Search results

Jump to navigation Jump to search
  • ====[[IETF]]==== ...a global scale. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    934 bytes (105 words) - 12:26, 15 August 2022
  • == The Internet Engineering Task Force (IETF) has defined the following terms == {{#ask: [[Category:Main]][[defined by::IETF]] | format=category | limit=1000 }}
    1 KB (159 words) - 01:09, 29 June 2019
  • ====[[IETF]]==== ...a specified way.<ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    2 KB (260 words) - 23:20, 27 June 2019
  • ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. An example follows below: ==== Unit ====[[IETF]]====
    3 KB (437 words) - 17:06, 11 July 2019
  • ...le. Each new definition should be formatted as a heading level 4, followed by the unformatted text of the definition. An example follows below: ==== Unit ...ateway interconnects networks with different network protocol technologies by performing the required protocol conversions. <br /><br/>
    5 KB (683 words) - 17:09, 11 July 2019
  • ...the property that information was produced, issued, modified or destroyed by a certain individual, a system, agency or entity.}} <br /><br/> ====[[IETF]]====
    9 KB (1,220 words) - 22:52, 25 May 2023
  • ...finition|Network means the interconnection of two or more computer systems by which data processing service can be provided or received. <ref>[http://www ====[[IETF]]====
    6 KB (876 words) - 14:10, 15 August 2022
  • ...ng power above a minimum defined value. This inability to transmit above a defined power level is termed Forced Outage Rate (F.O.R.).<br/> ====[[IETF]]====
    6 KB (835 words) - 22:58, 25 May 2023
  • {{definition|“Asset" is defined as a person, structure, facility, information, material, equipment, network ====[[IETF]]====
    9 KB (1,176 words) - 21:15, 4 May 2024
  • ====[[IETF]]==== ...s and functions. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    8 KB (1,058 words) - 01:39, 3 March 2023
  • ====[[IETF]]==== ...by=IAEA|defined by=Egypt|defined by=Italy|defined by=United States|defined by=DHS}}
    2 KB (324 words) - 12:47, 15 August 2022
  • ...for secure telecommunications, ITU-T, Geneva (2012) - ITU-T H.235.</ref>}}By a ''direct attack'' on a system they exploit deficiencies in the underlying ...sed psychological attack on citizens or digital identity theft perpetrated by different techniques. <ref>[http://www.hopr.gov.et/c/document_library/get_f
    15 KB (2,040 words) - 22:08, 19 February 2022
  • ...sibility of exercising decisive influence on an undertaking, in particular by: (a) ownership or the right to use all or part of the assets of an undertak ...ity, combined with the capability to manage resources, in order to achieve defined objectives. <ref>[https://www.gov.uk/government/uploads/system/uploads/atta
    11 KB (1,528 words) - 14:07, 15 August 2022
  • ...ition|Acceptable risk: Degree of human and material loss that is perceived by the community or relevant authorities as tolerable in actions to minimize d ====[[IETF]]====
    11 KB (1,428 words) - 13:32, 15 August 2022
  • ====[[IETF]]==== ...ve been applied. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    13 KB (1,568 words) - 13:34, 15 August 2022
  • ...biometrical traits (fingerprint). A higher security level can be achieved by the combination of different traits used for authentication.<br/><br/> ..., such as a token or PIN, is required in addition to the first one this is defined as 2-factor authentication. <ref>[https://digital.nhs.uk/services/data-and
    17 KB (2,375 words) - 17:07, 15 August 2022
  • ...he data has been received or to protect the recipient against false denial by the sender that the data has been sent. <ref>[http://www.dgqadefence.gov.in ...origin of data in such a way that the integrity and origin can be verified by a third party as having originated from a specific entity in possession of
    15 KB (2,048 words) - 23:07, 25 May 2023
  • ...rastructure and the risk of loss due to a disruption in essential services by minimizing the vulnerability of critical infrastructure assets, systems and {{definition|Security: Measures taken by a military unit, an activity or installation to protect itself against all
