Granite Island Group Banner


NSTISS                         NATIONAL MANAGER
NATIONAL SECURITY              5 June 1992
TELECOMMUNICATIONS
AND INFORMATION
SYSTEMS SECURITY

                                   FOREWORD


    l.  National Security Telecommunications and Information
Systems Security Instruction (NSTISSI) No. 4009, "National
Information Systems Security (INFOSEC) Glossary," provides
standard definitions for many of the specialized terms relating
to the disciplines of communications security (COMSEC) and

automated information systems security (AISS), sometimes
referred to as computer security (COMPUSEC).  In general,
communications and data management terms that do not relate
closely to telecommunications and automated information systems
security are outside the scope of this document and are not
included.

    2.  The definitions contained in this glossary are
prescriptive for all elements of the U.S. Government and for its
contractors with respect to national security systems.

    3.  This document is divided into three sections:  Section I
contains terms and definitions, Section II is a list of commonly
used abbreviations and acronym expansions, and Section III
contains applicable references.  In the definitions section,
explanatory information is presented in notes following the
definitions with which they are associated.  Such notes are not
part of the definitions to which they relate.

    4.  This document supersedes NCSC-9, "National
Communications Security (COMSEC) Glossary," dated l September
1982.

    5.  Representatives of the National Security
Telecommunications and Information Systems Security Committee
may obtain additional copies of this instruction from:

        Executive Secretariat
        National Security Telecommunications and
        Information Systems Security Committee (NSTISSC)
        National Security Agency
        Fort George G. Meade, MD  20755-6000

    6.  U.S. Government contractors are to contact their appropriate
government agency or Contracting Officer Representative regarding 
distribution of this document.

    7.  Readers are encuraged to review this glossary and suggest
additions, deletions, or changes at any time.  Recommendations for
revising the document may be sent to the Executive Secretariat at the
above address, via the appropriate NSTISSC representative.



                              J. M. McConnell
			Vice Admiral, U.S. Navy

                                              NSTISSI No. 4009




                                   SECTION I
                             TERMS AND DEFINITIONS



                                       A

access                      (COMSEC) Capability and opportunity to
                            gain knowledge of or to alter information
                            or material.

                            (AIS)  Ability and means to communicate
                            with (i.e. input to or receive output
                            from), or otherwise make use of any
                            information, resource, or component in an
                            AIS.

                            NOTE:  An individual does not have
                            "access~ if the proper authority or a
                            physical, technical, or procedural
                            measure prevents them from obtaining
                            knowledge or having an opportunity to
                            alter information, material, resources,
                            or components.

access control              Process of limiting access to the
                            resources of an AIS only to authorized
                            users, programs, processes, or other
                            systems.

access control list         Mechanism implementing discretionary
                            access control in an AIS that identifies
                            the users who may access an object and
                            the type of access to the object that a
                            user is permitted.

access control mechanism    Security safeguards designed to detect
                            and prevent unauthorized access, and to
                            permit authorized access in an AIS.
        
                                        NSTISSI No. 4009




access level                Hierarchical portion of the security
                            level used to identify the sensitivity of
                            AIS data and the clearance or
                            authorization of users.

                            NOTE:  Access level, in conjunction with
                            the non-hierarchical categories, forms
                            the sensitivity label of an object.  See
                            category.

access list                 (COMSEC) Roster of persons authorized
                            admittance to a controlled area.

                            (AIS)  Compilation of users, programs,
                            and/or processes and the access levels
                            and types to which each is authorized.

access period               Segment of time, generally expressed in
                            days or weeks, during which access rights
                            prevail.

access port                 Logical or physical identifier a computer
                            uses to distinguish different terminal
                            input/output data streams or the physical
                            connection for attaching an external
                            device.

access type                 Privilege to perform an action on a
                            program or file.

                            NOTE:  Read, write, execute, append,
                            modify, delete, and create are examples
                            of access types.

accessible space            Area within which the user is aware of
                            all persons entering and leaving, which
                            denies the opportunity for concealed
                            TEMPEST surveillance, and which
                            delineates the closest point of potential
                            tempest intercept from a vehicle.

accountability              (COMSEC)  Principle that an individual is
                            responsible for safeguarding and
                            controlling of COMSEC equipment, keying
                            material, and information entrusted to
                            his/her care and is answerable to proper
                            authority for the loss or misuse of that
                            equipment or information.



                                       2

                                                    NSTISSI No. 4009




accountability              (AIS)  Property that allows auditing of
                            activities on an AIS to be traced to
                            persons who may then be held responsible
                            for their actions.

accounting legend           Numeric code used to indicate the
  code                      minimum accounting controls required for
                            items of accountable COMSEC material
                            within the COMSEC Material Control
                            System.

                            NOTE:  National-level accounting legend
                            codes are:

                            ALC-l - continuously accountable by
                            serial number.

                            ALC-2 - continuously accountable by
                            quantity.

                            ALC-4 - report of initial receipt
                            required.  After acknowledging receipt,
                            users may control in accordance with
                            Service, department, or agency
                            directives.

accounting number           Number assigned to an item of COMSEC
                            material to facilitate its control.

accreditation               Formal declaration by a designated
                            approving authority that an AIS is
                            approved to operate in a particular
                            security mode using a prescribed set of
                            safeguards.

accreditation authority     Synonymous with designated approving
                            authority.

add-on security             Incorporation of new hardware, software,
                            or firmware safeguards in an operational
                            AIS.

adversary                   Person or organization that must be
                            denied access to critical information.







                                       3

                                              NSTISSI No. 4009




alternate COMSEC            Person designated by proper authority to
  custodian                 perform the duties of the COMSEC
                            custodian during the temporary absence of
                            the COMSEC custodian.

anti-jam                    Measures to ensure that intended
                            transmitted information can be received
                            despite deliberate jamming attempts.

anti-spoof                  Measures to prevent an opponent's
                            participation in a telecommunications
                            network or operation/control of a
                            cryptographic or COMSEC system.

assembly                    Group of parts, elements, subassemblies,
                            or circuits that are removable items of
                            COMSEC equipment.

assurance                   Measure of confidence that the security
                            features and architecture of an AIS
                            accurately mediate and enforce the
                            security policy.

attack                      Act of trying to defeat AIS safeguards.

audit                       Independent review and examination of
                            records and activities to assess the
                            adequacy of system controls, to ensure
                            compliance with established policies and
                            operational procedures, and to recommend
                            necessary changes in controls, policies,
                            or procedures.

audit trail                 Chronological record of system activities
                            to enable the reconstruction and
                            examination of the sequence of events
                            and/or changes in an event.

                            NOTE:  Audit trail may apple to
                            information in an AIS, to message routing
                            in a communications system, or to the
                            transfer of COMSEC material.










                                       4

                                              NSTISSI No. 4009




authenticate                Verify the identity of a user, user
                            device, or other entity, or the integrity
                            of data stored, transmitted, or otherwise
                            exposed to unauthorized modification in
                            an automated information system, or
                            establish the validity of a transmitted
                            message.

authentication              Security measure designed to establish
                            the validity of a transmission, message,
                            or originator, or a means of verifying an
                            individual's eligibility to receive
                            specific categories of information.

authentication system       Cryptosystem or process used for
                            authentication.

authenticator               Means used to confirm the identity or
                            eligibility of a station, originator, or
                            individual.

authorization               Access rights granted to a user, program,
                            or process.

authorized vendor           Manufacturer of existing COMSEC equipment
                            who is authorized to produce quantities
                            in excess of contractual requirements for
                            direct sale to eligible buyers.

Authorized Vendor           Program in which a vendor, producing a
  Program                   COMSEC product under contract to the
                            National Security Agency, is authorized
                            to produce that product in numbers
                            exceeding the contracted requirements for
                            direct marketing and sale to eligible
                            buyers.

                            NOTE:  Eligible buyers are typically U.S.
                            Government organizations or U.S.
                            Government contractors.  Products
                            approved for marketing and sale through
                            the Authorized Vendor Program are placed
                            on the Endorsed Cryptographic Products
                            List.







                                       5

                                              NSTISSI No. 4009




auto-manual system          Programmable, hand-held crypto-equipment
                            used to perform encoding and decoding
                            functions.


automated information       Any equipment or interconnected system
  systems                   or subsystems of equipment that is used
                            in the automatic acquisition, storage,
                            manipulation, management, movement,
                            control, display, switching, interchange,
                            transmission or reception of data and
                            includes computer software, firmware, and
                            hardware.

                            NOTE:  Included are computers, word
                            processing systems, networks, or other
                            electronic information handling systems,
                            and associated equipment.

automated information       Synonymous with computer security.
  systems security

automated security          Use of automated procedures to ensure
  monitoring                security controls for an AIS are not
                            circumvented.

automatic remote            Procedure to rekey a distant crypto-
  rekeying                  equipment electronically without specific
                            actions by the receiving terminal
                            operator.

availability of data        Data that is in the place, at the time,
                            and in the form needed by the user.


















                                       6

                                              NSTISSI No. 4009




                                       B


backdoor                    Synonymous with trap door.

Bell-La Padula              Formal-state transition model of a
security model              computer security policy that describes a
                            formal set of access controls based on
                            information sensitivity and subject
                            authorizations.  (See star (*) property
                            and simple security property.)

benign                      Condition of cryptographic data such that
                            it cannot be compromised by human access
                            to the data.

                            NOTE:  The term benign may be used to
                            modify a variety of COMSEC-related terms,
                            (e.g., key, data, storage, fill, and key
                            distribution techniques).

benign environment          Nonhostile environment that may be
                            protected from external hostile elements
                            by physical, personnel, and procedural
                            security countermeasures.

beyond Al                   Level of trust employed by the DoD
                            Trusted Computer System Evaluation
                            Criteria that was beyond the state-of-
                            the-art technology at the time the
                            criteria was developed.

                            NOTE:  As defined in the "Orange Book,"
                            beyond Al includes all the Al-level
                            features, plus others not required at the
                            Al level.

binding                     Process of associating a specific
                            communications terminal with a specific
                            cryptographic key or associating two
                            related elements of information.

bit error rate              Ratio between the number of bits
                            incorrectly received and the total number
                            of bits transmitted in a
                            telecommunications system.





                                       7

                                              NSTISSI No. 4009



BLACK                       Designation applied to telecommunications
                            and automated information systems, and to
                            associated areas, circuits, components,
                            and equipment, in which only unclassified
                            signals are processed.

                            NOTE:  Encrypted signals are
                            unclassified.

BLACK key                   Encrypted key.  (See RED key.)

brevity list                List containing words and phrases used to
                            shorten messages.

browsing                    Act of searching through AIS storage to
                            locate or acquire information, without
                            necessarily knowing the existence or
                            format of information being sought.

bulk encryption             Simultaneous encryption of all channels
                            of a multichannel telecommunications
                            trunk.





























                                       8

                                               NSTISSI No. 4009



                                       C


call back                   Procedure for identifying a remote AIS
                            terminal, whereby the host system
                            disconnects the caller and then dials the
                            authorized telephone number of the remote
                            terminal to re-establish the connection.

call sign cipher            Cryptosystem used to encipher/decipher
                            call signs, address groups, and address
                            indicating groups.

canister                    Type of protective package used to
                            contain and dispense key in punched or
                            printed tape form.

capability                  Unforgeable ticket that provides
                            incontestable proof that the presenter is
                            authorized access to the object named in
                            the ticket.

capability-based            AIS in which access to protected objects
  system                    is granted if the subject possesses a
                            capability for the object.

category                    Restrictive label that has been applied
                            to both classified and unclassified data,
                            thereby increasing the requirement for
                            protection of, and restricting the access
                            to, the data.

                            NOTE:  Examples include sensitive
                            compartmented information, proprietary
                            information, and North Atlantic Treaty
                            Organization information.  Individuals
                            are granted access to special category
                            information only after being granted
                            formal access authorization.

CCI assembly                Device embodying a cryptographic logic or
                            other COMSEC design that the National
                            Security Agency has approved as a
                            controlled cryptographic item and
                            performs the entire COMSEC function, but
                            is dependent upon the host equipment to
                            operate.







                                       9

                                              NSTISSI No. 4009





CCI component               Device embodying a cryptographic logic or
                            other COMSEC design, which the National
                            Security Agency has approved as a
                            controlled cryptographic item, that does
                            not perform the entire COMSEC function
                            and is dependent upon the host equipment
                            or assembly to complete and operate the
                            COMSEC function.

CCI equipment               Telecommunications or information
                            handling equipment that embodies a
                            controlled cryptographic item component
                            or controlled cryptographic item assembly
                            and performs the entire COMSEC function
                            without dependence on a host equipment to
                            operate.

central office of           Office of a federal department or agency
  record                    that keeps records of accountable COMSEC
                            material held by elements subject to its
                            oversight.

certificate of action       Statement attached to a COMSEC audit
  statement                 report by which a COMSEC custodian
                            certifies that all actions have been
                            completed.

certification               Comprehensive evaluation of the technical
                            and nontechnical security features of an
                            AIS and other safeguards, made in support
                            of the accreditation process, to
                            establish the extent to which a
                            particular design and implementation
                            meets a set of specified security
                            requirements.

certified TEMPEST           U.S. Government or U.S. Government
  technical authority       contractor employee designated to review
                            the TEMPEST countermeasures programs of a
                            federal department or agency.

challenge and reply         Prearranged procedure in which
  authentication            one communicator requests authentication
                            of another and the latter establishes
                            his/her validity with a correct reply.




                                      10

                                               NSTISSI No. 4009




checksum                    Value computed, via some parity or
                            hashing algorithm, on information
                            requiring protection against error or
                            manipulation.

                            NOTE:  Checksums are stored or
                            transmitted with data and are intended to
                            detect data integrity problems.

check word                  Cipher text generated by a cryptographic
                            logic to detect failures in the
                            cryptography.

cipher                      Cryptographic system in which units of
                            plain text are substituted according to a
                            predetermined key.

cipher text                 Enciphered information.

cipher text auto-key        Cryptographic logic which uses previous
                            cipher text to generate a key stream.

ciphony                     Process of enciphering audio information,
                            resulting in encrypted speech.

classified information      National security information that has
                            been classified pursuant to Executive
                            Order 12356.

clearing                    Removal of data from an AIS, its storage
                            devices, and other peripheral devices
                            with storage capacity, in such a way that
                            the data may not be reconstructed using
                            normal system capabilities (i.e., through
                            the keyboard).

