در حوزه امنیت اطلاعات، ریسک قابل قبول به سطحی از ریسک اشاره دارد که سازمان حاضر است آن را برای دستیابی به اهداف خود بپذیرد. این مفهوم بر اساس این واقعیت است که حذف تمامی ریسکها غیرممکن است. تصمیمگیری در مورد ریسکهای قابل قبول شامل ارزیابی ریسکها و کاهش آنها میشود، اما برخی ریسکهای باقیمانده به دلیل میزان پذیرش ریسک سازمان و منابع و نیازهای عملیاتی آن، قابل پذیرش هستند.
A risk that is understood and tolerated by a system's user, operator, owner, or accreditor, usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss.
Acceptable risk is the level of risk at which, given costs and benefits associated with risk reduction measures, no action is deemed to be warranted at a given point in time.
Source: DHS [18]
Acceptable risk: the level of Residual Risk that has been determined to be a reasonable level of potential loss/disruption for a specific IT system.
Source: NIST SP 800-16
- ENISA
Acceptable risk is the level of Residual Risk that has been determined to be a reasonable level of potential loss/disruption for a specific system.
-
ریسک قابل قبول در سازمانها بر اساس معیارهای سازمان و هزینههای عملیاتی تعیین میشود.
-
Definitions vary across organizations but revolve around the idea of tolerable residual risk.
-
The cost-benefit analysis plays a crucial role in determining acceptable risk.
Accessibility در امنیت اطلاعات به توانایی دسترسی به اطلاعات و منابع سیستم در زمان و مکان مورد نیاز اشاره دارد. این مفهوم در بر گیرنده این است که اطلاعات و خدمات برای کاربران مجاز در دسترس و قابل استفاده باشد، حتی در زمان وقوع شرایط اضطراری یا خرابی سیستم. این موضوع اهمیت ویژهای در سازمانها دارد زیرا دسترسی ناپایدار میتواند باعث کاهش بهرهوری و ایجاد خطرات امنیتی شود.
Accessibility refers to the availability of information and services to authorized users when required, ensuring continuity in case of system failure or emergencies.
The ability of a system or resource to be used or accessed by authorized users whenever needed, particularly during times of emergency or disruption.
Accessibility is the assurance that authorized users are able to access resources or services as intended without delays, ensuring minimal interruptions.
- دسترسی باید در تمامی شرایط، حتی در موارد اضطراری، برای کاربران مجاز تضمین شود.
- Continuity in service and resource availability is crucial for operational efficiency and security.
- Accessibility failures can lead to security breaches or reduced organizational productivity.
- Ensuring that all critical systems remain accessible during disasters or emergencies helps prevent downtime.
- Accessibility is closely related to availability, as both aim to guarantee system uptime for authorized users.
An accident is an unplanned and undesired loss event.
در زمینههای غیر امنیت اطلاعات، حادثه به هر رویداد برنامهریزی نشدهای اطلاق میشود که منجر به پیامدهای ناخواسته یا غیرمنتظره شود، از جمله خطاهای عملیاتی، نقص تجهیزات و سایر وقایع که ممکن است پیامدهای ناچیز یا جدی در زمینه حفاظت یا ایمنی داشته باشند.
در حوزه امنیت اطلاعات، حادثه به هر رویداد ناخواسته یا غیرمنتظرهای اشاره دارد که باعث بروز اختلال یا آسیب به یک سیستم، دادهها یا خدمات میشود. این شامل خطاهای عملیاتی، نقصهای فنی، یا حوادثی است که میتواند به از دست دادن اطلاعات یا آسیب به زیرساختهای حساس منجر شود.
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
-
‘Incident’ means an event compromising the availability, authenticity, integrity, or confidentiality of stored, transmitted, or processed data or of the services offered by, or accessible via, network and information systems.
-
‘Incident’ means an event which has the potential to significantly disrupt, or that disrupts, the provision of an essential service, including when it affects the national systems that safeguard the rule of law.
-
‘Incident’ means any event compromising the availability, authenticity, integrity, or confidentiality of stored, transmitted, or processed data or of the related services offered by, or accessible via, network and information systems.
-
Incident means any event having the potential to disrupt, or that disrupts, the operations of the critical entity.
-
Incident means any event having an actual adverse effect on the security of network and information systems.
- Incident is an event that has been assessed as having an actual or potentially adverse effect on the security or performance of a system.
- Incident is an occurrence, caused by either human action or natural phenomenon, that may cause harm and require action, which can include major disasters, emergencies, terrorist attacks, terrorist threats, wild and urban fires, floods, hazardous materials spills, nuclear accidents, aircraft accidents, earthquakes, hurricanes, tornadoes, tropical storms, war-related disasters, public health and medical emergencies, cyber attacks, cyber failure/accident, and other occurrences requiring an emergency response.
- Cyber incident: An event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information, or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon. For purposes of this directive, a cyber incident may include a vulnerability in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.
- Cyber incident: is defined as a cyber event that jeopardizes the cybersecurity of an information system or the information the system processes, stores, or transmits; or an event that violates security policies, procedures, or acceptable use policies, whether resulting from malicious activity or not.
- Incident is an occurrence that (A) actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information or an information system; or (B) constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies.
- Incident: An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits, or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.
-
“Sicherheitsvorfall“ ein Ereignis, das die Verfügbarkeit, Authentizität, Integrität oder Vertraulichkeit gespeicherter, übermittelter oder verarbeiteter Daten oder der Dienste, die über Netz- und Informationssysteme angeboten werden bzw. zugänglich sind, beeinträchtigt.
-
“Sicherheitsvorfall“ ein Ereignis, das die Erbringung eines wesentlichen Dienstes erheblich stört oder stören könnte, einschließlich einer Beeinträchtigung der nationalen Systeme zur Wahrung der Rechtsstaatlichkeit.
-
“Sicherheitsvorfall“ alle Ereignisse, die tatsächlich nachteilige Auswirkungen auf die Sicherheit von Netz- und Informationssystemen haben.
- Event that might be, or could lead to, an operational interruption, disruption, loss, emergency or crisis.
- Situation that might be, or could lead to, a disruption, loss, emergency or crisis.
- An event that has the potential to cause interruption, disruption, loss, emergency, crisis, disaster, or catastrophe.
در زمینههای غیر امنیت اطلاعات، حادثه یا رویداد به هر اتفاق ناخواسته یا غیرمنتظرهای اشاره دارد که باعث اختلال در ارائه خدمات حیاتی یا عملکرد یک سیستم میشود. این شامل خطاهای عملیاتی، نقص تجهیزات، یا رویدادهایی است که به دلیل عملکرد نامناسب ممکن است بر ایمنی یا قابلیت اطمینان سیستمها تأثیر بگذارد.
در حوزه امنیت اطلاعات، حادثه به هر رویدادی اشاره دارد که بر محرمانگی، یکپارچگی، یا دسترسیپذیری اطلاعات یا سیستمهای اطلاعاتی تأثیر منفی داشته باشد. این میتواند شامل نقصهای امنیتی، حملات سایبری، یا هرگونه تهدیدی باشد که به زیرساختهای حساس آسیب برساند.
- Definitions across different sectors, regions, and standards organizations are consistent in emphasizing that an incident typically involves a compromise in availability, authenticity, integrity, or confidentiality.
- Both IS and non-IS incidents share common themes of disruption and harm, although the specific details vary according to context (e.g., cyber incidents vs. natural disaster incidents).
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...
Details to be added...