{"id":335,"date":"2011-10-17T11:28:12","date_gmt":"2011-10-17T08:28:12","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=335"},"modified":"2011-10-17T11:28:12","modified_gmt":"2011-10-17T08:28:12","slug":"another-security-vocabulary-bt-ietf","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=335","title":{"rendered":"Another Security Vocabulary bt IETF"},"content":{"rendered":"<p>There exist another vocabulary called &#8220;Internet Security Glossary, Version 2&#8221;. It is IETF RFC <a href=\"http:\/\/tools.ietf.org\/rfc\/rfc4949.txt\">4949<\/a> from 2007.<\/p>\n<p><a href=\"http:\/\/www.ietf.org\/\">IETF<\/a>=Internet Engineering Task Force<\/p>\n<p>Note, in RFC 4949 the definitions might differ from the ITU and ISO <a title=\"ITU Terms and Definitions\" href=\"http:\/\/saisa.eu\/blogs\/Guidance\/?p=333\">definitions<\/a>.<\/p>\n<p>For example, &#8220;information security&#8221; is defined as:<\/p>\n<p>   $ information security (INFOSEC)<br \/>\n      (N) Measures that implement and assure security services in<br \/>\n      information systems, including in computer systems (see: COMPUSEC)<br \/>\n      and in communication systems (see: COMSEC).<\/p>\n<p>   $ COMSEC<br \/>\n      (I) See: communication security.<\/p>\n<p>   $ communication security (COMSEC)<br \/>\n      (I) Measures that implement and assure security services in a<br \/>\n      communication system, particularly those that provide data<br \/>\n      confidentiality and data integrity and that authenticate<br \/>\n      communicating entities.<\/p>\n<p>      Usage: COMSEC is usually understood to include (a) cryptography<br \/>\n      and its related algorithms and key management methods and<br \/>\n      processes, devices that implement those algorithms and processes,<br \/>\n      and the lifecycle management of the devices and keying material.<br \/>\n      Also, COMSEC is sometimes more broadly understood as further<br \/>\n      including (b) traffic-flow confidentiality, (c) TRANSEC, and (d)<br \/>\n      steganography [Kahn]. (See: cryptology, signal security.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There exist another vocabulary called &#8220;Internet Security Glossary, Version 2&#8221;. It is IETF RFC 4949 from 2007. IETF=Internet Engineering Task Force Note, in RFC 4949 the definitions might differ from the ITU and ISO definitions. For example, &#8220;information security&#8221; is &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=335\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[42,41,44],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/335"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=335"}],"version-history":[{"count":0,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/335\/revisions"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}