Vocab List Flashcards
Acceptance (of Risk)
Senior management chooses to accept the risk of an activity as it is.
Asset Inventory
A full catalog of the organization’s property (tangible, intellectual, digital, etc.), with sufficient detail/descriptions of attributes to determine specific responsibility/ownership and current configuration/disposition/protection.
Availability
Ensuring data can be accessed in authorized manner, as permitted.
Avoidance (of Risk)
Senior management chooses to cease the activity to remove the risk.
Business Impact Analysis
The overall effort (and the artifact resulting from this effort) to assess the relative value of assets within an organization, the potential threats to those assets, and the possible damage that might be caused if an asset or assets is harmed or lost.
Change management
The process, method, and resources used to modify the configuration of assets in the inventory.
CIA Triad
The triad includes these three ideas: confidentiality, integrity, and availability of assets.
Configuration Management
The process, method, and resources used to determine baseline settings and version of assets in the inventory.
Due Care
The legal duty owed by an organization to its constituents (users/customers/employees/the public).
Due Diligence
Documented efforts demonstrating the organization’s activities to provide due care.
Governance
The processes, roles, and policies an organization uses to make decisions.
[Security] Guidelines
Recommendations (not mandates) for security best practices, usually from sources external to the organization.
Integrity
Protecting data from unauthorized modification.
Job Rotation
Shifting personnel (usually within a given department) among various roles throughout the year, for security, morale, and continuity purposes.
Least Privilege
Personnel are only given the minimal set of permissions necessary to perform their job function.
Maximum Allowable Downtime (MAD)
[also referred to as “MTD”— maximum tolerable downtime] The amount of time an organization can suffer an interruption to its critical path and still remain an organization.
Mitigation (of Risk)
Risk is reduced through the use of controls.
Need to Know
Information is only disclosed to those who have a business need and permission to access it.
[Security] Policy
The organization’s strategic security direction and mandates, published and signed by senior management.
Privileged (Users/Account)
Those with more access/permissions than regular users can cause more harm to the organization than regular users (and, historically, have); therefore, privileged accounts must be managed in a more restrictive and thorough manner than regular accounts.
[Security] Procedures
Specific instructions for performing security-related tasks.
Recovery Point Objective (RPO)
The amount of data that can be lost by the organization without destroying the organization (usually measured in time, backward from the current moment; so, “the last 72 hours’ worth of data”).
Recovery Time Objective (RTO)
The duration that an organization can suffer an interruption of its critical path without destroying the organization (measured as time, necessarily less than the MAD/MTD).
Residual Risk
Risk that remains after controls are put into operation (risk mitigation).
Risk
Potential harm to an organization.
Separation of Duties
Purposefully imposing inefficiency on a business process so that one person cannot complete an entire transaction on their own, forcing collusion.
Service Level Agreement (SLA)
The SLA describes, objectively, specifically, and numerically, the terms of the service the provider will deliver on a regular basis.
[Security] Standards
Minimum target levels and security best practices; may be created within the organization and imposed on all business units or may be taken from external creators (such as standards bodies like ISO, PCI, or SANS).
Threat
A factor that poses risk.
Transfer (of Risk)
Another party is paid to share risk on the organization’s behalf.
Vulnerability
An avenue that causes or enhances risk.
Algorithm
A mathematical function that is used in the encryption and decryption processes.
Antimalware Solutions
Solutions that inhibit, detect, quarantine, and remove malware targeting the environment.
Asymmetric Cryptography
Cryptography in which two different but mathematically related keys are used, and one key is used to encrypt, and another is used to decrypt.
Asynchronous
Encrypt/decrypt requests are processed in queues.
Avalanche Effect
A minor change in either the key or the plaintext will have a significant, large change in the resulting ciphertext.
Ciphertext or Cryptogram
The altered form of a plaintext message that is unreadable by anyone except the intended recipients.
Coaxial Cable
Insulated copper wire terminating in a single pin.
Collision
Occurs when a hash function generates the same output for different inputs.
Confusion
Provided by mixing or changing the key values used during the repeated rounds of encryption.
Content Distribution Networks (CDNs)
Also sometimes referred to as content delivery network; used to replicate portions of data geographically closer to end users in order to enhance performance/quality of service.
Convergence
The practice of using one communication medium/protocol to convey multiple forms of communication.
Cryptanalysis
The study of techniques for attempting to defeat cryptographic techniques and, more generally, information security services.
Cryptosystem
The entire cryptographic operation and system; typically includes the algorithm, key, and key management functions, together with the services that can be provided through cryptography.
Decryption
The reverse process from encryption.
Diffusion
Provided by mixing up the location of the plaintext throughout the ciphertext.
Digital Certificate
A digital certificate is an electronic document that contains the name of an organization or individual, the business address, the digital signature of the certificate authority issuing the certificate, the certificate holder’s public key, a serial number, and the expiration date.
Distributed System
System that performs a single task using resources that are located across multiple machines.