                            NOTE:  An AIS need not be disconnected
                            from any external network before clearing
                            takes place.  Clearing enables a product
                            to be reused within, but not outside of,
                            a secure facility.  It does not produce a
                            declassified product by itself, but may
                            be the first step in the declassification
                            process.  See purge.








                                      Il

                                              NSTISSI No. 4009




closed security             Environment that provides sufficient
  environment               assurance that applications and equipment
                            are protected against the introduction of
                            malicious logic prior to or during the
                            operation of a system.

                            NOTE:  Closed security is predicated upon
                            a system's developers, operators, and
                            maintenance personnel having sufficient
                            clearances, authorization, and
                            configuration control.

code                        System of communication in which
                            arbitrary groups of letters, numbers, or
                            symbols represent units of plain text of
                            varying length.

                            NOTE:  Codes may or may not provide
                            security.  Common uses include:  (a)
                            converting information into a form
                            suitable for communications or
                            encryption, (b) reducing the length of
                            time required to transmit information,
                            (c) describing the instructions which
                            control the operation of a computer, and
                            (d) converting plain text to meaningless
                            combinations of letters or numbers and
                            vice versa.

code book                   Book or other document containing plain
                            text and code equivalents in a systematic
                            arrangement, or a technique of machine
                            encryption using a word substitution
                            technique.

code group                  Group of letters, numbers, or both in a
                            code system used to represent a plain
                            text word, phrase, or sentence.

code vocabulary             Set of plain text words, numerals,
                            phrases, or sentences for which code
                            equivalents are assigned in a code
                            system.

cold start                  Procedure for initially keying crypto-
                            equipment.





                                      12

                                              NSTISSI No. 4009




command authority           Individual responsible for the
                            appointment of user representatives for a
                            department, agency, or organization and
                            their key ordering privileges.

Commercial COMSEC           Relationship between the National
  Endorsement Program       Security Agency and industry, in which
                            the National Security Agency provides the
                            COMSEC expertise (i.e., standards,
                            algorithms, evaluations, and guidance)
                            and industry provides design,
                            development, and production capabilities
                            to produce a type l or type 2 product.

                            NOTE:  Products developed under the
                            Commercial COMSEC Endorsement Program may
                            include modules, subsystems, equipment,
                            systems, and ancillary devices.

common fill device          One of a family of devices developed to
                            read-in, transfer, or store key.
                            NOTE:  KYK-l3 Electronic Transfer Device,
                            KYX-l5 Net Control Device, and KOI-l8
                            General Purpose Tape Reader are examples
                            of common fill devices.

communications cover        Concealing or altering of characteristic
                            communications patterns to hide
                            information that could be of value to an
                            adversary.

communications              Deliberate transmission, retransmission,
  deception                 or alteration of communications to
                            mislead an adversary's interpretation of
                            the communications.  (See imitative
                            communications deception and manipulative
                            communications deception.)














                                      13

                                              NSTISSI No. 4009




communications              Analytic model of communications
 profile                    associated with an organization or
                            activity.

                            NOTE:  The model is prepared from a
                            systematic examination of communications
                            content and patterns, the functions they
                            reflect, and the communications security
                            measures applied.

communications              Measures and controls taken to deny
  security                  unauthorized persons information derived
                            from telecommunications and ensure the
                            authenticity of such telecommunications.

                            NOTE:  Communications security includes
                            cryptosecurity, transmission security,
                            emission security, and physical security
                            of COMSEC material.

compartmented mode          AIS security mode of operation wherein
                            each user with direct or indirect access
                            to the system, its peripherals, remote
                            terminals, or remote hosts has all of the
                            following:

                            a.  Valid security clearance for the most
                            restricted information processed in the
                            system.

                            b.  Formal access approval and signed
                            non-disclosure agreements for that
                            information to which a user is to have
                            access.

                            c.  Valid need-to-know for information to
                            which a user is to have access.













                                      14

                                              NSTISSI No. 4009




compromise                  Disclosure of information or data to
                            unauthorized persons, or a violation of
                            the security policy of a system in which
                            unauthorized intentional or unintentional
                            disclosure, modification, destruction, or
                            loss of an object may have occurred.

compromising                Unintentional signals that, if
  emanations                intercepted and analyzed, would disclose
                            the information transmitted, received,
                            handled, or otherwise processed by
                            telecommunications or automated
                            information systems equipment.  (See
                            TEMPEST.)

computer abuse              Intentional or reckless misuse,
                            alteration, disruption, or destruction of
                            data processing resources.

computer                    Use of a crypto-algorithm program
  cryptography              stored in software or firmware, by a
                            general purpose computer to authenticate
                            or encrypt/decrypt data for storage or
                            transmission.

computer security           Measures and controls that ensure
                            confidentiality, integrity, and
                            availability of the information processed
                            and stored by a computer.

computer security           Any event in which a computer system is
  incident                  attacked, intruded into, or threatened
                            with an attack or intrusion.

computer security           Device designed to provide limited
  subsystem                 computer security features in a larger
                            system environment.

Computer Security           Program that focuses on technical
  Technical                 vulnerabilities in commercially
  Vulnerability             available hardware, firmware and
  Reporting Program         software products acquired by DoD.

                            NOTE:  The Computer Security Technical
                            Vulnerability Reporting Program provides
                            for reporting, cataloging, and discrete
                            dissemination of technical vulnerability
                            and corrective-measure information on a
                            need-to-know basis.




                                      15

                                              NSTISSI No. 4009



COMSEC account              Administrative entity, identified by an
                            account number, used to maintain
                            accountability, custody and control of
                            COMSEC material.

COMSEC account audit        Examination of the holdings, records, and
                            procedures of a COMSEC account to ensure
                            that all accountable COMSEC material is
                            properly handled and safeguarded.

COMSEC aid                  COMSEC material, other than an equipment
                            or device, that assists in securing
                            telecommunications and which is required
                            in the production, operation, or
                            maintenance of COMSEC systems and their
                            components.

                            NOTE:  COMSEC keying material, callsign/
                            frequency systems, and supporting
                            documentation, such as operating and
                            maintenance manuals, are examples of
                            COMSEC aids.

COMSEC boundary             Definable perimeter within a
                            telecommunications equipment or system
                            within which all hardware, firmware, and
                            software components that perform critical
                            COMSEC functions are located.

                            NOTE:  Key generation and key handling
                            and storage are critical COMSEC
                            functions.

COMSEC chip set             Collection of National Security Agency
                            approved microchips furnished to a
                            manufacturer to secure or protect
                            telecommunications equipment.  (See
                            secure communications and protected
                            communications.)












                                      16

                                              NSTISSI No. 4009




COMSEC control              Set of instructions or routines for
  program                   a computer that controls or affects the
                            externally performed functions of key
                            generation, key distribution, message
                            encryption/decryption, or authentication.

COMSEC custodian            Person designated by proper authority to
                            be responsible for the receipt, transfer,
                            accounting, safeguarding and destruction
                            of COMSEC material assigned to a COMSEC
                            account.

                            NOTE:  The term COMSEC manager is
                            replacing the term COMSEC custodian.
                            These terms are not synonymous, since the
                            responsibilities of the COMSEC manager
                            extend beyond the functions required for
                            effective operation of a COMSEC account.

COMSEC end item             Equipment or combination of components
                            ready for its intended use in a COMSEC
                            application.

COMSEC equipment            Equipment designed to provide security to
                            telecommunications by converting
                            information to a form unintelligible to
                            an unauthorized interceptor and,
                            subsequently, by reconverting such
                            information to its original form for
                            authorized recipients; also, equipment
                            designed specifically to aid in, or as an
                            essential element of, the conversion
                            process.

                            NOTE:  COMSEC equipment includes crypto-
                            equipment, crypto-ancillary equipment,
                            cryptoproduction equipment, and
                            authentication equipment.

COMSEC facility             Space employed primarily for the purpose
                            of generating, storing, repairing, or
                            using COMSEC material.

COMSEC incident             Occurrence that potentially jeopardizes
                            the security of COMSEC material or the
                            secure electrical transmission of
                            national security information.




                                      17

                                              NSTISSI No. 4009




COMSEC insecurity           COMSEC incident that has been
                            investigated, evaluated, and determined
                            to jeopardize the security of COMSEC
                            material or the secure transmission of
                            information.

COMSEC manager              Person who manages the COMSEC resources
                            of a command or activity.  (See the note
                            following the definition for COMSEC
                            custodian.)

COMSEC material             Item designed to secure or authenticate
                            telecommunications.

                            NOTE:  COMSEC material includes, but is
                            not limited to, key, equipment, devices,
                            documents, firmware or software that
                            embodies or describes cryptographic logic
                            and other items that perform COMSEC
                            functions.

COMSEC Material             Logistics and accounting system
  Control System            through which COMSEC material
                            marked "CRYPTO" is distributed,
                            controlled, and safeguarded.

                            NOTE:  Included are the COMSEC central
                            offices of record, cryptologistic depots,
                            and COMSEC accounts.  COMSEC material
                            other than key may be handled through the
                            COMSEC Material Control System.

COMSEC modification         Electrical, mechanical, or software
                            change to a National Security Agency
                            approved COMSEC end item.

                            NOTE:  Categories of COMSEC modifications
                            are: mandatory, optional, special
                            mission mandatory, special mission
                            optional, human safety mandatory, and
                            repair actions.

COMSEC module               Removable component that performs COMSEC
                            functions in a telecommunications
                            equipment or system.








                                      18

                                              NSTISSI No. 4009




COMSEC monitoring           Act of listening to, copying, or
                            recording transmissions of one's own
                            official telecommunications to provide
                            material for analysis, so that the degree
                            of security being provided to those
                            transmissions may be determined.

COMSEC profile              Statement of the COMSEC measures and
                            materials used to protect a given
                            operation, system, or organization.

COMSEC survey               Organized collection of COMSEC and
                            communications data relative to a given
                            operation, system, or organization.

COMSEC system data          Information required by a COMSEC
                            equipment or system to enable it to
                            properly handle and control key.

COMSEC training             Teaching of hands-on skills relating to
                            COMSEC accounting, the use of COMSEC
                            aids, or the installation, use,
                            maintenance, and repair of COMSEC
                            equipment.

confidentiality             Assurance that information is not
                            disclosed to unauthorized entities or
                            processes.

configuration control       Process of controlling modifications to a
                            telecommunications or automated
                            information systems hardware, firmware,
                            software, and documentation to ensure the
                            system is protected against improper
                            modifications prior to, during, and after
                            system implementation.

configuration management    Management of security features and
                            assurances through control of changes
                            made to hardware, software, firmware,
                            documentation, test, test fixtures and
                            test documentation of an automated
                            information system, throughout the
                            development and operational life of a
                            system.

confinement property        Synonymous with star (*) property.





                                      19

                                              NSTISSI No. 4009




contingency key             Key held for use under specific
                            operational conditions or in support of
                            specific contingency plans.

contingency plan            Plan maintained for emergency response,
                            backup operations, and post-disaster
                            recovery for an AIS, as a part of its
                            security program, that will ensure the
                            availability of critical resources and
                            facilitate the continuity of operations
                            in an emergency situation.

controlled access           Log-in procedures, audit of security
  protection                relevant events, and resource isolation
                            as prescribed for class C2 in the Orange
                            Book.

controlled                  Secure telecommunications or information
  cryptographic item        handling equipment, or associated
                            cryptographic component, that is
                            unclassified but governed by a special
                            set of control requirements.

                            NOTE:  Such items are marked "CONTROLLED
                            CRYPT0GRAPHIC ITEM" or, where space is
                            limited, "CCI."

controlled sharing          Condition which exists when access
                            control is applied to all users and
                            components of an AIS.

controlled space            Three-dimensional space surrounding
                            telecommunications and automated
                            information systems equipment, within
                            which unauthorized persons are denied
                            unrestricted access and are either
                            escorted by authorized persons or are
                            under continuous physical or electronic
                            surveillance.

controlling                 Official responsible for directing
  authority                 the operation of a cryptonet and for
                            managing the operational use and control
                            of keying material assigned to the
                            cryptonet.






                                      20

                                              NSTISSI No. 4009




cooperative key             Electronically exchanging functions of
  generation                locally generated, random components,
                            from which both terminals of a secure
                            circuit construct traffic encryption key
                            or key encryption key for use on that
                            circuit.

cooperative remote          Synonymous with manual remote
  rekeying                  rekeying.

cost-benefit analysis       Assessment of the costs of providing
                            protection or security to a
                            telecommunications or AIS versus risk and
                            cost associated with asset loss or
                            damage.

countermeasure              Action, device, procedure, technique, or
                            other measure that reduces the
                            vulnerability of an AIS.

covert channel              Unintended and/or unauthorized
                            communications path that can be used to
                            transfer information in a manner that
                            violates an AIS security policy.  (See
                            overt channel and exploitable channel.)

covert storage              Covert channel that involves the
  channel                   direct or indirect writing to a storage
                            location by one process and the direct or
                            indirect reading of the storage location
                            by another process.

                            NOTE:  Covert storage channels typically
                            involve a finite resource (e.g., sectors
                            on a disk) that is shared by two subjects
                            at different security levels.

covert timing               Covert channel in which one
  channel                   process signals information to another
                            process by modulating its own use of
                            system resources (e.g., central
                            processing unit time) in such a way that
                            this manipulation affects the real
                            response time observed by the second
                            process.







                                      21

                                              NSTISSI No. 4009




credentials                 Information passed from one entity to
                            another, that is used to establish the
                            sending entity's access rights.

cryptanalysis               Operations performed in converting
                            encryped messages to plain text without
                            initial knowledge of the crypto-algorithm
                            and/or key employed in the encryption.

CRYPTO                      Marking or designator identifying COMSEC
                            keying material used to secure or 
                            authenticate telecommunication carrying 
                            classified or sensitive U.S. Government
                            or U.S. Government-derived information.

                            NOTE: When written in all upper case
                            letters, CRYPTO has the meaning stated
                            above. When written in lower case as a 
                            prefix, crypto and crypt are
                            abreviations for cryptographic.

crypto-alarm                Circuit or device which detects failures
                            or aberrations in the logic or operation
                            of crypto-equipment.


                            NOTE:  Crypto-alarm may inhibit
                            transmission or may provide a visible
                            and/or audible alarm.

crypto-algorithm            well-defined procedure or sequence of
                            rules or steps used to produce cipher
                            text from plain text and vice versa.

crypto-ancillary            Equipment designed specifically to
  equipment                 facilitate efficient or reliable
                            operation of crypto-equipment, but that
                            does not perform cryptographic functions

crypto-equipment            Equipment that embodies a cryptographic
                            logic.

cryptographic               Pertaining to, or concerned with,
                            cryptography.






                                      22

                                              NSTISSI No. 4009




cryptographic               Hardware or firmware embodiment of the
  component                 cryptographic logic.

                            NOTE:  Cryptographic component may be a
                            modular assembly, a printed wiring
                            assembly, a microcircuit, or a
                            combination of these items.

cryptographic               Function used to set the state of
  initialization            a cryptographic logic prior to key
                            generation, encryption, or other
                            operating mode.

cryptographic logic         Well-defined procedure or sequence of
                            rules or steps used to produce cipher
                            text from plain text, and vice versa, or
                            to produce a key stream, plus delays,
                            alarms, and checks which are essential to
                            effective performance of the
                            cryptographic process.  (See crypto-
                            algorithm.)

cryptographic               Function which randomly determines the
  randomization             transmit state of a cryptographic logic.

cryptography                Principles, means, and methods for
                            rendering plain information
                            unintelligible and for restoring
                            encrypted information to intelligible
                            form.

crypto-ignition key         Device or electronic key used to unlock
                            the secure mode of crypto-equipment.

cryptonet                   Stations that hold a specific key for
                            use.

                            NOTE:  Activities that hold key for other
                            than use, such as cryptologistic depots,
                            are not cryptonet members for that key.
                            Controlling authorities are defacto
                            members of the cryptonets they control.








                                      23

                                              NSTISSI No. 4009




cryptoperiod                Time span during which each key setting
                            remains in effect.

cryptosecurity              Component of communications security that
                            results from the provision of technically
                            sound cryptosystems and their proper use.

cryptosynchronization       Process by which a receiving decrypting
                            cryptographic logic attains the same
                            internal state as the transmitting
                            encrypting logic.

cryptosystem                Associated COMSEC items interacting to
                            provide a single means of encryption or
                            decryption.

cryptosystem                Process of establishing the
  assessment                exploitability of a cryptosystem,
                            normally by reviewing transmitted traffic
                            protected or secured by the system under
                            study.

cryptosystem                Process of determining vulnerabilities
  evaluation                of a cryptosystem.

cryptosystem review         Examination of a cryptosystem by the
                            controlling authority to ensure its
                            adequacy of design and content, continued
                            need, and proper distribution.

cryptosystem survey         Management technique in which actual
                            holders of a cryptosystem express
                            opinions on the system's suitability and
                            provide usage information for technical
                            evaluations.
















                                      24

                                              NSTISSI No. 4009



                                       D


data encryption             Cryptographic algorithm, designed for
  standard                  the protection of unclassified data and
                            published by the National Institute of
                            Standards and Technology in Federal
                            Information Processing Standard
                            Publication 46.

data flow control           Synonymous with information flow control.

data integrity              Condition that exists when data is
                            unchanged from its source and has not
                            been accidentally or maliciously
                            modified, altered, or destroyed.

data origin                 Corroboration that the source of data is
  authentication            as claimed.

data security               Protection of data from unauthorized
                            (accidental or intentional) modification,
                            destruction, or disclosure.

decertification             Revocation of the certification of an AIS
                            item or equipment for cause.

decipher                    Convert enciphered text to the equivalent
                            plain text by means of a cipher system.

decode                      Convert encoded text to its equivalent
                            plain text by means of a code.

decrypt                     Generic term encompassing decode and
                            decipher.

dedicated mode              AIS security mode of operation wherein
                            each user, with direct or indirect access
                            to the system, its peripherals, remote
                            terminals, or remote hosts, has all of
                            the following:

                            a.  Valid security clearance for all
                            information within the system.







                                      25

                                              NSTISSI No. 4009




                            b.  Formal access approval and signed
                            non-disclosure agreements for all the
                            information stored and/or processed
                            (including all compartments,
                            subcompartments, and/or special access
                            programs).

                            c.  Valid need-to-know for all
                            information contained within the AIS.

                            NOTE:  When in the dedicated security
                            mode, a system is specifically and
                            exclusively dedicated to and controlled
                            for the processing of one particular type
                            or classification of information, either
                            for full-time operation or for a
                            specified period of time.

default classification      Temporary classification reflecting the
                            highest classification being processed in
                            an AIS.

                            NOTE:  Default classification is included
                            in the caution statement affixed to the
                            object.

degauss                     Destroy information contained in magnetic
                            media by subjecting that media to high-
                            intensity alternating magnetic fields,
                            following which the magnetic fields
                            slowly decrease.

delegated development       Information systems security program
  program                   in which the Director, National Security
                            Agency, delegates the development and/or
                            production of the entire telecommunica-
                            tions product, including the information
                            systems security portion, to a lead
                            department or agency.

denial of service           Result of any action or series of actions
                            that prevents any part of a
                            telecommunications or AIS from
                            functioning.







                                      26

                                              NSTISSI No. 4009




descriptive top-level       Top-level specification that is
  specification             written in a natural language (e.g.,
                            English), an informal design notation, or
                            a combination of the two.
                           
                            NOTE:  Descriptive top-level
                            specification, required for a class B2
                            and B3 AIS, completely and accurately
                            describes a trusted computing base.
                            See formal top-level specification.

designated approving        Official with the authority to formally
  authority                 assume responsibility for operating an
                            AIS or network at an acceptable level of
                            risk.

design controlled           Part or subassembly for a COMSEC
  spare part                equipment or device with a National
                            Security Agency controlled design.

dial back                   Synonymous with call back.

digital signature           Synonymous with electronic signature.

direct shipment             Shipment of COMSEC material directly from
                            the National Security Agency to user
                            COMSEC accounts.

discretionary access        Means of restricting access to
  control                   objects based on the identity and need-
                            to-know of users and/or groups to which
                            the object belongs.

                            NOTE:  Controls are discretionary in the
                            sense that a subject with a certain
                            access permission is capable of passing
                            that permission (directly or indirectly)
                            to any other subject.  See mandatory
                            access control.













                                      27

                                              NSTISSI No. 4009




DoD Trusted Computer        Document containing basic requirements
  System Evaluation         and evaluation classes for assessing
  Criteria                  degrees of effectiveness of hardware and
                            software security controls built into
                            AIS.

                            NOTE:  This document, DoD 5200.28 STD,
                            is frequently referred to as the Orange
                            Book.

domain                      Unique context (e.g., access control
                            parameters) in which a program is
                            operating; in effect, the set of objects
                            that a subject has the ability to access.

dominate                    Term used to compare AIS security levels.

                            NOTE:  Security level S1 is said to
                            dominate security level S2 if the
                            hierarchical classification of S1 is
                            greater than, or equal to, that of S2 and
                            the non-hierarchical categories of S1
                            include all those of S2 as a subset.

drop accountability         Procedure under which a COMSEC account
                            custodian initially receipts for COMSEC
                            material, and then provides no further
                            accounting for it to its central office
                            of record.

                            NOTE:  Local accountability of the COMSEC
                            material may continue to be required.
                            See also accounting legend code, ALC-3
                            and ALC-4.

dummy group                 Textual group having the appearance of a
                            valid code or cipher group which has no
                            plain text significance.













                                      28

                                              NSTISSI No. 4009



                                       E



electronically              Key produced only in non-physical
  generated key             form.

                            NOTE:  Electronically generated key
                            stored magnetically (e.g., on a floppy
                            disc) is not considered hard copy key.

electronic signature        Process that operates on a message to
                            assure message source authenticity and
                            integrity, and source non-repudiation.

electronic security         Protection resulting from all measures
                            designed to deny unauthorized persons
                            information of value which might be
                            derived from the interception and
                            analysis of non-communications
                            electromagnetic radiations, such as
                            radar.

element                     Removable item of COMSEC equipment,
                            assembly, or subassembly which normally
                            consists of a single piece or group of
                            replaceable parts.

embedded computer           Computer system that is an integral part
                            of a larger system or subsystem that
                            performs or controls a function, either
                            in whole or in part.

embedded cryptography       Cryptography which is engineered into an
                            equipment or system the basic function of
                            which is not cryptographic.

                            NOTE:  Components comprising the
                            cryptographic module are inside the
                            equipment or system add share host device
                            power and housing.  The cryptographic
                            function may be dispersed or identifiable
                            as a separate module within the host.










                                      29

                                              NSTISSI No. 4009




embedded cryptographic      Cryptosystem that performs or controls
  system                    a function, either in whole or in part,
                            as an integral element of a larger system
                            or subsystem.

emission security           Protection resulting from all measures
                            taken to deny unauthorized persons
                            information of value which might be
                            derived from intercept and analysis of
                            compromising emanations from crypto-
                            equipment, AIS, and telecommunications
                            systems.

encipher                    Convert plain text to equivalent cipher
                            text by means of a cipher.

encode                      Convert plain text to equivalent cipher
                            text by means of a code.

encrypt                     Generic term encompassing encipher and
                            encode.

end-item accounting         Accounting for all the accountable
                            components of a COMSEC equipment
                            configuration by a single short title.

endorsed DES                Unclassified equipment that embodies
  equipment                 unclassified data encryption standard
                            cryptographic logic and has been endorsed
                            by the National Security Agency for the
                            protection of national security
                            information.

endorsed for unclassified   Unclassified cryptographic equipment
  cryptographic item        that embodies a U.S. Government
                            classified cryptographic logic and is
                            endorsed by the National Security Agency
                            for the protection of national security
                            information.  (See type 2 product.)












                                      30

                                              NSTISSI No. 4009




endorsement                 National Security Agency approval of a
                            commercially-developed telecommunications
                            or automated information systems
                            protection equipment or system for
                            safeguarding national security
                            information.

end-to-end encryption       Encryption of information at its origin,
                            and decryption at its intended
                            destination, without any intermediate
                            decryption.

end-to-end security         Safeguarding information in a secure
                            telecommunications system by
                            cryptographic or protected distribution
                            system means from point of origin to
                            point of destination.

entrapment                  Deliberate planting of apparent flaws in
                            an AIS for the purpose of detecting
                            attempted penetrations.

environment                 Procedures, conditions, and objects that
                            affect the development, operation, and
                            maintenance of an AIS.

erasure                     Process intended to render stored data
                            irretrievable by normal means.

executive state             One of several states in which an AIS may
                            operate, and the only one in which
                            certain privileged instructions may be
                            executed.

                            NOTE:  Such privileged instructions
                            cannot be executed when the system is
                            operating in other (e.g., user) states.

exercise key                Key intended to safeguard transmissions
                            associated with exercises.

exploitable channel         Covert channel that is intended to
                            violate the security policy governing an
                            AIS and is useable or detectable by
                            subjects external to the trusted
                            computing base.  (See covert channel.)





                                      31

                                              NSTISSI No. 4009




exploratory development     Assembly of preliminary circuits or parts
  model                     in line with commercial practice to
                            investigate, test, or evaluate the
                            soundness of a concept, device, circuit,
                            equipment, or system in a "breadboard" or
                            rough experimental form, without regard
                            to eventual overall physical form or
                            layout.

extraction resistance       Capability of a crypto-equipment or a
                            secure telecommunications system or
                            equipment to resist efforts to extract
                            key.






































                                      32

                                              NSTISSI No. 4009



                                       F



fail safe                   Pertaining to the automatic protection of
                            programs and/or processing systems to
                            maintain safety when a hardware or
                            software failure is detected in a system.

fail soft                   Pertaining to the selective termination
                            of affected nonessential processing when
                            a hardware or software failure is
                            determined to be imminent in an AIS.

failure access              Unauthorized and usually inadvertent
                            access to data resulting from a hardware
                            or software failure in an AIS.

failure control             Methodology used to detect and provide
                            fail safe or fail soft recovery from
                            hardware and software failures in an AIS.

fetch protection            AIS-provided restriction to prevent a
                            program from accessing data in another
                            user's segment of storage.

fielded equipment           COMSEC end-item shipped to the user
                            subsequent to first article testing on
                            the initial production contract.

file protection             Aggregate of all processes and procedures
                            established in an AIS designed to inhibit
                            unauthorized access, contamination,
                            elimination, modification, or destruction
                            of a file or any of its contents.

file security               Means by which access to computer files
                            is limited to authorized users only.

fill device                 COMSEC item used to transfer or store key
                            in electronic form or to insert key into
                            a crypto-equipment.

FIREFLY                     Key management protocol based on public
                            key cryptography.







                                      33

                                              NSTISSI No. 4009




fixed COMSEC facility       COMSEC facility that is located in an
                            immobile structure or aboard a ship.

flaw                        Error of commission, omission, or
                            oversight in an AIS that may allow
                            protection mechanisms to be bypassed.

flaw hypothesis             System analysis and penetration
  methodology               technique in which the specification and
                            documentation for an AIS are analyzed and
                            then flaws in the system are
                            hypothesized.

                            NOTE:  List of hypothesized flaws is
                            prioritized on the basis of the estimated
                            probability that a flaw exists and,
                            assuming a flaw does exist, on the ease
                            of exploiting it, and on the extent of
                            control or compromise it would provide.
                            The prioritized list is used to perform
                            penetration testing of a system.

formal access               Documented approval by a data
  approval                  owner to allow access to a particular
                            category of information.

formal proof                Complete and convincing mathematical
                            argument, presenting the full logical
                            justification for each proof step, for
                            the truth of a theorem or set of
                            theorems.

                            NOTE:  In computer security, these formal
                            proofs provide A1, and beyond A1
                            assurance under the DoD Trusted Computer
                            System Evaluation Criteria.

formal security policy      Mathematically precise statement of a
  model                     security policy.

                            NOTE:  Such a model must define a secure
                            state, an initial state, and how the
                            model represents changes in state.  The
                            model must be shown to be secure by
                            proving that the initial state is secure
                            and that all possible subsequent states
                            remain secure.





                                      34

                                              NSTISSI No. 4009




formal top-level            Top-level specification that is written
  specification             in a formal mathematical language to
                            allow theorems, showing the correspon-
                            dence of the system specification to its
                            formal requirements, to be hypothesized
                            and formally proven.

                            NOTE:  Formal top-level specification,
                            required for a class A1 AIS, completely
                            and accurately describes the trusted
                            computing base.  See descriptive top-
                            level specification.

formal verification         Process of using formal proofs to
                            demonstrate the consistency between
                            formal specification of a system and
                            formal security policy model (design
                            verification) or between formal
                            specification and its high-level program
                            implementation (implementation
                            verification).

frequency hopping           Repeated switching of frequencies during
                            radio transmission according to a
                            specified algorithm, to minimize
                            unauthorized interception or jamming of
                            telecommunications.

front-end security          Security filter, which could be
  filter                    implemented in hardware or software, that
                            is logically separated from the remainder
                            of an AIS to protect the integrity of the
                            system.

full maintenance            Complete diagnostic repair, modification,
                            and overhaul of information systems
                            security equipment, including repair of
                            defective assemblies by piece part
                            replacement.  (See limited maintenance.)

functional testing          Segment of security tasting in which
                            advertised security mechanisms of an AIS
                            are tested under operational conditions.










                                      35

                                              NSTISSI No. 4009



                                       G



granularity                 Relative fineness or coarseness to which
                            an access control mechanism can be
                            adjusted.

                            NOTE:  Protection at the file level is
                            considered coarse granularity, whereas
                            protection at the field level is
                            considered to be a finer granularity.

guard                       Processor that provides a filter between
                            two disparate systems operating at
                            different security levels or between a
                            user terminal and a data base to remove
                            data for which the user is not authorized
                            access.


































                                      36

                                              NSTISSI No. 4009



                                       H



handshaking procedures      Dialogue between two entities (e.g., a
                            user and a computer, a computer and
                            another computer, or a program and
                            another program) for the purpose of
                            identifying and authenticating these
                            entities to one another.

hard copy key               Physical keying material, such as printed
                            key lists, punched or printed key tapes,
                            or programmable, read-only memories.

hardwired key               Key that is permanently installed.

hashing                     Iterative process that computes a value
                            (referred to as a hashword) from a
                            particular data unit in a manner that,
                            when a hashword is protected,
                            manipulation of the data is detectable.

hashword                    Synonymous with checksum.

high risk environment       Specific location or geographic area
                            where there are insufficient friendly
                            security forces to ensure the
                            safeguarding of information systems
                            security equipment.

hostile cognizant agent     Person, authorized access to national
                            security information, who intentionally
                            makes that information available to an
                            intelligence service or other group, the
                            goals of which are inimical to the
                            interests of the United States Government
                            or its allies.

host to front-end           Set of conventions governing the
  protocol                  format and control of data that is passed
                            from a host to a front-end machine.











                                      37

                                              NSTISSI No. 4009


                                       I




identification              Process that enables recognition of an
                            entity by an AIS.

                            NOTE:  This is generally accomplished by
                            the use of unique machine-readable user
                            names.

imitative communications    Introduction of deceptive messages or
  deception                 signals into an adversary's
                            telecommunications signals.  See
                            communications deception and manipulative
                            communications deception.

impersonation               Synonymous with spoofing.

implant                     Electronic device or component
                            modification to electronic equipment that
                            is designed to gain unauthorized
                            interception of information-bearing
                            energy via technical means.

inadvertent                 Accidental exposure of information
  disclosure                to a person not authorized access.

incomplete parameter        AIS design flaw that results when
  checking                  all parameters have not been fully
                            anticipated for accuracy and consistency,
                            thus making the system vulnerable to
                            penetration.

individual accountability   Ability to associate positively the
                            identity of a user with the time, method,
                            and degree of access to an AIS.

information flow            Procedure to ensure that information
  control                   transfers within an AIS are not made from
                            a higher security level object to an
                            object of a lower security level.










                                      38

                                              NSTISSI No. 4009




information label           Piece of information that accurately and
                            completely represents the sensitivity of
                            the data in a subject or object.

                            NOTE:  Information label consists of a
                            security label as well as other required
                            security markings (e.g., codewords,
                            dissemination control markings, and
                            handling caveats), to be used for data
                            information security labeling purposes.

information system          Any telecommunications and/or computer
                            related equipment or interconnected
                            system or subsystems of equipment that is
                            used in the acquisition, storage,
                            manipulation, management, movement,
                            control, display, switching, interchange,
                            transmission, or reception of voice
                            and/or data, and includes software,
                            firmware, and hardware.

information systems         The protection of information systems
  security (INFOSEC)        against unauthorized access to or
                            modification of information, whether in
                            storage, processing or transit, and
                            against the denial of service to
                            authorized users or the provision of
                            service to unauthorized users, including
                            those measures necessary to detect,
                            document, and counter such threats.

information system          Person responsible to the designated
  security officer          approving authority who ensures that
                            security of an information system is
                            implemented through its design,
                            development, operation, maintenance, and
                            secure disposal stages.

information systems         Item (chip, module, assembly, or
  security product          equipment), technique, or service that
                            performs or relates to information
                            systems security.

initialize                  Setting the state of a cryptographic
                            logic prior to key generation,
                            encryption, or other operating mode.

integrity check value       Checksum that is capable of detecting
                            malicious modification of an AIS.


                                      39

                                              NSTISSI No. 4009




interim approval            Temporary authorization granted by a
                            designated approving authority for an AIS
                            to process classified information and
                            information governed by 10 U.S.C. Section
                            2315 or 44 U.S.C. 3502(2) in its
                            operational environment based on
                            preliminary results of a security
                            evaluation of the system.

internet private line       Network cryptographic unit that
  interface                 provides secure connections, singularly
                            or in simultaneous multiple connections,
                            between a host and a predetermined set of
                            corresponding hosts.

internet protocol           Standard protocol for transmission of
                            data from source to destinations in
                            packet-switched communications networks
                            and interconnected systems of such
                            networks.































                                      40

                                              NSTISSI No. 4009




                                       K


key                         Information (usually a sequence of random
                            or pseudorandom binary digits) used
                            initially to set up and periodically
                            change the operations performed in
                            crypto-equipment for the purpose of
                            encrypting or decrypting electronic
                            signals, for determining electronic
                            counter-countermeasures patterns (e.g.,
                            frequency hopping or spread spectrum), or
                            for producing other key.

                            NOTE:  "Key" has replaced the terms
                            "variable," "key(ing) variable," and
                            "cryptovariable.'

key-auto-key                Cryptographic logic which uses previous
                            key to produce key.

key card                    Paper card, containing a pattern of
                            punched holes, which establishes the key
                            for a specific cryptonet at a specific
                            time.

key encryption key          Key that encrypts or decrypts other key
                            for transmission or storage.

key list                    Printed series of key settings for a
                            specific cryptonet.

                            NOTE:  Key lists may be produced in list,
                            pad, or printed tape format.

key management              Process by which key is generated,
                            stored, protected, transferred, loaded,
                            used, and destroyed.

key production key          Key that is used to initialize a
                            keystream generator for the production of
                            other electronically generated key.









                                      41

                                              NSTISSI No. 4009


key stream                  Sequence of symbols (or their electrical
                            or mechanical equivalents) produced in a
                            machine or auto-manual cryptosystem to
                            combine with plain text to produce cipher
                            text, control transmission security
                            processes, or produce key.

key tag                     Identification information associated
                            with certain types of electronic key.

key tape                    Punched or magnetic tape containing key.

                            NOTE:  Printed key in tape form is
                            referred to as a key list.

key updating                Irreversible cryptographic process for
                            modifying key automatically or manually.

keying material             Key, code, or authentication information
                            in physical or magnetic form.

































                                      42

                                              NSTISSI No. 4009




                                       L



least privilege             Principle that requires that each subject
                            be granted the most restrictive set of
                            privileges needed for the performance of
                            authorized tasks.

                            NOTE:  Application of this principle
                            limits the damage that can result from
                            accident, error, or unauthorized use of
                            an AIS.

limited access              Synonymous with access control.

limited maintenance         COMSEC maintenance restricted to fault
                            isolation, removal, and replacement of
                            plug-in assemblies.

                            NOTE:  Soldering or unsoldering usually
                            is prohibited in limited maintenance.
                            See full maintenance.

line conduction             Unintentional signals or noise induced or
                            conducted on a telecommunications or
                            automated information system signal,
                            power, control, indicator, or other
                            external interface line.

link encryption             Encryption of data in individual links of
                            a telecommunications system.

list-oriented               Computer protection in which each
                            protected object has a list of all
                            subjects authorized to access it.  (See
                            also ticket-oriented.);

lock and key                Protection system that involves
 protection system          matching a key or password with a
                            specific access requirement.

logic bomb                  Resident computer program that triggers
                            an unauthorized act when particular
                            states of an AIS are realized.





                                      43

                                              NSTISSI No. 4009




logical completeness        Means for assessing the effectiveness
  measure                   and degree to which a set of security and
                            access control mechanisms meets the
                            requirements of security specifications.

long title                  Descriptive title of a COMSEC item.

low probability of          Result of measures used to hide or
  detection                 disguise intentional electromagnetic
                            transmissions.

low probability of          Result of measures to prevent the
  intercept                 intercept of intentional electromagnetic
                            transmissions.






































                                      44

                                              NSTISSI No. 4009




                                       M



machine cryptosystem        Cryptosystem in which cryptographic
                            processes are performed by crypto-
                            equipment.

magnetic remanence          Magnetic representation of residual
                            information that remains on a magnetic
                            medium after the medium has been erased
                            or overwritten.

                            NOTE:  Magnetic remanence refers to data
                            remaining on magnetic storage media after
                            removal of the power or after degaussing.

maintenance hook            Special instructions in software to allow
                            easy maintenance and additional feature
                            development.

                            NOTE:  Maintenance hooks are not clearly
                            defined during access for design
                            specification.  Since maintenance hooks
                            frequently allow entry into the code at
                            unusual points or without the usual
                            checks, they are a serious security risk
                            if they are not removed prior to live
                            implementation.  Maintenance hooks are
                            special types of trap doors.

maintenance key             Key intended only for off-the-air in-shop
                            use.

malicious logic             Hardware, software, or firmware that is
                            intentionally included in an AIS for an
                            unauthorized purpose.

                            NOTE:  Trojan horse is a form of
                            malicious logic.












                                      45

                                               NSTISSI No. 4009




mandatory access            Means of restricting access to objects
  control                   based on the sensitivity (as represented
                            by a label) of the information contained
                            in the objects and the formal
                            authorization (i.e., clearance) of
                            subjects to access information of such
                            sensitivity.  (See discretionary access
                            control.)

mandatory                   Change to a COMSEC end item that the
  modification              National Security Agency requires to be
                            completed and reported by a specified
                            date.

                            NOTE:  This type of modification should
                            not be confused with modifications that
                            are optional to the National Security
                            Agency, but have been adjudged mandatory
                            by a given department or agency.  The
                            latter modification may have an
                            installation deadline established and
                            controlled solely by the user's
                            headquarters.

manipulative                Alteration or simulation of friendly
  communications            telecommunications for the purpose
  deception                 of deception.

                            NOTE:  Manipulative communications
                            deception may involve establishment of
                            bogus communications structures,
                            transmission of deception messages, and
                            expansion or creation of communications
                            schedules on existing structures to
                            display an artificial volume of messages.
                            See communications deception and
                            imitative communications deception.

manual cryptosystem         Cryptosystem in which the cryptographic
                            processes are performed manually without
                            the use of crypto-equipment or auto-
                            manual devices.

manual remote               Procedure by which a distant crypto-
  rekeying                  equipment is rekeyed electrically, with
                            specific actions required by the
                            receiving terminal operator.




                                      46

                                              NSTISSI No. 4009




masquerading                Synonymous with spoofing.

master crypto-ignition      Crypto-ignition key that is able to
  key                       initialize crypto-ignition key, when
                            interacting with its associated crypto-
                            equipment.

material symbol             Communications circuit identifier used
                            for key card resupply purposes.

memory bounds               Limits in the range of storage addresses
                            for a protected region in the memory of
                            an AIS.

message authentication      Data element associated with an
  code                      authenticated message which allows a
                            receiver to verify the integrity of the
                            message.

message externals           Non-textual (outside the message text)
                            characteristics of transmitted messages.

message indicator           Sequence of bits transmitted over a
                            telecommunications system for the purpose
                            of crypto-equipment synchronization.

                            NOTE:  Some off-line cryptosystems, such
                            as the KL-5l and one-time pad systems,
                            employ message indicators to establish
                            decryption starting points.

mimicking                   Synonymous with spoof ing.

mobile COMSEC facility      COMSEC facility that can be readily moved
                            from one location to another.

mode of operation           Description of the conditions under which
                            an AIS operates, based on the sensitivity
                            of data processed and the clearance
                            levels and authorizations of the users.

                            NOTE:  Five modes of operation are
                            authorized for an AIS processing
                            information and for networks transmitting
                            information.  See compartmented mode,
                            dedicated mode, multilevel mode,
                            partitioned security mode, and system-
                            high mode.



                                      47

                                              NSTISSI No. 4009




multilevel device           Device that is trusted to properly
                            maintain and separate data of different
                            security levels.

multilevel mode             AIS security mode of operation wherein
                            all the following statements are
                            satisfied concerning the users who have
                            direct or indirect access to the system,
                            its peripherals, remote terminals, or
                            remote hosts:

                            a.  Some users do not have a valid
                            security clearance for all the
                            information processed in the AIS.

                            b.  All users have the proper security
                            clearance and appropriate formal access
                            approval for that information to which
                            they have access.

                            c.  All users have a valid need-to-know
                            only for information to which they have
                            access.

multilevel security         Concept of processing information with
                            different classifications and categories
                            that simultaneously permits access by
                            users with different security clearances,
                            but prevents users from obtaining access
                            to information for which they lack
                            authorization.

mutual suspicion            Condition in which two entities need to
                            rely upon each other to perform a
                            service, yet neither entity trusts the
                            other to properly protect shared data.















                                      48

                                              NSTISSI No. 4009




                                       N



national security           Information that has been determined,
  information               pursuant to Executive Order 12356 or any
                            predecessor order, to require protection
                            against unauthorized disclosure, and that
                            is so designated.

national security           Telecommunications and automated infor-
  systems                   mation systems operated by the U.S.
                            Government, its contractors, or its
                            agents, that contain classified
                            information or, as set forth in 10 U.S.C.
                            Section 2315, that involves intelligence
                            activities, involves cryptologic
                            activities related to national security,
                            involves command and control of military
                            forces, involves equipment that is an
                            integral part of a weapon or weapon
                            system, or involves equipment that is
                            critical to the direct fulfillment of
                            military or intelligence missions.

need-to-know                Access to, or knowledge or possession of,
                            specific information required to carry
                            out official duties.

net control station         Terminal in a secure telecommunications
                            net responsible for distributing key in
                            electronic form to the members of the
                            net.

network front end           Device that implements the needed
                            security-related protocols to allow a
                            computer system to be attached to a
                            network.

network reference           Access control concept that refers to
  monitor                   an abstract machine that mediates all
                            access to objects within a network by
                            subjects within the network.  See
                            reference monitor.







                                      49

                                              NSTISSI No. 4009




network security            Protection of networks and their services
                            from unauthorized modification,
                            destruction, or disclosure, and
                            provision of assurance that the network
                            performs its critical functions correctly
                            and there are no harmful side-effects.

                            NOTE:  Network security includes
                            providing for data integrity.

network security            Individual formally appointed by a
  officer                   designated approving authority to ensure
                            that the provisions of all applicable
                            directives are implemented throughout the
                            life cycle of an automated information
                            system network.  See information system
                            security officer.

network system              System that is implemented with a
                            collection of interconnected network
                            components.

                            NOTE:  A network system is based on a
                            coherent security architecture and
                            design.

network trusted             Totality of protection mechanisms
  computing base            within a network system, including
                            hardware, firmware, and software, the
                            combination of which is responsible for
                            enforcing a security policy.  See trusted
                            computing base.

no-lone zone                Area, room, or space which, when manned,
                            must be occupied by two or more
                            appropriately cleared individuals who
                            remain within sight of each other.  (See
                            two person integrity.)

noncooperative              Synonymous with automatic remote
  remote rekeying           rekeying.










                                      50

                                              NSTISSI No. 4009




non-repudiation             Method by which the sender of data is
                            provided with proof of delivery and the
                            recipient is assured of the sender's
                            identity, so that neither can later deny
                            having processed the data.

non-secret encryption       Synonymous with public key cryptography.

null                        Dummy letter, letter symbol, or code
                            group inserted in an encrypted message to
                            delay or prevent its decryption or to
                            complete encrypted groups for transmis-
                            sion or transmission security purposes.






































                                      51

                                              NSTISSI No. 4009



                                       O



object                      Passive entity that contains or receives
                            information.

                            NOTE:  Access to an object implies access
                            to the information it contains.  Examples
                            of objects are:  records, blocks, pages,
                            segments, files, directories, directory
                            trees and programs, as well as bits,
                            bytes, words, fields, processors, video
                            displays, keyboards, clocks, printers,
                            and network nodes.

object reuse                Reassignment of a storage medium (e.g.,
                            page frame, disk sector, magnetic tape)
                            that contained one or more objects, after
                            ensuring that no residual data remained
                            on the storage medium.

off-line cryptosystem       Cryptosystem in which encryption and
                            decryption are performed independently of
                            the transmission and reception functions.

one-part code               Code in which plain text elements and
                            their accompanying code groups are
                            arranged in alphabetical, numerical, or
                            other systematic order, so that one
                            listing serves for both encoding and
                            decoding.

                            NOTE:  One-part codes are normally small
                            codes that are used to pass small volumes
                            of low-sensitivity information.

one-time                    Cryptosystem employing key which is
  cryptosystem              used only once.

one-time pad                Manual one-time cryptosystem produced in
                            pad form.

one-time tape               Punched paper tape used to provide key
                            streams on a one-time basis in certain
                            machine cryptosystems.






                                      52

                                              NSTISSI No. 4009




on-line cryptosystem        Cryptosystem in which encryption and
                            decryption are performed in association
                            with the transmitting and receiving
                            functions.

open security               Environment that does not provide
  environment               sufficient assurance that applications
                            and equipment are protected against the
                            introduction of malicious logic prior to
                            or during the operation of a system.

open storage                Storage of classified information within
                            an accredited facility, but not in
                            General Services Adminstration approved
                            secure containers, while the facility is
                            unoccupied by authorized personnel.

operational data            Protection of data from either
  security                  accidental or unauthorized intentional
                            modification, destruction, or disclosure
                            during input, processing, or output
                            operations.

operational key             Key intended for use on-the-air for
                            protection of operational information or
                            for the production or secure electrical
                            transmission of key streams.

operational waiver          Authority for continued use of unmodified
                            COMSEC end-items, pending the completion
                            of a mandatory modification.

operations code             Code composed largely of words and
                            phrases which are suitable for general
                            communications use.

operations security         Process denying to potential adversaries
                            information about capabilities and/or
                            intentions by identifying, controlling
                            and protecting generally unclassified
                            evidence of the planning and execution of
                            sensitive activities.









                                      53

                                              NSTISSI No. 4009




optional modification       National Security Agency approved
                            modification that is not required for
                            universal implementation by all holders
                            of a COMSEC end-item.

                            NOTE:  This class of modification
                            requires all of the engineering/
                            doctrinal control of mandatory
                            modification, but is usually not related
                            to security, safety, TEMPEST, or
                            reliability.

Orange Book                 Synonymous with DoD Trusted Computer
                            System Evaluation Criteria.

organizational              Limited maintenance performed by a
  maintenance               user organization.

overt channel               Communications path within a computer
                            system or network that is designed for
                            the authorized transfer of data.  (See
                            covert channel.)

over-the-air key            Providing electronic key via
  distribution              over-the-air rekeying, over-the-air key
                            transfer, or cooperative key generation.

over-the-air key transfer   Electronically distributing key without
                            changing traffic encryption key used on
                            the secured communications path over
                            which the transfer is accomplished.

over-the-air rekeying       Changing traffic encryption key or
                            transmission security key in remote
                            crypto-equipment by sending new key
                            directly to the remote crypto-equipment
                            over the communications path it secures.

overwrite procedure         Process which removes or destroys data
                            recorded on an AIS storage medium by
                            writing patterns of data over, or on top
                            of, the data stored on the medium.









                                      54

                                              NSTISSI No. 4009




                                       P



parity                      Set of bits used to determine whether a
                            block of data (key or data stored in
                            computers) has been intentionally or
                            unintentionally altered.

partitioned security mode   AIS security mode of operation wherein
                            all personnel have the clearance, but not
                            necessarily formal access approval and
                            need-to-know, for all information handled
                            by an AIS.

                            NOTE:  This security mode encompasses the
                            compartmented mode and applies to non-
                            intelligence DoD organizations and DoD
                            contractors.

passphrase                  Sequence of characters, longer than the
                            acceptable length of a password, that is
                            transformed by a password system into a
                            virtual password of acceptable length.

password                    Protected/private character string used
                            to authenticate an identity or to
                            authorize access to data.

penetration                 Unauthorized act of bypassing the
                            security mechanisms of a cryptographic
                            system or AIS.

penetration testing         Security testing in which evaluators
                            attempt to circumvent the security
                            features of an AIS based on their
                            understanding of the system design and
                            implementation.

per-call key                Unique traffic encryption key generated
                            automatically by certain secure
                            telecommunications systems to secure
                            single voice or data transmissions.
                            (See cooperative key generation.)







                                      55

                                              NSTISSI No. 4009




periods processing          Processing of various levels of
                            classified and unclassified information
                            at distinctly different times.

                            NOTE:  Under periods processing, the
                            system must be purged of all information
                            from one processing period before
                            transitioning to the next when there are
                            different users with differing
                            authorizations.

permuter                    Device used in a crypto-equipment to
                            change the order in which the contents of
                            a shift register are used in various
                            nonlinear combining circuits.

plain text                  Unencrypted information.

positive control            Generic term referring to a sealed
  material                  authenticator system, permissive action
                            link, coded switch system, positive
                            enable system, or nuclear command and
                            control documents, material or devices.

preproduction model         Version of a crypto-equipment that
                            employs standard parts and is in final
                            mechanical and electrical form suitable
                            for complete evaluation of form, design,
                            and performance.

                            NOTE:  Preproduction models are often
                            referred to as E-model equipment.

print suppression           Eliminating the display of characters in
                            order to preserve their secrecy.

                            NOTE:  An example of print suppression is
                            not displaying the characters of a
                            password as it is keyed at she input
                            terminal.

privacy system              Commercial encryption system that affords
                            telecommunications limited protection to
                            deter a casual listener, but cannot
                            withstand a technically competent
                            cryptanalytic attack.





                                      56

                                              NSTISSI No. 4009




production model            Crypto-equipment in its final mechanical
                            and electrical form of production design
                            made by use of production tools, jigs,
                            fixtures, and methods using standard
                            parts.

profile                     Detailed security description of the
                            physical structure, equipment component,
                            location, relationships, and general
                            operating environment of an AIS.

proprietary information     Material and information relating to or
                            associated with a company's products,
                            business or activities, including but not
                            limited to:  financial information; data
                            or statements; trade secrets; product
                            research and development; existing and
                            future product designs and performance
                            specifications; marketing plans or
                            techniques; schematics; client lists;
                            computer programs; processes; and know-
                            how that have been clearly identified and
                            properly marked as proprietary
                            information, trade secrets or company
                            confidential information.

                            NOTE:  Trade secrets constitute the whole
                            or any portion or phase of any technical
                            information, design process, procedure,
                            formula or improvement that is not
                            generally available to the public, that a
                            company considers company confidential
                            and that could give or gives an advantage
                            over competitors who do not know or use
                            the trade secret.

protected                   Telecommunications deriving their
  communications            protection through use of type 2 products
                            or data encryption standard equipment.
                            (See secure communications.)

protected distribution      Wireline or fiber-optic telecommuni-
    system                  cations system that includes terminals
                            and adequate acoustic, electrical,
                            electromagnetic, and physical safeguards
                            to permit its use for the unencrypted
                            transmission of classified information.




                                      57

                                              NSTISSI No. 4009




protection equipment        Type 2 product or data encryption
                            standard equipment that the National
                            Security Agency has endorsed to meet
                            applicable standards for the protection
                            of telecommunications or automated
                            information systems containing national
                            security information.

protection philosophy       Informal description of the overall
                            design of an AIS that delineates each of
                            the protection mechanisms employed.

                            NOTE:  Combination, appropriate to the
                            evaluation class, of formal and informal
                            techniques used to show the mechanisms
                            are adequate to enforce the security
                            policy.

protection ring             One of a hierarchy of privileged modes of
                            an AIS that gives certain access rights
                            to user programs and processes authorized
                            to operate in a given mode.

protective packaging        Packaging techniques for COMSEC material
                            which discourage penetration, reveal that
                            a penetration has occurred or was
                            attempted, or inhibit viewing or copying
                            of keying material prior to the time it
                            is exposed for use.

protective technologies     Special tamper-evident features and
                            materials employed for the purpose of
                            detecting tampering and deterring
                            attempts to compromise, modify,
                            penetrate, extract, or substitute
                            information processing equipment and
                            keying material.














                                      58

                                              NSTISSI No. 4009




protective                  Any penetration of information system
  technology/package        security protective technology or
  incident                  packaging, such as a crack, cut, or tear.

protocol                    Set of rules and formats, semantic and
                            syntactic, that permits entities to
                            exchange information.

public cryptography         Body of cryptographic and related
                            knowledge, study, techniques, and
                            applications that is, or intended to be,
                            in the public domain.

public key                  Type of cryptography in which the
  cryptography              encryption process is publicly available
                            and unprotected, but in which a part of
                            the decryption key is protected so that
                            only a party with knowledge of both parts
                            of the decryption process can decrypt the
                            cipher text.

                            NOTE:  Commonly called non-secret
                            encryption in professional cryptologic
                            circles.  FIREFLY is an application of
                            public key cryptography.

purge                       Removal of data from an AIS, its storage
                            devices, or other peripheral devices with
                            storage capacity in such a way that the
                            data may not be reconstructed.

                            NOTE:  An AIS must be disconnected from
                            any external network before a purge.  See
                            clearing.

















                                      59

                                              NSTISSI No. 4009




                                       Q


QUADRANT                     Short name referring to technology which
                             provides tamper-resistant protection to
                             crypto-equipment.


                                       R



randomizer                   Analog or digital source of
                             unpredictable, unbiased, and usually
                             independent bits.

                             NOTE:  Randomizers can be used for
                             several different functions, including
                             key generation or to provide a starting
                             state for a key generator.

read                         Fundamental operation in an AIS that
                             results only in the flow of information
                             from an object to a subject.  (See
                             access type.)

read access                  Permission to read information in an
                             AIS.

real-time reaction           Immediate response to a penetration
                             attempt that is detected and diagnosed
                             in time to prevent access.

recovery procedures          Actions necessary to restore data files
                             of an AIS and computational capability
                             after a system failure.

RED                          Designation applied to telecommuni-
                             cations and automated information
                             systems, plus associated areas,
                             circuits, components, and equipment
                             which, when classified plain text
                             signals are being processed thereIn,
                             require protection during electrical
                             transmission.





                                      60

                                              NSTISSI No. 4009




RED/BLACK concept            Separation of electrical and electronic
                             circuits, components, equipment, and
                             systems that handle classified plain
                             text (RED) information, in electrical
                             signal form, from those which handle
                             unclassified (BLACK) information in the
                             same form.

RED key                      Unencrypted key.  (See BLACK key.)

RED signal                   Telecommunications or automated
                             information systems signal that would
                             divulge classified information if
                             recovered and analyzed.

                             NOTE:  RED signals may be plain text,
                             key, subkey, initial fill, control, or
                             traffic flow related information.

reference monitor            Access control concept that refers to an
                             abstract machine that mediates all
                             accesses to objects by subjects.

reference validation         Portion of a trusted computing base, the
  mechanism                  normal function of which is to control
                             access between subjects and objects, and
                             the correct operation of which is
                             essential to the protection of data in
                             the system.

                             NOTE:  This is the implementation of
                             reference monitor.

release prefix               Prefix appended to the short title of
                             United States produced keying material
                             to indicate its foreign releasability.

