Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Glossary

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z  |  Symbols

Adequate Security

Acronym(s):

None

Definition(s):

  Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.
Source(s): FIPS 200 (OMB Circular A-130, Appendix III)
CNSSI 4009-2015 (OMB Circular A-130)
NIST SP 800-128 (OMB Circular A-130, Appendix III)
NIST SP 800-18 Rev. 1 (OMB Circular A-130, Appendix III)
NIST SP 800-53A Rev. 4 (OMB Circular A-130, Appendix III)

  Security commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that systems and applications operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, acquisition, development, installation, operational, and technical controls.
Source(s): NIST SP 800-16

  Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information. This includes assuring that systems and applications used by the agency operate effectively and provide appropriate confidentiality, integrity, and availability, through the use of cost-effective management, personnel, operational, and technical controls.
Source(s): NIST SP 800-37 Rev. 1 (OMB Circular A-130, Appendix III)
NIST SP 800-137 (OMB Circular A-130, Appendix III)

  Security commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.
Source(s): NIST SP 800-39 (OMB Circular A-130, Appendix III)
NIST SP 800-30 (OMB Circular A-130, Appendix III)

  Security commensurate with the risk resulting from the loss, misuse, or unauthorized access to or modification of information.
Source(s): NIST SP 800-53 Rev. 4 (Adapted from OMB Circular A-130, Appendix III)

Synonym(s):

None

See Also:

None