<section title="24.2. Glossary of Terms"><subsection title="Glossary of Terms"><paragraph
    title="24.2.1."


><![CDATA[<table class="table-main" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td>
<p>Term</p>
</td>
<td>
<p>Meaning</p>
</td>
</tr>
<tr>
<td>
<p>802.11</p>
</td>
<td>
<p>The Institute of Electrical and Electronics Engineers standard defining WLAN communications. Formally titled IEEE 82.11.</p>
</td>
</tr>
<tr>
<td>
<p>Access Gateway</p>
</td>
<td>
<p>An architectural construct that provides the system user access to multiple security domains from a single device, typically a workstation.</p>
</td>
</tr>
<tr>
<td><strong class="field-content">Access control</strong></td>
<td>
<div class="views-field views-field-title">The process of granting or denying requests for access to systems, applications and information. It can also refer to the process of granting or denying requests for access to facilities.</div>
</td>
</tr>
<tr>
<td>
<p>Accountable</p>
</td>
<td>
<p><span>Required or&nbsp;</span>expected to justify actions or decisions; being answerable and responsible for those actions &amp; decisions.</p>
</td>
</tr>
<tr>
<td>
<p>Accountable Material</p>
</td>
<td>
<p>Accountable information, an accountable item or accountable material refers to the accountability controls applied to specified information, equipment or materials. Accountable information, items or materials are usually uniquely identifiable (usually a serial or identification number) and are tracked from acquisition or creation to final disposal. Safe custody is a fundamental and is achieved through:</p>
<ul>
<li>is easily to compute;</li>
<li>will usually output a significantly different value, even for small changes made to the input; and</li>
<li>can detect many types of data corruptions.</li>
<li>allocation to a specific individual (issued or responsibility designated);</li>
<li>allocation or designation of responsibility may also require a specific briefing related to the handling, care and protection of particular types of classified information and COMSEC equipment;</li>
<li>the allocation, issue or designation being recorded;</li>
<li>strict controls over access and movement (special handling requirements);</li>
<li>maintenance of a register (manual or electronic); and</li>
<li>regular audits to ensure accountability conditions continue to be adhered to and any briefings are current.</li>
</ul>
<p>As a general rule, accountable information, items or materials are afforded physical security protection by specifying special handling and accountability conditions. Examples may include cryptographic or COMSEC equipment, other high value equipment, money, computers or information subject to privacy legislation and regulation. Cryptographic or COMSEC equipment and any information classified as CONFIDENTIAL, SECRET or TOP SECRET is accountable by definition.</p>
</td>
</tr>
<tr>
<td>
<p>Accountability</p>
</td>
<td>
<p>Most contemporary definitions include two key elements:</p>
<ul>
<li>the conferring of responsibility and authority; and</li>
<li>the answering for the use of that authority.</li>
</ul>
<p>Accountability exists when the performance of tasks or functions by an individual or organisation, are subject to another’s oversight, direction or request that they provide information or justification for their actions.</p>
<p>Answering for the use of authority means reporting, explaining actions, assuming obligations, and submitting to outside or external judgement. &nbsp;Having responsibility means having the authority to act, the power to control and the freedom to decide.&nbsp; It also means that one must behave rationally, reliably and consistently in exercising judgement.</p>
</td>
</tr>
<tr>
<td>
<p>Accreditation</p>
</td>
<td>
<p>A procedure by which an authoritative body gives formal recognition, approval and acceptance of the associated residual security risk with the operation of a system and issues a formal approval to operate the system.</p>
</td>
</tr>
<tr>
<td>
<p>Accreditation Authority</p>
</td>
<td>
<p>The authoritative body or individual responsible for systems accreditation.</p>
</td>
</tr>
<tr>
<td>
<p>Adaptive Authentication</p>
</td>
<td>
<p>This varies the level or degree of authentication required where unusual login requests occur.&nbsp; For example, out of normal hours, from an unusual geolocation, from an unknown device and so on.&nbsp; When an unusual authentication request is received, Adaptive Authentication may request additional credentials such as a one-time code provided to a known mobile phone number.</p>
</td>
</tr>
<tr>
<td>
<p>Agency</p>
</td>
<td>
<p>New Zealand Government departments, authorities, agencies or other bodies established in relation to public purposes, including departments and authorities staffed under the Public Service Act.</p>
</td>
</tr>
<tr>
<td>
<p>Agency Control</p>
</td>
<td>
<p>This description applies where an Agency has <span style="text-decoration: underline;">direct control</span> of agency information systems and data.&nbsp; It follows that Non-Agency Control occurs where direct control is impaired or does not or cannot exist.</p>
</td>
</tr>
<tr>
<td>
<p>Agency&nbsp;Head</p>
</td>
<td>
<p>The government employee with ultimate responsibility for the secure operation of agency functions, whether performed inhouse or outsourced.</p>
</td>
</tr>
<tr>
<td>
<p>All-of-Government</p>
</td>
<td>
<p>Refers to the entire New Zealand state sector.</p>
</td>
</tr>
<tr>
<td>
<p>Allow list</p>
</td>
<td>
<p><span>A list that confirms items being analysed are acceptable. This is the opposite of a deny or block list.</span></p>
</td>
</tr>
<tr>
<td>
<p>Approved Cryptographic Algorithms</p>
</td>
<td>
<p>Approved cryptographic algorithms have been extensively scrutinised for vulnerabilities by government, industry and academic communities in a practical and theoretical setting.<br> The approved cryptographic algorithms fall into three categories: asymmetric/public key algorithms, hashing algorithms, and symmetric encryption algorithms.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Approved Destruction Facility</p>
</td>
<td>
<p class="Normal-nonumbering">The status of “approved facility” for the destruction of media and equipment, applies to a specific installation/site, and is granted by the Director-General GCSB under the NZISM.</p>
<p>Approval depends upon the Director-General’s satisfaction that the proposed facilities are capable of securely destroying IT equipment, devices and media to the standard required under the NZISM and related policies and that procedural security meets the required standards.</p>
</td>
</tr>
<tr>
<td>
<p>Asset</p>
</td>
<td>
<p>Anything of value to an agency, such as IT equipment and software, information, personnel, documentation, reputation and public confidence.</p>
</td>
</tr>
<tr>
<td>
<p>Attack Surface</p>
</td>
<td>
<p>The IT equipment and software used in a system. The greater the attack surface the greater the chances are of an attacker finding an exploitable vulnerability.</p>
</td>
</tr>
<tr>
<td>
<p>Attribute Based Access Control</p>
</td>
<td>
<p>An access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environment conditions, and a set of policies that are specified in terms of those attributes and conditions.</p>
</td>
</tr>
<tr>
<td>
<p>Audit</p>
</td>
<td>
<p>A structured process of examination, review, assessment, testing and reporting against defined requirements or objectives. Auditors should be independent of any IT system, business process, agency, function, site, supplier or other subject area being audited.</p>
</td>
</tr>
<tr>
<td>
<p>Australian Information Security Evaluation Program</p>
</td>
<td>
<p>A program under which evaluations are performed by impartial companies against the Common Criteria.&nbsp; The results of these evaluations are then certified by ASD, which is responsible for the overall operation of the program.</p>
</td>
</tr>
<tr>
<td>
<p>Authentication</p>
</td>
<td>
<p>The process of identifying an individual, device or system before granting access to system resources or data.&nbsp; Usually based on a set of credentials such as an identifier (such as a user or device name) and an authenticator (such as a password or some other authentication factor).&nbsp; Authentication is distinct from Authorisation.</p>
</td>
</tr>
<tr>
<td>
<p>Authentication Header</p>
</td>
<td>
<p>Part of the protocol used for authentication within IPSec, it provides authentication, integrity and anti-replay for the entire packet (both the header and data payload).</p>
</td>
</tr>
<tr>
<td>
<p>Authorisation</p>
</td>
<td>
<p><span>Authorisation </span><span>is the process of granting (or revoking) access privileges to an individual, device or system.&nbsp;&nbsp;</span></p>
</td>
</tr>
<tr>
<td>
<p>Baseline</p>
</td>
<td>
<p>Information and controls that are used as a minimum implementation or starting point to provide a consistent minimum standard of systems security and information assurance.</p>
</td>
</tr>
<tr>
<td>
<p>Brute Force Attack</p>
</td>
<td>
<p>A brute force attack is when an automated continuous attack is conducted against a system or file to decrypt or discover passwords and data.&nbsp; Often used as an entry point for privilege escalation.</p>
</td>
</tr>
<tr>
<td>
<p>Bug Bounty</p>
</td>
<td>
<p>A monetary reward to researchers for the discovery and reporting of software and other information system vulnerabilities.</p>
</td>
</tr>
<tr>
<td>
<p>Cascaded Connections</p>
</td>
<td>
<p>Links to other systems that occur when connected systems are themselves connected to other systems. This may result in multiple indirect (cascaded) connections to systems with differing security implementations, data, equipment and other aspects important for the security and assurance of systems.</p>
</td>
</tr>
<tr>
<td>
<p>Caveat</p>
</td>
<td>
<p>A marking that indicates that the information has special requirements in addition to those indicated by the classification and any prescribed endorsement. The term covers codewords, source codewords, releasability indicators and special-handling caveats. See also Endorsements.</p>
</td>
</tr>
<tr>
<td>
<p>Certification</p>
</td>
<td>
<p>The process by which the controls and management of an information system is formally evaluated against any specific risks identified and the requirements of the NZISM. A key output is a formal assurance statement that the system conforms to the requirements of the NZISM.</p>
</td>
</tr>
<tr>
<td>
<p>Certification Authority</p>
</td>
<td>
<p>An official with the authority to assert that a system complies with prescribed controls within a standard.</p>
</td>
</tr>
<tr>
<td>
<p>Certification Report</p>
</td>
<td>
<p>A report generated by a certification body of a Common Criteria scheme that provides a summary of the findings of an evaluation.</p>
</td>
</tr>
<tr>
<td>
<p>Characterisation</p>
</td>
<td>
<p>In the NZISM “characterisation” is a synonym for “unique identifier”.</p>
<p>This is typically applied to an operating system,&nbsp; programme, library or other programmatic element in the form of a checksum which can be calculated from a “known good” component and stored for comparison should there be any concern that components have been damaged or compromised.&nbsp;</p>
<p>Forensic methods may also provide characterisation indicators but are likely to require additional levels of expertise.</p>
<p>See also Checksum and Hash.</p>
</td>
</tr>
<tr>
<td>
<p>Checksum</p>
</td>
<td>
<p>A checksum verifies or <strong>checks</strong> the integrity of data.</p>
<p>A good checksum algorithm:</p>
<ul>
<li>is easily to compute;</li>
<li>will usually output a significantly different value, even for small changes made to the input; and</li>
<li>can detect many types of data corruptions.</li>
</ul>
<p>Checksums are often used to verify the integrity of operating system, programme, library or other programmatic elements, images and firmware updates.&nbsp; Checksums typically range in length from one to 64-bits, depending on the intended usage and algorithm used to determine the checksum.</p>
<p>Checksums are related to hash functions, fingerprints, randomisation functions, and cryptographic hash functions.&nbsp; Note, however, each of those concepts are distinct, have different applications and therefore different design goals.&nbsp; Check digits and parity bits are special uses of checksums.&nbsp; It is important to recognise that, although related, a hash is not a checksum.</p>
<p>See also Hash.</p>
</td>
</tr>
<tr>
<td>
<p>Chief Information Security Officer</p>
</td>
<td>
<p>A senior executive with overall responsibility for the governance and management of information risks within an agency. This may include coordination between security, ICT and business functions to ensure risks are properly identified and managed.</p>
</td>
</tr>
<tr>
<td>
<p>Classified Information</p>
</td>
<td>
<p>Government information that requires protection from unauthorised disclosure.</p>
</td>
</tr>
<tr>
<td>
<p>Classified Systems</p>
</td>
<td>
<p>Systems that process, store or communicate classified information.</p>
</td>
</tr>
<tr>
<td>
<p>Cloud deployment model</p>
</td>
<td>
<p>The term deployment model refers to the type of access and the fundamental nature of the support infrastructure but is not specific as to the type of service consumed.&nbsp; Typically this includes:</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; private cloud,</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; public cloud,</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; hybrid cloud, and</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; multi-cloud.</p>
</td>
</tr>
<tr>
<td>
<p>Cloud service model</p>
</td>
<td>
<p>The term cloud service model refers to the type of service used.&nbsp; These cloud service offerings are provided and maintained by the cloud service provider. Typical service offerings include:</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Infrastructure-as-a-Service,</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Software-as-a-Service, and</p>
<p>•&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Platform-as-a-Service.</p>
</td>
</tr>
<tr>
<td>
<p>Cloud service provider</p>
</td>
<td>
<p>An external company that provides a platform, infrastructure, applications, and/or storage services for its clients.</p>
</td>
</tr>
<tr>
<td>
<p>Codewords</p>
</td>
<td>
<p>A short (usually a single word) descriptions of a project, operation or activity, typically assigned used for reasons of reliability, clarity, brevity, or secrecy. Each code word is assembled in accordance with the specific rules of the code and assigned a unique meaning. Synonymous with <em>Codename</em>.</p>
</td>
</tr>
<tr>
<td>
<p>Coercivity</p>
</td>
<td>
<p>A measure of the resistance of a magnetic material to changes in magnetisation, equivalent to the field intensity necessary to demagnetise any magnetised material. The amount of coercive force required to reduce any residual magnetic induction to zero. Normally used in describing the characteristics of degaussing magnetic media (see Degausser).</p>
</td>
</tr>
<tr>
<td>
<p>Common Criteria</p>
</td>
<td>
<p>A formal, internationally-recognised scheme, defined in the ISO 15408 standard. This standard describes process to specify, design, develop, test, evaluate and certify as secure IT systems, where ‘secure’ is explicitly and formally defined.</p>
</td>
</tr>
<tr>
<td>
<p>Common Criteria Recognition Arrangement</p>
</td>
<td>
<p>An international agreement which facilitates the mutual recognition of Common Criteria evaluations by certificate producing schemes, including the Australian and New Zealand certification scheme.</p>
</td>
</tr>
<tr>
<td>
<p>Communications Security</p>
</td>
<td>
<p>Controls applied taken to deny unauthorised access to information derived from information and communication systems and to ensure the authenticity of related communications and data.</p>
</td>
</tr>
<tr>
<td>
<p>Conduit</p>
</td>
<td>
<p>A tube, duct or pipe used to protect cables.</p>
</td>
</tr>
<tr>
<td>
<p>Connection Forwarding</p>
</td>
<td>
<p>The use of network address translation to allow a port on a network node inside a local area network to be accessed from outside the network.&nbsp; Alternatively, using a Secure Shell server to forward a Transmission Control Protocol connection to an arbitrary port on the local host.</p>
</td>
</tr>
<tr>
<td>
<p>ConOp</p>
</td>
<td>
<p>Concept of Operations, a document describing the characteristics of an information systems and its intended use. It is used to communicate the intent and system characteristics to all stakeholders</p>
</td>
</tr>
<tr>
<td>
<p>Consumer Guide</p>
</td>
<td>
<p>Product specific advice concerning evaluated products can consist of findings from mutually recognised information security evaluations. This may include the Common Criteria, findings from GCSB internal evaluations, any recommendations for use and references to relevant policy and other standards.</p>
</td>
</tr>
<tr>
<td>
<p>Content Filtering</p>
</td>
<td>
<p>The process of monitoring communications, including email and web pages, analysing them for any suspicious or unwanted content, and preventing the delivery of suspicious or unwanted content.</p>
</td>
</tr>
<tr>
<td>
<p>Contract</p>
</td>
<td>
<p>Contract means an agreement between two or more persons or entities, which is intended to be enforceable at law and includes a contract made by deed or in writing,</p>
</td>
</tr>
<tr>
<td>
<p>Cross-Domain Solution</p>
</td>
<td>
<p>A Cross-Domain Solution (CDS) is a controlled interface that enables secure manual and/or automatic access and/or information transfer between different security domains while protecting the confidentiality, integrity and availability of each domain.</p>
<p>There are several types of CDS including access, multi-level and transfer gateways.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic Hash</p>
</td>
<td>
<p>An algorithm (the hash function) which takes as input a string of any length (the message), and generates a fixed length string (the message digest or fingerprint) as output.&nbsp; The algorithm is designed to make it computationally infeasible to find any input which maps to a given digest, or to find two different messages that map to the same digest.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptography</p>
</td>
<td>
<p>Cryptography is&nbsp;the study of secure communications techniques that allow <span style="text-decoration: underline;">only</span> the sender and intended recipient of a message to view&nbsp;its contents.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptoperiod</p>
</td>
<td>
<p>The useful life of the cryptographic key.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic Protocol</p>
</td>
<td>
<p>Specified cryptographic algorithms, parameters (such as key length) and processes for managing, establishing and using encrypted communications.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic System</p>
</td>
<td>
<p>A related set of hardware or software used for cryptographic communication, processing or storage, and the administrative framework in which it operates.</p>
</td>
</tr>
<tr>
<td>
<p>Cryptographic System Material</p>
</td>
<td>
<p>Material that includes, cryptographic key, equipment, devices, documents, firmware or software that contains or describes cryptographic logic.</p>
</td>
</tr>
<tr>
<td>
<p>Data At Rest</p>
</td>
<td>
<p>Information residing on media storage facility or a system that is not in use.</p>
</td>
</tr>
<tr>
<td>
<p>Data Diode</p>
</td>
<td>
<p><span>A device that allows data to flow in only one direction.</span></p>
</td>
</tr>
<tr>
<td>
<p>Data In Transit</p>
</td>
<td>
<p>Information that is being conveyed across a communication medium.</p>
</td>
</tr>
<tr>
<td>
<p>Data In Use</p>
</td>
<td>
<p>Information that has been decrypted for processing by a system.</p>
</td>
</tr>
<tr>
<td>
<p>Data Remanence</p>
</td>
<td>
<p>Residual information remaining on a device or storage media after clearing or sanitising the device or media.&nbsp; Sometimes described as data persistence.</p>
</td>
</tr>
<tr>
<td>
<p>Data Spill</p>
</td>
<td>
<p>An information security incident that occurs when information is transferred between two security domains by an unauthorised means.&nbsp; This can include from a classified network to a less classified network or between two areas with different need-to-know requirements.</p>
</td>
</tr>
<tr>
<td>
<p>Declassification</p>
</td>
<td>
<p>A process whereby information is reduced to an unclassified state. Subsequently an administrative decision can be made to formally authorise its release into the public domain.</p>
</td>
</tr>
<tr>
<td>
<p>Degausser</p>
</td>
<td>
<p>An electrical device or permanent magnet assembly which generates a coercive magnetic force to destroy magnetic storage patterns in order to sanitise magnetic media.</p>
</td>
</tr>
<tr>
<td>
<p>Delegate</p>
</td>
<td>
<p>A person or group of personnel who may authorise noncompliance with requirements in this manual on the specific authority of the agency head.</p>
</td>
</tr>
<tr>
<td>
<p>Demilitarised Zone</p>
</td>
<td>
<p>A small network with one or more servers that is kept separate from an agency’s core network, either on the outside of the agency’s firewall, or as a separate network protected by the agency’s firewall.&nbsp; Demilitarised zones usually provide public domain information to less trusted networks, such as the Internet.</p>
</td>
</tr>
<tr>
<td>
<p>Deny list</p>
</td>
<td>
<p><span>A set of items to be excluded, blocked or prevented from execution. A deny list can also be known as a Block List. It is the opposite of an allow list which confirms that items are acceptable.</span></p>
</td>
</tr>
<tr>
<td>
<p>Department</p>
</td>
<td>
<p>Term used to describe Public Service Departments and Non-Public Service Departments within the state sector.</p>
<p>Refer State Services Commission list of Central Government Agencies – <a href="https://www.publicservice.govt.nz/system/central-government-organisations/">Central government organisations - Te Kawa Mataaho Public Service Commission</a></p>
</td>
</tr>
<tr>
<td>
<p>Device Access Control Software</p>
</td>
<td>
<p>Software that can be installed to restrict access to communications ports such as USB, Serial HDMI and Ethernet Ports. Device access control software can either block all access to a communications port or allow access using an allow listing approach based on device types, manufacturer’s identification, or even unique device identifiers.</p>
</td>
</tr>
<tr>
<td>
<p>DevOps</p>
</td>
<td>
<p>DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Diffie-Hellman Groups</p>
</td>
<td>
<p>A method used for specifying the modulus size used in the hashed message authentication code algorithms.&nbsp; Each DH group represents a specific modulus size.&nbsp; For example, group 2 represents a modulus size of 1024 bits.</p>
</td>
</tr>
<tr>
<td>
<p>Direct Control</p>
</td>
<td>
<p>In relation to the NZISM, <span style="text-decoration: underline;">Direct Control </span>is the immediate and continuous physical and logical control, responsibility for, and operation of agency information systems and data. See also Indirect Control.</p>
</td>
</tr>
<tr>
<td><strong>Domain-based Message Authentication, Reporting, and Conformance</strong></td>
<td>
<p>Domain-based Message Authentication, Reporting, and Conformance is a scalable mechanism by which a mail-originating organization can express domain-level policies and preferences for message validation, disposition, and reporting, that a mail-receiving organization can use to improve mail handling.</p>
</td>
</tr>
<tr>
<td><strong>DomainKeys Identified Mail</strong></td>
<td>
<p>DomainKeys Identified Mail defines a mechanism by which email messages can be cryptographically signed, permitting a signing domain to claim responsibility for the introduction of a message into the mail stream.&nbsp; Message recipients can verify the signature by querying the signer's domain directly to retrieve the appropriate public key, and thereby confirm that the message was attested to by a party in possession of the private key for the signing domain.</p>
</td>
</tr>
<tr>
<td>
<p>Dual-Stack Device</p>
</td>
<td>
<p>A product that implements both IP version 4 and 6 protocol stacks.</p>
</td>
</tr>
<tr>
<td>
<p>Emanation Security</p>
</td>
<td>
<p>The counter-measures, techniques and processes employed to reduce classified emanations from a facility and its systems to an acceptable level. Emanations can be in the form of RF energy, sound waves or optical signals.</p>
</td>
</tr>
<tr>
<td>
<p>Emergency Access</p>
</td>
<td>
<p>The process of a system user accessing a system that they do not hold appropriate security clearances for due to an immediate and critical emergency requirement.</p>
</td>
</tr>
<tr>
<td>
<p>Emergency Situation</p>
</td>
<td>
<p>A situation requiring the evacuation of a site.&nbsp; Examples include fires and bomb threats.</p>
</td>
</tr>
<tr>
<td>
<p>Encapsulating Security Payload</p>
</td>
<td>
<p>A protocol used for encryption and authentication within IPSec.</p>
</td>
</tr>
<tr>
<td>
<p>Encryption</p>
</td>
<td>
<p>The transformation of data from plaintext (recognisable/readable data) to ciphertext (encrypted and not readable) using a cryptographic key.</p>
<p>Data is encrypted using an encryption key to produce ciphertext and decrypted to plaintext using a decryption key.&nbsp; These keys may be the same (symmetric encryption) or two different keys (asymmetric encryption).</p>
<p>Encryption alone does not prevent interference or unauthorised access but denies the intelligible content to unauthorised individuals, organisations or other would-be interceptors.</p>
</td>
</tr>
<tr>
<td>
<p>Endorsement</p>
</td>
<td>
<p>Certain information may bear an endorsement marking in addition to a security classification. Endorsement markings are not security classifications in their own right and must not appear without a security classification. Endorsement markings are warnings that the information has special requirements in addition to those indicated by the security classification and should only be used when there is a clear need for special care.</p>
<p>Endorsement markings may indicate:</p>
<ul>
<li>the specific nature of information;</li>
<li>temporary sensitivities;</li>
<li>limitations on availability; or</li>
<li>how recipients should handle or disclose information.</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Escort</p>
</td>
<td>
<p>An individual who supervises visitors to secure areas to ensure uncleared visitors are not exposed to classified information, conversations equipment and other classified materials. Such visitors may include maintenance staff, IT contractors and building inspectors.</p>
</td>
</tr>
<tr>
<td>
<p>Evaluation Assurance Level</p>
</td>
<td>
<p>A numeric representation of the security functionality of a product gained from undertaking a Common Criteria evaluation. Each EAL comprises a number of assurance components, covering aspects of a product’s design, development and operation. The range covers EAL0 (lowest) to EAL7 (highest).</p>
</td>
</tr>
<tr>
<td>
<p>Exception</p>
</td>
<td>
<p>The formal acknowledgement that a requirement of the NZISM cannot be met and that a dispensation from the particular compliance requirement is granted by the Accreditation Authority.&nbsp; This exception is valid for the term of the Accreditation Certificate or some lesser time as determined by the Accreditation Authority.</p>
</td>
</tr>
<tr>
<td>
<p>Exceptions and Waivers</p>
</td>
<td>
<p>An exception is NOT the same as a waiver.&nbsp; An exception means that the requirement need not be followed.&nbsp; A waiver means that some alternative controls or conditions are implemented.</p>
