Amenaza a los
sistemas y servicios presentes en el ciberespacio o alcanzables a través de
éste.
(A) In general.--The term
`cyber threat information' means information directly pertaining to--
(i)
a vulnerability of a system or network of a government or private entity or
utility;
(ii)
a threat to the integrity, confidentiality, or availability of a system or
network of a government or private entity or utility or any information stored
on, processed on, or transiting such a system or network;
(iii)
efforts to deny access to or degrade, disrupt, or destroy a system or network
of a government or private entity or utility; or
(iv)
efforts to gain unauthorized access to a system or network of a government or
private entity or utility, including to gain such unauthorized access for the
purpose of exfiltrating information stored on, processed on, or transiting a
system or network of a government or private entity or utility.
(B) Exclusion.--Such term
does not include information pertaining to efforts to gain unauthorized access
to a system or network of a government or private entity or utility that solely
involve violations of consumer terms of service or consumer licensing
agreements and do not otherwise constitute unauthorized access.
Cyber Intelligence Sharing
and Protection Act. H.R. 624. 2013.
(A) In general.--The term
`cyber threat intelligence' means intelligence in the possession of an element
of the intelligence community directly pertaining to
(i)
a vulnerability of a system or network of a government or private entity or
utility;
(ii)
a threat to the integrity, confidentiality, or availability of a system or
network of a government or private entity or utility or any information stored
on, processed on, or transiting such a system or network;
(iii)
efforts to deny access to or degrade, disrupt, or destroy a system or network
of a government or private entity or utility; or
(iv)
efforts to gain unauthorized access to a system or network of a government or
private entity or utility, including to gain such unauthorized access for the purpose
of exfiltrating information stored on, processed on, or transiting a system or
network of a government or private entity or utility.
(B) Exclusion.--Such term
does not include intelligence pertaining to efforts to gain unauthorized access
to a system or network of a government or private entity or utility that solely
involve violations of consumer terms of service or consumer licensing
agreements and do not otherwise constitute unauthorized access.
Cyber Intelligence Sharing
and Protection Act. H.R. 624. 2013.