Front | Back |
The control approach used by an organization to acknowledge the risk as being a part of an organization's business process.
|
Acceptance
|
The ability to use, manipulate, modify, or affect an object.
|
Access
|
Consists of the user access lists, matrices, and capability tables that govern the rights and privileges of users.
|
Access Control List (ACL)
|
Security measures such as a badge reader that admits or prohibits people from entering sensitive areas.
|
Access Controls
|
One of three general categories of unethical and illegal behavior in which individuals with authorization and privileges to mange information within the organization cause harm or damage inadvertently -- that is, without intent to do harm.
|
Accident
|
Authorizes an IT system to process, store, or transmit information.
|
Accreditation
|
An attribute of information in which the data is free of errors and has the value that the user expects.
|
Accuracy
|
The value an asset gains over time within an organization.
|
Acquired Value
|
Devices that scan networks for highly detailed information. An "active" scanner is one that initiates traffic on the network in order to determine security holes.
|
Active Vulnerability Scanners
|
Rules designed to prohibit data packets with certain addresses or partial addresses from passing through devices.
|
Address Restrictions
|
A Federal Information Processing Standard (FIPS) that specifies a cryptographic algorithm for use within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.
|
Advanced Encryption Standard (AES)
|
Any software program intended for marketing purposes such as those used to deliver and display advertising banners or popups to the user's screen or tracking the user's online usage or purchasing activity.
|
Adware
|
Sworn testimony that certain facts are in the possession of the investigating officer that they feel warrant the examination of specific items located at a specific place.
|
Affidavit
|
A detailed examination of the events that occur from the first detection of a security breach to the final recovery.
|
After-Action Review (AAR)
|
Information created by combining pieces of data that are not considered private in themselves, but raise privacy concerns when taken together.
|
Aggregate Information
|