Search results

Jump to navigation Jump to search
  • ...users for approved purposes the confidentiality requirement is determined by reference to the likely consequences of unauthorised disclosure of official ...ntiality: The ability to protect sensitive information from being accessed by unauthorized people. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - C
    26 KB (3,452 words) - 00:43, 15 November 2023
  • ...: the assurance that information has been created, amended or deleted only by the intended authorised means – integrity relates to information and comm {{definition|Integrity: Information systems and information can be changed by authorized persons or systems only. <ref>[http://nic.af/Content/files/Natio
    26 KB (3,514 words) - 22:56, 25 May 2023
  • ...plementation of stipulated information security measures and standards and by organisational support for jobs of planning, implementation, assessment and
    45 KB (5,325 words) - 00:29, 27 February 2024
  • ====[[IETF]]==== ...total exposure. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    38 KB (5,144 words) - 00:55, 16 March 2023
  • ...le level of [[risk]] at an acceptable cost. This approach is characterised by identifying, measuring, and controlling risks to a level commensurate with ...water supply, energy and agriculture whose production is directly affected by extremes of weather and climate.</big><br />
    38 KB (4,958 words) - 11:25, 1 April 2024
  • ...lth, a [[threat]] is defined as a substance, condition or [[event]], which by its presence has the potential to rapidly [[harm]] an exposed population, s ...ely cause of harm to people, damage to property or harm to the environment by an individual or individuals with the motivation, intention and capability
    37 KB (5,231 words) - 01:19, 8 April 2023
  • ...ion infrastructure (CII) - OBSOLETE TERM per December 2019; to be replaced by 'Digital Security of Critical Activities'. <ref>[https://legalinstruments. ...virtual [[Information Infrastructure|information infrastructure]] declared by the government which is capable of controlling, processing, circulating or
    53 KB (6,315 words) - 13:33, 14 December 2023
  • ...lity or flaw of an asset, system, process or control that can be exploited by a cyber threat. <ref name="NIS Directive2">[https://eur-lex.europa.eu/eli/d ...ion, or operation that renders it susceptible to disruption or destruction by a [[threat]] and includes [[dependency|dependencies]] on other types of [[i
    67 KB (9,377 words) - 23:17, 10 January 2023
  • ...]], and the likelihood that a specific [[vulnerability]] will be exploited by a particular [[threat]]. <ref>[http://eur-lex.europa.eu/LexUriServ/site/en/ {{definition|The probability of adverse effects caused by a hazardous phenomenon or substance in an organism, a population, or an eco
    70 KB (9,704 words) - 01:02, 15 November 2023
  • ...information systems, the users of such systems, and other persons affected by cyber threats. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/ ...nd [[integrity]] of information that is processed, stored and communicated by electronic or similar means. <ref>[http://www.ag.gov.au/RightsAndProtection
    121 KB (15,215 words) - 11:21, 1 April 2024
  • ...ktura: Fyzické zdroje, služby a zařízení, jejichž nefunkčnost nebo zničení by mělo vážný dopad na fungování hospodářství a společnosti.<br/><br ...also referred to as nationally significant infrastructure, can be broadly defined as the systems, assets, facilities and networks that provide essential serv
    129 KB (16,783 words) - 20:57, 4 May 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)