Category:NIST Terms
National Institute of Standards and Technology
Terms from documents published by the National Institute of Standards and Technology.
Pages in category "NIST Terms"
The following 200 pages are in this category, out of 502 total.
(previous page) (next page)T
- Term:Ability
- Term:Access Control
- Term:Access Control List
- Term:Accreditation
- Term:Accreditation Boundary
- Term:Accrediting Authority
- Term:Activities
- Term:Actuator
- Term:Adequate Security
- Term:Agency
- Term:Aggregated Risk
- Term:Alarm
- Term:Alternating Current Drive
- Term:Antivirus Tools
- Term:Applicant
- Term:Application
- Term:Application Server
- Term:Approved
- Term:Approved Mode of Operation
- Term:Approved Security Function
- Term:Architecture
- Term:Assessment Procedure
- Term:Assessment Team
- Term:Asset Database
- Term:Asset Scanner
- Term:Assurance
- Term:Asymmetric Keys
- Term:Attack
- Term:Authenticated Configuration Scanner
- Term:Authenticated Scanner
- Term:Authenticated Vulnerability and Patch Scanner
- Term:Authentication
- Term:Authentication Code
- Term:Authenticator
- Term:Authenticity
- Term:Authorization
- Term:Authorization Key
- Term:Authorize Processing
- Term:Authorized Data Security Association (SA) List
- Term:Authorizing Official
- Term:Authorizing Official Designated Representative
- Term:Automated Key Transport
- Term:Availability
- Term:Backdoor
- Term:Backhaul
- Term:Base Station
- Term:Batch Process
- Term:Biometric
- Term:Biometric Information
- Term:Biometric System
- Term:Boundary Protection
- Term:Boundary Protection Device
- Term:Broadcast
- Term:Brute Force Attack
- Term:Buffer Overflow
- Term:Capture
- Term:Capturing
- Term:Cardholder
- Term:CCE ID
- Term:Certificate Revocation List
- Term:Certification
- Term:Certification Agent
- Term:Certification Authority
- Term:Chief Information Officer
- Term:Claimant
- Term:Classified National Security Information
- Term:Clear Text
- Term:Collect and Communicate Audit Trail
- Term:Common Configuration Enumeration
- Term:Common Control
- Term:Common Control Provider
- Term:Common Platform Enumeration
- Term:Common Security Control
- Term:Common Vulnerabilities and Exposures
- Term:Common Vulnerability Scoring System
- Term:Comparison
- Term:Comparison Utility
- Term:Compensating Security Control
- Term:Compensating Security Controls
- Term:Complete Assessment
- Term:Component
- Term:Compromise
- Term:Confidentiality
- Term:Configuration (of A System Or Device)
- Term:Configuration Control
- Term:Conformance Testing
- Term:Continuous Process
- Term:Control Algorithm
- Term:Control Center
- Term:Control Information
- Term:Control Loop
- Term:Control Network
- Term:Control Server
- Term:Control System
- Term:Controlled Variable
- Term:Controller
- Term:Countermeasures
- Term:CPE Name
- Term:Cracking
- Term:Credential
- Term:Credential Management
- Term:Credentials
- Term:Critical Security Parameter
- Term:Crypto Officer
- Term:Cryptographic Boundary
- Term:Cryptographic Key
- Term:Cryptographic Key Component
- Term:Cryptographic Module
- Term:Cryptographic Module Security Policy
- Term:Customer
- Term:CVE ID
- Term:Cycle Time
- Term:Data Encryption Security Association (SA) Type Indicator
- Term:Data Historian
- Term:Data Path
- Term:Database
- Term:DC Servo Drive
- Term:De-identification
- Term:Defense-in Breadth
- Term:Defense-In-Depth
- Term:Denial of Service
- Term:Derived Test Requirement/Test Requirement
- Term:Diagnostics
- Term:Dictionary Attack
- Term:Differential Power Analysis
- Term:Digital Signature
- Term:Disaster Recovery Plan
- Term:Discrete Process
- Term:Distributed Control System
- Term:Distributed Plant
- Term:Disturbance
- Term:Document Confidentiality
- Term:Document Integrity
- Term:Domain Controller
- Term:Eavesdropping
- Term:Electromagnetic Compatibility
- Term:Electromagnetic Interference
- Term:Electronic Key Entry
- Term:Encrypted Key
- Term:Encryption
- Term:Enrollment Service
- Term:Enterprise
- Term:Enterprise Resource Planning (ERP) System
- Term:Entity Identity Assertion
- Term:Environmental Failure Protection
- Term:Environmental Failure Testing
- Term:Error Detection Code
- Term:Examine
- Term:Executive Agency
- Term:Extended Assessment Procedure
- Term:EXtensible Configuration Checklist Document Format
- Term:Extensible Markup Language
- Term:External Information System (or Component)
- Term:External Information System Service
- Term:External Information System Service Provider
- Term:Fault Tolerant
- Term:FDCC Scanner
- Term:Federal Agency
- Term:Federal Desktop Core Configuration
- Term:Federal Enterprise Architecture
- Term:Federal Information Processing Standards
- Term:Federal Information System
- Term:Field Device
- Term:Field Site
- Term:Fieldbus
- Term:File Transfer Protocol
- Term:Finite State Model
- Term:Firewall
- Term:Firmware
- Term:Framework
- Term:Global Supply Chain
- Term:Graduated Security
- Term:Group Key Encryption Key
- Term:Group Traffic Encryption Key
- Term:Guessing
- Term:Hardware
- Term:Hash Function
- Term:Hash-Based Message Authentication Code
- Term:High-Impact System
- Term:Host-Based Intrusion Detection and Prevention System
- Term:Human-Machine Interface
- Term:Hybrid Attack
- Term:Hybrid Security Control
- Term:Identification
- Term:Identifier
- Term:Identity
- Term:Identity Binding
- Term:Identity Credential
- Term:Identity Management System
- Term:Identity Proofing
- Term:Identity Registration
- Term:Identity Verification
- Term:Import
- Term:Incident
- Term:Individuals
- Term:Industrial Control System
- Term:Information
- Term:Information in Identifiable Form
- Term:Information Owner
- Term:Information Resources