Skip to content

Compliance & Governance Glossary

Clear, concise definitions for the terms you encounter across compliance frameworks, audit reports, and governance documentation. From access control to zero trust.

2,046 termsacross 25 letters14 categories
Information Security933Compliance and Regulatory212Risk Management170Privacy and Data Protection155Governance141Audit and Assurance75Privacy68Compliance63Business Continuity58AI and Technology50AI & Technology36Audit35Cloud Security31Cloud19

51 terms

5G Security

Security considerations and measures for protecting fifth-generation mobile network infrastructure, devices, and services from cyber threats.

A169 terms

AI Accountability

The principle that organizations and individuals should be answerable for the outcomes and impacts of AI systems they develop or deploy.

AI Alignment

The challenge of ensuring that AI systems pursue goals and behaviors that are aligned with human values, intentions, and ethical principles.

AI Assurance

Processes and methods for providing confidence that AI systems operate as intended, producing reliable, fair, and safe outcomes.

AI Audit

A systematic examination of AI systems to evaluate their fairness, transparency, safety, security, and compliance with applicable regulations.

AI Bias

Systematic errors in AI system outputs that result from biased assumptions in the machine learning process or biased training data. AI bias can lead to unfair or discriminatory outcomes and is a key concern of AI governance frameworks.

AI Classification

The categorization of AI systems based on their risk level, capability, or application domain, as defined by regulations like the EU AI Act.

AI Compliance

Adherence to emerging regulations governing the development, deployment, and use of artificial intelligence systems, including the EU AI Act.

AI Compliance Framework

A structured set of requirements and guidelines for ensuring AI systems are developed and deployed in compliance with applicable regulations.

AI Data Governance

Policies and processes for managing the data used to train and operate AI systems, ensuring quality, privacy, and regulatory compliance.

AI Documentation

Records describing AI system design, training data, performance metrics, limitations, and intended use, supporting transparency and accountability.

AI Ethics

The branch of ethics that examines the moral implications of artificial intelligence systems, including issues of fairness, transparency, accountability, privacy, and the societal impact of AI decision-making.

AI Explainability

The ability to understand and describe how an AI model reaches its decisions or predictions, supporting transparency, trust, and regulatory compliance.

AI Fairness

The principle and practice of ensuring AI systems do not produce discriminatory outcomes or perpetuate biases against any group of individuals.

AI Governance

The framework of policies, processes, and organisational structures that ensure AI systems are developed and deployed responsibly, ethically, and in compliance with applicable laws and regulations.

AI Impact Assessment

A systematic evaluation of the potential effects of an AI system on individuals, groups, and society. AI impact assessments examine risks related to fairness, privacy, safety, transparency, and human rights.

AI Incident

An event involving an AI system that causes or could cause harm to individuals, organizations, or society, requiring investigation and response.

AI Lifecycle Management

The governance of AI systems throughout their entire lifecycle from conception and development through deployment, monitoring, and retirement.

AI Model Governance

The processes and controls for managing AI models throughout their lifecycle, including development, validation, deployment, monitoring, and retirement. Model governance ensures accuracy, fairness, and compliance.

AI Model Risk

The potential for adverse consequences arising from decisions based on AI models that are incorrect, misused, or produce unintended outcomes.

AI Monitoring

The continuous observation and evaluation of AI system performance, behavior, and outputs to detect drift, bias, errors, or security issues.

AI Policy

Organizational or governmental policies that define principles, requirements, and guidelines for the development, deployment, and use of AI systems.

AI Red Teaming

Structured testing of AI systems by dedicated teams to identify safety risks, vulnerabilities, biases, and unintended behaviors before deployment.

AI Regulation

Laws and regulatory frameworks governing the development, deployment, and use of artificial intelligence systems to ensure safety and protect rights.

AI Risk Assessment

A systematic evaluation of the potential harms and risks associated with an AI system, including bias, safety, security, and societal impacts.

AI Risk Management

The process of identifying, assessing, and mitigating risks associated with AI systems. The NIST AI Risk Management Framework provides a structured approach organised around four functions: Govern, Map, Measure, and Manage.

AI Risk Management Framework

A structured approach for identifying, assessing, and mitigating risks associated with AI systems throughout their lifecycle.

AI Safety

Research and practices aimed at ensuring AI systems operate safely, reliably, and without causing unintended harm to individuals or society.

AI Security

Measures to protect AI systems from adversarial attacks, data poisoning, model theft, and other threats specific to machine learning systems.

AI Supply Chain Risk

Risks arising from dependencies on third-party AI models, training data, cloud services, and components used in AI system development.

AI Testing

Methods for evaluating AI systems including functional testing, bias testing, adversarial testing, and performance benchmarking.

AI Transparency

The principle that AI system operations and decisions should be understandable and open to examination. Transparency includes documenting data sources, model architecture, training processes, and decision-making logic.

AI Watermarking

Techniques for embedding identifiable markers in AI-generated content to enable detection and attribution of synthetically produced media.

AICPA

The American Institute of Certified Public Accountants, which develops auditing standards and the SOC reporting framework for service organizations.

AML (Anti-Money Laundering)

Laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income.

API Security

Practices and technologies for protecting application programming interfaces from attacks, abuse, and unauthorized access while ensuring proper authentication and data protection.

APRA CPS 234

The Australian Prudential Regulation Authority's standard requiring regulated financial entities to maintain information security capabilities.

ARP Spoofing

An attack where a malicious actor sends falsified ARP messages to link their MAC address with a legitimate IP address on a local network.

Abuse Case

A security testing technique that identifies ways a system could be misused by threat actors, complementing traditional use case analysis.

Acceptable Risk

A risk that has been evaluated and determined to be within the organization's risk tolerance, requiring no additional mitigation.

Acceptable Risk Level

The amount of risk that an organization is prepared to accept, tolerate, or be exposed to at any point in time.

Acceptable Use

The agreed-upon rules governing how users may utilize an organization's IT resources, including internet, email, and software.

Acceptable Use Policy

A document that outlines the rules and guidelines for using an organization's IT resources, defining permitted and prohibited activities for users.

Acceptance Criteria

Predefined conditions that a risk, control, or deliverable must meet to be formally accepted, serving as a benchmark for risk-based decision-making.

Access Badge

A physical credential such as a smart card or proximity badge used to control entry to secure areas and track personnel movements.

Access Broker

A threat actor who specializes in gaining initial access to organizations and selling that access to other cybercriminals for further exploitation.

Access Certification

The periodic review and validation of user access rights to ensure that permissions remain appropriate for each user's current role and responsibilities.

Access Control

Security measures that regulate who can view or use resources in a computing environment. Access controls include authentication, authorisation, and audit mechanisms.

Access Control List

A list of rules that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

Access Control Matrix

A table that defines the access permissions of subjects to objects in a system, mapping users and roles to specific resource permissions.

Access Governance

Policies and processes for ensuring that user access rights are appropriately granted, reviewed, and revoked based on organizational requirements.

Access Log

A record of all access attempts to a system or resource, including successful and failed attempts, used for security monitoring and audit purposes.

Access Management

The set of processes and technologies used to manage and control user access to systems, applications, and data based on defined policies.

Access Point

A physical location or network device where users connect to an organization's network, requiring security controls to prevent unauthorized access.

Access Policy

A documented set of rules defining who is authorized to access specific resources, under what conditions, and with what level of permission.

Access Provisioning

The process of granting users the appropriate access rights and permissions to systems and resources based on their role and business need.

Access Recertification

A periodic review process where managers verify that existing user access rights remain appropriate and revoke any unnecessary permissions.

Access Request

A formal request by a data subject to obtain information about what personal data an organization holds about them and how it is processed.

Access Review

A periodic evaluation of user access rights and permissions to verify they remain appropriate, required by most compliance frameworks.

Access Token

A digital credential that represents the authorization granted to a user or application to access specific resources or perform specific operations.

Accessibility Compliance

Adherence to laws and standards requiring digital content and services to be accessible to people with disabilities, such as WCAG and ADA requirements.

Account Lockout

A security feature that temporarily disables a user account after a specified number of failed authentication attempts to prevent brute force attacks.

Account Management

The processes for creating, modifying, monitoring, and removing user accounts throughout their lifecycle.

Accountability

The obligation of an individual or organization to account for their activities, accept responsibility for outcomes, and disclose results transparently.

Accreditation

Formal recognition by an authoritative body that an organisation is competent to carry out specific tasks, such as certification audits or testing.

Accreditation Body

An organization that evaluates and confirms the competence of certification bodies, laboratories, and inspection bodies to perform specific conformity assessments.

Accredited Certification Body

An organisation that has been formally recognised by an accreditation body (such as UKAS or ANAB) as competent to conduct certification audits against specific standards such as ISO 27001 or ISO 9001.

Active Defense

Security strategies that proactively seek to detect, respond to, and counter adversary actions rather than relying solely on passive preventive measures.

Active Directory Security

Security measures and configurations applied to Microsoft Active Directory to protect identity management, authentication, and authorization services from unauthorized access and attacks.

Ad Tech Privacy

Privacy concerns and regulations related to advertising technology including behavioral tracking, targeted advertising, and real-time bidding of user data.

Adaptive Authentication

An authentication approach that dynamically adjusts security requirements based on contextual risk factors such as location, device, and user behavior.

Address Space Layout Randomization

A memory protection technique that randomizes the positions of key data areas in a process address space to prevent exploitation of memory corruption vulnerabilities.

Adequacy Decision

A determination by the European Commission that a non-EU country provides an adequate level of data protection. Adequacy decisions enable the free flow of personal data to the third country without additional safeguards.

Administrative Access

Elevated system privileges that allow users to perform configuration changes, install software, and manage other user accounts on a system.

Advanced Encryption Standard

A symmetric block cipher algorithm (AES) adopted as an encryption standard, using key sizes of 128, 192, or 256 bits to protect classified and sensitive data.

Advanced Persistent Threat

A prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period. APTs typically target high-value organisations such as governments and large enterprises.

Adversary Simulation

Security testing that emulates the tactics, techniques, and procedures of real-world threat actors to evaluate an organization's detection and response capabilities.

Advertising Compliance

Adherence to laws and regulations governing advertising practices, including truth in advertising, disclosure requirements, and sector-specific restrictions.

Adware

Software that automatically displays or downloads advertising material when a user is online, often bundled with free programs and potentially compromising privacy.

Aerospace Compliance

Regulatory requirements specific to the aerospace industry including safety standards, export controls, and quality management systems like AS9100.

Age Verification

Mechanisms used to verify the age of users accessing online services, particularly relevant for protecting children's privacy and complying with age-based regulations.

Aggregation Attack

A technique where individually non-sensitive pieces of information are combined to derive sensitive data, bypassing classification controls.

Agricultural Compliance

Regulations governing agricultural practices including food safety, pesticide use, environmental protection, and animal welfare standards.

Air Gap

A security measure that physically isolates a computer or network from unsecured networks, including the internet. Air-gapped systems are used in high-security environments to prevent remote cyber attacks.

Air-Gapped Network

A network physically isolated from other networks and the internet, providing maximum security for highly sensitive systems.

Alarm System

A security system designed to detect and alert on unauthorized entry, environmental hazards, or other security-relevant events at physical locations.

Alert Correlation

The process of linking related security alerts from multiple sources to identify patterns that indicate a coordinated attack or significant incident.

Alert Fatigue

A condition where security analysts become desensitized to alerts due to high volumes of false positives, potentially causing real threats to be overlooked.

Alert Triage

The process of evaluating and prioritizing security alerts to determine which require immediate investigation and response.

Algorithm Auditing

The examination and evaluation of algorithms and automated decision-making systems for bias, fairness, accuracy, and compliance with regulations.

Algorithmic Accountability

The principle that organisations developing or deploying algorithms are responsible for the outcomes those algorithms produce. Algorithmic accountability requires monitoring for bias, errors, and unintended consequences.

Algorithmic Impact Assessment

An evaluation of the potential effects of an automated decision-making system on individuals and groups, particularly regarding fairness and discrimination.

Algorithmic Transparency

The practice of making the logic, data, and decision processes of algorithms understandable and accessible to affected parties.

Allow List

A cybersecurity approach that permits only pre-approved applications, IP addresses, or entities to access a system while blocking all others by default.

Alternate Processing Site

A facility separate from the primary location where an organization can continue critical operations during a disruption to the main site.

Annex A

The section of ISO 27001 that contains the reference set of information security controls. The 2022 revision organises 93 controls into four themes: Organisational, People, Physical, and Technological.

Annual Compliance Review

A comprehensive yearly evaluation of an organization's compliance program effectiveness, regulatory changes, and areas requiring improvement.

Anomaly Detection

The identification of patterns in data that deviate from expected behavior, used in security to detect intrusions, fraud, and other threats.

Anonymisation

The irreversible process of altering personal data so that the individual can no longer be identified, directly or indirectly. Properly anonymised data falls outside the scope of data protection regulations such as GDPR.

Anonymity

The state of being unidentifiable within a group of subjects, where personal data cannot be linked to a specific individual by any means.

Anonymization

The irreversible process of altering personal data so that individuals can no longer be identified directly or indirectly, removing it from data protection regulations.

Anti-Bribery and Corruption

Laws, regulations, and organizational policies designed to prevent bribery, corruption, and unethical business practices in domestic and international operations.

Anti-Malware

Software designed to detect, prevent, and remove malicious software such as viruses, worms, trojans, and ransomware from computer systems and networks.

Anti-Money Laundering

Regulations, policies, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income through the financial system.

Anti-Phishing

Technologies, policies, and training programs designed to detect and prevent phishing attacks that attempt to steal credentials or deliver malware through deceptive communications.

Anti-Tampering

Security measures designed to prevent or detect unauthorized modification of hardware, software, or data to maintain system integrity.

Appliance Security

Security measures for protecting dedicated hardware devices used for specific functions such as firewalls, load balancers, and storage systems.

Application Allowlisting

A security practice that permits only pre-approved applications to execute on a system while blocking all other software from running.

Application Control

Security measures that restrict which applications can execute on systems, preventing unauthorized or malicious software from running.

Application Penetration Testing

Authorized security testing focused specifically on web, mobile, or desktop applications to identify vulnerabilities in application logic and security controls.

Application Security

The practice of finding, fixing, and preventing security vulnerabilities in software applications throughout the development lifecycle. Includes code review, penetration testing, and security architecture design.

Application Security Testing

The process of evaluating software applications for security vulnerabilities using techniques such as static analysis, dynamic analysis, and interactive testing.

Asset Classification

The process of categorising information assets based on their sensitivity, criticality, and value to the organisation. Classification levels typically include public, internal, confidential, and restricted.

Asset Discovery

The process of identifying and cataloging all hardware, software, and data assets within an organization's IT environment to maintain an accurate inventory.

Asset Inventory

A comprehensive and up-to-date register of all hardware, software, data, and network resources owned or managed by an organisation. Required by most security frameworks including CIS Controls and ISO 27001.

Asset Management

The systematic process of identifying, classifying, tracking, and managing an organization's information assets throughout their lifecycle to ensure proper protection.

Asset Risk Assessment

An evaluation of the risks associated with specific information assets, considering their value, threats, vulnerabilities, and existing controls.

Assurance Engagement

An engagement in which an auditor expresses a conclusion about the reliability of a subject matter against defined criteria to enhance stakeholder confidence.

Assurance Report

A formal document presenting the auditor's findings, conclusions, and opinion on the subject matter examined during an assurance engagement.

Asymmetric Encryption

A cryptographic method using a pair of mathematically related keys where one key encrypts data and the other decrypts it, enabling secure key exchange.

Attack Simulation

Automated security testing that replicates real-world attack scenarios against an organization's defenses to validate security control effectiveness.

Attack Surface

The total number of possible entry points for unauthorised access to a system. Reducing the attack surface through hardening, patching, and removing unnecessary services is a core security practice.

Attack Surface Management

The continuous discovery, classification, prioritization, and monitoring of an organization's external-facing digital assets to reduce exposure to threats.

Attack Vector

The method or pathway used by a threat actor to gain unauthorised access to a target system. Common attack vectors include phishing emails, unpatched software vulnerabilities, and compromised credentials.

Attestation

A formal declaration by an independent party (such as a CPA firm) that an organisation's controls or processes meet specified criteria. SOC reports are a form of attestation, distinct from certification.

Attestation of Compliance

A formal declaration by a qualified security assessor or the organization itself confirming compliance with a specific standard such as PCI DSS.

Attribute-Based Access Control

An access control paradigm that grants or denies access based on policies evaluating attributes of users, resources, actions, and the environment.

Audit

A systematic, independent examination of an organisation's activities, processes, or financial records to verify compliance with standards, regulations, or internal policies.

Audit Charter

A formal document that defines the audit function's purpose, authority, responsibility, and position within an organization's governance structure.

Audit Committee

A committee of the board of directors responsible for overseeing financial reporting, internal controls, and audit activities. Audit committees are required for publicly listed companies and play a key role in corporate governance.

Audit Evidence

Records, statements of fact, or other information that is relevant and verifiable, used by an auditor to determine whether audit criteria are being fulfilled. Audit evidence can be qualitative or quantitative.

Audit Finding

The results of evaluating collected audit evidence against audit criteria. Findings can indicate conformity or nonconformity with the criteria and may include observations or opportunities for improvement.

Audit Frequency

The defined schedule for conducting internal and external audits based on risk levels, regulatory requirements, and organizational needs.

Audit Independence

The requirement that auditors maintain objectivity and freedom from conflicts of interest that could influence their professional judgment.

Audit Log

A chronological record of system activities that provides documentary evidence of the sequence of activities affecting a specific operation, procedure, or event. Audit logs are essential for security monitoring, incident investigation, and compliance.

Audit Management

The administration and coordination of audit activities including planning, scheduling, resource allocation, and tracking of findings and remediation.

Audit Methodology

The systematic approach and procedures used by auditors to plan, execute, and report on audits, ensuring consistency and thoroughness.

Audit Notification

The formal communication to an auditee informing them of an upcoming audit, including scope, timing, and information requirements.

Audit Objective

The specific goals and scope of an audit engagement, defining what the audit seeks to evaluate, verify, or assess.

Audit Opinion

The auditor's formal conclusion about whether the subject matter conforms to applicable criteria, expressed as unqualified, qualified, adverse, or disclaimer.

Audit Plan

A document that describes the activities and arrangements for an audit, including scope, objectives, timing, and resource requirements. Audit plans ensure systematic and efficient audit execution.

Audit Preparation

The activities undertaken by an organization to ready itself for an upcoming audit, including evidence gathering and documentation review.

Audit Program

A scheduled series of audits planned for a specific period, prioritized based on risk assessment and covering key areas of the organization.

Audit Programme

A set of one or more audits planned for a specific time frame and directed towards a specific purpose. Audit programmes define the overall approach, scheduling, and resourcing for audit activities over a defined period.

Audit Readiness

The state of preparedness an organization achieves through proactive measures to ensure successful outcomes when formal audits are conducted.

Audit Report

The formal documentation of audit findings, conclusions, and recommendations presented at the end of an audit engagement. Audit reports communicate the results to stakeholders and management.

Audit Reporting

The formal communication of audit results including findings, conclusions, and recommendations to management and relevant stakeholders.

Audit Response

The formal reply from audited parties addressing audit findings, including planned corrective actions, responsible parties, and implementation timelines.

Audit Risk

The risk that an auditor expresses an inappropriate opinion when the subject matter is materially misstated. Audit risk comprises inherent risk, control risk, and detection risk.

Audit Sampling

The application of audit procedures to less than 100% of items within a population to draw conclusions about the entire population.

Audit Schedule

A planned timetable of audit activities across an organization for a defined period, typically one year, based on risk priorities.

Audit Scope

The extent and boundaries of an audit, including the locations, organisational units, activities, and processes to be audited, as well as the time period covered by the audit.

Audit Standard

Published guidelines and requirements that define how audits should be conducted to ensure quality, consistency, and professional practice.

Audit Trail

A chronological record of system activities that enables the reconstruction and examination of events. Essential for forensic analysis and regulatory compliance.

Audit Universe

The comprehensive list of all auditable entities, processes, systems, and locations within an organization that the audit function may review.

Audit Working Papers

The documentation of audit procedures performed, evidence obtained, and conclusions reached that support the auditor's report and findings.

Authentication

The process of verifying the identity of a user, device, or system. Common methods include passwords, biometrics, tokens, and multi-factor authentication (MFA).

Authentication Factor

A category of credential used to verify identity, including knowledge factors, possession factors, and inherence factors like biometrics.

Authentication Protocol

A set of rules governing the exchange of information for verifying the identity of a user, device, or system in a communication.

Authorisation

The process of determining what actions an authenticated user or system is permitted to perform. Typically enforced through access control lists or role-based access control.

Authority to Operate (ATO)

A formal authorisation granted by a senior official to operate a federal information system at an acceptable level of risk. ATO is required under FISMA and FedRAMP and is based on the assessment of security controls.

Authorization

The process of determining whether a user, program, or device is permitted to access a resource, perform an operation, or execute a command.

Automated Decision-Making

Decisions made by algorithms or AI systems without significant human involvement. Under GDPR Article 22, individuals have the right not to be subject to decisions based solely on automated processing that produce legal or similarly significant effects.

Automated Patch Management

Systems that automatically detect, download, test, and deploy software patches across an organization's IT environment to reduce vulnerability exposure.

Automated Response

Pre-configured actions that are automatically triggered when specific security events or conditions are detected, reducing response time.

Automotive Cybersecurity

Security standards and practices for protecting connected vehicles, automotive systems, and vehicle-to-everything communications from cyber threats.

Autonomous Systems

Systems that can perform tasks and make decisions without human intervention, raising governance questions about accountability, safety, and oversight.

Availability

The property of being accessible and usable upon demand by authorized users, one of the three pillars of information security along with confidentiality and integrity.

Aviation Security

Regulatory requirements and security measures for protecting civil aviation systems, infrastructure, and operations from threats.

Awareness Campaign

An organized effort to educate employees about specific security threats and best practices through multiple communication channels.

B71 terms

BGP Hijacking

An attack that maliciously reroutes internet traffic by corrupting Border Gateway Protocol routing tables to redirect traffic through attacker-controlled networks.

BIA (Business Impact Analysis)

A process that identifies critical business functions and determines the impact of disruption. Used to set recovery time objectives (RTO) and recovery point objectives (RPO).

BYOD Security

Security policies and controls for managing risks associated with employees using personal devices to access corporate networks, data, and applications.

Backdoor

A hidden method for bypassing normal authentication or encryption in a computer system, often installed by attackers or built into software for maintenance.

Backup Encryption

The application of encryption to backup data to protect it from unauthorized access even if backup media is lost, stolen, or compromised.

Backup Policy

A documented policy defining requirements for data backup including frequency, scope, retention, encryption, and testing procedures.

Backup Strategy

A documented plan defining what data is backed up, how frequently, where backups are stored, and how they are tested and restored.

Backup Verification

The process of testing backup data to confirm it is complete, intact, and can be successfully restored when needed.

Backup and Recovery

The processes and technologies for creating copies of data and systems so they can be restored after data loss, corruption, or disaster. Backup frequency and retention policies are defined by business requirements and regulatory obligations.

Baiting

A social engineering attack that lures victims with something enticing, such as a USB drive left in a public area loaded with malware.

Bandwidth Management

The allocation and control of network bandwidth to ensure optimal performance and prevent network abuse or congestion.

Bandwidth Throttling

A network management technique that limits the data transfer rate to prevent network congestion or mitigate denial-of-service attack impacts.

Banking Regulation

The framework of laws and rules governing banking operations including capital requirements, lending practices, consumer protection, and risk management.

Banner Grabbing

A technique used to gather information about a computer system on a network by reading the banner messages displayed by services running on the target. Often used in vulnerability scanning and reconnaissance.

Basel III

An international regulatory framework developed by the Basel Committee on Banking Supervision that sets minimum capital requirements, leverage ratios, and liquidity requirements for banks to strengthen regulation, supervision, and risk management.

Baseline

A minimum set of security controls or configurations established as a starting point. Baselines can be tailored based on an organisation's risk profile and operating environment.

Bastion Host

A specially hardened computer on a network designed to withstand attacks and serve as a single point of entry to internal resources. Bastion hosts are typically placed in a DMZ and run minimal services.

Behavioral Analytics

The use of machine learning and statistical analysis to identify unusual patterns in user or entity behavior that may indicate security threats.

Benchmarking

The process of comparing an organization's practices, processes, and performance metrics to industry best practices or peer organizations.

Bias Detection

The process of identifying and measuring systematic biases in AI models and their outputs. Bias detection involves statistical testing across protected characteristics such as race, gender, age, and disability.

Binary Analysis

The examination of compiled executable files to understand their functionality, identify vulnerabilities, and detect malicious code without source code.

Binding Corporate Rules

Internal policies adopted by multinational corporations for transferring personal data within the group across international borders in compliance with data protection laws.

Binding Corporate Rules (BCRs)

Internal rules adopted by a multinational group of companies that define their global policy regarding international transfers of personal data within the group. BCRs must be approved by the relevant data protection authority.

Biometric Access Control

Physical access control systems that use biological characteristics such as fingerprints, iris scans, or facial recognition to verify identity.

Biometric Authentication

The use of unique biological characteristics such as fingerprints, facial recognition, iris scans, or voice patterns to verify the identity of a user. Considered a strong form of authentication.

Biometric Data

Personal data resulting from specific technical processing relating to the physical, physiological, or behavioural characteristics of a natural person, such as facial images or fingerprint data. Classified as special category data under GDPR.

Bitlocker

A full disk encryption feature included with Microsoft Windows that protects data by encrypting the entire operating system drive.

Black Box Testing

A security testing approach where the tester has no prior knowledge of the target system's internal workings, simulating an external attacker.

Blacklisting

A security approach that blocks known malicious entities such as IP addresses, domains, or file hashes while allowing everything else by default.

Block Cipher

A symmetric encryption algorithm that operates on fixed-size blocks of data. Common block ciphers include AES (Advanced Encryption Standard) and 3DES.

Blockchain

A distributed, immutable ledger technology that records transactions across multiple computers, providing transparency, security, and verification without central authority.

Blockchain Security

Security measures for protecting blockchain networks, smart contracts, wallets, and decentralized applications from attacks and vulnerabilities.

Blowfish

A symmetric block cipher algorithm designed as a fast, free alternative to existing encryption methods. While once popular, it has largely been superseded by AES for most applications.

Blue Team

The defensive security team responsible for maintaining and improving an organization's security posture by detecting, responding to, and mitigating threats.

Bluetooth Security

Security protocols and practices for protecting wireless communications over Bluetooth connections from eavesdropping, unauthorized pairing, and data theft.

Board Oversight

The responsibility of a board of directors to supervise management activities, ensure accountability, and provide strategic direction. Board oversight of cybersecurity and compliance has become a regulatory expectation under NIST CSF 2.0, SEC rules, and corporate governance codes.

Board Risk Committee

A committee of the board of directors specifically responsible for overseeing the organization's risk management framework and risk appetite.

Boot Integrity

Security mechanisms that verify the integrity of the boot process, ensuring that only authenticated and unmodified code executes during system startup.

Boot Sector Virus

Malware that infects the boot sector of a storage device, activating during the system startup process before the operating system loads.

Botnet

A network of compromised computers (bots) controlled remotely by a threat actor to perform coordinated malicious activities such as distributed denial-of-service attacks, spam distribution, or cryptocurrency mining.

Boundary Defense

Security controls deployed at network boundaries to monitor, filter, and protect traffic entering and leaving the organization's network.

Boundary Protection

Security measures implemented at the boundaries between network zones to monitor and control communications, preventing unauthorized access between segments.

Bow-Tie Analysis

A risk analysis method that visually maps the pathways from causes to consequences of a risk event, showing preventive and mitigating controls.

Breach Assessment

The evaluation of a security incident to determine the scope, severity, and impact of a data breach on affected individuals and the organization.

Breach Containment

Immediate actions taken to limit the spread and impact of a data breach, including isolating affected systems and blocking malicious access.

Breach Notification

The legal requirement to inform affected individuals, regulators, or other parties when personal data has been compromised. GDPR requires notification within 72 hours.

Breach Penalty

Financial sanctions imposed by regulators on organizations that fail to comply with data breach notification requirements or other regulatory obligations.

Breach Register

A documented log of all personal data breaches including their nature, affected individuals, consequences, and remedial actions taken.

Breach Response

The coordinated set of actions taken by an organization following the discovery of a data breach, including investigation, notification, and remediation.

Breach and Attack Simulation

Automated platforms that continuously simulate attacks across the kill chain to validate the effectiveness of security controls and detection capabilities.

Break Glass Account

An emergency access account that bypasses normal access controls during critical situations, with strict monitoring and post-use review procedures.

Browser Security

Security measures and configurations for web browsers to protect against web-based threats including malicious websites, extensions, and exploits.

Brute Force Attack

An attack method that systematically tries every possible combination of passwords or encryption keys until the correct one is found. Mitigated by account lockout policies, rate limiting, and strong password requirements.

Buffer Overflow

A software vulnerability that occurs when a program writes more data to a buffer than it can hold, potentially allowing an attacker to execute arbitrary code. Buffer overflows are among the most common and dangerous security flaws.

Bug Bounty Program

A crowdsourced security initiative that rewards external researchers for discovering and responsibly disclosing software vulnerabilities to the organization.

Bug Tracking

The process of logging, categorizing, prioritizing, and managing software bugs and security vulnerabilities from discovery through resolution.

Building Security

Physical security measures protecting an organization's buildings and facilities from unauthorized access, theft, vandalism, and environmental threats.

Business Architecture

The description of an organization's structure, capabilities, and value streams that aligns business strategy with tactical execution.

Business Associate

Under HIPAA, a person or entity that performs certain functions or activities involving the use or disclosure of Protected Health Information on behalf of a covered entity. Business associates must comply with HIPAA Security and Breach Notification Rules.

Business Associate Agreement

A HIPAA-required contract between a covered entity and a business associate that establishes permissible uses and disclosures of PHI.

Business Associate Agreement (BAA)

A legally binding contract between a HIPAA covered entity and a business associate that establishes the permitted and required uses and disclosures of Protected Health Information. BAAs are mandatory under HIPAA.

Business Continuity

The capability of an organisation to continue delivering products or services at acceptable levels following a disruptive incident. Governed by frameworks like ISO 22301.

Business Continuity Management

A holistic management process that identifies potential threats and their impacts, providing a framework for building organizational resilience.

Business Continuity Plan

A documented strategy defining how an organization will continue to operate during and after a significant disruption to its normal business operations.

Business Continuity Policy

A high-level statement of an organization's commitment to maintaining operational continuity and defining the scope and objectives of its BCM program.

Business Continuity Testing

Exercises and tests conducted to validate that business continuity plans are effective, current, and capable of achieving recovery objectives.

Business Email Compromise

A sophisticated scam targeting organisations that conduct wire transfers or handle sensitive financial data. Attackers impersonate executives or trusted partners to trick employees into transferring funds or disclosing confidential information.

Business Impact Analysis

A systematic process for identifying and evaluating the potential effects of disruptions to critical business operations and processes.

Business Process Management

The discipline of managing and optimizing an organization's business processes to improve efficiency, effectiveness, and adaptability.

Business Resumption

The process of returning to normal business operations after a disruption, including verification that all critical functions are restored.

Business Risk

The potential for events or conditions to adversely affect an organization's ability to achieve its business objectives and maintain operations.

C295 terms

CAN-SPAM Act

US federal law that establishes requirements for commercial email messages, gives recipients the right to opt out of receiving them, and imposes penalties for violations. CAN-SPAM does not require prior consent for commercial emails.

CAPTCHA

A challenge-response test used to determine whether a user is human or an automated bot. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.

CASB (Cloud Access Security Broker)

A security policy enforcement point placed between cloud service consumers and providers to combine and interject enterprise security policies as cloud resources are accessed. CASBs provide visibility, compliance, data security, and threat protection.

CCPA

The California Consumer Privacy Act gives California residents rights over their personal information including the right to know, delete, and opt out of sale.

CCPA (California Consumer Privacy Act)

California's consumer privacy law, amended by CPRA in 2023. Gives consumers rights over their personal information including the right to know, delete, opt-out, and non-discrimination.

CCPA Opt-Out

The right of California consumers under the CCPA to direct a business that sells their personal information to stop selling it. Businesses must provide a clear 'Do Not Sell My Personal Information' link on their website.

CIA Triad

The three core principles of information security: Confidentiality, Integrity, and Availability, forming the foundation of security program design.

CIS Benchmarks

Consensus-based configuration guidelines developed by the Center for Internet Security for securely configuring IT systems and applications.

CIS Controls

A prioritized set of cybersecurity best practices developed by the Center for Internet Security to help organizations defend against common cyber threats.

CISA

The Cybersecurity and Infrastructure Security Agency, a US government agency responsible for protecting critical infrastructure from cyber and physical threats.

CISA Certification

Certified Information Systems Auditor, an ISACA certification for professionals who audit, control, monitor, and assess IT and business systems.

CISM Certification

Certified Information Security Manager, an ISACA certification for professionals who manage, design, and oversee enterprise information security.

CISO

The Chief Information Security Officer is the senior executive responsible for establishing and maintaining an organization's information security strategy, policies, and operations.

CISO (Chief Information Security Officer)

The senior executive responsible for an organisation's information security strategy, policies, and operations. Reports to the CEO, CIO, or board depending on the organisation.

CISSP Certification

Certified Information Systems Security Professional, a widely recognized certification for experienced security practitioners, managers, and executives.

CMMC

The Cybersecurity Maturity Model Certification is a US Department of Defense framework requiring defense contractors to implement cybersecurity practices at specified maturity levels.

CMMC (Cybersecurity Maturity Model Certification)

A US Department of Defense framework requiring defence contractors to demonstrate cybersecurity maturity across five levels. Based on NIST 800-171 controls.

COBIT

Control Objectives for Information and Related Technologies, an IT governance framework by ISACA. COBIT 2019 provides 40 governance and management objectives across five domains.

COSO Framework

The internal control framework developed by the Committee of Sponsoring Organizations of the Treadway Commission. COSO defines five components: control environment, risk assessment, control activities, information and communication, and monitoring activities.

CPS 234

An Australian Prudential Regulation Authority (APRA) standard that requires regulated entities to maintain an information security capability commensurate with information security vulnerabilities and threats.

CRISC Certification

Certified in Risk and Information Systems Control, an ISACA certification for professionals who identify and manage IT and enterprise risk.

CSA STAR

The Cloud Security Alliance Security Trust Assurance and Risk program, a framework for assessing the security posture of cloud service providers.

CVE

Common Vulnerabilities and Exposures, a catalog of publicly known cybersecurity vulnerabilities identified by unique CVE ID numbers.

CVSS

The Common Vulnerability Scoring System provides a standardized method for rating the severity of security vulnerabilities on a scale of 0 to 10.

Cable Security

Measures to protect network cabling from physical tampering, interception, and accidental damage that could compromise data confidentiality or availability.

Cache Poisoning

An attack that corrupts cached data to redirect users to malicious destinations, commonly targeting DNS caches and web application caches.

California Consumer Privacy Act (CCPA)

A California state law that gives consumers more control over the personal information that businesses collect about them. CCPA provides rights to know, delete, opt-out of sale, and non-discrimination.

California Privacy Rights Act

A California state law (CPRA) that amends and expands the CCPA, establishing the California Privacy Protection Agency and adding new consumer privacy rights.

California Privacy Rights Act (CPRA)

An amendment to the CCPA that expanded consumer privacy rights, created the California Privacy Protection Agency, and introduced new concepts such as sensitive personal information and the right to correction.

Callback Phishing

A social engineering technique where phishing emails instruct victims to call a phone number controlled by the attacker for further manipulation.

Canary Token

A digital tripwire deployed within a network or data set that triggers an alert when accessed, providing early detection of unauthorized activity.

Capability Maturity

A framework for assessing and improving an organization's processes and capabilities across defined maturity levels from initial to optimized.

Capacity Management

The process of ensuring that IT resources and infrastructure are sufficient to meet current and future business requirements.

Capacity Planning

The process of determining the production capacity needed by an organization to meet changing demands for its products and services.

Catastrophic Risk

A risk event with the potential for severe, widespread, and potentially irreversible damage to an organization's operations, reputation, or survival.

Certificate Authority

A trusted entity that issues digital certificates used to verify the identity of individuals, organisations, or devices. Certificate Authorities form the basis of the Public Key Infrastructure (PKI) trust model.

Certificate Management

The processes for managing the lifecycle of digital certificates including issuance, renewal, revocation, and key storage.

Certificate Pinning

A security technique that associates a host with its expected public key or certificate, preventing man-in-the-middle attacks by rejecting certificates that do not match the pinned values.

Certificate Revocation

The invalidation of a digital certificate before its scheduled expiration date, typically due to key compromise or change of entity information.

Certificate Revocation List

A list published by a certificate authority of digital certificates that have been revoked before their expiration date.

Certificate of Compliance

A formal document certifying that an organization, product, or process meets specified regulatory or standard requirements.

Certification

Formal attestation by an accredited body that an organisation's management system meets the requirements of a specific standard (e.g., ISO 27001, ISO 9001).

Certification Audit

A formal assessment conducted by an accredited certification body to determine whether an organisation's management system meets the requirements of a standard such as ISO 27001, ISO 9001, or ISO 22301.

Certification Body

An accredited organization authorized to conduct audits and issue certifications confirming that management systems meet international standards.

Certification Cycle

The complete sequence of initial certification audit, surveillance audits, and recertification audit, typically spanning a three-year period.

Certification Maintenance

The ongoing activities required to keep a certification valid, including surveillance audits, continuous improvement, and management reviews.

Certification Mechanism

A voluntary process under GDPR through which organizations demonstrate compliance with data protection requirements through approved certification bodies.

Certification Scope

The defined boundaries of what a certification covers, including the organizational units, processes, locations, and standards included.

Certified Ethical Hacker

A certification demonstrating competency in ethical hacking techniques, penetration testing, and vulnerability assessment methodologies.

Chain of Custody

The documented process of maintaining and tracking evidence from collection through presentation. In digital forensics, chain of custody ensures that evidence is admissible and has not been tampered with.

Change Advisory Board

A group of stakeholders that evaluates and approves or rejects proposed changes to IT systems and infrastructure based on risk assessment.

Change Advisory Board (CAB)

A body that exists to approve changes and assist in the assessment and prioritisation of changes. CABs are a core component of ITIL change management and help balance the need for change with the risk of disruption.

Change Control

A formal process for managing changes to systems, processes, and configurations to minimize disruption and maintain system integrity.

Change Management

The processes, tools, and techniques for managing the people side of change to achieve required business outcomes, or the IT process for controlling modifications to hardware, software, and documentation to protect the environment from unintended consequences.

Chief Compliance Officer (CCO)

The senior executive responsible for overseeing and managing compliance issues within an organisation, ensuring that the company and its employees comply with all regulatory requirements and internal policies.

Chief Privacy Officer (CPO)

The senior executive responsible for managing an organisation's privacy programme, ensuring compliance with privacy laws and regulations, and establishing privacy policies and procedures.

Chief Risk Officer (CRO)

The senior executive responsible for identifying, analysing, and mitigating internal and external events that could threaten an organisation. The CRO oversees the enterprise risk management function.

Children's Online Privacy

Legal frameworks and practices for protecting the personal information of children collected online, including COPPA requirements for parental consent.

Children's Online Privacy Protection Act (COPPA)

A US federal law that imposes requirements on operators of websites or online services directed at children under 13 years of age. COPPA requires parental consent before collecting personal information from children.

China Cybersecurity Law

China's comprehensive cybersecurity legislation that imposes requirements on network operators for data protection, security assessments, and data localization.

Cipher

An algorithm for performing encryption or decryption of data. Ciphers transform plaintext into ciphertext (encryption) and back again (decryption) using a key.

Ciphertext

The result of encryption performed on plaintext using an algorithm (cipher) and a key. Ciphertext is designed to be unintelligible without the corresponding decryption key.

Clean Desk Policy

A policy requiring employees to secure sensitive documents and removable media when leaving their workspace to prevent unauthorized access to information.

Clickjacking

A web-based attack where a malicious site tricks a user into clicking on something different from what the user perceives, potentially revealing confidential information or taking control of their computer.

Closed-Circuit Television

Video surveillance systems used for physical security monitoring of facilities, access points, and sensitive areas with recording capabilities.

Cloud Access Security Broker

A security policy enforcement point positioned between cloud service consumers and providers to monitor activity, enforce policies, and protect data.

Cloud Access Security Broker (CASB)

A security policy enforcement point positioned between cloud service consumers and cloud providers. CASBs provide visibility into cloud application usage, data protection, threat detection, and compliance monitoring.

Cloud Act

US legislation that allows law enforcement to compel US-based cloud providers to provide stored data regardless of where the data is physically located.

Cloud Broker

An entity that manages the use, performance, and delivery of cloud services, negotiating relationships between cloud providers and consumers.

Cloud Compliance

The process of ensuring that cloud computing environments meet regulatory requirements, industry standards, and internal policies. Cloud compliance involves shared responsibility between the cloud provider and customer.

Cloud Configuration Management

Processes and tools for maintaining secure and compliant configurations of cloud resources, preventing misconfigurations that lead to data exposure.

Cloud Data Protection

Security measures for protecting data stored, processed, and transmitted in cloud environments, including encryption, access controls, and data loss prevention.

Cloud Encryption

The use of cryptographic algorithms to protect data at rest, in transit, and in use within cloud computing environments and services.

Cloud Forensics

Digital forensic investigation techniques adapted for cloud computing environments, addressing unique challenges of multi-tenant and distributed systems.

Cloud Governance

Policies, processes, and controls for managing cloud adoption, usage, security, and compliance across an organization's cloud environments.

Cloud Identity Management

The management of user identities, authentication, and authorization across cloud services to ensure secure access to cloud resources.

Cloud Infrastructure Security

Security practices for protecting the underlying infrastructure of cloud environments including virtual machines, networks, storage, and orchestration platforms.

Cloud Key Management

Services and practices for managing cryptographic keys in cloud environments, including generation, storage, rotation, and access control of encryption keys.

Cloud Migration

The process of moving data, applications, and workloads from on-premises infrastructure to cloud computing environments.

Cloud Migration Security

Security planning and controls for safely transferring applications, data, and workloads from on-premises environments to cloud platforms.

Cloud Monitoring

The continuous observation of cloud resources, services, and applications to detect performance issues, security threats, and compliance violations.

Cloud Native Security

Security practices and tools designed specifically for cloud-native architectures including containers, microservices, and serverless computing. Cloud native security shifts protection closer to the workload and incorporates security into the CI/CD pipeline.

Cloud Penetration Testing

Authorized security testing of cloud environments and applications to identify vulnerabilities, with specific considerations for cloud provider policies.

Cloud Security

The set of policies, controls, procedures, and technologies that protect cloud-based systems, data, and infrastructure. Governed by the shared responsibility model between cloud provider and customer.

Cloud Security Alliance

An industry organization dedicated to defining and raising awareness of best practices for securing cloud computing through research and education.

Cloud Security Alliance (CSA)

A non-profit organisation dedicated to defining and raising awareness of best practices for a secure cloud computing environment. CSA publishes the Cloud Controls Matrix and the STAR certification programme.

Cloud Security Architecture

The design and implementation of security controls, policies, and technologies specifically for protecting cloud computing environments and services.

Cloud Security Posture Management

A category of security tools that continuously monitor cloud infrastructure for gaps in security policy enforcement. CSPM solutions identify misconfigurations, compliance violations, and security risks across multi-cloud environments.

Cloud Security Posture Management (CSPM)

Tools and practices that continuously monitor cloud environments for security misconfigurations, compliance violations, and risks. CSPM automates the identification and remediation of cloud security issues.

Cloud Service Level Agreement

A contract defining the performance, availability, security, and support commitments between a cloud service provider and its customer.

Cloud Shared Responsibility Model

A framework that delineates security responsibilities between cloud service providers and customers based on the type of cloud service used.

Cloud Workload Protection

Security solutions that protect workloads running in cloud environments from vulnerabilities, malware, and unauthorized access across their lifecycle.

Cloud Workload Protection Platform (CWPP)

A security solution that protects server workloads across cloud, hybrid, and on-premises environments. CWPPs provide capabilities including vulnerability management, network segmentation, system integrity monitoring, and application control.

Code Review

The systematic examination of source code to identify security vulnerabilities, coding errors, and deviations from secure coding standards before deployment.

Code Signing

The process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed.

Code of Conduct

A set of rules outlining the norms, responsibilities, and proper practices for an individual or organisation. Codes of conduct set ethical standards and are required by many regulatory frameworks including SOX and industry regulations.

Code of Ethics

A document establishing ethical principles and expected behaviors for professionals in a field, particularly in cybersecurity and auditing.

Cold Site

A backup facility that has the basic infrastructure (power, networking, cooling) but no pre-installed hardware or data. Cold sites are the least expensive disaster recovery option but have the longest recovery time.

Collaborative Security

An approach where organizations share threat intelligence, best practices, and resources to collectively improve their security posture.

Column-Level Encryption

Database encryption applied to specific columns containing sensitive data, protecting individual data fields while allowing queries on unencrypted columns.

Combined Assurance

An approach that coordinates various assurance providers to optimize risk and control coverage while minimizing duplication of effort.

Command and Control

The infrastructure and communication channels used by attackers to maintain remote control over compromised systems within a target network.

Command and Control (C2)

The infrastructure and communication channels used by attackers to maintain control over compromised systems. C2 servers issue commands to malware or botnets and receive exfiltrated data.

Committee Charter

A formal document that defines a committee's purpose, authority, composition, meeting frequency, and responsibilities within the governance structure.

Common Criteria

An international standard (ISO/IEC 15408) for computer security certification that provides a framework for evaluating the security properties of IT products. Common Criteria evaluations are mutually recognised by 31 countries.

Communication Plan

A documented strategy for communicating with internal and external stakeholders during security incidents, including templates and escalation procedures.

Communication Recovery

The restoration of communication systems and channels following a disruption, ensuring stakeholders can be reached and information can flow.

CompTIA Security Plus

An industry certification validating baseline cybersecurity skills including threat assessment, security operations, and incident response.

Compartmentalization

The principle of restricting information access so that individuals only know what they need for their specific responsibilities.

Compensating Control

An alternative security measure employed when a primary control cannot be implemented. Must provide an equivalent level of protection and be documented with justification.

Complaint Handling

Processes for receiving, investigating, and resolving complaints from data subjects about the handling of their personal information.

Compliance

The state of conforming to laws, regulations, standards, or internal policies. In information security, compliance is typically demonstrated through audits, certifications, and continuous monitoring.

Compliance Architecture

The structural design of an organization's compliance program, including technology, processes, and roles that support regulatory adherence.

Compliance Assessment

A formal evaluation of an organization's adherence to specific regulatory requirements, standards, or internal policies.

Compliance Assessment Report

A formal document presenting the results of a compliance evaluation including findings, evidence, and recommendations.

Compliance Audit

An examination that evaluates whether an organization adheres to applicable laws, regulations, standards, and internal policies.

Compliance Automation

The use of technology to automate compliance monitoring, evidence collection, control testing, and reporting activities. Compliance automation platforms reduce manual effort and provide continuous compliance visibility.

Compliance Awareness

Programs and activities designed to educate employees about compliance obligations, ethical standards, and the consequences of non-compliance.

Compliance Baseline

The minimum set of compliance requirements that an organization must meet, serving as a starting point for building a comprehensive compliance program.

Compliance Budget

The financial resources allocated to compliance activities including assessments, technology, training, and remediation.

Compliance Calendar

A tool for tracking regulatory deadlines, filing dates, audit schedules, and compliance milestones to ensure timely fulfillment of all obligations.

Compliance Certificate

A formal document issued upon successful completion of a compliance assessment, confirming that an organization meets specific requirements.

Compliance Checkpoint

A defined point in a business process where compliance with relevant regulations and policies is verified before proceeding.

Compliance Controls

Specific measures implemented to ensure adherence to regulatory requirements, including technical controls, policies, and procedures.

Compliance Coordinator

An individual responsible for coordinating compliance activities across departments and ensuring consistent adherence to regulatory requirements.

Compliance Culture

An organizational environment where employees at all levels understand, value, and actively support compliance with laws, regulations, and ethical standards.

Compliance Dashboard

A visual display providing real-time status of an organization's compliance posture across multiple regulations, standards, and internal policies.

Compliance Documentation

The collection of policies, procedures, records, and evidence maintained to demonstrate adherence to regulatory and standard requirements.

Compliance Evidence

Documentation and records that demonstrate an organization's adherence to specific regulatory requirements or standards.

Compliance Framework

A structured set of guidelines, best practices, and standards that organisations follow to meet regulatory requirements, manage risks, and demonstrate compliance. Examples include ISO 27001, SOC 2, NIST CSF, and GDPR.

Compliance Framework Mapping

The process of identifying correspondences between requirements across different compliance frameworks to enable efficient multi-standard adherence.

Compliance Gap

A deficiency identified between an organization's current practices and the requirements of a specific regulation, standard, or framework.

Compliance Hotline

A confidential reporting channel for employees and stakeholders to report suspected compliance violations, fraud, or ethical concerns.

Compliance Investigation

A formal inquiry into suspected violations of laws, regulations, or organizational policies to determine facts and appropriate corrective actions.

Compliance Lifecycle

The ongoing cycle of identifying requirements, implementing controls, monitoring compliance, reporting, and continuously improving the compliance program.

Compliance Management System

An integrated set of policies, processes, and tools used to systematically manage an organization's compliance with legal and regulatory requirements.

Compliance Maturity

The level of sophistication and effectiveness of an organization's compliance program, measured against defined capability levels.

Compliance Measurement

The use of metrics and indicators to quantitatively assess an organization's level of compliance with applicable requirements.

Compliance Monitoring

The ongoing process of verifying that an organisation continues to meet its compliance obligations. Compliance monitoring includes regular assessments, control testing, policy reviews, and metrics tracking.

Compliance Obligation

A legal or regulatory requirement that an organization must fulfill to avoid penalties, sanctions, or other adverse consequences.

Compliance Officer

A designated individual responsible for overseeing and managing an organization's compliance program, ensuring adherence to laws and regulations.

Compliance Oversight

The governance function responsible for monitoring, evaluating, and reporting on the effectiveness of an organization's compliance activities.

Compliance Policy

A formal document establishing an organization's commitment to compliance and defining the principles, responsibilities, and expectations for regulatory adherence.

Compliance Program

A comprehensive system of policies, procedures, training, and oversight designed to ensure an organization meets all applicable legal and regulatory requirements.

Compliance Programme

A structured set of internal policies, procedures, training, and monitoring activities designed to ensure an organisation adheres to applicable laws, regulations, and industry standards.

Compliance Register

A comprehensive inventory of all applicable laws, regulations, standards, and contractual obligations relevant to an organization.

Compliance Reporting

The process of generating and submitting reports to regulatory bodies, management, or stakeholders demonstrating adherence to compliance requirements.

Compliance Review

A systematic examination of an organization's practices, controls, and documentation to verify adherence to applicable compliance requirements.

Compliance Risk

The potential for legal penalties, financial loss, or reputational damage arising from an organization's failure to comply with laws, regulations, or standards.

Compliance Risk Assessment

An evaluation of the risks associated with failing to comply with applicable laws, regulations, and standards.

Compliance Roadmap

A strategic plan outlining the steps, timeline, and milestones for achieving and maintaining compliance with specific regulations or standards.

Compliance Scope

The defined boundaries of what a compliance program covers, including applicable regulations, organizational units, and geographic locations.

Compliance Testing

The process of verifying that systems, processes, and controls function as intended and meet the requirements of applicable regulations and standards.

Compliance Training

Educational programs designed to ensure employees understand their compliance obligations and can fulfill their roles in maintaining regulatory adherence.

Compliance Verification

The process of confirming through evidence and testing that an organization meets specific compliance requirements.

Compliance Workflow

The defined sequence of activities and approvals required to complete a compliance-related task or process.

Compliance as Code

The practice of defining compliance policies and controls as machine-readable code that can be automatically tested and enforced.

Computer Emergency Response Team

An organization that handles cybersecurity incidents and coordinates responses, providing technical guidance and threat intelligence.

Computer Forensics

The application of investigation and analysis techniques to gather and preserve evidence from a computer system in a way that is suitable for presentation in a court of law.

Computer Security Incident

An event that actually or potentially jeopardizes the confidentiality, integrity, or availability of a computer system or the data it processes.

Computer Vision

A field of artificial intelligence that enables machines to interpret and understand visual information from the world. Computer vision applications raise privacy concerns when used for facial recognition and surveillance.

Computer-Assisted Audit Techniques

The use of software tools and data analytics by auditors to analyze large data sets, test controls, and improve audit efficiency.

Computer-Assisted Audit Techniques (CAATs)

Software tools and techniques used by auditors to automate audit procedures such as data extraction, analysis, sampling, and control testing. CAATs improve audit efficiency and enable analysis of larger data sets.

Concentration Risk

The risk arising from overexposure to a single counterparty, sector, region, or system dependency that could amplify the impact of adverse events.

Confidential Computing

A security paradigm that protects data in use by performing computation in a hardware-based trusted execution environment. Confidential computing prevents unauthorised access to data even from the infrastructure provider.

Confidentiality

The principle of ensuring that information is accessible only to authorised individuals, entities, or processes. One of the three pillars of information security (CIA triad).

Configuration Audit

An examination of system configurations to verify they comply with security baselines, standards, and organizational requirements.

Configuration Baseline

A documented and agreed-upon specification of a system's configuration at a specific point in time, used as a reference for managing changes.

Configuration Compliance

The adherence of system configurations to defined security baselines and hardening standards.

Configuration Item

A component of IT infrastructure that needs to be managed to deliver services, tracked and maintained through configuration management.

Configuration Management

A process for systematically managing, organizing, and controlling changes to system configurations to maintain integrity and traceability.

Configuration Management Database (CMDB)

A repository that stores information about the configuration items (CIs) and their relationships within an IT environment. CMDBs support change management, incident management, and compliance reporting.

Configuration Standard

A documented specification of approved settings and parameters for configuring systems securely and consistently.

Consent

A lawful basis for processing personal data under GDPR that requires a clear, specific, informed, and unambiguous indication of the data subject's agreement to their data being processed. Consent must be freely given and as easy to withdraw as to give.

Consent Decree

A legally binding agreement between a regulatory body and an organization that resolves compliance violations and mandates specific corrective actions.

Consent Management

Systems and processes for obtaining, recording, and managing user consent for the collection, processing, and sharing of personal data in compliance with privacy laws.

Consent Management Platform

Technology that helps organizations collect, store, and manage user consent preferences for data processing activities and cookie usage on websites and applications.

Consent Management Platform (CMP)

A technology solution that enables websites and apps to collect, store, and manage user consent for data processing activities. CMPs help organisations comply with privacy regulations such as GDPR and ePrivacy Directive.

Consent Order

A regulatory enforcement action requiring an organization to take specific corrective actions to address compliance violations.

Consent Receipt

A record or receipt provided to a data subject confirming the details of the consent they have given for data processing.

Consent Withdrawal

The right of individuals to revoke their previously given consent for data processing, requiring organizations to cease processing based on that consent.

Construction Compliance

Regulatory requirements governing construction practices including building codes, safety standards, environmental regulations, and labor laws.

Consumer Financial Protection

Regulations and practices designed to protect consumers in financial transactions, ensuring fair lending, transparent disclosure, and responsible practices.

Consumer Protection

Laws and regulations designed to safeguard consumers from unfair business practices, fraud, and harmful products or services.

Container Orchestration Security

Security practices for protecting container orchestration platforms like Kubernetes, including access control, network policies, and secrets management.

Container Security

The practice of protecting containerised applications throughout their lifecycle, from image creation to runtime. Container security addresses image scanning, runtime protection, network policies, and orchestration platform security.

Content Filtering

Technology that screens and restricts access to web content, email, or data transfers based on predefined policies to prevent exposure to malicious or inappropriate material.

Content Moderation

The practice of monitoring and managing user-generated content on platforms to ensure compliance with policies, laws, and community standards.

Contingency Plan

A plan for maintaining or restoring business operations when disruptive events occur, covering both prevention and recovery activities.

Continuity of Operations

A federal government initiative ensuring that agencies are able to continue performance of essential functions during emergencies.

Continuous Auditing

An audit approach that uses technology to produce audit results simultaneously with, or shortly after, the occurrence of relevant events. Continuous auditing provides real-time assurance and enables faster identification of control failures.

Continuous Compliance

An approach to compliance that replaces periodic point-in-time assessments with ongoing automated monitoring and evidence collection. Continuous compliance provides real-time visibility into the organisation's compliance posture.

Continuous Deployment Security

Security controls integrated into continuous deployment pipelines to ensure code is scanned and validated before production release.

Continuous Improvement

An ongoing effort to improve products, services, and processes incrementally over time through small, sustainable changes.

Continuous Integration Security

Security practices integrated into continuous integration pipelines, including automated scanning, testing, and policy enforcement during builds.

Continuous Monitoring

The ongoing awareness of information security, vulnerabilities, and threats to support organisational risk management decisions. Required by NIST SP 800-137 and recommended by most security frameworks.

Continuous Risk Assessment

An ongoing process of evaluating risks in real time rather than at periodic intervals, enabling more responsive risk management.

Continuous Verification

The ongoing process of validating that security controls, configurations, and compliance status remain effective and current.

Contractual Compliance

Adherence to the specific terms, conditions, and obligations set forth in contracts and agreements with customers, vendors, and partners.

Control

A measure (policy, procedure, technical mechanism, or physical safeguard) that modifies risk. Controls can prevent, detect, or correct security incidents.

Control Assessment

The evaluation of a security or compliance control to determine whether it is properly designed and operating effectively.

Control Assurance

The processes for providing confidence that controls are operating effectively and achieving their intended risk mitigation objectives.

Control Audit

A focused examination of specific controls to evaluate their design adequacy and operating effectiveness in achieving control objectives.

Control Automation

The use of technology to automatically implement, monitor, and enforce security and compliance controls without manual intervention.

