Vulnerability classification
Categorizing vulnerabilities based on their characteristics
Exposure factor
Measure of the potential impact of a vulnerability
Environmental variables
Factors that influence the impact of a vulnerability in a specific environment
Industry/organizational impact
Assessing the impact of vulnerabilities on specific industries or organizations
Risk tolerance
An organization's willingness to accept or mitigate risks
Vulnerability response and remediation
Actions taken to address and fix vulnerabilities
Patching
Applying updates or fixes to software to address vulnerabilities
Insurance
Coverage to mitigate financial losses due to cybersecurity incidents
Segmentation
Dividing a network into smaller segments to contain potential attacks
Compensating controls
Alternate security measures implemented to mitigate vulnerabilities
Exceptions and exemptions
Allowances made for specific cases where vulnerabilities cannot be immediately addressed
Validation of remediation
Process of verifying that vulnerabilities have been successfully addressed
Rescanning
Performing another vulnerability scan after remediation
Audit
Examination of systems/processes to ensure compliance and effectiveness
Verification
Confirming that vulnerabilities have been fixed and are no longer present
Reporting
Documenting and communicating the findings and actions taken
Monitoring computing resources
The process of tracking and observing computer systems, applications, and infrastructure to ensure their optimal performance, security, and availability.
Log aggregation
The practice of collecting and consolidating log data from various sources, such as servers, applications, and network devices, to gain a comprehensive view of system activities and troubleshoot issues.
Alerting
The act of notifying users or administrators about potential issues or threats detected by monitoring systems, enabling timely response and mitigation.
Scanning
The process of examining computer systems or networks to identify vulnerabilities, security weaknesses, or potential risks that may compromise their integrity or confidentiality.
Reporting
The generation and presentation of information about the status or performance of computing resources, providing insights for decision-making, troubleshooting, and compliance purposes.
Archiving
The practice of storing data for long-term retention and future reference, ensuring its availability and integrity for compliance, analysis, or historical purposes.
Alert response and remediation/validation
The process of taking immediate action to address and resolve identified alerts, followed by validation to ensure the effectiveness of the response and mitigate potential risks.
Quarantine
The act of isolating potentially compromised systems or resources to prevent further harm, containing the impact of security incidents and facilitating investigation and remediation.
Alert tuning
The adjustment of alert settings to reduce false positives or improve detection accuracy, optimizing the monitoring system's ability to identify genuine threats and minimize unnecessary notifications.
Security Content Automation Protocol (SCAP)
A set of standards and specifications for automating security-related tasks, including vulnerability management, configuration assessment, and compliance checking.
Benchmarks
Reference points or standards used to evaluate and measure system performance or security, providing a basis for comparison, optimization, and adherence to industry best practices.
Agents/agentless
Software agents or methods that collect and transmit data for monitoring purposes, or monitoring without the need for dedicated agents, respectively.
Security information and event management (SIEM)
A system that collects and analyzes security event data from various sources, enabling real-time threat detection, incident response, and compliance monitoring.
Antivirus
Software designed to detect, prevent, and remove malicious software, protecting computer systems and data from viruses, worms, trojans, and other types of malware.
Data loss prevention (DLP)
Technologies and strategies aimed at preventing unauthorized access or leakage of sensitive data, ensuring its confidentiality, integrity, and availability.
Simple Network Management Protocol (SNMP) traps
Notifications sent by network devices to a central management system for monitoring and troubleshooting, providing information about network events, performance, and errors.
NetFlow
A network protocol used for monitoring and collecting IP traffic information, enabling network administrators to analyze and optimize network performance, detect anomalies, and troubleshoot issues.
Vulnerability scanners
Tools that identify and assess vulnerabilities in computer systems or networks, helping organizations proactively address security risks and strengthen their overall security posture.
Firewall
A security device that monitors and controls network traffic based on predetermined rules.
Access lists
Lists of rules that determine network traffic permissions.
Ports/protocols
Specific communication endpoints and rules for transmitting data between devices.
Screened subnets
A network architecture that separates and protects internal networks from external networks using firewalls.
IDS/IPS
Intrusion Detection System/Intrusion Prevention System - Security systems that monitor network traffic for suspicious activity and prevent attacks.
Trends
Patterns in network security threats and attacks.
Signatures
Patterns of known malicious activity used by IDS/IPS systems to identify and block threats.
