TERMIUM Plus®
From: Translation Bureau
On social media
Consult the Government of Canada’s terminology data bank.
INSIDER ATTACK [3 records]
Record 1 - internal organization data 2026-03-23
Record 1, English
Record 1, Subject field(s)
- Informatics
- Electronic Warfare
Record 1, Main entry term, English
- cyber kill-chain
1, record 1, English, cyber%20kill%2Dchain
correct, noun
Record 1, Abbreviations, English
Record 1, Synonyms, English
- cyber kill chain 2, record 1, English, cyber%20kill%20chain
correct, noun
- kill chain 3, record 1, English, kill%20chain
correct, noun
Record 1, Textual support, English
Record number: 1, Textual support number: 1 CONT
The seven different stages of a cyber kill chain follow a sequential, incremental and progressive process of reconnaissance(i. e., phishing email), weaponization(i. e., delivery payload; virus, worm and malware), delivery(i. e., insider threat,... bot attack), exploitation(i. e.,... software vulnerability; network vulnerability), installation(i. e., actual payload setting up locally), command and control(i. e., trojan), and actions on objective(i. e., ransomware). Preventive measures can be taken at different steps of the kill chain to dam the cyber avalanche. 2, record 1, English, - cyber%20kill%2Dchain
Record 1, French
Record 1, Domaine(s)
- Informatique
- Guerre électronique
Record 1, Main entry term, French
- chaîne de destruction cybernétique
1, record 1, French, cha%C3%AEne%20de%20destruction%20cybern%C3%A9tique
correct, feminine noun
Record 1, Abbreviations, French
Record 1, Synonyms, French
- cyberchaîne de destruction 2, record 1, French, cybercha%C3%AEne%20de%20destruction
correct, feminine noun
Record 1, Textual support, French
Record number: 1, Textual support number: 1 DEF
Phases d'une cyberattaque ciblée : 1) reconnaissance, 2) transformation en armes, 3) livraison, 4) exploitation, 5) installation, 6) commandement et contrôle, et 7) actions. 3, record 1, French, - cha%C3%AEne%20de%20destruction%20cybern%C3%A9tique
Record 1, Spanish
Record 1, Textual support, Spanish
Record 2 - internal organization data 2025-10-23
Record 2, English
Record 2, Subject field(s)
- Risks and Threats (Security)
- National and International Security
- Intelligence (Military)
Record 2, Main entry term, English
- threat profile
1, record 2, English, threat%20profile
correct, noun
Record 2, Abbreviations, English
Record 2, Synonyms, English
Record 2, Textual support, English
Record number: 2, Textual support number: 1 DEF
A structured assessment of an organization, system, individual, or asset’s potential risks from adversarial actors, hazards or vulnerabilities. 2, record 2, English, - threat%20profile
Record number: 2, Textual support number: 1 OBS
A threat profile typically includes details on the types of threats(e. g., cyber attacks, physical intrusions, insider threats), the capabilities and motivations of potential adversaries, likely attack vectors, historical incident data, and exposure levels. 2, record 2, English, - threat%20profile
Record number: 2, Textual support number: 2 OBS
Threat profiles are used in cybersecurity, risk management, and intelligence analysis to prioritize defenses, inform mitigation strategies, and guide resource allocation. 2, record 2, English, - threat%20profile
Record 2, French
Record 2, Domaine(s)
- Risques et menaces (Sécurité)
- Sécurité nationale et internationale
- Renseignement (Militaire)
Record 2, Main entry term, French
- profil de menace
1, record 2, French, profil%20de%20menace
correct, masculine noun
Record 2, Abbreviations, French
Record 2, Synonyms, French
Record 2, Textual support, French
Record number: 2, Textual support number: 1 DEF
Évaluation structurée des risques auxquels une organisation, un système, un individu ou un actif peut être exposé, en raison d'acteurs malveillants, de dangers ou de vulnérabilités. 2, record 2, French, - profil%20de%20menace
Record number: 2, Textual support number: 1 OBS
Un profil de menace comprend généralement des renseignements sur les types de menaces (p. ex. : cyberattaques, intrusions physiques, menaces internes), les capacités et les motivations des adversaires potentiels, les vecteurs d'attaque probables, les données historiques sur les incidents ainsi que les niveaux d'exposition. 2, record 2, French, - profil%20de%20menace
Record number: 2, Textual support number: 2 OBS
Les profils de menace sont utilisés en cybersécurité, en gestion des risques et en analyse du renseignement pour hiérarchiser les mesures de défense, orienter les stratégies d'atténuation et guider l'allocation des ressources. 2, record 2, French, - profil%20de%20menace
Record 2, Spanish
Record 2, Textual support, Spanish
Record 3 - internal organization data 2015-09-25
Record 3, English
Record 3, Subject field(s)
- Military Tactics
- Defence Planning and Military Doctrine
Record 3, Main entry term, English
- insider attack
1, record 3, English, insider%20attack
correct
Record 3, Abbreviations, English
Record 3, Synonyms, English
- green on blue attack 2, record 3, English, green%20on%20blue%20attack
correct
Record 3, Textual support, English
Record 3, French
Record 3, Domaine(s)
- Tactique militaire
- Doctrine militaire et planification de défense
Record 3, Main entry term, French
- attaque de l'intérieur
1, record 3, French, attaque%20de%20l%27int%C3%A9rieur
correct, feminine noun
Record 3, Abbreviations, French
Record 3, Synonyms, French
Record 3, Textual support, French
Record number: 3, Textual support number: 1 DEF
Attaque délibérément effectuée contre son propre camp ou un allié par un individu, un groupe ou une unité constituée. 1, record 3, French, - attaque%20de%20l%27int%C3%A9rieur
Record number: 3, Textual support number: 1 OBS
attaque de l'intérieur : terme et définition publiés au Journal officiel de la République française le 23 septembre 2015. 2, record 3, French, - attaque%20de%20l%27int%C3%A9rieur
Record 3, Spanish
Record 3, Textual support, Spanish
Copyright notice for the TERMIUM Plus® data bank
© Public Services and Procurement Canada, 2026
TERMIUM Plus®, the Government of Canada's terminology and linguistic data bank
A product of the Translation Bureau
Features
GCtranslate (available on the Government of Canada network only)
Use this artificial intelligence prototype to translate Government of Canada content up to and including Protected B. Available to employees of selected departments and agencies only.
Writing tools
The Language Portal’s writing tools have a new look! Easy to consult, they give you access to a wealth of information that will help you write better in English and French.
Glossaries and vocabularies
Access Translation Bureau glossaries and vocabularies.
- Date Modified:


