<Glossary>
<Section Letter="A">
    <Entry>
        <Term>AA</Term>
        <Definition>Accreditation Authority</Definition>
    </Entry>
    <Entry>
        <Term>ACAS</Term>
        <Definition>Assured Compliance Assessment Solution</Definition>
    </Entry>
    <Entry>
        <Term>Access</Term>
        <Definition>Opportunity to make use of an information system (IS) resource.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Access Control</Term>
        <Definition>Limiting access to information system resources only to authorized users, programs, processes, or other systems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Access Control List (ACL)</Term>
        <Definition>Mechanism implementing discretionary and/or mandatory access control between subjects and objects.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Access Control Mechanism</Term>
        <Definition>Security safeguard designed to detect and deny unauthorized access and permit authorized access in an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Access Level</Term>
        <Definition>Hierarchical portion of the security level used to identify the sensitivity of IS data and the clearance or authorization of users.  Access level, in conjunction with the non-hierarchical categories, forms the sensitivity label of an object.  See category.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Access List</Term>
        <Definition>(IS) Compilation of users, programs, or processes and the access levels and types to which each is authorized.  (COMSEC)-Roster of persons authorized admittance to a controlled area.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Access Profile</Term>
        <Definition>Associates each user with a list of protected objects the user may access.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Access Type</Term>
        <Definition>Privilege to perform action on an object.  Read, write, execute, append, modify, delete, and create are examples of access types.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Accountability</Term>
        <Definition>(IS) Process of tracing IS activities to a responsible source.  (COMSEC) Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Accounting Legend Code (ALC)</Term>
        <Definition>Numeric code used to indicate the minimum accounting controls required for items of accountable COMSEC material within the COMSEC Material Control System.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Accounting Number</Term>
        <Definition>Number assigned to an item of COMSEC material to facilitate its control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Accreditation</Term>
        <Definition>Formal declaration by a Designated Accrediting Authority (DAA) that an IS is approved to operate at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Accreditation Boundary</Term>
        <Definition>1. (IA)Identifies the information resources covered by an accreditation decision, as distinguished from separately accredited information resources that are interconnected or with which information is exchanged via messaging. (Synonymous with Security Perimeter.) 2. (IC) For the purposes of identifying the Protection Level for confidentiality of a system to be accredited, the system has a conceptual boundary that extends to all intended users of the system, both directly and indirectly connected, who receive output from the system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Accreditation Package</Term>
        <Definition>Product comprised of a System Security Plan (SSP) and a report documenting the basis for the accreditation decision.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Accrediting Authority</Term>
        <Definition>Synonymous with Designated Accrediting Authority (DAA).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ACL</Term>
        <Definition>Access Control List</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ACO (C.F.D)</Term>
        <Definition>Access Control Officer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Add-on-Security</Term>
        <Definition>Incorporation of new hardware, software, or firmware safeguards in an operational IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Adequate Security</Term>
        <Definition>Security commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that information systems operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, personnel, operational, and technical controls.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Advanced Encryption Standard (AES)</Term>
        <Definition>FIPS approved cryptographic algorithm that is a symmetric block cypher using cryptographic key sizes of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Advisory</Term>
        <Definition>Notification of significant new trends or developments regarding the threat to the IS of an organization. This notification may include analytical insights into trends, intentions, technologies, or tactics of an adversary targeting ISs.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AES</Term>
        <Definition>Advanced Encryption Standard</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AIG</Term>
        <Definition>Address Indicator Group</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AIN</Term>
        <Definition>Advanced Intelligence Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AK</Term>
        <Definition>Automatic Remote Rekeying</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AKD/RCU</Term>
        <Definition>Automatic Key Distribution/Rekeying Control Unit</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ALC</Term>
        <Definition>Accounting Legend Code</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Alert</Term>
        <Definition>Notification of a specific attack directed at the IS of an organization.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Alternate COMSEC Custodian</Term>
        <Definition>Individual designated by proper authority to perform the duties of the COMSEC custodian during the temporary absence of the COMSEC custodian.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Alternative Work Site</Term>
        <Definition>Government-wide, national program allowing Federal employees to work at home or at geographically convenient satellite offices for part of the work week.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AMS</Term>
        <Definition>1.  Auto-Manual System  2.  Autonomous Message Switch</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ANDVT</Term>
        <Definition>Advanced Narrowband Digital Voice Terminal</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ANSI</Term>
        <Definition>American National Standards Institute</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Anti-jam</Term>
        <Definition>Measures ensuring that transmitted information can be received despite deliberate jamming attempts.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Anti-spoof</Term>
        <Definition>Measures taken to prevent the unauthorized use of legitimate Identification & Authentication (I&A) data, however it was obtained, to mimic a subject different from the attacker. </Definition>
    </Entry>
    <Entry>
        <Term>AO</Term>
        <Definition>Authorizing Official</Definition>
    </Entry>
    <Entry>
        <Term>APC</Term>
        <Definition>Adaptive Predictive Coding</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Application</Term>
        <Definition>Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>APU</Term>
        <Definition>Auxiliary Power Unit</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ASCII</Term>
        <Definition>American Standard Code for Information Interchange</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Assurance</Term>
        <Definition>Measure of confidence that the security features, practices, procedures, and architecture of an IS accurately mediates and enforces the security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Assured Software</Term>
        <Definition>Software that has been designed, developed, analyzed and tested using processes, tools, and techniques that establish a level of confidence in its trustworthiness appropriate for its intended use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ASU</Term>
        <Definition>Approval for Service Use</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AS&W</Term>
        <Definition>Attack Sensing and Warning</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ATM</Term>
        <Definition>Asynchronous Transfer Mode</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Attack</Term>
        <Definition>Attempt to gain unauthorized access to an IS's services, resources, or information, or the attempt to compromise an IS's integrity, availability, or confidentiality.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Attack Sensing and Warning (AS&#x0026;W)</Term>
        <Definition>Detection, correlation, identification, and characterization of intentional unauthorized activity with notification to decision makers so that an appropriate response can be developed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Audit</Term>
        <Definition>Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Audit Trail</Term>
        <Definition>Chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Authenticate</Term>
        <Definition>To verify the identity of a user, user device, or other entity, or the integrity of data stored, transmitted, or otherwise exposed to unauthorized modification in an IS, or to establish the validity of a transmission.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Authentication</Term>
        <Definition>The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data. NIST SP 800-53: Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. </Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Authentication System</Term>
        <Definition>Cryptosystem or process used for authentication.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Authenticator</Term>
        <Definition>Means used to confirm the identity of a station, originator, or individual.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Authorization</Term>
        <Definition>Access privileges granted to a user, program, or process.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Authorized Vendor</Term>
        <Definition>Manufacturer of INFOSEC equipment authorized to produce quantities in excess of contractual requirements for direct sale to eligible buyers.  Eligible buyers are typically U.S. Government organizations or U.S. Government contractors.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Authorized Vendor Program (AVP)</Term>
        <Definition>Program in which a vendor, producing an INFOSEC product under contract to NSA, is authorized to produce that product in numbers exceeding the contracted requirements for direct marketing and sale to eligible buyers.  Eligible buyers are typically U.S. Government organizations or U.S. Government contractors.  Products approved for marketing and sale through the AVP are placed on the Endorsed Cryptographic Products List (ECPL).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AUTODIN</Term>
        <Definition>Automatic Digital Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Automated Security Monitoring</Term>
        <Definition>Use of automated procedures to ensure security controls are not circumvented or the use of these tools to track actions taken by subjects suspected of misusing the IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Automatic Remote Rekeying</Term>
        <Definition>Procedure to rekey distant crypto-equipment electronically without specific actions by the receiving terminal operator.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Availability</Term>
        <Definition>Timely, reliable access to data and information services for authorized users.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>AVP</Term>
        <Definition>Authorized Vendor Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="B">
    <Entry>
        <Term>Back Door</Term>
        <Definition>Hidden software or hardware mechanism used to circumvent security controls. Synonymous with trap door.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Backup</Term>
        <Definition>Copy of files and programs made to facilitate recovery, if necessary.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Banner</Term>
        <Definition>Display on an IS that sets parameters for system or data use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>BCP</Term>
        <Definition>Business Continuity Plan</Definition>
    </Entry>
    <Entry>
        <Term>Benign</Term>
        <Definition>Condition of cryptographic data that cannot be compromised by human access.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Benign Environment</Term>
        <Definition>Nonhostile environment that may be protected from external hostile elements by physical, personnel, and procedural security countermeasures.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Binding</Term>
        <Definition>Process of associating a specific communications terminal with a specific cryptographic key or associating two related elements of information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Biometrics</Term>
        <Definition>Automated methods of authenticating or verifying an individual based upon a physical or behavioral characteristic.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Bit Error Rate</Term>
        <Definition>Ratio between the number of bits incorrectly received and the total number of bits transmitted in a telecommunications system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>BLACK</Term>
        <Definition>Designation applied to information systems, and to associated areas, circuits, components, and equipment, in which national security information is not processed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Boundary</Term>
        <Definition>Software, hardware, or physical barrier that limits access to a system or part of a system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Brevity List</Term>
        <Definition>List containing words and phrases used to shorten messages.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Browsing</Term>
        <Definition>Act of searching through IS storage to locate or acquire information, without necessarily knowing the existence or format of information being sought.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Bulk Encryption</Term>
        <Definition>Simultaneous encryption of all channels of a multichannel telecommunications link.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="C">
    <Entry>
        <Term>C2</Term>
        <Definition>1. Command and Control  2. Controlled Access Protection (C.F.D.)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>C3</Term>
        <Definition>Command, Control, and Communications</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>C3I</Term>
        <Definition>Command, Control, Communications and Intelligence</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>C4</Term>
        <Definition>Command, Control, Communications and Computers</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CA</Term>
        <Definition>1. Controlling Authority  2. Cryptanalysis  3. COMSEC Account  4. Command Authority  5. Certification Authority</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term><![CDATA[C&#x0026;A]]></Term>
        <Definition>Certification and Accreditation</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Call Back</Term>
        <Definition>Procedure for identifying and authenticating a remote IS terminal, whereby the host system disconnects the terminal and re-establishes contact.  Synonymous with dial back.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Canister</Term>
        <Definition>Type of protective package used to contain and dispense key in punched or printed tape form.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cascading</Term>
        <Definition>Downward flow of information through a range of security levels greater than the accreditation range of a system network or component.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Category</Term>
        <Definition>Restrictive label applied to classified or unclassified information to limit access.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CAW</Term>
        <Definition>Certificate Authority Workstation</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CC</Term>
        <Definition>Common Criteria</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CCEP</Term>
        <Definition>Commercial COMSEC Endorsement Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CCI</Term>
        <Definition>Controlled Cryptographic Item</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CCI Assembly</Term>
        <Definition>Device embodying a cryptographic logic or other COMSEC design that NSA has approved as a Controlled Cryptographic Item (CCI). It performs the entire COMSEC function, but depends upon the host equipment to operate.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CCI Component</Term>
        <Definition>Part of a Controlled Cryptographic Item (CCI) that does not perform the entire COMSEC function but depends upon the host equipment, or assembly, to complete and operate the COMSEC function.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CCI Equipment</Term>
        <Definition>Telecommunications or information handling equipment that embodies a Controlled Cryptographic Item (CCI component or CCI assembly and performs the entire COMSEC function without dependence on host equipment to operate.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CCO</Term>
        <Definition>Circuit Control Officer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CD</Term>
        <Definition>Cyberspace Defense</Definition>
    </Entry>
    <Entry>
        <Term>Central Office of Record (COR)</Term>
        <Definition>Office of a federal department or agency that keeps records of accountable COMSEC material held by elements subject to its oversight.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CEOI</Term>
        <Definition>Communications Electronics Operating Instruction</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CEPR</Term>
        <Definition>Compromising Emanation Performance Requirement</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CER</Term>
        <Definition>1.  Cryptographic Equipment Room  2.  Communication Equipment Room</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CERT</Term>
        <Definition>Computer Emergency Response Team</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certificate</Term>
        <Definition>Digitally signed document that binds a public key with an identity. The certificate contains, at a minimum, the identity of the issuing Certification Authority, the user identification information, and the user's public key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certificate Management</Term>
        <Definition>Process whereby certificates (as defined above) are generated, stored, protected, transferred, loaded, used, and destroyed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certificate Revocation List</Term>
        <Definition>List of invalid certificates (as defined above) that have been revoked by the issuer.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certification</Term>
        <Definition>Comprehensive evaluation of the technical and nontechnical security safeguards of an IS to support the accreditation process that establishes the extent to which a particular design and implementation meets a set of specified security requirements.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certification Authority</Term>
        <Definition>(C&#x0026;A) Official responsible for performing the comprehensive evaluation of the security features of an information system and determining the degree to which it meets its security requirements.(PKI)Trusted entity authorized to create, sign, and issue public key certificates. By digitally signing each certificate issued, the user's identity is certified, and the association of the certified identity with a public key is validated.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certification Authority Workstation</Term>
        <Definition>Commercial-off-the-shelf (COTS) workstation with a trusted operating system and special purpose application software that is used to issue certificates.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certification Package</Term>
        <Definition>Product of the certification effort documenting the detailed results of the certification activities.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certification Test and Evaluation (CT&#x0026;E)</Term>
        <Definition>Software and hardware security tests conducted during development of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certified TEMPEST Technical Authority (CTTA)</Term>
        <Definition>An experienced, technically qualified U.S. Government employee who has met established certification requirements in accordance with CNSS (NSTISSC)-approved criteria and has been appointed by a U.S. Government Department or Agency to fulfill CTTA responsibilities.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Certifier</Term>
        <Definition>Individual responsible for making a technical judgment of the system's compliance with stated requirements, identifying and assessing the risks associated with operating the system, coordinating the certification activities, and consolidating the final certification and accreditation packages.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CFD</Term>
        <Definition>Common Fill Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Challenge and Reply Authentication</Term>
        <Definition>Prearranged procedure in which a subject requests authentication of another and the latter establishes validity with a correct reply.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Checksum</Term>
        <Definition>Value computed on data to detect error or manipulation during transmission.  See hash total.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Check Word</Term>
        <Definition>Cipher text generated by cryptographic logic to detect failures in cryptography.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CIAC</Term>
        <Definition>Computer Incident Assessment Capability</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CIK</Term>
        <Definition>Crypto-Ignition Key</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CIO</Term>
        <Definition>Chief Information Officer</Definition>
    </Entry>
    <Entry>
        <Term>Cipher</Term>
        <Definition>Any cryptographic system in which arbitrary symbols or groups of symbols, represent units of plain text, or in which units of plain text are rearranged, or both.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cipher Text</Term>
        <Definition>Enciphered information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cipher Text Auto-Key (CTAK)</Term>
        <Definition>Cryptographic logic that uses previous cipher text to generate a key stream.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Ciphony</Term>
        <Definition>Process of enciphering audio information, resulting in encrypted speech.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CIRT</Term>
        <Definition>Computer Security Incident Response Team</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CKG</Term>
        <Definition>Cooperative Key Generation</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Classified Information</Term>
        <Definition>Information that has been determined pursuant to Executive Order 12958 or any predecessor Order, or by the Atomic Energy Act of 1954, as amended, to require protection against unauthorized disclosure and is marked to indicate its classified status.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Classified Information Spillage</Term>
        <Definition>Security incident that occurs whenever classified data is spilled either onto an unclassified IS or to an IS with a lower level of classification.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
        <Entry>
        <Term>Clearance</Term>
        <Definition>Formal security determination by an authorized adjudicative office that an individual is authorized access, on a need to know basis, to a specific level of collateral classified information (TOP SECRET, SECRET, CONFIDENTIAL).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Clearing</Term>
        <Definition>Removal of data from an IS, its storage devices, and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using common system capabilities (i.e., keyboard strokes); however, the data may be reconstructed using laboratory methods. Cleared media may be reused at the same classification level or at a higher level. Overwriting is one method of clearing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Client</Term>
        <Definition>Individual or process acting on behalf of an individual who makes requests of a guard or dedicated server. The client's requests to the guard or dedicated server can involve data transfer to, from, or through the guard or dedicated server.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Closed Security Environment</Term>
        <Definition>Environment providing sufficient assurance that applications and equipment are protected against the introduction of malicious logic during an IS life cycle.  Closed security is based upon a system's developers operators, and maintenance personnel having sufficient clearances, authorization, and configuration control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CM</Term>
        <Definition>configuration management</Definition>
    </Entry>
    <Entry>
        <Term>CMCS</Term>
        <Definition>COMSEC Material Control System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CNA</Term>
        <Definition>Computer Network Attack</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CND</Term>
        <Definition>Computer Network Defense</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CNSS</Term>
        <Definition>Committee on National Security Systems</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COA</Term>
        <Definition>course of action</Definition>
    </Entry>
    <Entry>
        <Term>Code</Term>
        <Definition>(COMSEC) System of communication in which arbitrary groups of letters, numbers, or symbols represent units of plain text of varying length.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Code Book</Term>
        <Definition>Document containing plain text and code equivalents in a systematic arrangement, or a technique of machine encryption using a word substitution technique.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Code Group</Term>
        <Definition>Group of letters, numbers, or both in a code system used to represent a plain text word, phrase, or sentence.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Code Vocabulary</Term>
        <Definition>Set of plain text words, numerals, phrases, or sentences for which code equivalents are assigned in a code system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COI</Term>
        <Definition>community of interest</Definition>
    </Entry>
    <Entry>
        <Term>Cold Start</Term>
        <Definition>Procedure for initially keying crypto-equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Collaborative Computing</Term>
        <Definition>Applications and technology (e.g., whiteboarding, group conferencing) that allow two or more individuals to share information real time in an inter- or intra-enterprise environment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Command Authority</Term>
        <Definition>Individual responsible for the appointment of user representatives for a department, agency, or organization and their key ordering privileges.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Commercial COMSEC Endorsement Program (CCEP)</Term>
        <Definition>Relationship between NSA and industry in which NSA provides the COMSEC expertise (i.e., standards, algorithms, evaluations, and guidance) and industry provides design, development, and production capabilities to produce a type 1 or type 2 product.  Products developed under the CCEP may include modules, subsystems, equipment, systems, and ancillary devices.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Common Criteria</Term>
        <Definition>Provides a comprehensive, rigorous method for specifying security function and assurance requirements for products and systems. (International Standard ISO/IEC 5408, Common Criteria for Information Technology Security Evaluation [ITSEC])</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Common Fill Device</Term>
        <Definition>One of a family of devices developed to read-in, transfer, or store key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Communications Cover</Term>
        <Definition>Concealing or altering of characteristic communications patterns to hide information that could be of value to an adversary.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Communications Deception</Term>
        <Definition>Deliberate transmission, retransmission, or alteration of communications to mislead an adversary's interpretation of the communications.  See imitative communications deception and manipulative communications deception.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Communications Profile</Term>
        <Definition>Analytic model of communications associated with an organization or activity.  The model is prepared from a systematic examination of communications content and patterns, the functions they reflect, and the communications security measures applied.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Communications Security (COMSEC)</Term>
        <Definition>Measures and controls taken to deny unauthorized individuals information derived from telecommunications and to ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security, emission security, and physical security of COMSEC material.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Community Risk</Term>
        <Definition>Probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that population.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Compartmentalization</Term>
        <Definition>A nonhierarchical grouping of sensitive information used to control access to data more finely than with hierarchical security classification alone.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Compartmented Mode</Term>
        <Definition>INFOSEC mode of operation wherein each user with direct or indirect access to a system, its peripherals, remote terminals, or remote hosts has all of the following:  a. Valid security clearance for the most restricted information processed in the system\s b. Formal access approval and signed non-disclosure agreements for that information to which a user is to have access\s  and c. Valid need-to-know for information to which a user is to have access.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Compromise</Term>
        <Definition>Type of incident where information is disclosed to unauthorized individuals or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Compromising Emanations</Term>
        <Definition>Unintentional signals that, if intercepted and analyzed, would disclose the information transmitted, received, handled, or otherwise processed by information systems equipment.  See TEMPEST.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMPUSEC</Term>
        <Definition>Computer Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Computer Abuse</Term>
        <Definition>Intentional or reckless misuse, alteration, disruption, or destruction of information processing resources.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Computer Cryptography</Term>
        <Definition>Use of a crypto-algorithm program by a computer to authenticate or encrypt/decrypt information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Computer Security</Term>
        <Definition>Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware, and information being processed, stored, and communicated.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Computer Security Incident</Term>
        <Definition>See incident.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Computer Security Subsystem</Term>
        <Definition>Hardware/software designed to provide computer security features in a larger system environment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Computing Environment</Term>
        <Definition>Workstation or server (host) and its operating system, peripherals, and applications.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC</Term>
        <Definition>Communications Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Account</Term>
        <Definition>Administrative entity, identified by an account number, used to maintain accountability, custody, and control of COMSEC material.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Account Audit</Term>
        <Definition>Examination of the holdings, records, and procedures of a COMSEC account ensuring all accountable COMSEC material is properly handled and safeguarded.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Aid</Term>
        <Definition>COMSEC material that assists in securing telecommunications and is required in the production, operation, or maintenance of COMSEC systems and their components.  COMSEC keying material, callsign/frequency systems, and supporting documentation, such as operating and maintenance manuals, are examples of COMSEC aids.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Assembly</Term>
        <Definition>Group of parts, elements, subassemblies, or circuits that are removable items of COMSEC equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Boundary</Term>
        <Definition>Definable perimeter encompassing all hardware, firmware, and software components performing critical COMSEC functions, such as key generation and key handling and storage.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Chip Set</Term>
        <Definition>Collection of NSA approved microchips.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Control Program</Term>
        <Definition>Computer instructions or routines controlling or affecting the externally performed functions of key generation, key distribution, message encryption/decryption, or authentication.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Custodian</Term>
        <Definition>Person designated by proper authority to be responsible for the receipt, transfer, accounting safeguarding, and destruction of COMSEC material assigned to a COMSEC account.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Demilitarization</Term>
        <Definition>Process of preparing COMSEC equipment for disposal by extracting all CCI, classified, or CRYPTO marked components for their secure destruction, as well as defacing and disposing of the remaining equipment hulk.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Element</Term>
        <Definition>Removable item of COMSEC equipment, assembly, or subassembly; normally consisting of a single piece or group of replaceable parts.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC End-Item</Term>
        <Definition>Equipment or combination of components ready for use in a COMSEC application.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Equipment</Term>
        <Definition>Equipment designed to provide security to telecommunications by converting information to a form unintelligible to an unauthorized interceptor and, subsequently, by reconverting such information to its original form for authorized recipients\s also, equipment designed specifically to aid in, or as an essential element of, the conversion process.  COMSEC equipment includes crypto-equipment, crypto-ancillary equipment, cryptoproduction equipment, and authentication equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Facility</Term>
        <Definition>Authorized and approved space used for generating, storing, repairing, or using COMSEC material.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Incident</Term>
        <Definition>See incident.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Insecurity</Term>
        <Definition>COMSEC incident that has been investigated, evaluated, and determined to jeopardize the security of COMSEC material or the secure transmission of information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Manager</Term>
        <Definition>Person who manages the COMSEC resources of an organization.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Material</Term>
        <Definition>Item designed to secure or authenticate telecommunications.  COMSEC material includes, but is not limited to key, equipment, devices, documents, firmware, or software that embodies or describes cryptographic logic and other items that perform COMSEC functions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Material Control System (CMCS)</Term>
        <Definition>Logistics and accounting system through which COMSEC material marked "CRYPTO" is distributed, controlled, and safeguarded.  Included are the COMSEC central offices of record, cryptologistic depots, and COMSEC accounts.  COMSEC material other than key may be handled through the COMSEC Material Control System.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Modification</Term>
        <Definition>See information systems security equipment modification.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Module</Term>
        <Definition>Removable component that performs COMSEC functions in a telecommunications equipment or system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Monitoring</Term>
        <Definition>Act of listening to, copying, or recording transmissions of one's own official telecommunications to analyze the degree of security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Profile</Term>
        <Definition>Statement of COMSEC measures and materials used to protect a given operation, system, or organization.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Survey</Term>
        <Definition>Organized collection of COMSEC and communications information relative to a given operation, system, or organization.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC System Data</Term>
        <Definition>Information required by a COMSEC equipment or system to enable it to properly handle and control key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COMSEC Training</Term>
        <Definition>Teaching of skills relating to COMSEC accounting, use of COMSEC aids, or installation, use, maintenance, and repair of COMSEC equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Concept of Operations (CONOP)</Term>
        <Definition>Document detailing the method, act, process, or effect of using an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Confidentiality</Term>
        <Definition>Assurance that information is not disclosed to unauthorized persons, processes, or devices.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Configuration Control</Term>
        <Definition>Process of controlling modifications to hardware, firmware, software, and documentation to ensure the IS is protected against improper modifications prior to, during, and after system implementation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Configuration Management</Term>
        <Definition>Management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Confinement Channel</Term>
        <Definition>See covert channel.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CONOP</Term>
        <Definition>Concept of Operations</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Contamination</Term>
        <Definition>Type of incident involving the introduction of data of one security classification or security category into data of a lower security classification or different security category.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Contingency Key</Term>
        <Definition>Key held for use under specific operational conditions or in support of specific contingency plans.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Contingency Plan</Term>
        <Definition>Plan maintained for emergency response, backup operations, and post-disaster recovery for an IS, to ensure the availability of critical resources and to facilitate the continuity of operations in an emergency situation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Continuity of Operations Plan (COOP)</Term>
        <Definition>Plan for continuing an organization's (usually a headquarters element) essential functions at an alternate site and performing those functions for the duration of an event with little or no loss of continuity before returning to normal operations.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Controlled Access Area</Term>
        <Definition>Physical area, (e.g., building, room, etc.) to which only authorized personnel are granted unrestricted access. All other personnel are either escorted by authorized personnel or are under continuous surveillance.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Controlled Access Protection</Term>
        <Definition>Minimum set of security functionality that enforces access control on individual users and makes them accountable for their actions through login procedures, auditing of security-related events, and resource isolation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Controlled Interface</Term>
        <Definition>Mechanism that facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Controlled Cryptographic Item (CCI)</Term>
        <Definition>Secure telecommunications or information handling equipment, or associated cryptographic component, that is unclassified but governed by a special set of control requirements.  Such items are marked "CONTROLLED CRYPTOGRAPHIC ITEM" or, where space is limited, "CCI.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Controlled Space</Term>
        <Definition>Three-dimensional space surrounding IS equipment, within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Controlling Authority</Term>
        <Definition>Official responsible for directing the operation of a cryptonet and for managing the operational use and control of keying material assigned to the cryptonet.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COOP</Term>
        <Definition>Continuity of Operations Plan</Definition>
    </Entry>
    <Entry>
        <Term>Cooperative Key Generation</Term>
        <Definition>Electronically exchanging functions of locally generated, random components, from which both terminals of a secure circuit construct traffic encryption key or key encryption key for use on that circuit.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cooperative Remote Rekeying</Term>
        <Definition>Synonymous with manual remote rekeying.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COP</Term>
        <Definition>common operational picture</Definition>
    </Entry>
    <Entry>
        <Term>COR</Term>
        <Definition>1.  Central Office of Record (COMSEC)  2.  Contracting Officer Representative</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Correctness Proof</Term>
        <Definition>A mathematical proof of consistency between a specification and its implementation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>COTS</Term>
        <Definition>Commercial-off-the-shelf</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Countermeasure</Term>
        <Definition>Action, device, procedure, technique, or other measure that reduces the vulnerability of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Covert Channel</Term>
        <Definition>Unintended and/or unauthorized communications path that can be used to transfer information in a manner that violates an IS security policy.  See overt channel and exploitable channel.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Covert Channel Analysis</Term>
        <Definition>Determination of the extent to which the security policy model and subsequent lower-level program descriptions may allow unauthorized access to information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Covert Storage Channel</Term>
        <Definition>Covert channel involving the direct or indirect writing to a storage location by one process and the direct or indirect reading of the storage location by another process.  Covert storage channels typically involve a finite resource (e.g., sectors on a disk) that is shared by two subjects at different security levels.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Covert Timing Channel</Term>
        <Definition>Covert channel in which one process signals information to another process by modulating its own use of system resources (e.g., central processing unit time) in such a way that this manipulation affects the real response time observed by the second process.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CPS</Term>
        <Definition>COMSEC Parent Switch</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CPU</Term>
        <Definition>Central Processing Unit</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Credentials</Term>
        <Definition>Information, passed from one entity to another, used to establish the sending entity's access rights.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Critical Infrastructures</Term>
        <Definition>Systems and assets, whether the physical or virtual, so vital to the U.S. that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national public health or safety, or any combination of those matters.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CRL</Term>
        <Definition>Certificate Revocation List </Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cross Domain Solution</Term>
        <Definition>Information assurance solution that provides the ability to access of transfer information between two or more security domains.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptanalysis</Term>
        <Definition>Operations performed in converting encrypted messages to plain text without initial knowledge of the crypto-algorithm and/or key employed in the encryption.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CRYPTO</Term>
        <Definition>Marking or designator identifying COMSEC keying material used to secure or authenticate telecommunications carrying classified or sensitive U.S. Government or U.S. Government-derived information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Crypto-Alarm</Term>
        <Definition>Circuit or device that detects failures or aberrations in the logic or operation of crypto-equipment.  Crypto-alarm may inhibit transmission or may provide a visible and/or audible alarm.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Crypto-Algorithm</Term>
        <Definition>Well-defined procedure or sequence of rules or steps, or a series of mathematical equations used to describe cryptographic processes such as encryption/decryption, key generation, authentication, signatures, etc.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Crypto-Ancillary Equipment</Term>
        <Definition>Equipment designed specifically to facilitate efficient or reliable operation of crypto-equipment, without performing cryptographic functions itself.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Crypto-Equipment</Term>
        <Definition>Equipment that embodies a cryptographic logic.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptographic</Term>
        <Definition>Pertaining to, or concerned with, cryptography.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptographic Component</Term>
        <Definition>Hardware or firmware embodiment of the cryptographic logic.  A cryptographic component may be a modular assembly, a printed wiring assembly, a microcircuit, or a combination of these items.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptographic Equipment Room</Term>
        <Definition>Controlled-access room in which cryptosystems are located.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptographic Initialization</Term>
        <Definition>Function used to set the state of a cryptographic logic prior to key generation, encryption, or other operating mode.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptographic Logic</Term>
