home/dictionary/framework/FFIEC Cybersecurity Assessment Tool, Baseline, May 2017

Dictionary · FFIEC Cybersecurity Assessment Tool, Baseline, May 2017

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
308 senses under FFIEC Cybersecurity Assessment Tool, Baseline, May 2017

Verbs

67 senses
change

To make, or become different; alter.

address

To deal with an issue.

follow

To act according to the instruction or example.

review and test

To assess something and evaluate it for quality, performance, or reliability.

reflect

To embody or represent something in a way that is true to the original or appropriate.

alert

To warn or give notice of potential danger, threats, or issues.

update

To modernize or bring up to date.

recover

To return to a normal state.

hold

To keep possession of something or have in ones possession.

use

To put into action.

identify

To establish, indicate, or verify who or what someone or something is.

make available

To provide access.

maintain

To retain records in identifiable record keeping systems over time in accordance with appraisal decisions.

approve

To officially accept as satisfactory.

improve

To make or become better; enhance in value or quantity.

implement

To put a plan, policy, decision, agreement, etc. into action or effect.

require

To specify as compulsory or obligatory.

assign

To appoint someone to a job, duty, task, or organization; allocate a job, duty, or task.

manage

To run a business, organization, or undertaking; direct; administer; be in charge of.

store

To retain or enter information for future electronic retrieval.

define and assign roles and responsibilities

To specify and designate roles and responsibilities for functions within an organization.

define

To state or describe exactly the nature, scope, or meaning of something.

authorize

To give official permission or approval for an undertaking; sanction; empower.

mitigate

To lessen or to try to lessen the severity, pain, seriousness, extent, or gravity of.

utilize

To put into use or make use of.

terminate

To bring to an end; form a conclusion; close.

base

To serve as a foundation, underlying support, or starting point for something.

transmit

To send or cause something to pass on from one place or person to another.

segregate

To isolate, set apart, or divide from the rest or each other.

be available

To be able to be used or obtained.

prepare

To make something or someone ready for use or consideration.

retain

To keep in possession.

document

To record something in detail through photography, writing, or other form.

prioritize

To determine the order for dealing with a series of items or tasks according to their relative importance.

prevent

To keep something from happening or stop someone from doing something.

enhance

To make greater in value, beauty, effectiveness, quality, etc.; augment; increase; intensify.

monitor and review

To observe something and examine it for correctness.

specify

To identify or state clearly, definitely, and in detail.

respond

To act or behave in reaction to someone or something.

prohibit

To forbid something by authority, law, or other rule.

notify

To give someone facts or information about something, typically in an official or formal manner.

evaluate

To assess or form an idea of the nature, quality, ability, amount, number, or value of something.

enforce

To compel obedience to, observance of, or compliance with laws, rules, duties, or commitments.

set

To arrange a device so it performs a particular operation.

classify

To arrange information, things, or a group of people in classes or categories according to shared qualities or characteristics.

collaboration

To work together, especially in a joint intellectual effort.

integrate

To merge two things or one thing with another to form a whole.

establish

To start something that will last for a long time, or to create or set something in a particular way.

conduct

To manage, control, or organize and carry out.

comply

To act in accordance with a wish, command, law, standard, or contractual obligation.

establish and maintain

To lay the groundwork for something and uphold it or ensure continuation by requiring maintenance.

share

To have something in common or use jointly.

restrict

To confine or put a limit on; keep under control; restrain.

perform

To carry out an action, task, or function.

contact

To communicate with someone.

trigger

To cause a process to happen or a mechanism to take place.

control

To exercise authority over; direct; regulate. This include exercising authority over the processesses of issuance and revocation, management, and auditing.

involve

To include someone or something in an activity or situation, or as a necessary part.

protect

To shield or defend from danger, harm, injury, loss, destruction, or damage.

coordinate

To bring the different elements of a complex activity into a relationship that will ensure efficiency.

control and monitor

To have the power to direct or operate something in a certain way and regularly observe it.

validate

To check or prove the accuracy or logical soundness of something; verify; confirm.

limit

To restrict or assign boundaries to something.

provide

To supply or make something available for use.

sign

To write one's name on something, or to provide some other mark to identify oneself or give authorization.

review

To examine or evaluate formally with the intent of making changes if necessary.

lock

To fasten or secure something with a mechanical device used for keeping things fastened.

Nouns

241 senses
Multi-factor authentication

Authentication using two or more factors to achieve authentication. Factors include: • something you know (e.g. password/PIN); • something you have (e.g., cryptographic identification device, token); or • something you are (e.g., biometric).

access

The ability, right, or permission to approach, enter, speak with someone, or use something.

access control

A system or measures that limit the retrieving, obtaining, or examining of information, or information processing resources, to persons or applications authorized by the system or data classification.

access log

A log that lists who has been permitted to physically or logically gain access.

accountability

The fact or condition of being required or expected to justify actions or decisions; responsibility.

privileged utility program

Specialized system software used to perform a particular function or system maintenance that requires the ability to bypass, modify, or disable the technical or operational system security controls.

provide for

Make adequate preparation for something.

protocols, ports, applications, and services list

A compilation of all protocols, ports, applications, and services that are available.

recourse

The legal right to demand compensation or payment.

report

A written document describing the findings of some individual or group.

regulator

A person or body that supervises a particular industry, business activity, or legal body.

regulatory notice

Any documented (in print or electronic format) notice used to inform affected parties regarding regulatory issues.

remote access

Access to an organization's nonpublic information system by an authorized user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet).

removable storage media

Portable electronic storage media such as magnetic, optical, and solid-state devices, which can be inserted into and removed from a computing device, and that is used to store text, video, audio, and image information. Such devices have no independent processing capabilities. Examples include hard disks, floppy disks, zip drives, compact disks (CDs), thumb drives, pen drives, and similar USB storage devices.

requirement

A formal statement of a necessary condition; something needed.

reputation

The beliefs, opinion, or social evaluation of the public about someone or something.

response team

Response teams include business, IT, emergency management, public affairs, communications, and continuity personnel.

resilience

The ability of a network, system, business function, or organization to recover automatically or quickly from a disruption, typically with minimal recognizable effect. For example, an armored cable will resist failure when put under stress.

risk management control

Controls associated with instruments that introduce risks that require effective adherence to the relevant clearing house, association, interchange, and regulatory requirements.

scenario

A postulated sequence or development of events.

secure coding practice

A method used as part of the software development life cycle risk management so that software applications are designed and implemented with appropriate security requirements.

security alert

Any form of notification or alert structure that something is amiss with the system's configuration, settings, etc.

security assessment report

Any published finding of security component audits such as a vulnerability assessment.

security control

A safeguard or countermeasure to avoid, counteract or minimize security risks relating to personal property, or any company property. For business-to-business facing organizations whose service may affect the financial statements of the other company, the prospect may require successful audit reports of policy controls.

Security Event Log

This record contains records of any security-related and auditing-related events.

security requirement

A necessary condition that must be met to ensure the confidentiality, integrity, and availability of the information being processed, stored, or transmitted.

security test

The purpose of this task is to determine if the security features of a system are implemented and functioning as designed. This process includes hands on functional testing, penetration testing and vulnerability scanning.

service provider

A business that provides its customers with a service.

separation of duty

Practice of dividing steps in a function among different individuals, so as to keep a single individual from being able to subvert the process.

session

A session is an encounter between an end-user interface device (e.g., computer, terminal, process) and an application, including a network logon. One user session is the time between starting the application and quitting.

stability

The state of being firmly established; unlikely to change or fail.

status

The relative position of state of something.

spam filtering software

A program that analyzes e-mails to look for characteristics of spam, and typically places messages that appear to be spam in a separate e-mail folder.

software security control

The software and procedures used to assist in the protection of information systems and the files created, communicated and stored by individuals and organization.

software

Computer programs and associated data, within the cryptographic boundary and usually stored on erasable media, that may be dynamically written or modified during execution. (e.g., Erasable media may include but are not limited to hard drives.).

strong cryptography

Cryptographic techniques that make it almost impossible to decrypt without having the key. The strength relies on the cryptographic key used. Effective size of the key should meet the minimum key size of comparable strengths recommendations based on industry-tested and accepted algorithms and strong key lengths. Examples of industry-tested and accepted standards and algorithms for encryption include AES (128 bits and higher), TDES (minimum double-length keys), RSA (1024 bits and higher), ECC (160 bits and higher), and ElGamal (1024 bits and higher). See NIST Special Publication 800-57 (http://csrc.nist.gov/publications/) for more information.

subscribe

Receive or obtain regularly.

sufficiency

Having enough information to meet the needs of the user.

system implementation

The process of putting a planned system into action; the stage of systems development in which hardware and software are acquired, developed and installed, the system is tested and documented, people are trained to operate and used the system, and an organization converts to the use of a newly developed system.

system

An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people.

system configuration

The setting of various switches and jumpers for hardware and the defining of values of parameters for software.

System Development Life Cycle

A series of stages that the process of system development goes through in order to design and produce a system.

technology

Equipment and machinery developed from the practical application of scientific knowledge to commerce or industry.

test

The purpose of this task is to determine if and how well something works.

threat monitoring process

A particular series of actions or steps to analyze, assess and review audit trails and other information collected for the purpose of searching out system events that may constitute violations of system security.

termination

A coming to an end of a contract period.

threat

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.

timely manner

As quickly as is reasonable in a particular situation.

third party

A person or group besides the two primarily involved in a situation, agreement, business, etc.

threat information sharing

The act of providing threat information between two or more parties for the mutual benefit to use such information to mitigate risks.

third party dependency

A third party that may have no interest in an organization's project or operations, but can can have an impact on them.

third party management

An arrangement where a company will assume the day-to-day management of a property or package of properties it does not own for another company or institution in return for a fee.

third party risk assessment

The process of identifying and determining the risk associated to a specific third party.

Third Party Service Provider List

This record contains lists of all third party service providers and their contacts within each organization.

threat intelligence service

A service that provides threat intelligence so that organizations can mitigate threats and remediate vulnerabilities.

threat information

Information about a potential source of danger or undesirable event.

train

The purpose of this task is to teach a person or animal a skill or behavior.

transaction

In Computing: data and operations related to a specific task that must be processed completely or rejected.

track

Follow the course, trail, or progress of.

unauthorized software

An application or device driver who use is not been permitted by the controlling authority.

unauthorized access

Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.

unauthorized physical access

Access to a building, room, site, etc that is not permitted.

unusual activity

Unexpected or extraordinary behavior.

user

This role focuses on the use or operation of a system, having an account on a system, accessing a cryptographic module to obtain cryptographic services, or receiving or using services from an automated information system facility. Any individual or organization that uses or operates a system, has an account on a system, accesses cryptographic modules to obtain cryptographic services, or uses or receives services from an automated information system facility should be assigned to this role.

unnecessary default account

Default accounts that are not necessary to be installed on the system.

user access

The ability of an end-user to obtain, examine, or retrieve data or a file.

user access review

A process that an organization implements to actively monitor and verify the appropriateness of a users' access to systems and applications based on an understanding of the minimum necessary for users to perform or support business activities or functions. The responsibility for granting access and performing periodic verification of the appropriateness of that access rests with the system and/or business owner of the system or application.

vulnerability

A weakness in an information system, administrative controls, internal controls, system security practices and procedures, implementation, or physical layout that could be accidentally triggered or intentionally exploited by a threat in order to gain unauthorized access to information or disrupt processing.

warrant

Justify or necessitate a course of action.

when

This limits a Control or Mandate's secondary verb to be put into play as something is happening.

wireless network

A computer network that is not connected by cables of any kind.

critical system

A system that is necessary and crucial to the organization.

administrative responsibility

The day to day management of a system or process, including tasks like creating accounts, updating role assignments, tracking requests, and so forth.

affected party

This role is focused on contracting parties who are affected by organizational activities. Any individual who is in a contract and is affected by organizational activities should be assigned to this role.

after

This limits a Control or Mandate's secondary verb to be put into play once the event taking place has concluded.

alert parameter

A parameter that is used to determine when an alert is triggered.

anomalous activity

Any actions that are outside of what is expected, as measured against what "normally" should be happening, occur.

anomalous transaction

A transaction that deviates from the standards, procedures, and processes used to create a transaction.

antimalware software

A program that monitors a computer or network to identify all major types of malware: virus, trojan horse, spyware, Adware, worms, rootkits, etc.

application

A computer program designed to help people perform a certain type of work, including specific functions, such as payroll, inventory control, accounting, and mission support. Depending on the work for which it was designed, an application can manipulate text, numbers, graphics, or a combination of these elements. An application contrasts with systems program, such as an operating system or network control program, and with utility programs, such as copy or sort.

