U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Cyber Threat

Abbreviation(s) and Synonym(s):

threat

Definition(s):

  Any circumstance or event with the potential to adversely impact organizational operations, organizational assets, individuals, other organizations, or the Nation through a system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
Source(s):
NIST SP 800-128 under threat from NIST SP 800-30
NIST SP 800-161r1 under threat from NIST SP 800-53 Rev. 5
NIST SP 800-172 under threat from NIST SP 800-30 Rev. 1
NIST SP 800-172A under threat from NIST SP 800-30 Rev. 1
NIST SP 800-37 Rev. 2 under threat
NIST SP 800-53 Rev. 5 under threat from NIST SP 800-30 Rev. 1
NIST SP 800-53A Rev. 5 under threat from NIST SP 800-30 Rev. 1
NIST SP 800-171 Rev. 2 under threat from NIST SP 800-30
NIST SP 800-171 Rev. 1 [Superseded] under threat from CNSSI 4009 - Adapted

  See threat.
Source(s):
NIST SP 800-150

  An event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss. Note: The specific causes of asset loss, and for which the consequences of asset loss are assessed, can arise from a variety of conditions and events related to adversity, typically referred to as disruptions, hazards, or threats. Regardless of the specific term used, the basis of asset loss constitutes all forms of intentional, unintentional, accidental, incidental, misuse, abuse, error, weakness, defect, fault, and/or failure events and associated conditions.
Source(s):
NIST SP 800-160 Vol. 1 under threat

  An event or condition that has the potential for causing asset loss and the undesirable consequences or impact from such loss. Note: The specific causes of asset loss, and for which the consequences of asset loss are assessed, can arise from a variety of conditions and events related to adversity, typically referred to as disruptions, hazards, or threats. Regardless of the specific term used, the basis of asset loss constitutes all forms of intentional, unintentional, accidental, incidental, misuse, abuse, error, weakness, defect, fault, and/or failure events and associated conditions.
Source(s):
NIST SP 800-160 Vol. 1 under threat

  Any circumstance or event with the potential to adversely impact organizational operations and assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service.
Source(s):
NIST SP 1800-30B under threat from NIST SP 800-30 Rev. 1 - adapted

  potential cause of an unwanted incident, which may result in harm to a system or organization
Source(s):
NISTIR 8053 under threat from ISO/IEC 27000:2014

  Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
Source(s):
CNSSI 4009-2015 [Superseded] under threat from NIST SP 800-30 Rev. 1

  Any circumstance or event with the potential to harm an information system through unauthorized access, destruction, disclosure, modification of data, and/or denial of service. Threats arise from human actions and natural events.
Source(s):
NIST SP 800-27 Rev. A [Withdrawn] under threat

  The potential for a “threat source” (defined below) to exploit (intentional) or trigger (accidental) a specific vulnerability.
Source(s):
NIST SP 800-33 [Withdrawn] under threat