Term
|
Definition
The consistancy, accuracy, and validity of data or information |
|
|
Term
|
Definition
Steps taken to reduce the likelihood or impact of a risk. |
|
|
Term
|
Definition
The act of taking steps to move responsibility for a risk to a third party through insurance or outsourcing. |
|
|
Term
Principle of least priveledge |
|
Definition
A security discipline that requires that a particular user, system, or application be given no more privileged than necessary to perform its function or job. |
|
|
Term
|
Definition
A small drive that is based on Flash memory |
|
|
Term
|
Definition
The characteristic of a resource being accessible to a user, application, or computer system when required |
|
|
Term
|
Definition
A physical or logical device used to capture Keystrokes |
|
|
Term
|
Definition
The process of eliminating a risk by choosing not to engage in an action or activity. |
|
|
Term
|
Definition
A storage device that is designed to be taken out of a computer without turning it off |
|
|
Term
|
Definition
Consists of the set of methods and avenues an attacker can use to enter a system and potentially cause damage. |
|
|
Term
|
Definition
The act of identifying and then making an informed decision to accept the likelihood and impact of a specific risk. |
|
|
Term
|
Definition
The Process of restricting access to a resource to only permitted users, application, or computer systems |
|
|
Term
|
Definition
one of the largest challenges facing security professionals. They include Laptops, PDAs and Smartphones |
|
|
Term
|
Definition
Using multiple layers of security to defend your assets |
|
|
Term
|
Definition
A small drive based on flash memory |
|
|
Term
|
Definition
The characteristic of a resource ensuring access is restricted to only permitted users, applications, or computer systems |
|
|
Term
|
Definition
The Risk that remains after measures have been taken to reduce the likelihood or minimize the effect of a particular event |
|
|
Term
|
Definition
The probability an event will occur |
|
|
Term
|
Definition
An action or occurrence that could result in the breach, outage, or corruption of a system by exploiting known or unknown vulnerabilities |
|
|
Term
|
Definition
Used to identify the risks that might impact your particular environment |
|
|
Term
|
Definition
The Process of identifying, assessing and prioritizing threats and risks |
|
|
Term
|
Definition
Method used to gain access to data, systems, or network, primarily through misrepresentation |
|
|
Term
|
Definition
Allows you to combine users and applications so permissions are not applied on a user by user or application by application basis |
|
|
Term
Multiple User accounts for administrators |
|
Definition
most companies offer this group two accounts one for the role as a user and for the role as Administrator |
|
|
Term
|
Definition
the best way to simplify a complex environment by limiting the number of account types |
|
|
Term
|
Definition
Account life cycle managements applications to auditing applications to application firewalls |
|
|
Term
|
Definition
using defined set of rules to determine how accounts are created, permissioned, and maintained |
|
|