Term
|
Definition
|
|
Term
|
Definition
| Restrict the ability of unknown or unauthorized users to view or use information, hosts, or networks. |
|
|
Term
|
Definition
| Ensures that a system and its data are not illicitly modified or corrupted by malicious code. |
|
|
Term
|
Definition
| Help administrators to perform investigations during and after a cyber attack. |
|
|
Term
| Configuration management and assurance |
|
Definition
| Help administrators view and change the security settings on their hosts and networks, verify the correctness of security settings, and maintain operations in a secure fashion under conditions of duress. |
|
|
Term
| How many safeguards can the federal government deploy? In order to minimize the risk of cyber breaches? |
|
Definition
|
|
Term
|
Definition
| establish users’ identities through an integrated circuit chip in a portable device such as a smart card or a time. |
|
|
Term
|
Definition
| and security event correlation tools—which monitor and document actions on network devices and analyze the actions to determine if an attack is ongoing or has occurred. |
|
|
Term
| Factors determining a successful implementation of these safeguards: |
|
Definition
| implementing technologies through a layered, defense-in-depth strategy |
|
|
Term
| Factors determining a successful implementation of these safeguards: |
|
Definition
| considering the agency’s unique information technology infrastructure when selecting technologies. |
|
|
Term
| Factors determining a successful implementation of these safeguards: |
|
Definition
| utilizing results of independent testing when assessing the technologies’ capabilities |
|
|
Term
| Factors determining a successful implementation of these safeguards: |
|
Definition
| training staff on the secure implementation and utilization of these technologie |
|
|
Term
| Factors determining a successful implementation of these safeguards: |
|
Definition
| Factors determining a successful implementation of these safeguards: |
|
|