Web filter
A security tool that blocks or filters web content based on predefined rules or categories.
Agent-based
A type of web filter that requires software installation on devices to enforce web filtering policies.
Centralized proxy
A server that acts as an intermediary between client devices and the internet, providing web filtering and caching.
URL scanning
The process of analyzing URLs to determine if they are safe or malicious.
Content categorization
The classification of web content into categories based on its nature or purpose.
Block rules
Rules that prevent access to specific websites or web content.
Reputation
A measure of the trustworthiness or reliability of a website or IP address based on historical data.
Operating system security
Measures and practices to protect the operating system of a computer or device from unauthorized access or attacks.
Group Policy
A feature in Windows operating systems that allows administrators to manage and enforce security settings across a network.
SELinux
Security-Enhanced Linux - A security framework for Linux that provides access control and mandatory access control policies.
Secure protocols
Configuring and using communication protocols to protect data during transmission.
Protocol selection
Choosing the appropriate network protocol based on security requirements and compatibility.
Port selection
Choosing specific network ports for communication based on security and functionality needs.
Transport method
The method used to transmit data between devices, such as wired or wireless communication.
DNS filtering
Blocking or allowing access to websites or domains based on DNS queries.
Email security
Measures and protocols to protect email communication from unauthorized access or malicious content.
DMARC
An email authentication protocol that helps prevent email spoofing and phishing attacks.
DKIM
An email authentication method that allows the sender to digitally sign the email to verify its authenticity.
SPF
An email authentication protocol that verifies the sender's IP address to prevent email spoofing.
Gateway
A network device that serves as an entry point to a network and provides security features such as email filtering.
File integrity monitoring
The process of monitoring and detecting unauthorized changes to files or systems.
DLP
Data Loss Prevention - Measures and technologies to prevent the unauthorized disclosure of sensitive data.
Network access control
A security solution that controls network access based on device compliance with security requirements.
Endpoint detection and response
Security solutions that monitor and respond to threats on individual devices or endpoints.
User behavior analytics
The analysis of user actions and behavior to detect and prevent security threats or anomalies.
Provisioning user accounts
The process of creating user accounts
De-provisioning user accounts
The process of removing user accounts
Permission assignments
Assigning permissions to users
Implications of permission assignments
Understanding the consequences of permission assignments
Identity proofing
Verifying the identity of a user
Federation
Connecting and sharing identity information between different systems
Single sign-on (SSO)
A mechanism that allows users to authenticate once and access multiple systems
Lightweight Directory Access Protocol (LDAP)
A protocol used for accessing and managing directory information
Open authorization (OAuth)
A framework for granting access to resources without sharing passwords
Security Assertions Markup Language (SAML)
An XML-based framework for exchanging authentication and authorization data
Interoperability
The ability of different systems to work together and exchange information
Attestation
The process of verifying the integrity and authenticity of a system or data
Access controls
Mechanisms used to regulate access to resources
Mandatory access control
Access control based on predefined rules and policies
Discretionary access control
Access control based on the discretion of the resource owner
Role-based access control
Access control based on the roles assigned to users
Rule-based access control
Access control based on predefined rules and conditions
Attribute-based access control
Access control based on the attributes of users and resources
Time-of-day restrictions
Limiting access based on specific time periods
Least privilege
Granting users the minimum privileges necessary to perform their tasks
Multifactor authentication
Using multiple factors to verify a user's identity
Biometrics
Using unique physical or behavioral characteristics for authentication
Hard/soft authentication tokens
Physical or virtual devices used for authentication
Security keys
Cryptographic devices used for authentication and encryption
Factors
Categories of information used for authentication
Something you know
Authentication based on knowledge of a secret
Something you have
Authentication based on possession of a physical device
Something you are
Authentication based on unique physical or behavioral characteristics
You haven't studied these terms yet!
Select these 218
Somewhere you are
Authentication based on the location of the user
Password concepts
Various aspects related to passwords
Password best practices
Guidelines for creating and managing secure passwords
Password length
The number of characters in a password
Password complexity
The use of different types of characters in a password
Password reuse
Using the same password for multiple accounts
Password expiration
Requiring users to change their passwords after a certain period
Password age
The length of time a password has been in use
Password managers
Tools for securely storing and managing passwords
Password less authentication
Authentication methods that do not require passwords
Privileged access management tools
Software solutions for managing and controlling privileged access
Just-in-time permissions
Granting temporary access to privileged resources when needed
Password vaulting
Securely storing and managing privileged account passwords
Ephemeral credentials
Temporary credentials that are valid for a short period
User Provisioning
Automating the process of creating and managing user accounts
Resource Provisioning
Automating the process of allocating and managing resources
Guard Rails
Automated policies and restrictions to ensure compliance and prevent errors
Security Groups
Automated groups that control access and permissions to resources
Ticket Creation
Automating the generation and tracking of support tickets
Escalation
Automated process of escalating issues to higher levels of support
Enabling/Disabling Services and Access
Automating the activation or deactivation of services and access rights
Continuous Integration and Testing
Automating the integration and testing of code changes
Integrations and APIs
Automating the interaction between different systems and applications
Efficiency/Time Saving
Reducing manual effort and saving time through automation
Enforcing Baselines
Automating the enforcement of standard configurations and settings
Standard Infrastructure Configurations
Automating the setup and maintenance of consistent infrastructure
Scaling in a Secure Manner
Automating the process of scaling resources while maintaining security
Employee Retention
Automation can reduce repetitive tasks, increasing job satisfaction
Reaction Time
Automation allows for faster response to incidents and issues
Workforce Multiplier
Automation enables a smaller team to accomplish more
Complexity
Consideration of the increased complexity of automated systems
Cost
Consideration of the financial implications of automation
Single Point of Failure
Consideration of the risk of relying on a single automated system
Technical Debt
Consideration of the potential future costs of automation
Ongoing Supportability
Consideration of the long-term maintenance and support of automated systems
Process
A series of steps taken to achieve a specific goal or outcome in the field of cybersecurity.
Preparation
The act of making necessary arrangements and organizing resources to effectively respond to cybersecurity threats and incidents.
Detection
The process of identifying or discovering the presence of potential cybersecurity threats or incidents within a system or network.
Analysis
The systematic examination and breakdown of complex cybersecurity topics or substances into smaller components to gain a better understanding of them.
Containment
The action of implementing measures to control and limit the impact of a cybersecurity threat or incident, preventing it from spreading further.
Eradication
The complete removal or destruction of a cybersecurity threat or incident from a system or network.
Recovery
The process of restoring a system or network to a normal state or condition after a cybersecurity threat or incident has occurred.
Lessons learned
Knowledge or understanding gained from past experiences with cybersecurity threats or incidents, which can be applied to future situations to improve security measures.
Training
The action of educating individuals or groups on specific cybersecurity skills or behaviors to enhance their ability to prevent, detect, and respond to threats.
Testing
The process of evaluating a system or component through manual or automated means to verify that it meets specified cybersecurity requirements and standards.
Tabletop exercise
A simulated exercise that tests an organization's ability to respond to a hypothetical cybersecurity scenario, allowing for practice and improvement of response strategies.
Simulation
The imitation or representation of a cybersecurity system or process, often used for training and testing purposes.
Root cause analysis
The process of identifying the underlying causes of a cybersecurity incident or problem to prevent its recurrence in the future.
Threat hunting
The proactive search for potential cybersecurity threats that may already be present in a network or system, aiming to identify and eliminate them before they cause harm.
Digital forensics
The process of collecting, analyzing, and preserving electronic evidence in a manner that is admissible in a court of law, often used in cybersecurity investigations.
Legal hold
A requirement to preserve all relevant information related to a legal case or investigation, ensuring its integrity and preventing its alteration or destruction.
Chain of custody
The chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence in a legal or investigative process.
Acquisition
The process of collecting or obtaining specific information, resources, or assets in the context of cybersecurity.
Reporting
The act of providing a detailed account or description of a cybersecurity event, incident, or investigation, often for documentation or regulatory purposes.
Preservation
The act of maintaining something, such as data or evidence, in its original or existing state to ensure its integrity and prevent loss or alteration.
E-discovery
The process of identifying, collecting, and producing electronically stored information in response to a request for production in a lawsuit or investigation, often involving digital evidence.
Log data
Records of events or actions captured by various systems.
Firewall logs
Records of network traffic and firewall actions.
Application logs
Records of events and activities within an application.
Endpoint logs
Records of events and activities on individual devices.
OS-specific security logs
Records of security-related events on an operating system.
IPS/IDS logs
Records of intrusion prevention/detection system events.
