Search results

Jump to navigation Jump to search
  • == US-CERT definitions from A-Z == {{#ask: [[Category:Main]][[defined by::US-CERT]] | format=category | limit=1000 }}
    498 bytes (72 words) - 10:14, 13 September 2017
  • ...sk: [[Category:Main]][[defined by::United States||NERC||NIST||White House||US-CERT||DoD||DHS||DoT||FBI]]||Financial Stability Board|| format=category | limit
    359 bytes (54 words) - 22:59, 25 May 2023
  • ...and analysis, and knowledge or experience. <ref name=nicss>[https://niccs.us-cert.gov/glossary DHS/NICSS Glossary]</ref>}}<br/> ...well as projecting future states of these. <ref name=nicss>[https://niccs.us-cert.gov/glossary DHS/NICSS Glossary]</ref>}}<br/>
    3 KB (426 words) - 22:57, 25 May 2023
  • ...olerance may differ across an organization, but must be clearly understood by those making risk-related decisions.<br /><br/> ...ling to assume in order to achieve a potential desired result;<br/>(b) The defined impacts to an enterprise‘s information systems that an entity is willing
    4 KB (507 words) - 12:54, 15 August 2022
  • {{definition|[[Information Technology|IT]] dependency is defined as the situation where "a process depends on [[Information Technology|IT]] ...ic Emergency Management 2019]</ref>}}Dependency and Interdependency can be defined as relationships which consider the cascading effect within sector/sub-sect
    6 KB (713 words) - 12:37, 15 August 2022
  • ...e]]s to information or information systems. <ref name=nicss>[https://niccs.us-cert.gov/glossary DHS/NICSS Glossary]</ref>}}<br/> =====[[US-CERT]]=====
    9 KB (1,126 words) - 13:05, 15 August 2022
  • {{#ask: [[Category:Main]][[defined by::DoD]] | format=category | limit=1000 }}
    270 bytes (42 words) - 23:45, 27 September 2016
  • {{definition|“Asset" is defined as a person, structure, facility, information, material, equipment, network =====[[US-CERT]]=====
    9 KB (1,176 words) - 21:15, 4 May 2024
  • {{#ask: [[Category:Main]][[defined by::FBI]]| format=category | limit=1000 }}
    271 bytes (42 words) - 21:17, 7 October 2019
  • {{definition|Event: includes both planned and unplanned activities run by, or on behalf of, an Australian Government agency. <ref>[https://www.protec =====[[US-CERT]]=====
    10 KB (1,346 words) - 13:30, 15 August 2022
  • {{#ask: [[Category:Main]][[defined by::DHS]] | format=category | limit=1000 }}
    407 bytes (56 words) - 23:38, 27 June 2019
  • The US Federal Energy Regulator Commission (FERC) defined the following [[CIP]] and [[Critical Infrastructure Resilience|CIR]]-relate {{#ask: [[Category:Main]][[defined by::FERC]] | format=category | limit=1000 }}
    425 bytes (60 words) - 10:05, 28 June 2019
  • The US Federal Communications Commission (FCC) defined the following [[CIP]] and [[Critical Infrastructure Resilience|CIR]]-relate {{#ask: [[Category:Main]][[defined by::FCC]] | format=category | limit=1000 }}
    472 bytes (62 words) - 10:04, 28 June 2019
  • ...sibility of exercising decisive influence on an undertaking, in particular by: (a) ownership or the right to use all or part of the assets of an undertak ...ity, combined with the capability to manage resources, in order to achieve defined objectives. <ref>[https://www.gov.uk/government/uploads/system/uploads/atta
    11 KB (1,528 words) - 14:07, 15 August 2022
  • <big>Electro Magnetic Pulse (EMP) effects by e.g. a nuclear explosion and pulse-generating devices may be comparable to ...MP) :<br/>1. The electromagnetic radiation from a nuclear explosion caused by Compton-recoil electrons and photoelectrons from photons scattered in the m
    2 KB (260 words) - 13:19, 15 August 2022
  • {{#set:defined by=United States}}
    2 KB (261 words) - 14:09, 15 August 2022
  • ...lth, a [[threat]] is defined as a substance, condition or [[event]], which by its presence has the potential to rapidly [[harm]] an exposed population, s ...ely cause of harm to people, damage to property or harm to the environment by an individual or individuals with the motivation, intention and capability
    37 KB (5,231 words) - 01:19, 8 April 2023
  • ...le level of [[risk]] at an acceptable cost. This approach is characterised by identifying, measuring, and controlling risks to a level commensurate with ...water supply, energy and agriculture whose production is directly affected by extremes of weather and climate.</big><br />
    38 KB (4,958 words) - 11:25, 1 April 2024
  • ..., (bg), (bh), (bi), (bj), (bk) or (bl) applied and is obtained by a person by way of an authorised disclosure under Division 3 of Part 4 or in accordance ...ormation to which paragraph (a) or (b) applied and is obtained by a person by way of an authorised disclosure under Division 3 of Part 4 or in accordance
    4 KB (657 words) - 21:46, 5 July 2023
  • ...on infrastructure]]; or (b) the Chief Executive, or similar officer known by any other designation, of the statutory body, which owns or operates the [[ ...y=Poland|defined by=Portugal|defined by=Singapore|defined by=Spain|defined by=United States}}