</td>
</tr>
<tr>
<td>
<p>Facility</p>
</td>
<td>
<p>An area that facilitates government business.&nbsp; For example, a facility can be a building, a floor of a building or a designated area on the floor of a building.</p>
</td>
</tr>
<tr>
<td>
<p>Filter</p>
</td>
<td>
<p>A device that manages or restricts the flow of data in accordance with a security policy.</p>
</td>
</tr>
<tr>
<td>
<p>Finder</p>
</td>
<td>
<p>An individual or organisation that reports a vulnerability under an agency's VDP.</p>
</td>
</tr>
<tr>
<td>
<p>Firewall</p>
</td>
<td>
<p>A network protection device that filters incoming and outgoing network data, based on a series of rules.</p>
</td>
</tr>
<tr>
<td>
<p>Firmware</p>
</td>
<td>
<p>Software embedded in a hardware device.</p>
</td>
</tr>
<tr>
<td>
<p>Flash Memory Media</p>
</td>
<td>
<p>A specific type of EEPROM.</p>
</td>
</tr>
<tr>
<td>
<p>Fly Lead</p>
</td>
<td>
<p>A cable that connects IT equipment to the fixed infrastructure of the facility. For example, the cable that connects a workstation to a network wall socket.</p>
</td>
</tr>
<tr>
<td>
<p>Foreign National</p>
</td>
<td>
<p>A person who is not a New Zealand citizen.</p>
</td>
</tr>
<tr>
<td>
<p>Foreign System</p>
</td>
<td>
<p>A system that is not owned and operated by the New Zealand Government.</p>
</td>
</tr>
<tr>
<td>
<p>Functional Segregation</p>
</td>
<td>
<p>Segregation based on the device function or intended function.</p>
</td>
</tr>
<tr>
<td>
<p>Gateway</p>
</td>
<td>
<p>Connections between two or more systems from different security domains to allow access to or transfer of information according to defined security policies. Some gateways can be automated through a combination of physical or software mechanisms. Gateways are typically grouped into three categories: access gateways, multilevel gateways and transfer gateways.</p>
</td>
</tr>
<tr>
<td>
<p>General User</p>
</td>
<td>
<p>A system user who can, with their normal privileges, make only limited changes to a system and generally cannot bypass system security.</p>
</td>
</tr>
<tr>
<td>
<p>Government Chief Information Officer</p>
</td>
<td>
<p>Government Chief Information Officer (GCIO) is a role undertaken by the Chief Executive of the Department of Internal Affairs in order to provide leadership on ICT matters within the NZ Government.</p>
</td>
</tr>
<tr>
<td>
<p>Hardware</p>
</td>
<td>
<p>A generic term for any physical component of information and communication technology, including peripheral equipment and media used to process information.</p>
</td>
</tr>
<tr>
<td>
<p>Hardware Security Module</p>
</td>
<td>
<p>Hardware Security Modules (HSMs) are a device, card or appliance usually installed inside of a PC or server to provide cryptographic functions. HSM’s are usually physically and electronically hardened to reduce the possibility of tampering or other interference.</p>
</td>
</tr>
<tr>
<td>
<p>Hash</p>
</td>
<td>
<p>A hash is the result of a one-way, cryptographic function that converts a data string of any length into a unique fixed-length bit string.&nbsp; Typically applied to passwords and messages to protect against loss and/or add resistance to attacks.</p>
<p>Hashing algorithms or functions are often are designed as a one-way cryptographic transformation so that it's impossible to reverse the hash process and reconstitute the original string.</p>
<p>The values returned by a hash function are variously described as hash values, hash codes, digests, or simply hashes.</p>
<p>One common use of a hash is a data structure called a hash table, widely used in computer software for indexing and rapid retrieval of database elements.</p>
<p>Note that a hash is not the same as data encryption although it does utilise cryptographic functions.</p>
<p>See also Checksum.</p>
</td>
</tr>
<tr>
<td>
<p>Hash Value</p>
</td>
<td>
<p>See Hash.&nbsp; Also known as "message digest".</p>
</td>
</tr>
<tr>
<td>
<p>Hashed Message Authentication Code Algorithms</p>
</td>
<td>
<p>In cryptography, a keyed-hash message authentication code (HMAC) is a specific type of message authentication code (MAC) using a cryptographic hash function and a cryptographic key.</p>
</td>
</tr>
<tr>
<td>
<p>High Assurance</p>
</td>
<td>
<p>High Assurance is a generic term encompassing Common Criteria Evaluation Assurance Levels (EAL) 5, 6 and 7. Alternatively refers to the independent (unrelated) ASD High Assurance Evaluation Scheme.</p>
</td>
</tr>
<tr>
<td>
<p>High Assurance Cryptography</p>
</td>
<td>
<p>The U.S. ranks cryptographic products and algorithms through a certification programme and categorising the products and algorithms into product types. Product types are defined in the US National Information Assurance Glossary (CNSSI No. 4009) which defines Type 1 and 2 products, and Type 3 and 4 algorithms. Type 1 products are used to protect systems requiring the most stringent protection mechanisms.</p>
</td>
</tr>
<tr>
<td>
<p>High Assurance Cryptographic Equipment (HACE)</p>
</td>
<td>
<p>The equivalent to United States Type 1 cryptographic products &amp; equipment. Previously described as High Grade Cryptographic Products &amp; Equipment, the term HACE includes classified CCI, and other GCSB-Specific devices.</p>
</td>
</tr>
<tr>
<td>
<p>Hybrid Hard Drives</p>
</td>
<td>
<p>Non-volatile magnetic media that use a cache to increase read and write speeds and reduce boot time.&nbsp; The cache is normally flash memory media or battery backed RAM.</p>
</td>
</tr>
<tr>
<td>
<p>Incident Response Plan</p>
</td>
<td>
<p>A plan for responding to information security incidents as defined by the individual agency.</p>
</td>
</tr>
<tr>
<td>
<p>Identity and Access Management</p>
</td>
<td>
<p class="Normal-nonumbering">Identity and Access Management (IAM) is a framework of business processes, policies and technologies that enable and support the management of electronic or digital identities, authorisation, privileges and access to organisational resources.</p>
<p class="Normal-nonumbering">Identity management deals with attributes related to a user (including people, machines, devices and systems).&nbsp;Access Management applies organisation processes, policies and security to enable and manage access.&nbsp;The two aspects are highly interdependent and are most effectively managed conjointly.&nbsp;An IAM framework is a key element in Privileged Access Management (PAM) and Zero Trust architectures.</p>
</td>
</tr>
<tr>
<td>
<p>Image persistence / Image retention</p>
</td>
<td>
<p>LCD/LED/OLED and plasma technologies can be susceptible to persistence or retention of an image or “ghost” image on the screen.&nbsp; This can also led to screen burn-in, as can occur in traditional CRT monitors.</p>
</td>
</tr>
<tr>
<td>
<p>Indirect Agency Control</p>
</td>
<td>
<p>In relation to the NZISM, Indirect agency control is when information, services or operations are not under the direct control of the agency. This may be through outsourcing of, ICT management or services, use of third party facilities such as data centre co-locations, or consumption of cloud services. See also Direct Control.</p>
</td>
</tr>
<tr>
<td>
<p>Information</p>
</td>
<td>
<p>Any communication or representation of knowledge such as facts, data, and opinions in any medium or form, electronic as well as physical. Information includes any text, numerical, graphic, cartographic, narrative, or any audio or visual representation.</p>
</td>
</tr>
<tr>
<td>
<p>Information Asset</p>
</td>
<td>
<p>Information asset is any information or related equipment has value to an organisation. This includes equipment, facilities, patents, intellectual property, software and hardware. Information Assets also include services, information, and people, and characteristics such as reputation, brand, image, skills, capability and knowledge</p>
</td>
</tr>
<tr>
<td>
<p>Information and Communications Technology (ICT)</p>
</td>
<td>
<p>Information and Communications Technology (ICT) includes:</p>
<ul>
<li>Information management;</li>
<li>Technology infrastructure; and</li>
<li>Technology-enabled business processes and services</li>
</ul>
</td>
</tr>
<tr>
<td>
<p>Information Security</p>
</td>
<td>
<p>Measures relating to the confidentiality, availability and integrity of information that is processed, stored and communicated by electronic or any other means.</p>
</td>
</tr>
<tr>
<td>
<p>Information Security Incident</p>
</td>
<td>
<p>An occurrence or activity that may threaten the confidentiality, integrity or availability of a system or the information stored, processed or communicated by it or by any other process or system and processes.</p>
</td>
</tr>
<tr>
<td>
<p>Information Security Policy</p>
</td>
<td>
<p>A high-level document that describes how an agency protects its information. The CSP is normally developed to cover all systems and can exist as a single document or as a set of related documents.</p>
</td>
</tr>
<tr>
<td>
<p>Information Technology Security Manager</p>
</td>
<td>
<p>ITSMs are executives within an agency that act as a conduit between the strategic directions provided by the CISO and the technical efforts of systems administrators.&nbsp; The main responsibility of ITSMs is the administrative controls relating to information security within the agency.</p>
