Jump to content

Capability, Perform Resilient Systems Engineering: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
 
imported>Unknown user
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{LanguageHeader|en}}
{{LanguageHeader|en}}
{{CyberTerm|definition=An ISCM capability that • Focuses on reducing successful exploits of the other non-meta capabilities that occur because there was inadequate design, engineering, implementation, testing, and/or other technical issues in implementing and/or monitoring the controls related to the other non-meta capabilities. • Reducing the successful exploits of the other non-meta capabilities that occur because there was inadequate definition of requirements, policy, planning, and/or other management issues in implementing and/or monitoring the controls related to the other non-meta capabilities.|source=NISTIR 8011 Vol. 1}}
{{CyberTerm|definition=An ISCM capability that  
• Focuses on reducing successful exploits of the other non-meta capabilities that occur because there was inadequate design, engineering, implementation, testing, and/or other technical issues in implementing and/or monitoring the controls related to the other non-meta capabilities.  
• Reducing the successful exploits of the other non-meta capabilities that occur because there was inadequate definition of requirements, policy, planning, and/or other management issues in implementing and/or monitoring the controls related to the other non-meta capabilities.|source=NISTIR 8011 Vol. 1}}

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

Capability, Perform Resilient Systems Engineering

An ISCM capability that • Focuses on reducing successful exploits of the other non-meta capabilities that occur because there was inadequate design, engineering, implementation, testing, and/or other technical issues in implementing and/or monitoring the controls related to the other non-meta capabilities. • Reducing the successful exploits of the other non-meta capabilities that occur because there was inadequate definition of requirements, policy, planning, and/or other management issues in implementing and/or monitoring the controls related to the other non-meta capabilities.


Source: NISTIR 8011 Vol. 1 | Category: