X.509 Public Key Infrastructure:
+ Certification Path Building", RFC 4158, September 2005.
+
+ [R4210] Adams, C., Farrell, S., Kause, T., and T. Mononen, "Internet
+ X.509 Public Key Infrastructure Certificate Management
+ Protocol (CMP)", RFC 4210, September 2005.
+
+ [R4301] Kent, S. and K. Seo, "Security Architecture for the Internet
+ Protocol", RFC 4301, December 2005.
+
+ [R4302] Kent, S., "IP Authentication Header", RFC 4302, December
+ 2005.
+
+ [R4303] Kent, S., "IP Encapsulating Security Payload (ESP)", RFC
+ 4303, December 2005.
+
+ [R4306] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC
+ 4306, December 2005.
+
+ [R4346] Dierks, T. and E. Rescorla, "The Transport Layer Security
+ (TLS) Protocol Version 1.1", RFC 4346, April 2006.
+
+ [R4422] Melnikov, A. and K. Zeilenga, "Simple Authentication and
+ Security Layer (SASL)", RFC 4422, June 2006.
+
+
+
+
+
+
+
+Shirey Informational [Page 359]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [Raym] Raymond, E., ed., "The On-Line Hacker Jargon File", version
+ 4.0.0, 24 July 1996. (See: http://www.catb.org/~esr/jargon
+ for the latest version. Also, "The New Hacker's Dictionary",
+ 3rd edition, MIT Press, September 1996, ISBN 0-262-68092-0.)
+
+ [Roge] Rogers, H., "An Overview of the CANEWARE Program", in
+ "Proceedings of the 10th National Computer Security
+ Conference", NIST and NCSC, September 1987.
+
+ [RSA78] Rivest, R., A. Shamir, and L. Adleman, "A Method for
+ Obtaining Digital Signatures and Public-Key Cryptosystems",
+ in "Communications of the ACM", vol. 21, no. 2, February
+ 1978, pp. 120-126.
+
+ [RSCG] NSA, "Router Security Configuration Guide: Principles and
+ Guidance for Secure Configuration of IP Routers, with
+ Detailed Instructions for Cisco Systems Routers", version
+ 1.1c, C4-040R-02, 15 December 2005, available at
+ http://www.nsa.gov/snac/routers/C4-040R-02.pdf.
+
+ [Russ] Russell, D. et al, Chapter 10 ("TEMPEST") of "Computer
+ Security Basics", ISBN 0-937175-71-4, 1991.
+
+ [SAML] Organization for the Advancement of Structured Information
+ Standards (OASIS), "Assertions and Protocol for the OASIS
+ Security Assertion Markup Language (SAML)", version 1.1, 2
+ September 2003.
+
+ [Sand] Sandhu, R. et al, "Role-Based Access Control Models", in
+ "IEEE Computer", vol. 29, no. 2, February 1996, pp. 38-47.
+
+ [Schn] Schneier, B., "Applied Cryptography Second Edition", John
+ Wiley & Sons, Inc., New York, 1996.
+
+ [SDNS3] U.S. DoD, NSA, "Secure Data Network Systems, Security
+ Protocol 3 (SP3)", document SDN.301, Revision 1.5, 15 May
+ 1989.
+
+ [SDNS4] ---, "Secure Data Network Systems, Security Protocol 4
+ (SP4)", document SDN.401, Revision 1.2, 12 July 1988.
+
+ [SDNS7] ---, "Secure Data Network Systems, Message Security Protocol
+ (MSP)", SDN.701, Revision 4.0, 7 June 1996, with
+ "Corrections to Message Security Protocol, SDN.701, Rev 4.0,
+ 96-06-07", 30 Aug, 1996.
+
+
+
+
+
+
+Shirey Informational [Page 360]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [SET1] MasterCard and Visa, "SET Secure Electronic Transaction
+ Specification, Book 1: Business Description", version 1.0,
+ 31 May 1997.
+
+ [SET2] ---, "SET Secure Electronic Transaction Specification, Book
+ 2: Programmer's Guide", version 1.0, 31 May 1997.
+
+ [SKEME] Krawczyk, H., "SKEME: A Versatile Secure Key Exchange
+ Mechanism for Internet", in "Proceedings of the 1996
+ Symposium on Network and Distributed Systems Security".
+
+ [SKIP] "SKIPJACK and KEA Algorithm Specifications", version 2.0, 22
+ May 1998, and "Clarification to the SKIPJACK Algorithm
+ Specification", 9 May 2002 (available from NIST Computer
+ Security Resource Center).
+
+ [SP12] NIST, "An Introduction to Computer Security: The NIST
+ Handbook", Special Publication 800-12.
+
+ [SP14] Swanson, M. et al (NIST), "Generally Accepted Principles and
+ Practices for Security Information Technology Systems",
+ Special Publication 800-14, September 1996.
+
+ [SP15] Burr, W. et al (NIST), "Minimum Interoperability
+ Specification for PKI Components (MISPC), Version 1",
+ Special Publication 800-15, September 1997.
+
+ [SP22] Rukhin, A. et al (NIST), "A Statistical Test Suite for
+ Random and Pseudorandom Number Generators for Cryptographic
+ Applications", Special Publication 800-15, 15 May 2001.
+
+ [SP27] Stoneburner, G. et al (NIST), "Engineering Principles for
+ Information Technology Security (A Baseline for Achieving
+ Security)", Special Publication 800-27 Rev A, June 2004.
+
+ [SP28] Jansen, W. (NIST), "Guidelines on Active Content and Mobile
+ Code", Special Publication 800-28, October 2001.
+
+ [SP30] Stoneburner, G. et al (NIST), "Risk Management Guide for
+ Information Technology Systems", Special Publication 800-30,
+ October 2001.
