Term
|
Definition
| acknowledging a risk but taking no action to address it. |
|
|
Term
|
Definition
| the ability that provides tracking of events. |
|
|
Term
| Advanced Persistent Threat (APT) |
|
Definition
| Multi-year intrusion campaign that targets highly sensitive economic, proprietary, or national security information. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the steps that ensure that the individual is who he or she claims to be. |
|
|
Term
|
Definition
| the act of providing permission or approval to technology resources. |
|
|
Term
|
Definition
| security actions that ensure that data is accessible to authorized users. |
|
|
Term
|
Definition
| an attacker who sells knowledge of vulnerability to other attackers or governments. |
|
|
Term
| Bring Your Own Device (BYOD) |
|
Definition
| the practice of allowing users to use their own personal devices to connect to an organizational network. |
|
|
Term
| California's Database Security Breach Notification Act |
|
Definition
| the first state electronic privacy law, which covers any state agency, person, or company that does business in California. |
|
|
Term
|
Definition
| security actions that ensure that only authorized parties can view the information. |
|
|
Term
|
Definition
| a systematic outline of the steps of a cyber-attack, introduced at Lockheed Martin. |
|
|
Term
|
Definition
| targeted attacks against financial networks, unauthorized access to information, and the theft of personal information. |
|
|
Term
|
Definition
| a network of attackers, identity thieves, spammers, and financial fraudsters. |
|
|
Term
|
Definition
| a premeditated, politically motivated attack against information, computer systems, computer programs, and data, which often results in violence. |
|
|
Term
|
Definition
| attacker whose motivation may be defined as ideological or attacking for the sake of principles or beliefs. |
|
|
Term
|
Definition
| understanding the attacker and then informing him of the consequences of the action. |
|
|
Term
|
Definition
| automated attack package that can be used without an advanced knowledge of computers. |
|
|
Term
| Gramm-Leach-Bliley Act (GLBA) |
|
Definition
| a U.S. law that requires banks and financial institutions to alert customers of their policies and practices in disclosing customer information. |
|
|
Term
|
Definition
| an attacker who attacks for ideological reasons that are generally not as well-defined as cyberterrorist's motivation. |
|
|
Term
| Health Insurance Portability and Accountability Act (HIPPA) |
|
Definition
| a U.S. law designed to guard protected health information and implement policies and procedures to safeguard it. |
|
|
Term
|
Definition
| stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain. |
|
|
Term
|
Definition
| the tasks of protecting the integrity, confidentiality, and availability of information on devices that store, manipulate, and transmit the information through products, people, and procedures. |
|
|
Term
|
Definition
| employees, contractors, and business partners who can be responsible for an attack. |
|
|
Term
|
Definition
| security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data. |
|
|
Term
|
Definition
| addressing a risk by making it less serious. |
|
|
Term
| Payment Card Industry Data Security Standard (PCI DSS) |
|
Definition
| a set of security standards that all U.S. companies processing, storing, or transmitting credit card information must follow. |
|
|
Term
|
Definition
| a situation that involves exposure to danger. |
|
|
Term
|
Definition
| identifying the risk but making the decision to not engage in the activity. |
|
|
Term
| Sarbanes-Oxley Act (Sarbox) |
|
Definition
| A U.S. law designed to fight corporate corruption. |
|
|
Term
|
Definition
| an individual who lacks advanced knowledge of computers and networks and uses downloaded automated attack software to attack information systems. |
|
|
Term
|
Definition
| an attacker commissioned by governments to attack enemies' information systems. |
|
|
Term
|
Definition
| a type of action that has the potential to cause harm. |
|
|
Term
|
Definition
| a person or element that has the power to carry out a threat. |
|
|
Term
|
Definition
| the probability that a threat will actually occur. |
|
|
Term
|
Definition
| the means by which an attack could occur |
|
|
Term
|
Definition
| transferring the risk to a third party. |
|
|
Term
|
Definition
| a flaw or weakness that allows a threat agent to bypass security. |
|
|