Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
A
A1
AC
ACD
ACK
ACL
ACU
A-D
Ada
ADC
ADH
ADM
ADP
AE
AES
AFJ
AFR
AI
AIG
AIN
AIS
AJ
AK
AKM
ALC
ALE
ALU
AMA
AMI
AMS
ANI
AOS
AP
APC
APD
APL
App
APU
AR
Arg
ARQ
ARS
ASU
AV
AVP
B
B
B1
B2
B3
BBS
BCC
BCD
BCI
Bd
BER
Bit
BIU
BPI
BPS
BR
BSA
BSE
Bug
Bus
BW
C
C*
C1
C2
C3
C3I
C4
CA
Can
Cat
CBA
CBC
CCB
CCI
CCO
CDR
CDS
CF
CFD
CFE
CI
CIA
CIK
CIP
CK
CKG
CKL
CM
CMP
CMS
CN
CNK
COR
CPC
Cpi
CPS
CPU
CRB
CRC
CRO
CRP
CSA
CSC
CSE
CSM
CSO
CSS
CTY
CUP
CVA
CWC
D
D&V
D-A
DAA
DAC
DAU
DC
DCA
DCP
DCS
Dd
DDD
DDN
DDS
DDT
DEC
DED
DES
DF
DIB
DID
Die
DIP
DLE
DMA
DO
Doc
DOD
DOE
DON
DOS
DP
DPB
DPL
DS
DSN
DSU
DTD
DTE
DTS
DUA
E
EAM
EAP
ECM
EDM
EEI
EFD
EFT
EIF
EMS
ENQ
EOF
EOL
EOT
EOU
EPL
Era
ES
ESS
ETB
ETL
ETX
EV
Exa
EXE
F
Fan
FAQ
FAX
FCA
FDM
FEC
FER
FIN
Fix
FOI
FQR
FQT
FRD
Fry
FSD
FTS
H
H
Hat
HCF
HD
HDM
Hex
HF
HLL
Hog
HOL
Hop
HSM
HUS
Hz
I
I&A
I/O
IAC
Ice
ICU
IDN
IDS
IFF
II
IIS
IKE
ILS
IM
IMP
IN
Inc
INF
IOC
IP
IPC
IPM
IRC
IRK
IRM
IS
ISM
ISO
ISS
IT
ITF
ITM
ITS
L
LAN
LDB
LER
LKG
LLC
LMD
LME
LMI
Log
LOS
LP
LPC
LPD
LPI
LPT
Ls
LSI
M
M
MAC
MAN
MD5
MDC
Meg
MEP
MER
Mgt
MHS
MHz
MI
MIB
MLS
MOA
Mod
MOE
MOP
MOU
MRK
MRT
MSE
MTR
MTT
Mu
MUD
MUX
Mw
N
N
NAK
NAR
NBH
NCA
NCC
NCS
NEC
Net
NID
NII
NIL
NIU
NM
NP
NRZ
NSA
NSD
NSI
NSM
NSO
NSP
NTI
NTM
NTN
NXX
O
O&M
Ob
OCR
OEM
OMB
ONA
OPI
OPM
OPT
OR
ORD
OS
OSI
OSU
OTP
OTT
P
P&D
P3P
PA
PAA
PAD
PAE
PAL
PAP
PAX
PBD
PBX
PC
PCA
PCS
PCZ
PD
Pdl
PDN
PDR
PDS
PDU
PES
PIP
PIX
PKA
PKC
PL
PLA
PM
PMD
PMO
PMP
Pod
POM
Pop
PPL
PPN
PPS
Ps
PSL
PSN
PTR
PTT
PUC
PUT
PVC
PWA
PX
R
R&D
RAC
RAM
RAT
RC4
RD
RED
REL
RF
RFC
RFE
RFP
RKV
RL
RMR
RO
ROM
RPM
RQT
RSA
Rsh
RSN
RTI
RTM
RTS
Run
RWX
S
S
S&T
SAO
SAP
SAV
Say
SCG
SCI
SCP
SDR
Set
S-F
SFA
SI
SIG
SMM
SMO
SMU
SO
SOH
SON
SOS
SOW
SPK
Spl
SPO
SPS
Spy
SRI
SRP
SRR
SSE
SSO
SSR
STD
STI
STS
STU
STX
SUB
SYN
T
T&E
TA
TAG
Tap
Tar
TCB
TCD
TCS
TCU
TD
TDM
TED
Tee
TEI
TEK
TEP
TFM
TFS
TLA
TLS
TMC
TNI
Toy
TPC
TPI
TRB
TRR
TSK
Tty
TV
TWX
U
U
UA
UBD
UIS
UK
Up
UPP
URL
UV
W
WAN
Win
WPA
Threat
  • The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows:Categories ClassesHuman Intentional Unintentional Environmental Natural Fabricated(AFR 205-16;; AFR 700-10;) 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. (NCSC-WA-001-85;) 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. (OPNAVINST 5239. 1A;; AR 380-380;) 4. Types of computer systems related adverse events (i. e. , perils) that may result in losses. Examples are flooding, sabotage and fraud. (WB;) 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. (ET;) 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair, <peril; asset category>, suggesting the nature of these occurrences but not the details (details are specific to events). (RM;) 7. A potential violation of security. (SS;) 8. A set of properties of a specific external entity (which may be either an individual or class of entities) that, in union with a set of properties of a specific internal entity, implies a risk (according