|“||an event that causes a computer program, computer, computer system, network, or component thereof, to be inoperable, or operate in an unintended manner, for a length of time due to destruction of and/or interference with a computer program, computer, computer system, network, computer data, content data, and/or traffic data.||”|
Electronic warfare Edit
|“||[a]n unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time (e.g., minor or extended power outage, extended unavailable network, or equipment or facility damage or destruction).||”|
|“||[a]n event which causes unplanned interruption in operations or functions for an unacceptable length of time.||”|
|“||[d]enial of service or corruption of information resulting from a single event, cause, or source; whether direct or indirect, accidental or intentional, rare or common.||”|
Overview (Electronic warfare) Edit
"Disruption techniques interfere with the adversary's use of the electromagnetic spectrum to limit adversary combat capabilities. Disruption resembles denial but is not as comprehensive in execution or impact on the enemy. A trained enemy operator can thwart disruption through electronic protection measures, such as procedures to counter communications jamming. Disruption enhances attacks on hostile forces and acts as a force multiplier by increasing adversary uncertainty while reducing uncertainty for friendly forces. Advanced electronic attack activities offer the opportunity to nondestructively disrupt or degrade adversary infrastructure."
Overview (Infrastructure) Edit
Disruption of any infrastructure is inconvenient and can be costly and even life threatening. Major disruptions could lead to major losses and affect national security, the economy, and the public good. Mutual dependence and the interconnectedness made possible by the information and communications infrastructure has lead to the possibility that infrastructures may be vulnerable in ways they never have been before. Intentional exploitation of these new vulnerabilities could have severe consequences for our economy, security, and way of life.
- ↑ Toolkit for Cybercrime Legislation.
- ↑ NIST Special Publication 800-34.
- ↑ NICCS, Explore Terms: A Glossary of Common Cybersecurity Terminology (full-text).
- ↑ Glossary of Communication Electronic Terms, at 2-55.
- ↑ FM 3-36, at 1-10.