        <Definition>The embodiment of one (or more) crypto-algorithm(s) along with alarms, checks, and other processes essential to effective and secure performance of the cryptographic process(es).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptographic Randomization</Term>
        <Definition>Function that randomly determines the transmit state of a cryptographic logic.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptography</Term>
        <Definition>Art or science concerning the principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Crypto-Ignition Key (CIK)</Term>
        <Definition>Device or electronic key used to unlock the secure mode of crypto-equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptology</Term>
        <Definition>Field encompassing both cryptography and cryptanalysis.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptonet</Term>
        <Definition>Stations holding a common key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptoperiod</Term>
        <Definition>Time span during which each key setting remains in effect.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptosecurity</Term>
        <Definition>Component of COMSEC resulting from the provision of technically sound cryptosystems and their proper use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptosynchronization</Term>
        <Definition>Process by which a receiving decrypting cryptographic logic attains the same internal state as the transmitting encrypting logic.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptosystem</Term>
        <Definition>Associated INFOSEC items interacting to provide a single means of encryption or decryption.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptosystem Analysis</Term>
        <Definition>Process of establishing the exploitability of a cryptosystem, normally by reviewing transmitted traffic protected or secured by the system under study.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptosystem Evaluation</Term>
        <Definition>Process of determining vulnerabilities of a cryptosystem.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptosystem Review</Term>
        <Definition>Examination of a cryptosystem by the controlling authority ensuring its adequacy of design and content, continued need, and proper distribution.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cryptosystem Survey</Term>
        <Definition>Management technique in which actual holders of a cryptosystem express opinions on the system's suitability and provide usage information for technical evaluations.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CSE</Term>
        <Definition>Communications Security Element</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CSP</Term>
        <Definition>Cybersecurity Service Provider</Definition>
    </Entry>
    <Entry>
        <Term>CSS</Term>
        <Definition>1. COMSEC Subordinate Switch  2. Constant Surveillance Service (Courier)  3. Continuous Signature Service (Courier)  4. Coded Switch System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CSSO</Term>
        <Definition>Contractor Special Security Officer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CSTVRP</Term>
        <Definition>Computer Security Technical Vulnerability Report Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CTAK</Term>
        <Definition>Cipher Text Auto-Key</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term><![CDATA[CT&#x0026;E]]></Term>
        <Definition>Certification Test and Evaluation</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CTTA</Term>
        <Definition>Certified TEMPEST Technical Authority</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>CUI</Term>
        <Definition>Controlled Unclassified Information</Definition>
    </Entry>
    <Entry>
        <Term>CUP</Term>
        <Definition>COMSEC Utility Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cybersecurity</Term>
        <Definition>The ability to protect or defend the use of cyberspace from cyber attacks.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Cyberspace Defense</Term>
        <Definition>Actions taken to defend against unauthorized activity within computer networks. Cyberspace defense includes protection, monitoring, detection and analysis, response and sustainment services.</Definition>
    </Entry>
	<Entry>
        <Term>Cyclic Redundancy Check</Term>
        <Definition>Error checking mechanism that checks data integrity by computing a polynomial algorithm based checksum.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry></Section>
<Section Letter="D">
    <Entry>
        <Term>DAA</Term>
        <Definition>Designated Accrediting Authority</Definition>
    </Entry>
    <Entry>
        <Term>DAA</Term>
        <Definition>Designated Approving Authority</Definition>
    </Entry>
    <Entry>
        <Term>DAC</Term>
        <Definition>Discretionary Access Control</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DAMA</Term>
        <Definition>Demand Assigned Multiple Access</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Data Aggregation</Term>
        <Definition>Compilation of unclassified individual data systems and data elements that could result in the totality of the information being classified or of beneficial use to an adversary.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Data Encryption Standard (DES)</Term>
        <Definition>Cryptographic algorithm, designed for the protection of unclassified data and published by the National Institute of Standards and Technology (NIST) in Federal Information Processing Standard (FIPS) Publication 46.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Data Flow Control</Term>
        <Definition>Synonymous with information flow control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Data Integrity</Term>
        <Definition>Condition that exists when data is unchanged from its source and has not been accidentally or maliciously modified, altered, or destroyed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Data Origin Authentication</Term>
        <Definition>Corroborating the source of data is as claimed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Data Security</Term>
        <Definition>The protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Data Transfer Device (DTD)</Term>
        <Definition>Fill device designed to securely store, transport, and transfer electronically both COMSEC and TRANSEC key, designed to be backward compatible with the previous generation of COMSEC common fill devices, and programmable to support modern mission systems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DCID</Term>
        <Definition>Director Central Intelligence Directive</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DCIO</Term>
        <Definition>Defense Criminal Investigative Office</Definition>
    </Entry>
    <Entry>
        <Term>DCS</Term>
        <Definition>1.  Defense Communications System  2.  Defense Courier Service</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DDS</Term>
        <Definition>Dual Driver Service (Courier)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Decertification</Term>
        <Definition>Revocation of the certification of an IS item or equipment for cause.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Decipher</Term>
        <Definition>Convert enciphered text to plain text by means of a cryptographic system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Decode</Term>
        <Definition>Convert encoded text to plain text by means of a code.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Decrypt</Term>
        <Definition>Generic term encompassing decode and decipher.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Dedicated Mode</Term>
        <Definition>IS security mode of operation wherein each user, with direct or indirect access to the system, its peripherals, remote terminals, or remote hosts, has all of the following:  a. valid security clearance for all information within the system\s  b. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments, and/or special access programs)\s and  c. valid need-to-know for all information contained within the IS.  When in the dedicated security mode, a system is specifically and exclusively dedicated to and controlled for the processing of one particular type or classification of information, either for full-time operation or for a specified period of time.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Default Classification</Term>
        <Definition>Temporary classification reflecting the highest classification being processed in an IS.  Default classification is included in the caution statement affixed to an object.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Defense-in-depth</Term>
        <Definition>IA strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and dimensions of networks. Synonymous with security-in-depth.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Degaussing</Term>
        <Definition>Procedure that reduces the magnetic flux to virtual zero by applying a reverse magnetizing field.  Also called demagnetizing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Delegated Development Program</Term>
        <Definition>INFOSEC program in which the Director, National Security Agency, delegates, on a case by case basis, the development and/or production of an entire telecommunications product, including the INFOSEC portion, to a lead department or agency.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Denial of Service</Term>
        <Definition>Any action or series of actions that prevents any part of an IS from functioning.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Department of Defense information networks (DoDIN)</Term>
        <Definition>The globally interconnected, end-to-end set of information capabilities, and associated processes for collecting, processing, storing, disseminating, and managing information on-demand to warfighters, policy makers, and support personnel, including owned and leased communications and computing systems and services, software (including applications), data, and security.</Definition>
        <Source>Joint Publication 1-02</Source>
    </Entry>
    <Entry>
        <Term>DES</Term>
        <Definition>Data Encryption Standard</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Descriptive Top-Level Specification</Term>
        <Definition>Top-level specification written in a natural language (e.g., English), and informal design notation, or a combination of the two.  Descriptive top-level specification, required for a class B2 and B3 (as defined in the Orange Book, Department of Defense Trusted Computer System Evaluation Criteria, DoD 5200.28-STD) information system, completely and accurately describes a trusted computing base.  See formal top-level specification.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Designated Approval Authority</Term>
        <Definition>Official with the authority to formally assume responsibility for operating a system at an acceptable level of risk.  This term is synonymous with authorizing official, designated accrediting authority, and delegated accrediting authority.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DIA</Term>
        <Definition>Defense Intelligence Agency</Definition>
    </Entry>
    <Entry>
        <Term>Dial Back</Term>
        <Definition>Synonymous with call back.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Digital Signature</Term>
        <Definition>Cryptographic process used to assure message originator authenticity, integrity, and nonrepudiation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Digital Signature Algorithm</Term>
        <Definition>Procedure that appends data to, or performs a cryptographic transformation of, a data unit.  The appended data or cryptographic transformation allows reception of the data unit and protects against forgery, e.g., by the recipient.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Direct Shipment</Term>
        <Definition>Shipment of COMSEC material directly from NSA to user COMSEC accounts.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DISA</Term>
        <Definition>Defense Information Systems Agency</Definition>
    </Entry>
    <Entry>
        <Term>Disaster Recovery Plan</Term>
        <Definition>Provides for the continuity of system operations after a disaster.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Discretionary Access Control (DAC)</Term>
        <Definition>Means of restricting access to objects based on the identity and need-to-know of users and/or groups to which the object belongs.  Controls are discretionary in the sense that a subject with the certain access permission is capable of passing that permission (directly or indirectly) to any other subject.  See mandatory access control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DISN</Term>
        <Definition>Defense Information System Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Distinguished Name</Term>
        <Definition>Globally unique identifier representing an individual's identity.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DITSCAP</Term>
        <Definition>DoD Information Technology Security Certification and Accreditation Process</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DLED</Term>
        <Definition>Dedicated Loop Encryption Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DMA</Term>
        <Definition>Direct Memory Access</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DMS</Term>
        <Definition>Direct Memory System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DMZ (Demilitarized Zone)</Term>
        <Definition>Perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network's IA policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks. A DMZ is also called a "screened subnet.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DNI</Term>
        <Definition>Director of National Intelligence</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DoD</Term>
        <Definition>Department of Defense</Definition>
    </Entry>
    <Entry>
        <Term>DoDIN</Term>
        <Definition>Department of Defense information networks</Definition>
        <Source>Joint Publication 1-02</Source>
    </Entry>
    <Entry>
        <Term>Domain</Term>
        <Definition>System or group of systems operating under a common security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DPL</Term>
        <Definition>Degausser Products List (a section in the INFOSEC Products and Services Catalogue)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Drop Accountability</Term>
        <Definition>Procedure under which a COMSEC account custodian initially receipts a COMSEC material and then provides no further accounting for it to its central office of record.  Local accountability of the COMSEC material may continue to be required.  See accounting legend code.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DRP</Term>
        <Definition>Disaster Recovery Plan</Definition>
    </Entry>
    <Entry>
        <Term>DSA</Term>
        <Definition>Digital Signature Algorithm</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DSN</Term>
        <Definition>Defense Switched Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DSVT</Term>
        <Definition>Digital Subscriber Voice Terminal</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DTD</Term>
        <Definition>Data Transfer Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DTLS</Term>
        <Definition>Descriptive Top-Level Specification</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DTS</Term>
        <Definition>Diplomatic Telecommunications Service</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>DUA</Term>
        <Definition>Directory User Agent</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="E">
    <Entry>
        <Term>EAM</Term>
        <Definition>Emergency Action Message</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ECCM</Term>
        <Definition>Electronic Counter-Countermeasures</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ECM</Term>
        <Definition>Electronic Countermeasures</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ECPL</Term>
        <Definition>Endorsed Cyptographic Products List (a section in the Information Systems Security Products and Services Catalogue)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>EDAC</Term>
        <Definition>Error Detection and Correction</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>EFD</Term>
        <Definition>Electronic Fill Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>EFTO</Term>
        <Definition>Encrypt For Transmission Only</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>EKMS</Term>
        <Definition>Electronic Key Management System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Electronic Generated Key</Term>
        <Definition>Key generated in a COMSEC device by introducing (either mechanically or electronically) a seed key into the device and then using the seed, together with a software algorithm stored in the device, to produce the desired key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Electronic Key Management System (EKMS)</Term>
        <Definition>Interoperable collection of systems being developed by services and agencies of the U.S. Government to automate the planning, ordering, generating, distributing, storing, filling, using, and destroying of electronic key and management of other types of COMSEC material.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Electronic Messaging Services</Term>
        <Definition>Services providing interpersonal messaging capability\s meeting specific functional, management, and technical requirements\s and yielding a business-quality electronic mail service suitable for the conduct of official government business.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Electronic Security (ELSEC)</Term>
        <Definition>Protection resulting from measures designed to deny unauthorized persons information derived from the interception and analysis of noncommunications electromagnetic radiations.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Electronic Signature</Term>
        <Definition>See digital signature.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Element</Term>
        <Definition>Removable item of COMSEC equipment, assembly, or subassembly\s normally consisting of a single piece or group of replaceable parts.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ELINT</Term>
        <Definition>Electronic Intelligence</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Embedded Computer</Term>
        <Definition>Computer system that is an integral part of a larger system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Embedded Cryptographic System</Term>
        <Definition>Cryptosystem performing or controlling a function as an integral element of a larger system or subsystem.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Embedded Cryptography</Term>
        <Definition>Cryptography engineered into an equipment or system whose basic function is not cryptographic.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Emissions Security (EMSEC)</Term>
        <Definition>Protection resulting from measures taken to deny unauthorized persons information derived from intercept and analysis of compromising emanations from crypto-equipment or an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>E Model</Term>
        <Definition>Engineering Development Model</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Encipher</Term>
        <Definition>Convert plain text to cipher text by means of a cryptographic system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Enclave</Term>        
		<Definition>Collection of computing environments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Enclave Boundary</Term>
        <Definition>Point at which an enclave's internal network service layer connects to an external network's service layer, i.e., to another enclave or to a Wide Area Network (WAN).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Encode</Term>
        <Definition>Convert plain text to cipher text by means of a code.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Encrypt</Term>
        <Definition>Generic term encompassing encipher and encode.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Encryption Algorithm</Term>
        <Definition>Set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>End-Item Accounting</Term>
        <Definition>Accounting for all the accountable components of a COMSEC equipment configuration by a single short title.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Endorsed for Unclassified Cryptographic Item</Term>
        <Definition>Unclassified cryptographic equipment that embodies a U.S. Government classified cryptographic logic and is endorsed by NSA for the protection of national security information.  See type 2 product.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Endorsement</Term>
        <Definition>NSA approval of a commercially developed product for safeguarding national security information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>End-to-End Encryption</Term>
        <Definition>Encryption of information at its origin and decryption at its intended destination without intermediate decryption.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>End-to-End Security</Term>
        <Definition>Safeguarding information in an IS from point of origin to point of destination.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Entrapment</Term>
        <Definition>Deliberate planting of apparent flaws in an IS for the purpose of detecting attempted penetrations.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Environment</Term>
        <Definition>Aggregate of external procedures, conditions, and objects affecting the development, operation, and maintenance of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>EPL</Term>
        <Definition>Evaluated Products List (a section in the INFOSEC Products and Services Catalogue)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Erasure</Term>
        <Definition>Process intended to render magnetically stored information irretrievable by normal means.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ERTZ</Term>
        <Definition>Equipment Radiation TEMPEST Zone</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ETA</Term>
        <Definition>Education, Training, and Awareness</Definition>
    </Entry>
    <Entry>
        <Term>ETPL</Term>
        <Definition>Endorsed TEMPEST Products List</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Evaluation Assurance Level (EAL)</Term>
        <Definition>Set of assurance requirements that represent a point on the Common Criteria predefined assurance scale.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Event</Term>
        <Definition>Occurrence, not yet assessed, that may affect the performance of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Executive State</Term>
        <Definition>One of several states in which an IS may operate, and the only one in which certain privileged instructions may be executed.  Such privileged instructions cannot be executed when the system is operating in other (e.g., user) states.  Synonymous with supervisor state.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Exercise Key</Term>
        <Definition>Key used exclusively to safeguard communications transmitted over-the-air during military or organized civil training exercises.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Exploitable Channel</Term>
        <Definition>Channel that allows the violation of the security policy governing an IS and is usable or detectable by subjects external to the trusted computing base.  See covert channel.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Extraction Resistance</Term>
        <Definition>Capability of crypto-equipment or secure telecommunications equipment to resist efforts to extract key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Extranet</Term>
        <Definition>Extension to the intranet allowing selected outside users access to portions of an organization's intranet.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="F">
    <Entry>
        <Term>Fail Safe</Term>
        <Definition>Automatic protection of programs and/or processing systems when hardware or software failure is detected.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Fail Soft</Term>
