Term
|
Definition
The process of controlling and/or extinguishing fires to protect people and an organization’s data and equipment. |
|
|
Term
Wet Pipe Sprinkler System |
|
Definition
Consists of a pressurized water supply system that can deliver a high quantity of water to an entire building via a piping distribution system. |
|
|
Term
Pre-Action Sprinkler System |
|
Definition
Similar to a dry pipe system, but there are requirements for it to be set off such as heat or smoke. |
|
|
Term
Special Hazard Protection System |
|
Definition
A clean agent sprinkler system such as FM-200 used in server rooms. |
|
|
Term
|
Definition
The aisles in a server room or data center that circulate cold air into the systems and hot air out of them. Usually, the systems and cabinets are supported by a raised floor. |
|
|
Term
|
Definition
When a person invents a scenario, or pretext, in the hope of persuading a victim to divulge information. |
|
|
Term
|
Definition
When a thief attempts to take responsibility for a shipment by diverting the delivery to a nearby location. |
|
|
Term
|
Definition
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. |
|
|
Term
|
Definition
A type of phishing attack that makes use of telephones and VoIP. |
|
|
Term
|
Definition
A type of phishing attack that targets particular individuals. |
|
|
Term
|
Definition
A phishing attack that targets senior executives. |
|
|
Term
|
Definition
The attempt at deceiving people into believing something that is false. |
|
|
Term
|
Definition
When a person uses direct observation to find out a target’s password, PIN, or other such authentication information. |
|
|
Term
|
Definition
When a person uses direct observation to “listen” in to a conversation. |
|
|
Term
|
Definition
When a person literally scavenges for private information in garbage and recycling containers. |
|
|
Term
|
Definition
When a malicious individual leaves malware-infected removable media, such as a USB drive or optical disc, lying around in plain view. |
|
|
Term
|
Definition
When an unauthorized person tags along with an authorized person to gain entry to a restricted area. |
|
|
Term
|
Definition
A type of piggybacking where an unauthorized person follows an authorized person into a secure area, without the authorized person’s consent. |
|
|
Term
|
Definition
An area between two doorways, meant to hold people until they are identified and authenticated. |
|
|
Term
|
Definition
Acceptable usage policies define the rules that restrict how a computer, network, or other system may be used. |
|
|
Term
|
Definition
Personally Identifiable Information
Information used to uniquely identify, contact, or locate a person. |
|
|
Term
|
Definition
Service Level Agreement
Part of a service contract where the level of service is formally defined. |
|
|
Term
|
Definition
People who perform preliminary analysis of the incident data and determine whether the incident is an incident or just an event, and the criticality of the incident. |
|
|
Term
|
Definition
Documents who had custody of evidence all the way up to litigation or a court trial (if necessary) and verifies that the evidence has not been modified. |
|
|
Term
|
Definition
A set of procedures that an investigator goes by when examining a computer security incident. |
|
|
Term
|
Definition
The monitoring and detection of security events on a computer network and the execution of proper responses to those security events. |
|
|