Divulging of, or provision of access to, data.
The part of the ICS used to perform the monitoring and control of the physical process.
A method used to securely exchange or establish secret keys across an insecure network.
A memorized secret typically consisting of only decimal digits.
The unauthorized transfer of information from an information system.
The practice of gathering, retaining, and analyzing computer-related data for investigative purposes
A computer network, especially one based on Internet technology
A name assigned through a formal process by a federal department or agency to a federal employee for the purpose of the employee’s protection
A computer network that an organization uses for application data traffic between the organization and its business partners.
Awareness is not training.
Pre-established layout for data.
A global domain within the information environment consisting of the interdependent network
Converting each log data field to a particular data representation and categorizing it consistently.
Parsing a log in one format and storing its entries in a second format.
A single secret key used by IPsec endpoints to authenticate endpoints to each other
In a service-oriented architecture, a specification of the operations that a service offers its clients.
The property that data originated from its purported source.
Dummy letter, letter symbol, or code group inserted into an encrypted message to delay or prevent its decryption
Classification reflecting the highest classification being processed in an information system.
A PIV algorithm identifier is a one-byte identifier that specifies a cryptographic algorithm and key size.
Requires agencies to integrate IT security into their capital planning and enterprise architecture processes at the agency
The process of transforming ciphertext into plaintext using a cryptographic algorithm and key.
Information elements collated on a number of individuals, typically used for the purposes of making comparisons or identifying patterns.
A trusted entity that provides on-line verification to a Relying Party of a subject certificate’s trustworthiness
Process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat.
Set of assurance requirements that represent a point on the Common Criteria predefined assurance scale.
Point at which an enclave’s internal network service layer connects to an external network’s service layer