        <Definition>Selective termination of affected nonessential processing when hardware or software failure is determined to be imminent.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Failure Access</Term>
        <Definition>Unauthorized access to data resulting from hardware or software failure.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Failure Control</Term>
        <Definition>Methodology used to detect imminent hardware or software failure and provide fail safe or fail soft recovery.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FDIU</Term>
        <Definition>Fill Device Interface Unit</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>File Protection</Term>
        <Definition>Aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>File Security</Term>
        <Definition>Means by which access to computer files is limited to authorized users only.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Fill Device</Term>
        <Definition>COMSEC item used to transfer or store key in electronic form or to insert key into a crypto-equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FIPS</Term>
        <Definition>Federal Information Processing Standard</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FIREFLY</Term>
        <Definition>Key management protocol based on public key cryptography.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Firewall</Term>
        <Definition>System designed to defend against unauthorized access to or from a private network.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Firmware</Term>
        <Definition>Program recorded in permanent or semipermanent computer memory.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Fixed COMSEC Facility</Term>
        <Definition>COMSEC facility located in an immobile structure or aboard a ship.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Flaw</Term>
        <Definition>Error of commission, omission, or oversight in an IS that may allow protection mechanisms to be bypassed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Flaw Hypothesis Methodology</Term>
        <Definition>System analysis and penetration technique in which the specification and documentation for an IS are analyzed to produce a list of hypothetical flaws.  The list is prioritized on the basis of the estimated probability that a flaw exists on the ease of exploiting it, and on the extent of control or compromise it would provide.  The prioritized list is used to perform penetration testing of a system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Flooding</Term>
        <Definition>Type of incident involving insertion of a large volume of data resulting in denial of service.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FOCI</Term>
        <Definition>Foreign Owned, Controlled or Influenced</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Formal Access Approval</Term>
        <Definition>Process for authorizing access to classified or sensitive information with specified access requirements, such as Sensitive Compartmented Information (SCI) or Privacy Data, based on the specified access requirements and a determination of the individual's security eligibility and need-to-know.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Formal Development Methodology</Term>
        <Definition>Software development strategy that proves security design specifications.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Formal Method</Term>
        <Definition>Mathematical argument which verifies that the system satisfies a mathematically described security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Formal Proof</Term>
        <Definition>Complete and convincing mathematical argument presenting the full logical justification for each proof step and for the truth of a theorem or set of theorems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Formal Security Policy Model</Term>
        <Definition>Mathematically precise statement of a security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Formal Top-Level Specification</Term>
        <Definition>Top-level specification written in a formal mathematical language to allow theorems, showing the correspondence of the system specification to its formal requirements, to be hypothesized and formally proven.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Formal Verification</Term>
        <Definition>Process of using format proofs to demonstrate the consistency between formal specification of a system and formal security policy model (design verification) or between formal specification and its high-level program implementation (implementation verification).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FOUO</Term>
        <Definition>For Official Use Only</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Frequency Hopping</Term>
        <Definition>Repeated switching of frequencies during radio transmission according to a specified algorithm, to minimize unauthorized interception or jamming of telecommunications.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Front-End Security Filter</Term>
        <Definition>Security filter logically separated from the remainder of an IS to protect system integrity.  Synonymous with firewall.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FSRS</Term>
        <Definition>Functional Security Requirements Specification</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FSTS</Term>
        <Definition>Federal Secure Telephone Service</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FTAM</Term>
        <Definition>File Transfer Access Management</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>FTLS</Term>
        <Definition>Formal Top-Level Specification</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Full Maintenance</Term>
        <Definition>Complete diagnostic repair, modification, and overhaul of INFOSEC equipment, including repair of defective assemblies by piece part replacement.  Also known as depot maintenance.  See limited maintenance.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Functional Proponent</Term>
        <Definition>See network sponsor.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Functional Testing</Term>
        <Definition>Segment of security testing in which advertised security mechanisms of an IS are tested under operational conditions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="G">
    <Entry>
        <Term>Gateway</Term>
        <Definition>Interface providing a compatibility between networks by converting transmission speeds, protocols, codes, or security measures.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>GCCS</Term>
        <Definition>Global Command and Control System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>GENSER</Term>
        <Definition>general service</Definition>
    </Entry>
    <Entry>
        <Term>GETS</Term>
        <Definition>Government Emergency Telecommunications Service</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Global Information Grid</Term>
        <Definition>The globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating, and managing information on demand to war fighters, policy makers, and support personnel.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Global Information Infrastructure</Term>
        <Definition>Worldwide interconnections of the information systems of all countries, international and multinational organizations, and international commercial communications.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>GOTS</Term>
        <Definition>Government-Off-The-Shelf</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>GPS</Term>
        <Definition>Global Positioning System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>GTS</Term>
        <Definition>Global Telecommunications Service</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Guard</Term>
        <Definition>Mechanism limiting the exchange of information between systems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>GWEN</Term>
        <Definition>Ground Wave Emergency Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Gypsy Verification Environment</Term>
        <Definition>Integrated set of software tools for specifying, coding, and verifying programs written in the Gypsy language.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section><Section Letter="H">
    <Entry>
        <Term>Hacker</Term>
        <Definition>Unauthorized user who attempts or gains access to an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Handshaking Procedures</Term>
        <Definition>Dialogue between two IS's for synchronizing, identifying, and authenticating themselves to one another.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Hard Copy Key</Term>
        <Definition>Physical keying material, such as printed key lists, punched or printed key tapes, or programmable, read-only memories (PROM).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Hardwired Key</Term>
        <Definition>Permanently installed key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Hash Total</Term>
        <Definition>Value computed on data to detect error or manipulation.  See checksum.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Hashing</Term>
        <Definition>Computation of a hash total.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Hashword</Term>
        <Definition>Memory address containing hash total.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>HBSS</Term>
        <Definition>host-based security system</Definition>
    </Entry>
    <Entry>
        <Term>HIDS</Term>
        <Definition>host-based intrusion detection system</Definition>
    </Entry>
    <Entry>
        <Term>High Assurance Guard</Term>
        <Definition>Device comprised of both hardware and software that is designed to enforce security rules during the transmission of X.400 message and X.500 directory traffic between enclaves of different classification levels (e.g., UNCLASSIFIED and SECRET).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="I">
    <Entry>
        <Term>IA</Term>
        <Definition>Information Assurance</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>I&#x0026;A</Term>
        <Definition>Identification and Authentication</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IA Architecture</Term>
        <Definition>Framework that assigns and portrays IA roles and behavior among all IT assets, and prescribes rules for interaction and interconnection.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IA-Enabled Information Technology Product</Term>
        <Definition>Product or technology whose primary role is not security, but which provides security services as an associated feature of its intended operating capabilities.  Examples include such products as security-enabled web browsers, screening routers, trusted operating systems, and security-enabled messaging systems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IAM</Term>
        <Definition>information assurance manager</Definition>
    </Entry>
    <Entry>
        <Term>IATO</Term>
        <Definition>Interim Approval to Operate</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IAVA</Term>
        <Definition>information assurance vulnerability alert</Definition>
    </Entry>
    <Entry>
        <Term>IAVB</Term>
        <Definition>information assurance vulnerability bulletin</Definition>
    </Entry>
    <Entry>
        <Term>IAVM</Term>
        <Definition>information assurance vulnerability management</Definition>
    </Entry>
    <Entry>
        <Term>IBAC</Term>
        <Definition>Identity based Access Control</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IC</Term>
        <Definition>Intelligence Community</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ICU</Term>
        <Definition>Interface Control Unit</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Identification</Term>
        <Definition>Process that an IS uses to recognize an entity.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Identity Token</Term>
        <Definition>Smart card, metal key, or other physical object used to authenticate identity.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Identity Validation</Term>
        <Definition>Tests enabling an IS to authenticate users or resources.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IDM/CS</Term>
        <Definition>Information Dissemination Management/Content Staging</Definition>
    </Entry>
    <Entry>
        <Term>IDS</Term>
        <Definition>Intrusion Detection System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IEMATS</Term>
        <Definition>Improved Emergency Message Automatic Transmission System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IFF</Term>
        <Definition>Identification, Friend or Foe</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IFFN</Term>
        <Definition>Identification, Friend, Foe, or Neutral</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ILS</Term>
        <Definition>Integrated Logistics Support</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Imitative Communications Deception</Term>
        <Definition>Introduction of deceptive messages or signals into an adversary's telecommunications signals.  See communications deception and manipulative communications deception.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Impersonating</Term>
        <Definition>Form of spoofing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Implant</Term>
        <Definition>Electronic device or electronic equipment modification designed to gain unauthorized interception of information-bearing emanations.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Inadvertent Disclosure</Term>
        <Definition>Accidental exposure of information to a person not authorized access.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Incident</Term>
        <Definition>(IS) Assessed occurrence having actual or potentially adverse effects on an IS. (COMSEC) Occurrence that potentially jeopardizes the security of COMSEC material or the secure electronic transmission of national security information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Incomplete Parameter Checking</Term>
        <Definition>System flaw that exists when the operating system does not check all parameters fully for accuracy and consistency, thus making the system vulnerable to penetration.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Indicator</Term>
        <Definition>Recognized action, specific, generalized, or theoretical, that an adversary might be expected to take in preparation for an attack.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Individual Accountability</Term>
        <Definition>Ability to associate positively the identity of a user with the time, method and degree of access to an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>INFOCON</Term>
        <Definition>Information Operation Condition</Definition>
    </Entry>
    <Entry>
        <Term>Informal Security Policy</Term>
        <Definition>Natural language description, possibly supplemented by mathematical arguments, demonstrating the correspondence of the functional specification to the high level design.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Assurance (IA)</Term>
        <Definition>Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Assurance Manager (IAM)</Term>
        <Definition>See information systems security manager.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Assurance Officer (IAO)</Term>
        <Definition>See information systems security officer.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Assurance Product</Term>
        <Definition>Product or technology whose primary purpose is to provide security services (e.g., confidentiality, authentication, integrity, access control, non-repudiation of data) correct known vulnerabilities; and/or provide layered defense against various categories of non-authorized or malicious penetrations of information systems or networks. Examples include such products as data/network encryptors, firewalls, and intrusion detection devices.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Environment</Term>
        <Definition>Aggregate of individuals, organizations, or systems that collect, process or disseminate information, also included is the information itself.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Flow Control</Term>
        <Definition>Procedure to ensure that information transfers within an IS are not made from a higher security level object to an object of a lower security level.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Operations</Term>
        <Definition>Actions taken to affect adversary information and ISs while defending one's own information and ISs.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Owner</Term>
        <Definition>Official with statutory or operational authority for specified information and responsibility for establishing the controls for its generation, collection, processing, dissemination, and disposal.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Security Policy</Term>
        <Definition>Aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information System (IS)</Term>
        <Definition>Set of information resources organized for the collection, storage, processing, maintenance, use, sharing, dissemination, disposition, display, or transmission of information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Systems Security (INFOSEC)</Term>
        <Definition>Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Systems Security Engineering (ISSE)</Term>
        <Definition>Process that captures and refines information protection requirements and ensures their integration into IT acquisition processes through purposeful security design or configuration.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Systems Security Equipment Modification</Term>
        <Definition>Modification of any fielded hardware, firmware, software, or portion thereof, under NSA configuration control.  There are three classes of modifications:  Mandatory (to include human safety)\s optional/special mission modifications\s and repair actions.  These classes apply to elements, subassemblies, equipment, systems, and software packages performing functions such as key generation, key distribution, message encryption, decryption, authentication, or those mechanisms necessary to satisfy security policy, labeling, identification, or accountability.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Systems Security Manager (ISSM)</Term>
        <Definition>Individual responsible for a program, organization, system, or enclave's information assurance program.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Systems Security Officer (ISSO)</Term>
        <Definition>Individual responsible to the ISSM for ensuring the appropriate operational IA posture is maintained for a system, program, or enclave.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Information Systems Security Product</Term>
        <Definition>Item (chip, module, assembly, or equipment), technique, or service that performs or relates to information systems security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>INFOSEC</Term>
        <Definition>Information Systems Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Initialize</Term>
        <Definition>Setting the state of a cryptographic logic prior to key generation, encryption, or other operating mode.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Inspectable Space</Term>
        <Definition>Three dimensional space surrounding equipment that process classified and/or sensitive information within which TEMPEST exploitation is not considered practical or where legal authority to identify and/or remove a potential TEMPEST exploitation exists.  Synonymous with zone of control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Integrity</Term>
        <Definition>The property whereby an entity has not been modified in an unauthorized manner. NIST SP 800-53: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Integrity Check Value</Term>
        <Definition>Checksum capable of detecting modification of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Interconnection Security Agreement</Term>
        <Definition>Written management authorization to interconnect information systems based upon acceptance of risk and implementation of established controls.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Inter-domain Connections</Term>
        <Definition>Connections between domains of different classifications for the purpose of transferring data through controlled interfaces.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Interface</Term>
        <Definition>Common boundary between independent systems or modules where interactions take place.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Interface Control Document</Term>
        <Definition>Technical document describing interface controls and identifying the authorities and responsibilities for ensuring the operation of such controls.  This document is baselined during the preliminary design review and is maintained throughout the IS lifecycle.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Interim Approval to Operation (IATO)</Term>
        <Definition>Temporary authorization granted by a DAA for an IS to process information based on preliminary results of a security evaluation of the system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Interim Approval to Test (IATT)</Term>
        <Definition>Temporary authorization to test an information system in a specified operational information environment within the timeframe and under the conditions and constraints enumerated in the written authorization. IS to process information based on preliminary results of a security evaluation of the system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Internal Security Controls</Term>
        <Definition>Hardware, firmware, or software features within an IS that restrict access to resources only to authorized subjects.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Internet Protocol (IP)</Term>
        <Definition>Standard protocol for transmission of data from source to destinations in packet-switched communications network and interconnected systems of such networks.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Internetwork Private Line Interface</Term>
        <Definition>Network cryptographic unit that provides secure connections, singularly or in simultaneous multiple connections, between a host and a predetermined set of corresponding hosts.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
        <Entry>
        <Term>IO</Term>
        <Definition>Information Operations</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IP</Term>
        <Definition>Internet Protocol</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IPM</Term>
        <Definition>Interpersonal Messaging</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IPS</Term>
        <Definition>Intrusion Protection System</Definition>
    </Entry>
    <Entry>
        <Term>IPSO</Term>
        <Definition>Internet Protocol Security Option</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IS</Term>
        <Definition>Information System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ISDN</Term>
        <Definition>Integrated Services Digital Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ISO</Term>
        <Definition>International Standards Organization</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ISS</Term>
        <Definition>Information Systems Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ISSE</Term>
        <Definition>Information System Security Engineer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ISSM</Term>
        <Definition>Information System Security Manager</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ISSO</Term>
        <Definition>Information System Security Officer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>IT</Term>
        <Definition>Information Technology</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ITAR</Term>
        <Definition>International Traffic in Arms Regulation</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ITSEC</Term>
