Dictionary · NIST SP 800-30
L2 — definitions grouped by regulatory framework.
Nouns
24 senses- Adversary
Individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
- Authentication
Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
- Information Security risk
The risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or information systems. See Risk.
- information system resilience
The ability of an information system to continue to operate while under attack, even if in a degraded or debilitated state, and to rapidly recover operational capabilities for essential functions after a successful attack.
- Environment of Operation
The physical, technical, and organizational setting in which an information system operates, including but not limited to: missions/business functions; mission/business processes; threat space; vulnerabilities; enterprise and information security architectures; personnel; facilities; supply chain relationships; information technologies; organizational governance and culture; acquisition and procurement processes; organizational policies and procedures; organizational assumptions, constraints, risk tolerance, and priorities/trade-offs).
- Impact Value
The assessed potential impact resulting from a compromise of the confidentiality, integrity, or availability of an information type, expressed as a value of low, moderate, or high.
- Industrial Control System
An information system used to control industrial processes such as manufacturing, product handling, production, and distribution. Industrial control systems include supervisory control and data acquisition systems (SCADA) used to control geographically dispersed assets, as well as distributed control systems (DCS) and smaller control systems using programmable logic controllers to control localized processes.
- Risk Assessment Methodology
A risk assessment process, together with a risk model, assessment approach, and analysis approach.
- Mission/Business Segment
Elements of organizations describing mission areas, common/shared business services, and organization-wide services. Mission/business segments can be identified with one or more information systems which collectively support a mission/business process.
- Risk Assessment Report
The report which contains the results of performing a risk assessment or the formal output from the process of assessing risk.
- Predisposing Condition
A condition that exists within an organization, a mission/business process, enterprise architecture, or information system including its environment of operation, which contributes to (i.e., increases or decreases) the likelihood that one or more threat events, once initiated, will result in undesirable consequences or adverse impact to organizational operations and assets, individuals, other organizations, or the Nation.
- Qualitative Assessment
Use of a set of methods, principles, or rules for assessing risk based on nonnumeric categories or levels.
- Quantitative Assessment
Use of a set of methods, principles, or rules for assessing risks based on the use of numbers where the meanings and proportionality of values are maintained inside and outside the context of the assessment.
- Residual risk
Portion of risk remaining after security measures have been applied.
- Risk Assessor
The individual, group, or organization responsible for conducting a risk assessment.
- Risk mitigation
Prioritizing, evaluating, and implementing the appropriate risk-reducing controls/countermeasures recommended from the risk management process.
- Risk Model
A key component of a risk assessment methodology (in addition to assessment approach and analysis approach) that defines key terms and assessable risk factors.
- Risk Monitoring
Maintaining ongoing awareness of an organization’s risk environment, risk management program, and associated activities to support risk decisions.
- risk response
Accepting, avoiding, mitigating, sharing, or transferring risk to organizational operations (i.e., mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation.
- Root cause analysis
A principle-based, systems approach for the identification of underlying causes associated with a particular set of risks.
- Semi-Quantitative Assessment
Use of a set of methods, principles, or rules for assessing risk based on bins, scales, or representative numbers whose values and meanings are not maintained in other contexts.
- Threat event
An event or situation that has the potential for causing undesirable consequences or impact.
- Threat Shifting
Response from adversaries to perceived safeguards and/or countermeasures (i.e., security controls), in which the adversaries change some characteristic of their intent to do harm in order to avoid and/or overcome those safeguards/countermeasures.
- Threat Scenario
A set of discrete threat events, associated with a specific threat source or multiple threat sources, partially ordered in time.