No edit summary |
m (→Definitions) Tag: Source edit |
||
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | == |
+ | == Definitions == |
'''Improper usage''' is |
'''Improper usage''' is |
||
− | {{Quote|[a]ny [[incident]] resulting from violation of an organization's [[acceptable usage policies]] by an [[authorized user]]. . . .[[NIST Special Publication 800-61]], at 2.</ref>}} |
+ | {{Quote|[a]ny [[incident]] resulting from violation of an organization's [[acceptable usage policies]] by an [[authorized user]]. . . .<ref>[[NIST Special Publication 800-61]], at 2.</ref>}} |
+ | |||
+ | {{Quote|[[incident]]s where a [[user]] violates [[Acceptable use policy|acceptable computing policies]] or rules of behavior. These include [[incident]]s like the [[spillage]] of [[information]] from one [[classification level]] to another.<ref>[[Executive Office of the President]], "Annual Report to Congress: Federal information Security Management Act" 15 (Office of Management and Budget) (Feb. 27, 2015) ([https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy14_fisma_report_02_27_2015.pdf full-text]).</ref>}} |
||
== References == |
== References == |
||
Line 9: | Line 11: | ||
[[Category:Security]] |
[[Category:Security]] |
||
[[Category:Definition]] |
[[Category:Definition]] |
||
+ | [[Category:Cybersecurity]] |
Latest revision as of 05:30, 8 June 2021
Definitions[]
Improper usage is
“ | [a]ny incident resulting from violation of an organization's acceptable usage policies by an authorized user. . . .[1] | ” |
“ | incidents where a user violates acceptable computing policies or rules of behavior. These include incidents like the spillage of information from one classification level to another.[2] | ” |
References[]
- ↑ NIST Special Publication 800-61, at 2.
- ↑ Executive Office of the President, "Annual Report to Congress: Federal information Security Management Act" 15 (Office of Management and Budget) (Feb. 27, 2015) (full-text).