A person gains logical or physical access without permission to a network, system, application, data, or other resource. See NIST SP 800-82 Rev. 2 under Unauthorized ...
An event involving the exposure of information to entities not authorized access to the information. See the following under under Unauthorized disclosure for more information:NIST ...
Information that does not require safeguarding or dissemination controls pursuant to Executive Order (E.O.) 13556 (Controlled Unclassified Information) and has not been determined to require ...
Unified Extensible Firmware Interface (UEFI)A possible replacement for the conventional BIOS that is becoming widely deployed in new x86-based computer systems. The UEFI specifications were ...
A uniform resource identifier, or URI, is a short string containing a name or address which refers to an object in the "web." See NIST SP 800-15 under ...
Universal Serial BusA hardware interface for low-speed peripherals such as the keyboard, mouse, joystick, scanner, printer, and telephony devices. See the following for more information: NIST SP ...
Uniform Resource LocatorA uniform resource locator, or URL, is a short string containing an address which refers to an object in the "web." URLs are ...
An individual (person), organization, device, or process. Used interchangeably with “party”. See the following under Entity for more information: NIST SP 800-56A Rev. 2. NIST SP 800-56B Rev. ...