Vocab List Flashcards
(120 cards)
Acceptance (of Risk)
Senior management chooses to accept the risk of an activity as it is.
Asset Inventory
A full catalog of the organization’s property (tangible, intellectual, digital, etc.), with sufficient detail/descriptions of attributes to determine specific responsibility/ownership and current configuration/disposition/protection.
Availability
Ensuring data can be accessed in authorized manner, as permitted.
Avoidance (of Risk)
Senior management chooses to cease the activity to remove the risk.
Business Impact Analysis
The overall effort (and the artifact resulting from this effort) to assess the relative value of assets within an organization, the potential threats to those assets, and the possible damage that might be caused if an asset or assets is harmed or lost.
Change management
The process, method, and resources used to modify the configuration of assets in the inventory.
CIA Triad
The triad includes these three ideas: confidentiality, integrity, and availability of assets.
Configuration Management
The process, method, and resources used to determine baseline settings and version of assets in the inventory.
Due Care
The legal duty owed by an organization to its constituents (users/customers/employees/the public).
Due Diligence
Documented efforts demonstrating the organization’s activities to provide due care.
Governance
The processes, roles, and policies an organization uses to make decisions.
[Security] Guidelines
Recommendations (not mandates) for security best practices, usually from sources external to the organization.
Integrity
Protecting data from unauthorized modification.
Job Rotation
Shifting personnel (usually within a given department) among various roles throughout the year, for security, morale, and continuity purposes.
Least Privilege
Personnel are only given the minimal set of permissions necessary to perform their job function.
Maximum Allowable Downtime (MAD)
[also referred to as “MTD”— maximum tolerable downtime] The amount of time an organization can suffer an interruption to its critical path and still remain an organization.
Mitigation (of Risk)
Risk is reduced through the use of controls.
Need to Know
Information is only disclosed to those who have a business need and permission to access it.
[Security] Policy
The organization’s strategic security direction and mandates, published and signed by senior management.
Privileged (Users/Account)
Those with more access/permissions than regular users can cause more harm to the organization than regular users (and, historically, have); therefore, privileged accounts must be managed in a more restrictive and thorough manner than regular accounts.
[Security] Procedures
Specific instructions for performing security-related tasks.
Recovery Point Objective (RPO)
The amount of data that can be lost by the organization without destroying the organization (usually measured in time, backward from the current moment; so, “the last 72 hours’ worth of data”).
Recovery Time Objective (RTO)
The duration that an organization can suffer an interruption of its critical path without destroying the organization (measured as time, necessarily less than the MAD/MTD).
Residual Risk
Risk that remains after controls are put into operation (risk mitigation).