Control Baseline

The minimum set of security controls selected for a system based on its risk level and applicable regulatory requirements.

Control Catalog

A comprehensive inventory of available security and compliance controls organized by type, function, and applicable framework requirements.

Control Deficiency

A weakness in the design or operation of a control that prevents it from effectively mitigating the intended risk or meeting its objective.

Control Design

The process of defining the specifications and implementation approach for security and compliance controls to address identified risks.

Control Documentation

Written records describing the design, implementation, operation, and effectiveness of security and compliance controls.

Control Effectiveness

The degree to which a security or compliance control achieves its intended purpose in mitigating a specific risk or meeting a requirement.

Control Environment

The set of standards, processes, and structures that provide the foundation for carrying out internal control across an organisation. The control environment is established by leadership and sets the tone for the organisation.

Control Evidence

Documentation, records, and artifacts that demonstrate a control exists, is properly designed, and operates effectively.

Control Framework

A structured set of controls organized into domains and objectives that provides a systematic approach to managing specific types of risk.

Control Framework Mapping

The process of identifying relationships between controls across different frameworks to enable efficient multi-standard compliance.

Control Gap

A deficiency identified when an organisation's existing controls do not fully meet the requirements of a target compliance framework or standard. Control gaps are identified through gap analysis and addressed through remediation plans.

Control Implementation

The process of deploying and configuring security and compliance controls according to their design specifications and organizational requirements.

Control Library

A comprehensive collection of defined security and compliance controls that an organization can select from based on its requirements.

Control Mapping

The process of identifying relationships between controls in different frameworks. For example, mapping ISO 27001 Annex A controls to NIST 800-53 controls to identify overlap and gaps.

Control Monitoring

The ongoing assessment of control performance and effectiveness through testing, metrics, and automated monitoring tools.

Control Objective

A statement of the desired result or purpose to be achieved by implementing a control. Control objectives define what the organisation wants to achieve through its control activities and provide the basis for control design and assessment.

Control Owner

The individual responsible for the design, implementation, operation, and effectiveness of a specific security or compliance control.

Control Rationalization

The process of optimizing the control environment by eliminating redundant controls and ensuring each control serves a distinct purpose.

Control Self-Assessment

A process where operational teams evaluate the effectiveness of their own controls and risk management practices using structured methodology.

Control Testing

The process of evaluating whether controls are designed appropriately and operating effectively to achieve their intended objectives. Control testing is a core component of compliance audits and attestation engagements.

Control Validation

The process of testing and verifying that implemented controls function as intended and effectively mitigate their associated risks.

Conversational AI Compliance

Regulatory requirements and best practices for deploying chatbots and virtual assistants that handle personal data, make decisions, or interact with consumers.

Cookie Consent

The requirement under privacy regulations to obtain user permission before placing non-essential cookies on their device. Cookie consent mechanisms must provide clear information about cookie purposes and allow granular choices.

Cookie Policy

A document that explains what cookies a website uses, their purposes, and how users can manage their cookie preferences.

Corporate Compliance

An organization's adherence to laws, regulations, standards, and internal policies that govern its operations and business practices.

Corporate Governance

The system of rules, practices, and processes by which an organisation is directed and controlled. Corporate governance balances the interests of stakeholders including shareholders, management, customers, suppliers, government, and the community.

Corrective Action

Action taken to eliminate the root cause of a detected nonconformity or other undesirable situation, preventing its recurrence. A key concept in ISO management systems.

Corrective Action Plan

A documented set of steps to address audit findings, control deficiencies, or non-conformities, including timelines and responsible parties.

Corrective Control

A security control designed to restore systems and processes to their expected state after a security incident or policy violation has been detected.

Correlation Rule

A predefined logic pattern in SIEM systems that triggers alerts when specific combinations of events or conditions are detected across log sources.

Counterfeit Prevention

Measures to prevent the use of counterfeit hardware, software, or components that could introduce vulnerabilities or compromise system integrity.

Countermeasure

An action, device, procedure, or technique that reduces a threat, vulnerability, or attack by eliminating or preventing it, minimizing harm, or enabling discovery.

Covered Entity

Under HIPAA, a health plan, healthcare clearinghouse, or healthcare provider that transmits any health information electronically. Covered entities must comply with all HIPAA Administrative Simplification rules.

Covert Channel

A communication path that was not designed for information transfer but can be exploited to secretly transmit data in violation of security policies.

Credential Harvesting

Techniques used by attackers to collect login credentials through methods such as phishing sites, keyloggers, or memory scraping tools.

Credential Management

The processes and tools for securely creating, storing, distributing, rotating, and revoking user credentials throughout their lifecycle.

Credential Rotation

The practice of regularly changing passwords, keys, certificates, and other credentials to limit the window of exposure from compromised credentials.

Credential Stuffing

An automated attack that uses stolen username-password pairs from previous data breaches to attempt to log into other services. Exploits the tendency of users to reuse passwords across multiple sites.

Crisis Communication

The processes and protocols for communicating with internal and external stakeholders during a crisis to manage information flow and maintain trust.

Crisis Management

The process by which an organization responds to and manages the impact of a major unpredictable event that threatens to harm the organization.

Crisis Management Plan

A documented guide for responding to major disruptions, defining leadership roles, communication protocols, and decision-making processes during a crisis.

Crisis Management Team

A designated group of senior leaders responsible for making strategic decisions and coordinating the organization's response during a crisis.

Critical Asset

An information asset, system, or resource whose compromise, loss, or failure would have a severe impact on the organization's operations or objectives.

Critical Infrastructure

Systems, assets, and networks (whether physical or virtual) so vital to a nation that their incapacitation or destruction would have a debilitating impact on security, economic stability, public health, or safety.

Critical Infrastructure Protection

Regulations and security measures to protect essential services and systems such as energy, water, transportation, and healthcare from disruption.

Critical System

An information system whose failure or compromise would have severe consequences for the organization's operations or mission.

Cross-Border Compliance

Managing compliance obligations across multiple jurisdictions, addressing conflicting or overlapping regulatory requirements in different countries.

Cross-Border Data Transfer

The movement of personal data from one jurisdiction to another. Cross-border transfers are regulated under GDPR, LGPD, and other privacy laws and typically require adequate safeguards such as Standard Contractual Clauses or Binding Corporate Rules.

Cross-Device Tracking

The practice of monitoring user activity across multiple devices such as phones, tablets, and computers to build comprehensive behavioral profiles.

Cross-Framework Mapping

The discipline of identifying equivalent or related controls across multiple compliance frameworks. Enables unified control sets and reduces duplicate compliance effort.

Cross-Functional Team

A team composed of members from different departments or disciplines working together on shared objectives such as security or compliance.

Cross-Site Request Forgery

A web security vulnerability that tricks authenticated users into submitting unintended requests to a web application, potentially performing unauthorized actions.

Cross-Site Request Forgery (CSRF)

A web application vulnerability that tricks an authenticated user into submitting unintended requests to a web application. CSRF attacks exploit the trust that a site has in the user's browser.

Cross-Site Scripting

A web application vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, enabling data theft or session hijacking.

Cross-Site Scripting (XSS)

A web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. XSS attacks can steal session cookies, redirect users, or deface websites.

Cryptanalysis

The study of analysing and breaking cryptographic systems. Cryptanalysis involves finding weaknesses in the mathematical algorithms or implementation of encryption schemes.

Crypto Agility

The ability of a system to quickly transition between different cryptographic algorithms and protocols in response to new threats or requirements.

Cryptocurrency Compliance

Regulations governing cryptocurrency transactions including anti-money laundering requirements, tax reporting, and consumer protection.

Cryptographic Hash Function

A mathematical algorithm that maps data of arbitrary size to a fixed-size bit string (hash value). Hash functions are one-way, deterministic, and designed so that even a small change in input produces a dramatically different output.

Cryptographic Key

A piece of information used by a cryptographic algorithm to transform plaintext into ciphertext or vice versa. Key security is fundamental to the strength of any cryptographic system.

Cryptographic Key Management

The administration of cryptographic keys throughout their lifecycle including generation, distribution, storage, rotation, revocation, and destruction.

Cryptojacking

The unauthorized use of someone else's computing resources to mine cryptocurrency, typically delivered through malicious scripts on websites or compromised systems.

Cyber Awareness

The knowledge and attitudes that members of an organization possess regarding the protection of information assets and cybersecurity best practices.

Cyber Deception

Security techniques that use decoys, misdirection, and disinformation to confuse attackers, detect intrusions, and gather intelligence about adversary methods.

Cyber Espionage

State-sponsored or organized cyber operations aimed at stealing sensitive government, military, or corporate information.

Cyber Essentials

A UK government-backed certification scheme that helps organisations protect against the most common cyber threats. Cyber Essentials covers five technical controls: firewalls, secure configuration, access control, malware protection, and patch management.

Cyber Event

An observable occurrence in cyberspace that may or may not have security implications, requiring analysis to determine significance.

Cyber Hygiene

Routine practices and steps that users and organizations take to maintain system health and improve online security, similar to personal health hygiene.

Cyber Incident

An event that actually or imminently jeopardizes the confidentiality, integrity, or availability of information or information systems.

Cyber Insurance

Insurance coverage designed to protect organisations against financial losses resulting from cyber incidents such as data breaches, ransomware attacks, and business interruption caused by cyber events.

Cyber Insurance Policy

An insurance product designed to protect organizations from the financial impacts of cybersecurity incidents including data breaches and ransomware.

Cyber Insurance Underwriting

The process by which insurers evaluate an organization's cybersecurity posture and risk profile to determine coverage terms and premiums.

Cyber Kill Chain

A model developed by Lockheed Martin that describes the stages of a cyber attack: reconnaissance, weaponisation, delivery, exploitation, installation, command and control, and actions on objectives.

Cyber Liability

Legal and financial exposure arising from cybersecurity incidents, including costs of breach response, regulatory fines, and third-party claims.

Cyber Physical System

A system integrating computation, networking, and physical processes where embedded computers monitor and control physical operations.

Cyber Range

A simulated environment used for cybersecurity training, testing, and exercises that replicates real-world networks and scenarios without impacting production systems.

Cyber Resilience

An organisation's ability to continuously deliver intended outcomes despite adverse cyber events. Goes beyond cybersecurity to include preparedness, response, and recovery.

Cyber Risk Assessment

A systematic evaluation of threats, vulnerabilities, and potential impacts to an organization's digital assets and information systems.

Cyber Risk Quantification

The process of calculating the potential financial impact of cyber risks using statistical models, enabling data-driven security investment decisions.

Cyber Threat

A potential cyber attack that could compromise information systems, data, or services through exploitation of vulnerabilities.

Cyber Threat Hunting

A proactive security practice of searching through networks and datasets to detect advanced threats that evade existing automated security solutions.

Cyber Threat Intelligence

Evidence-based knowledge about existing or emerging cyber threats that can be used to inform decisions regarding the organisation's response to those threats. CTI includes indicators of compromise, threat actor profiles, and attack patterns.

Cyber Warfare

The use of digital attacks by nation-states to disrupt, damage, or destroy another nation's computer systems and critical infrastructure.

Cybersecurity

The practice of protecting systems, networks, and programs from digital attacks that aim to access, change, or destroy sensitive information.

Cybersecurity Framework

A structured set of guidelines and best practices for managing cybersecurity risk, helping organizations assess and improve their security posture.

Cybersecurity Maturity

The level of sophistication and effectiveness of an organization's cybersecurity practices, measured against a defined scale of capability levels.

Cybersecurity Mesh

An architectural approach that distributes security controls to individual access points rather than a centralized perimeter, enabling more flexible security.

Cybersecurity Program

A comprehensive set of policies, procedures, technologies, and personnel dedicated to protecting an organization's digital assets and managing cyber risk.

Cybersecurity Risk

The potential for financial loss, operational disruption, or reputational damage resulting from the failure of digital technologies and cyber threats.

Cybersecurity Strategy

A high-level plan that defines an organization's approach to managing cybersecurity risk and protecting its digital assets over a defined period.

Cybersecurity Workforce

The personnel responsible for protecting an organization's digital assets, including their skills development, certification, and career pathway management.

D198 terms

DISA STIG

Defence Information Systems Agency Security Technical Implementation Guides that provide technical security configuration standards for US Department of Defense information systems. STIGs are based on NIST SP 800-53 controls.

DMZ

A demilitarized zone is a network segment that acts as a buffer between an organization's internal network and the external internet, hosting public-facing services.

DNS Filtering

A security technique that blocks access to malicious or unwanted domains by filtering DNS queries based on threat intelligence and policy.

DNS Security

Measures to protect the Domain Name System from attacks such as DNS spoofing, cache poisoning, and hijacking that redirect users to malicious sites.

DNS Security Extensions (DNSSEC)

A suite of specifications for securing information provided by the Domain Name System. DNSSEC adds cryptographic signatures to DNS records to protect against cache poisoning and spoofing attacks.

DNS over HTTPS

A protocol that encrypts DNS queries within HTTPS connections to prevent eavesdropping and manipulation of DNS traffic.

DNSSEC

Domain Name System Security Extensions, a suite of specifications that adds authentication to DNS responses to protect against cache poisoning and spoofing attacks.

DPO Certification

Data Protection Officer certification validating expertise in data protection laws, privacy management, and regulatory compliance.

Dark Pattern

A deceptive user interface design that tricks users into making unintended choices, increasingly subject to regulatory scrutiny and prohibition.

Dark Web Monitoring

The practice of scanning dark web forums, marketplaces, and data dumps for an organization's compromised credentials, data, or mentions to enable early response.

Data Accuracy

The principle that personal data must be accurate, kept up to date, and corrected or erased when inaccuracies are identified.

Data Anonymization

Techniques applied to personal data to prevent identification of individuals, including generalization, suppression, noise addition, and data swapping methods.

Data Anonymization Techniques

Specific methods for anonymizing data including k-anonymity, l-diversity, t-closeness, differential privacy, and synthetic data generation.

Data Architecture

The design of an organization's data structures, policies, and standards that govern how data is collected, stored, and used.

Data Audit

A comprehensive review of an organization's data processing activities to assess compliance with data protection laws and identify privacy risks.

Data Backup

The process of creating copies of data that can be used to restore the original in the event of data loss, corruption, or disaster.

Data Breach

An incident where confidential, private, or protected data is accessed, disclosed, or stolen by an unauthorised party. May trigger breach notification requirements under GDPR, HIPAA, or other regulations.

Data Breach Law

Legislation requiring organizations to notify affected individuals and authorities when personal data is compromised, with varying requirements by jurisdiction.

Data Breach Notification

The legal obligation to inform affected individuals and regulatory authorities when personal data is compromised in a security incident within specified timeframes.

Data Breach Response Plan

A documented set of procedures for responding to data breaches, including detection, containment, notification, and recovery steps.

Data Broker

An entity that collects personal information from various sources and sells or licenses it to other organizations for marketing, risk assessment, or other purposes.

Data Catalog

A centralized inventory of an organization's data assets with metadata descriptions, ownership, lineage, and classification information to support governance and privacy.

Data Center Physical Security

Physical protection measures for data center facilities including perimeter security, access control, environmental monitoring, and video surveillance.

Data Center Security

Physical and environmental security measures protecting data center facilities including access controls, surveillance, fire suppression, and power protection.

Data Center Tier

A classification system that rates data centers on their reliability and availability, from Tier I with basic infrastructure to Tier IV with fault tolerance.

Data Classification

The process of categorising data based on its sensitivity and the impact of unauthorised disclosure. Common levels: Public, Internal, Confidential, Restricted.

Data Clean Room

A secure environment where multiple parties can collaboratively analyze combined datasets without directly sharing or exposing raw personal data.

Data Compliance

Adherence to laws, regulations, and organizational policies governing the collection, storage, processing, and sharing of data.

Data Controller

Under GDPR, the entity that determines the purposes and means of processing personal data. The controller bears primary responsibility for compliance.

Data Custodian

An individual or team responsible for the technical management and safekeeping of data assets, implementing the data governance policies defined by data owners.

Data Destruction

The process of permanently and irreversibly eliminating data stored on electronic media so that it cannot be recovered. Methods include degaussing, physical destruction, and cryptographic erasure.

Data Diode

A hardware device that allows data to flow in only one direction, providing physical enforcement of one-way information transfer. Used in high-security environments to protect classified or sensitive networks.

Data Discovery

The process of identifying and locating sensitive data across an organization's systems, databases, file shares, and cloud services.

Data Disposal

The secure destruction or deletion of personal data when it is no longer needed for its original purpose or when retention periods expire.

Data Encryption

The process of converting data into a coded form using cryptographic algorithms to prevent unauthorized access and protect confidentiality.

Data Encryption Standard

A formerly widely used symmetric encryption algorithm (DES) that has been superseded by AES due to its small key size vulnerability.

Data Enrichment

The practice of combining first-party data with additional information from external sources, raising privacy considerations about consent and purpose limitation.

Data Ethics

The branch of ethics that addresses the moral implications of data collection, processing, and use, including fairness, transparency, and accountability in data practices.

Data Ethics Framework

A structured set of principles and guidelines for making ethical decisions about data collection, use, and sharing.

Data Exfiltration

The unauthorised transfer of data from within an organisation to an external destination. Data exfiltration can occur through various channels including email, USB drives, cloud uploads, and covert network channels.

Data Flow Mapping

The visual documentation of how personal data moves through an organization's systems, processes, and third parties to identify privacy risks and compliance gaps.

Data Governance

The overall management of the availability, usability, integrity, and security of data employed in an organisation. Data governance includes policies, processes, standards, and metrics that ensure the effective use of information.

Data Governance Board

A cross-functional committee responsible for making decisions about data management policies, standards, and dispute resolution.

Data Impact Assessment

A formal evaluation of how a proposed data processing activity might affect the privacy and rights of individuals whose data is involved.

Data Incident

An event involving personal data that could compromise its confidentiality, integrity, or availability, potentially constituting a data breach.

Data Integrity

The assurance that data is accurate, complete, consistent, and unaltered throughout its lifecycle, whether at rest, in transit, or in processing.

Data Inventory

A comprehensive catalog of all personal data collected, processed, and stored by an organization, including data categories, purposes, retention periods, and sharing practices.

Data Lake Governance

Policies and controls for managing privacy and security of personal data stored in data lakes where large volumes of diverse data are collected.

Data Leak Prevention

Technologies and processes designed to detect and prevent the unauthorised transmission of sensitive information outside the organisation. DLP solutions monitor data in motion, at rest, and in use.

Data Leakage

The unauthorized transmission of data from within an organization to an external destination, whether intentional or accidental.

Data Lifecycle Management

Policies and processes for managing data from creation through archival and deletion, ensuring appropriate protection and compliance at each stage.

Data Lineage

The tracking and documentation of the origin, transformations, and movement of data throughout its lifecycle. Data lineage is essential for AI governance, regulatory compliance, and troubleshooting data quality issues.

Data Localization

Legal requirements that mandate personal data of a country's residents to be stored and processed within that country's geographic borders.

Data Loss Prevention

Technologies and processes that detect and prevent unauthorized transmission, sharing, or leakage of sensitive information outside the organization.

Data Mapping

The process of documenting how personal data flows through an organisation, including what data is collected, where it is stored, how it is processed, who has access, and to whom it is transferred. Data mapping is a foundation for GDPR compliance.

Data Masking

A technique that replaces sensitive data with realistic but fictitious values to protect confidential information while maintaining data usability for testing or analytics.

Data Maturity

The level of sophistication of an organization's data management practices, including governance, quality, privacy, and analytics capabilities.

