Dictionary · NY DFS Part 500 (NYCRR Title 23, Chapter 1, Part 500)
L2 — definitions grouped by regulatory framework.
Verbs
59 senses- accept
To consent to receive (something given or offered).
- update
To modernize or bring up to date.
- determine
To establish or ascertain exactly as a result of research or calculation.
- address
To deal with an issue.
- revise
To look over again and alter something in the light of further evidence.
- adopt
To take up and follow a course or method.
- design
To make or work out a plan for a specific purpose; devise.
- use
To deploy or employ something for some purpose.
- approve
To officially accept as satisfactory.
- designate
To appoint someone to a post, duty, office, etc.
- assess
To estimate or determine the nature, value, ability, or quality of someone or something; evaluate.
- review
To examine or evaluate formally with the intent of making changes if necessary.
- review and update
To assess and change something if necessary and keep it up to date based on pertinent criteria.
- assist
To give support or aid to someone, typically by doing a share of the work; help.
- support
To provide aid or give assistance to.
- utilize
To put into use or make use of.
- base
To serve as a foundation, underlying support, or starting point for something.
- document
To record something in detail through photography, writing, or other form.
- retain
To keep in possession.
- be at rest
To be inactive or not in motion.
- tamper
The act of altering something secretly or improperly.
- secure
To protect against danger, harm or threats; safeguard.
- submit
To present a proposal, application, or document to a person or body for approval, consideration, or judgment.
- transit
To make a passage through or across an area.
- evaluate
To assess or form an idea of the nature, quality, ability, amount, number, or value of something.
- change
The act or process of making or becoming different; altering.
- carry out
To perform a task or operation.
- protect
In Computing: to limit access to or the use of data, primary storage memory, memory address, etc.
- certify
To recognize as having met certain standards or possessing certain qualifications.
- enforce
To compel obedience to, observance of, or compliance with laws, rules, duties, or commitments.
- conduct
To manage, control, or organize and carry out.
- provide access
To make something accessible, or make accessible an endeavor someone is to undertake.
- establish
To start something that will last for a long time, or to create or set something in a particular way.
- comply
To act in accordance with a wish, command, law, standard, or contractual obligation.
- establish and maintain
To lay the groundwork for something and uphold it or ensure continuation by requiring maintenance.
- provide
To supply or make something available for use.
- make available
To provide access.
- limit
To restrict or assign boundaries to something.
- respond
To answer or say something in reply.
- maintain
To keep up; continue a condition or situation; carry on.
- control
Practices and procedures established to create business value and minimize risk.
- manage
To run a business, organization, or undertaking; direct; administer; be in charge of.
- mitigate
To lessen or to try to lessen the severity, pain, seriousness, extent, or gravity of.
- follow
To act according to the instruction or example.
- reconstruct
To build or form something again after damage or destruction.
- harm
To damage or injure physically or mentally.
- transmit
To send or cause something to pass on from one place or person to another.
- absent
To keep away or remove.
- recover
To return to a normal state.
- notify
To give someone facts or information about something, typically in an official or formal manner.
- restore
To bring back to previous or normal condition, place, or position; re-establish; repair; renovate; rehabilitate.
- identify
To establish, indicate, or verify who or what someone or something is.
- hold
To keep possession of something or have in ones possession.
- require
To specify as compulsory or obligatory.
- redesign
To design something again or in a different manner.
- reflect
To embody or represent something in a way that is true to the original or appropriate.
- perform
To carry out an action, task, or function.
- implement
To put a new system into effect.
- oversee
To supervise a person or their work.
Nouns
157 senses- Multi-factor authentication
Authentication using two or more factors to achieve authentication. Factors include: • something you know (e.g. password/PIN); • something you have (e.g., cryptographic identification device, token); or • something you are (e.g., biometric).
- normal operation
The day-to-day functions of the business.
- outsourced application
An application that is contracted out to an external provider for the development, deployment, and management.
- part
Something determined in relation to something that includes it.
- oversight
The action of supervising something.
- Penetration testing
The purpose of this task is to determine the effectiveness of security defenses by mimicking the actions of real-life attackers.
- performance
The act of doing a job, an activity, etc.
- periodic assessment
An assessment that is conducted on a regular interval.
- personnel
People who are employed by and work directly within an organization.
- physical security
The protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.
- process
A particular series of actions or steps to bring about a certain outcome; series of procedures.
