Term
|
Definition
Formal written policies that describe proper and unacceptable behavior when using computer and network systems. For example, an acceptable use policy may set rules on what type of Web site browsing is permitted or if personal e-mails over the Internet are allowed. |
|
|
Term
|
Definition
An agent is a piece of code that sits on the distributed device. As in the case of the virus scan, the agent software periodically reports back to the central management tool. (pg. 337) |
|
|
Term
|
Definition
An agent-less central management tool has the ability and authority to reach out and connect to distributed devices. Unlike the malware example where the agent software pulls the updates onto the device, the agent-less software is centrally housed and pushes the changes to the device. (pg. 338) |
|
|
Term
|
Definition
The act of recording relevant security events that occur on a computing or network device (server, workstation, firewall, etc.). Can also refer to a review of business and financial processes and files by an auditor. |
|
|
Term
|
Definition
The process of granting permission to some people to access systems, applications, and data. |
|
|
Term
Automatic declassification |
|
Definition
Automatically removing a classification after a certain period of time, such as 25 years. |
|
|
Term
|
Definition
Technical documents describing security controls for a specific technology. |
|
|
Term
|
Definition
A leading technique, methodology, or technology that through experience has proved to be very reliable. Best practices tend to produce consistent and quality results. |
|
|
Term
|
Definition
In terms of information security, refers to adding information security as a distinct layer of control. Bolt-on security is the opposite of integrated security, in which information security controls are an integral part of the process design and not a separate distinct layer. |
|
|
Term
|
Definition
A plan on how to continue business after a disaster. A BCP includes a disaster recovery plan (DRP) as a component. |
|
|
Term
Business recovery plan (BCP) |
|
Definition
Plan to sustain essential business operations for the duration of the disaster. |
|
|
Term
Business continuity representative |
|
Definition
An individual who understands the organization's capability to restore the system, application, network, or data. This individual also has access to call lists to contact anyone in the organization during off hours. |
|
|
Term
|
Definition
A legal term referring to how evidence is documented and protected. Evidence must be documented and protected from the time it's obtained to the time it's presented in court. |
|
|
Term
|
Definition
Relates to the impact on the business for failing to comply with legal obligations. |
|
|
Term
Continuity of operations plan |
|
Definition
A plan that provides the detail procedures and processes needed to coordinate operations during a disaster. |
|
|
Term
Continuity of support plan/IT contingency plan |
|
Definition
Plan to recover major systems and applications. |
|
|
Term
Control objectives for information and related technology (COBIT) |
|
Definition
A widely accepted framework that brings together business and control requirements with technical issues. |
|
|
Term
|
Definition
Policy documents describing core security control requirements. |
|
|
Term
|
Definition
Assets that are essential for the society and economy to function. |
|
|
Term
|
Definition
Implements policies and procedures such as backup, versioning, uploading, downloading, and database administration. |
|
|
Term
|
Definition
Level of protection based on data type. |
|
|
Term
|
Definition
Unauthorized sharing of sensitive company information, whether intentional or accidental. |
|
|
Term
Data security administrator |
|
Definition
Grants access rights and assesses information security threats to organization. |
|
|
Term
|
Definition
Owner of data and approver of access rights; responsible for data quality. |
|
|
Term
|
Definition
The process of changing the status of classified data to unclassified data. |
|
|
Term
|
Definition
A plan to recover an organization's IT assets during a disaster, including software, data, and hardware. |
|
|
Term
|
Definition
A legal term that refers to effort made to avoid harm to another party. It essentially refers to the care that a person would reasonably be expected to see under particular circumstances. |
|
|
Term
Enterprise risk management (ERM) |
|
Definition
A framework that aligns strategic goals, operations effectiveness, reporting, and compliance objectives; not technology specific. |
|
|
Term
|
Definition
Events that could potentially impact the business when it fails to provide adequate liquidity to meet its obligations. |
|
|
Term
|
Definition
The highest ranking lawyer in an organization, who usually reports to the president or chief executive officer. He or she is asked to give legal opinions on various organization issues, participate in contract negotiations, and to act as a liaison with outside law firms retained by the organization. |
|
|
Term
Governance, risk management and compliance |
|
Definition
A set of tools that bring together the capabilities to systematically manage risk and policy compliance. |
|
|
Term
|
Definition
The parameters within which a policy, standard, or procedure recommended when possible but are optional. |
|
|
Term
Highly sensitive classification |
|
Definition
A classification level used to protect highly regulated data or strategic information. |
|
|
