Term
|
Definition
Prevent modification of data |
|
|
Term
|
Definition
Prevent disclosure of data |
|
|
Term
|
Definition
Ensure reliable timely access to data |
|
|
Term
|
Definition
Means in which user claims Identity |
|
|
Term
|
Definition
Establishes the users Identity |
|
|
Term
|
Definition
Systems ability to determine actions of users |
|
|
Term
|
Definition
Rights and permissions granted to an individual |
|
|
Term
|
Definition
Level of confidentiality that a user is given |
|
|
Term
|
Definition
- Has high level enterprise wide benefit - Demonstrates organizations commitment to security - Helps identify sensitive and vital information - Supports C.I.A. - May be required for legal regulatory reasons |
|
|
Term
|
Definition
Assess the impact of the threat and the risk of the threat occurring (likelihood) |
|
|
Term
|
Definition
Neither sensitive nor classified, public release is acceptable |
|
|
Term
Sensitive But Unclassified (SBU) |
|
Definition
Minor secret, no serious damage if disclosed |
|
|
Term
|
Definition
Disclosure could cause damage to National Security |
|
|
Term
|
Definition
Disclosure could cause serious damage to National Security |
|
|
Term
|
Definition
Disclosure could cause exponentially grave damage to National Security |
|
|
Term
|
Definition
Similar to unclassified, should not be disclosed but is not a problem if it is |
|
|
Term
|
Definition
Data protected from loss of Confidentiality and integrity |
|
|
Term
|
Definition
Data that is personal in nature and for company use only |
|
|
Term
|
Definition
Very sensitive for internal use only - could seriously negatively impact the company |
|
|
Term
|
Definition
Number one criteria classification critera, if it is valuable it should be protected |
|
|
Term
|
Definition
Value of data lowers over time, automatic de-classification. Number two classification crteria |
|
|
Term
|
Definition
If the information is made obsolete it can often be de-classified. Number three classification criteria |
|
|
Term
|
Definition
If the data contains personal information it should remain classified. Number four classificatoin criteria |
|
|
Term
|
Definition
- May be executive or manager - Has final corporate responsibility of the data protection - Makes determination of classification level - Reviews classification level regularly for appropriateness - Delegates responsibility of data protection to the Custodian |
|
|
Term
|
Definition
- Generally IT systems personnel - Running regular backups and testing recovery - Performs restoration when required - Maintains records in accordance with the classification policy |
|
|
Term
|
Definition
- Anyone the routinely uses the data - Must follow operating procedures - Must take due care to protect - Must use computing resources of the company for company purposes only |
|
|
Term
|
Definition
A high-level statement of enterprise beliefs, goals, and objectives and the general means for their attainment for a specificed subject area. |
|
|
Term
|
Definition
Company is required to implement due to legal or regulatory requirements. Usually very detailed and specific to the industry of the organization. Ensure the company is following industry standard procedures and give the company confidence they are following industry standard procedures |
|
|
Term
|
Definition
Not mandated but strongly suggested. Company wants employees to consider these mandatory. Can have exclusions for certain employees or job functions. |
|
|
Term
|
Definition
Exist simply to inform the reader. No implied or specified requirements. |
|
|
Term
|
Definition
A specific product or mechanism that is selected for universal use throughout the organization in order to support policy. |
|
|
Term
|
Definition
General statements designed to achieve the policy's objectives by providing a framework within which to implement controls not covered by procedures. |
|
|
Term
|
Definition
Mandatory descriptions of how to implement security packages to ensure that implementations result in a consistent level of security throughout the organization. |
|
|
Term
|
Definition
Spell out step-by-step specifics of how the policy and supporting standards and guidelines will actually be implemented in an operating environment. |
|
|
Term
|
Definition
Percent of asset loss caused by threat |
|
|
Term
Single Loss Expectancy (SLE) |
|
Definition
Expected financial loss for single event = Asset Value x Exposure Factor |
|
|
Term
Annualized Rate of Occurrence (ARO) |
|
Definition
represents estimated frequency in which threat will occur within one year |
|
|
Term
Annualized Loss Expectancy (ALE) |
|
Definition
Annually expected financial loss = SLE x ARO |
|
|
Term
|
Definition
Assigns objective numerical values (dollars) |
|
|
Term
|
Definition
An analysis based on more intangible values (data), scenario oriented. |
|
|
Term
Preliminary Security Examination (PSE) |
|
Definition
Conducted prior to the quantitative analysis. Helps gather elements that will be needed for actual Risk Analysis |
|
|
Term
|
Definition
1)Estimate of potential loss 2)Analyze potential threats 3)Define the Annualized Loss Expectancy (ALE) |
|
|
Term
|
Definition
Implementation of controls to alter risk position |
|
|
Term
|
Definition
Get insurance, transfer cost of a loss to insurance |
|
|
Term
|
Definition
Accept the risk, absorb loss |
|
|
Term
Qualitative Scenario Procedure |
|
Definition
- Scenario Oriented - List the threat and the frequency - Create exposure rating scale for each scenario - Scenario written that address each major threat - Scenario reviewed by business users for reality check - Risk Analysis team evaluates and recommends safeguards - Work through each finalized scenario - Submit findings to management |
|
|
Term
|
Definition
ALE (PreControl) – ALE (PostControl) = Annualized value of the control |
|
|
Term
|
Definition
The identification, measurement, control, and minimization of loss accociated with uncertain events or risks. |
|
|
Term
|
Definition
An event the occurence of which could have an undersirable impact on the well-being of an asset. |
|
|
Term
|
Definition
The absence or weakness or a risk reducing safeguard. |
|
|
Term
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) |
|
Definition
Self-guided assessment developed by Carnegie Mellon has three phase. |
|
|
Term
|
Definition
Identify critical assets and corresponding threats |
|
|
Term
|
Definition
Identify vulnerabilities exposing the threats |
|
|
Term
|
Definition
Develop protection stragtegy |
|
|
Term
Security Posture Assesement Methodologies |
|
Definition
|
|
Term
INFOSEC Assessment Methodology |
|
Definition
Developed by NSA, detailed process of examinging IS vulnerabilities and recommending appropriate countermeasures |
|
|
Term
|
Definition
Nonintrusive baseline analysis |
|
|
Term
|
Definition
|
|
Term
|
Definition
"Red Team" activities, penetration testing |
|
|
Term
|
Definition
1)Pre-assessment 2)On-site 3)Post-assessment |
|
|
Term
Federal Information Technology Security Assessment Framework (FITSAF) |
|
Definition
Cretead by NIST provides a methodology to determine current security posture and sets targets for improvement |
|
|
Term
|
Definition
1)Documented 2)Complete 3)Implemented 4)Measured 4)Pervasive |
|
|
Term
|
Definition
1)Initiation 2)Development and Acquisition 3)Implementation 4)Operation and Maintenance 5)Disposal |
|
|
Term
|
Definition
1)Processing 2)Storage 3)Tansmission |
|
|
Term
|
Definition
1)Policy and Procedures 2)Technology 3)Eduation, Training, and Awareness |
|
|
Term
|
Definition
Considering PROs/CONs and Benefit/Cost of a decision |
|
|
Term
|
Definition
-Define the Objective -Identify Altneratives -Compare Alternatives |
|
|
Term
|
Definition
Engineering Principles for IT Security, contains 33 security principles for the life cycle of IS. |
|
|
Term
Types of Security Controls |
|
Definition
1)Deterrent 2)Preventative 3)Corrective 4)Detective |
|
|
Term
Security Controls - Change control |
|
Definition
Documentation detialing changes made to the system architecture or infrastructure |
|
|
Term
Security Controls - Management |
|
Definition
1)Hardware -disks, peripherals, drivers 2)Network - rules, architecture 3)Application and O/S - service packs, pathces, uprgrades 4)Policies & Procedures 5)Tools - checksums, signatures, integrity software |
|
|