The Best Crossword Puzzle Maker Online
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet

PKI Lexicon Crossword

Across
Continuous surveillance and control of positive control material at all times by a minimum of two authorized individuals, each capable of detecting incorrect and/or unauthorized procedures with respect to the task being performed, and each familiar with established security and safety requirements. [CNSS4009]
Assurance that the sender is provided with proof of delivery and that the recipient is provided with proof of the sender's identity so that neither can later deny having processed the data. [CNSS 4009]
An entity with a digital identity that acts in cyberspace, but is not a human actor. This can include organizations, hardware devices, software applications, and information artifacts. [CNSS 4009]
Protection against unauthorized modification or destruction of information. [CNSS 4009]
Ability to make use of any information system (IS) resource. [CNSS 4009]
The process of exchanging public keys (and other information) in order to establish secure communication. [DoD CP]
The set of hardware, software, firmware, or some combination thereof that implements cryptographic logic or processes, including cryptographic algorithms, and is contained within the cryptographic boundary of the module. [FIPS 140]
In a hierarchical PKI, the CA whose public key serves as the most trusted datum (i.e., the beginning of trust paths) for a security domain. [DoD CP]
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. [CNSS 4009]
Unclassified router-based data network system, part of the Defense Information Infrastructure. [DoD CP]
The globally interconnected, end-to-end set of information capabilities, and associated processes for collecting, processing, storing, disseminating, and managing information on-demand to warfighters, policy makers, and support personnel, including owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and national security systems. [JP 1-02, JP 3-12]
Time span during which each key setting remains in effect. [CNSS 4009]
Copy of files and programs made to facilitate recovery if necessary. [CNSS 4009]
Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. [CNSS 4009]
Down
An individual responsible to the Information Assurance Manager (IAM) for ensuring that the appropriate operational IA posture is maintained for a DoD information system or organization. While the term IAO is favored within the Department of Defense, it may be used interchangeably with other IA titles (e.g., Information Systems Security Officer, Information Systems Security Custodian, Network Security Officer, or Terminal Area Security Officer). [DOD I8500.2]
Functions of loading, storing, copying, and distributing the keys and producing the necessary audit information to support those functions. [NSTISSI No. 3006]
Process of associating two related elements of information. [CNSS 4009]
Secret High classified router-based, data network system, part of the Defense Information Infrastructure. [DoD CP]
A certificate that is trusted by the Relying Party on the basis of secure, authenticated delivery. The public keys included in Trusted Certificates are used to start certification paths. {DoD CP}
A digital representation of information which at least (1) identifies the certification authority issuing it, (2) names or identifies its Subscriber, (3) contains the Subscriber's public key, (4) identifies its operational period, and (5) is digitally signed by the certification authority issuing it. [ABADSG]
Assurance that information is not disclosed to unauthorized entities or processes. [CNSS 4009]
In a hierarchical PKI, a CA whose certificate signing key is certified by another CA. [DoD CP]
A random or non-repeating value that is included in data exchanged by a protocol, usually for the purpose of guaranteeing the transmittal of live data rather than replayed data, thus detecting and protecting against replay attacks. [CNSS 4009]
An authority trusted to create and assign certificates. [ISO9594-8]
Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures. [CNSS 4009]