apply

Bring or put into operation or practical use.

appropriate personnel

The suitable or proper person or persons employed in an organization.

assessment

The purpose of this task is to estimate or determine the nature, value, ability, or quality of someone or something.

asset

In Information Technology: the combination of logical and physical components and resources and are grouped into the specific classes (information, systems, software, hardware, people).

asset inventory

A complete list of all the resources owned by an organization that is used in operations or used to support operations.

audit log

A security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.

attack

In Computing: any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.

audit

The task of reviewing and examining records and activities to assess the adequacy of controls, to ensure compliance with established policies and operational procedures or other applicable contractual and licensing requirements, and to recommend necessary changes in controls, policies, or procedures. May be carried out by internal or external groups. The most common forms are compliance, operational, or vulnerability.

authentication control

One of several systems which restrict user access to a network.

authentication procedure

The documented steps necessary to authenticate the identity of an entity through the use of credentials in order to gain access to the system.

authorized personnel

This role is focused on employees who are granted access to the organizations assets, information, and/or certain areas, or permitted to conduct certain work. Any individual who is sanctioned by management should be assigned to this role.

be responsible

Have an obligation to do something, or have control over or care for someone, as part of one’s job or role.

before

This limits a Control or Mandate's secondary verb to be put into play prior to the event taking place.

background

A persons previous experience, education, or social circumstances.

criticality

The level of impact an interruption in service or exposure will have on an organization. (CMS)

critical business function

A process that is necessary for a business to perform.

critical business process

A business process that must be restored immediately after a disruption to ensure the affected firm's ability to protect its assets, meet its critical needs, and satisfy mandatory regulations and requirements.

critical third party

A necessary third party that is vital to an organization's operations.

budget process

The process by which an organization or individual creates and manages a financial plan. Within a larger business, the budget process is typically performed by managers who often obtain projected spending requirements and suggestions from their staff.

board

Is the corporate board of directors or any other oversight authority for the organization.

board committee

A group consisting of the members of a board of directors that is mandated to carry out specified functions, programs, or projects assigned by the board.

boundary protection device

A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) provides information system boundary protection.

business continuity

The providing of critical business functions to customers, suppliers, regulators, and other entities at acceptable predefined levels after incidents and business interruptions.

Business Continuity Plan

A proposal detailing the processes and procedures to put into place to ensure that essential organizational functions can continue during and after a disaster.

business continuity testing

The act of performing a test to evaluate the effectiveness of an organization's business continuity plan.

business continuity program

A documented approach undertaken by an organization to implement business continuity.

Business Value

How much a business is worth. Business value is a highly subjective measure because it involves estimating the value of intangible assets like trade secrets and brand recognition. It adds to this the value of tangible assets like machinery and stockholder equity. Business value is especially important for potential investors or buyers.

change management process

Activities performed while following the change management procedures.

code

In Computing: a set of symbols used to communicate instructions for performing operations; a character set.

communication channel

A medium over which data is transferred between remote devices.

contract

A document that records the terms and conditions of a legally binding agreement.

Controls

This record category contains standards used as a comparison for checking and verifying results of a survey or experiment or contains policies, procedures, practices, and organizational structures designed to provide reasonable assurance that the business objectives will be achieved and undesired events will be prevented or detected.

confidential data

Data or records that are private or proprietary.

condition

A particular state of a person or thing.

contact information

Information usually containing the person's telephone number(s), fax number, address, and electronic mail address(es).

continuity plan

A step by step outline of management procedures designed to maintain and restore business operations in the event of an emergency or system failure.

contract termination

Cancellation of an entire contract or of its most significant part.

corrective action

Action that is taken in order to rectify errors that were made.

customer educational material

Educational materials used to inform customers about topics regarding the products and/or services that they use.

cyber threat

A potential cyber attack, which may be assigned a probability of occurrence that can be used for cyber risk assessment.

customer information

A term used in the Information Security Standards to mean any record containing non-public personal information about a customer, whether in paper, electronic, or other form, that is maintained by or on behalf of a financial institution.

cybersecurity event

Any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on such Information System.

cybersecurity training

Activities that are used to teach people about tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.

