Cyber Security (CS Sample Clauses

Cyber Security (CS. (formerly referred to as information assurance(IA)) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation. While focused dominantly on information in digital form, the full range of CS also encompasses analog and physical form. The scope is not limited to information security; it includes the entire field of CS (availability, identification and authentication, confidentiality, integrity, and non-repudiation) and includes the economic considerations with respect to selection of CS techniques, CS processes, and industry trends. It also includes Information Operations (IO), e.g. operational security of information technology (IT), the use of the electromagnetic spectrum for IT purposes and computer network operations. In a contested cyber environment, CS supports Mission Assurance (MA) measures required to accomplish mission essential objectives. CS support to MA entails prioritizing mission essential functions, mapping mission dependence on cyberspace, identifying cyber- related vulnerabilities, and mitigating risk of these vulnerabilities. Examples of topics that fall within the general scope of Cyber Security (this list is not all-inclusive) are shown below -- the Contractor shall have technical familiarity to work within this technical focus area. Full spectrum cyber operations including 1) developing CS planning frameworks and development of requirements and mission needs documents and conducting trade-off analyses; 2) cyber threat avoidance; 3) defensive cyber operations including red teaming and performing threat assessments of hardware and software systems; and 4) cyber offensive and exploitative operations. All of the above may include: cyber technology research, analysis and prototyping, cyber situational and mission awareness, cyber modeling, simulation and war gaming, integrating innovative cyber technologies to enable cyber superiority and the facilitation of technology transition.

Related to Cyber Security (CS

  • Cyber Security Insurance for loss to the Owner due to data security and privacy breach, including costs of investigating a potential or actual breach of confidential or private information. (Indicate applicable limits of coverage or other conditions in the fill point below.) « »

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS. 18.2 A Tender Securing Declaration shall use the form included in Section IV, Tendering Forms. 18.3 If a Tender Security is specified pursuant to ITT 18.1, the Tender Security shall be a demand guarantee in any of the following forms at the Tenderer option: i) cash; ii) a bank guarantee; iii) a guarantee by an insurance company registered and licensed by the Insurance Regulatory Authority listed by the Authority; or

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.