Browse — Entity Type · Event
allDataSystemNetworkIdentityCredentialPhysicalProcessCapabilityOrganizationFrameworkEventMetricVulnerabilityThreatControlFindingRequirementRoleArtifactUnknown
84 terms
TermTypeDefinitionClassificationsUpdated
access attemptnounA process of interaction with a communications system by one or more users to enable initiation of user information transfer. The process begins with the granting of an access request by an access originator, and ends in either successful access or access failure.EventRegulated
Alert situationnounThe point in an emergency procedure when the elapsed time passes a threshold and the interruption is not resolved. The enterprise entering into an alert situation initiates a series of escalation steps.Event
anomalous activitynounAny actions that are outside of what is expected, as measured against what "normally" should be happening, occur.Event
anomalous transactionnounA transaction that deviates from the standards, procedures, and processes used to create a transaction.EventRegulatedPCI
automated clearing house activitynounAny transaction made through the Automated Clearing House network.EventRegulatedPCI
CascadingnounDownward flow of information through a range of security levels greater than the accreditation range of a system, network, or component.EventRegulatedCUI
change in technologynounThis Triggering Event takes place when one technology is swapped out for another.Event
ChargebacknounA transaction generated when a cardholder disputes a transaction or when the merchant does not follow bankcard company procedures. The issuer and acquirer research the facts to determine which party is responsible for the transaction. If the merchant is unable to pay, the acquirer will have to cover the chargeback.EventRegulatedPCI
Classified Information SpillagenounSecurity incident that occurs whenever classified data is spilled either onto an unclassified information system or to an information system with a lower level of classification.EventRegulatedCUI
CompromisenounDisclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.EventRegulated
COMSEC IncidentnounOccurrence that potentially jeopardizes the security of COMSEC material or the secure electrical transmission of national security information or information governed by 10 U.S.C. Section 2315.EventRegulatedCUI
COMSEC InsecuritynounCOMSEC incident that has been investigated, evaluated, and determined to jeopardize the security of COMSEC material or the secure transmission of information.EventRegulatedCUI
ContaminationnounType of incident involving the introduction of data of one security classification or security category into data of a lower security classification or different security category.EventRegulatedCUI
Cryptographic AlarmnounCircuit or device that detects failures or aberrations in the logic or operation of crypto-equipment. Crypto-alarm may inhibit transmission or may provide a visible and/or audible alarm.EventRegulatedCUI
cyber eventnounA cybersecurity change or occurrence that may have an impact on organizational operations (including mission, capabilities, or reputation).Event
cyber incidentnounActions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein. See Incident.EventRegulated
cybersecurity eventnounAny act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on such Information System.EventRegulated
data breachnounThe unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.EventRegulated
Data corruptionnounErrors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data.Event
data lossnounThe exposure of proprietary, sensitive, or classified information through either data theft or data leakage.EventRegulatedIP
Daylight overdraftnounA daylight overdraft occurs at any point in the business day when the balance in an institution's account becomes negative. Daylight overdrafts can occur in accounts at Federal Reserve Banks as well as at private financial institutions. Daylight credit can also arise in the form of net debit positions of participants in private payment systems. A daylight overdraft occurs at a Federal Reserve Bank when there are insufficient funds in an institution's Federal Reserve Bank account to cover outgoing funds transfers or incoming book-entry securities transfers. An overdraft can also be the result of other payment activity processed by the Federal Reserve Bank, such as check or automated clearinghouse transactions.EventRegulated
DecertificationnounRevocation of the certification of an information system item or equipment for cause.EventRegulated
Disasternoun1. A sudden, unplanned calamitous event causing great damage or loss. Any event that creates an inability on an enterprise's part to provide critical business functions for some predetermined period of time. Similar terms are business interruption, outage and catastrophe. 2. The period when enterprise management decides to divert from normal production responses and exercises its disaster recovery plan (DRP). It typically signifies the beginning of a move from a primary location to an alternate location.EventRegulated
DisconnectionnounThe termination of an interconnection between two or more IT systems. A disconnection may be planned (e.g., due to changed business needs) or unplanned (i.e., due to an attack or other contingency).Event
disruptionnounAn unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time (e.g., minor or extended power outage, extended unavailable network, or equipment or facility damage or destruction).Event
entrance of a visitornounThis Triggering Event takes place when a visitor enters the organization's facility.EventInternal
eventnounAny observable occurrence in a system and/or network. Events sometimes provide indication that an incident is occurring.Event
Failure AccessnounType of incident in which unauthorized access to data results from hardware or software failure.EventRegulated