- policy and procedure
A set of policies are principles, rules, and guidelines formulated or adopted by an organization to reach its long-term goals and typically published in a booklet or other form that is widely accessible. Policies and procedures are designed to influence and determine all major decisions and actions, and all activities take place within the boundaries set by them. Procedures are the specific methods employed to express policies in action in day-to-day operations of the organization. Together, policies and procedures ensure that a point of view held by the governing body of an organization is translated into steps that result in an outcome compatible with that view.
- provision
Something provided or supplied.
- Quality Assurance
The purpose of this function is to review the software project activities and to test the software products throughout their life cycle in order to determine if they are meeting the functional specifications of the users and are following the established plans, standards, and procedures to maintain a desired level of quality for a service or product.
- record
Any item, collection, or grouping of information about an individual that is maintained by an agency, including, but not limited to, his education, financial transactions, medical history, and criminal or employment history and that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph.
- report
To give a spoken or written account of something that has been seen, done etc.
- remedial action
Action taken to implement long-term restoration of environmental quality.
- Remediation
The purpose of this task is to correct a vulnerability or eliminate a threat.
- request
An act of politely or formally expressing a need or desire for something; inquiry.
- requirement
A formal statement of a necessary condition; something needed.
- resource
An asset available for use.
- reporting
The action of providing an account of something.
- reporting requirement
Set by the organization, this requires third parties to provide certain update and other status reports, such as work status, Service Level Agreement status, etc.
- representation
A description or portrayal of someone or something.
- risk
A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: • the adverse impacts that would arise if the circumstance or event occurs; and • the likelihood of occurrence. Note: Information system-related security risks are those risks that arise from the loss of confidentiality, integrity, or availability of information or information systems and consider the adverse impacts to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.
- responsibility
The state or fact of having control over someone.
- risk assessment
The purpose of this task is to support the identification, prioritization, and estimation of risks to organizational operations, organizational assets, individuals, other organizations, and the Nation through the operation of an information system and assign a value to assets, threat frequency, and consequences.
- risk-based authentication
Any risk-based system of authentication that detects anomalies or changes in the normal use patterns of a Person and require s additional verification of the Person’s identity when such deviations or changes are detected, such as through the use of challenge questions.
- roles and responsibilities
The position and collection of tasks, duties, obligations that participants undertake to complete a project.
- secure development practice
A software development practice where the confidentiality, integrity, and availability of the software code is protected against threats and vulnerabilities.
- secure disposal
The process of erasing or overwriting data stored on media before relinquishing control of said media when no longer required, in a manner that ensures that no data can be recovered from the media.
- Schedules
This record category contains ordered lists of times at which things are planned to occur.
- Security
The protection of computer facilities, computer systems, and data stored on computer systems or transmitted via computer networks from loss, misuse, or unauthorized access. Computer security, as defined by Appendix III to OMB Circular A-130, involves the use of management, personnel, operational, and technical controls to ensure that systems and applications operate effectively and provide confidentiality, integrity, and availability.
- senior manager
A manager who has responsibilities and authority broader in scope than a front-line manager and typically reports into a director or general manager level role. They manage the day-to-day activities of the business by setting direction in-line with the overall business strategy, setting goals and objectives and managing communication throughout their group.
- self-regulatory organization
An organization that exercises some degree of regulatory authority over an industry or profession.
- service
Something of value provided to a customer such as banking, legal support, IT support, etc. that is not a physical thing with material value.
- Statement
A written clear or definite expression of something.
- superintendent
A high ranking police officer.
- supervisory agency
This role focuses on the examination or auditing of financial records of financial institutions. Any state authority that is required by law to examine or audit financial records should be assigned to this role.
- system and network monitoring
System and Network Monitoring supports all activities related to the real-time monitoring of systems and networks for optimal performance. System and network monitoring describes the use of tools and observation to determine the performance and status of information systems and is closely tied to other Information and Technology Management sub-functions.
- system
An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people.
- system development
The process of designing and producing a system.
- system operation
The day to day processes of using a system according to its design and development criteria.
- test
A procedure, method, or process meant to ascertain the performance, reliability, or quality of something.
- system security
The protection of Bulk Electronic System (BES) Cyber Systems against compromise that could lead to misoperation or instability in the Bulk Electronic System (BES).
- to the extent that
Every time that.
- third party
A person or group besides the two primarily involved in a situation, agreement, business, etc.
- third party and supply chain management
Supply chain management is the oversight of materials, information, and finances as they move in a process from supplier to manufacturer to wholesaler to retailer to consumer. Supply chain management involves coordinating and integrating these flows both within and among companies, i.e., Third Parties. Third party management is the process whereby companies monitor and manage interactions with all external parties with which it has a relationship.