</td>
</tr>
<tr>
<td>
<p>Infrared Device</p>
</td>
<td>
<p>A device such as a mouse, keyboard, pointing device, laptop and smart phone that have an infrared communications capability.</p>
</td>
</tr>
<tr>
<td><strong>Infrastructure-as-a-Service</strong></td>
<td>
<p>Infrastructure-as-a-Service is where the cloud service provider offers access to a variety of capabilities and technologies on demand. Service is provided either over the public Internet or through dedicated connections.</p>
</td>
</tr>
<tr>
<td>
<p>Internet Key Exchange Extended Authentication</p>
</td>
<td>
<p>Used to provide an additional level of authentication by allowing IPSec gateways to request additional authentication information from remote users. As a result, users are forced to respond with credentials before being allowed access to the connection.</p>
</td>
</tr>
<tr>
<td>
<p>Intrusion Detection System</p>
</td>
<td>
<p>An automated system used to identify an infringement of security policy from an internal or external source.</p>
</td>
</tr>
<tr>
<td>
<p>Intrusion Prevention System</p>
</td>
<td>
<p>A security device, resident on a specific host, which monitors system activities for malicious or unwanted behaviour and can react in real-time to block or prevent those activities.</p>
</td>
</tr>
<tr>
<td><strong>Inverse split tunnelling</strong></td>
<td>
<p>A particular configuration of split tunnelling where only specifically authorised and trusted systems are able to be simultaneously communicated with via the external network connection.</p>
</td>
</tr>
<tr>
<td>
<p>IP Security</p>
</td>
<td>
<p>A suite of protocols for secure IP communications through authentication or encryption of IP packets including protocols for cryptographic key establishment.</p>
</td>
</tr>
<tr>
<td>
<p>IP Telephony</p>
</td>
<td>
<p>The management and transport of voice communications over IP networks. Also described as Voice Over IP (VOIP).</p>
</td>
</tr>
<tr>
<td>
<p>IP Version 6</p>
</td>
<td>
<p>A protocol used for communicating over a packet switched network.&nbsp; Version 6 is the successor to version 4 which is widely used on the Internet.&nbsp; The main change introduced in version 6 is a greater address space available for identifying network devices, workstations and servers.</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP Aggressive Mode</p>
</td>
<td>
<p>An IPSec protocol that uses a reduced Exchange to establish an IPSec connection. Connection negotiation is quicker but potentially less secure.</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP Main Mode</p>
</td>
<td>
<p>An IPSec protocol that offers improved security using additional negotiation to establish an IPSec connection.</p>
</td>
</tr>
<tr>
<td>
<p>ISAKMP Quick Mode</p>
</td>
<td>
<p>An IPSec protocol that is used for refreshing security association information. Similar to aggressive mode</p>
</td>
</tr>
<tr>
<td>
<p>Isolation</p>
</td>
<td>
<p>Includes disconnection from other systems and any external connections. In some cases system isolation may not be possible for architectural or operational reasons. Isolation may also include the quarantine of suspected or known malware and unwanted content.</p>
</td>
</tr>
<tr>
<td>
<p>IT Equipment</p>
</td>
<td>
<p>Any equipment to support the acquisition, processing and storage of information. This may include servers, routers, switches, switch panels, UPSs, PCs, laptops printers, MFDs etc.</p>
</td>
</tr>
<tr>
<td>
<p>Key Management</p>
</td>
<td>
<p>The management of cryptographic keys and associated hardware and software. It includes their generation, registration, distribution, installation, usage, protection, storage, access, recovery and destruction.</p>
</td>
</tr>
<tr>
<td>
<p>Key Management Plan</p>
</td>
<td>
<p>Describes how cryptographic services are securely deployed within an agency. It documents critical key management controls to protect keys and associated material during their life cycle, along with other controls to provide confidentiality, integrity and availability of keys.</p>
</td>
</tr>
<tr>
<td>
<p>Key Stretching</p>
</td>
<td>
<p>A defence against brute force and similar system attacks by increasing the time required to complete hashing and making an attack more time-consuming.</p>
</td>
</tr>
<tr>
<td>
<p>Limited Higher Access</p>
</td>
<td>
<p>The process of granting a system user access to a system that they do not hold appropriate security clearances for, for a limited period of time.</p>
</td>
</tr>
<tr>
<td>
<p>Lockable Commercial Cabinet</p>
</td>
<td>
<p>A cabinet that is commercially available, of robust construction and is fitted with a commercial lock.</p>
</td>
</tr>
<tr>
<td>
<p>Logging Facility</p>
</td>
<td>
<p>A facility that includes the software component which records system events and associated details, the transmission (if necessary) of these records (logs) and how they are stored and secured.</p>
</td>
</tr>
<tr>
<td>
<p>Malicious Code</p>
</td>
<td>
<p>Any software that attempts to subvert the confidentiality, integrity or availability of a system. Types of malicious code include logic bombs, trapdoors, Trojans, viruses and worms. More usually as Malware</p>
</td>
</tr>
<tr>
<td>
<p>Malicious Code Infection</p>
</td>
<td>
<p>An information security incident that occurs when malicious code is used to infect a system. Examples of malicious code infection viruses, worms and Trojans.</p>
</td>
</tr>
<tr>
<td>
<p>Malware</p>
</td>
<td>
<p><span style="text-decoration: underline;">Mal</span>icious Soft<span style="text-decoration: underline;">ware</span> or Malicious Code.</p>
</td>
</tr>
<tr>
<td>
<p>Management Traffic</p>
</td>
<td>
<p>Communications generated by system administrators and processes over a network in order to manage and control a device.</p>
</td>
</tr>
<tr>
<td>
<p>Mandatory Controls</p>
</td>
<td>
<p>Controls within this manual with either a ‘MUST’ or a ‘MUST NOT’ compliance requirement.</p>
</td>
</tr>
<tr>
<td>
<p>Media</p>
</td>
<td>
<p>A generic term for any type of hardware or material that is capable of storing or retaining data.&nbsp; The following examples, while not a definitive list, includes any type of “floppy disk”, tapes, all types of optical disks, HDD, SSD, USB, RAM, Flash, ROM, EPROM, printer cartridges, printer drums and so on.&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Media Destruction</p>
</td>
<td>
<p>The process of physically damaging the media with the objective of making the data stored on it inaccessible.&nbsp; To destroy media effectively, only the actual material in which the data is stored needs to be destroyed.</p>
</td>
</tr>
<tr>
<td>
<p>Media Disposal</p>
</td>
<td>
<p>The process of relinquishing control of media, or disposing of when no longer required, in a secure manner that ensures that no data can be recovered from the media</p>
</td>
</tr>
<tr>
<td>
<p>Media Sanitisation</p>
</td>
<td>
<p>The process of securely erasing or overwriting data stored on media.</p>
</td>
</tr>
<tr>
<td>
<p>Multi-Factor Authentication</p>
</td>
<td>
<p>Multi-Factor Authentication (MFA) is a security system that verifies a user’s identity by requiring multiple credentials, which may be of the same factor or type.&nbsp; Initial authentication normally requires a username and password.&nbsp; MFA requires other—additional—credentials, for example as a code from the user’s smartphone, the answer to a security question, a fingerprint, or facial recognition.</p>
</td>
</tr>
<tr>
<td>
<p>Multifunction Devices</p>
</td>
<td>
<p>The class of devices that combines printing, scanning, copying, faxing or voice messaging functionality within the one piece of equipment. These are often designed to connect to computer and communications networks simultaneously.</p>
</td>
</tr>
<tr>
<td>
<p>Multilevel Gateway</p>
</td>
<td>
<p>A gateway that enables access, based on authorisation, to data at many classification and releasability levels where each data unit is individually marked according to its domain.</p>
</td>
</tr>
<tr>
<td>
<p>Need-To-Know</p>
</td>
<td>
<p>The principle of telling a person only the information that they require to fulfil their role.</p>
</td>
</tr>
<tr>
<td>
<p>Network Access Control</p>
</td>
<td>
<p>Policies and processes used to control access to a network and actions on a network, including authentication checks and authorisation controls.</p>
</td>
</tr>
<tr>
<td>
<p>Network Device</p>
</td>
<td>
<p>Any device designed to facilitate the communication of information destined for multiple system users.&nbsp; For example: cryptographic devices, firewalls, routers, switches and hubs.</p>
</td>
</tr>
<tr>
<td>
<p>Network Infrastructure</p>
</td>
<td>
<p>The infrastructure used to carry information between workstations and servers or other network devices.&nbsp; For example: cabling, junction boxes, patch panels, fibre distribution panels and structured wiring enclosures.</p>
</td>
</tr>
<tr>
<td>
<p>Network Protection Device</p>
</td>
<td>
<p>A category of network device used specifically to protect a network. For example, a firewall, session border controller etc.</p>
</td>
</tr>
<tr>
<td>
<p>NZ Eyes Only</p>
</td>
<td>
<p>A caveat indicating that the information is not to be passed to or accessed by foreign nationals.</p>
</td>
</tr>
<tr>
<td>
