Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

profile

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Analytic model of communications associated with an organization or activity. The model is prepared from a systematic examination of communications content and patterns, the functions they reflect, and the communications security measures applied.
Source(s):
CNSSI 4009-2015

  A document that provides an implementation-independent specification of CKMS security requirements for use by a community of interest (e.g., U.S. Government, banking, health, or aerospace).
Source(s):
NIST SP 800-152 under Profile (for a CKMS)

  The specifications for Federal CKMSs in SP 800-152, including the requirements for their design, implementation, procurement, installation, configuration, management, operation, and use by Federal organizations and their contractors
Source(s):
NIST SP 800-152 under Profile (for an FCKMS)

  the desired outcome or ‘to be’ state of cybersecurity implementation
Source(s):
NISTIR 8183 under Profile - Target Profile

  the ‘as is’ state of system cybersecurity
Source(s):
NISTIR 8183 under Profile - Current Profile

  A representation of the outcomes that a particular system or organization has selected from the Framework Categories and Subcategories.
Source(s):
NISTIR 8183 under Profile (Framework for Improving Critical Infrastructure Cybersecurity, version 1.0)
NISTIR 8183A Vol. 1 under Profile (CSF)
NISTIR 8183A Vol. 2 under Profile (CSF)
NISTIR 8183A Vol. 3 under Profile (CSF)

  Profiles define conforming subsets or combinations of base standards used to provide specific functions. Profiles identify the use of particular options available in the base standards, and provide a basis for the development of uniform, internationally recognized, conformance tests.
Source(s):
NISTIR 8074 Vol. 2 under Profiles (ISO/IEC TR 10000-1:1998)

  A named tailoring of a benchmark.
Source(s):
NISTIR 7275 Rev. 4 under Profile

  A representation of the outcomes that a particular system or organization has selected from the Framework Categories and Subcategories. [CSF] - Target Profile - the desired outcome or "to be" state of cybersecurity implementaton, - Current profile - the "as is" state of system security.
Source(s):
NISTIR 8183 under Profile