Logo


W8MD Diet | COVID-19 portal | Vitamin D | Vaccine | Keto

WikiMD is the world's largest medical encyclopedia with
13,947 pages, 4,144,360 edits & 41,585,119 views.

Free unbiased diet, health and wellness info!

Adequate Security

From WikiMD's free health, diet & wellness encyclopedia
Jump to navigation Jump to search

 – Security commensurate with the risk and the magnitude of harm   resulting from the loss, misuse, or unauthorized access to or   modification of information.   SOURCE: SP 800-53; FIPS 200; OMB Circular A-130, App. III   Security commensurate with the risk and magnitude of harm resulting   from the loss, misuse, or unauthorized access to or modification of   information.   Note: This includes assuring that information systems operate   effectively and provide appropriate confidentiality, integrity, and   availability, through the use of cost-effective management, personnel,   operational, and technical controls.   SOURCE: CNSSI-4009; SP 800-37 Administrative Account – A user account with full privileges on a computer.   SOURCE: SP 800-69 Administrative Safeguards – Administrative actions, policies, and procedures to manage the   selection, development, implementation, and maintenance of security   measures to protect electronic health information and to manage the   conduct of the covered entity's workforce in relation to protecting   that information.   SOURCE: SP 800-66 Advanced Encryption Standard – The Advanced Encryption Standard specifies a U.S. government- (AES) approved cryptographic algorithm that can be used to protect   electronic data. The AES algorithm is a symmetric block cipher that   can encrypt (encipher) and decrypt (decipher) information. This   standard specifies the Rijndael algorithm, a symmetric block cipher   that can process data blocks of 128 bits, using cipher keys with   lengths of 128, 192, and 256 bits.   SOURCE: FIPS 197 5 A U.S. government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Advanced Key Processor (AKP) – A cryptographic device that performs all cryptographic functions for a management client node and contains the interfaces to 1) exchange information with a client platform, 2) interact with fill devices, and 3) connect a client platform securely to the primary services node (PRSN). Advanced Persistent Threats(APT) – An adversary that possesses sophisticated levels of expertise and   significant resources which allow it to create opportunities to achieve   its objectives by using multiple attack vectors (e.g., cyber, physical,   and deception). These objectives typically include establishing and   extending footholds within the information technology infrastructure   of the targeted organizations for purposes of exfiltrating information,   undermining or impeding critical aspects of a mission, program, or   organization; or positioning itself to carry out these objectives in the   future. The advanced persistent threat: (i) pursues its objectives   repeatedly over an extended period of time; (ii) adapts to defenders’   efforts to resist it; and (iii) is determined to maintain the level of   interaction needed to execute its objectives.   SOURCE: SP 800-39 Adversary – Individual, group, organization, or government that conducts or has   the intent to conduct detrimental activities.   SOURCE: SP 800-30 Advisory – Notification of significant new trends or developments regarding the   threat to the information systems of an organization. This   notification may include analytical insights into trends, intentions,   technologies, or tactics of an adversary targeting information   systems.  

 

Adequate Security is part of WikiMD's free ^articles!

^Adequate Security (article) is provided for informational purposes only. No expressed or implied warranties as to the validity of content.
WikiMD is not a substitute for professional advice. By accessing and using WikiMD you agree to the terms of use.
Templates etc. when imported from Wikipedia, are licensed under CC BY-SA 3.0. See full disclaimers.
W8MD weight loss logo

Ad. Tired of being overweight?. W8MD's physician weight loss program can HELP. Tele medicine available