- third party management policy
The guidelines and rules on how an organization should to direct and supervise business activities and relations with a third party.
- Third Party Service Provider
As defined in the PCI DSS and PA-DSS Glossary of Terms, Abbreviations, and Acronyms, a service provider is a business entity that is not a payment brand, directly involved in the processing, storage, or transmission of cardholder data on behalf of another entity. This also includes companies that provide services that control or could impact the security of cardholder data. There are many types of businesses that could fall into the category of “service provider,” dependent on the services provided. Most commonly, a TPSP could be a legally separate entity; but it can also be a separate business unit or component of the entity under assessment—for example, an internal service provider—where the provider is outside the direct management control of the entity assessed.
- train
The purpose of this task is to teach a person or animal a skill or behavior.
- unauthorized use
Use of an asset for a person's own purpose without the consent of the owner.
- unauthorized access
Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.
- updating
The act of changing something to bring it up to date (usually by adding something).
- unless
This limits a Control or Mandate's secondary verb to be put into play upon the occasion of the event not taking place.
- user access privilege
An identified entitlement that an end-user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.
- User account activity
All events and processes executed including logons and logouts associated with a system user account.
- weakness
An exception noted in tests of properly designed internal controls that may indicate ineffectiveness. Management must consider the extent of a weakness in such cases. Weaknesses can be classified as a simple deficiency, significant deficiency, or a material weakness.
- Vulnerability Assessment
The purpose of this task is to systematically examine an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.
- warranty
A written guarantee, issued to the purchaser of a product or service by its manufacturer, that promises the good condition of the product or service and to repair or replace it within a specified period of time.
- access
The ability, right, or permission to approach, enter, speak with someone, or use something.
- access control
A system or measures that limit the retrieving, obtaining, or examining of information, or information processing resources, to persons or applications authorized by the system or data classification.
- adequacy
Sufficient to satisfy a requirement or meet a need.
- affiliate
This role focuses on persons who are affiliated with other persons or organizations or on organizations or individuals that control or are controlled by a third party. Any person associated with another person or organization or any organization or individual being controlled by or controlling a third party should be assigned to this role.
- application development
The process during which a team creates a software program for a customer.
- area
A region or part of a town, a country, or the world.
- assessment
The purpose of this task is to estimate or determine the nature, value, ability, or quality of someone or something.
- asset inventory
A complete list of all the resources owned by an organization that is used in operations or used to support operations.
- Audit trail
This record contains chronological records that enables one to trace information back to the original input source, who changed what and when for accountability, allowing for the reconstruction and examination of the sequence of activities surrounding or leading to specific operations, procedures, or events in a security relevant transaction from inception to final result, including source documents, electronic logs, and records of access to restricted files.
- authorized user
A person who has the authority or permission to manage access or make changes to an account.
- Board of Directors
A group of persons chosen to govern the affairs of a corporation or other large institution.
- availability requirement
Availability requirement relates to the need for information to be available when required.
- be impractical
Be something that is not adapted for use or action; not sensible or realistic.
- Covered Entity
Any Person operating under or required to operate under a license, registration, charter, certificate, permit, accreditation or similar authorization under the Banking Law, the Insurance Law or the Financial Services Law.
- criterion
A principle or standard by which something may be judged or decided.
- business operation
The day-to-day execution, monitoring and management of business processes.
- Business Continuity planning
The act of creating processes and procedures to put into place to ensure that essential organizational functions can continue during and after a disaster.
- categorization
An established category.
- Chief Information Security Officer
The person in an organization responsible for: • Developing and implementing an information system security training and orientation program in accordance with FISMA requirements; • Developing, evaluating and providing information about the CMS Information Security (IS) Program, and communicating CMS IS Program requirements and concerns to CMS management and personnel; • Ensuring that System Security Plans (SSPs) are developed, reviewed, implemented, and revised; • Maintaining documentation used to establish systems security level designations for all SSPs within CMS; • Ensuring that IS Risk Assessments (RAs) are developed, reviewed, and implemented for the SSP process; • Providing leadership & participating in IS incident response and reporting IS incidents in accordance with reporting procedures developed and implemented by Federal mandates, DHHS, and CMS; • Mediating and resolving systems security issues that arise between two CMS organizations, CMS and other federal organizations, or CMS and States or contractors; • Assuring that CMS business Component Information System Security Officers (ISSOs) are appointed and trained; • Assisting CMS business Component ISSOs in developing local systems security; and • Researching state-of-the-art systems security technology and disseminating information material in a timely fashion.
