Disrupt

Disrupt

A service procedure is disrupted by another service if the second service results in service primitives of the first service not being used as specified for the procedure of the first service (ITU, 2012)

Non-Conformity and Interoperability

Non-Conformity and Interoperability

Conformity assessment: activity that provides demonstration that specified requirements relating to a product, process, system, person or body are fulfilled (NIST Information Technology Laboratory, no date).

For the purposes of this standard, interoperability allows any government facility or information system, regardless of the personal Identity verification (PIV) Issuer, to verify a cardholder’s identity using the credentials on the PIV Card (NIST, no date).

Data Breach

Data Breach

A data breach is a compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to protected data transmitted, stored, or otherwise processed (ICO, no date).

Data Security-Related Hazards

Data Security-Related Hazards

Data security is related to the preservation of data to guarantee availability, confidentiality and data integrity. Data security-related hazards include risks arising from increased system complexity because this provides opportunities for malicious cyberattacks and data loss in the case of serious incidents, including natural disasters (ITU, 2017).

Internet of Things (IOT)-Related Hazards

Internet of Things (IOT)-Related Hazards

The Internet of Things (IoT) is a global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies (ITU, 2012).

NOTE 1: Through the exploitation of identification, data capture, processing and communication capabilities, the IoT makes full use of things to offer services to all types of applications, while ensuring that security and privacy requirements are fulfilled.

Cyberbullying

Cyberbullying

Cyberbullying is bullying that takes place using digital devices such as cell/mobile phones, computers, and tablets. Cyberbullying can occur through SMS, e-mail, apps, social media, forums, or gaming when people view, participate in, or share content. Cyberbullying includes the deliberate sending, posting, or sharing of negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying may also be unlawful or criminal behaviour (US Government, 2020).

Is this page useful?

Yes No
Report an issue on this page

Thank you. If you have 2 minutes, we would benefit from additional feedback (link opens in a new window).