Term
|
Definition
Necessary level of security is enforced and unauthorized disclosure is prevented. |
|
|
Term
|
Definition
Accuracy and reliability fo the information and systems are provided and any unauthorized notification is presented. |
|
|
Term
|
Definition
Reliable and timely access to data and resources is provided to authorized individuals. |
|
|
Term
|
Definition
Viewing infomration in an unauthorized manner by looking over the shoulder of someone else. |
|
|
Term
|
Definition
Gaining unauthorized access by tricking someone into divulging sensitive information. |
|
|
Term
|
Definition
Weaknesses or a lack of a countermeasure. |
|
|
Term
|
Definition
Entity that can exploit a vulernability. |
|
|
Term
|
Definition
The danger of a threat agent exploiting a vulnerability. |
|
|
Term
|
Definition
The probability of a threat agent exploiting a vulnerability and the associated impact. |
|
|
Term
|
Definition
Safeguard that is put in place to reduce a risk, also called a countermeasure. |
|
|
Term
|
Definition
Presence of a vulnerability, which exposes the organization to a threat. |
|
|
Term
|
Definition
Administrative, technical and physical. |
|
|
Term
|
Definition
Fix items after an incident has occurred. |
|
|
Term
|
Definition
Stop an incident from occurring. |
|
|
Term
|
Definition
Restore necessary components to return to normal operations. |
|
|
Term
|
Definition
Discourage a potential attacker. |
|
|
Term
|
Definition
Identify an incident's activities after it took place. |
|
|
Term
|
Definition
Alternative control that provides similiar protection as the original control. |
|
|
Term
|
Definition
Implementation of multiple controls so that successful penetration and compromise is more difficult to obtain. |
|
|
Term
|
Definition
Industry-recognized best practices for the development and management of an information security management system. |
|
|
Term
|
Definition
Enterprise architecture framework used to define and understand a business environment developed by John Zachman. |
|
|
Term
|
Definition
Enterprise architecture framework used to define and understand a business environment developed by The Open Group. |
|
|
Term
|
Definition
U.S. Department of Defense architecture framework that ensures interoperability of systems to meet military mission goals. |
|
|
Term
|
Definition
Architecture framework used mainly in military support missions developed by the British Ministry of Defense. |
|
|
Term
|
Definition
Risk-driven enterprise security architecture that maps to business initiatives, similar to the Zachman Framework. |
|
|
Term
|
Definition
Set of control objectives used as a framework for IT governance developed by Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI). |
|
|
Term
|
Definition
Set of controls to protect the U.S. federal systems developed by the National Institute of Standards and Technology (NIST). |
|
|
Term
|
Definition
Internal control model used for corporate governance to help prevent fraud developed by the Committee of Sponsoring Orgnaizations (COSO) of the Treadway Commission. |
|
|
Term
|
Definition
Best practices for information technology services management processes developed by the United Kingdom's Office of Government COmmerce. |
|
|
Term
|
Definition
Business management strategy developed by Motorola with the goal of improving business processes. |
|
|
Term
Capability Maturity Model Integration (CMMI) |
|
Definition
Process improvement model developed by Carnegie Mellon. |
|
|
Term
Security through Obscurity |
|
Definition
Relying upon the secrecy or complexity of an item as its security, instead of practicing solid security practices. |
|
|
Term
NIST 800-30 Risk Management Guide for Information Technlogy Systems |
|
Definition
A U.S. federal standard that is focused on IT risks. |
|
|
Term
Facilitated Risk Analysis Process (FRAP) |
|
Definition
A focused, qualitative approach that carries out prescreening to save time and money. |
|
|
Term
Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) |
|
Definition
Team-oriented approach that assesses organizational and IT risks through facilitated wokrshops. |
|
|
Term
|
Definition
Australia and New Zewland business risk management assessment approach. |
|
|
Term
|
Definition
International standard for the implemenation of a risk managment program that integrates into an information security management system (ISMS). |
|
|
Term
Failure Modes and Effect Analysis |
|
Definition
Approach that dissects a component into its basic functions to identify flaws and those flaws' effects. |
|
|
Term
|
Definition
Approach to map specific flaws to root causes in complex systems. |
|
|
Term
|
Definition
Central Computing and Telecommunications Agency Risk Analysis and Management Method. |
|
|
Term
Quantitative Risk Analysis |
|
Definition
Assigning monetary and numeric values to all the data elements of a risk assessment. |
|
|
Term
Qualitative Risk Analysis |
|
Definition
Opinion-based method of analyzing risk with the use of scenarios and ratings. |
|
|
Term
|
Definition
One instance of an expected loss if a specific vulnerability is exploited and how it affects a single asset. Asset Vlaue x Exposure Factor = SLE |
|
|
Term
Annualized Loss Expectancy |
|
Definition
Annual expected loss if a specific vulnerability is exploited and how it affects a single asset. SLE x ARO =ALE |
|
|
Term
|
Definition
Assigning confidence level value to data elements. |
|
|
Term
|
Definition
Data collection method that happens in an anonymous fashion. |
|
|
Term
|
Definition
Calculating the value of a control. (ALE before implementing a control) - (ALE after implementing a control) - (annual cost of control) = value of a control. |
|
|
Term
Functionality versus Effectiveness of Control |
|
Definition
Functionality is what a control does, and its effectiveness is how well the control does it. |
|
|
Term
|
Definition
Full risks amount before a control is put into place. Threats x vlunerabilities x assets = total risk. |
|
|
Term
|
Definition
Risk that remains after implementing a control. Threats x vulnerabilties x assets x (control gap) = residual risk. |
|
|
Term
|
Definition
Accept, transfer, mitigate, avoid. |
|
|