Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center


A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols





  A hardware/software system implemented to satisfy a particular set of requirements. In this context, an application incorporates a system used to satisfy a subset of requirements related to the verification or identification of an end user’s identity so that the end user’s identifier can be used to facilitate the end user’s interaction with the system.
Source(s): FIPS 201-2

  A software program hosted by an information system.
Source(s): CNSSI 4009-2015 (NIST SP 800-37 Rev. 1)
NIST SP 800-137 (NISTIR 7298)
NIST SP 800-37 Rev. 1

  A computer program designed and operated to achieve a set of goals or provide a set of services.
Source(s): NIST SP 800-130

  The system, functional area, or problem to which information technology is applied. The application includes related manual procedures as well as automated procedures. Payroll, accounting, and management information systems are examples of applications.
Source(s): NIST SP 800-16



See Also: