Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

trustworthiness

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity. Note: From a security perspective, a trustworthy system is a system that meets specific security requirements in addition to meeting other critical requirements.
Source(s):
NIST SP 800-160 [Superseded] (Neumann04)

  The degree to which an information system (including the information technology components that are used to build the system) can be expected to preserve the confidentiality, integrity, and availability of the information being processed, stored, or transmitted by the system across the full range of threats. A trustworthy information system is a system that is believed to be capable of operating within defined levels of risk despite the environmental disruptions, human errors, structural failures, and purposeful attacks that are expected to occur in its environment of operation.
Source(s):
NIST SP 800-53 Rev. 4 under Trustworthiness (Information System)
NIST SP 800-53 Rev. 4 under Trustworthiness(Information System)

  Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity. Note: From a security perspective, a trustworthy system is a system that meets specific security requirements in addition to meeting other critical requirements.
Source(s):
NIST SP 800-160 [Superseded] (Neumann04)

  Security decision with respect to extended investigations to determine and confirm qualifications, and suitability to perform specific tasks and responsibilities.
Source(s):
FIPS 201 under Trustworthiness [Withdrawn]

  The attribute of a person or enterprise that provides confidence to others of the qualifications, capabilities, and reliability of that entity to perform specific tasks and fulfill assigned responsibilities.
Source(s):
CNSSI 4009-2015
NIST SP 800-39 under Trustworthiness (CNSSI 4009)
NIST SP 800-53 Rev. 4 under Trustworthiness (CNSSI 4009)

  The degree to which the security behavior of a component is demonstrably compliant with its stated functionality.
Source(s):
NIST SP 800-160 under trustworthy [Superseded]

  Computer hardware, software and procedures that— 1) are reasonably secure from intrusion and misuse; 2) provide a reasonable level of availability, reliability, and correct operation; 3) are reasonably suited to performing their intended functions; and 4) adhere to generally accepted security procedures.
Source(s):
NIST SP 800-12 Rev. 1 under Trustworthy System (NIST SP 800-32)

  Computer hardware, software and procedures that: (1) are reasonably secure from intrusion and misuse; (2) provide a reasonable level of availability, reliability, and correct operation; (3) are reasonably suited to performing their intended functions; and (4) adhere to generally accepted security procedures.
Source(s):
NIST SP 800-32 under Trustworthy System

  Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity.  Note: From a privacy perspective, a trustworthy system is a system that meets specific privacy requirements in addition to meeting other critical requirements.
Source(s):
NISTIR 8062 under Trustworthiness (Neumann04 - adapted, NIST SP 800-160)

  Worthy of being trusted to fulfill whatever critical requirements may be needed for a particular component, subsystem, system, network, application, mission, enterprise, or other entity. Note From a privacy perspective, a trustworthy system is a system that meets specific privacy requirements in addition to meeting other critical requirements.
Source(s):
NISTIR 8062 under Trustworthiness (Neumann04 - Derived, NIST SP 800-160)