False RejectionnounIn biometrics, the instance of a security system failing to verify or identify an authorized person. It does not necessarily indicate a flaw in the biometric system; for example, in a fingerprint-based system, an incorrectly aligned finger on the scanner or dirt on the scanner can result in the scanner misreading the fingerprint, causing a false rejection of the authorized user.EventRegulated
False RejectsnounFalse Rejects are when an authentication system fails to recognize a valid user.Event
File Name Anomalynoun1. A mismatch between the internal file header and its external extension; or 2. A file name inconsistent with the content of the file (e.g., renaming a graphics file with a non-graphical extension.Event
financial transactionnounAn event or agreement carried out between a buyer and a seller to exchange an asset for payment.EventRegulated
Inadvertent DisclosurenounType of incident involving accidental exposure of information to an individual not authorized access.EventRegulated
incidentnounAn assessed occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system; or the information the system processes, stores, or transmits; or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.Event
incident alertnounAny form of security alert, security alarm, or logged event notification that has been triggered by any form of detection. The triggering of an incident alert begins the incident response process.Event
incident alert thresholdnounThe magnitude or intensity that must be exceeded before a detected incident triggers an alert, who receives the alert, and the priority of the alert.Event
indicatornounRecognized action, specific, generalized, or theoretical, that an adversary might be expected to take in preparation for an attack.Event
information security eventnounIdentified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of controls, or a previously unknown situation that may be security relevant.EventRegulated
information security incidentnounA single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.EventRegulated
material changenounA change in the affairs of a company that is expected to have a significant effect on the market value of its securities - such as a change in the nature of the business, a change in the Board of Directors or the principal officers, a change in the share ownership of the company that could affect control, or the acquisition or disposition of any securities in another company. A material change must be reported to the applicable self-regulatory organization.EventRegulated
Natural DisasternounAny "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.Event
notificationnounThe act of giving notice of or reporting something formally or officially.EventRegulated
reportable cyber incidentnounA Cyber Security Incident that has compromised or disrupted one or more reliability tasks of a functional entity.EventRegulatedCUI
security alertnounAny form of notification or alert structure that something is amiss with the system's configuration, settings, etc.Event
Security breachnounA security event that results in unauthorized access of data, applications, services, networks, or devices by bypassing underlying security mechanisms.EventRegulated
security eventnounAn event that potentially compromises the confidentiality, integrity, availability, or accountability of an information system.EventRegulated
Security Event LognounThis record contains records of any security-related and auditing-related events.EventRegulatedCUI
security incidentnounAn adverse event where a threat or exploit may compromise a computer system and cause: loss of data confidentiality, disruption of system or data integrity, or disruption or denial of availability of the system and/or data.EventRegulated
Security violationnounAn instance in which a user or other person circumvents or defeats the controls of a system to obtain unauthorized access to information or system resources.EventRegulated
Security-Relevant EventnounAn occurrence (e.g., an auditable event or flag) considered to have potential security implications to the system or its environment that may require further action (noting, investigating, or reacting).Event
sessionnounA session is an encounter between an end-user interface device (e.g., computer, terminal, process) and an application, including a network logon. One user session is the time between starting the application and quitting.Event
SpillagenounSecurity incident that results in the transfer of classified or CUI information onto an information system not accredited (i.e., authorized) for the appropriate security level.EventRegulatedCUI
suspicious activitynounActivities that give the idea or impression that they are of questionable, dishonest, or of dangerous character or conditions.Event
Threat eventnounAn event or situation that has the potential for causing undesirable consequences or impact.Event
unauthorized accessnounOccurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.EventRegulated
unauthorized access is detectednounThis Triggering Event takes place when a person, legitimate or unauthorized, accesses a resource that the person is not permitted to use or enters a facility or area the person is not permitted to enterEventRegulated
unauthorized attemptnounA try at gaining access to a system without authorization or approval.EventRegulated
unauthorized changenounA purposeful and perhaps unlawful modification of financial data to hide wrong-doing, loss or other disclosure.EventRegulated
Unauthorized DisclosurenounAn event involving the exposure of information to entities not authorized access to the information.EventRegulated
unauthorized physical accessnounAccess to a building, room, site, etc that is not permitted.EventRegulated
unsuccessful authentication attemptnounA failed attempt to receive authentication to access a system.EventRegulated
Very early smoke detection alert (VESDA)nounA system that samples the air on a continuing basis and can detect fire at the pre-combustion stage.EventRestricted
Wide-scale disruptionnounAn event that disrupts business operations in a broad geographic area.Event