Customer Service

The purpose of this function is to provide and manage information delivery and support to an organization's clients regarding its products and/or services.

customer access

A customer’s ability and means to communicate or interact with a system, use system resources or to control system components and functions.

cyber incident

Actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein.

customer information system

For purposes of the Information Security Standards, “customer information systems” means any methods used to access, collect, store, use, transmit, protect, or dispose of customer information.

damage

Detrimental effects; physical harm or injury that impairs value or usefulness.

cyber incident response roles and responsibilities

The functions and duties of personnel who are responsible for triaging, and resolving events regarding cybersecurity events that disrupt operations and alerting interested personnel and affected parties in conformance with pertinent standards.

information security training

Training strives to produce relevant and needed (information) security skills and competencies.

information security program

A documented approach for organizing and directing all activities undertaken to ensure the confidentiality, integrity, and availability of the information held by the organization.

data

A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)

Information Security risk

The combination of the probability and severity of impact that results from a threat successfully breaking through a vulnerability in security and attacking the organization's information.

information security roles and responsibilities

The position and collection of tasks, duties, obligations that participants undertake to perform the daily and all special tasks in the role of information security.

data classification

The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification. Levels of sensitivity of data are assigned according to predefined categories as data are created, amended, enhanced, stored or transmitted. The classification level is an indication of the value or importance of the data to the organization.

data flow diagram

A simplified drawing of how data moves throughout an application, system, or network.

data recovery

The purpose of this task is to restore data that has been damaged, lost, or corrupted.

default password

Password on system administration, user, or service accounts predefined in a system, application, or device; usually associated with default account. Default accounts and passwords are published and well known, and therefore easily guessed.

discuss

Talk about (something) with another person or group of people.

destruction

The purpose of this task is to remove an asset from existence and to ensure media cannot be reused as originally intended and information is virtually impossible to recover or prohibitively expensive to recover.

destruction of data

The complete physical destruction of data or of the data carrier containing them.

detect

Discover, investigate, or discern the existence or presence of something.

information security strategy

A plan to mitigate risks while complying with legal, statutory, contractual, and internally developed requirements.

information security threat

Any circumstance or event with the potential to adversely impact the measures taken so that information and information systems are protected from unauthorized access, use, disclosure, disruption, modification, or destruction.

information technology risk management

Information Technology risk management is the application of the principles of risk management to an Information Technology organization in order to manage the risks associated with the field. Information Technology risk management aims to manage the risks that come with the ownership, involvement, operation, influence, adoption and use of Information Technology as part of a larger enterprise. Information Technology risk management is a component of a larger enterprise risk management system. This encompasses not only the risks and negative effects of service and operations that can degrade organizational value, but it also takes the potential benefits of risky ventures into account.

due diligence

The purpose of this task is to take reasonable action in order to comply with a law or industry standard.

elevated access

Roles or permissions that, if misused or compromised, could allow a person to exploit the system for his or her own gain or illicit purpose.

employee

This role focuses on individuals who work directly for an organization, e.g. university, government, company. Any individual who works directly for an organization and is paid a wage or salary for their work should be assigned to this role.

employee access

The privileges to gain entry to somewhere or to use something given only to employees.

encrypted connection

A connection between a computer and another computer where the traffic between the two systems have been encrypted.

emerging issue

A known topic or problem that is changing or a topic or problem that most people are not aware of.

encrypt

Convert data or information into a cipher or code; encipher; encode; conceal.

expense

The cost required for something; the money spent on something.

escrow

A deed, a bond, money, or a piece of property held in trust by a third party to be turned over to the grantee only upon fulfillment of a condition.

event

Any observable occurrence in a system and/or network. Events sometimes provide indication that an incident is occurring. (CNSSI-4009).

event log

A basic resource that helps provide information about network traffic, usage and other conditions. An event log stores these data for retrieval by security professionals or automated security systems to help network administrators manage various aspects such as security, performance and transparency.

expertise

Skill or knowledge in a particular area.

exist

Have objective reality or being.

external connection

A link between a system within the organizational boundaries and a secondary (or multiple) system(s) outside of the organizational boundaries.

external connectivity

A computer or network connection to an outside, uncontrolled network that is unprotected by perimeter security, e.g., a modem connection to a network computer.

filter

In Computing: a piece of software that transforms data in some way, such as removing unwanted spaces from text or formats it for use in another application.

