Search results

Jump to navigation Jump to search
  • ...users for approved purposes the confidentiality requirement is determined by reference to the likely consequences of unauthorised disclosure of official ...ntiality: The ability to protect sensitive information from being accessed by unauthorized people. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - C
    26 KB (3,452 words) - 00:43, 15 November 2023
  • ==== [[India]] ==== ...nformation to enable individuals, communities and organizations threatened by a hazard to prepare and to act appropriately and in sufficient time to redu
    20 KB (2,828 words) - 00:07, 16 March 2023
  • ...: the assurance that information has been created, amended or deleted only by the intended authorised means – integrity relates to information and comm ====[[India]]====
    26 KB (3,514 words) - 22:56, 25 May 2023
  • ==== [[India]] ==== ...on|Recovery is those capabilities necessary to assist communities affected by an [[incident]] to recover effectively, including, but not limited to, rebu
    22 KB (2,752 words) - 11:24, 1 April 2024
  • ...on|Availability is the property of being accessible and usable upon demand by an authorized entity. <ref>[https://www-ns.iaea.org/downloads/security/nuc {{definition|The property of being accessible and useable upon demand by an authorized entity. <ref>ITU Security in Telecommunications and Informati
    26 KB (3,485 words) - 22:52, 25 May 2023
  • The EU EURAM project defined Risk mitigation as: {{definition|Action of reducing a risk by implementing security controls, taking assurance measures, avoiding the ris
    23 KB (3,049 words) - 13:48, 15 August 2022
  • Climate change can be framed in different ways; an inventory has been made by the Dutch Climate Changes Spatial Planning research programme.<br/><br/> ...e of the climate that can be identified (e.g., by using statistical tests) by changes in the mean and/or the variability of its properties, and that pers
    27 KB (3,535 words) - 14:43, 27 January 2020
  • {{quote-ciprnet|Hazard is defined as the source of potential harm.}}<br/> ...n combination. In technical settings, hazards are described quantitatively by the likely frequency of occurrence of different intensities for different a
    28 KB (3,824 words) - 13:53, 15 August 2022
  • ====[[India]]==== ...//www.dgqadefence.gov.in/documents/pdf/cyber-security-policy-dgqa-2015.pdf India's DGQA Cyber Security Policy (2015)] </ref>}} <br /><br/>
    38 KB (5,144 words) - 00:55, 16 March 2023
  • ...le level of [[risk]] at an acceptable cost. This approach is characterised by identifying, measuring, and controlling risks to a level commensurate with ...water supply, energy and agriculture whose production is directly affected by extremes of weather and climate.</big><br />
    38 KB (4,958 words) - 11:25, 1 April 2024
  • ...lth, a [[threat]] is defined as a substance, condition or [[event]], which by its presence has the potential to rapidly [[harm]] an exposed population, s ...ely cause of harm to people, damage to property or harm to the environment by an individual or individuals with the motivation, intention and capability
    37 KB (5,231 words) - 01:19, 8 April 2023
  • {{definition|The knowledge and [[Capacity|capacities]] developed by governments, professional [[response]] and [[Recovery|recovery]] organisati ...training and field [[[[exercise]]|[[exercise]]s]]. These must be supported by formal institutional, legal and budgetary capacities. The related term “r
    36 KB (4,683 words) - 00:42, 16 March 2023
  • ...the prevention of an [[accident]] or keeping the [[damage|damages]] caused by an accident as small as possible. -''unofficial translation''- <ref name=TS ==== [[India]] ====
    36 KB (4,907 words) - 00:43, 16 March 2023
  • {{definition|A plan prepared by an authority defining what kind of rescue unit is needed to stabilise an [[ ==== [[India]] ====
    35 KB (4,753 words) - 11:25, 1 April 2024
  • ...ion infrastructure (CII) - OBSOLETE TERM per December 2019; to be replaced by 'Digital Security of Critical Activities'. <ref>[https://legalinstruments. ...virtual [[Information Infrastructure|information infrastructure]] declared by the government which is capable of controlling, processing, circulating or
    53 KB (6,315 words) - 13:33, 14 December 2023
  • ...tential loss or disruption of the provision of an essential service caused by that incident. <ref name=2557ojEN>https://eur-lex.europa.eu/eli/dir/2022/25 ...assessment is a methodology to determine the nature and extent of [[risk]] by analysing potential [[hazard|hazards]] and evaluating existing conditions o
    64 KB (8,370 words) - 21:11, 4 May 2024
  • {{definition|[https://un.mfa.gov.by/docs/doctrine_of_information_security_of_the_republic_of_belarus.pdf DOCTRI ====[[India]]====
    101 KB (12,054 words) - 23:44, 7 May 2024
  • ...environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, an ...able of creating, processing and processing exchange information generated by systems, information society services, as well and electronic communication
    58 KB (7,073 words) - 11:22, 1 April 2024
  • ...lity or flaw of an asset, system, process or control that can be exploited by a cyber threat. <ref name="NIS Directive2">[https://eur-lex.europa.eu/eli/d ...ion, or operation that renders it susceptible to disruption or destruction by a [[threat]] and includes [[dependency|dependencies]] on other types of [[i
    67 KB (9,377 words) - 23:17, 10 January 2023
  • ...]], and the likelihood that a specific [[vulnerability]] will be exploited by a particular [[threat]]. <ref>[http://eur-lex.europa.eu/LexUriServ/site/en/ {{definition|The probability of adverse effects caused by a hazardous phenomenon or substance in an organism, a population, or an eco
    70 KB (9,704 words) - 01:02, 15 November 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)