        <Definition>Information Technology Security Evaluation Criteria</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>I&W</Term>
        <Definition>Indications and Warnings</Definition>
    </Entry>
</Section>
<Section Letter="J">
    <Entry>
        <Term>JIE</Term>
        <Definition>Joint Information Environment</Definition>
        <Source>Charter for the Joint Information Environment Management Construct</Source>
    </Entry>
    <Entry>
        <Term>JIMS</Term>
        <Definition>Joint Incident Management System</Definition>
    </Entry>
    <Entry>
        <Term>Joint Information Environment (JIE)</Term>
        <Definition>A secure joint information environment comprised of shared information technology (IT) infrastructure, enterprise services, and a single security architecture to achieve full spectrum superiority, improve mission effectiveness, increase security and realize IT efficiencies. </Definition>
        <Source>Charter for the Joint Information Environment Management Construct</Source>
    </Entry>
    <Entry>
        <Term>JWICS</Term>
        <Definition>Joint Worldwide Intelligence Communications System</Definition>
    </Entry>
</Section>
<Section Letter="K">
    <Entry>
        <Term>KAK</Term>
        <Definition>Key-Auto-Key</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KEK</Term>
        <Definition>Key Encryption Key</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key</Term>
        <Definition>Usually a sequence of random or pseudorandom bits used initially to set up and periodically change the operations performed in crypto-equipment for the purpose of encrypting or decrypting electronic signals, or for determining electronic counter-countermeasures patterns, or for producing other key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key-Auto-Key</Term>
        <Definition>Cryptographic logic using previous key to produce key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Distribution Center (KDC)</Term>
        <Definition>COMSEC facility generating and distributing key in electrical form.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key-Encryption-Key (KEK)</Term>
        <Definition>Key that encrypts or decrypts other key for transmission or storage.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Exchange</Term>
        <Definition>Process of exchanging public keys (and other information) in order to establish secure communications.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key List</Term>
        <Definition>Printed series of key settings for a specific cryptonet.  Key lists may be produced in list, pad, or printed tape format.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Management Infrastructure (KMI)</Term>
        <Definition>Framework and services that provide the generation, production, storage, protection, distribution, control, tracking, and destruction for all cryptographic key material, symmetric keys as well as public keys and public key certificates.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Pair</Term>
        <Definition>Public Key and its corresponding private key as used in public key cryptography.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Production Key (KPK)</Term>
        <Definition>Key used to initialize a keystream generator for the production of other electronically generated key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Recovery</Term>
        <Definition>Mechanisms and processes that allow authorized parties to retrieve the cryptographic key used for data confidentially.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Stream</Term>
        <Definition>Sequence of symbols (or their electrical or mechanical equivalents) produced in a machine or auto-manual cryptosystem to combine with plain text to produce cipher text, control transmission security processes, or produce key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Tag</Term>
        <Definition>Identification information associated with certain types of electronic key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Tape</Term>
        <Definition>Punched or magnetic tape containing key.  Printed key in tape form is referred to as a key list.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Key Updating</Term>
        <Definition>Irreversible cryptographic process for modifying key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Keying Material</Term>
        <Definition>Key code or authentication information in physical or magnetic form.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KG</Term>
        <Definition>Key Generator</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KMC</Term>
        <Definition>Key Management Center</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KMI</Term>
        <Definition>Key Management Infrastructure</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KMID</Term>
        <Definition>Key Management Identification Number</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KMODC</Term>
        <Definition>Key Management Ordering and Distribution Center</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KMP</Term>
        <Definition>Key Management Protocol</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KMS</Term>
        <Definition>Key Management System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KP</Term>
        <Definition>Key Processor</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KPK</Term>
        <Definition>Key Production Key</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>KSD</Term>
        <Definition>Key Storage Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="L">
    <Entry>
        <Term>Label</Term>
        <Definition>See security label.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Labeled Security Protections</Term>
        <Definition>Elementary-level mandatory access control protection features and intermediate-level discretionary access control features in a TCB that uses sensitivity labels to make access control decisions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Laboratory Attack</Term>
        <Definition>Use of sophisticated signal recovery equipment in a laboratory environment to recover information from data storage media.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LEAD</Term>
        <Definition>Low-Cost Encryption/Authentication Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Least Privilege</Term>
        <Definition>Principle requiring that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks.  Application of this principle limits the damage that can result from accident, error, or unauthorized use of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LE/CI</Term>
        <Definition>Law Enforcement/Counterintelligence</Definition>
    </Entry>
    <Entry>
        <Term>Level of Concern</Term>
        <Definition>Rating assigned to an IS indicating the extent to which protection measures, techniques, and procedures must be applied.  High, Medium, and Basic are identified levels of concern. A separate Level-of-Concern is assigned to each IS for confidentiality, integrity, and availability.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Level of Protection</Term>
        <Definition>Extent to which protective measures, techniques, and procedures must be applied to ISs and networks based on risk, threat, vulnerability, system interconnectivity considerations, and information assurance needs. Levels of protection are 1. Basic - IS and networks requiring implementation of standard minimum security countermeasures. 2. Medium - IS and networks requiring layering of additional safeguards above the standard minimum security countermeasures. 3. High - IS and networks requiring the most stringent protection and rigorous security countermeasures.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Limited Maintenance</Term>
        <Definition>COMSEC maintenance restricted to fault isolation, removal, and replacement of plug-in assemblies.  Soldering or unsoldering usually is prohibited in limited maintenance.  See full maintenance.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Line Conditioning</Term>
        <Definition>Elimination of unintentional signals or noise induced or conducted on a telecommunications or information system signal, power, control, indicator, or other external interface line.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Line Conduction</Term>
        <Definition>Unintentional signals or noise induced or conducted on a telecommunications or information system signal, power, control, indicator, or other external interface line.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Link Encryption</Term>
        <Definition>Encryption of information between nodes of a communications system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>List-Oriented</Term>
        <Definition>IS protection in which each protected object has a list of all subjects authorized to access it.  See also ticket-oriented.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LMD</Term>
        <Definition>Local Management Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LMD/KP</Term>
        <Definition>Local Management Device/Key Processor</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Local Authority</Term>
        <Definition>Organization responsible for generating and signing user certificates.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Local Management Device/Key Processor (LMD/KP)</Term>
        <Definition>EKMS platform providing automated management of COMSEC material and generating key for designated users.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LOCK</Term>
        <Definition>Logical Co-Processing Kernel</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Lock and Key Protection System</Term>
        <Definition>Protection system that involves matching a key or password with a specific access requirement.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Logic Bomb</Term>
        <Definition>Resident computer program triggering an unauthorized act when particular states of an IS are realized.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Logical Completeness Measure</Term>
        <Definition>Means for assessing the effectiveness and degree to which a set of security and access control mechanisms meets security specifications.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Long Title</Term>
        <Definition>Descriptive title of a COMSEC item.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Low Probability of Detection</Term>
        <Definition>Result of measures used to hide or disguise intentional electromagnetic transmissions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Low Probability of Intercept</Term>
        <Definition>Result of measures to prevent the intercept of intentional electromagnetic transmissions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LPC</Term>
        <Definition>Linear Predictive Coding</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LPD</Term>
        <Definition>Low Probability of Detection</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LPI</Term>
        <Definition>Low Probability of Intercept</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LRIP</Term>
        <Definition>Limited Rate Initial Preproduction</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>LSI</Term>
        <Definition>Large Scale Integration</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="M">
    <Entry>
        <Term>MAC</Term>
        <Definition>1.  Mandatory Access Control  2.  Message  Authentication Code</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Magnetic Remanence</Term>
        <Definition>Magnetic representation of residual information remaining on a magnetic medium after the medium has been cleared.  See clearing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Maintenance Hook</Term>
        <Definition>Special instructions (trapdoors) in software allowing easy maintenance and additional features development.  Since maintenance hooks frequently allow entry into the code without the usual checks, they are a serious security risk if they are not removed prior to live implementation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Maintenance Key</Term>
        <Definition>Key intended only for in-shop use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Malicious Applets</Term>
        <Definition>Small application programs automatically downloaded and executed that perform an unauthorized function on an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Malicious Code</Term>
        <Definition>Software or firmware capable of performing an unauthorized function on an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Malicious Logic</Term>
        <Definition>Hardware, software, or firmware capable of performing an unauthorized function on an IS.</Definition>
        <Source><![CDATA[CNSS Instruction No. 4009&#x0026;term7=MAN]]></Source>
    </Entry>
    <Entry>
        <Term>MAN</Term>
        <Definition>1. Mandatory Modification  2. Metropolitan Area Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Mandatory Access Control (MAC)</Term>
        <Definition>Means of restricting access to objects based on the sensitivity of the information contained in the objects and the formal authorization (i.e., clearance, formal access approvals, and need-to-know) or subjects to access information of such sensitivity.  See discretionary access control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Mandatory Modification</Term>
        <Definition>Change to a COMSEC end-item that NSA requires to be completed and reported by a specified date.  See optional modification.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Manipulative Communications Deception</Term>
        <Definition>Alteration or simulation of friendly telecommunications for the purpose of deception.  See communications deception and imitative communications deception.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Manual Cryptosystem</Term>
        <Definition>Cryptosystem in which the cryptographic processes are performed without the use of crypto-equipment or auto-manual devices.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Manual Remote Rekeying</Term>
        <Definition>Procedure by which a distant crypto-equipment is rekeyed electrically, with specific actions required by the receiving terminal operator. Synonymous with cooperative remote rekeying. Also see automatic remote keying.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Masquerading</Term>
        <Definition>Form of spoofing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Master Crypto-Ignition key</Term>
        <Definition>Key device with electronic logic and circuits providing the capability for adding more operational CIKs to a keyset.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Memory Scavenging</Term>
        <Definition>The collection of residual information from data storage.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MER</Term>
        <Definition>Minimum Essential Requirements</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Message Authentication Code</Term>
        <Definition>Data associated with an authenticated message allowing a receiver to verify the integrity of the message.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Message Externals</Term>
        <Definition>Information outside of the message text, such as the header, trailer, etc.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Message Indicator</Term>
        <Definition>Sequence of bits transmitted over a communications system for synchronizing crypto-equipment.  Some off-line cryptosystems, such as the KL-51 and one-time pad systems, employ message indicators to establish decryption starting points.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MHS</Term>
        <Definition>Message Handling System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MI</Term>
        <Definition>Message Indicator</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MIB</Term>
        <Definition>Management Information Base</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Mimicking</Term>
        <Definition>Form of spoofing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MINTERM</Term>
        <Definition>Miniature Terminal</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MISSI</Term>
        <Definition>Multilevel Information Systems Security Initiative</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MLS</Term>
        <Definition>Multilevel Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MOA</Term>
        <Definition>Memorandum of Agreement</Definition>
    </Entry>
    <Entry>
        <Term>Mobile Code</Term>
        <Definition>Software modules obtained from remote systems, transferred across a network, and then downloaded and executed on local systems without explicit installation or execution by the recipient.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Mode of Operation</Term>
        <Definition>Description of the conditions under which an IS operates based on the sensitivity of information processed and the clearance levels, format access approvals, and need-to-know of its users.  Four modes of operation are authorized for processing or transmitting information\s dedicated mode, system-high mode, compartmented/partitioned mode, and multilevel mode.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>MSE</Term>
        <Definition>Mobile Subscriber Equipment</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Multilevel Device</Term>
        <Definition>Equipment trusted to properly maintain and separate data of different security categories.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Multilevel Mode</Term>
        <Definition>INFOSEC mode of operation wherein all the following statements are satisfied concerning the users who have direct or indirect access to the system, its peripherals, remote terminals, or remote hosts\s   a. some users do not have a valid security clearance for all the information processed in the IS\s  b. all users have the proper security clearance and appropriate formal access approval for that information to which they have access\s and  c. all users have a valid need-to-know only for information to which they have access.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Multilevel Security (MLS)</Term>
        <Definition>Concept of processing information with different classifications and categories that simultaneously permits access by users with different security clearances and denies access to users who lack authorization.(See cross domain solution.)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Multi-Security Level (MSL)</Term>
        <Definition>Capability to process information of different security classifications or categories by using periods processing or peripheral sharing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Mutual Suspicion</Term>
        <Definition>Condition in which two IS's need to rely upon each other to perform a service, yet neither trusts the other to properly protect shared data.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="N">
    <Entry>
        <Term>NACAM</Term>
        <Definition>National COMSEC Advisory Memorandum</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NACSI</Term>
        <Definition>National COMSEC Instruction</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NACSIM</Term>
        <Definition>National COMSEC Information Memorandum</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NAK</Term>
        <Definition>Negative Acknowledge</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>National Information Assurance Partnership (NIAP)</Term>
        <Definition>Joint initiative between NSA and NIST responsible for security testing needs of both IT consumers and producers and promoting the development of technically sound security requirements for IT products and systems and appropriate measures for evaluating those products and services.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>National Information Infrastructure (NII)</Term>
        <Definition>Nationwide interconnection of communications networks, computers, databases, and consumer electronics that make vast amounts of information available to users. It includes both public and private networks, the Internet, the public switched network, and cable, wireless, and satellite communications.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>National Security Information</Term>
        <Definition>Information that has been determined pursuant to Executive Order 12958 (as amended) or any predecessor order to require protection against unauthorized disclosure.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>National Security System</Term>
        <Definition>Any information system (including any telecommunications system) used or operated by an agency or by a contractor of any agency, or other organization on behalf of an agency, the function, operation, or use of which I. involves intelligence activities, II. Involves cryptologic activities related to national security, III. involves command and control of military forces, IV. Involves equipment that is an integral part of a weapon or weapon system, or V. subject to subparagraph (B), is critical to the direct fulfillment of military or intelligence missions; or is protected at all times by procedures established for information that have been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept classified in the interest of national defense or foreign policy.  (B). Does not include a system that is to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications). (Title 44 U.S. Code Section 3542, Federal Information Security Management Act of 2002.)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NCCD</Term>
        <Definition>Nuclear Command and Control Document</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NCOW</Term>
        <Definition>net-centric operations and warfare</Definition>
    </Entry>
    <Entry>
        <Term>NCS</Term>
        <Definition>1. National Communications System  2. National Cryptologic School  3. Net Control Station</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NCSC</Term>
        <Definition>National Computer Security Center</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Need-to-know</Term>
        <Definition>The necessity for access to, or knowledge or possession of, specific information required to carry out official duties.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Need to Know Determination</Term>
        <Definition>Decision made by an authorized holder of official information that a prospective recipient requires access to specific official information to carry out official duties.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NetOps</Term>
        <Definition>Network Operations</Definition>
    </Entry>
    <Entry>
        <Term>Network</Term>
        <Definition>IS implemented with a collection of interconnected network nodes.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Network Front-End</Term>
        <Definition>Device implementing protocols that allow attachment of a computer system to a network.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Network Reference Monitor</Term>
        <Definition>See reference monitor.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Network Security</Term>
        <Definition>See information systems security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Network Security Officer</Term>
        <Definition>See Information System Security Officer.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Network Sponsor</Term>
        <Definition>Individual or organization responsible for stating the security policy enforced by the network, designing the network security architecture to properly enforce that policy, and ensuring the network is implemented in such a way that the policy is enforced.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Network System</Term>
        <Definition>System implemented with a collection of interconnected components.  A network system is based on a coherent security architecture and design.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Network Weaving</Term>
        <Definition>Penetration technique in which different communication networks are linked to access an IS to avoid detection and trace-back.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NII</Term>
