U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

attack

Abbreviation(s) and Synonym(s):

Definition(s):

  Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Source(s):
CNSSI 4009-2015
NIST SP 800-12 Rev. 1 under Attack from CNSSI 4009
NIST SP 800-30 Rev. 1 under Attack from CNSSI 4009
NISTIR 8323r1 from CNSSI 4009-2015
NISTIR 8401

  An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.
Source(s):
NIST SP 1800-10B under Cyber Attack from NIST SP 800-30 Rev. 1
NIST SP 800-30 Rev. 1 under Cyber Attack from CNSSI 4009
NIST SP 800-39 under Cyber Attack from CNSSI 4009

  An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity, availability, or confidentiality.
Source(s):
NIST SP 800-82 Rev. 2 under Attack from CNSSI 4009

  The realization of some specific threat that impacts the confidentiality, integrity, accountability, or availability of a computational resource.
Source(s):
NIST SP 800-28 Version 2 under Attack

  An unauthorized entity’s attempt to fool a verifier or RP into believing that the unauthorized individual in question is the subscriber.
Source(s):
NIST SP 800-63-3 under Attack