Skip to Main Content
Idaho State University

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
T
T&E
TA
TAG
Tap
Tar
TCB
TCD
TCS
TCU
TD
TDM
TED
Tee
TEI
TEK
TEP
TFM
TFS
TLA
TLS
TMC
TNI
Toy
TPC
TPI
TRB
TRR
TSK
Tty
TV
TWX
Threat Monitoring
  • The analysis, assessment and review of audit trails and other data collected for the purpose of searching out system events which may constitute violations or precipitate incidents involving data security. (AR 380-380;) 2. The analysis, assessment, and review of audit trails and other data collected for the purpose of searching out system events which may constitute violations or precipitate incidents involving data privacy matters. (FIPS PUB 39;) 3. The analysis, assessment and review of audit trails and other data collected for the purpose of searching out system events which may constitute violations or attempted violations of system security. (NCSC-WA-001-85;)