background image
Ingrian Networks
DataSecure Appliance i430, i426, and i116 Security Policy Version 1.0 April 30, 2008
Page 25
10. Mitigation of Other Attacks Policy
The FIPS 140-2 Area 11 Mitigation of Other Attacks requirements are not applicable because the
DataSecure Appliance is not designed to mitigate any specific attacks outside the scope of FIPS
140-2.
11. References
National Institute of Standards and Technology (NIST), FIPS Pub 140-2, Security Requirements
for Cryptographic Modules, May 25, 2001.
12. Definitions and Acronyms
AES ­ Advanced Encryption Standard
ANSI ­ American National Standards Institute
BIOS ­ Basic Input/Output System
CA ­ Certificate Authority
CBC ­ Cipher-Block Chaining
CLI ­ Command Line Interface
CO ­ Cryptographic Officer
CPU ­ Central Processing Unit
CRC ­ Cyclic Redundancy Check
CRL ­ Certificate Revocation List
CSP ­ Critical Security Parameter
CSR ­ Certificate Signing Request
DB ­ Database
DES ­ Data Encryption Standard
DRNG ­ Deterministic Random Number Generator
DSA ­ Digital Signature Algorithm
EDE ­ Encrypt-Decrypt-Encrypt
HMAC ­ Keyed-Hash Message Authentication Code
MD5 ­ Message Digest Algorithm 5
NAE ­ Network Attached Encryption
NDRNG ­ Non-Deterministic Random Number Generator
RAID ­ Redundant Array of Independent Drives
RAM ­ Random Access Memory