The NCSC glossary - a set of straightforward definitions for common cyber security terms Our community of professionals is committed to lifetime learning, career progression and sharing expertise for the benefit of individuals and organizations around the globe. This glossary contains brief descriptions of commonly used cybersecurity and related technology terms. The confidentiality, integrity, and availability (CIA) security triad is the foundation of secure information in cybersecurity. 4 CNSSI 4009 Glossary … Source: CNSSI-4009-2015. Cybersecurity glossary. Hashing ... cyber incident. Glossary. Against that backdrop, highly personal and sensitive information such as social security numbers were recently stolen in the Equifax hack, affecting over 145 million people. Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation. Unless otherwise noted, definitions have been adapted from terms in the NIST Computer Security Resource Center Glossary . This Glossary consists of terms and definitions extracted verbatim from NIST's cybersecurity- and privacy-related Federal Information Processing Standards (FIPS), NIST Special Publications (SPs), and NIST Internal/Interagency Reports (IRs), as well as from Committee on National Security Systems (CNSS) Instruction CNSSI-4009.Only terms that are defined in final … 2) Compromise. Source(s): NIST SP 800-30 Rev. A violation of the security policy of a system such that an unauthorized disclosure, modification, or destruction of sensitive information has occurred. 1 CNSSI 4009 NIST SP 800-39 CNSSI 4009 NIST SP 800-53 Rev. It is comprised of a six step process: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. Source: CNSSI-4009-2015 (NIST SP 800-126 Rev. Advanced Network Systems, Inc. 800.639.6757 www.getadvanced.net 1 Table of Contents . Accountability in the cyber security space entails ensuring that activities on supported systems can be traced to an individual who is held responsible for the integrity of the data. Confidentiality The ability to protect or defend the use of cyberspace from cyber attacks. Incident Handling is an action plan for dealing with intrusions, cyber-theft, denial of service, fire, floods, and other security-related events. For 50 years and counting, ISACA ® has been helping information systems governance, control, risk, security, audit/assurance and business and cybersecurity professionals, and enterprises succeed. A nomenclature and dictionary of security-related software flaws. ATTACK SIGNATURE A characteristic or distinctive pattern that can be searched for or that can be used in matching to previously identified attacks. Cyber Glossary Learn more about common and not so common cybersecurity terminology. Information Security Policy Regulations, rules, and practices that prescribe how an organisation manages, protects, and distributes information. The topic of cyber security is sweeping the world by storm with some of the largest and most advanced companies in the world falling victim to cyber-attacks in just the last 5 years. 4 Hacker An unauthorised user who attempts to or gains access to an information system.