Term
Human resources representative |
|
Definition
An individual who is an expert on HR policies and disciplinary proceedings or employee counseling. |
|
|
Term
|
Definition
An event that violates an organization's security policies. |
|
|
Term
|
Definition
If you have an incident, a weakness in your security has been exploited. Classifying the incident you can better understand the threat and the weakness. (pg. 298) |
|
|
Term
|
Definition
A specialized group of people whose purpose is to respond to major incidents. |
|
|
Term
Information security representative |
|
Definition
In the context of an IRT team, an information security representative provides risk management and analytical skills. A representative may also have specialized forensic skills for collecting and analyzing evidence. |
|
|
Term
Information technology subject matter experts |
|
Definition
An individual who has intimate knowledge of the systems and configurations of an organization. This individual is typically a developer, system administrator or network administrators. He or she has the needed technical skills to make critical recommendations on how to top an attack. |
|
|
Term
|
Definition
An employee, consultant, contractor, or vendor. The insider may even be the IT technical people who designed the system, application, or security that is being hacked. The insider knows the organization and the applications. |
|
|
Term
|
Definition
A classification level for data that would cause disruption to daily operations and some financial loss to the business if leaked. |
|
|
Term
International organization for standardization |
|
Definition
An organization that creates widely accepted international standards on information security and IT risks. |
|
|
Term
Intrusion detection system |
|
Definition
A series of software agents, appliances, and servers that monitor for network activity that is deemed a threat, alerts administrators, and logs the information. IDSs operate by matching signatures of known possible network attack traffic or by building over time a baseline of normal behavior then alerting on traffic that is anomalous to that normal pattern of behavior. |
|
|
Term
|
Definition
Any rules prescribed under the authority of a government entity. Establishes legal thresholds. |
|
|
Term
Layered security approach |
|
Definition
Having two or more layers of independent controls to reduce risk. |
|
|
Term
|
Definition
An individual who has an understanding of laws and regulatory compliance. |
|
|
Term
|
Definition
Is a separate platform used to collect logs from platforms throughout the network. |
|
|
Term
|
Definition
An attack using viruses, worms, Trojan horses, and scripts. Such an attack is launched to gain access to systems, applications, and data. |
|
|
Term
Mandatory declassification |
|
Definition
A process of reviewing specific records when requested and declassifying them if warranted. |
|
|
Term
|
Definition
An event that disrupts the daily activities of an organization. |
|
|
Term
|
Definition
When a hacker outlines a story in which the employee is asked to reveal information that weakens the security. |
|
|
Term
Privileged-level access agreement |
|
Definition
Designed to heighten the awareness and accountability of those users with administrator rights. |
|
|
Term
|
Definition
Processes to implement control and baseline standards. |
|
|
Term
|
Definition
A classification level for data that has no negative impact on the business if released to the public. |
|
|
Term
Public relations representative |
|
Definition
In the context of an IRT team, it is an individual who can advise on how to communicate to the public and customers that might be impacted by the incident. This person is valuable in ensuring that accurate information gets out and damaging misconceptions are prevented. |
|
|
Term
|
Definition
Established rules of what an organization has to do to meet legal requirements. |
|
|
Term
|
Definition
Understanding risks and determining how much potential risk and related problems the business is willing to accept. |
|
|
Term
|
Definition
A domain in the ISACA Risk IT framework that calls for analyzing risk and determining impact on the business. |
|
|
Term
|
Definition
A domain in the ISACA Risk IT framework that ensures that risk management activity aligns with the business goals, objectives, and tolerances. |
|
|
Term
|
Definition
A domain in the ISACA Risk IT framework that specifies the ability to react so that risks are reduced and remedied in a cost-effective manner |
|
|
Term
Security awareness policy |
|
Definition
Training about security policies, threats, and handling of digital assets. |
|
|
Term
|
Definition
A classification level for data that would mean significant financial loss if leaked. |
|
|
Term
|
Definition
Underlying principle states that no individual should be able to execute a high-risk transaction or conceal errors or fraud in the normal course of their duties. |
|
|
Term
|
Definition
Manipulating or tricking a person into weakening the security of an organization. |
|
|
Term
|
Definition
An event that may change how the entire organization operates. |
|
|
Term
|
Definition
An individual who has extensive knowledge in a particular field. |
|
|
Term
Systematic declassification |
|
Definition
A process of reviewing records exempted from automatic declassification and then removing the data from classification. |
|
|
Term
|
Definition
An IT individual who provides administrative support to the systems and databases. |
|
|