Term
|
Definition
A process for detecting attacks by observing statistical anomalies. |
|
|
Term
|
Definition
A methodical examination and review that produces a detailed report of its findings. |
|
|
Term
|
Definition
ords Operating system logs that contain only security event information. |
|
|
Term
behavior-based monitoring |
|
Definition
Monitoring that uses the normal processes and actions as the standard by which attacks are compared. |
|
|
Term
|
Definition
A methodology for making changes and keeping track of changes usually through a manual process. |
|
|
Term
change management team (CMT) |
|
Definition
A group of personnel within an organization who oversee changes. |
|
|
Term
|
Definition
The process of assigning a level of business importance, availability. sensitivity, security and regulation requirements to data. |
|
|
Term
|
Definition
Part of the pre-trial phase of a lawsuit in which each party through the law of civil procedure can request documents and evidence. |
|
|
Term
|
Definition
An occurrence within a software system that is communicated to users or other programs outside the operating system. |
|
|
Term
|
Definition
Alarms that are raised when there is no actual abnormal behavior. |
|
|
Term
Information Lifecycle management (ILM) |
|
Definition
A set of strategies for administering, maintaining, and managing computer storage systems in order to retain data, |
|
|
Term
|
Definition
The process by which permissions given to a higher level parent that are passed down to a lower level child. |
|
|
Term
|
Definition
A record of events that occur. |
|
|
Term
|
Definition
Information in a log that contains information related to a specific event that has occurred. |
|
|
Term
|
Definition
The process for generating, transmitting, storing, analyzing, and disposing of computer security log data. |
|
|
Term
|
Definition
A baseline that is established to create the norm of performance. |
|
|
Term
|
Definition
Hardware or software through which data is accumulated on the normal operations of the systems and networks. |
|
|
Term
|
Definition
Reviewing a subjects privileges over an object. |
|
|
Term
|
Definition
Process of assigning and revoking privileges to objects and covers the procedures of managing object authorizations. |
|
|
Term
signature-based monitoring |
|
Definition
Monitoring that compares activities against a predefined signature. |
|
|
Term
storage and retention polides |
|
Definition
Policies that outline the requirements for data storage. |
|
|
Term
|
Definition
Operational actions that are performed by the operating system. |
|
|
Term
|
Definition
A low-level system program that uses a notification engine designed to monitor and track down hidden activity on a desktop system, server, PDA or cell phone. |
|
|
Term
|
Definition
The process of examining which subjects are accessing specific objects and how frequently. |
|
|