Network logs
Records of network-related events and activities.
Metadata
Additional information about log data, such as timestamps or source IP addresses.
Data sources
Various systems or tools that generate log data.
Vulnerability scans
Automated assessments of system weaknesses and potential vulnerabilities.
Automated reports
Generated reports based on predefined criteria or scheduled tasks.
Dashboards
Visual representations of data and metrics for monitoring and analysis.
Packet captures
Capturing and analyzing network traffic at the packet level.
Attestation
The act of verifying or confirming the accuracy of something, such as financial statements or compliance with regulations.
Internal
Related to activities within an organization, including self-assessments and evaluations conducted internally.
Compliance
Adherence to laws, regulations, and standards set by regulatory bodies.
Audit committee
A group responsible for overseeing the auditing process and ensuring its independence and effectiveness.
External
Related to activities outside of an organization, such as independent third-party audits conducted by external entities.
Regulatory
Involving government regulations and requirements that organizations must comply with.
Examinations
Thorough reviews or inspections of an organization's processes, controls, and financial statements.
Assessment
Evaluation or appraisal of something, such as the effectiveness of security measures or the overall control environment.
Penetration testing
Testing the security of a system by attempting to exploit vulnerabilities, aiming to identify weaknesses and potential risks.
Physical
Related to the physical aspects of security, such as access control and protection of physical assets.
Offensive
Testing aimed at identifying vulnerabilities and weaknesses in an organization's systems and processes.
Defensive
Testing aimed at evaluating the effectiveness of security measures and the ability to detect and respond to threats.
Integrated
Combining different types of testing approaches, such as offensive and defensive testing, to provide a comprehensive evaluation.
Known environment
Testing conducted in a familiar and controlled setting, where the system and its vulnerabilities are already known.
Partially known environment
Testing conducted in a somewhat familiar setting, where some information about the system and its vulnerabilities is available.
Unknown environment
Testing conducted in an unfamiliar and unpredictable setting, where the system and its vulnerabilities are unknown.
Reconnaissance
Gathering information about a target system or network to understand its vulnerabilities and potential attack vectors.
Passive reconnaissance
Collecting information without directly interacting with the target system or network, often through passive monitoring or data analysis.
Active reconnaissance
Collecting information by directly interacting with the target system or network, such as through scanning or probing.
Phishing
A fraudulent attempt to obtain sensitive information, such as passwords or credit card details, by disguising as a trustworthy entity in electronic communication.
Campaigns
A coordinated series of actions aimed at achieving a specific goal, often used in the context of cybersecurity to describe organized efforts to deceive or compromise systems.
Recognizing a phishing attempt
The ability to identify and differentiate fraudulent emails or messages that aim to deceive individuals into revealing sensitive information or performing malicious actions.
Responding to reported suspicious messages
Taking appropriate action upon receiving reports of suspicious messages, such as investigating the content, verifying the source, and potentially reporting or blocking the sender.
Anomalous behavior recognition
The skill of identifying unusual or unexpected actions or patterns that deviate from normal behavior, which can indicate potential security threats or breaches.
Risky actions
Actions that pose a potential threat to the security of systems or sensitive information, often resulting from negligence, lack of awareness, or non-compliance with security policies.
Unexpected actions
Actions that deviate from the norm or expected behavior, potentially indicating malicious intent or security vulnerabilities that need to be addressed.
Unintentional actions
Actions that occur without purpose or awareness, often leading to security incidents or breaches due to human error or lack of knowledge.
User guidance and training
The provision of instructions, education, and resources to users to enhance their understanding of cybersecurity best practices and promote responsible behavior.
Policy and handbooks
Guidelines, rules, and manuals that outline expected user behavior, security protocols, and procedures to ensure compliance and mitigate risks.
Situational awareness
The state of being cognizant and attentive to the current environment and context, enabling individuals to identify potential threats or vulnerabilities and respond effectively.
Insider threat
The risk posed by individuals within an organization who have authorized access to systems or information but may misuse their privileges or act maliciously.
Password management
The practices and techniques used to create, store, and safeguard passwords, including the use of strong and unique passwords, password managers, and multi-factor authentication.
Removable media and cables
External devices and connectors that can be detached from a system, such as USB drives or network cables, which can introduce security risks if not properly managed or monitored.
Social engineering
The manipulation of individuals through psychological tactics to deceive or trick them into revealing sensitive information or granting unauthorized access.
Operational security
The measures and practices implemented to protect sensitive information and systems during day-to-day operations, including access controls, incident response, and security monitoring.
Hybrid and remote work environments
Work settings that combine in-person and remote work arrangements, often requiring additional security considerations to ensure the protection of data and systems.
Reporting and monitoring
The processes of notifying and observing activities for security purposes, including reporting suspicious incidents, monitoring system logs, and analyzing security events.
Initial occurrence
The first or starting instance of an event or action, often used in the context of identifying and addressing security incidents or breaches.
Recurring incidents
Security-related events or actions that happen repeatedly or in a pattern, indicating the need for further investigation, remediation, or preventive measures.
Development
The process of creating or building something, often referring to software development or system design with a focus on incorporating security measures and best practices.
Execution
The act of carrying out a plan or action, often used in the context of implementing security measures, conducting security tests, or executing incident response procedures.
Vendor assessment
Evaluation of a vendor's security measures and compliance with relevant standards and regulations.
Penetration testing
Simulated cyber attack conducted to identify vulnerabilities in a vendor's systems and networks.
Right-to-audit clause
Contractual provision that grants the right to audit a vendor's processes and controls to ensure compliance and security.
Evidence of internal audits
Documentation that demonstrates a vendor's internal audit activities, providing assurance of their adherence to established standards and practices.
Independent assessments
Third-party evaluations conducted to assess a vendor's security controls, ensuring objectivity and unbiased analysis.
Supply chain analysis
Thorough examination of a vendor's supply chain to identify potential risks and vulnerabilities that may impact the overall security of the organization.
Vendor selection
Process of carefully choosing a vendor based on predefined criteria and conducting due diligence to ensure their suitability for a specific purpose or project.
Due diligence
Comprehensive investigation and assessment of a vendor's background, capabilities, and reputation to ensure they meet the required standards and expectations.
Conflict of interest
A situation where personal interests or biases interfere with the objective fulfillment of professional duties and responsibilities.
Agreement types
Different categories of contracts and legal agreements that define the terms, conditions, and obligations between parties involved in a business relationship.
Service-level agreement (SLA)
A contractual agreement that outlines the expected performance levels, quality metrics, and responsibilities of both parties in a service-based relationship.
Memorandum of agreement (MOA)
A formal document that establishes the terms, conditions, and obligations of an agreement between parties, often used for collaborative projects or partnerships.
Memorandum of understanding (MOU)
A non-binding agreement that outlines the intentions, goals, and general understanding between parties involved in a cooperative effort or negotiation.
Master service agreement (MSA)
A comprehensive contract that governs future agreements and relationships between parties, providing a framework for ongoing services and obligations.
Work order (WO)/statement of work (SOW)
A document that specifies the tasks, deliverables, timelines, and other relevant details for a specific project or engagement with a vendor.
Non-disclosure agreement (NDA)
A legally binding contract that protects confidential information shared between parties, restricting its disclosure to unauthorized individuals or entities.
Business partners agreement (BPA)
A contract between business partners that outlines their relationship, roles, responsibilities, and terms for collaboration and mutual benefit.
Vendor monitoring
Ongoing evaluation and oversight of a vendor's performance, adherence to contractual obligations, and compliance with relevant standards and regulations.
Questionnaires
A structured set of questions designed to gather specific information from vendors, aiding in the assessment and evaluation process.
Rules of engagement
Guidelines and protocols that define the boundaries, expectations, and procedures for conducting vendor assessments, engagements, and interactions.
Compliance reporting
The process of reporting adherence to regulations and standards, both within an organization (internal compliance reporting) and to external entities (external compliance reporting). It involves documenting and communicating the extent to which an organization is complying with the required rules and guidelines.
Consequences of non-compliance
The penalties and negative impacts that result from the failure to comply with regulations and standards. Non-compliance can lead to various consequences such as fines, sanctions, reputational damage, loss of license, and contractual impacts.
Fines
Monetary penalties imposed for non-compliance with regulations and standards. Fines serve as a deterrent and punishment for organizations or individuals who fail to meet the required compliance obligations.
Sanctions
Punitive measures imposed for non-compliance with regulations and standards. Sanctions can include restrictions, penalties, or other actions taken against organizations or individuals who violate compliance requirements.