        <Definition>Networks and Information Integration</Definition>
    </Entry>
    <Entry>
        <Term>NIPC</Term>
        <Definition>National Infrastructure Protection Center</Definition>
    </Entry>
    <Entry>
        <Term>NIPRNET</Term>
        <Definition>Nonsecure Internet Protocol Router Network</Definition>
    </Entry>
    <Entry>
        <Term>NISAC</Term>
        <Definition>National Industrial Security Advisory Committee</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NIST</Term>
        <Definition>National Institute of Standards and Technology</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NLZ</Term>
        <Definition>No-lone zone</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>No-Lone Zone</Term>
        <Definition>Area, room, or space that, when staffed, must be occupied by two or more appropriately cleared individuals who remain within sight of each other.  See-two-person integrity.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Nonrepudiation</Term>
        <Definition>Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSA</Term>
        <Definition>National Security Agency</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSD</Term>
        <Definition>National Security Directive</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSDD</Term>
        <Definition>National Security Decision Directive</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSEP</Term>
        <Definition>National Security Emergency Preparedness</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSI</Term>
        <Definition>National Security Information</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSTAC</Term>
        <Definition>National Security Telecommunications Advisory Committee</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSTISSAM</Term>
        <Definition>National Security Telecommunications and Information Systems Security Advisory/Information Memorandum</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSTISSC</Term>
        <Definition>National Security Telecommunications and Information Systems Security Committee</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSTISSD</Term>
        <Definition>National Security Telecommunications and Information Systems Security Directive</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSTISSI</Term>
        <Definition>National Security Telecommunications And Information Systems Security Instruction</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NSTISSP</Term>
        <Definition>National Security Telecommunications and Information Systems Security Policy</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NTIA</Term>
        <Definition>National Telecommunications and Information Administration</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NTISSAM</Term>
        <Definition>National Telecommunications and Information Systems Security Advisory/Information Memorandum</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NTISSD</Term>
        <Definition>National Security Telecommunications and Information Systems Security Directive</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NTISSI</Term>
        <Definition>National Security Telecommunications and Information Systems Security Instruction</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>NTISSP</Term>
        <Definition>National Telecommunications and Information Systems Security Policy</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Null</Term>
        <Definition>Dummy letter, letter symbol, or code group inserted into an encrypted message to delay or prevent its decryption or to complete encrypted groups for transmission or transmission security purposes.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="O">
    <Entry>
        <Term>OADR</Term>
        <Definition>Originating Agency's Determination Required</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OASD</Term>
        <Definition>Office of the Assistant Secretary of Defense</Definition>
    </Entry>
    <Entry>
        <Term>Object</Term>
        <Definition>Passive entity containing or receiving information.  Access to an object implies access to the information it contains.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Object Reuse</Term>
        <Definition>Reassignment and re-use of a storage medium containing one or more objects after ensuring no residual data remains on the storage medium.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Official Information</Term>
        <Definition>All information in the custody and control of a U.S. Government department or agency that was acquired by U.S. Government employees as a part of their official duties or because of their official status and has not been cleared for public release.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Off-Line Cryptosystem</Term>
        <Definition>Cryptosystem in which encryption and decryption are performed independently of the transmission and reception functions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>One-Part Code</Term>
        <Definition>Code in which plain text elements and their accompanying code groups are arranged in alphabetical, numerical, or other systematic order, so one listing serves for both encoding and decoding.  One-part codes are normally small codes used to pass small volumes of low-sensitivity information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>One-Time Cryptosystem</Term>
        <Definition>Cryptosystem employing key used only once.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>One-Time Pad</Term>
        <Definition>Manual one-time cryptosystem produced in pad form.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>One-Time Tape</Term>
        <Definition>Punched paper tape used to provide key streams on a one-time basis in certain machine cryptosystems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>On-Line Cryptosystem</Term>
        <Definition>Cryptosystem in which encryption and decryption are performed in association with the transmitting and receiving functions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OPCODE</Term>
        <Definition>Operations Code</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Open Storage</Term>
        <Definition>Storage of classified information within an accredited facility, but not in General Services Administration approved secure containers, while the facility is unoccupied by authorized personnel.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Operational Key</Term>
        <Definition>Key intended for use over-the-air for protection of operational information or for the production or secure electrical transmission of key streams.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Operational Vulnerability Information</Term>
        <Definition>Information that describes the presence of a vulnerability within a specific operational setting or network.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Operational Waiver</Term>
        <Definition>Authority for continued use of unmodified COMSEC end-items pending the completion of a mandatory modification.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Operations Code</Term>
        <Definition>Code composed largely of words and phrases suitable for general communications use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Operations Security (OPSEC)</Term>
        <Definition>Systematic and proven process by which potential adversaries can be denied information about capabilities and intentions by identifying, controlling, and protecting generally unclassified evidence of the planning and execution of sensitive activities. The process involves five steps: identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks, and application of appropriate countermeasures.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OPSEC</Term>
        <Definition>Operations Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Optional Modification</Term>
        <Definition>NSA-approved modification not required for universal implementation by all holders of a COMSEC end-item.  This class of modification requires all of the engineering/doctrinal control of mandatory modification but is usually not related to security, safety, TEMPEST, or reliability. See mandatory modification.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>ORA</Term>
        <Definition>Organizational Registration Authority</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Organizational Maintenance</Term>
        <Definition>Limited maintenance performed by a user organization.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Organizational Registration Authority (ORA)</Term>
        <Definition>Entity within the PKI that authenticates the identity and the organizational affiliation of the users.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OTAD</Term>
        <Definition>Over-the-Air Key Distribution</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OTAR</Term>
        <Definition>Over-the-Air Rekeying</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OTAT</Term>
        <Definition>Over-the-Air Transfer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OTP</Term>
        <Definition>One-Time Pad</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>OTT</Term>
        <Definition>One-Time Tape</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Over-The-Air Key Distribution</Term>
        <Definition>Providing electronic key via over-the-air rekeying, over-the-air key transfer, or cooperative key generation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Over-The-Air Key Transfer</Term>
        <Definition>Electronically distributing key without changing traffic encryption key used on the secured communications path over which the transfer is accomplished.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Over-The-Air Rekeying (OTAR)</Term>
        <Definition>Changing traffic encryption key or transmission security key in remote crypto-equipment by sending new key directly to the remote crypto-equipment over the communications path it secures.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Overt Channel</Term>
        <Definition>Communications path within a computer system or network designed for the authorized transfer of data.  See covert channel.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Overwrite Procedure</Term>
        <Definition>Process of writing patterns of data on top of the data stored on a magnetic medium.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="P">
    <Entry>
        <Term>PAA</Term>
        <Definition>Policy Approving Authority</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PAL</Term>
        <Definition>Permissive Action Link</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Parity</Term>
        <Definition>Bit(s) used to determine whether a block of data has been altered.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Partitioned Security Mode</Term>
        <Definition>IS security mode of operation wherein all personnel have the clearance, but not necessarily formal access approval and need-to-know, for all information handled by an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Password</Term>
        <Definition>Protected/private alphanumeric string used to authenticate an identity or to authorize access to data.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PC</Term>
        <Definition>Personal Computer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PCA</Term>
        <Definition>Policy Certification Authority</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PCIPB</Term>
        <Definition>President's Critical Infrastructure Protection Board</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PCMCIA</Term>
        <Definition>Personal Computer Memory Card International Association</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PDA</Term>
        <Definition>Portablie Digital Assistant</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PDR</Term>
        <Definition>Preliminary Design Review</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PDS</Term>
        <Definition>1.  Protected Distribution Systems  2.  Practices Dangerous to Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
	<Entry>
        <Term>PED</Term>
        <Definition>Portable Electronic Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Penetration</Term>
        <Definition>See intrusion.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Penetration Testing</Term>
        <Definition>Security testing in which evaluators attempt to circumvent the security features of a system based on their understanding of the system design and implementation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Per-Call Key</Term>
        <Definition>Unique traffic encryption key generated automatically by certain secure telecommunications systems to secure single voice or data transmissions.  See cooperative key generation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Periods Processing</Term>
        <Definition>Processing of various levels of classified and unclassified information at distinctly different times.  Under the concept of periods processing, the system must be purged of all information from one processing period before transitioning to the next.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Perimeter</Term>
        <Definition>Encompasses all those components of the system that are to be accredited by the DAA, and excludes separately accredited systems to which the system is connected.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Permuter</Term>
        <Definition>Device used in crypto-equipment to change the order in which the contents of a shift register are used in various nonlinear combining circuits.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PES</Term>
        <Definition>Positive Enable System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PII</Term>
        <Definition>Personally Identifiable Information</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PIR</Term>
        <Definition>Priority intelligence requirements</Definition>
    </Entry>
    <Entry>
        <Term>PKC</Term>
        <Definition>Public Key Cryptography</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PKI</Term>
        <Definition>Public Key Infrastructure</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PKSD</Term>
        <Definition>Programmable Key Storage Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Plain Text</Term>
        <Definition>Unencrypted information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PM</Term>
        <Definition>program manager</Definition>
    </Entry>
	<Entry>
        <Term>P Model</Term>
        <Definition>Preproduction Model</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PNEK</Term>
        <Definition>Post-Nuclear Event Key</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>POA&M</Term>
        <Definition>plan of action and milestones</Definition>
    </Entry>
    <Entry>
        <Term>Policy Approving Authority (PAA)</Term>
        <Definition>First Level of the PKI Certification Management Authority that approves the security policy of each PCA.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Policy Certification Authority (PCA)</Term>
        <Definition>Second level of the PKI Certification Management Authority that formulates the security policy under which it and its subordinate CAs will issue public key certificates.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Positive Control Material</Term>
        <Definition>Generic term referring to a sealed authenticator system, permissive action link, coded switch system, positive enable system, or nuclear command and control documents, material, or devices.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PPL</Term>
        <Definition>Preferred Products List (a section in the INFOSEC Products and Services Catalogue)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PRBAC</Term>
        <Definition>Partition Rule Base Access Control</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Preproduction Model</Term>
        <Definition>Version of INFOSEC equipment employing standard parts and suitable for complete evaluation of form, design, and performance.  Preproduction models are often referred to as beta models.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Principal Accrediting authority (PAA)</Term>
        <Definition>Senior official with authority and responsibility for all intelligence systems within an agency.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Print Suppression</Term>
        <Definition>Eliminating the display of characters in order to preserve their secrecy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Privacy System</Term>
        <Definition>Commercial encryption system that affords telecommunications limited protection to deter a casual listener, but cannot withstand a technically competent cryptanalytic attack.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Privileged User</Term>
        <Definition>Individual who has access to system control, monitoring, or administration functions (e.g., system administrator, system ISSO, maintainers, system programmers, etc.)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Probe</Term>
        <Definition>Type of incident involving an attempt to gather information about an IS for the apparent purpose of circumventing its security controls.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Production Model</Term>
        <Definition>INFOSEC equipment in its final mechanical and electrical form.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PROPIN</Term>
        <Definition>Proprietary Information </Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Proprietary Information</Term>
        <Definition>Material and information relating to or associated with a company's products, business or activities, including but not limited to:  financial information\s data or statements\s trade secrets\s product research and development\s existing and future product designs and performance specification\s marketing plans or techniques\s schematics\s client lists, computer programs, processes and know-how that have been clearly identified and properly marked by the company as proprietary information, trade secrets or company confidential information.  The information must have been developed by the company and not be available to the government or to the public without restriction from another source.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Protected Distribution Systems (PDS)</Term>
        <Definition>Wire line or fiber optic distribution system used to transmit unencrypted classified national security information through an area of lesser classification or control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Protection Philosophy</Term>
        <Definition>Informal description of the overall design of an IS delineating each of the protection mechanisms employed.  Combination of formal and informal techniques, appropriate to the evaluation class, used to show the mechanisms are adequate to enforce the security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Protection Profile</Term>
        <Definition>Common Criteria specification that represents an implementation-independent set of security requirements for a category of Target of Evaluations(TOE)that meets specific consumer needs.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Protection Ring</Term>
        <Definition>One of a hierarchy of privileged modes of an IS that gives certain access rights to user programs and processes that are authorized to operate in a given mode.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Protective Packaging</Term>
        <Definition>Packaging techniques for COMSEC material that discourage penetration, reveal a penetration has occurred or was attempted, or inhibit viewing or copying of keying material prior to the time it is exposed for use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Protective Technologies</Term>
        <Definition>Special tamper-evident features and materials employed for the purpose of detecting tampering and deterring attempts to compromise, modify, penetrate, extract, or substitute information processing equipment and keying material.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Protocol</Term>
        <Definition>Set of rules and formats, semantic and syntactic, permitting ISs to exchange information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Proxy</Term>
        <Definition>Software agent that performs a function or operation on behalf of another application or system while hiding the details involved.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Public Domain Software</Term>
        <Definition>Software not protected by copyright laws of any nation that may be freely used without permission of, or payment to, the creator, and that carries no warranties from, or liabilities to the creator.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Public Key Certificate</Term>
        <Definition>Contains the name of a user, the public key component of the user, and the name of the issuer who vouches that the public key component is bound to the named user.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Public Key Cryptography (PKC)</Term>
        <Definition>Encryption system using a linked pair of keys.  What one pair of keys encrypts, the other pair decrypts.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Public Key Infrastructure (PKI)</Term>
        <Definition>Framework established to issue, maintain, and revoke public key certificates accommodating a variety of security technologies, including the use of software.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Purging</Term>
        <Definition>Rendering stored information unrecoverable.  See sanitize.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PWDS</Term>
        <Definition>Protected Wireline Distribution System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>PWS</Term>
        <Definition>Performance Work Statement</Definition>
    </Entry>
</Section><Section Letter="Q">
    <Entry>
        <Term>QUADRANT</Term>
        <Definition>Short name referring to technology that provides tamper-resistant protection to crypto-equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="R">
    <Entry>
        <Term>RAMP</Term>
        <Definition>Rating Maintenance Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Randomizer</Term>
        <Definition>Analog or digital source of unpredictable, unbiased, and usually independent bits.  Randomizers can be used for several different functions, including key generation or to provide a starting state for a key generator.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Read</Term>
        <Definition>Fundamental operation in an IS that results only in the flow of information from an object to a subject.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Read Access</Term>
        <Definition>Permission to read information in an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Real Time Reaction</Term>
        <Definition>Immediate response to a penetration attempt that is detected and diagnosed in time to prevent access.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Recovery Procedures</Term>
        <Definition>Actions necessary to restore data files of an IS and computational capability after a system failure.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>RED</Term>
        <Definition>Designation applied to information systems, and associated areas, circuits, components, and equipment in which national security information is being processed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>RED/BLACK Concept</Term>
        <Definition>Separation of electrical and electronic circuits, components, equipment, and systems that handle national security information (RED), in electrical form, from those that handle non-national security information (BLACK) in the same form.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Red Team</Term>
        <Definition>Interdisciplinary group of individuals authorized to conduct an independent and focused threat-based effort as a simulated adversary to expose and exploit system vulnerabilities for the purpose of improving the security posture of information systems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>RED Signal</Term>
