| Term 
 
        | Cybersecurity General Goals (1st Level) |  | Definition 
 
        | Prevention: You should try to prevent bad things from happening. Detection: If you can't prevent, can you at least detect?   Recovery: If you can't prevent or detect, you better be able to recover. |  | 
        |  | 
        
        | Term 
 
        | Common Cyber Security Objectives (2nd Level) |  | Definition 
 
        | Confidentiality Integrity Availability |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Privacy/confidentiality Authentication Authorization Possession |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Is this remote request really coming from who it says it is? |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Does an access request come from a source allowed to do it? |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Do I (or my enterprise) have control over the content of data I create? |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Authenticity Unmarred Non-repudiation Auditing |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Did this data come from the expected correspondent? 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Is data/process/system corrupted? 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Can a counterparty deny their system activities? 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 What happened, when, how? 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Are systems present and ready for immediate use? 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Is access minimized as per business purpose? (similar to Least Privileges) 
 |  | 
        |  | 
        
        | Term 
 
        | Security Standards (systemigram path) |  | Definition 
 
        | Security Standards dictate process that recommends controls to reduce vulnerability. |  | 
        |  | 
        
        | Term 
 
        | Security Program Composition |  | Definition 
 
        | Strategy -> Policy -> Awareness -> Implementation -> Monitoring -> Compliance -> Strategy   (Prevention -> Detection -> Correction -> Prevention) |  | 
        |  | 
        
        | Term 
 
        | Triad and True (Five triads) |  | Definition 
 
        | 1. Prevent, Detect, Respond/Correct/Recover 2. Confidentiality, Integrity, Availability 3. People, Process, Technology 4. Audit, Review, Assess 5. Monitor, Measure, Manage |  | 
        |  | 
        
        | Term 
 
        | Roles of the Security Organization: Strategy |  | Definition 
 
        | Strategic Alignment with business/organizaion objections |  | 
        |  | 
        
        | Term 
 
        | Roles of the Security Organization: Policy |  | Definition 
 
        | Information Security Management (ISM) writes and publishes policy. |  | 
        |  | 
        
        | Term 
 
        | Roles of the Security Organization: Awareness |  | Definition 
 
        | Information Security Management (ISM) conducts classes and publishes annoucnements. |  | 
        |  | 
        
        | Term 
 
        | Role of the Security Organization: Implementation |  | Definition 
 
        | Via the security review process as well as occasional security-specific projects, ISM contributes secure architecture, design, and engineering strategy |  | 
        |  | 
        
        | Term 
 
        | Role of the Security Organization: Monitoring |  | Definition 
 
        | ISM reviews critical configuration on a periodic basis, and maintains metrics on security configuration and logs of user activity |  | 
        |  | 
        
        | Term 
 
        | Role of the Security Organization: Compliance |  | Definition 
 
        | ISM is the point of escalation for security issues that may require investigation. |  | 
        |  | 
        
        | Term 
 
        | Program Organization: Strategy |  | Definition 
 
        | Technology Steering Committe, Outsource Management, Legal, Physical Security, and other executive manangement |  | 
        |  | 
        
        | Term 
 
        | Program Organization: Policy |  | Definition 
 
        | All statekholders contribute |  | 
        |  | 
        
        | Term 
 
        | Program Organization: Awareness |  | Definition 
 
        | Legal and Human Resources take the lead on many issues, Business Application and Data Owners, Operations and Product Managers reinforce |  | 
        |  | 
        
        | Term 
 
        | Program Organization: Implementation |  | Definition 
 
        | Subject Matter Experts, Technology, Architects, Product Owners, Managers of Platform Maintenance, Systems Administrators, Operations Managers, Executive Assistants |  | 
        |  | 
        
        | Term 
 
        | Program Organization: Monitoring |  | Definition 
 
        | Operations Managers and Internal Auditors have primary responsibility, Managers of platform maintenance contribute |  | 
        |  | 
        
        | Term 
 
        | Program Organization :Compliance |  | Definition 
 
        | Human Resources and Legal take the lead on many issues, product owners, operations managers contribute |  | 
        |  | 
        
        | Term 
 
        | Program Execution Process Hierarchy |  | Definition 
 
        | Policy Standards Procedures Guidelines Technologies |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Workflow designed to support a given outcome. 
 Information Security Governance Requires 
 process commensurate with the size and nature 
 of the organization, as well as the diversity in roles and responsibilities. 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Forms the basis for a methodology for 
 complying with management and regulatory 
 objectives for data confidentiality, integrity, and 
 availability. They are documents that contain management mandates for the security program. 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Organizational directives for technical 
 configurations that comply with policy. 
 Domain may be organization-wide or within a single department. 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Step-by-step process descriptions or even more 
 detailed procedures to provide staff with 
 instruction on things like technology 
 configuration. 
   
 Used for ensuring that standards are followed and training new personnel. 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 
 Suggestions for following security policy, 
 sometimes including several alternatives for 
 activity that will result in compliance. Not mandatory even within a department. 
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Lowest level of management process Highest degree of reliability in controls. |  | 
        |  |