U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

cybersecurity

Definition(s):

  Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.
Source(s):
CNSSI 4009-2015 from NSPD-54/HSPD-23
NIST SP 800-37 Rev. 2
NIST SP 800-160 Vol. 2 from CNSSI 4009-2015
NIST SP 800-53 Rev. 5 from OMB Circular A-130 (2016)
NIST SP 1800-25B under Cybersecurity from CNSSI 4009-2015, NSPD-54/HSPD-23
NIST SP 1800-26B under Cybersecurity from CNSSI 4009-2015, NSPD-54/HSPD-23
NISTIR 7621 Rev. 1 under Cybersecurity from CNSSI 4009-2015

  The process of protecting information by preventing, detecting, and responding to attacks.
Source(s):
NIST SP 800-160 Vol. 2 from NIST Cybersecurity Framework Version 1.1
NISTIR 8183 under Cybersecurity from NIST Cybersecurity Framework Version 1.1, NIST Cybersecurity Framework Version 1.0
NISTIR 8183A Vol. 1 under Cybersecurity from NIST Cybersecurity Framework Version 1.1
NISTIR 8183A Vol. 2 under Cybersecurity from NIST Cybersecurity Framework Version 1.1
NISTIR 8183A Vol. 3 under Cybersecurity from NIST Cybersecurity Framework Version 1.1
NIST Cybersecurity Framework Version 1.1 under Cybersecurity
NISTIR 8183 Rev. 1 under Cybersecurity from NIST Cybersecurity Framework Version 1.1

  The ability to protect or defend the use of cyberspace from cyber attacks.
Source(s):
NISTIR 8170 under Cybersecurity from CNSSI 4009

  the prevention of damage to, unauthorized use of, exploitation of, and—if needed—the restoration of electronic information and communications systems, and the information they contain, in order to strengthen the confidentiality, integrity and availability of these systems.
Source(s):
NISTIR 8074 Vol. 2 under Cybersecurity

  Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. For example, PNT data is generated by cyber systems. Protection of the devices and systems used to generate PNT data should be considered part of cybersecurity.
Source(s):
NISTIR 8323 under Cybersecurity from NIST SP 800-53 Rev. 5