        <Definition>Any electronic emission (e.g., plain text, key, key stream, subkey stream, initial fill, or control signal) that would divulge national security information if recovered.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Reference Monitor</Term>
        <Definition>Concept of an abstract machine that enforces Target of Evaluation (TOE) access control policies.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Release Prefix</Term>
        <Definition>Prefix appended to the short title of U.S.-produced keying material to indicate its foreign releasability.  "A" designates material that is releasable to specific allied nations and "U.S." designates material intended exclusively for U.S. use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Remanence</Term>
        <Definition>Residual information remaining on storage media after clearing.  See magnetic remanence and clearing.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Remote Access</Term>
        <Definition>Access for authorized users external to an enclave established through a controlled access point at the enclave boundary.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Remote Rekeying</Term>
        <Definition>Procedure by which a distant crypto-equipment is rekeyed electrically.  See automatic remote rekeying and manual remote rekeying.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Repair Action</Term>
        <Definition>NSA-approved change to a COMSEC end-item that does not affect the original characteristics of the end-item and is provided for optional application by holders.  Repair actions are limited to minor electrical and/or mechanical improvements to enhance operation, maintenance, or reliability.  They do not require an identification label marking, or control but must be fully documented by changes to the maintenance manual.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Reserve Keying Material</Term>
        <Definition>Key held to satisfy unplanned needs.  See contingency key.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Residual Risk</Term>
        <Definition>Portion of risk remaining after security measures have been applied.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Residue</Term>
        <Definition>Data left in storage after information processing operations are complete, but before degaussing or overwriting has taken place.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Resource Encapsulation</Term>
        <Definition>Method by which the reference monitor mediates accesses to an IS resource.  Resource is protected and not directly accessible by a subject.  Satisfies requirement for accurate auditing of resource usage.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Risk</Term>
        <Definition>Possibility that a particular threat will adversely impact an IS by exploiting a particular vulnerability.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Risk Analysis</Term>
        <Definition>Examination of information to identify the risk to an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Risk Assessment</Term>
        <Definition>Process of analyzing threats to and vulnerabilities of an IS, and the potential impact resulting from the loss of information or capabilities of a system. This analysis is used as a basis for identifying appropriate and cost-effective security countermeasures.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Risk Index</Term>
        <Definition>Difference between the minimum clearance or authorization of IS users and the maximum sensitivity (e.g., classification and categories) of data processed by the system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Risk Management</Term>
        <Definition>Process of managing risks to agency operations (including mission, functions, image, or reputation), agency assets, or individuals resulting from the operation of an information system. It includes risk assessment; cost-benefit analysis; the selection, implementation, and assessment of security controls; and the formal authorization to operate the system. The process considers effectiveness, efficiency, and constraints due to laws, directives, policies, or regulations. NIST Special Pub 800-53.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>R&T</Term>
        <Definition>research & technology</Definition>
    </Entry>
</Section>
<Section Letter="S">
    <Entry>
        <Term>SA</Term>
        <Definition>System Administrator</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SABI</Term>
        <Definition>Secret and Below Interoperability</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Safeguard</Term>
        <Definition>1. Protection included to counteract a known or expected condition.  2. Incorporated countermeasure or set of countermeasures within a base release.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Safeguarding Statement</Term>
        <Definition>Statement affixed to a computer output or printout that states the highest classification being processed at the time the product was produced and requires control of the product, at that level, until determination of the true classification by an authorized person.  Synonymous with banner.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Sanitize</Term>
        <Definition>Process to remove information from media such that data recovery is not possible.  It includes removing all classified labels markings, and activity logs. See purging.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SAO</Term>
        <Definition>Special Access Office</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SAP</Term>
        <Definition>1.  System Acquisition Plan  2.  Special Access Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SARK</Term>
        <Definition>SAVILLE Advanced Remote Keying</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SBU</Term>
        <Definition>Sensitive But Unclassified</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SCADA</Term>
        <Definition>supervisory control and data acquisition</Definition>
    </Entry>
    <Entry>
        <Term>Scavenging</Term>
        <Definition>Searching through object residue to acquire data.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SCCVI</Term>
        <Definition>Secure Configuration and Compliance Validation Initiative</Definition>
    </Entry>
    <Entry>
        <Term>SCI</Term>
        <Definition>Sensitive Compartmented Information</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SCIF</Term>
        <Definition>Sensitive Compartmented Information Facility</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SDNS</Term>
        <Definition>Secure Data Network System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SDR</Term>
        <Definition>System Design Review</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Secure Communications</Term>
        <Definition>Telecommunications deriving security through use of type 1 products and/or PDSs.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Secure Hash Standard</Term>
        <Definition>Specification for a secure hash algorithm that can generate a condensed message representation called a message digest.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Secure State</Term>
        <Definition>Condition in which no subject can access any object in an unauthorized manner.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Secure Subsystem</Term>
        <Definition>Subsystem containing its own implementation of the reference monitor concept for those resources it controls.  Secure subsystem must depend on other controls and the base operating system for the control of subjects and the more primitive system objects.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Controls</Term>
        <Definition>Management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. NIST Special Pub 800-53.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Features Users Guide (SFUG)</Term>
        <Definition>Guide or manual explaining how the security mechanisms in a specific system work.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Filter</Term>
        <Definition>IS trusted subsystem that enforces security policy on the data passing through it.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
	<Entry>
        <Term>Security in Depth</Term>
        <Definition>Synonymous with defense in depth.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Inspection</Term>
        <Definition>Examination of an IS to determine compliance with security policy, procedures, and practices.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Kernel</Term>
        <Definition>Hardware, firmware, and software elements of a trusted computing base implementing the reference monitor concept.  Security kernel must mediate all accesses, be protected from modification, and be verifiable as correct.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Label</Term>
        <Definition>Information representing the sensitivity of a subject or object, such as UNCLASSIFIED or its hierarchical classification (CONFIDENTIAL, SECRET, TOP SECRET) together with any applicable nonhierarchical security categories (e.g., sensitive compartmented information, critical nuclear weapon design information).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Net Control Station</Term>
        <Definition>Management system overseeing and controlling implementation of network security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Perimeter</Term>
        <Definition>Boundary where security controls are in effect to protect assets.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Range</Term>
        <Definition>Highest and lowest security levels that are permitted in or on an IS, system component, subsystem, or network.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Requirements</Term>
        <Definition>Types and levels of protection necessary for equipment, data, information, applications, and facilities to meet IS security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Requirements Baseline</Term>
        <Definition>Description of the minimum requirements necessary for an IS to maintain an acceptable level of security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Safeguard</Term>
        <Definition>Protective measures and controls prescribed to meet the security requirements specified for an IS.  Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices.  See accreditation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Specification</Term>
        <Definition>Detailed description of the safeguards required to protect an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Target</Term>
        <Definition>Common Criteria specification that represents a set of security requirements to be used as the basis of an evaluation of an identified Target of Evaluation (TOE).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Test and Evaluation (ST&#x0026;E)</Term>
        <Definition>Examination and analysis of the safeguards required to protect an IS, as they have been applied in an operational environment, to determine the security posture of that system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Security Testing</Term>
        <Definition>Process to determine that an IS protects data and maintains functionality as intended.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Seed Key</Term>
        <Definition>Initial key used to start an updating or key generation process.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Sensitive Compartmented Information (SCI)</Term>
        <Definition>Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Sensitive Compartmented Information Facility (SCIF)</Term>
        <Definition>Accredited area, room, or group of rooms, buildings, or installation where SCI may be stored, used, discussed, and/or processed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Sensitive Information</Term>
        <Definition>Information, the loss, misuse, or unauthorized access to modification of which would adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of the national defense or foreign policy.  (Systems that are not national security systems, but contain sensitive information are to be protected in accordance with the requirements of the Computer Security Act of 1987 (P.L. 100-235).)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Sensitivity Label</Term>
        <Definition>Information representing elements of the security label(s) of a subject and an object.  Sensitivity labels are used by the trusted computing base (TCB) as the basis for mandatory access control decisions.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SFA</Term>
        <Definition>Security Fault Analysis</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SFUG</Term>
        <Definition>Security Features Users Guide</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SHA</Term>
        <Definition>Secure Hash Algorithm</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Shielded Enclosure</Term>
        <Definition>Room or container designed to attenuate electromagnetic radiation, acoustic signals, or emanations.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Short Title</Term>
        <Definition>Identifying combination of letters and numbers assigned to certain COMSEC materials to facilitate handling, accounting, and controlling.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SI</Term>
        <Definition>Special Intelligence</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Simple Security Property</Term>
        <Definition>Bell-La Padula security model rule allowing a subject read access to an object, only if the security level of the subject dominates the security level of the object.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Single Point Keying</Term>
        <Definition>Means of distributing key to multiple, local crypto-equipment or devices from a single fill point.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SIPRNET</Term>
        <Definition>SECRET Internet Protocol Router Network</Definition>
    </Entry>
    <Entry>
        <Term>SISS</Term>
        <Definition>Subcommittee on Information Systems Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SLA</Term>
        <Definition>service level agreement</Definition>
    </Entry>
    <Entry>
        <Term>SMU</Term>
        <Definition>Secure Mobile Unit</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Sniffer</Term>
        <Definition>Software tool that audits and identifies network traffic packets.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SOP</Term>
        <Definition>standard operating procedures</Definition>
    </Entry>
	<Entry>
        <Term>Software Assurance</Term>
        <Definition>Level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at anytime during its lifecycle, and that the software functions in the intended manner.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Software System Test and Evaluation Process</Term>
        <Definition>Process that plans, develops, and documents the quantitative demonstration of the fulfillment of all baseline functional performance, operational, and interface requirements.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Special Access Program (SAP)</Term>
        <Definition>Sensitive program, approved in writing by a head of agency with original top secret classification authority, that imposes need-to-know and access controls beyond those normally provided for access to Confidential, Secret, or Top Secret information. The level of controls is based on the criticality of the program and the assessed hostile intelligence threat. The program may be an acquisition program, an intelligence program, or an operations and support program. Joint Pub 1-02, 12 Apr 2001.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Special Access Program Facility (SAPF)</Term>
        <Definition>Facility formally accredited by an appropriate agency in accordance with DCID 6/9 in which SAP information may be processed.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
	<Entry>
        <Term>Spillage</Term>
        <Definition>See classified information spillage..</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SPK</Term>
        <Definition>Single Point Key(ing)</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Split Knowledge</Term>
        <Definition>Separation of data or information into two or more parts, each part constantly kept under control of separate authorized individuals or teams so that no one individual or team will know the whole data.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Spoofing</Term>
        <Definition><![CDATA[Unauthorized use of legitimate Identification and Authentication (I&#x0026;A) data, however it was obtained, to mimic a subject different from the attacker. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing.]]></Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Spread Spectrum</Term>
        <Definition>Telecommunications techniques in which a signal is transmitted in a bandwidth considerably greater than the frequency content of the original information. Frequency hopping, direct sequence spreading, time scrambling, and combinations of these techniques are forms of spread spectrum.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SRR</Term>
        <Definition>Security Requirements Review</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SSO</Term>
        <Definition>Staff Security Officer</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>SSP</Term>
        <Definition>System Security Plan</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term><![CDATA[ST&#x0026;E]]></Term>
        <Definition>Security Test and Evaluation</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>State Variable</Term>
        <Definition>Variable representing either the state of an IS or the state of some system resource.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Storage Object</Term>
        <Definition>Object supporting both read and write accesses to an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Strong Authentication</Term>
        <Definition>Layered authentication approach relying on two or more authenticators to establish the identity of an originator or receiver of information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>STE</Term>
        <Definition>Secure Terminal Equipment</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>STS</Term>
        <Definition>Subcommittee on Telecommunications Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>STU</Term>
        <Definition>Secure Telephone Unit</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Subassembly</Term>
        <Definition>Major subdivision of an assembly consisting of a package of parts, elements, and circuits that perform a specific function.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Subject</Term>
        <Definition>Generally an individual, process, or device causing information to flow among objects or change to the system state.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Subject Security Level</Term>
        <Definition>Sensitivity label(s) of the objects to which the subject has both read and write access. Security level of a subject must always be dominated by the clearance level of the user associated with the subject.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Superencryption</Term>
        <Definition>Process of encrypting encrypted information.  Occurs when a message, encrypted off-line, is transmitted over a secured, on-line circuit, or when information encrypted by the originator is multiplexed onto a communications trunk, which is then bulk encrypted.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Supersession</Term>
        <Definition>Scheduled or unscheduled replacement of a COMSEC aid with a different edition.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Supervisor State</Term>
        <Definition>Synonymous with executive state of an operating system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Suppression Measure</Term>
        <Definition>Action, procedure, modification, or device that reduces the level of, or inhibits the generation of, compromising emanations in an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Surrogate Access</Term>
        <Definition>See discretionary access control.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Syllabary</Term>
        <Definition>List of individual letters, combination of letters, or syllables, with their equivalent code groups, used for spelling out words or proper names not present in the vocabulary of a code. A syllabary may also be a spelling table.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Symmetric Key</Term>
        <Definition>Encryption methodology in which the encryptor and decryptor use the same key, which must be kept secret.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Synchronous Crypto-Operation</Term>
        <Definition>Method of on-line crypto-operation in which crypto-equipment and associated terminals have timing systems to keep them in step.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Administrator (SA)</Term>
        <Definition>Individual responsible for the installation and maintenance of the nonsecurity aspects of an information system,  providing effective IS utilization, adequate security parameters, and sound implementation of established IA policy and procedures. </Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Assets</Term>
        <Definition>Any software, hardware, data, administrative, physical, communications, or personnel resource within an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Development Methodologies</Term>
        <Definition>Methodologies developed through software engineering to manage the complexity of system development.  Development methodologies include software engineering aids and high-level design analysis tools.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System High</Term>
        <Definition>Highest security level supported by an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System High Mode</Term>
        <Definition>IS security mode of operation wherein each user, with direct or indirect access to the IS, its peripherals, remote terminals, or remote hosts, has all of the following, a. valid security clearance for all information within an IS, b. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments and/or special access programs), and c. valid need-to-know for some of the information contained within the IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Indicator</Term>
        <Definition>Symbol or group of symbols in an off-line encrypted message identifying the specific cryptosystem or key used in the encryption.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Integrity</Term>
        <Definition>Attribute of an IS when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. </Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Low</Term>
        <Definition>Lowest security level supported by an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Profile</Term>
        <Definition>Detailed security description of the physical structure, equipment component, location, relationship, and general operating environment of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Security</Term>
        <Definition>See information systems security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Security Engineering</Term>
        <Definition>See information systems security engineering.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Security Officer</Term>
        <Definition>See information system security officer.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>System Security Plan</Term>
        <Definition>Formal document fully describing the planned security tasks required to meet system security requirements.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="T">
    <Entry>
        <Term>TA</Term>
        <Definition>technical advisory</Definition>
    </Entry>
    <Entry>
        <Term>TA</Term>
        <Definition>Traffic Analysis</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TACTERM</Term>
        <Definition>Tactical Terminal</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TAG</Term>
