Sec+ Acronyms Flashcards
Aup
Agreed-upon principal set forth by a company to go over and help and please of that company may use resources such as computers and Internet access.
ALE
Annual Los expectancy calculation used we didn’t buy risks and calculate the expected loss each year.
ARO
Annualized rate of occurrence – I calculation of how often he threat will occur. For example, the threat that occurs once every five years has an annualized rate of occurrence of 1/5, or 0.2 .
AV
Asset. Value – the assessed value of an item (server, property, and so on) associated with cash flow.
BIA
Business impact analysis dash study of the possible impact of a disruption to a businesses vital resources were to occur.
BPA
Business Partners agreement Dash an agreement between partners any business that outlines the responsibilities, obligation, and sharing of profits and losses.
EF
Exposure factor– The potential percentage of lost to an asset if a threat is realized.
ISA
Interconnection security agreement – as defined by nist and publication 800 Dash 27, it is an agreement established with tween organizations that are not reconnected IT systems. The I SA also supports a memorandum of understanding or agreement between the mou /A between the organizations
MTD
Maximum Callabell downtown – the maximum period of time that a business process can be down for the survival of the organization is at risk.
MTBF
Mean Time between failures – the measurement of anticipated lifetime of a system or component.
MTTF
Mean Time to failure – the measurement of the average of how long it takes a system or component to fail.
MTTR
Mean what time to restore that the measurement of how long it takes to repair a system or component want to feel your occurs.
MOA
Memorandum of understanding am all you/memorandum of agreement MOE – most commonly known as an MOU rather than MOA, this is the document between two or more parties finding their respective responsibilities in accomplishing a particular goal and mission, such as security system.
RPO
Recovery point objective – the point last known good data prior to an outage that is used to recover.
RTO
Recovery time objective – the maximum amount of time that a process or service is allowed to go down and still to be considered acceptable
RAID
Redundant array of independent disks that configuration of multiple hard disk used to provide fault tolerance should a disk feel. Different levels of our RAID exist
Risk
The probability that a particular thread will occur, either accidentally or intentionally, leaving a system Bonable and the impact of this occurring.
Risk analysis
And I valuation of each risk that can be identified. Each of us should be outlined, describe, and evaluated on the likelihood of it occurring.
Risk assessment
And a valuation of the possibility of a threat level and ability existing. And assessment must be performed before any other actions – such as how much to spend on a security system in terms of dollars and manpower – can be decided.
Risk avoidance
Strategy of dealing with risk in which it is decided that the best approach is to avoid the risk
Risk calculation
The process of calculating the risks that exist in terms of cost, number, frequency, and so forth.
Risk deterrence
It strategy of dealing with my skin which it is decided that the best approach is to discourage potential attackers from engaging in behavior that leads to the risk
Risk mitigation
A strategy of dealing with risking which it is decided that the best approach is to lessen the risk
Risk transference
Your strategy of dealing with risk in with you just decided that the best approach is to offload some of the risk through insurance, third-party contracts, and/or shared responsibility.
SLA
Service – level agreement – an agreement that specifies performance requirements for the ender. This agreement may use meantime before failure and me time to repair as performance measures in the SLA.
SLE
Single life expectancy – the cost of single last one of occurs. This loss can be a critical value, but can be the result of the attack
SPOF
Single point of failure – I think a weakness that is capable of bringing an entire system down.
vulnerability
If law or weakness in some part of the system security procedures, design, implementation, or internal controls that could expose it to danger (accidental or intentional) and result in violation of the security policy.
Three types of control
Management operational and technical