- Compliance
The state of being in accordance with laws, regulations, industry codes, organizational standards, or contractual arrangements.
- compensating control
An internal control that reduces the risk of an existing or potential control weakness that could result in errors or omissions. Compensating controls may be considered when an organization does not wish to meet a requirement explicitly as stated, due to legitimate technical or documented business constraints but has sufficiently mitigated the risk associated with the requirement through implementation of other controls. Compensating controls must • meet the intent and rigor of the original stated requirement; • repel a compromise attempt with similar force; • be above and beyond other PCI DSS requirements (not simply in compliance with other PCI DSS requirements); and • be commensurate with the additional risk imposed by not adhering to the originally stated requirement.
- context
The circumstances and conditions that surround an event or environment.
- Confidentiality
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. The loss of confidentiality is the unauthorized disclosure of information.
- confidentiality, integrity, and availability
A triad of security practices that: (1) prohibit an unauthorized entity from accessing, creating, modifying, disclosing or destroying information; and (2) require information systems are operational when needed by authorized users.
- Continuous Monitoring
The purpose of this task is to maintain ongoing awareness of information security, vulnerabilities, and threats in order to support organizational risk decisions and to assess, analyze, and report on security controls and organizational risks at a frequency that sufficiently supports risk-based security decisions and adequately protects an organization's information.
- contractual protection
A measure in a contract intended to shield an individual or entity from harm, injury, or liability.
- Countermeasure
Actions and system controls present or undertaken to reduce or moderate the effect of specific vulnerabilities. A synonym for control. The term countermeasure can be used to refer to any type of control, but it is most often used when referring to measures that increase resilience, fault tolerance, or reliability of an IT service.
- customer data privacy
The ability an organization or individual has to determine what customer data in a computer system can be shared with third parties.
- cyber threat
A potential cyber attack, which may be assigned a probability of occurrence that can be used for cyber risk assessment.
- cybersecurity event
Any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on such Information System.
- cybersecurity function
An activity that is integral to the operation of the cybersecurity program.
- cybersecurity vulnerability
A flaw in a organization's system which leaves it exposed to and defenseless against a cyberthreat.
- Cybersecurity
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: - Availability - Integrity, which may include authenticity and non-repudiation - Confidentiality
- cybersecurity personnel
All people who are employed by an organization to perform cybersecurity activities.
- cybersecurity program
An integrated group of activities designed and managed to meet cybersecurity objectives for the organization and/or the function. A cybersecurity program may be implemented at either the organization or the function level, but a higher-level implementation and enterprise viewpoint may benefit the organization by integrating activities and leveraging resource investments across the entire enterprise.
- cybersecurity requirement
Requirements levied on an Information Technology and Operations Technology that are derived from organizational mission and business case needs (in the context of applicable legislation, Executive Orders, directives, policies, standards, instructions, regulations, procedures) to ensure the confidentiality, integrity, and availability of the services being provided by the organization and the information being processed, stored, or transmitted.
- cybersecurity risk
A risk to organizational operations, (including mission, functions, image, and reputation), resources, and other organizations due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information, Information Technology, and/or Operations Technology.
- cybersecurity policy
A set of criteria for the provision of security services.
- cybersecurity procedure
A detailed description of the steps necessary to implement cybersecurity in conformance with applicable standards.
- information sharing
The exchange of data among different technologies, organizations, or persons.
- cybersecurity training
Activities that are used to teach people about tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.
- cybersecurity update
A widely released fix for a cybersecurity related vulnerability.
- data
A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)
- data classification
The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification. Levels of sensitivity of data are assigned according to predefined categories as data are created, amended, enhanced, stored or transmitted. The classification level is an indication of the value or importance of the data to the organization.
- data governance
A set of processes that ensures that important data assets are formally managed throughout the enterprise.
- decision-making role
The person in the organization that makes organizational decisions.
- definition
A concise statement of the meaning of a word, phrase, or symbol.
- detect
Discover, investigate, or discern the existence or presence of something.
- device management
Managing the implementation, operation, and maintenance of a physical and/or virtual device. This includes the use of various administrative tools and processes for the maintenance and upkeep of a computing, network, mobile and/or virtual device.
- direction
The management or guidance of someone or something.
- Information System
A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Note: Information systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.
- documentation
Materials created or collected to provide facts for reference, especially when created to substantiate decisions, actions, or events.
- due diligence
Measures regarded as prudent, responsible, and necessary to conduct a thorough and objective investigation, review, or analysis.
