Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, (more…)

System Security Plan

The formal document prepared by the information system owner (or common security controls owner for inherited controls) that provides an (more…)

Supply Chain Attack

Attacks that allow the adversary to utilize implants or other vulnerabilities inserted prior to installation in order to infiltrate data, (more…)