Data Mesh

A decentralized data architecture where domain teams own and manage their data as products, requiring governance for consistency and compliance.

Data Migration Privacy

Privacy considerations and controls required when transferring personal data between systems, platforms, or storage locations.

Data Minimisation

The principle that organisations should collect and process only the personal data that is strictly necessary for the specified purpose. Data minimisation is a core principle of GDPR (Article 5) and most modern privacy regulations.

Data Minimization

A privacy principle requiring organizations to collect and process only the minimum amount of personal data necessary to fulfill a specific stated purpose.

Data Observability

The ability to understand, diagnose, and manage data health across the data pipeline through monitoring, alerting, and lineage tracking.

Data Owner

The individual or role within an organization who has authority and accountability for the management, quality, and appropriate use of specific data assets.

Data Pipeline Security

Security controls applied to data ingestion, transformation, and loading processes to protect data integrity and prevent unauthorized access or manipulation.

Data Portability

The right of individuals to receive their personal data in a structured, commonly used, and machine-readable format, and to transmit that data to another controller. Established under GDPR Article 20.

Data Privacy Framework

An international agreement that provides a mechanism for compliant cross-border transfers of personal data, replacing the previous Privacy Shield arrangement.

Data Privacy Impact Assessment

A process designed to identify and minimise the privacy risks of new projects, systems, or processes that involve personal data. DPIAs are mandatory under GDPR Article 35 for high-risk processing activities.

Data Privacy Management

The comprehensive approach to managing personal data privacy including policies, processes, technology, and training across the organization.

Data Processing Agreement

A legally binding contract between a data controller and data processor that specifies the terms and conditions for processing personal data.

Data Processing Register

A comprehensive record of all data processing activities within an organization, documenting purposes, categories, recipients, and retention periods.

Data Processor

Under GDPR, an entity that processes personal data on behalf of a data controller. Must act only on the controller's instructions and implement appropriate security measures.

Data Protection

The set of strategies and processes used to secure the privacy, availability, and integrity of data throughout its lifecycle.

Data Protection Authority

An independent public authority responsible for monitoring and enforcing data protection regulations within its jurisdiction.

Data Protection Authority (DPA)

An independent public authority responsible for monitoring the application of data protection law, handling complaints, and enforcing compliance. Each EU member state has at least one DPA under the GDPR framework.

Data Protection Certification

Formal certification that an organization's data protection practices meet the requirements of a recognized standard or regulatory framework.

Data Protection Impact Assessment

A systematic process for evaluating the potential privacy impact of a project or system that involves processing personal data, required under GDPR for high-risk processing.

Data Protection Impact Assessment (DPIA)

A process required by GDPR Article 35 for assessing the risks of data processing activities that are likely to result in a high risk to individuals' rights and freedoms.

Data Protection Officer

A designated individual responsible for overseeing an organization's data protection strategy and compliance with privacy regulations.

Data Protection Officer (DPO)

A role required under GDPR Article 37 for organisations that carry out large-scale systematic monitoring or process special categories of data. The DPO acts as the primary contact for data subjects and supervisory authorities.

Data Protection by Default

The principle that the strictest privacy settings should apply automatically without requiring user action. Under GDPR Article 25, only personal data necessary for each specific purpose should be processed by default.

Data Protection by Design

The principle of integrating data protection measures into the design and development of business processes and IT systems from the outset. Required under GDPR Article 25 and considered best practice across all privacy regulations.

Data Pseudonymization

A data protection technique that replaces identifying information with artificial identifiers, allowing data to be re-identified when necessary using separately stored keys.

Data Quality

The degree to which data meets the requirements for its intended use in terms of accuracy, completeness, consistency, timeliness, and validity.

Data Quality Management

Processes for ensuring that data is accurate, complete, consistent, and fit for its intended purpose throughout its lifecycle.

Data Recovery

The process of restoring data that has been lost, corrupted, accidentally deleted, or otherwise made inaccessible from backup copies.

Data Recovery Plan

A documented strategy for restoring lost or corrupted data from backups, defining recovery procedures and priority sequences.

Data Remanence

The residual representation of data that remains on storage media after attempts to erase or delete it, posing a potential security risk.

Data Residency

Legal or regulatory requirements that personal data must be stored and processed within a specific geographic boundary or jurisdiction. Data residency laws exist in countries including Russia, China, India, and several EU member states.

Data Retention

The policies and practices governing how long an organisation keeps personal data. Privacy regulations require that personal data is not kept longer than necessary for the purpose for which it was collected.

Data Retention Policy

A documented policy defining how long different categories of data should be kept, when it should be archived, and when it must be permanently deleted.

Data Right of Erasure

The right of individuals to request the deletion of their personal data under certain conditions, also known as the right to be forgotten.

Data Sanitisation

The process of deliberately, permanently, and irreversibly removing or destroying data stored on a memory device. Data sanitisation ensures that residual data cannot be recovered even with advanced forensic tools.

Data Sanitization

The process of deliberately and permanently destroying data on storage media so it cannot be recovered, using methods such as overwriting, degaussing, or physical destruction.

Data Scraping

The automated extraction of data from websites or applications, raising privacy concerns when personal data is collected without consent.

Data Scrubbing

The process of cleaning or removing sensitive information from data sets before they are shared, published, or used for non-production purposes.

Data Security

The practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.

Data Segmentation

The practice of separating data into distinct categories or partitions based on sensitivity, purpose, or regulatory requirements for targeted protection.

Data Sharing Agreement

A formal agreement between organizations that defines the terms, conditions, and safeguards for sharing personal or sensitive data.

Data Shredding

The irreversible destruction of data by overwriting it multiple times with random patterns, ensuring it cannot be recovered from storage media.

Data Sovereignty

The concept that data is subject to the laws and governance structures of the country in which it is collected, stored, or processed.

Data Sovereignty Compliance

Adherence to laws requiring that data collected within a jurisdiction's borders is subject to that jurisdiction's laws and remains within its territory.

Data Spillage

The accidental exposure of classified or sensitive information in an unauthorized system or location, requiring containment and cleanup procedures.

Data Steward

An individual responsible for managing data assets within a specific domain, ensuring data quality, defining data standards, and implementing data governance policies. Data stewards bridge the gap between business needs and technical data management.

Data Stewardship

The management and oversight of data assets to ensure they are properly maintained, accurate, and used in compliance with policies.

Data Subject

An identified or identifiable natural person whose personal data is being processed. Under GDPR, data subjects have extensive rights including access, rectification, erasure, and portability.

Data Subject Access Request

A formal request from an individual to an organization to obtain a copy of the personal data held about them, required to be fulfilled under privacy laws.

Data Subject Access Request (DSAR)

A request made by an individual to an organisation to obtain a copy of the personal data held about them. Under GDPR, organisations must respond to DSARs within one month and provide the data free of charge.

Data Subject Rights

The legal rights granted to individuals regarding their personal data, including access, rectification, erasure, portability, and objection.

Data Trust

A legal structure where an independent trustee manages data on behalf of a group of individuals, providing fiduciary oversight of data use.

Data Vault

A secure, isolated storage environment for protecting highly sensitive data with strict access controls, encryption, and comprehensive audit trails.

Data at Rest

Data that is stored in any digital form on persistent storage media such as hard drives, SSDs, databases, or cloud storage. Encryption of data at rest is a common security requirement across compliance frameworks.

Data at Rest Encryption

The protection of stored data using encryption algorithms so that the data remains unreadable without the proper decryption key, even if storage media is compromised.

Data in Motion

Data actively being transferred from one location to another across networks, requiring encryption and other protections during transmission.

Data in Transit

Data that is actively moving from one location to another, such as across the internet or through a private network. Protecting data in transit typically requires encryption protocols such as TLS/SSL.

Data in Transit Encryption

The protection of data as it moves between systems or across networks using protocols such as TLS, IPsec, or SSH to prevent interception.

Data in Use

Data that is actively being processed, read, or modified in memory by a CPU or application. Protecting data in use is more challenging than data at rest or in transit and may involve techniques such as confidential computing.

Database Activity Monitoring

Real-time monitoring and analysis of database activities to detect unauthorized access, policy violations, and anomalous behavior.

Database Encryption

The application of encryption to data stored in databases, protecting the confidentiality of records from unauthorized database access.

Database Security

Measures for protecting database management systems from attacks, unauthorized access, and data breaches including access controls and encryption.

De-identification

The process of removing or obscuring personal identifiers from data to reduce the risk of identifying individuals. De-identified data may still be re-identifiable under certain conditions, unlike fully anonymised data.

Dead Man Switch

An automated mechanism that triggers a predefined action if a specific condition is not regularly met, used in security for failsafe purposes.

Decentralized Finance Security

Security considerations for decentralized financial systems and applications built on blockchain technology.

Decentralized Identity

An identity model where individuals control their own digital identity information using cryptographic proofs rather than relying on centralized authorities.

Deception Technology

Security tools that deploy decoys, honeypots, and breadcrumbs throughout an enterprise environment to detect, analyse, and defend against advanced threats by misleading attackers.

Decision Rights

The defined authority and responsibility for making specific types of decisions within an organization's governance framework.

Decoy System

A fake system or service deployed to attract attackers, diverting them from real assets while providing intelligence about their techniques and objectives.

Decryption

The process of converting encrypted data back to its original plaintext form using a cryptographic key or algorithm.

Decryption Key

The cryptographic key used to convert encrypted ciphertext back into readable plaintext, required for authorized access to protected data.

Deep Learning

A subset of machine learning based on artificial neural networks with multiple layers. Deep learning models can learn complex patterns from large datasets and are used in applications such as image recognition, natural language processing, and autonomous systems.

Deep Packet Inspection

A network analysis technique that examines the full content of data packets as they pass through a checkpoint to detect threats, filter content, or enforce policies.

Deepfake

Synthetic media created using AI techniques, particularly deep learning, to produce realistic but fabricated images, videos, or audio. Deepfakes pose security threats including identity fraud, misinformation, and social engineering.

Defence in Depth

A security strategy that uses multiple layers of controls to protect assets. If one layer fails, others continue to provide protection.

Defence in Regulation

A regulatory approach that applies multiple overlapping compliance requirements from different laws and standards. Organisations in regulated industries often face concurrent obligations from sector-specific and general compliance frameworks.

Defense Industrial Base Security

Security requirements for organizations in the defense supply chain that handle controlled unclassified information and classified data.

Defense Strategy

A comprehensive plan for protecting an organization's assets and infrastructure from threats, incorporating multiple layers of security controls.

Defense in Depth

A layered security strategy that uses multiple security controls at different levels so that if one control fails, others continue to provide protection.

Degaussing

The process of eliminating data from magnetic storage media by exposing it to a strong magnetic field, rendering the data unrecoverable.

Delegated Administration

An access model where administrative responsibilities are distributed to specific individuals for managing resources within their scope.

Demilitarised Zone (DMZ)

A perimeter network segment that sits between an organisation's internal network and the external internet. DMZs host public-facing services while providing an additional layer of security for the internal network.

Denial List

A list of entities such as IP addresses, email addresses, or file hashes that are explicitly blocked from accessing a system or network.

Denial of Service

An attack that disrupts normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic or requests.

Denial of Service (DoS)

An attack that aims to make a computer resource unavailable to its intended users by overwhelming it with traffic or requests. Distributed DoS (DDoS) attacks use multiple compromised systems to amplify the attack.

Denial of Service Prevention

Security measures and technologies designed to detect and mitigate denial-of-service attacks to maintain service availability.

Dependency Analysis

The identification and mapping of relationships between business processes, systems, and resources to understand cascade effects during disruptions.

Dependency Scanning

Automated analysis of software dependencies and libraries to identify known vulnerabilities that could affect the security of the application.

Desktop Security

Security measures for protecting desktop computers from malware, unauthorized access, data theft, and other threats.

Destructive Attack

A cyberattack intended to permanently destroy data, systems, or infrastructure rather than steal information or extort payment.

Detection Engineering

The practice of designing, building, testing, and maintaining threat detection rules and analytics to identify malicious activity in security monitoring systems.

Detective Control

A security control designed to identify and alert on security events, policy violations, or anomalous activities after they have occurred.

DevSecOps

The practice of integrating security practices within the DevOps process. DevSecOps ensures that security is a shared responsibility throughout the entire software development and deployment lifecycle.

Device Authentication

The process of verifying the identity of a hardware device connecting to a network or system before granting it access to resources.

Device Fingerprinting

A technique that identifies and tracks devices based on their unique combination of hardware, software, and configuration attributes.

Differential Privacy

A mathematical framework for sharing information about a dataset while protecting the privacy of individual records. Differential privacy adds calibrated noise to data or query results to prevent identification of individuals.

Digital Certificate

An electronic document that uses a digital signature to bind a public key with an identity. Digital certificates are issued by Certificate Authorities and used in TLS/SSL, email encryption, and code signing.

Digital Consent

Electronic methods for obtaining and recording user consent for data processing, including click-through agreements and digital signature mechanisms.

Digital Evidence

Information stored or transmitted in digital form that may be used as evidence in legal proceedings or investigations.

Digital Forensics

The process of uncovering and interpreting electronic data for use in legal proceedings or incident investigations. Digital forensics follows strict procedures to preserve evidence integrity and chain of custody.

Digital Identity

The collection of electronically captured and stored personal attributes, credentials, and identifiers that uniquely represent an individual in digital systems.

Digital Markets Act

EU regulation designed to ensure fair and open digital markets by imposing obligations on large online platforms designated as gatekeepers.

Digital Operational Resilience

An organization's ability to build, assure, and review its technological operational integrity against ICT-related disruptions.

Digital Operational Resilience Act

An EU regulation (DORA) that establishes requirements for financial entities to strengthen IT security and ensure operational resilience against ICT-related disruptions.

Digital Operational Resilience Act (DORA)

An EU regulation that establishes uniform requirements for the security of network and information systems in the financial sector. DORA requires financial entities to manage ICT risk, test resilience, and oversee third-party providers.

Digital Rights Management

Technologies that control access to and usage of digital content and devices after sale, protecting intellectual property from unauthorized copying or distribution.

Digital Services Act

EU regulation establishing a framework for the accountability of online platforms regarding illegal content, advertising transparency, and algorithmic transparency.

Digital Signature

A cryptographic mechanism that provides authentication, integrity, and non-repudiation for digital messages or documents. Digital signatures use public key cryptography to verify the sender's identity and ensure the content has not been altered.

Digital Transformation Security

Security considerations and controls required when organizations undergo digital transformation initiatives that change technology and business processes.

Digital Twin

A virtual replica of a physical system, process, or asset used for simulation, monitoring, and optimization, raising data governance and security considerations.

Direct Marketing Consent

The specific consent required before sending marketing communications to individuals, with varying requirements across different jurisdictions.

Directive Control

A security control that establishes expected behavior through policies, standards, guidelines, and procedures.

Directory Service

A centralized database that stores, organizes, and provides access to information about network resources and users for authentication and authorization.

Directory Traversal

A web vulnerability that allows attackers to access files and directories outside of the web root folder by manipulating file path references. Also known as path traversal or dot-dot-slash attacks.

Disaster Declaration

The formal invocation of a disaster recovery plan, triggering predefined response procedures and activating recovery teams and resources.

Disaster Recovery

The process of restoring IT systems and data after a catastrophic event. Typically governed by a Disaster Recovery Plan (DRP) with defined RTOs and RPOs.

Disaster Recovery Plan

A documented set of policies and procedures designed to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.

Disaster Recovery Testing

The practice of testing disaster recovery plans and procedures to ensure they function as expected and meet recovery time and point objectives.

Disaster Recovery as a Service

A cloud-based service that provides disaster recovery capabilities including automated failover, replication, and recovery of IT systems.

Disclosure Policy

A documented policy defining how an organization handles the reporting and disclosure of security vulnerabilities found in its systems.

Disinformation

False or misleading information deliberately created and spread to deceive, manipulate public opinion, or undermine trust in institutions.

Disk Encryption

The encryption of an entire disk or storage volume so that all data stored on it is automatically encrypted and requires authentication to access.

Disruption

An event that interrupts normal business operations, potentially causing financial loss, reputational damage, or regulatory consequences.

Distributed Denial of Service

An attack that uses multiple compromised systems to simultaneously overwhelm a target with traffic, making services unavailable to legitimate users.

Do Not Track

A web browser signal requesting that websites and advertisers do not track the user's browsing activity for targeted advertising purposes.

Document Control

The systematic management of documents throughout their lifecycle including creation, review, approval, distribution, revision, and archival.

Dodd-Frank Act

US financial reform legislation that increased regulation of the financial industry, established consumer protections, and created new oversight agencies.

Domain Controller

A server that responds to security authentication requests within a Windows domain, managing user accounts and security policies.

Domain-Based Message Authentication

Email authentication protocols including SPF, DKIM, and DMARC that verify sender identity and prevent email spoofing and phishing attacks.

Domain-Based Message Authentication (DMARC)

An email authentication protocol that builds on SPF and DKIM to protect against email spoofing. DMARC policies tell receiving mail servers how to handle emails that fail authentication checks.

Door Access Control

Electronic systems that control and log physical entry through doors using credentials such as cards, PINs, biometrics, or mobile devices.

Downtime

A period when a system, service, or network is unavailable or not functioning, potentially impacting business operations.

Drive-by Download

A type of cyber attack where malicious code is automatically downloaded to a user's device without their knowledge, typically through exploiting vulnerabilities in browsers, plugins, or operating systems.

Drone Security

Security measures for protecting unmanned aerial vehicles and their control systems from hijacking, data interception, and physical threats.

Dual Control

A security procedure requiring two authorized individuals to perform a critical action simultaneously, preventing any single person from acting alone.

Due Care

The level of care that a reasonable person would exercise in protecting organizational information assets and complying with security requirements.

Due Diligence

The investigation or audit of a potential investment, partner, or vendor to confirm facts and assess risks. In compliance, often refers to vendor risk assessment.

Due Diligence Process

A comprehensive investigation and evaluation conducted before making business decisions such as mergers, acquisitions, or vendor engagements to identify risks.

Dumpster Diving

Searching through an organization's trash to find sensitive information such as documents, passwords, or other data useful for attacks.

Dwell Time

The duration between when a threat actor gains initial access to a system and when the breach is detected, a key security performance metric.

Dynamic Application Security Testing

A security testing approach that evaluates running web applications by simulating external attacks to find vulnerabilities in a deployed environment.

E92 terms

EDR (Endpoint Detection and Response)

Security solutions that continuously monitor endpoints to detect, investigate, and respond to cyber threats. EDR provides real-time visibility into endpoint activities with automated response capabilities.

ENISA

The European Union Agency for Cybersecurity that contributes to EU cyber policy and supports member states in improving cybersecurity capabilities.

ERISA

The Employee Retirement Income Security Act sets standards for retirement and health benefit plans in the private sector to protect participants.

EU AI Act

The European Union's regulation on artificial intelligence, establishing a risk-based classification system. Bans certain AI practices and imposes strict requirements on high-risk AI systems.

EU-US Data Privacy Framework

The data transfer framework between the EU and the United States that replaced the invalidated Privacy Shield. It provides a legal mechanism for transferring personal data from the EU to US companies that have self-certified under the framework.

East-West Traffic

Network traffic that flows laterally between servers and workloads within a data center, requiring security monitoring for threat detection.

Eavesdropping

The interception of private communications or data transmissions without the knowledge or consent of the parties involved, a form of passive attack.

Edge Computing Security

Security measures for protecting computing resources, data, and applications deployed at the network edge, closer to data sources and end users.

