27000:2018 Flashcards
ISMS
3.1 access control
means to ensure
that access to assets
is authorized and restricted
based on business and security requirements (3.56)
3.2 attack
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized
3.3 audit (3 notes)
systematic, independent and documented
process (3.54) for
obtaining audit evidence and
evaluating it objectively to determine the
extent to which the audit criteria are fulfilled
Note 1 to entry: An audit can be an internal audit (first party) or an external audit (second party or third party), and it can be a combined audit (combining two or more disciplines).
Note 2 to entry: An internal audit is conducted by the organization itself, or by an external party on its behalf.
Note 3 to entry: “Audit evidence” and “audit criteria” are defined in ISO 19011.
3.4 audit scope
extent and boundaries
of an audit (3.3)
3.5 authentication
provision of assurance that
a claimed characteristic of an entity
is correct
3.6 authenticity
property that
an entity is
what it claims to be
3.7 availability
property of
being accessible and
usable on demand
by an authorized entity
3.8 base measure(1 note)
measure (3.42) defined in terms of an attribute and the method for quantifying it
Note 1 to entry: A base measure is functionally independent of other measures.
3.9 competence
ability to apply
knowledge and skills to
achieve intended results
3.10 confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities, or processes (3.54)
3.11 conformity
fulfilment of a requirement (3.56)
3.12 consequence (4 notes)
outcome of an event (3.21) affecting objectives (3.49)
Note 1 to entry: An event can lead to a range of consequences.
Note 2 to entry: A consequence can be certain or uncertain and, in the context of information security, is usually negative.
Note 3 to entry: Consequences can be expressed qualitatively or quantitatively.
Note 4 to entry: Initial consequences can escalate through knock-on effects.
3.13 continual improvement
recurring activity
to enhance performance (3.52)
3.14 control (2 notes)
measure
that is modifying risk (3.61)
Note 1 to entry: Controls include any process (3.54), policy (3.53), device, practice, or other actions which modify risk (3.61).
Note 2 to entry: It is possible that controls not always exert the intended or assumed modifying effect.
3.15 control objective
statement
describing what is to be
achieved as a
result of implementing controls (3.14)
3.16 correction
action to
eliminate a
detected nonconformity (3.47)
3.17 corrective action
action to
eliminate the
cause of a nonconformity (3.47)
and to prevent recurrence
3.18 derived measure
measure (3.42) that is defined as a function of two or more values of base measures (3.8)
3.19 documented information (2 notes)
information required to be
controlled and maintained
by an organization (3.50)
and the medium on which it is contained
Note 1 to entry: Documented information can be in any format and media and from any source
.
Note 2 to entry: Documented information can refer to
— the management system (3.41), including related processes (3.54);
— information created in order for the organization (3.50) to operate (documentation);
— evidence of results achieved (records).
3.20 effectiveness
extent to which
planned activities are
realized and
planned results achieved
3.21 event (3 notes)
occurrence or
change of a
particular set of circumstances
Note 1 to entry: An event can be one or more occurrences, and can have several causes.
Note 2 to entry: An event can consist of something not happening.
Note 3 to entry: An event can sometimes be referred to as an “incident” or “accident”.
3.22 external context (1 note)
external environment
in which the organization
seeks to achieve
its objectives (3.49)
Note 1 to entry: External context can include the following:
— the cultural, social, political, legal, regulatory, financial, technological, economic, natural and competitive environment, whether international, national, regional or local;
— key drivers and trends having impact on the objectives of the organization (3.50);
— relationships with, and perceptions and values of, external stakeholders (3.37).
3.23 governance of information security
governance of information security system by which an organization’s (3.50) information security (3.28) activities are directed and controlled
3.24 governing body (1 note)
person or group of people
who are accountable for the
performance (3.52) and
conformity of the organization (3.50)
Note 1 to entry: The governing body can, in some jurisdictions, be a board of directors.
3.25 indicator
measure (3.42)
that provides an estimate or evaluation
3.26 information need
insight necessary to manage objectives (3.49), goals, risks and problems
3.27 information processing facilities
any information processing system,
service or
infrastructure,
or the physical location housing it
3.28 information security (1 note)
preservation of confidentiality (3.10),
integrity (3.36) and
availability (3.7) of
information
Note 1 to entry: In addition, other properties, such as authenticity (3.6), accountability, non-repudiation (3.48), and reliability (3.55) can also be involved.
3.29 information security continuity
processes (3.54) and
procedures for
ensuring continued information security (3.28) operations
3.30 information security event
identified occurrence of a system, service or network state indicating a possible breach of information security (3.28) policy (3.53) or failure of controls (3.14), or a previously unknown situation that can be security relevant