A standard of measurement used in management of security-related activities.
New cards
2
Security perimeter
The boundary that defines the area of security concern and security policy coverage.
New cards
3
Security policy
A high-level document representing an enterprise’s information security philosophy and commitment.
New cards
4
Security procedures
The formal documentation of operational steps and processes that specify how security goals and objectives set forward in the security policy and standards are to be achieved.
New cards
5
Security software
Software used to administer security, which usually includes authentication of users, access granting according to predefined rules, monitoring and reporting functions.
New cards
6
Security standards
Practices, directives, guidelines, principles or baselines that state what needs to be done and focus areas of current relevance and concern; they are a translation of issues already mentioned in the security policy.
New cards
7
Security testing
Ensuring that the modified or new system includes appropriate controls and does not introduce any security holes that might compromise other systems or misuses of the system or its information
New cards
8
Security/transaction risk
The current and prospective risk to earnings and capital arising from fraud, error and the inability to deliver products or services, maintain a competitive position, and manage information.
New cards
9
Segregation/separation of duties (SoD)
A basic internal control that prevents or detects errors and irregularities by assigning to separate individuals the responsibility for initiating and recording transactions and for the custody of assets.
New cards
10
Sensitivity
A measure of the impact that improper disclosure of information may have on an enterprise.
New cards
11
Sequence check
Verification that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research.
New cards
12
Sequential fle
A computer file storage format in which one record follows another.
New cards
13
Service bureau
A computer facility that provides data processing services to clients on a continual basis.
New cards
14
Service delivery objective (SDO)
Directly related to the business needs, SDO is the level of services to be reached during the alternate process mode until the normal situation is restored.
New cards
15
Service desk
The point of contact within the IT organization for users of IT services.
New cards
16
Service level agreement (SLA)
An agreement, preferably documented, between a service provider and the customer(s)/user(s) that defines minimum performance targets for a service and how they will be measured.
New cards
17
Service provider
An organization supplying services to one or more (internal or external) customers.
New cards
18
Service Set Identifier (SSID)
A 32-character unique identifier attached to the header of packets sent over a wireless local area network (WLAN) that acts as a password when a mobile device tries to connect to the base station subsystem (BSS).
New cards
19
Service user
The organization using the outsourced service.
New cards
20
Service-oriented architecture (SOA)
A cloud-based library of proven, functional software applets that are able to be connected together to become a useful online application.