                             NOTE:  "A" designate material that is
                             releasable to specific allied nations
                             and "US" designates material intended
                             exclusively for United States use.










                                      61

                                              NSTISSI No. 4009




remanence                    Residual information that remains on
                             storage media after erasure.  (See
                             magnetic remanence.)

remote rekeying              Procedure by which a distant crypto-
                             equipment is rekeyed electrically.
                             (See automatic remote rekeying and
                             manual remote rekeying.)

repair action                National Security Agency approved change
                             to a COMSEC end item that does not
                             affect the original characteristics of
                             the end item and is prdvided for
                             optional application by holders.

                             NOTE:  Repair actions are limited to
                             minor electrical and/or mechanical
                             improvements to enhance operation,
                             maintenance, or reliability.  They do
                             not require an identification label,
                             marking, or control, but must be fully
                             documented by changes to the maintenance
                             manual.

reserve keying               Key held to satisfy unplanned
  material                   needs.  (See contingency key.)

residual risk                Portion of risk that remains after
                             security measures have been applied.

residue                      Data left in storage after automated
                             information processing operations are
                             complete, but before degaussing or
                             overwriting has taken place.

resource encapsulation       Method by which the reference monitor
                             mediates accesses to an AIS resource.

                             NOTE:  Resource is protected and not
                             directly accessible by a subject.
                             Satisfies requirement for accurate
                             auditing of resource usage.









                                      62

                                             NSTISSI No. 4009




risk analysis                Synonymous with risk assessment.

risk assessment              Process of analyzing threats to and
                             vulnerabilities of an information
                             system, and the potential impact that
                             the loss of information or capabilities
                             of a system would have on national
                             security and using the analysis as a
                             basis for identifying appropriate and
                             cost-effective measures.

risk index                   Difference between the minimum clearance
                             or authorization of AIS users and the
                             maximum sensitivity (e.g.,
                             classification and categories) of data
                             processed by the system.

risk management              Process concerned with the
                             identification, measurement, control,
                             and minimization of security risks in
                             information systems.






























                                      63

                                              NSTISSI No. 4009



                                       S



safeguarding                 Statement affixed to a computer
  statement                  output or printout that states the
                             highest classification being processed
                             at the time the product was produced,
                             and requires control of the product, at
                             that level, until determination of the
                             true classification by an authorized
                             person.

sample key                   Key intended for off-the-air
                             demonstration use only.

sanitize                     To remove or edit classified or
                             sensitive data so that what remains is
                             of a lower classification or sensitivity
                             than the original data.

scavenging                   Searching through object residue to
                             acquire data.

scratch pad store            Momentary key storage in crypto-
                             equipment.

secure communications        Telecommunications deriving security
                             through use of type l products and/or
                             protected distribution systems.

secure operating system      Resident software that controls hardware
                             and other software functions in an AIS
                             to provide a level of protection or
                             security appropriate to the
                             classification, sensitivity, and/or
                             criticality of the data and resources it
                             manages.

secure state                 Condition in which no subject can access
                             any object in an unauthorized manner.










                                      64

                                              NSTISSI No. 4009




secure subsystem             Subsystem that contains its own
                             implementation of the reference monitor
                             concept for those resources it controls.

                             NOTE:  Secure subsystem must depend on
                             other controls and the base operating
                             system for the control of subjects and
                             the more primitive system objects.

security fault analysis      Assessment, usually performed on
                             information system hardware, to
                             determine the security properties of a
                             device when hardware fault is
                             encountered.

security filter              AIS trusted subsystem that enforces
                             security policy on the data that passes
                             through it.

security flaw                Error of commission or omission in an
                             AIS that may allow protection mechanisms
                             to be bypassed.

security inspection          Examination of an AIS to determine
                             compliance with security policy,
                             procedures, and practices.

security kernel              Hardware, firmware, and software
                             elements of a trusted computing base
                             that implement the reference monitor
                             concept.

                             NOTE:  Security kernel must mediate all
                             accesses, be protected from
                             modification, and be verifiable as
                             correct.

security label               Piece of information that represents the
                             sensitivity of a subject or object, such
                             as its hierarchical classification
                             (CONFIDENTIAL, SECRET, TOP SECRET)
                             together with any applicable non-
                             hierarchical security categories (e.g.,
                             sensitive compartmented information,
                             critical nuclear weapon design
                             information).  (See information label
                             and sensitivity label.)




                                      65

                                              NSTISSI No. 4009




security perimeter           Boundary where security controls are in
                             effect to protect AIS assets.

security range               Highest and lowest security levels that
                             are permitted in or on an AIS, system
                             component, subsystem, or network.

security requirements        Types and levels of protection necessary
                             for equipment, data, information,
                             applications and facilities to meet
                             security policy.

security requirements        Description of the minimum
  baseline                   requirements necessary for an AIS to
                             maintain an acceptable level of
                             security.

security safeguards          Protective measures and controls that
                             are prescribed to meet the security
                             requirements specified for an AIS.

                             NOTE:  Safeguards may include security
                             features, as well as management
                             constraints, personnel security, and
                             security of physical structures, areas,
                             and devices.  See accreditation.

security specification       Detailed description of the safeguards
                             required to protect an AIS.

security test and            Examination and analysis of the
  evaluation                 safeguards required to protect an AIS,
                             as they have been applied in an
                             operational environment, to determine
                             the security posture of that system.

security testing             Process to determine that an AIS
                             protects data and maintains
                             functionality as intended.

                             NOTE:  Security testing may reveal
                             vulnerabilities beyond the scope of the
                             AIS design.

seed key                     Initial key used to start an updating or
                             key generation process.






                                      66

                                              NSTISSI No. 4009




self-authentication          Implicit authentication, to a
                             predetermined level, of all
                             transmissions on a secure communications
                             system.

sensitive information        Information, the loss, misuse, or
                             unauthorized access to or modification
                             of which could adversely affect the
                             national interest or the conduct of
                             federal programs, or the privacy to
                             which individuals are entitled under 5
                             U.S.C. Section 552a (the Privacy Act),
                             but that has not been specifically
                             authorized under criteria established by
                             an Executive Order or an Act of Congress
                             to be kept secret in the interest of
                             national defense or foreign policy.

                             NOTE:  Systems that are not national
                             security systems, but contain sensitive
                             information are to be protected in
                             accordance with the requirements of the
                             Computer Security Act of 1987 (P.L. 100-
                             235).

sensitivity label            Piece of information that represents
                             elements of the security label(s) of a
                             subject and an object.

                             NOTE:  Sensitivity labels are used by
                             the trusted computing base as the basis
                             for mandatory access control decisions.

shielded enclosure           Room or container designed to attenuate
                             electromagnetic radiation.

short title                  Identifying combination of letters and
                             numbers assigned to certain COMSEC
                             materials to facilitate handling,
                             accounting, and control.

                             NOTE:  NAG-l6C/TSEC is an example of a
                             short title.

signals security             Generic term encompassing communications
                             security and electronic security.





                                      67

                                              NSTISSI No. 4009




simple security              Bell-La Padula security model rule
  property                   allowing a subject read access to an
                             object only if the security level of the
                             subject dominates the security level of
                             the object.

single-level device          AIS device that is not trusted to
                             properly maintain and separate data to
                             different security levels.

single point keying          Means of distributing key to multiple,
                             local crypto-equipment or devices from a
                             single fill point.

software system test and     Process that plans, develops, and
  evaluation process         documents the quantitative demonstration
                             of the fulfillment of all baseline
                             functional performance, operational, and
                             interface requirements.

special mission              Modification that applies only
  modification               to a specific mission, purpose,
                             operational, or environmental need.

                             NOTE:  Special mission modifications may
                             be either optional or mandatory.

speech privacy               Techniques that use fixed sequence
                             permutations or voice/speech inversion
                             to render speech unintelligible to the
                             casual listener.

spelling table               Synonymous with syllabary.

split knowledge              Separation of data or information into
                             two or more parts, each part constantly
                             kept under control of separate
                             authorized individuals or teams, so that
                             no one individual or team Bill know the
                             whole data.

spoofing                     (COMSEC) Interception, alteration, and
                             retransmission of a cipher signal or
                             data in such a way as to mislead the
                             recipient.

                             (AIS) Attempt to gain access to an AIS
                             by posing as an authorized user.




                                      68

                                              NSTISSI No. 4009




spread spectrum              Telecommunications techniques in which a
                             signal is transmitted in a bandwidth
                             considerably greater than the frequency
                             content of the original information.

                             NOTE:  Frequency hopping, direct
                             sequence spreading, time scrambling, and
                             combinations of these techniques are
                             forms of spread spectrum.

star (*) property            Bell-La Padula security model rule
                             allowing a subject write access to an
                             object only if the security level of the
                             object dominates the security level of
                             the subject.

start-up KEK                 Key encryption key held in common by a
                             group of potential communicating
                             entities and used to establish ad hoc
                             tactical nets.

state variable               Variable that represents either the
                             state of an AIS or the state of some
                             system resource.

storage object               Object that supports both read and write
                             accesses to an AIS.

subassembly                  Major subdivision of a cryptographic
                             assembly which consists of a package of
                             parts, elements, and circuits that
                             performs a specific function.

subject                      Active entity in an AIS, generally in
                             the form of a person, process, or device
                             that causes information to flow among
                             objects or changes the system state.

subject security level       Sensitivity label(s) of the objects to
                             which the subject has both read and
                             write access.

                             NOTE:  Security level of a subject must
                             always be dominated by the clearance
                             level of the user with which the subject
                             is associated.





                                      69

                                              NSTISSI No. 4009




superencryption              Process of encrypting encrypted
                             information.

                             NOTE:  Occurs when a message, encrypted
                             off-line, is transmitted over a secured,
                             on-line circuit, or when information
                             encrypted by the originator is
                             multiplexed onto a communications trunk,
                             which is then bulk encrypted.

supersession                 Scheduled or unscheduled replacement of
                             a COMSEC aid with a different edition.

supervisor state             Synonymous with executive state.

suppression measure          Action, procedure, modification, or
                             device that reduces the level of, or
                             inhibits the generation of, compromising
                             emanations in a telecommunications or
                             automated information system.

syllabary                    List of individual letters, combination
                             of letters, or syllables, with their
                             equivalent code groups, used for
                             spelling out words or proper names not
                             present in the vocabulary of a code.

                             NOTE:  A syllabary may also be known as
                             a spelling table.

synchronous crypto-          Method of on-line crypto-operation in
  operation                  which crypto-equipment and associated
                             terminals have timing systems to keep
                             them in step.

system development           Methodologies developed through software
  methodologies              engineering to manage the complexity of
                             system development.

                             NOTE:  Development methodologies include
                             software engineering aids and high-level
                             design analysis tools.









                                      70

                                              NSTISSI No. 4009




system high                  Highest security level supported by an
                             AIS.

system high mode             AIS security mode of operation wherein
                             each user, with direct or indirect
                             access to the AIS, its peripherals,
                             remote terminals, or remote hosts, has
                             all of the following:

                             a.  Valid security clearance for all
                             information within an AIS.

                             b.  Formal access approval and signed
                             non-disclosure agreements for all the
                             information stored and/or processed
                             (including all compartments,
                             subcompartments and/or special access
                             programs).

                             c.  Valid need-to-know for some of the
                             information contained within the AIS.

system indicator             Symbol or group of symbols in an off-
                             line encrypted message that identifies
                             the specific cryptosystem or key used in
                             the encryption.

system integrity             Quality of an AIS when it performs its
                             intended function in an unimpaired
                             manner, free from deliberate or
                             inadvertent unauthorized manipulation of
                             the system.

system low                   Lowest security level supported by an
                             AIS.

system security              Measure of security provided by a
                             system, as determined by evaluation of
                             the totality of all system elements and
                             COMSEC measures that support
                             telecommunications and AIS protection.










                                      71

                                              NSTISSI No. 4009




system security              The efforts that help achieve maximum
  engineering                security and survivability of a system
                             during its life cycle and interfacing
                             with other program elements to ensure
                             security functions are effectively
                             integrated into the total system
                             engineering effort.

system security              Determination of the risk associated
  evaluation                 with the use of a given system,
                             considering its vulnerabilities and
                             perceived security threat.

system security              A formal document that fully describes
  management plan            the planned security tasks required to
                             meet system security requirements.

system security officer      Synonymous with information system
                             security officer.
































                                      72

                                              NSTISSI No. 4009




                                       T



tampering                   Unauthorized modification that alters the
                            proper functioning of a cryptographic or
                            AIS security equipment or system in a
                            manner that degrades the security or
                            functionality it provides.

tape mixer                  Teletypewriter security equipment that
                            encrypts plain text and decrypts cipher
                            text by combining them with a key stream
                            from a one-time tape.

technical attack            Attack that can be perpetrated by
                            circumventing or nullifying hardware or
                            software protection mechanisms, rather
                            than by subverting system personnel or
                            other users.

technical penetration       Deliberate penetration of a security area
                            by technical means to gain unauthorized
                            interception of information-bearing
                            energy.

technical security hazard   Condition that could permit the technical
                            penetration of an area through equipment
                            that by reason of its normal design,
                            installation, operation, maintenance, or
                            damaged condition, allows the
                            unauthorized transmission of classified
                            information.

technical security          Equipment, components, devices,
  material                  and associated documentation or other
                            media that pertains to cryptography or
                            the securing of teleqommunications and
                            automated information systems.

telecommunications          Preparation, transmission, communication,
                            or related processing of information
                            (writing, images, sounds or other data)
                            by electrical, electromagnetic,
                            electromechanical, electro-optical or
                            electronic means.




                                      73

                                              NSTISSI No. 4009



telecommunications and      Protection afforded to telecommuni-
  automated information     cations and automated information
  systems security          systems, in order to prevent exploitation
                            through interception, unauthorized
                            electronic access, or related technical
                            intelligence threats and to ensure
                            authenticity.

                            NOTE:  Such protection results from the
                            application of security measures
                            (including cryptosecurity, transmission
                            security, emission security, and computer
                            security) to systems that generate,
                            store, process, transfer, or communicate
                            information of use to an adversary, and
                            also includes the physical protection of
                            technical security material and technical
                            security information.

telecommunications          Synonymous with communications security.
  security

TEMPEST                     Short name referring to investigation,
                            study, and control of compromising
                            emanations from telecommunications and
                            automated information systems equipment.
                            (See compromising emanations.)

