Key Terms 3 Flashcards
Relying upon the secrecy or complexity of an item as its security, instead of practicing solid security practices.
Security through obscurity
Industry-recognized best practices for the development and management of an information security management system.
ISO/IEC 27000 series
Enterprise architecture framework used to define and understand a business environment developed by John Zachman.
Zachman framework
Enterprise architecture framework used to define and understand a business environment developed by The Open Group.
TOGAF
Risk-driven enterprise security architecture that maps to business initiatives, similar to the Zachman framework.
SABSA framework
U.S. Department of Defense architecture framework that ensures interoperability of systems to meet military mission goals.
DoDAF
Architecture framework used mainly in military support missions developed by the British Ministry of Defence.
MODAF
Set of control objectives used as a framework for IT governance developed by Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI).
CobiT
Set of controls that are used to secure U.S. federal systems developed by NIST.
SP 800-53
Internal control model used for corporate governance to help prevent fraud developed by the Committee of Sponsoring Organizations (COSO) of the Treadway Commission.
COSO
Best practices for information technology services management processes developed by the United Kingdom’s Office of Government Commerce.
ITIL
Business management strategy developed by Motorola with the goal of improving business processes.
Six Sigma
Process improvement model developed by Carnegie Mellon.
Capability Maturity Model Integration (CMMI)