home/dictionary/framework/Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy

Dictionary · Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
9 senses under Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy

Nouns

9 senses
Specification

A document that specifies, in a complete, precise, verifiable manner, the requirements, design, behavior, or other characteristics of a system or component and often the procedures for determining whether these provisions have been satisfied.

Trustworthiness

The degree to which an information system (including the information technology components that are used to build the system) can be expected to preserve the confidentiality, integrity, and availability of the information being processed, stored, or transmitted by the system across the full range of threats and individuals’ privacy.

Developer

A general term that includes developers or manufacturers of systems, system components, or system services; systems integrators; vendors; and product resellers. Development of systems, components, or services can occur internally within organizations or through external entities.

application

A software program hosted by an information system.

Availability

Ensuring timely and reliable access to and use of information.

audit log

A chronological record of system activities, including records of system accesses and operations performed in a given period.

Cybersecurity

Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation.

Countermeasure

Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of a system. Synonymous with security controls and safeguards.

Firmware

Computer programs and data stored in hardware - typically in read-only memory (ROM) or programmable read-only memory (PROM) - such that the programs and data cannot be dynamically written or modified during execution of the programs.