Glossary Term: Cyber Security

Access

The ability and means to communicate with or otherwise interact with a systemsystem. (1) (ANSI) People, machines, and methods organized … More, to use systemsystem. (1) (ANSI) People, machines, and methods organized … More resources to handle information, to gain knowledge of the information the systemsystem. (1) (ANSI) People, machines, and methods organized … More contains, or to …

Access Read More »

Access Control  

The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities.

Active Content

SoftwareA set of programs that tell a computer to perform a task. Th… that is able to automatically carry out or trigger actions without the explicit intervention of a useruser. (ANSI) Any person, organization, or functional unit t… More.

Advanced Persistent Threat  

 An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attackAn attempt to gain unauthorized access to system services, r… More vectors (e.g., cyber, physical, and deception).

Air Gap

To physically separate or isolate a systemsystem. (1) (ANSI) People, machines, and methods organized … More from other systems or networks (verb). The physical separation or isolation of a systemsystem. (1) (ANSI) People, machines, and methods organized … More from other systems or networks (noun).

Alert

A notification that a specific attackAn attempt to gain unauthorized access to system services, r… More has been detected or directed at an organization’s information systems.

Antispyware Software  

A programprogram. (1) (ISO) A sequence of instructions suitable for … More that specializes in detecting and blocking or removing forms of spywareA type of malware that functions by spying on user activity ….

Antivirus Software

 A programprogram. (1) (ISO) A sequence of instructions suitable for … More that monitors a computercomputer. (IEEE) (1) A functional unit that can perform sub… More or networkAny connection of two or more computers that enables them to… More to detect or identify major types of malicious codecode. See: program, source code. More and to prevent or contain …

Antivirus Software Read More »

Asset

A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value. Anything useful that contributes to the success of something, such as an organizational mission; assets are things of value or properties to which value can be assigned.

Attack

An attempt to gain unauthorized accessThe ability and means to communicate with or otherwise inter… More to systemsystem. (1) (ANSI) People, machines, and methods organized … More services, resources, or information, or an attempt to compromise systemsystem. (1) (ANSI) People, machines, and methods organized … More integrity. The intentional act of attempting to bypass one or more …

Attack Read More »

Technology Elevated