Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

compromise

Definitions:

  A judgment, based on the preponderance of the evidence, that a disclosure of information to unauthorized persons or a violation of the security policy for a system in which unauthorized, intentional or unintentional disclosure, modification, destruction, or loss of an object has occurred.
Sources:
CNSSI 4009-2015

  The disclosure of classified data to persons not authorized to receive that data.
Sources:
CNSSI 4009-2015 from NSA/CSS Manual Number 3-16 (COMSEC)

  The unauthorized disclosure, modification, substitution, or use of sensitive data (e.g., keys, metadata, or other security-related information) or the unauthorized modification of a security-related system, device or process in order to gain unauthorized access.
Sources:
NIST SP 800-152 under Compromise (noun)

  To reduce the trust associated with a key, its metadata, a system, device or process.
Sources:
NIST SP 800-152 under Compromise (verb)

  Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred.
Sources:
NIST SP 1800-25B under Compromise
NIST SP 1800-26B under Compromise

  The unauthorized disclosure, modification, substitution, or use of sensitive information (e.g., a secret key, private key or secret metadata).
Sources:
NIST SP 800-57 Part 2 Rev.1 under Compromise

  The unauthorized disclosure, modification, substitution, or use of sensitive data (e.g., a secret key, private key, or secret metadata).
Sources:
NIST SP 800-175B Rev. 1 under Compromise

  The unauthorized disclosure, modification, substitution or use of sensitive key information (e.g., a secret key, private key, or secret metadata).
Sources:
NIST SP 800-57 Part 1 Rev. 5 under Compromise

  The unauthorized disclosure, modification, or use of sensitive data (e.g., keying material and other security-related information).
Sources:
NIST SP 800-133 Rev. 2 under Compromise