A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

insider threat

Abbreviation(s) and Synonym(s):

None

Definition(s):

  The threat that an insider will use her/his authorized access, wittingly or unwittingly, to do harm to the security of the United States. This threat can include damage to the United States through espionage, terrorism, unauthorized disclosure, or through the loss or degradation of departmental resources or capabilities.
Source(s):
CNSSI 4009-2015 CNSSD No. 504 <span id='term-def-src-src-note-0-0-0'> - Adapted</span>
NIST SP 800-171 Rev. 2
NIST SP 800-171 Rev. 1 [Superseded]

  An entity with authorized access (i.e., within the security domain) that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. 
Source(s):
NIST SP 800-53 Rev. 4 under Insider Threat CNSSI 4009

  An entity with authorized access (i.e., within the security domain) that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service.
Source(s):
NIST SP 800-53 Rev. 4 under Insider Threat CNSSI 4009

  The threat that an insider will use her/his authorized access, wittingly or unwittingly, to do harm to the security of United States. This threat can include damage to the United States through espionage, terrorism, unauthorized disclosure of national security information, or through the loss or degradation of departmental resources or capabilities.
Source(s):
NIST SP 800-53 Rev. 4 under Insider Threat Presidential Memorandum, National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs

  An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service.
Source(s):
NIST SP 800-32 under Inside threat