Term
|
Definition
|
|
Term
|
Definition
Restrict the ability of unknown or unauthorized users to view or use information, hosts, or networks. |
|
|
Term
|
Definition
Ensures that a system and its data are not illicitly modified or corrupted by malicious code. |
|
|
Term
|
Definition
Help administrators to perform investigations during and after a cyber attack. |
|
|
Term
Configuration management and assurance |
|
Definition
Help administrators view and change the security settings on their hosts and networks, verify the correctness of security settings, and maintain operations in a secure fashion under conditions of duress. |
|
|
Term
How many safeguards can the federal government deploy? In order to minimize the risk of cyber breaches? |
|
Definition
|
|
Term
|
Definition
establish users’ identities through an integrated circuit chip in a portable device such as a smart card or a time. |
|
|
Term
|
Definition
and security event correlation tools—which monitor and document actions on network devices and analyze the actions to determine if an attack is ongoing or has occurred. |
|
|
Term
Factors determining a successful implementation of these safeguards: |
|
Definition
implementing technologies through a layered, defense-in-depth strategy |
|
|
Term
Factors determining a successful implementation of these safeguards: |
|
Definition
considering the agency’s unique information technology infrastructure when selecting technologies. |
|
|
Term
Factors determining a successful implementation of these safeguards: |
|
Definition
utilizing results of independent testing when assessing the technologies’ capabilities |
|
|
Term
Factors determining a successful implementation of these safeguards: |
|
Definition
training staff on the secure implementation and utilization of these technologie |
|
|
Term
Factors determining a successful implementation of these safeguards: |
|
Definition
Factors determining a successful implementation of these safeguards: |
|
|