Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

availability

Abbreviation(s) and Synonym(s):

None

Definition(s):

  Ensuring timely and reliable access to and use of information.
Source(s):
FIPS 200 under AVAILABILITY (44 U.S.C., Sec. 3542)
NIST SP 800-137 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-18 Rev. 1 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-30 Rev. 1 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-37 Rev. 1 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-39 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-53 Rev. 4 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-53A Rev. 4 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-60 Vol. 1 Rev. 1 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-60 Vol. 2 Rev. 1 under Availability (44 U.S.C., Sec. 3542)
NIST SP 800-171 Rev. 1 (44 U.S.C., Sec. 3542)
NISTIR 7497 under Availability (44 U.S.C., Sec. 3542)
NISTIR 7621 Rev. 1 under Availability (44 U.S.C., Sec. 3542)

  1. Ensuring timely and reliable access to and use of information.
Source(s):
CNSSI 4009-2015 (44 U.S.C., Sec. 3542)

  2. Timely, reliable access to data and information services for authorized users.
Source(s):
CNSSI 4009-2015 (NSA/CSS Manual Number 3-16 (COMSEC))

  Ensuring timely and reliable access to and use of information. Note: Mission/business resiliency objectives extend the concept of availability to refer to a point-in-time availability (i.e., the system, component, or device is usable when needed) and the continuity of availability (i.e., the system, component, or device remains usable for the duration of the time it is needed).
Source(s):
NIST SP 800-160 [Superseded] (PL 107-347)

  Timely, reliable access to information or a service.
Source(s):
NIST SP 800-152 under Availability

  Ensuring timely and reliable access to and use of information. Note: Mission/business resiliency objectives extend the concept of availability to refer to a point-in-time availability (i.e., the system, component, or device is usable when needed) and the continuity of availability (i.e., the system, component, or device remains usable for the duration of the time it is needed).
Source(s):
NIST SP 800-160 [Superseded] (PL 107-347)

  The security objective that generates the requirement for protection against intentional or accidental attempts to (1) perform unauthorized deletion of data or (2) otherwise cause a denial of service or data.
Source(s):
NIST SP 800-33

  The security goal that generates the requirement for protection against intentional or accidental attempts to (1) perform unauthorized deletion of data or (2) otherwise cause a denial of service or data.
Source(s):
NIST SP 800-27 Rev. A [Withdrawn]

  Timely, reliable access to information by authorized entities.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Availability [Superseded]
NIST SP 800-57 Part 1 Rev. 4 under Availability
NIST SP 800-57 Part 2 under Availability

  The ability for authorized users to access systems as needed.
Source(s):
NIST SP 800-113 under Availability

  the timely, reliable access to data and information services for authorized users.
Source(s):
NIST SP 800-16 under Availability

  As defined in FISMA, the term 'availability' means ensuring timely and reliable access to and use of information.
Source(s):
NIST SP 800-59 under Availability (44 U.S.C., Sec. 3542 (b)(1)(C) )

  The property that data or information is accessible and usable upon demand by an authorized person.
Source(s):
NIST SP 800-66 Rev. 1 under Availability (45 C.F.R., Sec. 164.304)

  Timely, reliable access to data and information services for authorized users.
Source(s):
NIST SP 800-70 Rev. 2 under Availability [Superseded]

  The state that exists when data can be accessed or a requested service provided within an acceptable period of time.
Source(s):
NISTIR 4734 under Availability

  measures an attacker’s ability to disrupt or prevent access to services or data. Vulnerabilities that impact availability can affect hardware, software, and network resources, such as flooding network bandwidth, consuming large amounts of memory, CPU cycles, or unnecessary power consumption.
Source(s):
NISTIR 7946 under Availability