Term
|
Definition
| A process for detecting attacks by observing statistical anomalies. |
|
|
Term
|
Definition
| A methodical examination and review that produces a detailed report of its findings. |
|
|
Term
|
Definition
| ords Operating system logs that contain only security event information. |
|
|
Term
| behavior-based monitoring |
|
Definition
| Monitoring that uses the normal processes and actions as the standard by which attacks are compared. |
|
|
Term
|
Definition
| A methodology for making changes and keeping track of changes usually through a manual process. |
|
|
Term
| change management team (CMT) |
|
Definition
| A group of personnel within an organization who oversee changes. |
|
|
Term
|
Definition
| The process of assigning a level of business importance, availability. sensitivity, security and regulation requirements to data. |
|
|
Term
|
Definition
| Part of the pre-trial phase of a lawsuit in which each party through the law of civil procedure can request documents and evidence. |
|
|
Term
|
Definition
| An occurrence within a software system that is communicated to users or other programs outside the operating system. |
|
|
Term
|
Definition
| Alarms that are raised when there is no actual abnormal behavior. |
|
|
Term
| Information Lifecycle management (ILM) |
|
Definition
| A set of strategies for administering, maintaining, and managing computer storage systems in order to retain data, |
|
|
Term
|
Definition
| The process by which permissions given to a higher level parent that are passed down to a lower level child. |
|
|
Term
|
Definition
| A record of events that occur. |
|
|
Term
|
Definition
| Information in a log that contains information related to a specific event that has occurred. |
|
|
Term
|
Definition
| The process for generating, transmitting, storing, analyzing, and disposing of computer security log data. |
|
|
Term
|
Definition
| A baseline that is established to create the norm of performance. |
|
|
Term
|
Definition
| Hardware or software through which data is accumulated on the normal operations of the systems and networks. |
|
|
Term
|
Definition
| Reviewing a subjects privileges over an object. |
|
|
Term
|
Definition
| Process of assigning and revoking privileges to objects and covers the procedures of managing object authorizations. |
|
|
Term
| signature-based monitoring |
|
Definition
| Monitoring that compares activities against a predefined signature. |
|
|
Term
| storage and retention polides |
|
Definition
| Policies that outline the requirements for data storage. |
|
|
Term
|
Definition
| Operational actions that are performed by the operating system. |
|
|
Term
|
Definition
| A low-level system program that uses a notification engine designed to monitor and track down hidden activity on a desktop system, server, PDA or cell phone. |
|
|
Term
|
Definition
| The process of examining which subjects are accessing specific objects and how frequently. |
|
|