Education Compliance

Regulatory requirements for educational institutions including student privacy, accessibility, financial aid regulations, and accreditation standards.

Egress Filtering

The practice of monitoring and controlling outbound network traffic to prevent unauthorised data transfers and communication with known malicious destinations. A key defence against data exfiltration and malware beaconing.

Electromagnetic Interference

Electrical disturbances that can disrupt, degrade, or damage electronic equipment and data transmission, requiring shielding measures.

Electronic Communications Privacy

Laws governing the interception, access, and disclosure of electronic communications including email, phone calls, and stored electronic data.

Electronic Protected Health Information (ePHI)

Protected health information that is created, stored, transmitted, or received in any electronic format. ePHI is specifically protected under the HIPAA Security Rule, which requires administrative, physical, and technical safeguards.

Electronic Signatures

Digital methods of indicating agreement or approval on electronic documents, with legal validity defined by regulations such as eIDAS and ESIGN.

Elliptic Curve Cryptography

A public-key cryptographic approach based on the algebraic structure of elliptic curves over finite fields. ECC provides equivalent security to RSA with smaller key sizes, making it more efficient for mobile and IoT devices.

Email Authentication

Protocols and technologies such as SPF, DKIM, and DMARC that verify the legitimacy of email senders and protect against email spoofing.

Email Security Gateway

A solution that monitors and filters incoming and outgoing email to protect against threats such as phishing, malware, spam, and data loss. Email gateways use multiple detection engines including sandboxing and machine learning.

Embedded Security

Security measures designed specifically for embedded systems and IoT devices, addressing unique constraints such as limited processing power and memory.

Embedded System

A computer system with a dedicated function within a larger system, often with limited security capabilities requiring specialized protection.

Emergency Access

Procedures for granting immediate temporary access to critical systems during emergencies when normal access control procedures cannot be followed.

Emergency Communication

Systems and procedures for rapidly communicating with employees, stakeholders, and the public during emergency situations.

Emergency Planning

The process of preparing for potential emergencies through risk assessment, plan development, training, and exercises.

Emergency Response

The immediate actions taken to protect life, property, and the environment when a crisis or disaster occurs, before recovery operations begin.

Emergency Response Plan

A documented set of procedures for responding to emergencies including evacuation, communication, medical response, and initial containment actions.

Emerging Risk

A new or evolving risk that may not be fully understood but has the potential to significantly impact an organization's objectives in the future.

Emission Security

Measures taken to prevent the interception of electromagnetic emissions from electronic equipment that could reveal classified or sensitive information.

Employee Privacy

The protection of employee personal data in the workplace, including monitoring limitations, consent requirements, and data minimization obligations.

Enclave

A network segment with specific security requirements that is separated from other segments through access controls and monitoring.

Encryption

The process of converting data into a coded format to prevent unauthorised access. Includes encryption at rest (stored data) and encryption in transit (data being transmitted).

Encryption Algorithm

A mathematical procedure used to encrypt and decrypt data, providing the computational basis for protecting information confidentiality.

Encryption Key

A string of bits used by a cryptographic algorithm to transform plaintext into ciphertext (encryption) or ciphertext back into plaintext (decryption).

Encryption Policy

A documented policy defining requirements for encrypting data at rest, in transit, and in use across the organization.

Encryption at Rest

The encryption of data while it is stored on disk, database, or other storage media to protect it from unauthorized access if the storage is compromised.

End-to-End Encryption

Encryption of data throughout its entire journey from sender to recipient, preventing any intermediary from accessing the content.

Endpoint Detection and Response

Security solutions that continuously monitor endpoint devices to detect, investigate, and respond to cyber threats using behavioral analysis and automated response.

Endpoint Management

The administration and security of all endpoint devices connecting to an organization's network, including configuration, patching, and monitoring.

Endpoint Protection

Security software and policies deployed on endpoint devices such as laptops, desktops, and mobile devices to protect against malware, exploits, and unauthorized access.

Endpoint Protection Platform

A comprehensive security solution deployed on endpoint devices (laptops, desktops, mobile devices) to prevent, detect, and respond to threats. EPP typically combines anti-malware, personal firewall, and intrusion prevention capabilities.

Energy Sector Compliance

Regulations specific to the energy industry including cybersecurity standards, environmental requirements, and grid reliability mandates.

Enforcement Action

Regulatory measures taken against organizations that violate compliance requirements, including fines, sanctions, cease-and-desist orders, and consent agreements.

Enrollment

The process of registering a user's identity credentials such as biometric data, certificates, or tokens in an authentication system.

Enterprise Architecture

A conceptual framework that defines the structure and operation of an organization's IT landscape in alignment with business strategy.

Enterprise Risk Management

A holistic approach to managing all types of organizational risk including strategic, operational, financial, and compliance risks in an integrated framework.

Enterprise Risk Management (ERM)

A holistic approach to identifying, assessing, and managing risks across an entire organisation. Frameworks include COSO ERM and ISO 31000.

Enterprise Security

The comprehensive approach to protecting all aspects of an organization's information assets across the entire enterprise.

Entitlement Management

The process of managing fine-grained access rights and permissions assigned to users, defining specifically what actions they can perform on which resources.

Environmental Compliance

Adherence to environmental laws and regulations governing pollution control, waste management, emissions, and natural resource protection.

Environmental Control

Systems that maintain optimal environmental conditions in facilities housing IT equipment, including temperature, humidity, and air quality management.

Environmental Monitoring

Continuous surveillance of environmental conditions such as temperature, humidity, water presence, and air quality in data centers and server rooms.

Environmental Social Governance

A framework evaluating an organization's practices related to environmental sustainability, social responsibility, and corporate governance standards.

Equipment Disposal

Secure processes for decommissioning and disposing of IT equipment to prevent data recovery and ensure compliance with environmental regulations.

Equipment Maintenance

Regular servicing and upkeep of IT equipment and security systems to ensure continued proper operation and security compliance.

Erasure Request

A formal request from a data subject asking an organization to delete their personal data, triggering an obligation to comply unless exemptions apply.

Escalation Procedure

A defined process for elevating issues, incidents, or decisions to higher levels of authority when they exceed current handling capability.

Escrow Agreement

A contractual arrangement where critical assets such as source code or encryption keys are held by a neutral third party for release under specified conditions.

Essential Eight

Eight mitigation strategies recommended by the Australian Signals Directorate to protect organisations against cyber threats. The Essential Eight covers application control, patching, macro settings, user application hardening, admin privileges, MFA, backups, and patching operating systems.

Essential Services

Critical business functions and operations that must be maintained during disruptions to ensure organizational survival and stakeholder obligations.

Ethernet Security

Security measures applied at the data link layer to protect wired network connections from unauthorized access and eavesdropping.

Ethical AI

The development and deployment of AI systems that adhere to ethical principles including fairness, transparency, privacy, and non-maleficence.

Ethical Disclosure

The practice of responsibly reporting discovered security vulnerabilities to affected vendors, giving them time to create patches before public disclosure.

Ethical Hacking

Authorized security testing performed by skilled professionals who use the same techniques as malicious hackers to identify vulnerabilities before they can be exploited.

Ethics Committee

A body within an organisation responsible for reviewing ethical issues, establishing ethical guidelines, and ensuring that business practices align with the organisation's values and ethical standards.

Event Analysis

The examination of security events to determine their significance, potential impact, and whether they constitute incidents requiring response.

Event Logging

The systematic recording of security-relevant events and activities across systems and applications for monitoring, analysis, and compliance purposes.

Event Probability

The likelihood that a specific risk event will occur within a defined time period, typically expressed as a percentage or qualitative rating.

Evidence Collection

The process of gathering documentation, records, screenshots, logs, and other artefacts that demonstrate the design and operating effectiveness of controls. Evidence collection is fundamental to compliance audits and attestation engagements.

Evidence Management

The systematic collection, organization, storage, and retrieval of audit evidence to support compliance demonstrations and audits.

Evidence Preservation

The process of securing and maintaining the integrity of digital evidence during and after a security incident for potential legal proceedings.

Evidence Repository

A centralized storage system for organizing and maintaining compliance evidence, audit artifacts, and supporting documentation.

Exception Management

The formal process of documenting, approving, and tracking instances where an organisation cannot comply with a specific policy or control requirement. Exceptions require documented business justification, compensating controls, and periodic review.

Executive Risk Report

A summary report prepared for senior leadership that communicates key risks, their status, and the effectiveness of risk management activities.

Executive Sponsorship

Active support and advocacy from a senior executive for a program, project, or initiative, providing visibility, resources, and organizational authority.

Exercise Program

A scheduled series of drills, tabletop exercises, and simulations designed to test and improve emergency response and business continuity plans.

Exfiltration Prevention

Controls and technologies designed to prevent the unauthorized extraction of data from an organization's network, including DLP and egress filtering.

Explainability

The degree to which the internal mechanics of an AI or machine learning system can be explained in human terms. Explainability is a key requirement of the EU AI Act for high-risk AI systems.

Explainable AI

AI systems and techniques designed to produce explanations of their decision-making processes that are understandable to humans, supporting trust and compliance.

Exploit

A piece of software, data, or sequence of commands that takes advantage of a vulnerability in a computer system, application, or network to cause unintended behaviour such as unauthorised access or code execution.

Exploit Chain

A sequence of multiple exploits used together to achieve a goal that no single exploit could accomplish alone, such as gaining root access.

Exploit Development

The process of creating code or techniques that leverage security vulnerabilities, conducted by security researchers to understand and mitigate threats.

Exploit Kit

A toolkit used by attackers to automatically exploit vulnerabilities in client-side software. Exploit kits are typically hosted on compromised websites and target browser and plugin vulnerabilities.

Export Control

Regulations governing the export of sensitive goods, software, and technology to foreign countries, requiring licenses and compliance with embargo restrictions.

Exposure Assessment

An evaluation of an organization's vulnerable attack surface including internet-facing assets, misconfigurations, and unpatched systems that could be exploited.

Extended Detection and Response

An integrated security platform that correlates data across multiple security layers including endpoints, network, cloud, and email for comprehensive threat detection.

Extended Detection and Response (XDR)

A unified security incident detection and response platform that automatically collects and correlates data from multiple security layers including email, endpoint, server, cloud workloads, and network.

Extended Reality Security

Security measures for protecting virtual reality, augmented reality, and mixed reality systems and the data they collect and process.

External Audit

An independent examination of an organisation's controls, processes, or financial statements conducted by a party outside the organisation. External audits provide objective assurance to stakeholders and regulators.

External Auditor

An independent professional or firm engaged to examine an organisation's financial statements, controls, or compliance with standards. External auditors provide objective assurance to stakeholders, regulators, and the public.

External Penetration Testing

Authorized security testing conducted from outside the organization's network perimeter to identify vulnerabilities accessible from the internet.

Extraterritorial Application

The application of privacy laws beyond a country's borders to foreign organizations that process the personal data of that country's residents.

eDiscovery

The process of identifying, collecting, and producing electronically stored information for use in legal proceedings or regulatory investigations. eDiscovery requires organisations to preserve and produce relevant electronic data.

ePrivacy Directive

EU Directive 2002/58/EC that regulates the processing of personal data and protection of privacy in the electronic communications sector. The ePrivacy Directive covers cookies, electronic marketing, and confidentiality of communications.

ePrivacy Regulation

A proposed EU regulation that will replace the ePrivacy Directive, governing electronic communications privacy including cookies, direct marketing, and metadata processing.

F60 terms

FAIR (Factor Analysis of Information Risk)

A quantitative risk analysis model that provides a framework for understanding, measuring, and analysing information risk in financial terms. FAIR decomposes risk into measurable factors: loss event frequency and loss magnitude.

FDA 21 CFR Part 11

US FDA regulations establishing criteria for accepting electronic records and electronic signatures as equivalent to paper records and handwritten signatures.

FERPA

The Family Educational Rights and Privacy Act protects the privacy of student education records and gives parents and eligible students control over their information.

FFIEC

The Federal Financial Institutions Examination Council that prescribes uniform principles, standards, and report forms for the federal examination of financial institutions. FFIEC guidance covers cybersecurity, IT, and operational risk.

FIPS

Federal Information Processing Standards, US government standards for computer systems used by non-military federal agencies and government contractors.

FISMA

The Federal Information Security Modernization Act requires federal agencies to implement comprehensive security programs for their information systems.

Facility Security

Comprehensive physical security measures for organizational facilities including access controls, surveillance, environmental protection, and visitor management.

Fail Open

A system behavior where access is permitted when a security control fails, prioritizing availability over security in specific use cases.

Fail Secure

A design principle where a system defaults to a secure state when a failure occurs, maintaining protection even during malfunction.

Failback

The process of restoring operations from a backup or disaster recovery site back to the original primary site after a disruption is resolved.

Failover

The automatic switching to a redundant or standby system, server, or network when the primary system fails. Failover ensures continuity of operations and is a critical component of high-availability architectures.

Failure Mode and Effects Analysis

A systematic methodology for evaluating processes to identify potential failure modes, their causes, effects, and priority for corrective action.

Fair Credit Reporting Act

US federal law (FCRA) that regulates the collection, dissemination, and use of consumer credit information to protect privacy and ensure accuracy.

Fair Information Practices

A set of internationally recognized principles for protecting personal information privacy, forming the foundation of most modern data protection laws.

False Negative

A security detection failure where a genuine threat is not identified, allowing malicious activity to proceed undetected.

False Positive

An alert or detection that incorrectly indicates malicious activity when the activity is actually legitimate. High false positive rates reduce the effectiveness of security monitoring by causing alert fatigue.

Fault Tolerance

The ability of a system to continue operating properly in the event of the failure of some of its components.

FedRAMP

The Federal Risk and Authorization Management Program, a US government programme that standardises security assessment and authorisation for cloud services used by federal agencies.

FedRAMP Authorization

The formal process through which a cloud service provider obtains approval to offer its services to US federal agencies. FedRAMP authorization requires implementing NIST SP 800-53 controls and assessment by a Third Party Assessment Organization.

Federal Compliance

Adherence to regulations and standards mandated by federal government agencies for organizations operating within their jurisdiction.

Federal Information Security Modernization Act (FISMA)

US legislation that requires federal agencies to develop, document, and implement information security programmes. FISMA mandates the use of NIST standards and the NIST Risk Management Framework.

Federated Identity Management

A system enabling users to access multiple applications across different organizations using the same credentials through trust relationships.

Federated Learning

A machine learning approach where a model is trained across multiple decentralised devices or servers holding local data samples, without exchanging the raw data. Federated learning helps preserve data privacy while enabling collaborative model training.

Fiduciary Duty

The legal obligation to act in the best interest of another party, applicable to board members and officers regarding organizational governance.

Field-Level Encryption

Encryption applied to individual data fields within a database or application, allowing granular control over which specific data elements are protected.

File Integrity Monitoring

A security control that detects changes to critical system files, configurations, and content by comparing current states against known good baselines.

File Integrity Monitoring (FIM)

A security control that validates the integrity of operating system and application files by comparing their current state against a known good baseline. FIM is required by PCI DSS and recommended by most security frameworks.

File Transfer Protocol Security

Security measures for protecting file transfers including encryption, authentication, and integrity verification when using FTP and its secure variants.

Financial Action Task Force (FATF)

An intergovernmental organisation that sets international standards for combating money laundering, terrorist financing, and other threats to the integrity of the international financial system.

Financial Audit

An examination of an organization's financial statements and records to verify accuracy and compliance with accounting standards.

Financial Compliance

Adherence to laws and regulations governing financial reporting, transactions, and operations within the financial services industry.

Financial Conduct Authority

The UK regulatory body responsible for overseeing financial markets and firms, ensuring consumer protection, market integrity, and competition.

Financial Risk

The possibility of monetary loss arising from financial transactions, market conditions, credit defaults, or other financial factors.

Financial Services Compliance

The comprehensive set of regulations governing financial institutions including banking, insurance, securities, and payment processing.

Finding

A conclusion drawn from audit evidence that identifies a condition, criteria, cause, and effect. Audit findings range from major nonconformities to minor observations and recommendations for improvement.

Finding Classification

The categorization of audit findings by severity such as critical, major, minor, or observation to prioritize remediation efforts.

Fire Suppression

Systems designed to detect and extinguish fires in facilities, particularly data centers, using methods that minimize damage to equipment and data.

Firewall

A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls establish a barrier between trusted internal networks and untrusted external networks.

Firmware Security

Practices and technologies for ensuring the integrity and security of firmware code that controls hardware device behavior and boot processes.

Flow Analysis

The examination of network flow data including source, destination, volume, and timing to identify anomalous patterns and potential security threats.

Follow-Up Audit

An audit conducted to verify that corrective actions from previous audit findings have been effectively implemented and sustained.

Forensic Analysis

The detailed technical examination of digital evidence to determine the cause, scope, and impact of a security incident.

Forensic Image

A bit-for-bit copy of a storage device or partition created for digital forensic analysis while preserving the integrity of the original evidence.

Forensic Readiness

The ability of an organization to efficiently collect, preserve, and analyze digital evidence when needed for incident investigation or legal proceedings.

Forensic Toolkit

A collection of hardware and software tools used by digital forensic investigators to collect, preserve, and analyze digital evidence.

Format-Preserving Encryption

An encryption technique that produces ciphertext in the same format as the plaintext, useful for encrypting data while maintaining legacy system compatibility.

Forward Secrecy

A property of cryptographic protocols ensuring that session keys cannot be compromised even if the server's private key is later compromised.

Foundation Model

A large-scale AI model trained on broad data that can be adapted to a wide range of downstream tasks. Foundation models (such as large language models) are subject to specific transparency requirements under the EU AI Act.

Fourth-Party Risk

Risks arising from the subcontractors and service providers used by an organization's direct third-party vendors and partners.

Framework

A structured set of guidelines, practices, and controls that organisations use to manage specific aspects of their operations. Compliance frameworks provide requirements for achieving and demonstrating compliance.

Framework Alignment

The process of mapping an organization's existing controls and practices to the requirements of a compliance framework to identify gaps and overlaps.

Framework Comparison

The analysis of similarities and differences between compliance frameworks to identify overlapping requirements and optimize multi-framework compliance.

Framework Mapping

The process of creating correspondences between controls in different compliance frameworks to streamline multi-standard compliance efforts.

Franchise Rule

Federal regulations requiring franchisors to provide prospective franchisees with specific pre-sale disclosures about the franchise system and its performance.

Fraud Detection

Technologies and processes for identifying fraudulent activities and transactions through pattern analysis, anomaly detection, and rule-based monitoring.

Fraud Prevention

Controls and measures designed to deter and prevent fraudulent activities including financial fraud, identity fraud, and internal fraud.

Full Disk Encryption

A security measure that encrypts all data on a storage device, including the operating system, so that data is inaccessible without proper authentication.

Full Recovery

The complete restoration of all affected systems, data, and operations to their normal state following a disruption or disaster.

Fuzz Testing

A software testing technique that provides invalid, unexpected, or random data as input to programs to discover security vulnerabilities and coding errors.

Fuzzing

An automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. Fuzzing aims to discover coding errors and security vulnerabilities.

G42 terms

GDPR

The General Data Protection Regulation is a comprehensive EU law governing the collection, processing, and protection of personal data of individuals within the European Union.

GDPR (General Data Protection Regulation)

The EU's comprehensive data protection regulation (effective May 2018). Applies to any organisation processing personal data of EU residents, regardless of the organisation's location.

GLBA

The Gramm-Leach-Bliley Act requires financial institutions to explain their data sharing practices and protect sensitive consumer financial information.

