cybersecurity technology definition

cybersecurity technology means products or goods intended to detect or prevent activity intended to result in unauthorized access to, exfiltration of, manipulation of, or impairment to the integrity, confidentiality, or availability of an information system or information stored on or transiting an information system.
cybersecurity technology means products or goods intended to detect
cybersecurity technology means products or goods intended to detect or prevent activity intended

Examples of cybersecurity technology in a sentence

  • HOW TO ACCESS BIG DATA The graphic below identifies some U.S. listed ETFs that provide direct exposure to the Big Data theme through Cloud Computing and Cybersecurity technology.

  • Cybersecurity technology and IT infrastructure improvements needed to comply with state and federally mandated regulations and laws.2. Regional road and highway improvements such as I-80/Hwy-65 Interchange, Hwy-65 Widening, Baseline Road widening, and Placer Parkway.

  • The authors concluded that the BROM II was reliable for the assessment of lumbar flexion and lateral flexion but not for lumbar extension and rotation.

  • Specifies the terms of a CMS- sponsored model.(jj) Cybersecurity technology and related services.

  • The person knowingly attempts to cause or causes the isolation of such domestic victim by unreasonably and substantially restricting or limiting his or her access to other persons, telecommunication devices or transportation for the purpose of isolation.

  • Cybersecurity technology consulting, incident response and applied research company NRD CS focuses on the services to law enforcement, national communication regulators, CERTs, and corporate information security departments.

  • These building blocks are drawn from entries in community cyber attack information repositories.The expanded threat model provides threat information needed to enable NGCI Apex use cases including the following:• Cybersecurity technology foraging• Cybersecurity test case development for technology validation• Cyber wargaming scenario developmentThe expanded threat model is also meant to have broader value for the FSS.

  • Cybersecurity technology must work within an overall security process and be used by trained personnel (Cybersecurity for Critical Infrastructure Protection, 2004, p.21).

  • With the infusion of Cybersecurity technology, the supply chain becomes more challenging to retail organizations like Wal-Mart.It was also emphasized that other qualitative factors such as government stability and poor infrastructure of a particular country are critical for Wal-Mart's global supply chain performance and effectiveness.

  • A patient may retain any incentives furnished in compliance with paragraph (ii)(2) of this section.(jj) Cybersecurity technology and re- lated services.

Related to cybersecurity technology

  • Technology means any and all technical information and/or materials, including, without limitation, ideas, techniques, designs, sketches, drawings, models, inventions, know-how, processes, apparatus, methods, equipment, algorithms, software programs, data, software source documents, other works of authorship, formulae and information concerning engineering, research, experimental work, development, design details and specifications.

  • Licensed Software includes error corrections, upgrades, enhancements or new releases, and any deliverables due under a maintenance or service contract (e.g., patches, fixes, PTFs, programs, code or data conversion, or custom programming).

  • Background Technology means all Software, data, know-how, ideas, methodologies, specifications, and other technology in which Contractor owns such Intellectual Property Rights as are necessary for Contractor to grant the rights and licenses set forth in Section 14.1, and for the State (including its licensees, successors and assigns) to exercise such rights and licenses, without violating any right of any Third Party or any Law or incurring any payment obligation to any Third Party. Background Technology must: (a) be identified as Background Technology in the Statement of Work; and (b) have been developed or otherwise acquired by Contractor prior to the date of the Statement of Work, or have been developed by Contractor outside of its performance under the Statement of Work. Background Technology will also include any general consulting tool or methodology created by Contractor, which will not be required to be identified in the Statement of Work.