(Adding categories)
Tag: categoryselect
Tag: Source edit
 
Line 5: Line 5:
 
{{Quote|[a]ny [[incident]] resulting from violation of an organization's [[acceptable usage policies]] by an [[authorized user]]. . . .<ref>[[NIST Special Publication 800-61]], at 2.</ref>}}
 
{{Quote|[a]ny [[incident]] resulting from violation of an organization's [[acceptable usage policies]] by an [[authorized user]]. . . .<ref>[[NIST Special Publication 800-61]], at 2.</ref>}}
   
{{Quote|[[incident]]s where a [[user]] violates [[acceptable computing policies]] or rules of behavior. These include [[incident]]s like the [[spillage]] of [[information]] from one [[classification level]] to another.<ref>[[Executive Office of the President]], "Annual Report to Congress: Federal information Security Management Act" 15 (Office of Management and Budget) (Feb. 27, 2015) ([https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy14_fisma_report_02_27_2015.pdf full-text]).</ref>}}
+
{{Quote|[[incident]]s where a [[user]] violates [[Acceptable use policy|acceptable computing policies]] or rules of behavior. These include [[incident]]s like the [[spillage]] of [[information]] from one [[classification level]] to another.<ref>[[Executive Office of the President]], "Annual Report to Congress: Federal information Security Management Act" 15 (Office of Management and Budget) (Feb. 27, 2015) ([https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy14_fisma_report_02_27_2015.pdf full-text]).</ref>}}
   
 
== References ==
 
== References ==

Latest revision as of 05:30, 8 June 2021

Definitions[edit | edit source]

Improper usage is

[a]ny incident resulting from violation of an organization's acceptable usage policies by an authorized user. . . .[1]
incidents where a user violates acceptable computing policies or rules of behavior. These include incidents like the spillage of information from one classification level to another.[2]

References[edit | edit source]

  1. NIST Special Publication 800-61, at 2.
  2. Executive Office of the President, "Annual Report to Congress: Federal information Security Management Act" 15 (Office of Management and Budget) (Feb. 27, 2015) (full-text).
Community content is available under CC-BY-SA unless otherwise noted.