A computer program that can run independently, can propagate a complete working
Any device that can connect to an ICS network via radio or infrared waves
Finding relationships between two or more log entries. See NIST SP 800-92
The process of discovering active and responding hosts on a network
A code computed from data and comprised of redundant bits of information
Process intended to render magnetically stored information irretrievable by normal means.
A person authorized by an FCKMS service provider or FCKMS service
A weighted factor based on a subjective analysis of the probability that a given threat
Official with statutory or operational authority for specified information
Access to an organizational information system by a user (or an information system)
Non-volatile memory that is writable.
NIST SP 800-101 Rev. 1
The process of identifying risks to organizational operations, organizational assets,
An attack in which the Attacker is able to replay previously captured messages
An authentication and encryption protocol widely implemented in browsers
The means used to confirm the identity of a user, processor, or device
Threat information that has been aggregated, transformed, analyzed, interpreted
A token or packet of information that is used to provide assurance of timeliness
A security control that is implemented in an information system
Updated code from Microsoft that addresses a specific security problem.
The time or phase difference between the data signal and the ideal clock.
The high-level policy of an organization that specifies what information is to be collected
The intentional or unintentional release of information to an untrusted environment.
Individually Identifiable Health Information Information that is a subset of health information
A public key and its corresponding private key; a key pair is used with a public key
Changing the key, i.e., replacing it by a new key. The places that use the key or keys
An information system used to control industrial processes such as manufacturing
A function in the lifecycle of keying material; mechanisms and processes