Y <- 4. Definitions


Z

   $ zero-knowledge proof
      (I) /cryptography/ A proof-of-possession protocol whereby a system
      entity can prove possession of some information to another entity,
      without revealing any of that information. (See: proof-of-
      possession protocol.)
   $ zeroize
      1. (I) Synonym for "erase". (See: sanitize.) Usage: Particularly
      with regard to erasing keys that are stored in a cryptographic
      module.
      2. (O) Erase electronically stored data by altering the contents
      of the data storage so as to prevent the recovery of the data.
      [FP140]
      3. (O) "To remove or eliminate the key from a cryptoequipment or
      fill device." [C4009]
      Usage: The phrase "zeroize the device" normally is used to mean
      erasing all keys stored in the device, but sometimes means erasing
      all keying material in the device, or all cryptographic
      information in the device, or even all sensitive information in
      the device.
   $ zombie
      (I) /slang/ An Internet host computer that has been
      surreptitiously penetrated by an intruder that installed malicious
      daemon software to cause the host to operate as an accomplice in
      attacking other hosts, particularly in distributed attacks that
      attempt denial of service through flooding.
      Deprecated Usage: Other cultures likely use different metaphorical
      terms (such as "robot") for this concept, and some use this term
      for different concepts. Therefore, to avoid international
      misunderstanding, IDOCs SHOULD NOT use this term. Instead, use
      "compromised, coopted computer" or other explicitly descriptive
      terminology. (See: Deprecated Usage under "Green Book".)
   $ zone of control
      (O) /EMSEC/ Synonym for "inspectable space". [C4009] (See:
      TEMPEST.)


Shirey                       Informational                    [Page 342]

Y <- 4. Definitions