1/27
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Audit
Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures.
Defense in Depth
Information security strategy integrating people, technology, and operations capabilities to establish variable barriers across multiple layers and missions of the organization.
Discretionary Access Control (DAC)
A certain amount of access control is left to the discretion of the object's owner, or anyone else who is authorized to control the object's access. The owner can determine who should have access rights to an object and what those rights should be.
Insider Threat
An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service.
Logging
Collecting and storing user activities in a log, which is a record of the events occurring within an organization's systems and networks.
Logical Access Control Systems
An automated system that controls an individual's ability to access one or more computer system resources, such as a workstation, network, application or database. A logical access control system requires the validation of an individual's identity through some mechanism, such as a PIN, card, biometric or other token. It has the capability to assign different access privileges to different individuals depending on their roles and responsibilities in an organization.
Object
Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. Access to an ____ (by a subject) implies access to the information it contains. See subject.
Principle of Least Privilege
The principle that users and programs should have only the minimum privileges necessary to complete their tasks.
Privileged Account
An information system account with approved authorizations of a privileged user.
Segregation of Duties
The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats.
Subject
Generally an individual, process or device causing information to flow among objects or change to the system state.