CISM Vocabulary Flashcards
Administrative controls
policies, processes, procedures, standards
Annualized Loss Expectancy
ALE = SLExARO
architecture standard
defines technology architecture at the database, system, or network level
assessment
an examination that determines the effectiveness of a system or process
asset value
the value of an IT asset - usually but not always the Replacement Value
Asynchronous Replication
writing to data in a remote system is not synchronized with the local system.
No guarantee that remote system is identical to local system
Might be a time lag
Attestation of compliance
assertion of compliance to a law, standard or requirement
Typically signed by high ranking official
authentication
asserting an identity and providing proof of it
typically requires an ID (assertion) and a password (proof)
business email compromise
ceo fraud
perpetrator impersonates a CEO and gets company personnel to transfer large amounts of money, typically for a “secret merger” or “acquisition”
Business Impact Analysis
Study to identify the impact that different disaster scenarios will have on business operations
Business Recovery Plan
activities required to recover and resume critical business processes and activities
capability maturity model
measures relative maturity of an organization and its processes
capability maturity model for Development
CMMi-DEV
maturity model used to measure software development process maturity
certification practicer statement (CPS)
describes practices used by the CA to issue and manage digital certificates
Change Control Board
aka
Change Advisory Board
stakeholders from IT and Business who propose, discuss, approve changes to the IT systems
CIS Controls
framework maintained by the Center for Internet Security (CIS)
COBIT
published by ISACA
control framework for managing information systems and security
COSO
Committee of Sponsoring Organizations of the Treadway Commission
Organization providing control frameworks and guidance on enterprise risk management
COOP
Continuity of Operations Plan
activities required to continue critical and strategic business functions at alternate site
Control
Policy, Process or Procedure created to ensure desired outcomes or to avoid unwanted outcomes
Control Framework
Collection of controls organized in logical categories
Covered Entity
any organization that stores or processes information covered by HIPAA
Critical Path Methodology (CPM)
Technique used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule
Criticality Analysis (CA)
Study of each system and process, a consideration of the impact on the organization if it’s incapacitated, the likelihood of incapacitation and the estimated cost of mitigating the impact (risk)
Digital envelope
method of using two layers of encryption
symmetric key is used to encrypt a message and a public or private key is used to encrypt the symmetric key
Disaster
unexpected and unplanned event that results in the disruption of business operations
Dwell Time
amount of time from the start of an incident to the organization’s awareness of the incident
e-vaulting
backing up information to an off-site location, usually a 3rd-party service provider
Exposure Factor
financial loss resulting from realization of a threat.
expressed as a percentage of the asset’s total value
Facilities Classification
methods for assigning risk levels to facilities based based on their operational criticality or other risk factors
fiduciary
person who has a legal trust relationship with another party
fiduciary duty
highest standard of care that a fiduciary renders to a beneficiary
File Activity Monitoring (FAM)
monitoring the use of files on a computer as a way to detect indicators of compromise
File Integrity Monitoring (FIM)
periodically scanning file systems to detect changes to file contents or permissions that may indicate compromise
HITRUST
healthcare control framework and certification
servers as external attestation of an organization’s IT controls
Hybrid cryptography
cryptosystem that uses two or more iterations of cryptography
Impact
actual or expected result from a threat or disaster
incident
any event not part of standard operation of a service and that causes or may cause interruption or reduction in quality of service