I-GLOSSARY Flashcards
Identification
The process of verifying the identity of a user, process or device, usually as a prerequisite for granting access to resources in an information system
Impact analysis
A study to prioritize the criticality of information resources for the organization based on costs (or consequences) of adverse events. In an impact analysis, threats to assets are identified and potential business losses determined for different time periods.
This assessment is used to justify the extent of safeguards that are required and recovery time frames. This analysis is the basis for establishing the recovery strategy.
Incident
Any event that is not part of the standard operation of a service and that causes, or may cause, an interruption to, or a reduction in, the quality of that service
Incident handling
An action plan for dealing with intrusions, cyber theft, denial-of-service attack, fire, floods, and other security-related events. It is comprised of a six-step process: Preparation, Identification Containment, Eradication, Recovery, and Lessons Learned.
Incident response
The response of an enterprise to a disaster or other significant event that may significantly affect the enterprise, its people or its ability to function
productively. An incident response may include evacuation of a facility, initiating a disaster recovery plan (DRP), performing damage assessment and any other measures necessary to bring an enterprise to a more stable
status.
Information security
Ensures that only authorized users (confidentiality) have access to accurate and complete information (integrity) when required (availability)
Information security governance
The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed
appropriately and verifying that the enterprise’s resources are used responsibly.
Information security program
The overall combination of technical, operational and procedural measures, and management structures implemented to provide for the confidentiality, integrity and availability of information based on business
requirements and risk analysis
Integrity
The accuracy, completeness and validity of information
Internal controls .The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented or detected and corrected.
Internet protocol
Specifies the format of packets and the addressing scheme
Interruption window
The time the company can wait from the point of failure to the restoration of the minimum and critical services or applications. After this time, the
progressive losses caused by the interruption are excessive for the organization.
Intrusion detection
The process of monitoring the events occurring in a computer system or network to detect signs of unauthorized access or attack
Intrusion detection system (IDS)
Inspects network and host security activity to identify suspicious patterns that may indicate a network or system attack
Intrusion prevention system (IPS)
Inspects network and host security activity to identify suspicious patterns that may indicate a network or system attack and then blocks it at the firewall to prevent damage to information resources
IP Security (IPSec)
A set of protocols developed by the Internet Engineering Task Force (IETF) to support the secure exchange of packets