Threat
Contents
- 1 CNSSI 4009
- 2 FIPS 200
- 3 NIST SP 800-16
- 4 NIST SP 800-18r1
- 5 NIST SP 800-26
- 6 NIST SP 800-27rA
- 7 NIST SP 800-28v2
- 8 NIST SP 800-30
- 9 NIST SP 800-32
- 10 NIST SP 800-33
- 11 NIST SP 800-37
- 12 NIST SP 800-40
- 13 NIST SP 800-47
- 14 NIST SP 800-53AdF
- 15 NIST SP 800-53r1
- 16 NIST SP 800-53r2
- 17 NIST SP 800-57P2
- 18 NIST SP 800-61
- 19 NIST SP 800-61r1
- 20 NIST SP 800-66
CNSSI 4009
Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
FIPS 200
Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability. (CNSS Instruction 4009 Adapted)
NIST SP 800-16
An activity, deliberate or unintentional, with the potential for causing harm to an automated information system or activity.
NIST SP 800-18r1
Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. (CNSS Inst. 4009, Adapted)
NIST SP 800-26
Threat is an event or activity, deliberate or unintentional, with the potential for causing harm to an IT system or activity.
NIST SP 800-27rA
Any circumstance or event with the potential to harm an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. Threats arise from human actions and natural events.
NIST SP 800-28v2
A possible danger to a computer system, which may result in the interception, alteration, obstruction, or destruction of computational resources, or other disruption to the system.
NIST SP 800-30
The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.
NIST SP 800-32
Any circumstance or event with the potential to cause harm to an information system in the form of destruction, disclosure, adverse modification of data, and/or denial of service. (NS4009)
NIST SP 800-33
The potential for a "threat source" (defined below) to exploit (intentional) or trigger (accidental) a specific vulnerability.
NIST SP 800-37
Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. (CNSS Inst. 4009, Adapted)
NIST SP 800-40
Any circumstance or event, deliberate or unintentional, with the potential for causing harm to a system.
NIST SP 800-47
The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.
NIST SP 800-53AdF
Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. [CNSS Inst. 4009, Adapted]
NIST SP 800-53r1
Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
NIST SP 800-53r2
Any circumstance or event with the potential to adversely impact agency operations (including mission, functions, image, or reputation), agency assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. (CNSS Inst. 4009, Adapted)
NIST SP 800-57P2
Any circumstance or event with the potential to adversely impact agency operations (including mission function, image, or reputation), agency assets or individuals through an information system via unauthorized access, destruction, disclosure, modification of data, and/or denial of service (SP800-53).
NIST SP 800-61
The potential source of an adverse event.
NIST SP 800-61r1
The potential source of an adverse event.
NIST SP 800-66
The potential for a threat source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability. (NIST SP 800-30)
- CNSS
- CNSSI 4009 Terms
- NIACAP
- DIACAP
- FIPS 200 Terms
- NIST SP 800-16 Terms
- NIST SP 800-18r1 Terms
- NIST SP 800-26 Terms
- NIST SP 800-27rA Terms
- NIST SP 800-28v2 Terms
- NIST SP 800-30 Terms
- NIST SP 800-32 Terms
- NIST SP 800-33 Terms
- NIST SP 800-37 Terms
- NIST SP 800-40 Terms
- NIST SP 800-47 Terms
- NIST SP 800-53AdF Terms
- NIST SP 800-53r1 Terms
- NIST SP 800-53r2 Terms
- NIST SP 800-57P2 Terms
- NIST SP 800-61 Terms
- NIST SP 800-61r1 Terms
- NIST SP 800-66 Terms
- Terms