Reputational damage
Harm to the reputation of an individual or organization resulting from non-compliance with regulations and standards. Non-compliance can lead to a loss of trust and credibility, which can have long-lasting negative effects on an entity's reputation.
Loss of license
The revocation of permission or authority to operate due to non-compliance with regulations and standards. Losing a license can have severe consequences for organizations, as it may prevent them from conducting certain activities or providing specific services.
Contractual impacts
Negative effects on contractual agreements resulting from non-compliance with regulations and standards. Non-compliance can lead to breaches of contract, legal disputes, and financial liabilities for organizations involved in contractual relationships.
Compliance monitoring
The process of overseeing and evaluating adherence to regulations and standards. It involves continuous monitoring, assessment, and reporting to ensure that an organization is complying with the required rules and guidelines.
Due diligence/care
Thorough and careful attention to compliance requirements. It involves taking proactive measures to understand and fulfill compliance obligations, including conducting risk assessments, implementing controls, and maintaining documentation.
Attestation and acknowledgement
The formal declaration and recognition of compliance with regulations and standards. Attestation and acknowledgement may involve signing documents, providing evidence of compliance, or obtaining certifications to demonstrate adherence to specific requirements.
Automation
The use of technology to streamline compliance monitoring processes. Automation can help organizations efficiently collect, analyze, and report compliance data, reducing manual effort and improving accuracy.
Privacy
The protection of personal information and data. Privacy regulations and standards aim to safeguard individuals' privacy rights and ensure the secure handling and processing of their personal data.
Legal implications
The consequences and effects under the law resulting from non-compliance with privacy regulations and standards. Legal implications can include legal actions, penalties, or other legal remedies for organizations or individuals who violate privacy requirements.
Local/regional privacy
Privacy regulations and standards at a local or regional level. These regulations may vary across different jurisdictions and address specific privacy concerns relevant to a particular locality or region.
National privacy
Privacy regulations and standards at a national level. These regulations are applicable to an entire country and provide a framework for protecting individuals' privacy rights within that nation.
Global privacy
Privacy regulations and standards at a global level. These regulations aim to establish consistent privacy principles and practices across multiple countries or regions, ensuring a harmonized approach to privacy protection.
Data subject
An individual whose personal data is being collected and processed. Data subjects have rights and control over their personal information, including the right to access, rectify, and erase their data.
Controller vs. processor
The roles and responsibilities in relation to the processing of personal data. The controller determines the purposes and means of data processing, while the processor carries out the processing activities on behalf of the controller.
Ownership
The legal right of possession and control over data. Ownership determines who has the authority to make decisions regarding the collection, use, and sharing of data.
Data inventory and retention
The documentation and management of data assets and their storage duration. Data inventory involves identifying and categorizing data, while retention refers to the period for which data should be retained based on legal, regulatory, or business requirements.
Right to be forgotten
An individual's right to have their personal data erased or removed. This right allows individuals to request the deletion of their data when it is no longer necessary, unlawfully processed, or violates their privacy rights.
Acceptable Use Policy (AUP)
A set of guidelines that outline the proper use of IT resources
Information Security Policies
Guidelines that ensure the protection of information assets
Business Continuity Plan
A plan designed to ensure the continuous operation of IT systems during disruptions
Disaster Recovery Plan
A plan that outlines the steps to restore IT systems after a major incident
Incident Response Plan
A plan that addresses and mitigates security incidents
Software Development Lifecycle (SDLC)
A process for developing and maintaining software
Change Management Process
A process for controlling changes to IT systems
Password Standards
Requirements for creating and managing secure passwords
Access Control Standards
Requirements for granting and managing system access
Physical Security Standards
Requirements for protecting physical IT assets
Encryption Standards
Requirements for encrypting sensitive data
Change Management Procedures
Step-by-step instructions for requesting and implementing system changes
Onboarding/Offboarding Procedures
Step-by-step instructions for adding or removing users from IT systems
Incident Response Playbooks
Predefined response plans for common security incidents
Regulatory Considerations
Compliance with laws and regulations
Legal Considerations
Compliance with legal requirements and contracts
Industry Considerations
Compliance with industry standards and best practices
Local/Regional Considerations
Compliance with local or regional regulations
National Considerations
Compliance with national regulations
Global Considerations
Compliance with international regulations and standards
Monitoring and Revision
Ongoing oversight and improvement of governance practices
Governance Boards
Governance bodies responsible for making strategic decisions
Governance Committees
Groups responsible for specific governance tasks
Government Entities
Government organizations involved in IT governance
Centralized/Decentralized Governance
Different models for organizing IT governance
System Owners
Individuals responsible for IT systems and data
Data Controllers
Individuals responsible for data processing activities
Data Processors
Entities that process data on behalf of data controllers
Data Custodians/Stewards
Individuals responsible for data storage and maintenance
Risk identification
The process of identifying potential risks in a specific context or situation.