    9 KB (1,080 words) - 12:53, 15 August 2022
  • ...or procedures that, at any known period of time, are generally considered by peers (member countries) as the superior practice that delivers the optimal {{#set:defined by=Dictionary}}
    5 KB (683 words) - 12:32, 15 August 2022
  • ...rator and who is known as critical (vital). The third one, PPE, is defined by the prefect (State’s representative, see here for more information: [http ...astructures. The implementation plan was published in 2007 and is replaced by the publication of this document. <ref name="GermanGlos"></ref></big>
    6 KB (778 words) - 12:43, 15 August 2022
  • ...iality of stored, transmitted or processed data or of the services offered by, or accessible via, network and information systems. <ref name=2555ojEN>ht ...f stored, transmitted or processed data or of the related services offered by, or accessible via, network and information systems. <ref name="NIS Directi
    71 KB (9,541 words) - 11:23, 1 April 2024
  • ...lity or flaw of an asset, system, process or control that can be exploited by a cyber threat. <ref name="NIS Directive2">[https://eur-lex.europa.eu/eli/d ...ion, or operation that renders it susceptible to disruption or destruction by a [[threat]] and includes [[dependency|dependencies]] on other types of [[i
    67 KB (9,377 words) - 23:17, 10 January 2023
  • <big>One of the most cited definitions of interdependency is the one by Rinaldi et al. who define interdependency as a</big> ...ic Emergency Management 2019]</ref>}}Dependency and Interdependency can be defined as relationships which consider the cascading effect within sector/sub-sect
    8 KB (1,082 words) - 16:59, 21 May 2023
  • ...by=United States|defined by=Ontario|defined by=ISO|defined by=CDC|defined by=NIST}}
    8 KB (1,115 words) - 12:45, 15 August 2022
  • {{definition|An approach to manage the uncertain nature of emergency risk by building resilience to all or multiple hazards. <ref>[https://www.emergency ...ent or event, natural or human caused, that requires an organized response by a public, private, and/or governmental entity in order to protect life, pub
    8 KB (1,105 words) - 12:48, 15 August 2022
  • ...anisation, (5) is out of the ordinary and/or (6) requires concerted action by several stakeholders. <ref>[https://www.msb.se/RibData/Filer/pdf/26621.pdf {{#set:defined by=Dictionary}}==See also==
    16 KB (2,197 words) - 18:21, 3 July 2023
  • ...environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, an ...able of creating, processing and processing exchange information generated by systems, information society services, as well and electronic communication
    58 KB (7,073 words) - 11:22, 1 April 2024
  • ...previous century. Since then the notion has been misused a number of times by journalists and politicians. It does not help that a clear definition is mi ..., and/or availability of information, information systems and networks, or by unauthorised actions affecting information and communication technology-bas
    22 KB (2,865 words) - 11:21, 1 April 2024
  • ...ropean Convention on Human Rights states "''There shall be no interference by a public authority with the [[exercise]] of this right except such as is in ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. An example follows below:
    28 KB (3,064 words) - 11:41, 1 April 2024
  • ...information systems, the users of such systems, and other persons affected by cyber threats. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/ ...nd [[integrity]] of information that is processed, stored and communicated by electronic or similar means. <ref>[http://www.ag.gov.au/RightsAndProtection
    121 KB (15,215 words) - 11:21, 1 April 2024
  • ...plementation of stipulated information security measures and standards and by organisational support for jobs of planning, implementation, assessment and
    45 KB (5,325 words) - 00:29, 27 February 2024
  • {{definition|Cybercrime consists of criminal acts that are committed online by using electronic communications networks and information systems. It is a b ...informační systémy (např. útoky na informační systémy, útoky odepření služby a malware).<br/><br/>[DE] Cyberkriminalität: Unterschiedliche kriminelle A
    46 KB (5,943 words) - 11:22, 1 April 2024
  • ...Parliament and of the Council, which carry out the function of ‘supply’ as defined in Article 2, point (12), of that Directive |Distribution system operators as defined in Article 2, point (29), of <ref name="EU2019944">[http://data.europa.eu/e
    63 KB (7,984 words) - 21:01, 4 May 2024
  • ...licious [[ICT]]-related incident caused by means of an attempt perpetrated by any threat actor to destroy, expose, alter, disable, steal or gain unauthor {{definition|Attacks against information systems carried out by using malicious software, including botnets. <ref>[https://ec.europa.eu/eus
    62 KB (7,731 words) - 11:20, 1 April 2024