DoDI 8510.1 Definitions Flashcards
(41 cards)
application
Software program that performs a specific function directly for a user and can be executed without access to system control, monitoring, or administrative privileges.
authorization
Access privileges granted to a user, program, or process or the act of granting those privileges
authorization boundary
All components of an information system to be authorized for operation by an authorizing official and excludes separately authorized systems, to which the information system is connected.
Authorizing Official (AO)
Senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.
AODR
An organizational official acting on behalf of an AO in carrying out and coordinating the required activities associated with security authorization
Authorization (to Operate) (ATO)
The official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security controls.
control correlation identifier (CCI)
Decomposition of an NIST control into single, actionable, measurable statement.
common controls
Controls inherited by organizational information systems
cross domain solution (CDS)
A form of controlled interface that provides the ability to manually and/or automatically access and/or transfer information between different security domains.
cybersecurity
Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
DoD IT
DoD-owned IT and DoD-controlled IT. DoD IT includes IS, PIT, IT services, and IT products.
enclave
Collection of information systems connected by one or more internal networks under the control of a single authority and security policy. The systems may be structured by physical proximity or by function, independent of location.
hardware
The physical components of an information system.
Interim Approval To Test (IATT)
Temporary authorization to test an information system in a specified operational information environment within the timeframe and under the conditions or constraints enumerated in the written authorization.
IT product
Individual IT hardware or software items. Products can be commercial or government provided and include, but are not limited to, operating systems, office productivity software, firewalls, and routers.
IT Service
A capability provided to one or more DoD entities by an internal or external provider based on the use of information technology and that supports a DoD mission or business process. An IT Service consists of a combination of people, processes, and technology.
Information System (IS)
A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.
Information Systems Security Manager (ISSM)
Individual responsible for the information assurance of a program, organization, system, or enclave.
Information Systems Security Officer (ISSO)
Individual assigned responsibility for maintaining the appropriate operational security posture for an information system or program.
Mission Area (ma)
A defined area of responsibility with functions and processes that contribute to mission accomplishment.
Milestone B
a decision to award the contract(s) for development
mission partners
Those with whom DoD cooperates to achieve national goals, such as other departments and agencies of the U.S. Government, State and local governments, allies, coalition members, host nations and other nations, multinational organizations, non-governmental organizations, and the private sector.
network
Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.
penetration testing
A test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of an information system.