There is currently no text in this page. You can search for this page title in other pages, or search the related logs, but you do not have permission to create this page.
Category:NIST SP 800-53r3 Terms
Pages in category "NIST SP 800-53r3 Terms"
The following 147 pages are in this category, out of 147 total.
T
- Term:Adequate Security
- Term:Agency
- Term:Attribute-Based Access Control
- Term:Authentication
- Term:Authenticator
- Term:Authenticity
- Term:Authorization
- Term:Authorization Boundary
- Term:Authorize Processing
- Term:Authorizing Official
- Term:Availability
- Term:Boundary Protection
- Term:Boundary Protection Device
- Term:Chief Information Officer
- Term:Chief Information Security Officer
- Term:Classified Information
- Term:Commodity Service
- Term:Common Carrier
- Term:Common Control
- Term:Compensating Security Controls
- Term:Confidentiality
- Term:Configuration Control
- Term:Controlled Area
- Term:Controlled Unclassified Information
- Term:Countermeasures
- Term:Defense-In-Depth
- Term:Domain
- Term:Executive Agency
- Term:External Information System
- Term:External Information System Service
- Term:External Information System Service Provider
- Term:External Network
- Term:Failover
- Term:Federal Agency
- Term:Federal Enterprise Architecture
- Term:Federal Information System
- Term:FIPS-Validated Cryptography
- Term:Guard
- Term:High-Impact System
- Term:Hybrid Security Control
- Term:Identity-Based Access Control
- Term:Incident
- Term:Industrial Control System
- Term:Information Owner
- Term:Information Resources
- Term:Information Security
- Term:Information Security Policy
- Term:Information Security Program Plan
- Term:Information System
- Term:Information System Owner
- Term:Information System Security Officer
- Term:Information Technology
- Term:Information Type
- Term:Integrity
- Term:Internal Network
- Term:Label
- Term:Line of Business
- Term:Local Access
- Term:Low-Impact System
- Term:Malicious Code
- Term:Malware
- Term:Management Controls
- Term:Marking
- Term:Media
- Term:Mobile Code
- Term:Mobile Code Technologies
- Term:Mobile Device
- Term:Moderate-Impact System
- Term:Multifactor Authentication
- Term:National Security Emergency Preparedness Telecommunications Services
- Term:National Security System
- Term:Network
- Term:Network Access
- Term:Non-Local Maintenance
- Term:Non-Organizational User
- Term:Non-Repudiation
- Term:NSA-Approved Cryptography
- Term:Object
- Term:Operational Controls
- Term:Organization
- Term:Organizational User
- Term:Penetration Testing
- Term:Plan of Action and Milestones
- Term:Potential Impact
- Term:Privacy Impact Assessment
- Term:Privileged Account
- Term:Privileged Command
- Term:Privileged User
- Term:Protective Distribution System
- Term:Reciprocity
- Term:Records
- Term:Red Team Exercise
- Term:Remote Access
- Term:Remote Maintenance
- Term:Removable Media
- Term:Restricted Data
- Term:Risk
- Term:Risk Assessment
- Term:Risk Management
- Term:Role-Based Access Control
- Term:Safeguards
- Term:Sanitization
- Term:Scoping Guidance
- Term:Security Authorization
- Term:Security Authorization Boundary
- Term:Security Categorization
- Term:Security Category
- Term:Security Control Assessment
- Term:Security Control Baseline
- Term:Security Control Enhancements
- Term:Security Control Inheritance
- Term:Security Controls
- Term:Security Domain
- Term:Security Functions
- Term:Security Impact Analysis
- Term:Security Incident
- Term:Security Label
- Term:Security Marking
- Term:Security Objective
- Term:Security Plan
- Term:Security Policy
- Term:Security Requirements
- Term:Security-Relevant Information
- Term:Senior (Agency) Information Security Officer
- Term:Senior Information Security Officer
- Term:Sensitive Compartmented Information
- Term:Sensitive Information
- Term:Spam
- Term:Special Access Program
- Term:Spyware
- Term:Subject
- Term:Subsystem
- Term:Supply Chain
- Term:System
- Term:System Security Plan
- Term:System-specific Security Control
- Term:Tailored Security Control Baseline
- Term:Tailoring
- Term:Technical Controls
- Term:Threat
- Term:Threat Assessment
- Term:Threat Source
- Term:Trusted Path
- Term:User
- Term:Vulnerability
- Term:Vulnerability Assessment