Key Definitions in Information Security and Risk Management
Classified in Other subjects
Written on in English with a size of 2.67 KB
Information Security and Risk Management Terminology
Core Information Security Concepts
3.1 Activities
Anything that has value to the organization.
3.2 Availability
Ability to be accessible and usable on demand by an authorized entity.
3.3 Confidentiality
The property that information is not available or discoverable by unauthorized users, entities, or processes.
3.4 Information Security
Preservation of confidentiality, integrity, and availability of information. Additionally, other properties such as authentication/authorization, logging, non-repudiation, and reliability may also be considered.
3.5 Information Security Events
An occurrence identified on a system, service, or network whose state indicates a possible breach in information security policy or a failure to maintain it. Any previously unknown situation may also be relevant from a security perspective.
3.6 Information Security Incident
One or more unwanted or unexpected information security events that have a certain probability of compromising business operations and threatening information security.
3.7 Information Security Management System (ISMS)
Part of enterprise systems based on business risk analysis, which seeks to establish, implement, operate, monitor, review, maintain, and improve information security.
Risk Management Definitions
3.8 Integrity
The property of safeguarding the accuracy and completeness of assets.
3.9 Residual Risk
Risk remaining after a security threat has been addressed.
3.10 Risk Acceptance
The decision to accept a risk.
3.11 Risk Analysis
Systematic use of information sources to identify and assess risks.
3.12 Risk Valuation
The total process of risk analysis and assessment.
3.13 Risk Assessment
The process of comparing estimated risks against established risk criteria to determine the degree of significant risk.
3.14 Risk Management
Coordinated activities to direct and control measures necessary for the management of risk within the organization.
3.15 Risk Treatment
The process of selecting and implementing measures to modify risk.
3.16 Statement of Applicability
A document describing the control objectives and controls that are relevant and applicable to the organization's ISMS.