Page:Cyber Threats to Elections Lexicon 2018 CTIIC.pdf/22

From Wikisource
Jump to navigation Jump to search
This page has been validated.

Cyber Security
The protection of information systems against unauthorized access to or modification of information contained therein, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. Also known as network security. See Cyber Defense.

Cyber Threat
Cyber operations or noncyber actions (intentional or accidental) that compromise the confidentiality, integrity, reliability, or availability of digital devices, systems, networks, or data.

Cyber Threat Intelligence
The collection, processing, analysis, and dissemination of information from all sources of intelligence on foreign actors’ cyber programs, intentions, capabilities, research and development, tactics, operational activities and indicators, and their impact or potential effects on US national security interests. Cyber threat intelligence also includes information on cyber threat actor information systems, infrastructure, and data; and network characterization or insight into the components, structures, use, and vulnerabilities of foreign cyber program information systems.

Data Integrity
A performance measure or service that ensures data has not been accidentally or maliciously modified, altered, or destroyed.

Database
A structured collection of data that is organized to provide efficient retrieval.

Destroy (Hardware/Software/Data)
Permanently, completely, and irreparably damage a victim’s physical or virtual computer or information system(s), network(s), and/or data stores; for example, system administrators discover permanent unexplained damage to portions of the information system, or system users discover that data or files have been inappropriately corrupted or deleted.

Digital/Electronic Signature
Any mark in electronic form associated with an electronic document, applied with the intent to digitally sign the document.