翻訳と辞書
Words near each other
・ Threads (Temposhark album)
・ Threads of Fate
・ Threads of Life
・ Threads of Time
・ Threads of Time (album)
・ ThreadSafe
・ Threadsafe
・ Threadtail conger
・ ThreadWeaver
・ Threadworm
・ ThreadX
・ Threapland
・ Threapland, Cumbria
・ Threapwood
・ Threat
Threat (computer)
・ Threat (disambiguation)
・ Threat (film)
・ Threat and error management
・ Threat assessment
・ Threat level
・ Threat Level Midnight
・ Threat Management Unit
・ Threat Matrix
・ Threat Matrix (database)
・ Threat model
・ Threat of force (public international law)
・ Threat of the Dnieper reservoirs
・ Threat or menace
・ Threat series


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Threat (computer) : ウィキペディア英語版
Threat (computer)
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible harm.
A threat can be either "intentional" (i.e., intelligent; e.g., an individual cracker or a criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event.〔Internet Engineering Task Force RFC 2828 Internet Security Glossary〕
==Definitions==
ISO 27005 defines threat as:〔
:''A potential cause of an incident, that may result in harm of systems and organization''
A more comprehensive definition, tied to an Information assurance point of view, can be found in "''Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems''" by NIST of United States of America〔(【引用サイトリンク】title=Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems )
:''Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability''.
National Information Assurance Glossary defines threat as:
:''Any circumstance or event with the potential to adversely impact an IS through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.''
ENISA gives a similar definition:
:''Any circumstance or event with the potential to adversely impact an asset () through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.''
The Open Group defines threat in 〔Technical Standard Risk Taxonomy ISBN 1-931624-77-1 Document Number: C081 Published by The Open Group, January 2009.〕 as:
:''Anything that is capable of acting in a manner resulting in harm to an asset and/or organization; for example, acts of God (weather, geological events,etc.); malicious actors; errors; failures''.
Factor analysis of information risk defines threat as:
:''threats are anything (e.g., object, substance, human, etc.) that are capable of acting against an asset in a manner that can result in harm. A tornado is a threat, as is a flood, as is a hacker. The key consideration is that threats apply the force (water, wind, exploit code, etc.) against an asset that can cause a loss event to occur.''
National Information Assurance Training and Education Center gives a more articulated definition of threat:
〔Schou, Corey (1996). Handbook of INFOSEC Terms, Version 2.0. CD-ROM (Idaho State University & Information
Systems Security Organization)〕
:''The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifest. Categorize and classify threats as follows: Categories Classes Human Intentional Unintentional Environmental Natural Fabricated 2. Any circumstance or event with the potential to cause harm to a system in the form of destruction, disclosure, modification or data, and/or denial of service. 3. Any circumstance or event with the potential to cause harm to the ADP system or activity in the form of destruction, disclosure, and modification of data, or denial of service. A threat is a potential for harm. The presence of a threat does not mean that it will necessarily cause actual harm. Threats exist because of the very existence of the system or activity and not because of any specific weakness. For example, the threat of fire exists at all facilities regardless of the amount of fire protection available. 4. Types of computer systems related adverse events (i. e. , perils) that may result in losses. Examples are flooding, sabotage and fraud. 5. An assertion primarily concerning entities of the external environment (agents); we say that an agent (or class of agents) poses a threat to one or more assets; we write: T(e;i) where: e is an external entity; i is an internal entity or an empty set. 6. An undesirable occurrence that might be anticipated but is not the result of a conscious act or decision. In threat analysis, a threat is defined as an ordered pair, , suggesting the nature of these occurrences but not the details (details are specific to events). 7. A potential violation of security. 8. A set of properties of a specific external entity (which may be either an individual or class of entities) that, in union with a set of properties of a specific internal entity, implies a risk (according to some body of knowledge).''

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Threat (computer)」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.