+
+ [SP31] Bace, R. et al (NIST), "Intrusion Detection Systems",
+ Special Publication 800-31.
+
+ [SP32] Kuhn, D. (NIST), "Introduction to Public Key Technology and
+ the Federal PKI Infrastructure ", Special Publication
+ 800-32, 26 February 2001.
+
+
+
+Shirey Informational [Page 361]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [SP33] Stoneburner, G. (NIST), "Underlying Technical Models for
+ Information Technology Security", Special Publication
+ 800-33, December 2001.
+
+ [SP37] Ross, R. et al (NIST), "Guide for the Security Certification
+ and Accreditation of Federal Information Systems", Special
+ Publication 800-37, May 2004.
+
+ [SP38A] Dworkin, M. (NIST), "Recommendation for Block Cipher Modes
+ of Operation: Methods and Techniques", Special Publication
+ 800-38A, 2001 Edition, December 2001.
+
+ [SP38B] ---, "Recommendation for Block Cipher Modes of Operation:
+ The CMAC Mode for Authentication", Special Publication
+ 800-38B, May 2005.
+
+ [SP38C] ---, "Recommendation for Block Cipher Modes of Operation:
+ The CCM Mode for Authentication and Confidentiality",
+ Special Publication 800-38C, May 2004.
+
+ [SP41] Wack, J. et al (NIST), "Guidelines on Firewalls and Firewall
+ Policy", Special Publication 800-41, January 2002.
+
+ [SP42] ---, "Guideline on Network Security Testing", Special
+ Publication 800-42, October 2003.
+
+ [SP56] NIST, "Recommendations on Key Establishment Schemes", Draft
+ 2.0, Special Publication 800-63, January 2003.
+
+ [SP57] ---, "Recommendation for Key Management", Part 1 "General
+ Guideline" and Part 2 "Best Practices for Key Management
+ Organization", Special Publication 800-57, DRAFT, January
+ 2003.
+
+ [SP61] Grance, T. et al (NIST), "Computer Security Incident
+ Handling Guide", Special Publication 800-57, January 2003.
+
+ [SP63] Burr, W. et al (NIST), "Electronic Authentication
+ Guideline", Special Publication 800-63, June 2004
+
+ [SP67] Barker, W. (NIST), "Recommendation for the Triple Data
+ Encryption Algorithm (TDEA) Block Cipher", Special
+ Publication 800-67, May 2004
+
+ [Stal] Stallings, W., "Local Networks", 1987, ISBN 0-02-415520-9.
+
+
+
+
+
+
+Shirey Informational [Page 362]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [Stei] Steiner, J. et al, "Kerberos: An Authentication Service for
+ Open Network Systems", in "Usenix Conference Proceedings",
+ February 1988.
+
+ [Weis] Weissman, C., "Blacker: Security for the DDN: Examples of A1
+ Security Engineering Trades", in "Symposium on Security and
+ Privacy", IEEE Computer Society Press, May 1992, pp. 286-
+ 292.
+
+ [X400] International Telecommunications Union -- Telecommunication
+ Standardization Sector (formerly "CCITT"), Recommendation
+ X.400, "Message Handling Services: Message Handling System
+ and Service Overview".
+
+ [X419] ---, "Message Handling Systems: Protocol Specifications",
+ ITU-T Recommendation X.419. (Equivalent to ISO 10021-6).
+
+ [X420] ---, "Message Handling Systems: Interpersonal Messaging
+ System", ITU-T Recommendation X.420. (Equivalent to ISO
+ 10021-7.).
+
+ [X500] ---, Recommendation X.500, "Information Technology -- Open
+ Systems Interconnection -- The Directory: Overview of
+ Concepts, Models, and Services". (Equivalent to ISO 9594-1.)
+
+ [X501] ---, Recommendation X.501, "Information Technology -- Open
+ Systems Interconnection -- The Directory: Models".
+
+ [X509] ---, Recommendation X.509, "Information Technology -- Open
+ Systems Interconnection -- The Directory: Authentication
+ Framework", COM 7-250-E Revision 1, 23 February 2001.
+ (Equivalent to ISO 9594-8.)
+
+ [X519] ---, Recommendation X.519, "Information Technology -- Open
+ Systems Interconnection -- The Directory: Protocol
+ Specifications".
+
+ [X520] ---, Recommendation X.520, "Information Technology -- Open
+ Systems Interconnection -- The Directory: Selected Attribute
+ Types".
+
+ [X680] ---, Recommendation X.680, "Information Technology --
+ Abstract Syntax Notation One (ASN.1) -- Specification of
+ Basic Notation", 15 November 1994. (Equivalent to ISO/IEC
+ 8824-1.)
+
+
+
+
+
+
+Shirey Informational [Page 363]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+ [X690] ---, Recommendation X.690, "Information Technology -- ASN.1
+ Encoding Rules -- Specification of Basic Encoding Rules
+ (BER), Canonical Encoding Rules (CER) and Distinguished
+ Encoding Rules (DER)", 15 November 1994. (Equivalent to
+ ISO/IEC 8825-1.)
+
+7. Acknowledgments
+
+ George Huff had a good idea! [Huff]
+
+Author's Address
+
+ Dr. Robert W. Shirey
+ 3516 N. Kensington St.
+ Arlington, Virginia 22207-1328
+ USA
+
+ EMail: rwshirey4949@verizon.net
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Shirey Informational [Page 364]
+
+RFC 4949 Internet Security Glossary, Version 2 August 2007
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2007).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78 and at www.rfc-editor.org/copyright.html, and
+ except as set forth therein, the authors retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Shirey Informational [Page 365]
+