    17 KB (2,360 words) - 22:24, 19 February 2022
  • ...on|Availability is the property of being accessible and usable upon demand by an authorized entity. <ref>[https://www-ns.iaea.org/downloads/security/nuc {{definition|The property of being accessible and useable upon demand by an authorized entity. <ref>ITU Security in Telecommunications and Informati
    26 KB (3,485 words) - 22:52, 25 May 2023
  • ...on|Recovery is those capabilities necessary to assist communities affected by an [[incident]] to recover effectively, including, but not limited to, rebu ====[[IETF]]====
    22 KB (2,752 words) - 11:24, 1 April 2024
  • ...users for approved purposes the confidentiality requirement is determined by reference to the likely consequences of unauthorised disclosure of official ...ntiality: The ability to protect sensitive information from being accessed by unauthorized people. <ref>[https://www.cyber.gc.ca/en/glossary Glossary - C
    26 KB (3,452 words) - 00:43, 15 November 2023
  • ...: the assurance that information has been created, amended or deleted only by the intended authorised means – integrity relates to information and comm {{definition|Integrity: Information systems and information can be changed by authorized persons or systems only. <ref>[http://nic.af/Content/files/Natio
    26 KB (3,514 words) - 22:56, 25 May 2023
  • ...plementation of stipulated information security measures and standards and by organisational support for jobs of planning, implementation, assessment and
    45 KB (5,325 words) - 00:29, 27 February 2024
  • ====[[IETF]]==== ...total exposure. <ref name="IETFrefs">[https://tools.ietf.org/html/rfc4949 IETF RFC449 Internet Security Glossary 2]</ref>}}<br />
    38 KB (5,144 words) - 00:55, 16 March 2023
  • ...le level of [[risk]] at an acceptable cost. This approach is characterised by identifying, measuring, and controlling risks to a level commensurate with ...water supply, energy and agriculture whose production is directly affected by extremes of weather and climate.</big><br />
    38 KB (4,958 words) - 11:25, 1 April 2024
  • ...lth, a [[threat]] is defined as a substance, condition or [[event]], which by its presence has the potential to rapidly [[harm]] an exposed population, s ...ely cause of harm to people, damage to property or harm to the environment by an individual or individuals with the motivation, intention and capability
    37 KB (5,231 words) - 01:19, 8 April 2023
  • ...ion infrastructure (CII) - OBSOLETE TERM per December 2019; to be replaced by 'Digital Security of Critical Activities'. <ref>[https://legalinstruments. ...virtual [[Information Infrastructure|information infrastructure]] declared by the government which is capable of controlling, processing, circulating or
    53 KB (6,315 words) - 13:33, 14 December 2023
  • ...lity or flaw of an asset, system, process or control that can be exploited by a cyber threat. <ref name="NIS Directive2">[https://eur-lex.europa.eu/eli/d ...ion, or operation that renders it susceptible to disruption or destruction by a [[threat]] and includes [[dependency|dependencies]] on other types of [[i
    67 KB (9,377 words) - 23:17, 10 January 2023
  • ...]], and the likelihood that a specific [[vulnerability]] will be exploited by a particular [[threat]]. <ref>[http://eur-lex.europa.eu/LexUriServ/site/en/ {{definition|The probability of adverse effects caused by a hazardous phenomenon or substance in an organism, a population, or an eco
    70 KB (9,704 words) - 01:02, 15 November 2023
  • ...information systems, the users of such systems, and other persons affected by cyber threats. <ref name=CSact>[https://eur-lex.europa.eu/eli/reg/2019/881/ ...nd [[integrity]] of information that is processed, stored and communicated by electronic or similar means. <ref>[http://www.ag.gov.au/RightsAndProtection
    121 KB (15,215 words) - 11:21, 1 April 2024
  • ...ktura: Fyzické zdroje, služby a zařízení, jejichž nefunkčnost nebo zničení by mělo vážný dopad na fungování hospodářství a společnosti.<br/><br ...also referred to as nationally significant infrastructure, can be broadly defined as the systems, assets, facilities and networks that provide essential serv
    129 KB (16,783 words) - 20:57, 4 May 2024