<p>NZ Government Information Security Manual</p>
</td>
<td>
<p>National security policy that aims to provide a common approach to ensure that the implementation of information security reduces both agency specific, and whole of government, information security risks to an acceptable level.</p>
</td>
</tr>
<tr>
<td>
<p>NZ Government Protective Security Manual&nbsp;</p>
</td>
<td>
<p>The PSM was superseded by the Protective Security Requirements (PSR) in December 2014.</p>
</td>
</tr>
<tr>
<td>
<p>No-Lone-Zone</p>
</td>
<td>
<p>An area in which personnel are not permitted to be left alone such that all actions are witnessed by at least one other person.</p>
</td>
</tr>
<tr>
<td>
<p>Non-Agency Control</p>
</td>
<td>
<p>This description applies where an Agency does NOT have <span style="text-decoration: underline;">direct control</span> of elements of agency information systems and data.&nbsp; This may occur, for example, where data centre operations are outsourced.</p>
</td>
</tr>
<tr>
<td>
<p>Non-Volatile Media</p>
</td>
<td>
<p>A type of media which retains its information when power is removed.</p>
</td>
</tr>
<tr>
<td>
<p>Off-Hook Audio Protection</p>
</td>
<td>
<p>A method of mitigating the possibility of an active, but temporarily unattended handset inadvertently allowing discussions being undertaken in the vicinity of the handset to be heard by the remote party. This could be achieved through the use of a hold feature, mute feature, push-to-talk handset or equivalent. May not be effective on smart phones / cell phones.</p>
</td>
</tr>
<tr>
<td>
<p>Official Information</p>
</td>
<td>
<p>Any information held by a government department or agency. See the Official Information Act 1982 (as amended).</p>
</td>
</tr>
<tr>
<td>
<p>OpenPGP</p>
</td>
<td>
<p>An open-source implementation of Pretty Good Privacy (PGP), a widely available cryptographic toolkit.</p>
</td>
</tr>
<tr>
<td>
<p>Oversight</p>
</td>
<td>
<p>The term is used in this document in the following ways:</p>
<ol>
<li>In the context of governance where the term is used to describe the responsibility and requirement to manage, govern, inspect or direct activities to ensure particular outcomes, e.g. the oversight of supply contracts.</li>
<li>In the physical security context to describe the ability to observe activity (surveillance) and/or read materials which should be protected and shared only under strict guidelines.&nbsp; It enables the systematic observation of places and people by visual, audio, electronic, photographic or other means.&nbsp; Typically this is caused by poor placing of computer screens and desks and proximity to windows, doors, corridors or other means of physical access and overview or oversight.&nbsp; Other physical factors may contribute.</li>
</ol>
</td>
</tr>
<tr>
<td>
<p>Patch Cable</p>
</td>
<td>
<p>A metallic (usually copper) or fibre optic cable used for routing signals between two components in an enclosed container or rack or between adjacent containers or racks.</p>
</td>
</tr>
<tr>
<td>
<p>Patch Panel</p>
</td>
<td>
<p>A group of sockets or connectors that allow manual configuration changes, generally by means of connecting cables to the appropriate connector.&nbsp; Cables could be metallic (copper) or fibre optic.</p>
</td>
</tr>
<tr>
<td>
<p>Perfect Forward Security</p>
</td>
<td>
<p>Additional security for security associations in that if one security association is compromised subsequent security associations will not be compromised.</p>
</td>
</tr>
<tr>
<td>
<p>Peripheral Switch</p>
</td>
<td>
<p>A device used to share a set of peripherals between a number of computers.</p>
</td>
</tr>
<tr>
<td>
<p>Platform-as-a-Service</p>
</td>
<td>
<p>Platform-as-a-Service provides application developers access to all necessary hardware, software, and infrastructure to allow applications to be built, run, and managed. The PaaS infrastructure is typically managed by the cloud service provider</p>
</td>
</tr>
<tr>
<td>
<p>Post-quantum cryptography</p>
</td>
<td>
<p>Post-quantum cryptography (sometimes described as quantum-resistant) refers to cryptographic algorithms that are considered to be secure against a cryptanalytic attack by a quantum computer.</p>
</td>
</tr>
<tr>
<td>
<p>Principles of Separation and Segregation</p>
</td>
<td>
<p>Systems architecture and design incorporating separation and segregation in order to establish trust zones, define security domains and enforce boundaries.</p>
</td>
</tr>
<tr>
<td>
<p>Privacy Marking</p>
</td>
<td>
<p>Privacy markings are used to indicate that official information has a special handling requirement or a distribution that is restricted to a particular audience.</p>
</td>
</tr>
<tr>
<td>
<p>Private Network</p>
<p>&nbsp;</p>
</td>
<td>
<p>A private network is a network and infrastructure owned, managed and controlled by a single entity for its exclusive use.</p>
<p>This term includes networks used by private organisations, nongovernment organisations, state owned enterprises, or government department, agencies and ministries.</p>
<p>If any part of the transmission path utilises <strong>any</strong> element of a public network, such as telecommunications or data services from a service provider that utilise any component of local, regional or national infrastructure, then the network is defined as a public network</p>
</td>
</tr>
<tr>
<td>
<p>Privileged Access Management (PAM)</p>
</td>
<td>
<p>Privileged Access Management (PAM) – sometimes also described as Privileged Account Management, refers to a set of processes and tools for granting, controlling, monitoring, and auditing privileged access.&nbsp;&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Privileged Account</p>
</td>
<td>
<p>A Privileged Account is a user account with high levels of access to systems, devices and data.&nbsp; Privileged accounts may, for example, be able to install or remove software, upgrade operating systems, or modify system or application configurations.&nbsp; They may also have access to data that is not normally accessible to standard users.</p>
</td>
</tr>
<tr>
<td>
<p>Privileged User</p>
</td>
<td>
<p>A system user who can alter or circumvent system security protections.&nbsp; This can also apply to system users who could have only limited privileges, such as software developers, who can still bypass security precautions.&nbsp; A privileged user can have the capability to modify system configurations, account privileges, audit logs, data files or applications.</p>
</td>
</tr>
<tr>
<td>
<p>Protective Marking</p>
</td>
<td>
<p>A marking that is applied to unclassified or classified information to indicate the security measures and handling requirements that are to be applied to the information to ensure that it is appropriately protected.</p>
</td>
</tr>
<tr>
<td>
<p>Protective Security Requirements&nbsp;</p>
</td>
<td>
<p>The Protective Security Requirements (PSR) outlines the Government’s expectations for managing personnel, physical and information security.</p>
</td>
</tr>
<tr>
<td>
<p>Protective Security Requirements Framework&nbsp;</p>
</td>
<td>
<p>The Protective Security Requirements Framework (PSRF) is a four-tier hierarchical approach to protective security. Strategic Security Directive (tier one); Core policies, strategic security objectives and the mandatory requirements (tier two); Protocols, standards and good practice requirements (tier three); Agency-specific policies and procedures (tier four).</p>
</td>
</tr>
<tr>
<td>
<p>Public Domain Information</p>
</td>
<td>
<p>Official information authorised for unlimited public access or circulation, such as agency publications and websites.</p>
</td>
</tr>
<tr>
<td>
<p>Public Key Infrastructure</p>
</td>
<td>
<p>The framework and services that provide for the generation, production, distribution, control, accounting and destruction of public key certificates.&nbsp; Components include the personnel, policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, recover and revoke public key certificates. SOURCE:&nbsp; CNSSI-4009</p>
</td>
</tr>
<tr>
<td>
<p>Public Network</p>
<p>&nbsp;</p>
</td>
<td>
<p>A public network contains components that are outside the control of the user organisation.&nbsp; These components may include telecommunications or data services from a service provider that utilise any component of local, regional or national infrastructure.</p>
</td>
</tr>
<tr>
<td>
<p>Public Switched Telephone Network</p>
</td>
<td>
<p>An historic term describing a public network where voice is communicated using analogue communications. Today almost all communication networks are substantially or entirely digital networks.</p>
</td>
</tr>
<tr>
<td>
<p>Push-To-Talk</p>
</td>
<td>
<p>Handsets that have a button which must be pressed by the user before audio can be communicated, thus improving off-hook audio protection.</p>
</td>
</tr>
<tr>
<td>
<p>Quality Of Service</p>
</td>
<td>
<p>A process to prioritise network traffic based on availability requirements.</p>
</td>
</tr>
<tr>
<td>
<p>Radio Frequency Device</p>
</td>
<td>
<p>Devices including mobile phones, wireless enabled personal devices and laptops.</p>
</td>
</tr>
<tr>
<td>
<p>Reaccreditation</p>
</td>
<td>
<p>A procedure by which an authoritative body gives formal recognition, approval and acceptance of the associated residual security risk with the continued operation of a system.</p>