GLBA (Gramm-Leach-Bliley Act)

US federal law that requires financial institutions to explain their information-sharing practices and safeguard sensitive customer data. GLBA includes the Safeguards Rule, which requires comprehensive information security programmes.

GRC

Governance, Risk, and Compliance, an integrated approach to aligning IT with business objectives, managing risk, and meeting compliance requirements.

GRC (Governance, Risk, and Compliance)

An integrated approach to managing an organisation's governance, enterprise risk management, and regulatory compliance. GRC platforms provide unified visibility across these three disciplines.

GRC Platform

An integrated technology solution that supports governance, risk management, and compliance activities in a unified platform.

GRC Strategy

A comprehensive approach to managing the interrelationship between governance, risk management, and compliance across an organization.

Gap Analysis

A comparison between an organisation's current state and the requirements of a target framework or standard. Identifies areas that need improvement to achieve compliance.

Gap Assessment

An evaluation that compares an organization's current state against the requirements of a standard or regulation to identify areas of non-compliance.

Gap Remediation

The process of implementing corrective actions to address identified deficiencies between current security practices and required standards or controls.

Gap Remediation Plan

A documented plan with specific actions, timelines, and responsibilities for addressing gaps identified during compliance assessments.

Gateway

A network point that serves as an entrance to another network, often implementing security controls such as firewalls and proxy services.

Gateway Security

Security controls deployed at network entry and exit points to inspect traffic, enforce policies, and prevent threats from entering or data from leaving.

General Data Protection Regulation (GDPR)

The EU's comprehensive data protection regulation (EU 2016/679) that harmonises data privacy laws across all member states. GDPR applies to any organisation processing personal data of EU residents, with penalties up to 4% of global annual turnover.

Generative AI

Artificial intelligence systems capable of generating text, images, code, audio, and other content. Generative AI raises unique governance challenges around intellectual property, misinformation, bias, and data privacy.

Generative AI Governance

Policies and controls for managing the risks of generative AI systems including accuracy, bias, intellectual property, data privacy, and misuse.

Genetic Data

Personal data relating to the inherited or acquired genetic characteristics of a natural person, which gives unique information about the physiology or health of that person. Classified as special category data under GDPR.

Geofencing

A location-based security control that creates virtual boundaries to trigger actions such as access restrictions or alerts when devices enter or leave defined geographic areas.

Geographic Access Control

Security policies that restrict access to systems or data based on the physical location of the user or device making the request.

Geolocation Data

Data indicating the real-world geographic location of a device or individual, classified as personal data under most privacy regulations.

Global Privacy Control

A browser-level signal that communicates a user's privacy preferences to websites, automating opt-out requests under applicable privacy laws.

Golden Image

A pre-configured, security-hardened template for operating systems or applications used to deploy standardized and consistent system configurations.

Good Manufacturing Practice

Regulations ensuring that products are consistently produced and controlled according to quality standards, particularly in pharmaceutical and food industries.

Governance

The system by which an organisation is directed and controlled. IT governance ensures that IT investments support business objectives and manage risks appropriately.

Governance Audit

An examination of an organization's governance structures, processes, and effectiveness to ensure proper oversight and accountability.

Governance Automation

The use of technology to automate governance activities including policy management, compliance monitoring, and reporting.

Governance Board

A formal body responsible for strategic direction, oversight, and decision-making regarding information security, risk, and compliance programs.

Governance Committee

A formal body responsible for setting direction, making decisions, and providing oversight for specific governance areas.

Governance Dashboard

A visual display providing real-time status of governance metrics, compliance posture, and risk indicators for leadership oversight.

Governance Framework

A structured set of policies, processes, and practices that define how an organisation is directed, managed, and held accountable. Governance frameworks provide the foundation for decision-making, risk management, and performance monitoring.

Governance Maturity

The level of sophistication and effectiveness of an organization's governance practices, measured against defined capability levels.

Governance Model

The organizational structure and processes that define how authority is distributed, decisions are made, and accountability is maintained.

Governance Reporting

The process of communicating governance performance, compliance status, and risk information to board members and senior management.

Governance Risk and Compliance

An integrated approach to managing organizational governance, enterprise risk management, and regulatory compliance to ensure alignment with business objectives.

Governance Structure

The organizational hierarchy and arrangement of roles, committees, and reporting lines that enable effective governance and oversight.

Government Compliance

Regulatory requirements specific to government agencies and contractors including security clearances, procurement rules, and transparency mandates.

Gray Box Testing

A security testing approach where the tester has partial knowledge of the target system, such as user credentials or basic architecture information.

Green IT Compliance

Adherence to environmental regulations and sustainability standards related to IT operations including energy efficiency and electronic waste.

Gross Risk

The total level of risk before any controls, mitigation measures, or risk treatment actions are applied, also known as inherent risk.

Group Policy

A Windows feature for centrally managing and configuring operating systems, applications, and user settings across an Active Directory environment.

Guard Service

Professional security personnel deployed to protect facilities, control access, monitor surveillance systems, and respond to security incidents.

H38 terms

HIPAA

The Health Insurance Portability and Accountability Act, a US federal law that establishes standards for protecting sensitive health information. Includes the Privacy Rule and Security Rule.

HIPAA Breach Notification Rule

Requirements under HIPAA for covered entities and business associates to notify affected individuals, HHS, and media of breaches of unsecured PHI.

HIPAA Privacy Rule

HIPAA regulations that establish standards for the protection of individually identifiable health information held by covered entities and business associates.

HIPAA Security Rule

HIPAA regulations requiring covered entities to implement administrative, physical, and technical safeguards to protect electronic protected health information.

HTTP Strict Transport Security

A web security policy mechanism that forces browsers to interact with websites only over HTTPS connections, preventing protocol downgrade attacks.

HTTPS (Hypertext Transfer Protocol Secure)

The secure version of HTTP that uses TLS/SSL to encrypt communication between a web browser and a web server. HTTPS protects the confidentiality and integrity of data exchanged between the user and the site.

Hardening

The process of securing a system by reducing its attack surface through removing unnecessary software, disabling unused services, applying patches, and configuring security settings according to established baselines such as CIS Benchmarks.

Hardening Guide

A detailed document providing step-by-step instructions for configuring a specific system or application to meet security requirements.

Hardware Attestation

A security mechanism where hardware provides cryptographic proof of its identity, configuration, and integrity to verify system trustworthiness.

Hardware Security Module

A dedicated cryptographic processor that provides secure generation, storage, and management of digital keys and performs encryption operations in a tamper-resistant device.

Hardware Security Module (HSM)

A dedicated physical computing device that safeguards and manages cryptographic keys, performs encryption and decryption, and provides authentication services. HSMs are tamper-resistant and used in high-security environments.

Hash Collision

A situation where two different inputs produce the same hash output, which can be exploited in cryptographic attacks if the hash function is weak.

Hash Function

A mathematical algorithm that maps data of arbitrary size to a fixed-size output, used for data integrity verification and password storage.

Hash Value

A fixed-size string produced by a hash function from input data of any size. Hash values are used for data integrity verification, password storage, digital signatures, and blockchain technology.

Health Check

A periodic assessment of the health and security posture of systems, applications, or programs to identify issues before they become critical.

Health Data

Personal data related to the physical or mental health of a natural person, including the provision of health care services. Health data is treated as special category data under GDPR and regulated by HIPAA in the United States.

Health Information Exchange

The electronic sharing of health-related information between healthcare organizations, requiring strict privacy and security controls.

Healthcare Compliance

Adherence to laws and regulations specific to the healthcare industry, including patient privacy, billing practices, and clinical standards.

Healthcare IT Security

Security measures specific to healthcare information technology systems, protecting electronic health records and medical devices from cyber threats.

Heat Map

A visual representation of risks plotted on a matrix by likelihood and impact, using colors to indicate severity levels for prioritization.

Help Desk Security

Security protocols for help desk operations including identity verification procedures and protection against social engineering attacks.

High Availability

System design and implementation that ensures a predetermined level of operational performance and uptime, typically 99.9% or higher.

High-Risk AI System

Under the EU AI Act, an AI system that poses significant risks to health, safety, or fundamental rights. High-risk AI systems are subject to mandatory requirements including risk management, data governance, transparency, human oversight, and accuracy.

High-Risk Processing

Data processing activities that pose a significant risk to the rights and freedoms of individuals, requiring enhanced safeguards and impact assessments.

Homomorphic Encryption

A form of encryption that permits computations on encrypted data without first decrypting it. Homomorphic encryption enables data to be processed in its encrypted form, preserving privacy while allowing analysis.

Honeypot

A security mechanism set to detect, deflect, or counteract attempts at unauthorised use of information systems. Honeypots are decoy systems designed to lure attackers and study their methods.

Horizontal Privilege Escalation

An attack where a user gains access to resources belonging to another user with the same privilege level.

Hospitality Compliance

Regulations governing the hospitality industry including guest data protection, payment card security, food safety, and accessibility requirements.

Host Firewall

A software-based firewall running on individual endpoints that controls network traffic to and from that specific device based on security rules.

Host-Based Intrusion Detection

A security system installed on individual hosts that monitors system calls, file modifications, and logs to detect suspicious activity on that specific device.

Hot Fix

An urgent software update released outside the normal patch cycle to address a critical vulnerability or severe bug that needs immediate remediation.

Hot Site

A fully equipped backup facility with hardware, software, and data replication already in place, ready to assume operations within minutes to hours of a disaster. Hot sites are the most expensive but fastest disaster recovery option.

Household Data

Information that relates to a household rather than a specific individual, with varying classification under different privacy laws.

Human Factor

The element of cybersecurity risk related to human behavior, decision-making, and susceptibility to social engineering attacks.

Human-in-the-Loop

An AI system design pattern where human oversight is integrated into the decision-making process. Human-in-the-loop ensures that critical decisions receive human review and is required for high-risk AI systems under the EU AI Act.

Hybrid Cloud Security

Security strategies and controls designed to protect environments that combine on-premises infrastructure with public and private cloud services.

Hybrid Encryption

A cryptographic approach that combines the efficiency of symmetric encryption with the key management advantages of asymmetric encryption.

Hypervisor Security

Measures to protect the software layer that creates and manages virtual machines from attacks that could compromise all hosted virtual environments.

I160 terms

ICT Risk Management

The process of identifying, assessing, and managing risks associated with information and communication technology. ICT risk management is central to DORA, CPS 234, and other technology-focused regulations.

IEC 27001

The International Electrotechnical Commission's numbering for ISO 27001, the international standard for information security management systems.

IEC 62443

An international series of standards for industrial automation and control system cybersecurity, covering operator, integrator, and component manufacturer requirements.

IP Reputation

A scoring system that evaluates IP addresses based on their historical behavior to identify sources of spam, malware, or other malicious activity.

IP Spoofing

The creation of Internet Protocol packets with a forged source IP address to impersonate another computing system. IP spoofing is used in denial-of-service attacks and to bypass IP-based authentication.

IP Whitelisting

A security practice that restricts network or application access to only specified trusted IP addresses, blocking all other connection attempts.

IPsec

A suite of protocols that authenticates and encrypts IP packets to secure communications over IP networks, commonly used in VPN implementations.

ISACA

A global professional association that provides knowledge, credentials, training, and community for information systems audit, assurance, security, governance, risk, and privacy professionals. ISACA administers CISA, CISM, CRISC, and CGEIT certifications.

ISC2

The International Information System Security Certification Consortium, a non-profit organization that provides cybersecurity certifications including CISSP.

ISM (Information Security Manual)

The Australian Government's cybersecurity framework produced by the Australian Signals Directorate. The ISM provides cybersecurity guidance for all levels of government and is based on risk management principles.

ISMS (Information Security Management System)

A systematic approach to managing sensitive information so that it remains secure. ISO 27001 specifies the requirements for establishing, implementing, maintaining, and continually improving an ISMS.

ISO 14001

The international standard for Environmental Management Systems (EMS) that specifies requirements for establishing, implementing, maintaining, and improving environmental performance. ISO 14001 shares the Annex SL structure with ISO 27001 and ISO 9001.

ISO 19011

The international standard that provides guidance on managing audit programmes, conducting internal or external audits, and evaluating the competence of auditors. ISO 19011 applies to all management system audits.

ISO 20000

The international standard for IT service management systems, specifying requirements for establishing, implementing, and improving IT service delivery.

ISO 22000

The international standard for food safety management systems, specifying requirements for organizations in the food chain to ensure food safety.

ISO 22301

The international standard for Business Continuity Management Systems (BCMS) that specifies requirements for planning, establishing, implementing, operating, monitoring, reviewing, maintaining, and continually improving a BCMS.

ISO 27001

The international standard for information security management systems (ISMS). The 2022 revision (ISO/IEC 27001:2022) includes 93 controls in Annex A, restructured into four themes.

ISO 27001 Certification

Formal certification that an organization's information security management system meets all requirements of the ISO 27001 standard.

ISO 27001 Lead Auditor

A professional qualified to lead ISO 27001 audits, assessing information security management systems against the standard's requirements.

ISO 27001 Lead Implementer

A professional qualified to lead the implementation and management of an ISO 27001 information security management system.

ISO 27002

The companion standard to ISO 27001 that provides implementation guidance for the Annex A controls. Not a certifiable standard itself. It supports ISO 27001 implementation.

ISO 27005

The international standard providing guidelines for information security risk management, supporting the requirements of ISO 27001.

ISO 27017

An international standard that provides guidelines for information security controls applicable to the provision and use of cloud services. ISO 27017 extends ISO 27002 with cloud-specific guidance.

ISO 27018

An international standard that establishes objectives, controls, and guidelines for implementing measures to protect Personally Identifiable Information (PII) in public cloud computing environments.

ISO 27019

An international standard providing guidance on information security controls for the energy utility industry's process control systems.

ISO 27032

An international standard providing guidance for improving cybersecurity, addressing the security of cyberspace and its relationship to other security domains.

ISO 27035

An international standard providing principles for incident management in information security, covering planning, detection, assessment, and response.

ISO 27701

An extension to ISO 27001 and ISO 27002 for privacy information management. ISO 27701 specifies requirements for establishing, implementing, maintaining, and continually improving a Privacy Information Management System (PIMS).

ISO 27799

An international standard providing guidance on information security management in health informatics for organizations handling personal health information.

ISO 31000

The international standard for risk management that provides principles, a framework, and a process for managing risk. ISO 31000 applies to any type of risk, regardless of its nature, and is applicable to any organisation.

ISO 37001

The international standard for anti-bribery management systems, specifying requirements for preventing, detecting, and addressing bribery.

ISO 42001

The international standard for Artificial Intelligence Management Systems (AIMS) that specifies requirements for establishing, implementing, maintaining, and continually improving an AI management system.

ISO 45001

The international standard for occupational health and safety management systems, providing a framework for managing workplace safety risks.

ISOIEC 27001

The joint ISO and IEC international standard specifying requirements for establishing, implementing, maintaining, and improving an information security management system.

IT Audit

An examination of an organization's information technology infrastructure, policies, and operations to determine whether controls adequately protect assets.

IT Contingency Plan

A documented plan for maintaining or restoring IT operations when systems are disrupted, covering both preventive and recovery measures.

IT Governance

The framework of policies, processes, and organizational structures that ensure IT investments support business objectives and manage technology risks.

IT Portfolio Management

The management of an organization's IT investments, projects, and assets as a portfolio to optimize value, manage risk, and align with strategy.

IT Service Continuity

The capability to restore IT services within agreed timeframes after a disruption, forming a critical component of overall business continuity.

IT Service Management

A set of policies, processes, and procedures for managing the delivery and support of IT services to meet organizational and customer requirements.

IT Service Management (ITSM)

The activities directed by policies, organised and structured in processes and supporting procedures, that are performed by an organisation to plan, deliver, operate, and control IT services offered to customers.

ITAR

International Traffic in Arms Regulations controlling the export and temporary import of defense articles and services on the US Munitions List.

ITAR (International Traffic in Arms Regulations)

US regulations that control the export and import of defence-related articles and services. ITAR requires that information related to defence and military technologies is protected from foreign access.

ITIL

The Information Technology Infrastructure Library, a set of practices for IT service management (ITSM). ITIL 4 aligns with modern ways of working including Agile, DevOps, and Lean.

ITIL (Information Technology Infrastructure Library)

A set of detailed practices for IT service management that focuses on aligning IT services with the needs of the business. ITIL 4 organises guidance around the Service Value System and 34 management practices.

IaaS Security

Security controls and practices specific to Infrastructure as a Service cloud environments where the customer manages the operating system and above.

Identity Analytics

The use of data analysis and machine learning to detect anomalous identity-related activities and optimize access management decisions.

Identity Federation

A system of trust between identity providers and service providers that allows users to authenticate once and access multiple systems across different organisations. Federation protocols include SAML, OAuth, and OpenID Connect.

Identity Governance

The policies and processes that manage and control user identities, access rights, and entitlements across the organisation. Identity governance includes access certifications, segregation of duties enforcement, and role management.

Identity Lifecycle Management

The end-to-end management of user identities from creation through modification and eventual deprovisioning when no longer needed.

Identity Proofing

The process of verifying that a person is who they claim to be before issuing credentials, using documents, biometrics, or knowledge-based verification.

Identity Provider

A service that creates, maintains, and manages identity information and provides authentication services to applications in a federated or SSO environment.

Identity Resolution

The process of connecting disparate data points to a single individual across different data sources and devices, raising privacy implications.

Identity Threat Detection

Security capabilities focused on detecting threats targeting identity infrastructure including credential theft, privilege escalation, and lateral movement.

Identity Verification

The process of confirming that an individual's claimed identity matches their actual identity through document checks, biometric comparison, or other methods.

Identity and Access Management

A framework of policies, processes, and technologies for managing digital identities and controlling user access to organizational resources.

Identity and Access Management (IAM)

A framework of policies, processes, and technologies for managing digital identities and controlling user access to critical information within an organisation. IAM ensures the right individuals have appropriate access at the right times.

Identity as a Service

Cloud-based identity management that provides authentication, authorization, single sign-on, and directory services delivered as a managed service.

Identity as a Service (IDaaS)

A cloud-based authentication infrastructure that provides identity and access management capabilities as a service. IDaaS solutions include single sign-on, multi-factor authentication, directory services, and access governance.

Image Analysis

The forensic examination of disk images, memory dumps, or file system snapshots to identify evidence of security incidents or policy violations.

Immutable Infrastructure

An infrastructure approach where servers are never modified after deployment, instead being replaced with new instances built from updated templates.

Impact Analysis

The assessment of the potential consequences of a risk event, security incident, or system change on business operations, finances, and reputation.

Impact Assessment

An analysis of the potential consequences of a specific event, threat, or vulnerability being realised. Impact assessments consider financial, operational, reputational, legal, and regulatory consequences.

Impact Score

A numerical rating assigned to a vulnerability or risk based on the potential severity of consequences if it is exploited or occurs.

Impersonation

A social engineering technique where an attacker pretends to be a trusted individual or authority figure to manipulate victims into revealing information.

Implied Consent

Consent inferred from an individual's actions or inaction rather than explicit agreement, with limited applicability under strict privacy regulations.

Incident Category

A classification system for organizing security incidents by type such as malware, phishing, data breach, or denial of service.

Incident Classification

The process of categorizing security incidents by type, severity, and impact to ensure appropriate response procedures and resource allocation.

Incident Command System

A standardized management structure for coordinating emergency response, defining clear roles, communication channels, and resource management procedures.

Incident Commander

The individual with overall authority and responsibility for managing the response to a specific security incident.

Incident Communication

The structured process of informing stakeholders, regulators, affected parties, and the public about security incidents according to defined protocols.