TEMPEST test                Laboratory or on-site test to determine
                            the nature of compromising emanations
                            associated with a telecommunications or
                            automated information system.

TEMPEST zone                Defined area within a facility where
                            equipment with appropriate TEMPEST
                            characteristics (TEMPEST zone assignment)
                            may be operated without emanating
                            electromagnetic radiation beyond the
                            controlled space boundary of the
                            facility.

                            NOTE:  Facility TEMPEST zones are
                            determined by measuring electromagnetic
                            attenuation provided by a building's
                            properties and the free space loss to the
                            controlled space boundary.  Equipment
                            TEMPEST zone assignments are based on the




                                      74

                                              NSTISSI No. 4009




terminal                    Means used to uniquely identify a
  identification            terminal to an AIS.

test key                    Key intended for on-the-air testing of
                            COMSEC equipment or systems.

threat                      Capabilities, intentions, and attack
                            methods of adversaries to exploit, or any
                            circumstance or event with the potential
                            to cause harm to, information or an
                            information system.

threat analysis             Process of studying information to
                            identify the nature of and elements
                            comprising a threat.

threat assessment           Process of formally evaluating the degree
                            of threat to an information system and
                            describing the nature of the threat.

threat monitoring           Analysis, assessment, and review of AIS
                            audit trails and other data collected for
                            the purpose of searching out system
                            events that may constitute violations or
                            attempted violations of data or system
                            security.

ticket-oriented             Computer protection system in which each
                            subject maintains a list of unforgeable
                            bit patterns called tickets, one for each
                            object that a subject is authorized to
                            access.  (See list-oriented.)

time bomb                   Logic bomb for which the logic trigger is
                            time.

time compliance date        Date by which a mandatory modification to
                            a COMSEC end item must be incorporated if
                            the item is to remain approved for
                            operational use.

time-dependent              Password that is valid only at a certain
  password                  time of day or during a specified
                            interval of time.







                                      75

                                              NSTISSI No. 4009




traditional COMSEC          COMSEC program in which the National
  program                   Security Agency acts as the central
                            procurement agency for the development
                            and, in some cases, the production of
                            COMSEC items.

                            NOTE:  This includes the Authorized
                            Vendor Program and user partnerships.
                            Modifications to the COMSEC end items
                            used in products developed and/or
                            produced under these programs must be
                            approved by the National Security Agency.

traffic analysis            Study of communications characteristics
                            external to the text.

traffic encryption          Key used to encrypt plain text or
  key                       to superencrypt previously encrypted text
                            and/or to decrypt cipher text.

traffic-flow security       Measure used to conceal the presence of
                            valid messages in an on-line cryptosystem
                            or secure communications system.

                            NOTE:  Encryption of sending and
                            receiving addresses and causing the
                            circuit to appear busy at all times by
                            sending dummy traffic are two methods of
                            traffic-flow security.  A more common
                            method is to send a continuous encrypted
                            signal, irrespective of whether traffic
                            is being transmitted.

traffic padding             Generation of spurious communications or
                            data units to disguise the amount of real
                            data units being sent.

training key                Cryptographic key intended for on-the-air
                            or off-the-air training.

tranquility                 Property whereby the security level of an
                            object cannot change while the object is
                            being processed by an AIS.








                                      76

                                              NSTISSI No. 4009




transmission security       Component of communications security that
                            results from the application of measures
                            designed to protect transmissions from
                            interception and exploitation by means
                            other than cryptanalysis.

transmission security       Key that is used in the control of
  key                       transmission security processes, such as
                            frequency hopping and spread spectrum.

trap door                   Hidden software or hardware mechanism
                            that can be triggered to permit
                            protection mechanisms in an AIS to be
                            circumvented.

                            NOTE:  A trap door is usually activated
                            in some innocent-appearing manner; e.g.,
                            a special random key sequence at a
                            terminal.  Software developers often
                            write trap doors in their code that
                            enable them to reenter the system to
                            perform certain functions.

Trojan horse                Computer program containing an apparent
                            or actual useful function that contains
                            additional (hidden) functions that allows
                            unauthorized collection, falsification or
                            destruction of data.

trusted computer            AIS that employs sufficient
  system                    hardware and software assurance measures
                            to allow simultaneous processing of a
                            range of classified or sensitive
                            information.


















                                      77

                                              NSTISSI No. 4009




trusted computing           Totality of protection mechanisms
  base                      within a computer system, including
                            hardware, firmware, and software, the
                            combination of which is responsible for
                            enforcing a security policy.
                         
                            NOTE:  The ability of a trusted computing
                            base to enforce correctly a unified
                            security policy depends on the
                            correctness of the mechanisms within the
                            trusted computing base, the protection of
                            those mechanisms to ensure their
                            correctness, and the correct input of
                            parameters related to the security
                            policy.

trusted distribution        Method for distributing trusted computing
                            base hardware, software, and firmware
                            components, both originals and updates,
                            that provides protection of the trusted
                            computing base from modification during
                            distribution, and for the detection of
                            any changes.

trusted identification      An identification method used in
  forwarding                AIS networks whereby the sending host can
                            verify that an authorized user is
                            attempting a connection to another host.

                            NOTE:  The sending host transmits the
                            required user authentication information
                            to the receiving host.  The receiving
                            host can then verify that the user is
                            validated for access to the system.  This
                            operation may be transparent to the user.

trusted path                Mechanism by which a person using a
                            terminal can communicate directly with
                            the trusted computing base.

                            NOTE:  Trusted path can only be activated
                            by the person or the trusted computing
                            base and cannot be imitated by untrusted
                            software.








                                      78

                                              NSTISSI No. 4009




trusted process             Process that has privileges to circumvent
                            the system security policy and has been
                            tested and verified to operate only as
                            intended.

trusted software            Software portion of a trusted computing
                            base.

TSEC nomenclature           System for identifying the type and
                            purpose of certain items of COMSEC
                            material.

                            NOTE:  TSEC is derived from
                            telecommunications security.

two-part code               Code consisting of an encoding section,
                            in which the vocabulary items (with their
                            associated code groups) are arranged in
                            alphabetical or other systematic order,
                            and a decoding section, in which the code
                            groups (with their associated meanings)
                            are arranged in a separate alphabetical
                            or numeric order.

two-person control          Continuous surveillance and control of
                            positive control material at all times by
                            a minimum of two authorized individuals,
                            each capable of detecting incorrect and
                            unauthorized procedures with respect to
                            the task being performed, and each
                            familiar with established security and
                            safety requirements.



















                                      79

                                              NSTISSI No. 4009



two-person integrity        System of storage and handling designed
                            to prohibit individual access to certain
                            COMSEC keying material, by requiring the
                            presence of at least two authorized
                            persons, each capable of detecting
                            incorrect or unauthorized security
                            procedures with respect to the task being
                            performed.

                            NOTE:  Two-person integrity procedures
                            differ from no-lone zone procedures in
                            that, under two-person integrity
                            controls, two authorized persons must
                            directly participate in the handling and
                            safeguarding of the keying material (as
                            in accessing storage containers,
                            transportation, keying/rekeying
                            operations, and destruction).  No-lone
                            zone controls are less restrictive in
                            that the two authorized persons need only
                            to be physically present in the common
                            area where the material is located.  Two-
                            person control refers to nuclear command
                            and control COMSEC material while two-
                            person integrity refers only to COMSEC
                            keying material.

type 1 product              Classified or controlled cryptographic
                            item endorsed by the National Security
                            Agency for securing classified and
                            sensitive U.S. Government information,
                            when appropriately keyed.

                            NOTE:  The term refers only to products,
                            and not to information, key, services, or
                            controls.  Type 1 products contain
                            classified National Security Agency
                            algorithms.  They are available to U.S.
                            Government users, their contractors, and
                            federally sponsored non-U.S. Government
                            activities subject to export restrictions
                            in accordance with International Traffic
                            in Arms Regulation.








                                      80

                                              NSTISSI No. 4009




type  2 product             Unclassified cryptographic equipment,
                            assembly, or component, endorsed by the
                            National Security Agency, for use in
                            telecommunications and automated
                            information systems for the protection of
                            national security information.

                            NOTE:  The term refers only to products,
                            and not to information, key, services, or
                            controls.  Type 2 products may not be
                            used for classified information, but
                            contain classified National Security
                            Agency algorithms that distinguish them
                            from products containing the unclassified
                            data encryption standard algorithm.  Type
                            2 products are available to U.S.
                            Government departments and agencies and
                            sponsored elements of state and local
                            governments, sponsored U.S. Government
                            contractors, and sponsored private sector
                            entities.  Type 2 products are subject to
                            export restrictions in accordance with
                            the International Traffic in Arms
                            Regulation.

type  3 algorithm           Cryptographic algorithm that has been
                            registered by the National Institute of
                            Standards and Technology and has been
                            published as a Federal Information
                            Processing Standard for use in protecting
                            unclassified sensitive information or
                            commercial information.

type  4 algorithm           Unclassified cryptographic algorithm that
                            has been registered by the National
                            Institute of Standards and Technology,
                            but is not a Federal Information
                            Processing Standard.













                                      81

                                              NSTISSI No. 4009



                                       U



unauthorized                The revelation of information to
  disclosure                individuals not authorized to receive it.

unclassified                Information that has not been determined,
                            pursuant to E.O. 12356 or any predecessor
                            order, to require protection against
                            unauthorized disclosure and that is not
                            designated as classified.

untrusted process           Process that has not been tested and
                            verified for adherence to the security
                            policy.

                            NOTE:  Untrusted process may include
                            incorrect or malicious code that attempts
                            to circumvent the security mechanisms.

updating                    Automatic or manual cryptographic process
                            that irreversibly modifies the state of a
                            COMSEC key, equipment, device, or system.

user                        Person or process accessing an AIS by
                            direct connections (e.g., via terminals)
                            or indirect connections.

                            NOTE:  "Indirect connection" relates to
                            persons who prepare input data or receive
                            output that is not reviewed for content
                            or classification by a responsible
                            individual.

user ID                     Unique symbol or character string that is
                            used by an AIS to uniquely identify a
                            specific user.

User Partnership            Partnership between the National Security
  Program                   Agency and a U.S. Government department
                            or agency to facilitate the development
                            of secure information processing and
                            communications equipment incorporating
                            National Security Agency approved
                            cryptographic security.





                                      82

                                              NSTISSI No. 4009




user profile                Patterns of a user's activity on an AIS
                            that can be used to detect changes in
                            normal routines.

user representative         Person authorized by an organization to
                            order COMSEC keying material and to
                            interface with the keying system to
                            provide information to key users,
                            ensuring that the correct type of key is
                            ordered.

U.S.-controlled facility    Base or building, access to which is
                            physically controlled by U.S. persons who
                            are authorized U.S. Government or U.S.
                            Government contractor employees.

U.S.-controlled space       Room or floor within a facility that is
                            not a U.S.-controlled facility, access to
                            which is physically controlled by U.S.
                            persons who are authorized U.S.
                            Government or U.S. Government contractor
                            employees.

                            NOTE:  Keys or combinations to locks
                            controlling entrance to U.S.-controlled
                            spaces must be under the exclusive
                            control of U.S. persons who are U.S.
                            Government or U.S. Government contractor
                            employees.

U.S. person                 United States citizen or resident alien.




















                                      83

                                              NSTISSI No. 4009




                                       V



validation                  Process of applying specialized
                            security test and evaluation
                            procedures, tools, and equipment needed
                            to establish acceptance for joint usage
                            of an AIS by one or more departments or
                            agencies and their contractors.

                            NOTE:  This action will include, as
                            necessary, final development,
                            evaluation, and testing, preparatory to
                            acceptance by senior security test and
                            evaluation staff specialists.

variant                     One of two or more code symbols which
                            have the same plain text equivalent.

verification                The process of comparing two levels of
                            an AIS specification for proper
                            correspondence (e.g., security policy
                            model with top-level specification,
                            top-level specification with source
                            code, or source code with object code).

                            NOTE:  This process may or may not be
                            automated.

verified design             Computer protection class in which
                            formal security verification methods
                            are used to assure that the AIS
                            mandatory and discretionary security
                            controls can effectively protect
                            classified and sensitive information
                            stored in, or processed by; the system.

                            NOTE:  Class A1 system is verified
                            design.

virtual password            AIS password computed from a passphrase
                            that meets the requirements of password
                            storage (e.g., 64 bits).







                                      84

                                              NSTISSI No. 4009




virus                       Self replicating, malicious program
                            segment that attaches itself to an
                            application program or other executable
                            system component and leaves no external
                            signs of its presence.

vulnerability               Weakness in an information system, or
                            cryptographic system, or components
                            (e.g., system security procedures,
                            hardware design, internal controls)
                            that could be exploited.

vulnerability analysis      Systematic examination of an
                            information system or product to
                            determine the adequacy of security
                            measures, identify security
                            deficiencies, provide data from which
                            to predict the effectiveness of
                            proposed security measures, and confirm
                            the adequacy of such measures after
                            implementation.






























                                      85

                                              NSTISSI No. 4009



                                       W



work factor                 Estimate of the effort or time needed
                            by a potential perpetrator, with
                            specified expertise and resources, to
                            overcome a protective measure.

                            NOTE:  In cryptography, a work factor
                            is the number of computer binary
                            operations needed to guarantee that a
                            particular key will not be recovered
                            through cryptanalysis.

worm                        Independent program that replicates
                            from machine to machine across network
                            connections often clogging networks and
                            computer systems as it spreads.

write                       Fundamental operation in an AIS that
                            results only in the flow of information
                            from a subject to an object.  (See
                            access type.)

write access                Permission to write to an object in an
                            AIS.




                                       Z



zeroize                     Remove or eliminate the key from a
                            crypto-equipment or fill device.















