Definitions[]
General[]
An intentional threat includes
“ | both targeted and untargeted attacks from a variety of sources, including criminal groups, hackers, disgruntled employees, foreign nations engaged in espionage and information warfare, and terrorists.[1] | ” |
“ | [t]hreats that may range from casual examination using easily available monitoring tools to sophisticated attacks using special system knowledge. An intentional threat, if realized, may be considered to be an "attack."[2] | ” |
Intentional threat from insiders[]
Intentional threats from insiders are
“ | [t]hreat actions [that] can be characterized as improper use of authorized capabilities (e.g., browsing, removing information from trash) and circumvention of controls to take unauthorized actions (e.g., removing data from a workstation that has been not been shut off).[3] | ” |
"These threats are addressed by a combination of technical safeguards (e.g., access control, auditing, and anomaly detection) and administrative safeguards (e.g., procedures, training)."[4]
Overview[]
References[]
- ↑ Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure, at 6.
- ↑ ITU, "Compendium of Approved ITU-T Security Definitizons," at 22 (Feb. 2003 ed.) (full-text).
- ↑ DHS Privacy Office Annual Privacy Report to Congress, April 2003 to June 2004, App. F, at 49.
- ↑ Id.