ISO 27001 Definitions Flashcards
(42 cards)
3.1 access control
means to ensure that access to assets is authorized and restricted based on business and security requirements (3.56)
3.2 attack
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset
3.5 authentication
provision of assurance that a claimed characteristic of an entity is correct
3.6 authenticity
property that an entity is what it claims to be
3.7 availability
property of being accessible and usable on demand by an authorized entity
3.8 base measure
measure (3.42) defined in terms of an attribute and the method for quantifying it
Note 1 to entry: A base measure is functionally independent of other measures.
3.10 confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities, or processes (3.54)
3.12 consequence
outcome of an event (3.21) affecting objectives (3.49)
Note 1 to entry: An event can lead to a range of consequences.
Note 2 to entry: A consequence can be certain or uncertain and, in the context of information security, is usually negative.
Note 3 to entry: Consequences can be expressed qualitatively or quantitatively.
Note 4 to entry: Initial consequences can escalate through knock-on effects.
3.14 control
measure that is modifying risk (3.61)
Note 1 to entry: Controls include any process (3.54), policy (3.53), device, practice, or other actions which modify risk (3.61).
Note 2 to entry: It is possible that controls not always exert the intended or assumed modifying effect.
3.15 control objective
statement describing what is to be achieved as a result of implementing controls (3.14)
3.16 correction
action to eliminate a detected nonconformity (3.47)
3.17 corrective action
action to eliminate the cause of a nonconformity (3.47) and to prevent recurrence
3.18 derived measure
measure (3.42) that is defined as a function of two or more values of base measures (3.8)
3.19 documented information
information required to be controlled and maintained by an organization (3.50) and the medium on which it is contained
Note 1 to entry: Documented information can be in any format and media and from any source.
Note 2 to entry: Documented information can refer to
— the management system (3.41), including related processes (3.54);
— information created in order for the organization (3.50) to operate (documentation);
— evidence of results achieved (records).
3.21 event
occurrence or change of a particular set of circumstances
Note 1 to entry: An event can be one or more occurrences, and can have several causes.
Note 2 to entry: An event can consist of something not happening.
Note 3 to entry: An event can sometimes be referred to as an “incident” or “accident”.
3.23 governance of information security
system by which an organization’s (3.50)information security (3.28) activities are directed and controlled
3.24 governing body
person or group of people who are accountable for the performance (3.52) and conformity of the organization (3.50)
Note 1 to entry: The governing body can, in some jurisdictions, be a board of directors.
3.25 indicator
measure (3.42) that provides an estimate or evaluation
3.26 information need
insight necessary to manage objectives (3.49), goals, risks and problems
3.27 information processing facilities
any information processing system, service or infrastructure, or the physical location housing it
3.28 information security
preservation of confidentiality (3.10), integrity (3.36) and availability (3.7) of information
Note 1 to entry: In addition, other properties, such as authenticity (3.6), accountability, non-repudiation (3.48), and reliability (3.55) can also be involved.
3.29 information security continuity
processes (3.54) and procedures for ensuring continued information security (3.28) operations
3.30 information security event
identified occurrence of a system, service or network state indicating a possible breach of information security (3.28) policy (3.53) or failure of controls (3.14), or a previously unknown situation that can be security relevant
3.31 information security incident
single or a series of unwanted or unexpected information security events (3.30) that have a significant probability of compromising business operations and threatening information security (3.28)