Term
|
Definition
| The consistancy, accuracy, and validity of data or information |
|
|
Term
|
Definition
| Steps taken to reduce the likelihood or impact of a risk. |
|
|
Term
|
Definition
| The act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing. |
|
|
Term
| Principle of least priveledge |
|
Definition
| A security discipline that requires that a particular user, system, or application be given no more privileged than necessary to perform its function or job. |
|
|
Term
|
Definition
| A small drive that is based on Flash memory |
|
|
Term
|
Definition
| The characteristic of a resource being accessible to a user, application, or computer system when required |
|
|
Term
|
Definition
| A physical or logical device used to capture Keystrokes |
|
|
Term
|
Definition
| The process of eliminating a risk by choosing not to engage in an action or activity. |
|
|
Term
|
Definition
| A storage device that is designed to be taken out of a computer without turning it off |
|
|
Term
|
Definition
| Consists of the set of methods and avenues an attacker can use to enter a system and potentially cause damage. |
|
|
Term
|
Definition
| The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk. |
|
|
Term
|
Definition
| The Process of restricting access to a resource to only permitted users, application, or computer systems |
|
|
Term
|
Definition
| one of the largest challenges facing security professionals. They include Laptops, PDAs and Smartphones |
|
|
Term
|
Definition
| Using multiple layers of security to defend your assets |
|
|
Term
|
Definition
| A small drive based on flash memory |
|
|
Term
|
Definition
| The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems |
|
|
Term
|
Definition
| The Risk that remains after measures have been taken to reduce the likelihood or minimize the effect of a particular event |
|
|
Term
|
Definition
| The probability an event will occur |
|
|
Term
|
Definition
| An action or occurrence that could result in the breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities |
|
|
Term
|
Definition
| Used to identify the risks that might impact your particular environment |
|
|
Term
|
Definition
| The Process of identifying, assessing and prioritizing threats and risks |
|
|
Term
|
Definition
| Method used to gain access to data, systems, or network, primarily through misrepresentation |
|
|
Term
|
Definition
| Allows you to combine users and applications so permissions are not applied on a user by user or application by application basis |
|
|
Term
| Multiple User accounts for administrators |
|
Definition
| most companies offer this group two accounts one for the role as a user and for the role as Administrator |
|
|
Term
|
Definition
| the best way to simplify a complex environment by limiting the number of account types |
|
|
Term
|
Definition
| Account life cycle managements applications to auditing applications to application firewalls |
|
|
Term
|
Definition
| using defined set of rules to determine how accounts are created, permissioned, and maintained |
|
|