Category:FISMA Terms
Federal Information Security Management Act
Terms from documents which support the Federal Information Security Management Act.
Pages in category "FISMA Terms"
The following 200 pages are in this category, out of 931 total.
(previous page) (next page)T
- Term:Acceptable Risk
- Term:Acceptance
- Term:Access Authentication
- Term:Access Control
- Term:Accountability
- Term:Accreditation
- Term:Accreditation Boundary
- Term:Accreditation Package
- Term:Accrediting Authority
- Term:Acquisition
- Term:Active Attack
- Term:Active Tag
- Term:Activities
- Term:Address of Record
- Term:Address Resolution Protocol
- Term:Adequate Security
- Term:Adj-RIB-Out
- Term:Administrative Account
- Term:Advanced Encryption Standard
- Term:Adversary
- Term:After Action Report
- Term:Agency
- Term:Agent
- Term:Aggregate
- Term:Aggregated Risk
- Term:Alert
- Term:Algorithm
- Term:Analysis
- Term:Analytic Systems
- Term:Anomaly-Based Detection
- Term:Anti-Forensic
- Term:Antivirus Software
- Term:Application
- Term:Application Layer
- Term:Application Translation
- Term:Application-Based Intrusion Detection and Prevention System
- Term:Approved
- Term:Approved Hash Algorithms
- Term:Assertion
- Term:Assessment Findings
- Term:Assessment Method
- Term:Assessment Object
- Term:Assessment Objective
- Term:Assessment Procedure
- Term:Asset
- Term:Assurance
- Term:Assurance Case
- Term:Asymmetric Keys
- Term:ATP
- Term:Attack
- Term:Attacker
- Term:Attribute-Based Access Control
- Term:Authenticated RFID
- Term:Authentication
- Term:Authentication Credentials
- Term:Authentication Framework
- Term:Authentication Mechanism
- Term:Authentication Method
- Term:Authentication Protocol
- Term:Authentication, Authorization, and Accounting
- Term:Authenticator
- Term:Authenticity
- Term:Authorization
- Term:Authorization Boundary
- Term:Authorize Processing
- Term:Authorizing Official
- Term:Authorizing Official Designated Representative
- Term:Autonomous System
- Term:Autonomous System Number
- Term:Availability
- Term:Availability Protection
- Term:Awareness, Training, and Education
- Term:Back Channel
- Term:Backdoor
- Term:Backscatter Channel
- Term:Backup
- Term:Baselining
- Term:BGP Peer
- Term:BGP Session
- Term:BGP Speaker
- Term:Biometric
- Term:Bit
- Term:Bit Stream Imaging
- Term:Bit String
- Term:Bits of Security
- Term:Black Box Testing
- Term:Blacklist
- Term:Blended Attack
- Term:Blinding
- Term:Block Cipher
- Term:Bluetooth
- Term:Boot Sector Virus
- Term:Bot
- Term:Boundary Protection
- Term:Boundary Protection Device
- Term:Brute Force Password Attack
- Term:Buffer Overflow Attack
- Term:Business Areas
- Term:Business Continuity Plan
- Term:Business Impact Analysis
- Term:Business Recovery/Resumption Plan
- Term:Byte
- Term:Candidate Checklist
- Term:Capital Planning and Investment Control Process
- Term:CD
- Term:CD-R
- Term:CD-RW
- Term:CERT/CC
- Term:Certificate Revocation List
- Term:Certification
- Term:Certification Agent
- Term:Certification and Accreditation
- Term:Certification Authority
- Term:Certification Practice Statement
- Term:Chain of Custody
- Term:Challenge-Response Protocol
- Term:Channel Scanning
- Term:Chief Information Officer
- Term:Chief Information Security Officer
- Term:Ciphersuite
- Term:Ciphersuite Negotiation
- Term:CIS
- Term:Claimant
- Term:Classified Information
- Term:Classified National Security Information
- Term:Clear
- Term:Clinger-Cohen Act of 1996
- Term:Cloned Tag
- Term:Closed System
- Term:Closeout
- Term:Cluster
- Term:CMRR
- Term:CMVP
- Term:Code Division Multiple Access
- Term:Cold Site
- Term:Collection
- Term:Collision
- Term:Collision Resistance
- Term:Command and Control
- Term:Commercial Off-the-Shelf
- Term:Commodity Service
- Term:Common Carrier
- Term:Common Control
- Term:Common Control Provider
- Term:Common Security Control
- Term:Compensating Security Control
- Term:Compensating Security Controls
- Term:Compiled Viruses
- Term:Component Test
- Term:Compound Key
- Term:Comprehensive Test
- Term:Compressed File
- Term:Computer
- Term:Computer Forensics
- Term:Computer Security Incident
- Term:Computer Security Incident Response Team
- Term:Confidentiality
- Term:Configuration Control
- Term:Console
- Term:Consortia
- Term:Consumer
- Term:Consumer Device
- Term:Container
- Term:Content Filtering
- Term:Content Generator
- Term:Contingency Plan
- Term:Contingency Planning
- Term:Continuity of Operations Plan
- Term:Continuity of Support Plan
- Term:Contract Administration
- Term:Contracting Officer
- Term:Contracting Officer's Technical Representative
- Term:Control Cell
- Term:Control Gate
- Term:Controlled Area
- Term:Controlled Unclassified Information
- Term:Controller
- Term:Cookie
- Term:Counterintelligence
- Term:Countermeasures
- Term:Cover-Coding
- Term:Coverage
- Term:Cradle
- Term:Credential
- Term:Credentials Service Provider
- Term:Criticality
- Term:Cryptographic Binding
- Term:Cryptographic Hash Function
- Term:Cryptographic Key
- Term:Cryptographic Strength
- Term:Cryptographic Token
- Term:Cryptography
- Term:Cryptologic
- Term:Cryptology
- Term:Custom
- Term:Customization
- Term:Cyclical Redundancy Check
- Term:Daily Use Account
- Term:Data
- Term:Data Collector