financial condition

The status of a firm's assets, liabilities and equity positions at a specific point in time, often described in a financial statement.

firewall

Hardware and/or software gateway technology that protects network resources from unauthorized access. A firewall permits or denies computer traffic between networks with different security levels based upon a set of rules and other criteria.

firewall rule

Firewall rules examine the control information in individual packets. The rules either block or allow those packets based on rules that are defined on these pages. Firewall rules are assigned directly to computers or to policies that are in turn assigned to a computer or collection of computers.

formal contract

An officially recognized agreement between two or more parties.

gather

Bring together and take in from scattered places or sources.

grant access to the system

The purpose of this task is to permit a user to logically or physical gain entry to computer and/or network.

hardware

Physical, mechanical, and electrical components of a system, especially a computer.

government agency

A state, county, or federal government organizations that enforce laws, rules, or regulations.

Identification and Authentication

The purpose of this function is to verify the identity of an entity through the use of specific credentials as a prerequisite for granting access to resources in an IT system.

Incident Management System

The tools (software and otherwise), reports, and processes used to input, process, and close incident reports from input through resolution.

if

This limits a Control or Mandate's secondary verb to be put into play should the event occur.

incident detection

The process of identifying that an intrusion has been attempted, is occurring, or has occurred.

incident response policy

The documented rules and guidelines on how an organization should address and manage the aftermath of a disaster or other significant event that may affect the organization's people or ability to function productively.

incident response process

An established or official method for implementing the policy for incident response or performing the tasks, processes, or operations to address and manage the aftermath of a disaster or other significant event that may affect the organization’s people or ability to function productively which must be executed in the same manner in order to obtain the same results in the same circumstances.

incident

An assessed occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system; or the information the system processes, stores, or transmits; or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.

include

Make part of a whole or set.

Incident Report

A record containing the details of an incident. Each incident record documents the lifecycle of a single incident.

incident response notification procedure

A detailed description of the steps necessary to tell interested personnel and affected parties about disruptions in service and operations in conformance with applicable standards.

incident response

The purpose of this task is to address and manage the aftermath of a disaster or other significant event that may affect the organization's people or ability to function productively.

incident response notification process

A series of steps undertaken to detect, triage, and resolve events that disrupt operations and alert applicable personnel and clients in conformance with pertinent standards.

incident response personnel

Personnel assigned by an organization to manage or engage in incident response tasks.

information security control

Practices and procedures established to protect information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability.

incident response program

A documented approach for organizing and directing all activities undertaken to handle known security breaches or attacks in such a way as to limit damage and reduce the time it takes for the organization to recover time and costs.

incident response team member's role and responsibility

The functions and duties of individuals who are suppose to return service or operations back to normal after a disruption has occurred.

industry standard

A norm or requirement established within an industry; it is typically a formal document establishing uniform technical or engineering, processes, processes, or criteria.

information security event

Identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of controls, or a previously unknown situation that may be security relevant.

information flow

The path data takes from its original source to the end user.

install

Set up for use.

Information Security

The measures taken so that information and information systems are protected from unauthorized access, use, disclosure, disruption, modification, or destruction.

information security incident

A single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.

intellectual property

Creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract 'properties' has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.

internal risk management

Internal risk management involves all activities relating to the processes of analyzing exposure to risk and determining appropriate counter-measures.

investigation

The purpose of this task is to discover and examine the facts of an incident or allegation to establish the truth.

issue

An important question, point, or problem to be disputed, discussed, or decided.

job responsibility

The tasks and duties required of a particular employment position.

least privilege

The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.

Law Enforcement

The purpose of this function is to protect people, places, and things from criminal activity due to noncompliance with applicable laws, including patrols, undercover operations, responses to emergency calls, as well as arrests, raids, and seizures of property.

likelihood

The state or fact of something's being likely; probability.

return

An act of going or coming back again to a place, person, condition, or activity.

log

The purpose of this task is to record events or transactions in record-keeping systems.

log management

The process for generating, transmitting, storing, analyzing, and disposing of log data.

logging operation

The process of collecting and interpreting logs within configured parameters.

logical access

The ability to interact with data through access control procedures such as identification, authentication, and authorization.

reuse

The action of using something again or more than once.

