An attempt by an unauthorized individual to fool a Verifier or a Relying Party into believing that the unauthorized individual in question is the Subscriber.
NIST SP 800-63-2 under Attack [Superseded]
An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity, availability, or confidentiality.
NIST SP 800-82 Rev. 2 under Attack
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
NIST SP 800-12 Rev. 1 under Attack
NIST SP 800-30 Rev. 1 under Attack
The realization of some specific threat that impacts the confidentiality, integrity, accountability, or availability of a computational resource.
NIST SP 800-28 Version 2 under Attack
An unauthorized entity’s attempt to fool a verifier or RP into believing that the unauthorized individual in question is the subscriber.
NIST SP 800-63-3 under Attack