ISO 27001 Definitions Flashcards
3.1 access control
means to ensure that access to assets is authorized and restricted based on business and security requirements (3.56)
3.2 attack
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset
3.5 authentication
provision of assurance that a claimed characteristic of an entity is correct
3.6 authenticity
property that an entity is what it claims to be
3.7 availability
property of being accessible and usable on demand by an authorized entity
3.8 base measure
measure (3.42) defined in terms of an attribute and the method for quantifying it
Note 1 to entry: A base measure is functionally independent of other measures.
3.10 confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities, or processes (3.54)
3.12 consequence
outcome of an event (3.21) affecting objectives (3.49)
Note 1 to entry: An event can lead to a range of consequences.
Note 2 to entry: A consequence can be certain or uncertain and, in the context of information security, is usually negative.
Note 3 to entry: Consequences can be expressed qualitatively or quantitatively.
Note 4 to entry: Initial consequences can escalate through knock-on effects.
3.14 control
measure that is modifying risk (3.61)
Note 1 to entry: Controls include any process (3.54), policy (3.53), device, practice, or other actions which modify risk (3.61).
Note 2 to entry: It is possible that controls not always exert the intended or assumed modifying effect.
3.15 control objective
statement describing what is to be achieved as a result of implementing controls (3.14)
3.16 correction
action to eliminate a detected nonconformity (3.47)
3.17 corrective action
action to eliminate the cause of a nonconformity (3.47) and to prevent recurrence
3.18 derived measure
measure (3.42) that is defined as a function of two or more values of base measures (3.8)
3.19 documented information
information required to be controlled and maintained by an organization (3.50) and the medium on which it is contained
Note 1 to entry: Documented information can be in any format and media and from any source.
Note 2 to entry: Documented information can refer to
— the management system (3.41), including related processes (3.54);
— information created in order for the organization (3.50) to operate (documentation);
— evidence of results achieved (records).
3.21 event
occurrence or change of a particular set of circumstances
Note 1 to entry: An event can be one or more occurrences, and can have several causes.
Note 2 to entry: An event can consist of something not happening.
Note 3 to entry: An event can sometimes be referred to as an “incident” or “accident”.
3.23 governance of information security
system by which an organization’s (3.50)information security (3.28) activities are directed and controlled