Question
stringlengths 13
1.05k
⌀ | Answer
stringlengths 2
801
⌀ |
---|---|
What is the Security Architecture? | a set of physical and logical security-relevant representations (i.e., views) of system architecture |
What is the purpose of security architecture? | the placement of security-relevant elements within the security domains |
What is the definition of Information System Resilience cited from? | NISTSP 800-53 Rev. 4 |
What can bias the CADe effect? | Enriching a CADe study with subjects that are difficult to diagnose |
What is the term that describes secure product development and risk management? | SPDF |
What is a process that evaluates and controls threat-based risks? | Security Risk Management |
What are the software components in an SBOM? | commercial, open source, off- the-shelf, and custom software components |
What is a threat? | any circumstance or event with the potential to adversely impact the device, organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, or other organizations through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.119 |
What is a methodology for optimizing system, product, network, application, and connection security? | Threat modeling |
What is the definition of Framing Software Component Transparency: Establishing a Common Software Bill of Materials? | SBOM |
What is the definition adapted from? | NIST SP 800-53 |
What is the term for the ease and timeliness with which a device and related assets can be changed for any reason? | Updatability and Patchability |
What does the sequential exploit of multiple vulnerabilities require in order to be exploited? | successful completion of prior exploits in order to be exploited |
When was the 21st Century Cures Act enacted? | December 13, 2016 |