The path or route used by the adversary to gain access to the target
Give this one a try later!
Threat vector
Description of the fundamental underlying design of the IT components of the
business, the relationships among them, and the manner in which they support the
,enterprise's objectives.
Give this one a try later!
IT architecture
A metric capable of showing that the enterprise is subject to, or has a high probability
of being subject to, a risk that exceeds the defined risk appetite
Give this one a try later!
Risk indicator
The ability to exercise judgment, express opinions and present recommendations with
impartiality
Give this one a try later!
Objectivity
Being acquainted with, mindful of, conscious of and well informed on a specific
subject, which implies knowing and understanding a subject and acting accordingly.
Give this one a try later!
Awareness
,Something of either tangible or intangible value that is worth protecting, including
people, information, infrastructure, finances and reputation.
Give this one a try later!
Asset
Undisputed authorship
Give this one a try later!
Authenticity
A screened (firewalled) network segment that acts as a buffer zone between a trusted
and untrusted network.
Scope Notes: A DMZ is typically used to house systems such as web servers that must
be accessible from both internal networks and the Internet.
Give this one a try later!
Demilitarized zone (DMZ)
The level of trust with which a system object is imbued.
Give this one a try later!
, Privilege
Any event during which a threat element/actor acts against an asset in a manner that
has the potential to directly result in harm.
Give this one a try later!
Threat event
Intangible assets that belong to an enterprise for its exclusive use
Give this one a try later!
Intellectual property
Something that happens at a specific place and/or time
Give this one a try later!
Event
1. Information that proves or disproves a stated issue.
2. Information that an auditor gathers in the course of performing an IS audit; relevant
if it pertains to the audit objectives and has a logical relationship to the findings and
Give this one a try later!
Threat vector
Description of the fundamental underlying design of the IT components of the
business, the relationships among them, and the manner in which they support the
,enterprise's objectives.
Give this one a try later!
IT architecture
A metric capable of showing that the enterprise is subject to, or has a high probability
of being subject to, a risk that exceeds the defined risk appetite
Give this one a try later!
Risk indicator
The ability to exercise judgment, express opinions and present recommendations with
impartiality
Give this one a try later!
Objectivity
Being acquainted with, mindful of, conscious of and well informed on a specific
subject, which implies knowing and understanding a subject and acting accordingly.
Give this one a try later!
Awareness
,Something of either tangible or intangible value that is worth protecting, including
people, information, infrastructure, finances and reputation.
Give this one a try later!
Asset
Undisputed authorship
Give this one a try later!
Authenticity
A screened (firewalled) network segment that acts as a buffer zone between a trusted
and untrusted network.
Scope Notes: A DMZ is typically used to house systems such as web servers that must
be accessible from both internal networks and the Internet.
Give this one a try later!
Demilitarized zone (DMZ)
The level of trust with which a system object is imbued.
Give this one a try later!
, Privilege
Any event during which a threat element/actor acts against an asset in a manner that
has the potential to directly result in harm.
Give this one a try later!
Threat event
Intangible assets that belong to an enterprise for its exclusive use
Give this one a try later!
Intellectual property
Something that happens at a specific place and/or time
Give this one a try later!
Event
1. Information that proves or disproves a stated issue.
2. Information that an auditor gathers in the course of performing an IS audit; relevant
if it pertains to the audit objectives and has a logical relationship to the findings and