An intentional threat includes
|“||both targeted and untargeted attacks from a variety of sources, including criminal groups, hackers, disgruntled employees, foreign nations engaged in espionage and information warfare, and terrorists.||”|
|“||[t]hreats that may range from casual examination using easily available monitoring tools to sophisticated attacks using special system knowledge. An intentional threat, if realized, may be considered to be an "attack."||”|
Intentional threat from insiders Edit
Intentional threats from insiders are
|“||[t]hreat actions [that] can be characterized as improper use of authorized capabilities (e.g., browsing, removing information from trash) and circumvention of controls to take unauthorized actions (e.g., removing data from a workstation that has been not been shut off).||”|
- ↑ Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure, at 6.
- ↑ ITU, "Compendium of Approved ITU-T Security Definitizons," at 22 (Feb. 2003 ed.) (full-text).
- ↑ DHS Privacy Office Annual Privacy Report to Congress, April 2003 to June 2004, App. F, at 49.
- ↑ Id.
See also Edit
Community content is available under CC-BY-SA unless otherwise noted.