</td>
</tr>
<tr>
<td>
<p>Reclassification</p>
</td>
<td>
<p>A change to the security measures afforded to information based on a reassessment of the potential impact of its unauthorised disclosure.&nbsp; The lowering of the security measures for media containing classified information often requires sanitisation or destruction processes to be undertaken prior to a formal decision to lower the security measures protecting the information.</p>
</td>
</tr>
<tr>
<td>
<p>Remote Access</p>
</td>
<td>
<p>Access to a system from a location not within the physical control of the system owner.</p>
</td>
</tr>
<tr>
<td>
<p>Removable Media</p>
</td>
<td>
<p>Storage media that can be easily removed from a system and is designed for removal.</p>
</td>
</tr>
<tr>
<td>
<p>Residual Risk</p>
</td>
<td>
<p>The risk remaining after management takes action to reduce the impact and likelihood of an adverse event, including control activities in responding to a risk (Institute of Internal Auditors).&nbsp; Also sometimes referred to as “net risk” or “controlled risk”.</p>
</td>
</tr>
<tr>
<td>
<p>Rogue Wireless Access Point</p>
</td>
<td>
<p>An unauthorised Wireless Access Point operating outside of the control of an agency.</p>
</td>
</tr>
<tr>
<td><strong>Role-Based Access Control</strong></td>
<td>
<p>The Role-Based Access Control model employs pre-defined roles that carry a specific set of privileges associated with them and to which subjects are assigned.</p>
</td>
</tr>
<tr>
<td>
<p>Salt</p>
</td>
<td>
<p>Salts are a random data string added to the start or the end of a hash to strengthen its resistance to attack.&nbsp; Typically used in the generation of a password hash or checksums.</p>
</td>
</tr>
<tr>
<td>
<p>Seconded Foreign National</p>
</td>
<td>
<p>A representative of a foreign government on exchange or long-term posting to an agency.</p>
</td>
</tr>
<tr>
<td>
<p>Secure Area</p>
</td>
<td>
<p>An area that has been certified to physical security requirements as either a Secure Area; a Partially Secure Area; or an Intruder Resistant Area to allow for the processing of classified information. Refer to the PSR for more detail on Physical Security.</p>
</td>
</tr>
<tr>
<td>
<p>Secure Multipurpose Internet Mail Extension</p>
</td>
<td>
<p>A protocol which allows the encryption and signing of Multipurpose Internet Mail Extension-encoded email messages.</p>
</td>
</tr>
<tr>
<td>
<p>Secure Shell</p>
</td>
<td>
<p>A network protocol that can be used to securely log into a remote server or workstation, executing commands on a remote system and securely transfer file(s).</p>
</td>
</tr>
<tr>
<td>
<p>Security Association</p>
</td>
<td>
<p>A collection of connection-specific parameters containing information about a one-way connection within IPSec that is required for each protocol used.</p>
</td>
</tr>
<tr>
<td>
<p>Security Association Lifetimes</p>
</td>
<td>
<p>The duration for which security association information is valid.</p>
</td>
</tr>
<tr>
<td>
<p>Security Domains</p>
</td>
<td>
<p>A system or collection of systems operating under a security policy that defines the classification and releasability of the information processed within the domain. It can be defined by a classification, a community of interest or releasability within a certain classification. This term is NOT synonymous with <em>Trust Zone</em>.</p>
</td>
</tr>
<tr>
<td><strong>Security Domain (Cloud)</strong></td>
<td>
<p>A security domain in public cloud can be categorised as a group of trust zones operating under a common set of security requirements and policies.</p>
</td>
</tr>
<tr>
<td>
<p>Security Domain Owner</p>
</td>
<td>
<p>The individual responsible for the secure configuration of the security domain throughout its life-cycle, including all connections to/from the domain.</p>
</td>
</tr>
<tr>
<td>
<p>Security Risk Management Plan</p>
</td>
<td>
<p>A plan that identifies the risks and appropriate risk treatments including controls needed to meet agency policy.</p>
</td>
</tr>
<tr>
<td>
<p>Security Target</p>
</td>
<td>
<p>An artefact of Common Criteria evaluations.&nbsp; It contains the information security requirements of an identified target of evaluation and specifies the functional and assurance security measures offered by that target of evaluation to meet the stated requirements.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Segmentation</strong></p>
</td>
<td>
<p>Segmentation is a logical grouping of the separate components of a network or system for design, control, installation, security and management purposes.&nbsp; This may occur where similarities of function, control and management exist or will be of advantage.</p>
</td>
</tr>
<tr>
<td>
<p>Segregation</p>
</td>
<td>
<p>Segregation includes the development, enforcement and monitoring of rules in order to control access to systems and information and to manage or restrict the communication between network components, devices, hosts and service.&nbsp; Segregation is essential in all networks but particularly in entirely virtual networks, such as cloud-hosted networks.</p>
</td>
</tr>
<tr>
<td>
<p>Separation</p>
</td>
<td>
<p>Separation includes partitioning and physically dividing systems and networks into smaller components.&nbsp; Separation should be applied as a design and control principle to networks where agencies have physical control over devices and components, such as in-office Wi-Fi systems, MFD’s, desktops, laptops and other system or user devices.</p>
</td>
</tr>
<tr>
<td>
<p>Separation, segmentation and segregation</p>
</td>
<td>
<p>Separation, segmentation and segregation are architectural, design and management strategies to limit the effect and impact of network intrusions and system attacks and exploits.&nbsp; They will improve the ability to detect, and also improve the speed and effectiveness of any response to such events.</p>
</td>
</tr>
<tr>
<td>
<p>Server</p>
</td>
<td>
<p>A computer used to run programs that provide services to multiple users. For example, a file server, email server or database server.</p>
</td>
</tr>
<tr>
<td>
<p>Session Border Controller (SBC)</p>
</td>
<td>
<p>A device (physical or virtual) used in IP networks to control and manage the signalling and media streams of real-time UC and VoIP connections.&nbsp; It includes establishing, controlling, and terminating calls, interactive media communications or other VoIP connections.&nbsp; SBCs enable VoIP traffic to navigate gateways and firewalls and ensure interoperability between different SIP implementations.&nbsp; Careful selection of SBCs will provide such functionality as prevention of toll fraud, resistance to denial of service attacks and resistance to eavesdropping.&nbsp;</p>
</td>
</tr>
<tr>
<td><strong>Shared Responsibility Model</strong></td>
<td>
<p>The responsibility for the selection, implementation, management and maintenance of controls in public cloud services is shared between provider and consumer. Where the responsibilities lie depends on the provider, and the service and deployment models.</p>
</td>
</tr>
<tr>
<td>
<p>Softphone</p>
</td>
<td>
<p>A software application that allows a workstation to act as a VoIP phone, using either a built-in or an externally connected microphone and speaker.</p>
</td>
</tr>
<tr>
<td>
<p>Software Component</p>
</td>
<td>
<p>An element of a system, including but not limited to, a database, operating system, network or Web application.</p>
</td>
</tr>
<tr>
<td>
<p>Solid State Drives</p>
</td>
<td>
<p>Non-volatile media that uses flash memory media to retain its information when power is removed.</p>
</td>
</tr>
<tr>
<td><strong>Split Tunnelling</strong></td>
<td>
<p>The process of allowing a remote user or device to establish a non-remote connection with a system and simultaneously communicate via some other connection to a resource in an external network. This method of network access enables a user to access remote devices, and simultaneously, access uncontrolled networks.</p>
</td>
</tr>
<tr>
<td>
<p>SSH-Agent</p>
</td>
<td>
<p>A programme storing private keys used for public key authentication thus enabling an automated or script-based Secure Shell session.</p>
</td>
</tr>
<tr>
<td>
<p>Standard Operating Environment</p>
</td>
<td>
<p>A standardised build of an operating system and associated software that is deployed on multiple devices. An SOE can be applied to servers, workstations, laptops and mobile devices.</p>
</td>
</tr>
<tr>
<td>
<p>Standard Operating Procedures</p>
</td>
<td>
<p>Procedures for the operation of system and complying with security requirements.</p>
</td>
</tr>
<tr>
<td>
<p>System</p>
</td>
<td>
<p>A related set of IT equipment and software used for the processing, storage or communication of information and the governance framework in which it operates.</p>
</td>
</tr>
<tr>
<td><strong>System Classification</strong></td>
<td>
<p><span>The highest classification of information for which the system is approved to store or process.</span></p>
</td>
</tr>
<tr>
<td><strong>System for Cross-domain Identity Management</strong></td>
<td>