Risk assessment
The process of evaluating risks based on various factors such as likelihood, impact, and exposure.
Ad hoc
Done for a specific purpose or situation, typically not part of a regular or planned process.
Recurring
Happening repeatedly over time, often with a predictable pattern or frequency.
One-time
Occurring only once, without any repetition or recurrence.
Continuous
Ongoing without interruption, without any breaks or gaps.
Risk analysis
The process of analyzing risks using qualitative or quantitative methods to understand their nature, magnitude, and potential consequences.
Qualitative
Assessing risks based on subjective factors such as expert opinions, experience, and judgment.
Quantitative
Assessing risks based on measurable data and calculations, often using statistical models and numerical values.
Single loss expectancy (SLE)
The estimated monetary loss that can be expected from a single occurrence of a specific risk event.
Annualized loss expectancy (ALE)
The expected monetary loss per year from a specific risk, taking into account the probability of occurrence and the potential impact.
Annualized rate of occurrence (ARO)
The expected number of risk events that may occur within a year.
Probability
The likelihood or chance of a risk event occurring, often expressed as a numerical value or a qualitative assessment.
Likelihood
The probability or chance of a risk event occurring, often expressed as a numerical value or a qualitative assessment.
Exposure factor
The percentage of loss caused by a risk event, indicating the extent to which the organization is vulnerable to the risk.
Impact
The effect or consequence of a risk event on the organization, including both tangible and intangible outcomes.
Risk register
A document that records identified risks and their details, serving as a central repository for risk-related information.
Key risk indicators
Metrics used to measure and monitor risks, providing early warning signs of potential issues or threats.
Risk owners
Individuals or entities responsible for managing and mitigating risks, accountable for the outcomes and actions related to specific risks.
Risk threshold
The maximum acceptable level of risk that an organization is willing to tolerate, beyond which action must be taken to reduce or mitigate the risk.
Risk tolerance
The willingness of an organization to accept and manage risks, considering factors such as its objectives, resources, and risk appetite.
Risk appetite
The organization's attitude towards taking risks, reflecting its willingness to pursue opportunities and accept potential losses.
Expansionary
A risk appetite that encourages growth and innovation, prioritizing potential rewards over potential risks.
Conservative
A risk appetite that prioritizes caution and stability, focusing on minimizing potential losses and avoiding unnecessary risks.
Neutral
A risk appetite that maintains a balanced approach, considering both potential rewards and potential risks in decision-making.
Risk management strategies
Approaches and techniques used to handle and mitigate risks, aiming to reduce the likelihood and impact of potential risks.
Transfer
The act of shifting the responsibility of a risk to another party, often through insurance or contractual agreements.
Accept
The act of acknowledging and managing a risk without transferring or avoiding it, often through implementing controls or contingency plans.
Exemption
The act of granting immunity from a specific risk, typically based on legal or regulatory provisions.
Exception
The act of granting immunity from a category of risks, typically based on legal or regulatory provisions.
Avoid
The act of taking actions to prevent a risk from occurring, often through proactive measures and risk mitigation strategies.
Mitigate
The act of reducing the impact or likelihood of a risk, often through implementing controls or preventive measures.
Risk reporting
The communication of risk-related information to stakeholders, providing updates on the status, progress, and impact of risks.
Business impact analysis
An assessment of the potential impact of a risk on business operations, considering factors such as financial losses, operational disruptions, and reputational damage.
Recovery time objective (RTO)
The maximum acceptable downtime after a risk event, indicating the time within which business operations should be restored.
Recovery point objective (RPO)
The maximum acceptable data loss after a risk event, indicating the point in time to which data should be recovered.
Mean time to repair (MTTR)
The average time taken to restore operations after a risk event, measuring the efficiency of the recovery process.
Mean time between failures (MTBF)
The average time between two consecutive risk events, indicating the reliability and stability of systems or processes.