management

This role focuses on administering, organizing, and overseeing the organization. Any individuals who are involved in the administration, organization, supervision, and oversight of the organization should be assigned to this role.

meet

Fulfill or satisfy (a need, requirement, or condition).

migrate

Move software or hardware to a different computer system.

meeting

The social act of assembling for some common purpose.

mobile device

Includes notebook computers, personal digital assistants, cellular telephones; and other computing and communications devices with network connectivity and the capability of periodically operating in different physical locations.

missing security update

A security update that has not been implemented.

monitoring procedure

A description of the steps that are necessary to watch and check the progress or quality of something over a period of time according to standards.

mitigation action

An action taken by an organization to reduce the impact of a possible problem or incident.

monitor

The purpose of this task is to regularly assess IT processes or systems over time for quality and compliance with control requirements.

network diagram

A diagram showing system components and connections within a networked environment.

no longer needed for legal, regulatory, or business reason

Something that is not needed anymore for business, regulatory, or legal reasons.

network activity baseline

Establishing a trusted baseline document involves identifying the following: - network data points of interest - length of the baseline data collection period - methods and tools used to collect and store data Suggested network data points of interest include the following: - a list of predetermined devices a given workstation or server should communicate with - VPN usage, including access times, bandwidth and resources used, source IP addresses, and geolocation information - the known set of ports and protocols in use by the network - firewall and intrusion detection system logs - normal traffic patterns and flows.

non-production environment

A test environment that simulates the setup in which the system will be deployed.

operational performance report

A report that details the findings of a performance review of a business's operations.

operation

An active process; a discharge of a function.

password

A string of characters that allows access to a computer, interface, or system.

password attempt

An effort to input a password to gain access to a system.

password complexity

A set of rules that defines what set of characters and the amount of characters a password must contain.

patch management program

A documented approach for organizing and directing all activities undertaken to manage patches or upgrades for software and hardware.

risk assessment

A prioritization of potential business disruptions based on severity and likelihood of occurrence. The risk assessment includes an analysis of threats based on the impact to the institution, its customers, and financial markets, rather than the nature of the threat.

patch

A file containing software or operating system code that is intended to correct a vulnerability, a defect, or to improve the functioning of code.

patch log

A list that shows patches that been installed and need to be installed to update software.

risk

A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: • the adverse impacts that would arise if the circumstance or event occurs; and • the likelihood of occurrence. Note: Information system-related security risks are those risks that arise from the loss of confidentiality, integrity, or availability of information or information systems and consider the adverse impacts to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.

period of inactivity

The planned or actual time an operation is not engaged in run time, or the active production of a product. Idle time is typically scheduled, for setup, maintenance or other activities, or unscheduled due to lack of a required resource such as material.

physical security control

Devices that relies on the proper application of physical barriers and deterrents to control behavior. It's through the use of physical controls that an organization controls physical access to facilities and systems. They also assist in maintaining the operating environments necessary to continue information processing and delivery activities.

policy

An official expression of principles that direct an organization's operations.

physical access log

A record of who has accessed something.

port

A physical entry or exit point of a cryptographic module that provides access to the module for physical signals, represented by logical information flows (physically separated ports do not share the same physical pin or wire).

process

A particular series of actions or steps to bring about a certain outcome; series of procedures.

policy and procedure

A set of policies are principles, rules, and guidelines formulated or adopted by an organization to reach its long-term goals and typically published in a booklet or other form that is widely accessible. Policies and procedures are designed to influence and determine all major decisions and actions, and all activities take place within the boundaries set by them. Procedures are the specific methods employed to express policies in action in day-to-day operations of the organization. Together, policies and procedures ensure that a point of view held by the governing body of an organization is translated into steps that result in an outcome compatible with that view.

protection

The activity of keeping someone or something safe from harm or injury.

procedure

An established or official method for implementing a policy or performing a task or operation which must be executed in the same manner in order to obtain the same results in the same circumstances.

qualified personnel

A person who is certified or licensed to work in a specific field; competent person.

prompt

In Computing: to request input from a user.

production code

Code that is currently used in a production environment.

production environment

Production environment is a term used mostly by developers to describe the setting where software and other products are actually put into operation for their intended uses by end users. A production environment can be thought of as a real-time setting where programs are run and hardware setups are installed and relied on for organization or commercial daily operations.