An intentional threat includes
Intentional threat from insiders Edit
Intentional threats from insiders are
"These threats are addressed by a combination of technical safeguards (e.g., access control, auditing, and anomaly detection) and administrative safeguards (e.g., procedures, training)."
- ↑ Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure, at 6.
- ↑ ITU, "Compendium of Approved ITU-T Security Definitizons," at 22 (Feb. 2003 ed.) (full-text).
- ↑ DHS Privacy Office Annual Privacy Report to Congress, April 2003 to June 2004, App. F, at 49.
- ↑ Id.
See also Edit