Prepare Flashcards
Security protections commensurate with the risk resulting from the unauthorized access, use, disclosure, disruption, modification, or destruction of information.
Adequate Security
The process an organization employs to assign security or privacy requirements to an information system or its environment of operation; or to assign controls to specific system elements responsible for providing a security or privacy capability (e.g., router, server, remote sensor).
Allocation
A software program hosted by an information system.
Application
The individual, group, or organization responsible for conducting a security or privacy assessment.
Assessor
System and subsystem components that must be protected, including but not limited to: all hardware, software, data, personnel, supporting physical environment and environmental systems, administrative support and supplies.
Asset
All components of an information system to be authorized for operation by an authorizing official.
This excludes separately authorized systems to which the information system is connected.
Authorization Boundary
A senior federal official or executive with the authority to authorize (i.e., assume responsibility for) the operation of an information system or the use of a designated set of common controls at an acceptable level of risk to agency operations (including mission, functions, image, or reputation), agency assets, individuals, other organizations, and the nation.
Authorizing Official
An organizational official acting on behalf of an authorizing official in carrying out and coordinating the required activities associated with the authorization process.
Authorizing Official Designated Representative
Ensuring timely and reliable access to and use of information.
Availability
A combination of mutually reinforcing controls implemented by technical means, physical means, and procedural means. Such controls are typically selected to achieve a common information security or privacy purpose.
Capability
The senior official that provides advice and other assistance to the head of the agency and other senior management personnel of the agency to ensure that IT is acquired and information resources are managed for the agency in a manner that achieves the agency’s strategic goals and information resources management goals; and is responsible for ensuring agency compliance with, and prompt, efficient, and effective implementation of, the information policies and information resources management responsibilities, including the reduction of information collection burdens on the public.
Chief Information Officer
Another name for “Chief Information Security Officer.”
Senior Agency Information Security Officer
A security or privacy control that is inherited by multiple information systems or programs.
Common Control
An organizational official responsible for the development, implementation, assessment, and monitoring of common controls.
Common Control Provider
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Confidentiality
Maintaining ongoing awareness to support organizational risk decisions.
Continuous Monitoring
A program established to collect information in accordance with pre-established metrics, utilizing information readily available in part through implemented security controls.
Continuous Monitoring Program
The individual, group, or organization responsible for conducting a control assessment.
Assessor
An organization with a defined mission/goal and a defined boundary, using systems to execute that mission, and with responsibility for managing its own risks and performance.
Enterprise
A strategic information asset base, which defines the mission; the information necessary to perform the mission; the technologies necessary to perform the mission; and the transitional processes for implementing new technologies in response to changing mission needs; and includes a baseline architecture; a target architecture; and a sequencing plan.
Enterprise Architecture
The physical surroundings in which an information system processes, stores, and transmits information.
Environment of Operation
A business-based framework for government-wide improvement developed by the Office of Management and Budget that is intended to facilitate efforts to transform the federal government to one that is citizen-centered, results-oriented, and market-based.
Federal Enterprise Architecture
An information system used or operated by an executive agency, by a contractor of an executive agency, or by another organization on behalf of an executive agency.
Federal Information System
With respect to security, the effect on organizational operations, organizational assets, individuals, other organizations, or the nation (including the national security interests of the United States) of a loss of confidentiality, integrity, or availability of information or a system.
Impact
Another name for “Impact Level.”
Impact Value
The assessed worst-case potential impact that could result from a compromise of the confidentiality, integrity, or availability of information expressed as a value of low, moderate or high.
Impact Value
Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, electronic, or audiovisual forms.
Information
The stages through which information passes, typically characterized as creation or collection, processing, dissemination, use, storage, and disposition, to include destruction and deletion.
Information Life Cycle
Official with statutory or operational authority for specified information and responsibility for establishing the controls for its generation, collection, processing, dissemination, and disposal.
Information Owner
The protection of information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity and availability.
Information Security
An embedded, integral part of the enterprise architecture that describes the structure and behavior of the enterprise security processes, security systems, personnel and organizational subunits, showing their alignment with the enterprise’s mission and strategic plans.
Information Security Architecture