Letter: A

access
Definition: The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.

access and identity management
Synonym(s): identity and access management
access control
Definition: The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities.
Related Term(s): access control mechanism

access control mechanism
Definition: Security measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.

active attack
Definition: An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.
Related Term(s): passive attack

active content
Definition: Software that is able to automatically carry out or trigger actions without the explicit intervention of a user.

adversary
Definition: An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Related Term(s): threat agent, attacker

air gap
Definition: To physically separate or isolate a system from other systems or networks (verb).
Extended Definition: The physical separation or isolation of a system from other systems or networks (noun).
alert
Definition: A notification that a specific attack has been detected or directed at an organization’s information systems.

allowlist
Definition: A list of entities that are considered trustworthy and are granted access or privileges.
Related Term(s): Blocklist

all source intelligence
Definition: In the NICE Framework, cybersecurity work where a person: Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.

analyze
Definition: A NICE Framework category consisting of specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

antispyware software
Definition: A program that specializes in detecting and blocking or removing forms of spyware.
Related Term(s): spyware

antivirus software
Definition: A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.

asset
Definition: A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
Extended Definition: Anything useful that contributes to the success of something, such as an organizational mission; assets are things of value or properties to which value can be assigned.

asymmetric cryptography
Synonym(s): public key cryptography
attack
Definition: An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
Extended Definition: The intentional act of attempting to bypass one or more security services or controls of an information system.
Related Term(s): active attack, passive attack

attack method
Definition: The manner or technique and means an adversary may use in an assault on information or an information system.

attack mode
Synonym(s): attack method
attack path
Definition: The steps that an adversary takes or may take to plan, prepare for, and execute an attack.

attack pattern
Definition: Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation.
Extended Definition: For software, descriptions of common methods for exploiting software systems.
Related Term(s): attack signature

attack signature
Definition: A characteristic or distinctive pattern that can be searched for or that can be used in matching to previously identified attacks.
Extended Definition: An automated set of rules for identifying a potential threat (such as an exploit or the presence of an attacker tool) and possible responses to that threat.
Related Term(s): attack pattern

attack surface
Definition: The set of ways in which an adversary can enter a system and potentially cause damage.
Extended Definition: An information system's characteristics that permit an adversary to probe, attack, or maintain presence in the information system.

attacker
Definition: An individual, group, organization, or government that executes an attack.
Extended Definition: A party acting with malicious intent to compromise an information system.
Related Term(s): adversary, threat agent

authenticate
Related Term(s): authentication
authentication
Definition: The process of verifying the identity or other attributes of an entity (user, process, or device).
Extended Definition: Also the process of verifying the source and integrity of data.

authenticity
Definition: A property achieved through cryptographic methods of being genuine and being able to be verified and trusted, resulting in confidence in the validity of a transmission, information or a message, or sender of information or a message.
Related Term(s): integrity, non-repudiation

authorization
Definition: A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
Extended Definition: The process or act of granting access privileges or the access privileges as granted.

availability
Definition: The property of being accessible and usable upon demand.
Extended Definition: In cybersecurity, applies to assets such as information or information systems.
Related Term(s): confidentiality, integrity

advanced persistent threat
Definition: An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).