Domain 1 Flashcards
Acceptable risk
A suitable level of risk commensurate with the potential benefits of the organization’s operations as determined by senior management.
Audit/auditing
The tools, processes, and activities used to perform compliance reviews.
Availability
Ensuring timely and reliable access to and use of information by authorized users.
Business continuity (BC)
Actions, processes, and tools for ensuring an organization can continue critical operations during a contingency.
Business continuity and disaster recovery (BCDR)
A term used to jointly describe business continuity and disaster recovery efforts.
Business impact analysis (BIA)
A list of the organization’s assets, annotated to reflect the criticality of each asset to the organization.
Compliance
Adherence to a mandate; both the actions demonstrating adherence and the tools, processes, and documentation that are used in adherence.
Confidentiality
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Data custodian
The person/role within the organization who usually manages the data on a day-to-day basis on behalf of the data owner/controller.
Data owner/ controller
An entity that collects or creates PII.
Data subject
The individual human related to a set of personal data.
Disaster recovery (DR)
Those tasks and activities required to bring an organization back from contingency operations and reinstate regular operations.
Due care
A legal concept pertaining to the duty owed by a provider to a customer.
Due diligence
Actions taken by a vendor to demonstrate/ provide due care.
Governance
The process of how an organization is managed; usually includes all aspects of how decisions are made for that organization, such as policies, roles, and procedures the organization uses to make those decisions.
Governance committee
A formal body of personnel who determine how decisions will be made within the organization and the entity that can approve changes and exceptions to current relevant governance.
Guidelines
Suggested practices and expectations of activity to best accomplish tasks and attain goals.
Integrity
Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
Intellectual property
Intangible assets (notably includes software and data).
Maximum allowable downtime (MAD)
The measure of how long an organization can survive an interruption of critical functions. [also known as maximum tolerable downtime (MTD)]
Personally identifiable information (PII)
Any data about a human being that could be used to identify that person.
Policy
Documents published and promulgated by senior management dictating and describing the organization’s strategic goals.
Privacy
The right of a human individual to control the distribution of information about him- or herself.
Procedures
Explicit, repeatable activities to accomplish a specific task. Procedures can address one-time or infrequent actions or common, regular occurrences.
Recovery point objective (RPO)
A measure of how much data the organization can lose before the organization is no longer viable.
Recovery time objective (RTO)
The target time set for recovering from any interruption.
Residual risk
The risk remaining after security controls have been put in place as a means of risk mitigation.
Risk
The possibility of damage or harm and the likelihood that damage or harm will be realized.
Risk acceptance
Determining that the potential benefits of a business function outweigh the possible risk impact/likelihood and performing that business function with no other action.
Risk avoidance
Determining that the impact and/or likelihood of a specific risk is too great to be offset by the potential benefits and not performing a certain business function because of that determination.
Risk mitigation
Putting security controls in place to attenuate the possible impact and/or likelihood of a specific risk.
Risk transference
Paying an external party to accept the financial impact of a given risk.
Security control framework
A notional construct outlining the organization’s approach to security, including a list of specific security processes, procedures, and solutions used by the organization.
Security governance
The entirety of the policies, roles, and processes the organization uses to make security decisions in an organization.