Edit Page
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
A '''cryptographic boundary''' is |
A '''cryptographic boundary''' is |
||
β | {{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds |
+ | {{Quote|an explicitly defined contiguous perimeter that establishes the physical bounds of a [[cryptographic module]].<ref>[[NIST]], [[FIPS 140-1]], at 13.</ref>}} |
{{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[component]]s.<ref>[[Catalog of Control Systems Security: Recommendations for Standards Developers]] (Apr. 2011 version), at 162.</ref>}} |
{{Quote|a [[logical]] container where all the relevant [[security component]]s of a [[control system]] that employ [[cryptography]] reside. It includes the [[data processing|processing]] [[hardware]], [[data]], and [[memory]] as well as other critical [[component]]s.<ref>[[Catalog of Control Systems Security: Recommendations for Standards Developers]] (Apr. 2011 version), at 162.</ref>}} |