There is currently no text in this page. You can search for this page title in other pages, or search the related logs, but you do not have permission to create this page.
Category:NIST SP 800-53r1 Terms
Pages in category "NIST SP 800-53r1 Terms"
The following 200 pages are in this category, out of 217 total.
(previous page) (next page)A
C
E
I
M
N
P
S
- Safeguards
- Security Category
- Security Control Baseline
- Security Control Enhancements
- Security Controls
- Security Functions
- Security Impact Analysis
- Security Incident
- Security Label
- Security Objective
- Security Perimeter
- Security Plan
- Security Requirements
- Senior Agency Information Security Officer
- Spyware
- Subsystem
- System
- System Security Plan
- System-specific Security Control
T
- Tailored Security Control Baseline
- Tailoring
- Technical Controls
- Term:Accreditation
- Term:Accreditation Boundary
- Term:Accrediting Authority
- Term:Adequate Security
- Term:Agency
- Term:Authentication
- Term:Authenticity
- Term:Authorize Processing
- Term:Authorizing Official
- Term:Availability
- Term:Boundary Protection
- Term:Boundary Protection Device
- Term:Certification
- Term:Certification Agent
- Term:Certification Practice Statement
- Term:Chief Information Officer
- Term:Commodity Service
- Term:Common Carrier
- Term:Common Security Control
- Term:Compensating Security Controls
- Term:Confidentiality
- Term:Configuration Control
- Term:Controlled Area
- Term:Countermeasures
- Term:Executive Agency
- Term:External Information System (or Component)
- Term:External Information System Service
- Term:External Information System Service Provider
- Term:Federal Enterprise Architecture
- Term:Federal Information System
- Term:General Support System
- Term:Guard (System)
- Term:High-Impact System
- Term:Incident
- Term:Industrial Control System
- Term:Information
- Term:Information Owner
- Term:Information Resources
- Term:Information Security
- Term:Information Security Policy
- Term:Information System
- Term:Information System Owner (or Program Manager)
- Term:Information System Security Officer
- Term:Information Technology
- Term:Information Type
- Term:Integrity
- Term:Label
- Term:Line of Business
- Term:Local Access
- Term:Low-Impact System
- Term:Major Application
- Term:Major Information System
- Term:Malicious Code
- Term:Malware
- Term:Management Controls
- Term:Media
- Term:Media Access Control Address
- Term:Media Sanitization
- Term:Mobile Code
- Term:Mobile Code Technologies
- Term:Moderate-Impact System
- Term:National Security Emergency Preparedness Telecommunications Services
- Term:National Security Information
- Term:National Security System
- Term:Non-Repudiation
- Term:Operational Controls
- Term:Organization
- Term:Plan of Action and Milestones
- Term:Potential Impact
- Term:Privacy Impact Assessment
- Term:Privileged Function
- Term:Privileged User
- Term:Protective Distribution System
- Term:Records
- Term:Remote Access
- Term:Remote Maintenance
- Term:Risk
- Term:Risk Assessment
- Term:Risk Management
- Term:Safeguards
- Term:Scoping Guidance
- Term:Security Category
- Term:Security Control Baseline
- Term:Security Control Enhancements
- Term:Security Controls
- Term:Security Functions
- Term:Security Impact Analysis
- Term:Security Incident
- Term:Security Label
- Term:Security Objective
- Term:Security Perimeter
- Term:Security Plan
- Term:Security Requirements
- Term:Senior Agency Information Security Officer
- Term:Spyware
- Term:Subsystem
- Term:System
- Term:System Security Plan
- Term:System-specific Security Control