Search results

Jump to navigation Jump to search
  • ...ill exploit [[Vulnerability|vulnerabilities]] of an [[asset]] or group of assets and thereby cause [[harm]] to the organization (ISO/IEC PDTR 13335-1). <re ...art of a particular risk. <ref name="DHSLex"> [http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf DHS Risk Lexicon 2010 Edition, September 2010]</r
    6 KB (777 words) - 13:16, 15 August 2022
  • ...cessing data and applying operational controls to geographically dispersed assets over long distances. <ref name=nicss>[https://niccs.us-cert.gov/glossary DH ...ighly distributed systems used to control geographically dispersed [[asset|assets]], often scattered over thousands of square kilometers, where centralized d
    13 KB (1,720 words) - 13:35, 15 August 2022
  • ...a subset of [[CIP]]. CIIP focuses on the protection of systems and [[Asset|assets]] including components such as telecommunications, computers/software, Inte
    7 KB (853 words) - 13:22, 15 August 2022
  • ...tion. <br/>(2) The property of protecting the accuracy and completeness of assets. <ref>[https://www-ns.iaea.org/downloads/security/nuclear-security-series- ...><br/>Integrity: Attribute of protection for accuracy and completeness of assets. <ref>[http://www.govcert.cz/download/nodeid-3555/ Cyber Security Explanato
    26 KB (3,514 words) - 22:56, 25 May 2023
  • ...Critical information Infrastructures are the subset of information [[Asset|assets]] that directly affect the achievement and continuity of state mission and {{definition|''National'' Critical Information infrastructure (NCII): Assets, data, flows or networks which are vital for achieving the services provide
    53 KB (6,315 words) - 13:33, 14 December 2023
  • ...situation, condition or practice which could cause [[damage]]s on people, assets or environment. <ref>[http://circulaire.legifrance.gouv.fr/pdf/2014/01/cir_
    8 KB (1,105 words) - 12:48, 15 August 2022
  • ...s to define policies and controls which are the most likely to protect the assets. <ref>[https://citra.gov.kw/sites/en/LegalReferences/English%20Cyber%20Se ...to manage that exposure. <ref name="CIMS">[http://www.civildefence.govt.nz/assets/Uploads/publications/CIMS-2nd-edition.pdf The New Zealand Coordinated Incid
    38 KB (4,958 words) - 11:25, 1 April 2024
  • ...tate of affairs with the potential to cause [[damage]] to critical [[Asset|assets]] which exceeds the everyday resources of a nation’s organisational syste ...rbours dangers and [[threat]]s to life and limb or to significant material assets and serious [[risk]]s to the political, social or economic system, and whic
    16 KB (2,197 words) - 18:21, 3 July 2023
  • ...es, livelihoods, health status, ecosystems, economic, social, and cultural assets, services (including environmental), and infrastructure due to the interact {{definition|The effect on organizational operations, organizational assets, individuals, other organizations, or the Nation (including the national se
    18 KB (2,553 words) - 13:41, 15 August 2022
  • {{definition|Event: One or more occurrences that affect organizational assets and have the potential to disrupt operations. <ref name="USCERT">[https:/
    10 KB (1,346 words) - 13:30, 15 August 2022
  • {{definition|Capabilities are the people, experience and assets to adequately operate when required. <br /><br />Capaciteiten zijn de mense ..., function, or objective. <ref name="DHSLex"> [http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf DHS Risk Lexicon 2010 Edition, September 2010]</r
    10 KB (1,294 words) - 13:30, 15 August 2022
  • ...h harm can occur. }}The harm refers to a specific value such as financial assets, knowledge, items, or health.<br/><br/> ...olation of security that may cause harm to an organisation and its [[Asset|assets]]. <ref>[https://www.infosec.gov.hk/english/glossary/files/InfoSecGlossar
    37 KB (5,231 words) - 01:19, 8 April 2023
  • ...CIP), for supporting Operators and Public Authorities in better protecting assets and in enhancing their resilience with respect to all hazards. ||
    13 KB (1,793 words) - 12:37, 23 January 2023
  • ...9||'''CS4CA Europe'''||''6<sup>th</sup> annual Cyber Security for Critical Assets'''||Oct 1-2, 2019|| || ||London||UK||https://www.cs4ca.com/europe/<nowiki/> |2019||'''CS4CA USA'''||'''7<sup>th</sup> annual Cyber Security for Critical Assets'''||Mar 26-27, 2019|| || ||Houston, TX||USA||https://www.cs4ca.com/usa/<now
    42 KB (4,947 words) - 14:54, 18 April 2024
  • ...abilities]] of [[Critical Infrastructure|critical infrastructure]] [[Asset|assets]]. <ref>[http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf Joint Publication
    12 KB (1,433 words) - 18:25, 3 July 2023
  • ...on of disaster losses, in lives and the social, economic and environmental assets of communities and countries.” The International Strategy for Disaster Re
    13 KB (1,586 words) - 13:36, 15 August 2022
  • |NCI&KA||CIP||[[National Critical Infrastructure]] and Key Assets
    13 KB (1,788 words) - 00:12, 9 November 2023
  • 30 KB (3,850 words) - 11:23, 1 April 2024
  • ...will exploit [[Vulnerability|vulnerabilities]] of an [[asset]] or group of assets and thereby cause [[harm]] to the organization (derived from ISO/IEC PDTR 1 ...ill exploit the [[vulnerability|vulnerabilities]] of an asset, or group of assets, and thereby cause [[harm]] to the organization. <ref>[https://www-ns.iaea.
    70 KB (9,704 words) - 01:02, 15 November 2023
  • ...loss of revenue from, or destruction of critical systems or informational assets. (derived from International Standard: IEC/TS 62443-1-1 ed. 1.0 ) <ref>[ht ...ure the [[confidentiality]], [[integrity]] and [[availability]] of digital assets. <ref>[https://www.pressoffice.gov.bz/wp-content/uploads/2019/12/belize-cy
    121 KB (15,215 words) - 11:21, 1 April 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)