Term
|
Definition
| Assesses the likelihood of loss or damage and its consequence (cost) |
|
|
Term
|
Definition
| Sources or motivations of people and things that could cause loss or damage |
|
|
Term
|
Definition
| Specific flaw or weakness that could be exploited to overcome a security system |
|
|
Term
|
Definition
| Ideas, commercial reputation, brand, and so on |
|
|
Term
|
Definition
| Supply chains, critical procedures, standard operating procedures |
|
|
Term
| Recovery Point Objective (RPO) |
|
Definition
| The amount of data loss that a system can sustain, measured in time. |
|
|
Term
| Recovery Time Objective (RTO) |
|
Definition
| This is the period following a disaster that a system may remain offline |
|
|
Term
|
Definition
|
|
Term
| Mean Time Between Failure |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Software License Availability |
|
Definition
| The software vendor may suspend all licenses if the customer is found to be non-compliant |
|
|
Term
| Software License Integrity |
|
Definition
| Unlicensed software exposes an organization to large fines and penalties |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Annual Rate of Occurrence |
|
Definition
|
|
Term
|
Definition
| The overall process of reducing exposure to or the effects of risk factors |
|
|
Term
|
Definition
| Reduce risk likelihood and / or impact |
|
|
Term
|
Definition
| Stop doing the risky activity |
|
|
Term
|
Definition
| Assign risk to a third-party |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|