Term
|
Definition
| Reliable and timely access to data and resources is provided to authorized individuals. |
|
|
Term
|
Definition
| Accuracy and reliability of the information and systems are provided and any unauthorized modification is prevented. |
|
|
Term
|
Definition
| Necessary level of secrecy is enforced and unauthorized disclosure is prevented. |
|
|
Term
|
Definition
| Viewing information in an unauthorized manner by looking over the shoulder of someone else. |
|
|
Term
|
Definition
| Gaining unauthorized access by tricking someone into divulging sensitive information. |
|
|
Term
|
Definition
| Weakness or a lack of a countermeasure. |
|
|
Term
|
Definition
| Entity that can exploit a vulnerability. |
|
|
Term
|
Definition
| The danger of a threat agent exploiting a vulnerability. |
|
|
Term
|
Definition
| The probability of a threat agent exploiting a vulnerability and the associated impact. |
|
|
Term
|
Definition
| Safeguard that is put in place to reduce a risk, also called a countermeasure. |
|
|
Term
|
Definition
| Presence of a vulnerability, which exposes the organization to a threat. |
|
|
Term
| Security through obscurity |
|
Definition
| Relying upon the secrecy or complexity of an item as its security, instead of practicing solid security practices. |
|
|
Term
|
Definition
| Industry-recognized best practices for the development and management of an information security management system. |
|
|
Term
|
Definition
| Enterprise architecture framework used to define and understand a business environment developed by John Zachman. |
|
|
Term
|
Definition
The Open Group Architecture Framework
Enterprise architecture framework used to define and understand a business environment developed by The Open Group.
[image] |
|
|
Term
|
Definition
Sherwood Applied Business Security Architecture
Risk-driven enterprise security architecture that maps to business initiatives, similar to the Zachman framework. |
|
|
Term
|
Definition
| U.S. Department of Defense architecture framework that ensures interoperability of systems to meet military mission goals. |
|
|
Term
|
Definition
| Architecture framework used mainly in military support missions developed by the British Ministry of Defence. |
|
|
Term
|
Definition
Set of control objectives used as a framework for IT governance developed by Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI).
It defines goals for the controls that should be used to properly manage IT and to ensure that IT maps to business needs.
CobiT is broken down into four domains:
- Plan and Organize,
- Acquire and Implement
- Deliver and Support
- Monitor and Evaluate.
|
|
|
Term
|
Definition
| Set of controls that are used to secure U.S. federal systems developed by NIST. |
|
|
Term
|
Definition
| Internal control model used for corporate governance to help prevent fraud developed by the Committee of Sponsoring Organizations (COSO) of the Treadway Commission. |
|
|
Term
|
Definition
| Best practices for information technology services management processes developed by the United Kingdom’s Office of Government Commerce. |
|
|
Term
|
Definition
| Business management strategy developed by Motorola with the goal of improving business processes. |
|
|
Term
|
Definition
| Risk Management Guide for Information Technology Systems A U.S. federal standard that is focused on IT risks. |
|
|
Term
| Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) |
|
Definition
| Team-oriented approach that assesses organizational and IT risks through facilitated workshops. |
|
|
Term
|
Definition
| Australia and New Zealand business risk management assessment approach. |
|
|
Term
|
Definition
| International standard for the implementation of a risk management program that integrates into an information security management system (ISMS). |
|
|
Term
| Failure Modes and Effect Analysis |
|
Definition
| Approach that dissects a component into its basic functions to identify flaws and those flaws’ effects. |
|
|
Term
|
Definition
| Approach to map specific flaws to root causes in complex systems. |
|
|
Term
|
Definition
| Central Computing and Telecommunications Agency Risk Analysis and Management Method. |
|
|
Term
| Quantitative risk analysis |
|
Definition
| Assigning monetary and numeric values to all the data elements of a risk assessment. |
|
|
Term
| Qualitative risk analysis |
|
Definition
Opinion-based method of analyzing risk with the use of scenarios and ratings.
[image] |
|
|
Term
|
Definition
| One instance of an expected loss if a specific vulnerability is exploited and how it affects a single asset. Asset Value × Exposure Factor = SLE. |
|
|
Term
| Annualized loss expectancy |
|
Definition
| Annual expected loss if a specific vulnerability is exploited and how it affects a single asset. SLE × ARO = ALE. |
|
|
Term
|
Definition
| Assigning confidence level values to data elements. |
|
|
Term
|
Definition
| Data collection method that happens in an anonymous fashion. |
|
|
Term
|
Definition
| Calculating the value of a control. (ALE before implementing a control) – (ALE after implementing a control) – ,(annual cost of control) = value of control. |
|
|
Term
| Functionality versus effectiveness of control |
|
Definition
| Functionality is what a control does, and its effectiveness is how well the control does it. |
|
|
Term
|
Definition
| Full risk amount before a control is put into place. Threats × vulnerabilities × assets = total risk. |
|
|
Term
|
Definition
| Risk that remains after implementing a control. Threats × vulnerabilities × assets × (control gap) = residual risk. |
|
|
Term
|
Definition
| Accept, transfer, mitigate, avoid. |
|
|
Term
|
Definition
| High-level document that outlines senior management’s security directives. |
|
|
Term
|
Definition
| Organizational (master), issue-specific, system-specific. |
|
|
Term
| Policy functionality types |
|
Definition
| Regulatory, advisory, informative. |
|
|
Term
|
Definition
| Compulsory rules that support the security policies. |
|
|
Term
|
Definition
| Suggestions and best practices. |
|
|
Term
|
Definition
| Step-by-step implementation instructions. |
|
|
Term
|
Definition
| Individual responsible for the protection and classification of a specific data set. |
|
|
Term
|
Definition
| Individual responsible for implementing and maintaining security controls to meet security requirements outlined by data owner. |
|
|
Term
|
Definition
| Preventive administrative control used to ensure one person cannot carry out a critical task alone. |
|
|
Term
|
Definition
| Two or more people working together to carry out fraudulent activities. |
|
|
Term
|
Definition
Employees should be moved into different roles with the idea that they may be able to detect suspicious activity carried out by the previous employee carrying out that position.
Detective administrative control used to uncover potential fraudulent activities. |
|
|
Term
|
Definition
| Detective administrative control used to uncover potential fraudulent activities by requiring a person to be away from the organization for a period of time. |
|
|
Term
|
Definition
this means it provides a structure for individual
architectures to be built from. |
|
|
Term
|
Definition
| this means it provides the processes to follow to build and maintain this architecture. |
|
|