Documentation of the rationale for making a business investment, used both to
support a business decision on whether to proceed with the investment and as an
operational tool to support management of the investment through its full economic
life cycle
Give this one a try later!
Business case
,The combination of the probability of an event and its consequence. (ISO/IEC 73).
Risk has traditionally been expressed as Threats ´ Vulnerabilities = Risk.
Give this one a try later!
Risk
The maximum period of time that a system can be unavailable before compromising
the achievement of the organization’s business objectives
Give this one a try later!
Acceptable interruption window
Responsible for managing information risk, the information security program, and
ensuring appropriate confidentiality, integrity and availability of information assets
Give this one a try later!
Chief information security officer (CISO)
A cryptographic checksum, typically generated for a file that can be used to detect
changes to the file; Secure Hash Algorithm-1 (SHA-1) is an example of a message
digest algorithm.
Give this one a try later!
, Message digest
A code of practice that contains a structured list of suggested information security
controls for organizations implementing an information security management system.
Prior to its adoption by ISO/IEC, this standard existed as BS 77799.
Give this one a try later!
ISO/IEC 27002
The ability of systems to withstand attack, operate reliably across a wide range of
operational conditions and to fail gracefully outside of the operational range
Give this one a try later!
Robustness
The means of managing risk, including policies, procedures, guidelines, practices or
organizational structures which can be of an administrative, technical, management or
legal nature
Give this one a try later!
Control
, Automatic or manual process designed and established to continue critical business
processes from point-of-failure to return-to-normal
Give this one a try later!
Alternate process
A communication protocol used to connect to servers on the World Wide Web. Its
primary function is to establish a connection with a web server and transmit hypertext
markup language (HTML), extensible markup language (XML) or other pages to the
client browsers.
Give this one a try later!
Hypertext Transfer Protocol (HTTP)
A method of downloading public files using the File Transfer Protocol (FTP). AFTP
does not require users to identify themselves before accessing files from a particular
server.
Give this one a try later!
Anonymous File Transfer Protocol (AFTP)
based access control - Assigns users to job functions or titles. Each job function or
title defines a specific authorization level.
Give this one a try later!
support a business decision on whether to proceed with the investment and as an
operational tool to support management of the investment through its full economic
life cycle
Give this one a try later!
Business case
,The combination of the probability of an event and its consequence. (ISO/IEC 73).
Risk has traditionally been expressed as Threats ´ Vulnerabilities = Risk.
Give this one a try later!
Risk
The maximum period of time that a system can be unavailable before compromising
the achievement of the organization’s business objectives
Give this one a try later!
Acceptable interruption window
Responsible for managing information risk, the information security program, and
ensuring appropriate confidentiality, integrity and availability of information assets
Give this one a try later!
Chief information security officer (CISO)
A cryptographic checksum, typically generated for a file that can be used to detect
changes to the file; Secure Hash Algorithm-1 (SHA-1) is an example of a message
digest algorithm.
Give this one a try later!
, Message digest
A code of practice that contains a structured list of suggested information security
controls for organizations implementing an information security management system.
Prior to its adoption by ISO/IEC, this standard existed as BS 77799.
Give this one a try later!
ISO/IEC 27002
The ability of systems to withstand attack, operate reliably across a wide range of
operational conditions and to fail gracefully outside of the operational range
Give this one a try later!
Robustness
The means of managing risk, including policies, procedures, guidelines, practices or
organizational structures which can be of an administrative, technical, management or
legal nature
Give this one a try later!
Control
, Automatic or manual process designed and established to continue critical business
processes from point-of-failure to return-to-normal
Give this one a try later!
Alternate process
A communication protocol used to connect to servers on the World Wide Web. Its
primary function is to establish a connection with a web server and transmit hypertext
markup language (HTML), extensible markup language (XML) or other pages to the
client browsers.
Give this one a try later!
Hypertext Transfer Protocol (HTTP)
A method of downloading public files using the File Transfer Protocol (FTP). AFTP
does not require users to identify themselves before accessing files from a particular
server.
Give this one a try later!
Anonymous File Transfer Protocol (AFTP)
based access control - Assigns users to job functions or titles. Each job function or
title defines a specific authorization level.
Give this one a try later!