expand for answer

Threat perspective

The perspective from which vulnerability/threat analyses are conducted (system owner, administrator, certifier, customer, etc. ); also referred to as risk dimension.


Similar items:
A program used to detect weaknesses within an organization. Vulnerability scans and vulnerability assessments are two common elements of a vulnerability management program. Vulnerability scans are technical scans performed regularly, and vulnerability assessments are normally combined with a risk assessment.
[view]
Possibility that a particular threat will adversely impact an information system by exploiting a particular vulnerability. The likelihood that any specific threat will exploit a specific vulnerability to cause harm to an asset. Risk is an assessment of probability, possibility, or chance. Risk = threat - vulnerability. The probability that a particular security threat will exploit a particular vulnerability.
[view]
<p>System Owner selects and documents the security controls for the system.<br>The system owner specifies the information security controls for the system being deployed based on functional requirements from the information owner.</p>
[view]
(1) A person who is in charge of defining and managing the contents of a database. (2) The individual in an organization who is responsible for the daily monitoring and maintenance of the databases. The database administrator’s function is more closely associated with physical database design than the data administrator’s function is.
[view]
The review conducted by the DAA, Certifier, program manager, and user representative to review and approve all information contained in the System Security Authorization Agreement (SSAA). The CRR is conducted before the end of Phase 1.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in