        <Definition>TEMPEST Advisory Group</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Tampering</Term>
        <Definition>Unauthorized modification altering the proper functioning of INFOSEC equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Target of Evaluation (TOE)</Term>
        <Definition>IT product or system and its associated administrator and user guidance documentation that is the subject of an evaluation.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TCB</Term>
        <Definition>Trusted Computing Base</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
	<Entry>
        <Term>TCP/IP</Term>
        <Definition>Transmission Control Protocol/Internet Protocol</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TED</Term>
        <Definition>Trunk Encryption Device</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TEK</Term>
        <Definition>Traffic Encryption Key</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TEP</Term>
        <Definition>TEMPEST Endorsement Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
	<Entry>
        <Term>Technical Controls</Term>
        <Definition>Security controls (i.e., safeguards or countermeasures) for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware, software, or firmware components of the system. (NIST Special Pub 800-53.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
	<Entry>
        <Term>Technical Vulnerability Information</Term>
        <Definition>Detailed description of a vulnerability to include the implementable steps (such as code) necessary to exploit that vulnerability.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Telecommunications</Term>
        <Definition>Preparation, transmission, communication, or related processing of information (writing, images, sounds or other data) by electrical, electromagnetic, electromechanical, electro-optical or electronic means.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Telecommunications Security (TSEC)</Term>
        <Definition>See information systems security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TEMPEST</Term>
        <Definition>Short name referring to investigation, study, and control of compromising emanations from IS equipment.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TEMPEST Test</Term>
        <Definition>Laboratory or on-site test to determine the nature of compromising emanations associated with an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TEMPEST Zone</Term>
        <Definition>Designed area within a facility where equipment with appropriate TEMPEST characteristics (TEMPEST zone assignment) may be operated.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Test Key</Term>
        <Definition>Key intended for testing of COMSEC equipment or systems.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TFM</Term>
        <Definition>Trusted Facility Manual</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TFS</Term>
        <Definition>Traffic Flow Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Threat</Term>
        <Definition>Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Threat Analysis</Term>
        <Definition>Examination of information to identify the elements comprising a threat.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Threat Assessment</Term>
        <Definition>Formal description and evaluation of threat to an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Threat Monitoring</Term>
        <Definition>Analysis, assessment, and review of audit trails and other information collected for the purpose of searching out system events that may constitute violations of system security.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Ticket-Oriented</Term>
        <Definition>IS protection system in which each subject maintains a list of unforgeable bit patterns called tickets, one for each object a subject is authorized to access. See list-oriented.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Time Bomb</Term>
        <Definition>Resident computer program that triggers an unauthorized act at a predefined time.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Time-Compliance Date</Term>
        <Definition>Date by which a mandatory modification to a COMSEC end-item must be incorporated if the item is to remain approved for operational use.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Time-Dependent Password</Term>
        <Definition>Password that is valid only at a certain time of day or during a specified interval of time.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TLS</Term>
        <Definition>Top-Level Specification</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TOE</Term>
        <Definition>Target of Evaluation</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TOE Security Functions (TSF)</Term>
        <Definition>Set consisting of all hardware, software, and firmware of the TOE that must be relied upon for the correct enforcement of the TSP.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TOE Security Policy (TSP)</Term>
        <Definition>Set of rules that regulate how assets are managed, protected, and distributed within the TOE.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TPC</Term>
        <Definition>Two-Person Control</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TPEP</Term>
        <Definition>Trusted Products Evaluation Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TPI</Term>
        <Definition>Two-Person Integrity</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Traditional INFOSEC Program</Term>
        <Definition>Program in which NSA acts as the central procurement agency for the development and, in some cases, the production of INFOSEC items.  This includes the Authorized Vendor Program.  Modification to the INFOSEC end-items used in products developed and/or produced under these programs must be approved by NSA.</Definition>
        <Source>CNSS Instruction No. 4009</Source>    </Entry>
    <Entry>
        <Term>Traffic Analysis (TA)</Term>
        <Definition>Study of communications patterns.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Traffic Encryption Key (TEK)</Term>
        <Definition>Key used to encrypt plain text or to superencrypt previously encrypted text and/or to decrypt cipher text.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Traffic-Flow Security (TFS)</Term>
        <Definition>Measure used to conceal the presence of valid messages in an on-line cryptosystem or secure communications system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Traffic Padding</Term>
        <Definition>Generation of spurious communications or data units to disguise the amount of real data units being sent.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Tranquility</Term>
        <Definition>Property whereby the security level of an object cannot change while the object is being processed by an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TRANSEC</Term>
        <Definition>Transmission Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Transmission Security (TRANSEC)</Term>
        <Definition>Component of communications security that results from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trap-door</Term>
        <Definition>Hidden software or hardware mechanism used to circumvent security controls.  Synonymous with Back Door.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Triple DES</Term>
        <Definition>Product cipher that, like DES, operates on 64-bit data blocks. There are several forms, each of which uses the DES cipher 3 times. Some forms use two 56-bit keys, some use three. See NIST FIPS 46-3 and CNSSAM IA/02-04.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TRB</Term>
        <Definition>Technical Review Board</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TRI-TAC</Term>
        <Definition>Tri-Service Tactical Communications System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trojan Horse</Term>
        <Definition>Program containing hidden code that allows the unauthorized collection, falsification, or destruction of information. See malicious code.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Channel</Term>
        <Definition>Means by which a TOE Security Function (TSF) and a remote trusted IT product can communicate with necessary confidence to support the TOE Security Policy (TSP).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Computer System</Term>
        <Definition>IS employing sufficient hardware and software assurance measures to allow simultaneous processing of a range of classified or sensitive information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Computing Base (TCB)</Term>
        <Definition>Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Distribution</Term>
        <Definition>Method for distributing trusted computing base (TCB) hardware, software, and firmware components that protects the TCB from modification during distribution.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Foundry</Term>
        <Definition>Facility where both classified and unclassified parts can be produced with an extra level of assurance that the parts have not been tampered.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Facility Manual</Term>
        <Definition>Document containing the operational requirements\s security environment\s hardware and software configurations and interfaces\s and all security procedures, measures, and contingency plans.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Identification Forwarding</Term>
        <Definition>Identification method used in IS networks whereby the sending host can verify an authorized user on its system is attempting a connection to another host.  The sending host transmits the required user authentication information to the receiving host.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Path</Term>
        <Definition>Means by which a user and a TOE Security Function (TSF) can communicate with necessary confidence to support the TOE Security Policy (TSP).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Process</Term>
        <Definition>Process that has privileges to circumvent the system security policy and has been tested and verified to operate only as intended.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Recovery</Term>
        <Definition>Ability to ensure recovery without compromise after a system failure.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Trusted Software</Term>
        <Definition>Software portion of a trusted computing base (TCB).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TSABI</Term>
        <Definition>Top Secret and Below Interoperability</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TSCM</Term>
        <Definition>Technical Surveillance Countermeasures</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TSEC</Term>
        <Definition>Telecommunications Security</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TSEC Nomenclature</Term>
        <Definition>System for identifying the type and purpose of certain items of COMSEC material.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TTAP</Term>
        <Definition>Trust Technology Assessment Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>TTPs</Term>
        <Definition>tactics, techniques, and procedures</Definition>
    </Entry>
    <Entry>
        <Term>Tunneling</Term>
        <Definition>Technology enabling one network to send its data via another network's connections.  Tunneling works by encapsulating a network protocol within packets carried by the second network.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Two-Part Code</Term>
        <Definition>Code consisting of an encoding section, in which the vocabulary items (with their associated code groups) are arranged in alphabetical or other systematic order, and a decoding section, in which the code groups (with their associated meanings) are arranged in a separate alphabetical or numeric order.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Two-Person Control</Term>
        <Definition>Continuous surveillance and control of positive control material at all times by a minimum of two authorized individuals, each capable of detecting incorrect and unauthorized procedures with respect to the task being performed, and each familiar with established security and safety requirements.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Two-Person Integrity (TPI)</Term>
        <Definition>System of storage and handling designed to prohibit individual access to certain COMSEC keying material by requiring the presence of at least two authorized persons, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed.  See no-lone zone.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type Certification</Term>
        <Definition>The certification acceptance of replica information systems based on the comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards, made as part of and in support of the accreditation process, to establish the extent to which a particular design and implementation meet a specified set of security requirements.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 1 Key</Term>
        <Definition>Generated and distributed under the auspices of NSA for use in a cryptographic device for the protection of classified and sensitive national security information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 1 Product</Term>
        <Definition>Cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed. Developed using established NSA business processes and containing NSA approved algorithms. Used to protect systems requiring the most stringent protection mechanisms.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 2 Key</Term>
        <Definition>Generated and distributed under the auspices of NSA for use in a cryptographic device for the protection of unclassified national security information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 2 Product</Term>
        <Definition>Cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting sensitive national security information when appropriately keyed. Developed using established NSA business processes and containing NSA approved algorithms. Used to protect systems requiring protection mechanisms exceeding best commercial practices including systems used for the protection of unclassified national security information.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 3 Key</Term>
        <Definition>Used in a cryptographic device for the protection of unclassified sensitive information, even if used in a Type 1 or Type 2 product.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 3 Product</Term>
        <Definition>Unclassified cryptographic equipment, assembly, or component used, when appropriately keyed, for encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices. Developed using established commercial standards and containing NIST approved cryptographic algorithms/modules or successfully evaluated by the National Information Assurance Partnership (NIAP).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 4 Key</Term>
        <Definition>Used by a cryptographic device in support of its Type 4 functionality, i.e., any provision of key that lacks U.S. Government endorsement or oversight.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Type 4 Product</Term>
        <Definition>Unevaluated commercial cryptographic equipment, assemblies, or components that neither NSA nor NIST certify for any Government usage. These products are typically delivered as part of commercial offerings and are commensurate with the vendor's commercial practices. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a FIPS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="U">
    <Entry>
        <Term>UA</Term>
        <Definition>User Agent</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>UDOP</Term>
        <Definition>user-developed operational picture</Definition>
    </Entry>
    <Entry>
        <Term>UIS</Term>
        <Definition>User Interface System</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Unauthorized Disclosure</Term>
        <Definition>Type of event involving exposure of information to individuals not authorized to receive it.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Unclassified</Term>
        <Definition>Information that has not been determined pursuant to Executive Order 12958 or any predecessor order to require protection against unauthorized disclosure and that is not designated as classified.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Untrusted Process</Term>
        <Definition>Process that has been evaluated or examined for adherence to the security policy.  It may include incorrect or malicious code that attempts to circumvent the security mechanisms.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Updating</Term>
        <Definition>Automatic or manual cryptographic process that irreversibly modifies the state of a COMSEC key, equipment, device or system.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>UPP</Term>
        <Definition>User Partnership Program</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>User</Term>
        <Definition>Person or process authorized to access an IS.  (PKI) Individual defined, registered, and bound to a public key structure by a certification authority (CA).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>User ID</Term>
        <Definition>Unique symbol or character string used by an IS to identify a specific user.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>User Partnership Program (UPP)</Term>
        <Definition>Partnership between the NSA and a U.S. Government agency to facilitate development of secure IS equipment incorporating NSA approved cryptography.  The result of this program is the authorization of the product or system to safeguard national security information in the user's specific application.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>User Representative</Term>
        <Definition>Individual authorized by an organization to order COMSEC keying material and interface with the keying system\s providing information to key users and ensure the correct type of key is ordered.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>U.S.-Controlled Facility</Term>
        <Definition>Base or building to which access is physically controlled by U.S. persons who are authorized U.S. Government or U.S. Government contractor employees.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>U.S.-Controlled Space</Term>
        <Definition>Room or floor within a facility that is not a U.S.-controlled facility, access to which is physically controlled by U.S. individuals who are authorized U.S. Government or U.S. Government contractor employees.  Keys or combinations to locks controlling entrance to U.S.-Controlled spaces must be under the exclusive control of U.S. persons who are U.S. Government or U.S. Government contractor employees.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>USCYBERCOM</Term>
        <Definition>United States Cyber Command</Definition>
    </Entry>
    <Entry>
        <Term>USSTRATCOM</Term>
        <Definition>United States Strategic Command</Definition>
    </Entry>
    <Entry>
        <Term>U.S. Person</Term>
        <Definition>United States citizen or a permanent resident alien, an unincorporated association substantially composed of United States citizens or permanent resident aliens, or a corporation incorporated in the United States, except for a corporation directed and controlled by a foreign government or governments.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="V">
    <Entry>
        <Term>VA</Term>
        <Definition>vulnerability assessment</Definition>
    </Entry>
    <Entry>
        <Term>Validated Products List</Term>
        <Definition>List of validated products that have been successfully evaluated under the National Information Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme (CCEVS).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Validation</Term>
        <Definition>Process of applying specialized security test and evaluation procedures, tools, and equipment needed to establish acceptance for joint usage of an IS by one or more departments or agencies and their contractors.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Variant</Term>
        <Definition>One of two or more code symbols having the same plain text equivalent.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Verification</Term>
        <Definition>Process of comparing two levels of an IS specification for proper correspondence (e.g., security policy model with top-level specification, top-level specification with source code, or source code with object code).</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Virtual Private Network (VPN)</Term>
        <Definition>Protected IS link utilizing tunneling, security controls (see information assurance), and end-point address translation giving the user the impression of a dedicated line</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Virus</Term>
        <Definition>Self replicating, malicious program segment that attaches itself to an application program or other executable system component and leaves no obvious signs of its presence.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>VMS</Term>
        <Definition>Vulnerability Management System</Definition>
    </Entry>
    <Entry>
        <Term>VoIP</Term>
        <Definition>Voice over Internet Protocol</Definition>
    </Entry>
    <Entry>
        <Term>VPN</Term>
        <Definition>Virtual Private Network</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Vulnerability</Term>
        <Definition>Weakness in an IS, system security procedures, internal controls, or implementation that could be exploited.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Vulnerability Analysis</Term>
        <Definition>Examination of information to identify the elements comprising a vulnerability.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Vulnerability Assessment</Term>
        <Definition>Formal description and evaluation of vulnerabilities of an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="W">
    <Entry>
        <Term>Web Risk Assessment</Term>
        <Definition>Process for ensuring websites are in compliance with applicable policies.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Wireless Technology</Term>
        <Definition>Permits the active or passive transfer of information between separated points without physical connection. Active information transfer may entail a transmit and/or receive emanation of energy, whereas passive information transfer entails a receive-only capability. Currently wireless technologies use IR, acoustic, RF, and optical but, as technology evolves, wireless could include other methods of transmission.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Work Factor</Term>
        <Definition>Estimate of the effort or time needed by a potential perpetrator, with specified expertise and resources, to overcome a protective measure.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Worm</Term>
        <Definition>See malicious code.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Write</Term>
        <Definition>Fundamental operation in an IS that results only in the flow of information from a subject to an object.  See access type.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Write Access</Term>
        <Definition>Permission to write to an object in an IS.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="X">
    <Entry>
        <Term>XDM/X Model</Term>
        <Definition>Experimental Development Model/Exploratory Development Model.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
<Section Letter="Z">
    <Entry>
        <Term>Zero Fill</Term>
        <Definition>To fill unused storage locations in an IS with the representation of the character denoting "0.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Zeroize</Term>
        <Definition>To remove or eliminate the key from a crypto-equipment or fill device.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
    <Entry>
        <Term>Zone of Control</Term>
        <Definition>Synonymous with inspectable space.</Definition>
        <Source>CNSS Instruction No. 4009</Source>
    </Entry>
</Section>
</Glossary>
