/Docs/G/CyberSecurityTechAccord.md
Source views: Source JSON(ish) on GitHub Doc views: Document (&k=r00t): Visual Print Technical: OpenParameters Xray
{- "edges" : [ "data" {
- "Ti" : "Cybersecurity Tech Accord: Definitions of the terms used" ,
"Ti" : "Active defense" ,
"sec" : "Cyber defensive measures designed to inflict damage on an attacker, by exploiting vulnerabilities in attack toolkits, distributing disinformation, inflicting malicious code, etc." ,
"Ti" : "Adversary" ,
"sec" : "An individual, group, organization, or government that conducts (or intends to conduct) detrimental activities. This could be done by discovering secret data, corrupting some of the data, spoofing the identity of a message sender, or forcing system downtime." ,
"Ti" : "Advanced Persistent Threat" ,
"sec" : "Elaborate, multi-step targeted attacks aimed at infiltrating a specific network, such as governmental institutions or companies." ,
"Ti" : "Attack" ,
"sec" : "An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity, availability, or confidentiality." ,
"Ti" : "Attacker" ,
"sec" : "A party who acts with malicious intent to compromise an information system." ,
"5 https://csrc.nist.gov/Glossary/?term" : "3019#AlphaIndexDiv" ,
"Ti" : "Breach" ,
"sec" : "The moment an attacker successfully exploits a vulnerability in a computer or device, and gains access to" ,
"Ti" : "Bug" ,
"1.sec" : "A bug is a flaw or error in a software program or service." ,
"2.sec" : "A product bug is clearly unintentional, as it can negatively affect the customer experience." ,
"Ti" : "Civilian" ,
"sec" : "Noncombatant, nonmilitary person, ordinary citizen, private citizen not affiliated with or benefiting a" ,
"1.sec" : "Synchronized, real-time capability to discover, detect, analyze, and mitigate threats and vulnerabilities." ,
"12 https://csrc.nist.gov/Glossary/?term" : "2820#AlphaIndexDiv" ,
"2.sec" : "It involves no intrusion into hostile or non-cooperating networks or systems, but focuses entirely on the" ,
"Ti" : "Cyber exposure" ,
"sec" : "Cyber exposure includes broad visibility into the security of any asset across any computing environment, spanning traditional IT, cloud environments and Internet of Things, to accurately determine where and to what extent an asset is secure or exposed. Cyber exposure also translates technical data into business insights to measure cyber risk in a way that enables better strategic decisions based on business risk.13" ,
"15 https://csrc.nist.gov/Glossary/?term" : "3818#AlphaIndexDiv" ,
"19 https://csrc.nist.gov/Glossary/?term" : "4730#AlphaIndexDiv" ,
"28 https://csrc.nist.gov/Glossary/?term" : "2082#AlphaIndexDiv" ,
}
}