Jump to content

Critical software: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
 
imported>Unknown user
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{LanguageHeader|en}}
{{LanguageHeader|en}}
{{CyberTerm|definition=Any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes: · is designed to run with elevated privilege or manage privileges; · has direct or privileged access to networking or computing resources; · is designed to control access to data or operational technology; · performs a function critical to trust; or, · operates outside of normal trust boundaries with privileged access.|source=Critical Software Definition (for EO 14028)}}
{{CyberTerm|definition=Any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes:
· is designed to run with elevated privilege or manage privileges;
· has direct or privileged access to networking or computing resources;
· is designed to control access to data or operational technology;
· performs a function critical to trust; or,
· operates outside of normal trust boundaries with privileged access.|source=Critical Software Definition (for EO 14028)}}

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

Critical software

Any software that has, or has direct software dependencies upon, one or more components with at least one of these attributes: · is designed to run with elevated privilege or manage privileges; · has direct or privileged access to networking or computing resources; · is designed to control access to data or operational technology; · performs a function critical to trust; or, · operates outside of normal trust boundaries with privileged access.


Source: Critical Software Definition (for EO 14028) | Category: