Term
|
Definition
A process of tracking problems reported to an informatin technology help desk. |
|
|
Term
|
Definition
The administration of the configuration of the components of a system. |
|
|
Term
|
Definition
The administration of changes in strategy, operations, or components of the information security program. |
|
|
Term
|
Definition
A method for organizations to internally charge their departments for system use. |
|
|
Term
|
Definition
A process of reviewing the use of a system, not to check performance but rather to determine if misuse or malfeasance has occured. |
|
|
Term
|
Definition
An expected level of system performance against which all subsequent levels of performance are compared. |
|
|
Term
External Monitoring Domain |
|
Definition
The sector of a maintenance model that provides early awareness of new and emerging threats, threat agents, vulnerabilities, and attacks that the organization needs in order to mount an effective and timely defense. |
|
|
Term
Internal Monitoring Domain |
|
Definition
the sector of a maintinence model whose primary goal is to maintain an informed awarness of the state fo allof the organizations networks, information systems, and information security defenses. |
|
|
Term
|
Definition
A procedure that compares the current state of a network segment (the systems and services it offers) against a known previous state of that same network segmant (the baseline of systems and services.) |
|
|
Term
Planning and Risk Assessment Domain |
|
Definition
The domain of the secuirty maintenance model concerned with keeping a lookout on the entire information security program by identifying and planning organization information security activities that furthr reduce risk. |
|
|
Term
|
Definition
The process of identifying and documenting spcific and provable flaws in the organization's information asset enviorment. |
|
|