access
- The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.access control
- The process of granting or denying specific requests for or attempts to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities.access control mechanism
- Security measures designed to detect and deny unauthorized access and permit authorized access to an information system or a physical facility.active attack
- An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources, its data, or its operations.active content
- Software that is able to automatically carry out or trigger actions without the explicit intervention of a user.advanced persistent threat
- An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).adversary
- An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.AIaaS (Artificial Intelligence as a Service)
- a cloud-based service offering artificial intelligence (AI) outsourcingair gap
- To physically separate or isolate a system from other systems or networks (verb).alert
- A notification that a specific attack has been detected or directed at an organization’s information systems.all source intelligence
- In the NICE Framework, cybersecurity work where a person: Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.allowlist
- A list of entities that are considered trustworthy and are granted access or privileges.analyze
- A NICE Framework category consisting of specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.anonymizers
- an anonymous proxy is a tool that attempts to make activity on the Internet untraceableanti-CSRF (Anti – Cross-Site Request Forgery)
- related pairs of tokens given to users to validate their requests and prevent issue requests from attackers via the victimantispyware software
- A program that specializes in detecting and blocking or removing forms of spyware.antivirus software
- A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.AppSec
- the process of finding, fixing, and preventing security vulnerabilities at the application level, as part of the software development processesasset
- A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.attack
- An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.attack method
- The manner or technique and means an adversary may use in an assault on information or an information system.attack path
- The steps that an adversary takes or may take to plan, prepare for, and execute an attack.attack pattern
- Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation.attack signature
- A characteristic or distinctive pattern that can be searched for or that can be used in matching to previously identified attacks.attack surface
- The set of ways in which an adversary can enter a system and potentially cause damage.attacker
- An individual, group, organization, or government that executes an attack.authentication
- The process of verifying the identity or other attributes of an entity (user, process, or device).authenticity
- A property achieved through cryptographic methods of being genuine and being able to be verified and trusted, resulting in confidence in the validity of a transmission, information or a message, or sender of information or a message.authorization
- A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.availability
- The property of being accessible and usable upon demand.