|
Letter: I - ict supply chain threat
- Definition: A man-made threat achieved through exploitation of the information and communications technology (ICT) system’s supply chain, including acquisition processes.
- Related Term(s): supply chain, threat
- identity and access management
- Definition: The methods and processes used to manage subjects and their authentication and authorizations to access specific objects.
- impact
- Synonym(s): consequence
- incident
- Definition: An occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the consequences.
- Extended Definition: An occurrence that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.
- Related Term(s): event
- incident management
- Definition: The management and coordination of activities associated with an actual or potential occurrence of an event that may result in adverse consequences to information or information systems.
- incident response
- Definition: The activities that address the short-term, direct effects of an incident and may also support short-term recovery.
- Extended Definition: In the Workforce framework, cybersecurity work where a person: Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats; uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.
- Related Term(s): recovery
- Synonym(s): response
- incident response plan
- Definition: A set of predetermined and documented procedures to detect and respond to a cyber incident.
- indicator
- Definition: An occurrence or sign that an incident may have occurred or may be in progress.
- Related Term(s): precursor
- industrial control system
- Definition: An information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets.
- Related Term(s): Supervisory Control and Data Acquisition, Operations Technology
- information and communication(s) technology
- Definition: Any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.
- Related Term(s): information technology
- information assurance
- Definition: The measures that protect and defend information and information systems by ensuring their availability, integrity, and confidentiality.
- Related Term(s): information security
- information assurance compliance
- Definition: In the NICE Framework, cybersecurity work where a person: Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements; ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.
- information security policy
- Definition: An aggregate of directives, regulations, rules, and practices that prescribe how an organization manages, protects, and distributes information.
- Related Term(s): security policy
- information sharing
- Definition: An exchange of data, information, and/or knowledge to manage risks or respond to incidents.
- information system resilience
- Definition: The ability of an information system to: (1) continue to operate under adverse conditions or stress, even if in a degraded or debilitated state, while maintaining essential operational capabilities; and (2) recover effectively in a timely manner.
- Related Term(s): resilience
- information systems security operations
- Definition: In the NICE Framework, cybersecurity work where a person: Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., Information Systems Security Office
- information technology
- Definition: Any equipment or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information.
- Related Term(s): information and communication(s) technology
- inside( r) threat
- Definition: A person or group of persons within an organization who pose a potential risk through violating security policies.
- Extended Definition: One or more individuals with the access and/or inside knowledge of a company, organization, or enterprise that would allow them to exploit the vulnerabilities of that entity's security, systems, services, products, or facilities with the intent to cause harm.
- Related Term(s): outside( r) threat
- integrated risk management
- Definition: The structured approach that enables an enterprise or organization to share risk information and risk analysis and to synchronize independent yet complementary risk management strategies to unify efforts across the enterprise.
- Related Term(s): risk management, enterprise risk management
- integrity
- Definition: The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
- Extended Definition: A state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.
- Related Term(s): availability, confidentiality, data integrity, system integrity
- intent
- Definition: A state of mind or desire to achieve an objective.
- Related Term(s): capability
- interoperability
- Definition: The ability of two or more systems or components to exchange information and to use the information that has been exchanged.
- intrusion
- Definition: An unauthorized act of bypassing the security mechanisms of a network or information system.
- Synonym(s): penetration
- intrusion detection
- Definition: The process and methods for analyzing information from networks and information systems to determine if a security breach or security violation has occurred.
- investigate
- Definition: a NICE Framework category consisting of specialty areas responsible for the investigation of cyber events and/or crimes of IT systems, networks, and digital evidence
- investigation
- Definition: A systematic and formal inquiry into a qualified threat or incident using digital forensics and perhaps other traditional criminal inquiry techniques to determine the events that transpired and to collect evidence.
- Extended Definition: In the NICE Framework, cybersecurity work where a person: Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include but not limited to interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.
- it asset
- Synonym(s): asset
|
|
|