Cyber Hazard

9 items found. Page 1 of 1.


TL0017
Misconfiguration of software and hardware is the incorrect or suboptimal configuration of an information system or system component that may lead to vulnerabilities (NIST, no date).
TL0018

Conformity assessment: activity that provides demonstration that specified requirements relating to a product, process, system, person or body are fulfilled (NIST Information Technology Laboratory, no date).

For the purposes of this standard, interoperability allows any government facility or information system, regardless of the personal Identity verification (PIV) Issuer, to verify a cardholder’s identity using the credentials on the PIV Card (NIST, no date).

TL0019
Malware is a summary term for different forms of malevolent software designed to infiltrate and infect computers, typically without the knowledge of the owner (ITU, 2008).
TL0020
A data breach is a compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to protected data transmitted, stored, or otherwise processed (ICO, no date).
TL0021
Data security is related to the preservation of data to guarantee availability, confidentiality and data integrity. Data security-related hazards include risks arising from increased system complexity because this provides opportunities for malicious cyberattacks and data loss in the case of serious incidents, including natural disasters (ITU, 2017).
TL0023
A cyber outage is the unavailability of a service or resource (ITU, 1996).
TL0024
A personally identifiable information (PII) breach is a situation where PII is processed in violation of one or more relevant PII protection requirements (ITU, 2018).
TL0025

The Internet of Things (IoT) is a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies (ITU, 2012).

NOTE 1: Through the exploitation of identification, data capture, processing and communication capabilities, the IoT makes full use of things to offer services to all types of applications, while ensuring that security and privacy requirements are fulfilled.

TL0026
Cyberbullying is bullying that takes place using digital devices such as cell/mobile phones, computers, and tablets. Cyberbullying can occur through SMS, e-mail, apps, social media, forums, or gaming when people view, participate in, or share content. Cyberbullying includes the deliberate sending, posting, or sharing of negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying may also be unlawful or criminal behaviour (US Government, 2020).

Is this page useful?

Yes No
Report an issue on this page

Thank you. If you have 2 minutes, we would benefit from additional feedback (link opens in a new window).