U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

Threat Assessment/Analysis

Abbreviation(s) and Synonym(s):

threat analysis

Definition(s):

  Process of formally evaluating the degree of threat to an information system or enterprise and describing the nature of the threat.
Source(s):
CNSSI 4009-2015 under threat assessment
NIST SP 800-161 from CNSSI 4009, NIST SP 800-53A Rev. 4
NIST SP 800-30 Rev. 1 under Threat Assessment from CNSSI 4009
NIST SP 800-39 under Threat Assessment from CNSSI 4009
NIST SP 800-53A Rev. 4 under Threat Assessment from CNSSI 4009
NISTIR 7622 from CNSSI 4009, NIST SP 800-53A

  Formal description and evaluation of threat to an information system.
Source(s):
NIST SP 800-18 Rev. 1 under Threat Assessment from CNSSI 4009
NIST SP 800-53 Rev. 5 under threat assessment from CNSSI 4009-2015
NIST SP 800-53 Rev. 4 [Superseded] under Threat Assessment from CNSSI 4009

  See threat assessment.
Source(s):
CNSSI 4009-2015 under threat analysis

  Assessment to evaluate the actual or potential effect of a threat to a system. Note: The threat assessment may include identifying and describing the nature of the threat.
Source(s):
NIST SP 800-160 Vol. 1 under threat assessment

  Assessment to evaluate the actual or potential effect of a threat to a system. Note: The threat assessment may include identifying and describing the nature of the threat.
Source(s):
NIST SP 800-160 Vol. 1 under threat assessment

  The examination of threat sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment.
Source(s):
NIST SP 800-27 Rev. A [Withdrawn] under threat analysis
NIST SP 800-33 [Withdrawn] under threat analysis