Ingrian Networks
DataSecure Appliance i430, i426, and i116 Security Policy Version 1.0 April 30, 2008
Page 25
10. Mitigation of Other Attacks Policy
The FIPS 140-2 Area 11 Mitigation of Other Attacks requirements are not applicable because the
DataSecure Appliance is not designed to mitigate any specific attacks outside the scope of FIPS
140-2.
11. References
National Institute of Standards and Technology (NIST), FIPS Pub 140-2, Security Requirements
for Cryptographic Modules, May 25, 2001.
12. Definitions and Acronyms
AES Advanced Encryption Standard
ANSI American National Standards Institute
BIOS Basic Input/Output System
CA Certificate Authority
CBC Cipher-Block Chaining
CLI Command Line Interface
CO Cryptographic Officer
CPU Central Processing Unit
CRC Cyclic Redundancy Check
CRL Certificate Revocation List
CSP Critical Security Parameter
CSR Certificate Signing Request
DB Database
DES Data Encryption Standard
DRNG Deterministic Random Number Generator
DSA Digital Signature Algorithm
EDE Encrypt-Decrypt-Encrypt
HMAC Keyed-Hash Message Authentication Code
MD5 Message Digest Algorithm 5
NAE Network Attached Encryption
NDRNG Non-Deterministic Random Number Generator
RAID Redundant Array of Independent Drives
RAM Random Access Memory