/ 0 comments

Get Certified Get Ahead

A person gains logical or physical access without permission to a network, system, application, data, or other resource.

See NIST SP 800-82 Rev. 2 under Unauthorized Access (NIST SP 800-61) for more information.

Any access that violates the stated security policy.

See CNSSI 4009-2015 for more information.

Share this Post

Leave a Comment

Your email address will not be published. Required fields are marked *

*
*