Attacker

An Attacker is an individual, group, organization, or government that executes an attack.  Not to be confused with a vulnerability.  An attack in the physical world might be someone who …

Data Breach

A Data Breach is the unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information. Related …

Hash Value

A Hash Value is a numeric value resulting from applying a mathematical algorithm against a set of data such as a file. One common hash value is called the MD5 …

Incident

An incident is an occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system …

ICT

Information and Communication(s) Technology

Information and Communication(s) Technology (ICT) is any information technology, equipment, or interconnected system or subsystem of equipment that processes, transmits, receives, or interchanges data or information. Related Terms: Information Technology …

Insider Threat 201

Malicious Code

Malicious Code, or sometimes known as “Attack Code” is a program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or …

Active Attack

An active attack is an attack on the authentication protocol where the Attacker transmits data to theClaimant, Credential Service Provider, Verifier, or Relaying Party. Examples of active attacks include man-in-the …

Industrial Control System

An Industrial Control System is an information system used to control industrial processes such as manufacturing, product handling, production, and distribution or to control infrastructure assets. Related Terms: Supervisory Control …

Public Key Cryptography

Public Key Cryptography is technically known as asymmetric encryption, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. The …