Page:Cyber Threats to Elections Lexicon 2018 CTIIC.pdf/21

 

The prevention of cyber action by credibly demonstrating the ability and willingness to deny benefits or impose costs to convince the adversary that restraint will result in better outcomes than will confrontation.



A set of processes and measures to detect, monitor, protect, analyze, and defend against network infiltrations. See Cyber Security.



Activities initiated by the threat actor that temporarily negatively alter or prevent the operation of the victim’s network.



The manipulation, disruption, denial, degradation, or destruction of computers, information or communications systems, networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon.



The intentional clandestine acquisition of information from targeted networks without altering the information or affecting users’ access.



The use of cyber operations to shape the perceptions or behavior of targeted audiences while maintaining plausible deniability.



An umbrella term to describe cyber attack, cyber espionage, cyber influence, or cyber defense, and intrusions or activities with unknown intent.



A global domain within the information environment consisting of the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.