Glossary Flashcards
Assurance
A positive acknowledgement designed to provide confidence.
Asymmetric cryptography
A cryptographic system requiring two separate keys, one of which is private and one of which is public.
Acceptable Use Policy (AUP)
A policy used to identify what personal use of company resources is acceptable.
Accountability
The principle of holding individuals and entities responsible for their actions and decisions related to information security.
Accredited
Accredited refers to the official recognition or certification given to an individual, organization, or program that meets specific standards or criteria set by a reputable accrediting body.
Active Content
Content on a website that is either interactive, such as internet polls, or dynamic, such as animated pictures, JavaScript applications or ActiveX applications.
Analysis
The detailed examination of the elements or structure of an entity.
Anti-Virus
Software designed to negate or destroy a computer virus
Assessment
An estimation of the nature or quality of an entity.
Asset
Something that has a value to an organisation
Audit
A formal inspection of an organisation’s processes or procedures.
Authentication
The assurance that a person or entity is who they claim to be.
Authorisation
the process of granting or restricting access to resources, systems, or information based on the permissions and privileges assigned to individuals or entities, ensuring that only authorised users can perform certain actions or access specific data.
Availability
The property of being accessible where and when required by an authorised person, entity, or process.
Avoidance
Avoidance refers to the deliberate action of eliminating or staying away from a particular risk or situation to prevent its occurrence or potential negative impact.
Backdoor
A method of bypassing normal authentication methods, securing illegal remote access to a computer.
Baseline controls
Standards that are used to define how systems should be configured, and managed securely.
Biometric
Biometric identifiers are the distinctive, measurable characteristics used to label, describe and identify individuals.
E.G. Face recognition, finger print, voice recognition.
Bring your own device (BYOD)
A scheme adopted by some organisations that permits staff to use their own desktop and laptop, computers, tablets and smartphones.
Business continuity (BC)
The ability of an organisation to continue to function in order to deliver its products or services at an acceptable level following a business disruption.
Business Continuity and Disaster Recovery (BCDR)
BCDR focuses on maintaining critical business functions, processes, and infrastructure during and after disruptive events, such as natural disasters, cyber attacks, or system failures, to ensure the organization can continue operating and recover swiftly.
Business impact analysis (BIA)
The process of analysing the consequences a business disruption might have upon the organisation’s assets.
Certification
A process confirming that a person has reached a predefined level of Achievement.
Classification
The arrangement of items into taxonomic groups in the information security context, it labels information to identify any defined processing, handling, storage or transmission measures required to ensure appropriate security.