Glossary Flashcards
Acceptable risk
A suitable level of risk commensurate with the potential benefits of the organization’s operations as determined by senior management.
Access control system
Means to ensure that access to assets is authorized and restricted based on business and security requirements related to logical and physical systems.
Access control tokens
The system decides if access is to be granted or denied based upon the validity of the token for the point where it is read based on time, date, day, holiday, or other condition used for controlling validation.
Accountability
Accountability ensures that account management has assurance that only authorized users are accessing the system and using it properly.
ActiveX Data Objects (ADO)
A Microsoft high-level interface for all kinds of data.
Address Resolution Protocol (ARP)
Is used at the Media Access Control (MAC) Layer to provide for direct communication between two devices within the same LAN segment.
Algorithm
A mathematical function that is used in the encryption and decryption processes.
Asset
An item perceived as having value.
Asset lifecycle
The phases that an asset goes through from creation (collection) to destruction.
Asymmetric
Not identical on both sides. In cryptography, key pairs are used, one to encrypt, the other to decrypt.
Attack surface
Different security testing methods find different vulnerability types.
Attribute-based access control (ABAC)
This is an access control paradigm whereby access rights are granted to users with policies that combine attributes together.
Audit/auditing
The tools, processes, and activities used to perform compliance reviews.
Authorization
The process of defining the specific resources a user needs and determining the type of access to those resources the user may have.
Availability
Ensuring timely and reliable access to and use of information by authorized users.
Baselines
A minimum level of security.
Bit
Most essential representation of data (zero or one) at Layer 1 of the Open Systems Interconnection (OSI) model.
Black-box testing
Testing where no internal details of the system implementation are used.
Bluetooth (Wireless Personal Area Network IEEE 802.15)
Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks (WPANs), and it has been integrated into many types of business and consumer devices.
Bridges
Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses.
Business continuity (BC)
Actions, processes, and tools for ensuring an organization can continue critical operations during a contingency.
Business continuity and disaster recovery (BCDR)
A term used to jointly describe business continuity and disaster recovery efforts.
Business impact analysis (BIA)
A list of the organization’s assets, annotated to reflect the criticality of each asset to the organization.
Capability Maturity Model for Software or Software Capability Maturity Model (CMM or SW-CMM)
Maturity model focused on quality management processes and has five maturity levels that contain several key practices within each maturity level.