                                      86

                                              NSTISSI No. 4009





                                  SECTION II
                   COMMONLY USED ABBREVIATIONS AND ACRONYMS

ACL                      access control list

ADM                      advanced development model

ADP                      automated data processing

AE                       application entity

AIG                      address indicator group

AIRK                     area interswitch rekeying key

AIS                      automated information system

AISS                     automated information systems security

AJ                       anti-jamming

AK                       automatic remote rekeying

AKDC                     automatic key distribution center

AKD/RCU                  automatic key distribution/rekeying
                         control unit

AKM                      automated key management center

ALC                      accounting legend code

AMS                      l.  auto-manual system
                         2.  autonomous message switch

ANDVT                    advanced narrowband digital voice terminal

ANSI                     American National Standards Institute

AOSS                     automated office support systems

APC                      adaptive predictive coding

APU                      auxiliary power unit





                                      87

                                              NSTISSI No. 4009




ARPANET                  Advanced Research Projects Agency Network

ASCII                    American standard code for information
                         interchange

ASPJ                     advanced self-protection jammer

ASU                      approval for service use

AUTODIN                  Automatic Digital Network

AV                       auxiliary vector

AVP                      Authorized Vendor Program

C3                       command, control, and communications

C3I                      command, control, communications and
                         intelligence

C4                       command, control, communications and
                         computers

CA                       l.  controlling authority

                         2.  cryptanalysis

                         3.  COMSEC account

                         4.  command authority

CCEP                     Commercial COMSEC Endorsement Program

CCI                      controlled cryptographic item

CCO                      circuit control officer

CDS                      cryptographic device services

CEOI                     communications electronics operation
                         instruction

CEPR                     compromising emanation performance
                         requirement

CERT                     computer emergency response team







                                      88

                                              NSTISSI No. 4009




CFD                      common fill device

CIAC                     computer incident assessment capability

CIK                      crypto-ignition key

CIP                      crypto-ignition plug

CIRK                     common interswitch rekeying key

CK                       compartment key

CKG                      cooperative key generation

CLMD                     COMSEC local management device

CMCS                     COMSEC material control system

CNCS                     cryptonet control station

CNK                      cryptonet key

COMPUSEC                 computer security

COMSEC                   communications security

COR                      central office of record

CPS                      COMSEC parent switch

CPU                      central processing unit

CRP                      COMSEC resources program (Budget)

Crypt/Crypto             cryptographic-related

CSE                      communications security element

CSS                      l.  COMSEC subordinate switch
                         2.  Constant Surveillance Service
                             (Courier)
                         3.  Continuous Signature Service (Courier)
                         4.  coded switch system
CSSO                     contractor special security officer





                                      89

                                              NSTISSI No. 4009




CSTVRP                   Computer Security Technical
                         Vulnerability Reporting Program

CTAK                     cipher text auto-key

CTTA                     certified TEMPEST technical authority

CUP                      COMSEC Utility Program

DAA                      designated approving authority

DAC                      discretionary access control

DAMA                     demand assigned multiple access

DCS                      l.  Defense Communications System
                         2.  Defense Courier Service

DCSP                     design controlled spare part(s)

DDN                      Defense Data Network

DDS                      dual driver service (courier)

DES                      data encryption standard

DIB                      directory information base

DoD TCSEC                Department of Defense Trusted Computer
                         System Evaluation Criteria

DLED                     dedicated loop encryption device

DMA                      direct memory access

DPL                      Degausser Products List (a section in the
                         Information Systems Security Products and
                         Services Catalogue)

DSN                      Defense Switched Network

DSVT                     digital subscriber voice terminal

DTLS                     descriptive top-level specification






                                      90

                                              NSTISSI No. 4009




DTD                      Data Transfer Device

DTS                      Diplomatic Telecommunications Service

DUA                      directory user agent

EAM                      emergency action message

ECCM                     electronic counter-countermeasures

ECM                      electronic countermeasures

ECPL                     Endorsed Cryptographic Products List (a
                         section in the Information Systems
                         Security Products and Services Catalogue)

EDAC                     error detection and correction

EDESPL                   Endorsed Data Encryption Standard Products
                         List

EDM                      engineering development model

EFD                      electronic fill device

EFTO                     encrypt for transmission only

EGADS                    Electronic Generation, Accounting, and
                         Distribution System

EKMS                     Electronic Key Management System

ELINT                    electronic intelligence

ELSEC                    electronic security

E Model                  engineering development model

EMSEC                    emission security

EPL                      Evaluated Products List (a section in the
                         Information Systems Security Products and
                         Services Catalogue)

ERTZ                     equipment radiation TEMPEST zone

ETL                      Endorsed Tools List





                                      91

                                              NSTISSI No. 4009




ETPL                     Endorsed TEMPEST Products List item

EUCI                     endorsed for unclassified cryptographic
                         information

EV                       enforcement vector

FDIU                     fill device interface unit

FIPS                     Federal Information Processing Standards

FOCI                     foreign owned, controlled or influenced

FOUO                     for official use only

FSRS                     functional security requirements
                         specification

FSTS                     Federal Secure Telephone Service

FTS                      Federal Telecommunications System

FTAM                     file transfer access management

FTLS                     formal top-level specification

GPS                      Global Positioning System

GTS                      Global Telecommunications Service

GWEN                     Ground Wave Emergency Network

HDM                      Hierarchical development methodology

HMS                      human safety mandatory modification

HUS                      hardened unique storage

HUSK                     hardened unique storage key

IBAC                     identity based access control

ICU                      interface control unit

IDS                      intrusion detection system

IEMATS                   Improved Emergency Message Automatic
                         Transmission System



                                      92

                                              NSTISSI No. 4009




IFF                      identification, friend or foe

IFFN                     identification, friend, foe, or neutral

IIRK                     interarea interswitch rekeying key

ILS                      integrated logistics support

INFOSEC                  information systems security

IP                       internet protocol

IPM                      interpersonal messaging

IPSO                     internet protocol security option

IR                       information ratio

IRK                      interswitch rekeying key

IS                       information system

ISDN                     Integrated Services Digital Network

ISO                      International Standards Organization

ISS                      information systems security

ISSO                     information systems security officer

ITAR                     International Traffic in Arms Regulation

JTIDS                    Joint Tactical Information Distribution
                         System

KAK                      key-auto-key

KEK                      key encryption key

KMASE                    key management application service element

KMC                      key management center

KMID                     key management identification number

KMODC                    key material ordering and distribution
                         center




                                      93

                                              NSTISSI No. 4009




KMP                      key management protocol

KMPDU                    key management protocol data unit

KMS                      key management system

KMSA                     key management system agent

KMUA                     key management user agent

KP                       key processor

KPK                      key production key

KVG                      key variable generator

LAN                      local area network

KG                       key generator

LEAD                     low-cost encryption/authentication device

LKG                      loop key generator

LMD                      local management device

LME                      layer management entry

LMI                      layer management interface

LOCK                     logical co-processing kernel

LPC                      linear predictive coding

LPD                      low probability of detection

LPI                      low probability of intercept

LRIP                     limited rate initial preproduction

LSI                      large scale integration

MAC                      l.  mandatory access control
                         2.  message authentication code

MAN                      mandatory modification




                                      94

                                              NSTISSI No. 4009




MATSYM                   material symbol

MCCB                     modification/configuration control board

MDC                      manipulation detection code

MEECN                    Minimum Essential Emergency Communications
                         Network

MEP                      management engineering plan

MER                      minimum essential requirements

MHS                      message handling system

MI                       message indicator

MIB                      management information base

MIJI                     meaconing, intrusion, jamming and
                         interference

MINTERM                  miniature terminal

MIPR                     military interdepartmental purchase
                         request

MLS                      multi level security

MOA                      memorandum of agreement

MOU                      memorandum of understanding

MRK                      manual remote rekeying

MRT                      miniature receiver terminal

MSE                      mobile subscriber equipment

NACAM                    National COMSEC Advisory Memorandum

NACSEM                   National COMSEC Emanations Memorandum

NACSI                    National COMSEC Instruction

NACSIM                   National COMSEC Information Memorandum

NAK                      negative acknowledge



                                      95

                                              NSTISSI No. 4009




NATO                     North Atlantic Treaty Organization

NCCD                     nuclear command and control document

NCS                      l.  National Communications System
                         2.  National Cryptologic School
                         3.  net control station

NCSC                     National Computer Security Center

NETS                     Nationwide Emergency Telecommunications
                         Service

NISAC                    National Industrial Security Advisory
                         Committee

NIST                     National Institute of Standards and
                         Technology

NLZ                      no-lone zone

NSAD                     network security architecture and design

NSD                      National Security Directive

NSDD                     National Security Decision Directive

NSEP                     National Security Emergency Preparedness

NSO                      network security officer

NSTAC                    National Security Telecommunications
                         Advisory Committee

NSTISSAM                 National Security Telecommunications and
                         Information Systems Security
                         Advisory/Information Memorandum

NSTISSC                  National Security Telecommunications and
                         Information Systems Security Committee

NSTISSD                  National Security Telecommunications and
                         Information Systems Security Directive

NSTISSI                  National Security Telecommunications and
                         Information Systems Security Instruction




                                      96

                                              NSTISSI No. 4009




NSTISSP                  National Security Telecommunications and
                         Information Systems Security Policy

NTCB                     network trusted computing base

NTIA                     National Telecommunications and
                         Information Administration

NTISSAM                  National Telecommunications and
                         Information Systems Security
                         Advisory/Information Memorandum

NTISSD                   National Telecommunications and
                         Information Systems Security Directive

NTISSI                   National Telecommunications and
                         Information Systems Security Instruction

NTISSP                   National Telecommunications and
                         Information Systems Security Policy

OADR                     originating agency's determination
                         required

OPCODE                   operations code

OPSEC                    operations security

OPT                      optional modification

OTAD                     over-the-air key distribution

OTAR                     over-the-air rekeying

OTAT                     over-the-air key transfer

OTP                      one-time pad

OTT                      one-time tape

PAA                      peer access approval

PAE                      peer access enforcement

PAL                      permissive action link







                                      97

                                              NSTISSI No. 4009




PC                       personal computer

PCZ                      protected communications zone

PDR                      preliminary design review

PDS                      protected distribution system

PDU                      protocol data unit

PES                      positive enable system

PKA                      public key algorithm

PKC                      public key cryptography

PKSD                     programmable key storage device

P model                  preproduction model

PLSDU                    physical layer service data unit

PNEK                     post-nuclear event key

PPL                      Preferred Products List (a section in the
                         Information Systems Security Products and
                         Services Catalogue.)

PRBAC                    partition rule base access control

PROM                     programmable read-only memory

PROPIN                   proprietary information

PSDU                     physical layer service data unit

PSL                      Protected Services List

PTT                      push-to-talk

PWA                      printed wiring assembly

PWDS                     protected wireline distribution system

RAC                      repair action

RACE                     rapid automatic cryptographic equipment

RAM                      random access memory


                                      98

                                              NSTISSI No. 4009



ROM                      read-only memory

RQT                      reliability qualification tests

SAMS                     semiautomatic message switch

SAO                      special access office

SAP                      l.  system acquisition plan
                         2.  special access program

SARK                     SAVILLE advanced remote keying

SCI                      sensitive compartmented information

SCIF                     sensitive compartmented information
                         facility

SDNRIU                   secure digital net radio interface unit

SDNS                     Secure Data Network System

SDR                      system design review

SFA                      security fault analysis

SI                       special intelligence

SIGSEC                   signals security

SISS                     Subcommittee on Information Systems
                         Security of the NSTISSC

SMM                      special mission mandatory modification

SMO                      special mission optional modification

SMU                      secure mobile unit

SPK                      single point key(ing)

SPS                      scratch pad store

SRR                      security requirements review

SSO                      special security officer






                                      99

                                              NSTISSI No. 4009




ST&E                     security test and evaluation

STS                      Subcommittee on Telecommunications
                         Security of the NSTISSC

STU                      secure telephone unit

TA                       traffic analysis

TACTED                   tactical trunk encryption device

TACTERM                  tactical terminal

TAG                      TEMPEST Advisory Group

TAISS                    telecommunications and automated
                         information systems security

TCB                      trusted computing base

TCD                      time compliance data

TCSEC                    DoD Trusted Computer System Evaluation
                         Criteria

TD                       transfer device

TED                      trunk encryption device

TEK                      traffic encryption key

TEP                      TEMPEST Endorsement Program

TFM                      trusted facility manual

TFS                      traffic flow security

TLS                      top-level specification

TNI                      trusted network interpretation

TNIEG                    trusted network interpretation environment
                         guideline

TPC                      two-person control

TPI                      two-person integrity




                                      100

                                              NSTISSI No. 4009




TRANSEC                  transmission security

TRB                      technical review board

TRI-TAC                  Tri-service Tactical Communications System

TSCM                     technical surveillance countermeasures

TSEC                     telecommunications security

TSK                      transmission security key

UA                       user agent

UIRK                     unique interswitch rekeying key

UIS                      user interface system

UPP                      User Partnership Program

USDE                     undesired signal data emanations

V model                  advanced development model

VST                      VINSON subscriber terminal

VTT                      VINSON trunk terminal

WAN                      wide area network

WWMCCS                   Worldwide Military Command and Control
                         System

XDM/x Model              experimental development model exploratory
                         development model
















                                      101

                                              NSTISSI No. 4009




                                  SECTION III

                                  REFERENCES




A.  National Security Directive 42, dated 5 July 1990.

B.  Executive Order 12356, National Security Information,
    dated 6 April 1982.

C.  Executive Order 12333, United States Intelligence
    Activities, dated 4 December 1981.

D.  Public Law 100-235, Computer Security Act of 1987,
    dated 8 January 1988.

E.  10 United States Code Section 2315, The Warner Amendment,
    dated 1 December 1981.

F.  44 United States Code Section 3502(2), Public Law 96-511,
    Paperwork Reduction Act of 1980, dated Il December 1980.



                                      102
                                      
Advanced TSCM Signals Detection and Analysis
TSCM - Sweeping the Spectrum for Eavesdropping Devices



| Home | What is TSCM | Types of Bugs | Warning Signs You're Bugged |
| How To Behave if Bugged | TSCM Threat Levels | How To Engage a TSCM Firm |
| Qualifications | TSCM Protocol | Bug Frequencies | Phone Taps and Bugging |
| Signal Analysis | TDR Analysis | TDR Tutorial | Wiretapping | Training | Tools |
| Equipment | OSC-5000 | Kaiser | Riser Bond | Avcom | Search Rcvrs |
| Outside Links | Recommended TSCM Books | TSCM Reference Library |
| Recommended U.S. TSCM Firms | TSCM-L Mailing List |


-----------------------

Copyright ©2002, Granite Island Group