<p>The SCIM protocol is an application-level protocol for provisioning and managing identity data specified through SCIM schemas. A SCIM server provides a set of resources, the allowable contents of which are defined by a set of schema URIs and a resource type. SCIM's schema is not a document-centric one.&nbsp; Instead, SCIM's support of schema is attribute based, where each attribute may have different type, mutability, cardinality, or returnability.</p>
</td>
</tr>
<tr>
<td>
<p>System Owner</p>
</td>
<td>
<p>The person responsible for the information resource.</p>
</td>
</tr>
<tr>
<td>
<p>System Security Plan</p>
</td>
<td>
<p>A formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.</p>
</td>
</tr>
<tr>
<td>
<p>System User</p>
</td>
<td>
<p>A general user or a privileged user of a system.</p>
</td>
</tr>
<tr>
<td>
<p>Target Of Evaluation</p>
</td>
<td>
<p>The functions of a product subject to evaluation under the Common Criteria.</p>
</td>
</tr>
<tr>
<td>
<p>Technical Surveillance Counter-Measures</p>
</td>
<td>
<p>The process of surveying facilitates to detect the presence of technical surveillance devices and to identify technical security weaknesses that could aid in the conduct of a technical penetration of the surveyed facility.</p>
</td>
</tr>
<tr>
<td>
<p>Telephone</p>
</td>
<td>
<p>A device that converts between sound waves and electronic signals that can be communicated over a distance.</p>
</td>
</tr>
<tr>
<td>
<p>Telephone System</p>
</td>
<td>
<p>A system designed primarily for the transmission of voice traffic.</p>
</td>
</tr>
<tr>
<td>
<p>TEMPEST</p>
</td>
<td>
<p>A short name referring to investigations and studies of compromising emanations.</p>
</td>
</tr>
<tr>
<td>
<p>TEMPEST Rated IT Equipment</p>
</td>
<td>
<p>IT equipment that has been specifically designed to minimise TEMPEST emanations.</p>
</td>
</tr>
<tr>
<td>
<p>The Principle of Least Privilege</p>
</td>
<td>
<p>The minimisation of access rights and permissions for users, accounts, applications, systems, devices and computing processes to the absolute minimum necessary in order to perform routine, authorised activities and maintain the safe and secure operation of agency or organisational systems.</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET Area</p>
</td>
<td>
<p>Any area certified to operate at TOP SECRET, containing TOP SECRET servers, workstations or associated network infrastructure.</p>
</td>
</tr>
<tr>
<td>
<p>Traffic Flow Filter</p>
</td>
<td>
<p>A device that has been configured to automatically filter and control the form of network data.</p>
</td>
</tr>
<tr>
<td>
<p>Transfer Gateway</p>
</td>
<td>
<p>Facilitates the secure transfer of information, in one or multiple directions (i.e. low to high or high to low), between different security domains.</p>
</td>
</tr>
<tr>
<td>
<p>Transport Mode</p>
</td>
<td>
<p>An IPSec mode that provides a secure connection between two endpoints by encapsulating an IP payload.</p>
</td>
</tr>
<tr>
<td>
<p>Trust Boundary</p>
</td>
<td>
<p>The interface between two or more Trust Zones.</p>
</td>
</tr>
<tr>
<td>
<p>Trust Zone</p>
</td>
<td>
<p>A logical construct encompassing an area with a high degree of trust between the data, users, providers and the systems. It may include a number of capabilities such as secure boot, codesigning, trusted execution and Digital Rights Management (DRM). This term is NOT synonymous with <em>Security Domain</em>.</p>
</td>
</tr>
<tr>
<td>
<p>Trust Zone (Cloud)</p>
</td>
<td>
<p>In the public cloud environment, trust zones represent combinations of public cloud services (made up of user, system and data object combinations) that are authorised to interact with each other and are protected by a common set of security capabilities.</p>
</td>
</tr>
<tr>
<td>
<p>Trusted Source</p>
</td>
<td>
<p>A person or system formally identified as being capable of reliably producing information meeting defined parameters, such as a maximum data classification and reliably reviewing information produced by others to confirm compliance with defined parameters.</p>
</td>
</tr>
<tr>
<td>
<p>Tunnel Mode</p>
</td>
<td>
<p>An IPSec mode that provides a secure connection between two endpoints by encapsulating an entire IP packet. The entire packet is encrypted and authenticated.</p>
</td>
</tr>
<tr>
<td>
<p>UNCLASSIFIED Information</p>
</td>
<td>
<p>Information that is assessed as not requiring a classification.</p>
</td>
</tr>
<tr>
<td>
<p>UNCLASSIFIED Systems</p>
</td>
<td>
<p>Systems that process, store or communicate information produced by the New Zealand Government that does not require a classification.</p>
</td>
</tr>
<tr>
<td>
<p>Unified Communications&nbsp;</p>
</td>
<td>The integration of real-time and near real time communication and interaction services in an organisation or agency. Unified Communications (UC) may integrate several communication systems including unified messaging, collaboration, and interaction systems; real-time and near real-time communications; and transactional applications.</td>
</tr>
<tr>
<td>
<p>Unsecure Area</p>
</td>
<td>
<p>An area that has not been certified to meet physical security requirements to allow for the processing of classified information.</p>
</td>
</tr>
<tr>
<td>
<p>Virtual Private Network</p>
</td>
<td>
<p>The tunnelling of a network’s traffic through another network, separating the VPN traffic from the underlying network.&nbsp; A VPN can encrypt traffic if necessary.</p>
</td>
</tr>
<tr>
<td>
<p>Virtual Private Network Split Tunnelling</p>
</td>
<td>
<p>Functionality that allows personnel to access both a public network and a VPN connection at the same time, such as an agency system and the Internet.</p>
</td>
</tr>
<tr>
<td>
<p><strong>Virtualisation</strong></p>
</td>
<td>The software simulation of the components of an information system and may include the simulation of hardware, operating systems, applications, infrastructure and storage.</td>
</tr>
<tr>
<td>
<p>Volatile Media</p>
</td>
<td>
<p>A type of media, such as RAM, which gradually loses its information when power is removed.</p>
</td>
</tr>
<tr>
<td>
<p>Waiver</p>
</td>
<td>
<p>The formal acknowledgement that a particular compliance requirement of the NZISM cannot currently be met and that a waiver is granted by the Accreditation Authority on the basis that full compliance with the NZISM is achieved or compensating controls are implemented within a time specified by the Accreditation Authority.&nbsp; Waivers are valid in the short term only and full accreditation cannot be granted until all conditions of the waiver have been met.</p>
</td>
</tr>
<tr>
<td>
<p>Waivers and Exceptions</p>
</td>
<td>
<p>A waiver means that some alternative controls or conditions are implemented. An exception means that the requirement need not be followed. An exception is NOT the same as a waiver.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Wear Levelling</p>
</td>
<td>
<p>A technique used in flash memory that is used to prolong the life of the media.&nbsp; Data can be written to and erased from an address on flash memory a finite number of times.&nbsp; The wear levelling algorithm helps to distribute writes evenly across each memory block, thereby decreasing the wear on the media and increasing its lifetime.&nbsp; The algorithm ensures that updated or new data is written to the first available free block with the least number of writes.&nbsp; This creates free blocks that previously contained data.</p>
</td>
</tr>
<tr>
<td>
<p>WEEE</p>
</td>
<td>
<p class="Head2-S13">Electrical and electronic equipment contains a complex mix of materials, components and substances, many which can be poisonous, carcinogenic or toxic in particulate or dust form. This is known as Waste from Electrical and electronic equipment (WEEE).</p>
<p>Destruction and disposal of WEEE needs to be managed carefully to avoid the potential of serious health risk or environmental hazard.&nbsp;</p>
</td>
</tr>
<tr>
<td>
<p>Wi-Fi Protected Access</p>
</td>
<td>
<p>Protocols designed to replace WEP. They refer to components of the 802.11i security standard.</p>
</td>
</tr>
<tr>
<td>
<p>Wired Equivalent Privacy</p>
</td>
<td>
<p>Wired Equivalent Privacy (WEP), a deprecated 802.11 security standard.</p>
</td>
</tr>
<tr>
<td>
<p>Wireless Access Point</p>
</td>
<td>
<p>Typically also the device which connects the wireless local area network to the wired local area network. Also known as AP</p>
</td>
</tr>
<tr>
<td>
<p>Wireless Communications</p>
</td>
<td>
<p>The transmission of data over a communications path using electromagnetic waves rather than a wired medium.</p>
</td>
</tr>
<tr>
<td>
<p>Wireless Local Area Network</p>
</td>
<td>
<p>A network based upon the 802.11 set of standards.&nbsp; Such networks are often referred to as wireless networks.</p>
</td>
</tr>
<tr>
<td>
<p>Workstation</p>
</td>
<td>
<p>A stand-alone or networked single-user computer.</p>
</td>
</tr>
<tr>
<td>
<p>X11 Forwarding</p>
</td>
<td>
<p>X11, also known as the X Window System, is a basic method of video display used in a variety of operating systems.&nbsp; X11 forwarding allows the video display from one network node to be shown on another node.</p>
</td>
</tr>
<tr>
<td>
<p>Zero Trust</p>
</td>
<td>
<p>Zero Trust is a security concept based around the idea that systems and users should not be given access to any information without verification, even when they are connected to internal networks.&nbsp;&nbsp;</p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
</section>