- due diligence process
The series of actions an organization takes to implement the steps needed to ensure they respect human rights and do not contribute to conflict.
- effectiveness
The degree to which information is relevant and pertinent to the business process as well as delivered in a timely, correct, consistent, and usable manner.
- Encryption
The process of rendering plaintext unintelligible by converting it to ciphertext that can be read only by those with the knowledge to decode the plaintext from the ciphertext. (SAA: Glossary of Archival and Records Terminology).
- evaluation
Act of ascertaining or making a judgment about the amount, number, value, or worth of something.
- equivalent
A person or thing equal to another in value or measure or force or effect or significance etc.
- environmental control
A mechanism that prevents or mitigates damage to facilities and interruptions in service. Smoke detectors, fire alarms and extinguishers, and uninterruptible power supplies are some examples of environmental controls.
- existing control
Controls that are already present in an organization to protect against the identified threats and vulnerabilities.
- external communication
A message that originates from outside the organization.
- feasibility
The state or degree of being easily or conveniently done.
- External Network
A network not controlled by the organization.
- financial transaction
An event or agreement carried out between a buyer and a seller to exchange an asset for payment.
- fulfill
Satisfy or meet a requirement or condition.
- goal
The object of a person or processes' ambition or effort; the aim or desired result.
- government body
The government of any country or of any political subdivision of any country,including: any instrumentality of any such government; any other person or organization authorized by law to perform any executive, legislative, judicial, regulatory, administrative, military, or police functions of any such government, and; any intergovernmental organization.
- Guideline
Recommendations suggesting, but not requiring, practices that produce similar, but not identical, results.
- identified risk
An observed threat to a process or asset.
- identity management
The purpose of this task is to implement a set of functions and capabilities used for assurance of identity information (e.g., identifiers, credentials, attributes).
- improvement
A change for the better; progress in development.
- relate to
Have reference to; concern.
- Identification
The process or act of establishing who or what someone or something is.
- in-house developed application
An application that has been developed within the organization.
- Impact
To come into contact with another object forcibly.
- include
Make part of a whole or set.
- individual
A human being.
- inform
Give someone facts or information.
- incident response activity
Any task performed by an organization in reaction to an incident.
- incident response
The purpose of this task is to address and manage the aftermath of a disaster or other significant event that may affect the organization's people or ability to function productively.
- Incident response plan
The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against an organization's IT systems(s).
- information
Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.
- Information Security
The measures taken so that information and information systems are protected from unauthorized access, use, disclosure, disruption, modification, or destruction.
- information security policy
The rules and guidelines of an organization on how to ensure the confidentiality, integrity, and availability of the organization's information.
- Integrity
Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.
- Internal Network
A network where: • the establishment, maintenance, and provisioning of security controls are under the direct control of organizational employees or contractors; or • cryptographic encapsulation or similar security technology implemented between organization-controlled endpoints provides the same effect (at least with regard to confidentiality and integrity). An internal network is typically organization-owned, yet may be organization-controlled while not being organization-owned.
- internal process
All the activities and key processes required in order for the company to excel at providing the value expected by the customers.
- internal communication
A message that is sent from within an organization.
- knowledge
Facts, information, and skills acquired by a person through experience or education; the theoretical or practical understanding of a subject.
- likelihood
The state or fact of something's being likely; probability.
- malicious act
An intentional, wrongful act performed against another without legal justification or excuse.
- monitor
To watch and check the progress or quality of something over a period of time; keep under regular surveillance.
- negative effect
A measure, expressed as a function of the likelihood that an event may occur, how fast the event may impact objectives and the estimated negative impact that an event may have on objectives or the impact that an event had on objectives.
- network security
The protection of computer networks and their services from unauthorized entry, modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and that there are no harmful side effects. Network security includes providing for data integrity.
- notice
Any documented (in print or electronic format) notice or notification to another person by taking such steps as may be reasonably required to inform the other person in ordinary course, whether or not the other person actually comes to know of it.
- obligation
A binding agreement committing a person to an immediate or future payment or other action.
- non-public information
Any personally identifiable or company proprietary information that is not publicly available. Non-Public Information includes but is not limited to: certain company proprietary information, such as internal policies and memorandums; and personal information such as an individual’s name, address or telephone number. It also includes information requiring higher levels of protection according to the company’s security policy, such as company proprietary trade secrets or personal information that bundles an individual’s name, address or telephone number with a Social Security number, driver’s license number, account number, credit or debit card number, personal identification number, health information, religious opinions or a user ID or password.