Incident Containment

Actions taken to limit the scope and impact of a security incident, such as isolating affected systems, blocking malicious traffic, or disabling compromised accounts.

Incident Documentation

The recording of all aspects of a security incident including timeline, actions taken, evidence collected, and lessons learned.

Incident Eradication

The phase of incident response focused on removing the root cause of a security incident and eliminating all traces of the threat from affected systems.

Incident Escalation

The process of elevating a security incident to higher levels of management or specialized response teams based on severity and impact.

Incident Handler

A trained professional responsible for detecting, analyzing, and responding to security incidents as part of the incident response team.

Incident Likelihood

The probability that a specific security incident will occur, based on threat intelligence, vulnerability data, and historical incident patterns.

Incident Log

A chronological record of all events, actions, and decisions related to a security incident from detection through resolution.

Incident Management

The process for detecting, reporting, assessing, responding to, and learning from incidents in a systematic and coordinated manner.

Incident Management Process

The defined workflow for handling security incidents from detection through containment, eradication, recovery, and post-incident review.

Incident Metrics

Quantitative measures used to track and evaluate the frequency, severity, response time, and cost of security incidents.

Incident Playbook

A documented set of step-by-step procedures for responding to specific types of security incidents, guiding responders through standardized actions.

Incident Post-Mortem

A structured review conducted after a security incident to analyze what happened, identify root causes, and develop improvements to prevent recurrence.

Incident Recovery

The phase of incident response where affected systems are restored to normal operations and verified to be free of threats.

Incident Register

A centralized log of all security incidents including their type, severity, response actions, and resolution status.

Incident Reporting

The formal documentation and communication of security incidents to management, regulators, and other stakeholders as required by policy and regulation.

Incident Response

The organised approach to addressing and managing a security breach or cyberattack. Includes preparation, identification, containment, eradication, recovery, and lessons learned.

Incident Response Automation

The use of technology to automate steps in the incident response process, such as containment actions, evidence collection, and notifications.

Incident Response Framework

A structured approach providing guidance for preparing for, detecting, containing, and recovering from cybersecurity incidents.

Incident Response Lifecycle

The complete process of handling a security incident from preparation and detection through containment, eradication, recovery, and lessons learned.

Incident Response Plan

A documented set of instructions that outlines an organisation's procedures for detecting, responding to, and recovering from security incidents. Required by frameworks including ISO 27001, NIST CSF, PCI DSS, and HIPAA.

Incident Response Retainer

A pre-arranged agreement with a cybersecurity firm to provide incident response services on-demand when a security breach occurs.

Incident Response Team

A cross-functional group of trained professionals responsible for managing the organization's response to cybersecurity incidents.

Incident Review Board

A governance body that reviews significant security incidents to evaluate response effectiveness and approve recommendations for improvement.

Incident Severity Level

A classification system that rates security incidents based on their impact and urgency to determine appropriate response priority and resources.

Incident Timeline

A chronological reconstruction of events before, during, and after a security incident used for analysis and reporting.

Incident Triage

The initial assessment and prioritization of security incidents based on severity, impact, and urgency to determine appropriate response actions.

Indicator of Attack

Observable patterns of behavior or events that suggest an active attack is underway, used by security teams to detect threats in real time.

Indicator of Compromise

Forensic artifacts such as file hashes, IP addresses, domain names, or registry keys that indicate a system has been breached or infected.

Indicator of Compromise (IoC)

Forensic evidence that suggests a security breach has occurred or is in progress. IoCs include unusual network traffic patterns, unexpected file changes, suspicious login attempts, and known malicious IP addresses or file hashes.

Individual Rights

The set of rights granted to data subjects under privacy regulations, enabling them to exercise control over their personal data. Under GDPR, these include rights of access, rectification, erasure, restriction, portability, and objection.

Industrial Control System Security

Security measures for protecting SCADA, DCS, and PLC systems that manage critical infrastructure and industrial processes from cyber threats.

Industrial Espionage

The unauthorized acquisition of trade secrets, proprietary information, or intellectual property for commercial advantage.

Industry Self-Regulation

Voluntary standards, codes of conduct, and best practices adopted by industry participants to regulate their own behavior without government mandate.

Information Asset

Any data, system, or resource that has value to the organization and requires protection based on its classification level.

Information Asset Register

A catalog of an organization's information assets including their classification, ownership, location, and protection requirements.

Information Assurance

Practices for managing risks related to the use, processing, storage, and transmission of information to ensure its confidentiality, integrity, and availability.

Information Classification

A governance process that categorizes information assets based on their sensitivity and criticality to determine appropriate protection measures.

Information Classification Policy

A policy defining how information assets should be categorized based on sensitivity and the handling requirements for each classification level.

Information Commissioner

The head of a data protection authority responsible for enforcing data protection laws within a jurisdiction. In the UK, the Information Commissioner leads the Information Commissioner's Office (ICO).

Information Commissioner's Office (ICO)

The UK's independent body established to uphold information rights, including enforcement of the UK GDPR and Data Protection Act 2018. The ICO has the power to impose fines of up to 17.5 million pounds or 4% of annual global turnover.

Information Exchange

The sharing of information between organizations, departments, or systems, requiring security controls to protect data during transfer.

Information Governance

The set of multi-disciplinary structures, policies, procedures, processes, and controls implemented to manage information at an enterprise level. Information governance ensures that data is managed as a valuable organisational asset.

Information Handling

The procedures for creating, processing, storing, transmitting, and disposing of information according to its classification and sensitivity.

Information Lifecycle

The stages through which information passes from creation and collection through use, storage, archival, and eventual destruction.

Information Privacy

The right of individuals to control how their personal information is collected, used, and shared by organizations and governments.

Information Rights Management

Technology that protects sensitive documents by controlling who can access, edit, print, or forward them regardless of where the documents are stored.

Information Risk Management

The process of identifying, assessing, and treating risks to an organization's information assets to protect their confidentiality, integrity, and availability.

Information Security

The practice of protecting information by mitigating risks to its confidentiality, integrity, and availability. Governed by frameworks such as ISO 27001 and NIST CSF.

Information Security Management System

A systematic approach to managing sensitive company information through policies, procedures, and controls to ensure confidentiality, integrity, and availability.

Information Security Management System (ISMS)

A systematic approach to managing sensitive information so that it remains secure, encompassing people, processes, and technology. An ISMS is central to ISO 27001 certification and includes risk assessment, security controls, and continuous improvement.

Information Security Policy

A formal document that defines an organisation's approach to managing and protecting its information assets. The policy sets the strategic direction for information security and is typically approved by top management.

Information Sharing

The exchange of cybersecurity threat intelligence, vulnerability data, and incident information between organizations to improve collective defense capabilities.

Information System

An integrated set of components for collecting, storing, processing, and communicating information that requires security protection.

Information Systems Audit

An examination of an organization's information systems, technology infrastructure, and IT controls to evaluate security, reliability, and compliance.

Infrastructure Penetration Testing

Authorized security testing of network infrastructure including servers, routers, switches, and firewalls to identify configuration and security weaknesses.

Infrastructure Security

Security measures for protecting the core technology infrastructure including servers, networks, storage, and operating systems from threats.

Infrastructure as Code (IaC)

The practice of managing and provisioning infrastructure through machine-readable configuration files rather than manual processes. IaC enables consistent, repeatable, and auditable infrastructure deployments.

Infrastructure as Code Security

Security practices for scanning and validating infrastructure code templates to prevent misconfigurations before cloud resources are provisioned.

Ingress Filtering

The practice of monitoring and controlling inbound network traffic to block unauthorised access and malicious traffic. Ingress filtering verifies that incoming packets have legitimate source addresses.

Inherent Risk

The level of risk present in an activity or process before any controls or mitigating actions are applied, representing the natural risk exposure.

Initial Certification Audit

The first formal audit conducted by a certification body to determine whether an organization's management system meets standard requirements.

Input Validation

The process of verifying that user-supplied data meets expected formats and constraints before processing, preventing injection attacks and data corruption.

Insider Risk

The potential for current or former employees, contractors, or partners to intentionally or accidentally compromise organizational security.

Insider Threat

A security risk that originates from within the organisation, typically from current or former employees, contractors, or business partners who have inside information concerning security practices, data, and computer systems.

Insider Threat Program

An organizational initiative that combines policies, procedures, and technologies to detect, deter, and mitigate threats from trusted insiders.

Insurance Compliance

Regulatory requirements for insurance companies including solvency standards, consumer protection, data privacy, and claims handling procedures.

Integrated Management System (IMS)

A single management system that addresses the requirements of multiple standards simultaneously, such as ISO 9001, ISO 27001, and ISO 14001. Integration is facilitated by the Annex SL high-level structure shared by all ISO management system standards.

Integrated Risk Management

A coordinated approach to managing all types of risk across an organization, breaking down silos between risk management functions.

Integrity

The principle of ensuring that data is accurate, complete, and has not been modified by unauthorised parties. One of the three pillars of the CIA triad.

Integrity Monitoring

Continuous surveillance of systems and data to detect unauthorized modifications, ensuring that information and configurations remain in their authorized state.

Integrity Verification

The process of confirming that data, systems, or configurations have not been tampered with or altered from their authorized state.

Intellectual Property Protection

Security measures for safeguarding trade secrets, patents, copyrights, and other proprietary assets from theft and unauthorized use.

Intelligent Automation

The combination of artificial intelligence and automation technologies to streamline business processes, requiring governance and compliance oversight.

Interactive Application Security Testing

A security testing approach that combines elements of static and dynamic analysis to identify vulnerabilities while the application is running.

Internal Audit

An independent, objective assurance activity within an organisation that evaluates the effectiveness of risk management, controls, and governance processes.

Internal Auditor

A professional employed by or contracted to an organisation to conduct independent assessments of risk management, control, and governance processes. Internal auditors follow standards set by the Institute of Internal Auditors (IIA).

Internal Control

A process effected by an organisation's board, management, and other personnel designed to provide reasonable assurance regarding the achievement of objectives in operations, reporting, and compliance. The COSO framework defines the standard for internal control.

Internal Penetration Testing

Authorized security testing conducted from within the organization's network to simulate attacks by insiders or compromised accounts.

International Data Transfer

The transmission of personal data from one jurisdiction to another, requiring appropriate safeguards and legal bases under data protection regulations.

International Traffic in Arms Regulations

US regulations controlling the export and import of defense-related articles and services on the United States Munitions List.

Internet Key Exchange

A protocol used in IPsec VPNs to establish security associations by negotiating encryption algorithms and exchanging cryptographic keys.

Internet of Things Security

Security practices for protecting IoT devices, networks, and data from threats including unauthorized access, device hijacking, and data interception.

Intrusion Detection System

A security tool that monitors network traffic or system activities for signs of malicious behavior and generates alerts when suspicious activity is detected.

Intrusion Detection System (IDS)

A device or software application that monitors network traffic or system activities for malicious activities or policy violations. IDS alerts security personnel when suspicious activity is detected.

Intrusion Prevention System

A network security tool that monitors traffic and automatically takes action to block or prevent detected threats from entering the network.

Intrusion Prevention System (IPS)

A network security technology that monitors network traffic for malicious activities and can take automated actions to block or prevent detected threats. IPS extends IDS capabilities with active threat mitigation.

Investigation Report

A formal document detailing the findings, analysis, and conclusions of a security incident investigation.

Isolation

A security technique that separates systems, processes, or data from each other to prevent unauthorized access and contain the impact of breaches.

Issue Management

The process of identifying, tracking, escalating, and resolving compliance issues, audit findings, and risk events to ensure timely remediation.

J4 terms

Jailbreaking

The process of removing software restrictions imposed by the manufacturer on a mobile device. Jailbreaking can expose devices to security vulnerabilities and is typically prohibited by enterprise mobile device management policies.

Joint Controllers

Two or more entities that jointly determine the purposes and means of processing personal data, sharing data protection responsibilities.

Jump Server

A hardened intermediary server used to access and manage devices in a separate security zone, enforcing access control and audit logging.

Just-In-Time Access

A privileged access management approach that grants users elevated permissions only when needed and for a limited duration, reducing standing privilege risk.

K16 terms

KYC (Know Your Customer)

The process of verifying the identity and assessing the suitability of customers. A key component of anti-money laundering compliance.

Kerberos

A network authentication protocol that uses secret-key cryptography to authenticate client-server applications. Kerberos provides mutual authentication where both the user and server verify each other's identity.

Key Control

A critical control that directly addresses a significant risk and whose failure would materially increase the likelihood or impact of that risk.

Key Escrow

An arrangement in which cryptographic keys are held by a trusted third party (escrow agent) for later retrieval under defined conditions. Key escrow enables lawful access to encrypted data when the original key holder is unavailable.

Key Management

The administration of cryptographic keys in a cryptosystem, including generation, exchange, storage, use, destruction, and replacement of keys. Proper key management is essential for maintaining the security of encrypted data.

Key Management Physical

The secure management of physical keys and locks used for facility access, including key distribution, tracking, and periodic rekeying.

Key Performance Indicator

A measurable value that demonstrates how effectively an organization is achieving key business and security objectives.

Key Performance Indicator (KPI)

A measurable value that demonstrates how effectively an organisation is achieving key objectives. In compliance, KPIs track metrics such as control effectiveness, audit findings closure rate, and policy compliance percentages.

Key Risk Indicator

A metric that provides early warning signals about increasing risk levels, enabling proactive risk management and timely intervention.

Key Risk Indicator (KRI)

A metric used to signal increasing risk exposures in various areas of an enterprise. KRIs provide early warning signs that enable proactive risk management.

Key Rotation

The practice of periodically replacing cryptographic keys with new ones to limit the amount of data encrypted with any single key.

Keylogger

Malicious software or hardware that records keystrokes made by a user. Keyloggers are used to capture passwords, credit card numbers, and other sensitive information without the user's knowledge.

Kill Switch

A mechanism built into software or hardware that allows it to be shut down or disabled remotely. In security, kill switches can be used to disable compromised devices or halt the spread of malware.

Know Your Customer

Regulatory requirements for financial institutions to verify the identity of clients and assess their risk profile before establishing a business relationship.

Knowledge Management

The process of creating, sharing, using, and managing an organization's knowledge and information to achieve organizational objectives.

Kubernetes Security

Security practices for protecting Kubernetes clusters and containerized applications, including pod security, network policies, RBAC, and secrets management.

L35 terms

LGPD

Brazil's General Data Protection Law (Lei Geral de Protecao de Dados) that regulates the processing of personal data of individuals in Brazil.

Labor Compliance

Adherence to employment laws and regulations covering wages, working hours, safety, discrimination, harassment, and employee rights.

Large Language Model (LLM)

An AI model trained on large quantities of text data that can generate, summarise, translate, and reason about natural language. LLMs are a type of foundation model that powers conversational AI and text generation applications.

Lateral Movement

Techniques used by attackers after gaining initial access to move through a network to find and access higher-value targets. Lateral movement involves using compromised credentials and exploiting trust relationships between systems.

Lawful Basis

The legal ground for processing personal data under GDPR Article 6. The six lawful bases are: consent, contract performance, legal obligation, vital interests, public task, and legitimate interests.

Lawful Basis for Processing

The legal grounds under data protection law that justify the processing of personal data, including consent, contract performance, legitimate interest, and legal obligation.

Layer 7 Firewall

A firewall that operates at the application layer of the OSI model, inspecting and filtering traffic based on application-specific content and behavior.

Least Privilege

The security principle of granting users only the minimum access rights needed to perform their job functions. Reduces the attack surface and limits damage from compromised accounts.

Least Privilege Principle

A security concept requiring that users and systems are granted only the minimum level of access necessary to perform their authorized functions.

Legal Compliance

Adherence to all applicable laws and statutes that govern an organization's operations, including civil, criminal, and administrative law.

Legal Hold

A directive to preserve all relevant documents, data, and records when litigation is anticipated, overriding normal retention and deletion schedules.

Legal Industry Compliance

Regulatory and ethical requirements for legal professionals and law firms including client confidentiality, conflicts of interest, and data protection.

Legal Privilege

The protection of communications between an attorney and client from disclosure, relevant to incident investigations and compliance matters.

Legal Risk

The potential for financial loss or business disruption arising from legal actions, regulatory enforcement, or failure to comply with legal obligations.

Legitimate Interest

One of six lawful bases for processing personal data under GDPR. Processing is lawful when necessary for the legitimate interests of the controller or a third party, provided those interests are not overridden by the rights of the data subject.

Legitimate Interest Assessment

A structured evaluation to determine whether a data controller's legitimate interests override the privacy rights of the individuals affected.

Lei Geral de Protecao de Dados (LGPD)

Brazil's comprehensive data protection law modelled after the GDPR. LGPD establishes rules for the collection, processing, storage, and sharing of personal data and applies to any organisation processing data of individuals in Brazil.

Lessons Learned

The documented knowledge gained from experiences, both positive and negative, used to improve future performance and prevent recurring issues.

Lessons Learned Report

A document capturing insights from a security incident or exercise, including what worked well and what needs improvement.

License Management

The process of tracking, controlling, and optimizing the use of software licenses to ensure compliance with vendor terms.

Licensing Compliance

Ensuring proper acquisition, tracking, and adherence to the terms and conditions of software licenses and intellectual property agreements.

Likelihood Assessment

The evaluation of the probability that a specific threat will exploit a vulnerability, resulting in an adverse event.

Link Encryption

Encryption of data at the data link layer that protects all traffic on a communication link, including headers and routing information.

Load Balancer Security

Security considerations for load balancing infrastructure including SSL/TLS termination, traffic inspection, and protection against application-layer attacks.

Loading Dock Security

Security measures for shipping and receiving areas to prevent unauthorized access, theft, and introduction of malicious items into facilities.

Location Privacy

The protection of information about an individual's physical movements and geographic position from unauthorized collection and use.

Lock Security

Physical locking mechanisms used to secure doors, cabinets, and equipment, including mechanical locks, electronic locks, and combination locks.

Log Aggregation

The collection and centralization of log data from multiple sources into a single repository for unified analysis and monitoring.

Log Analysis

The examination of system and application logs to identify security events, troubleshoot issues, and support compliance monitoring.

Log Correlation

The process of analyzing log data from multiple sources to identify related events and detect patterns that may indicate security threats.

Log Management

The process of collecting, aggregating, storing, and analysing log data from various sources across an IT environment. Log management supports security monitoring, compliance reporting, and incident investigation.

Log Retention

Policies defining how long log data must be stored based on compliance requirements, security needs, and organizational policies.

Log Source

A system, device, or application that generates log data used for security monitoring, compliance verification, and forensic analysis.

Logic Bomb

Malicious code that is deliberately inserted into a system and designed to execute when specific conditions are met, such as a particular date or the deletion of a user account.

Loss Event

An occurrence that results in actual financial loss, operational disruption, or other negative impact to an organization.

M74 terms

MAC Address Filtering

A network access control method that allows or denies network access based on the hardware (MAC) address of the connecting device. MAC filtering provides a basic layer of access control for wireless networks.

MAS TRM

The Monetary Authority of Singapore's Technology Risk Management guidelines for financial institutions to manage technology and cyber risks.

MFA (Multi-Factor Authentication)

An authentication method requiring two or more verification factors: something you know (password), something you have (token), or something you are (biometric).

MITRE

A non-profit organization that operates federally funded research centers and maintains cybersecurity resources including the ATT&CK framework and CVE program.

MITRE ATT&CK

A globally accessible knowledge base of adversary tactics and techniques based on real-world observations, used for threat modeling and security assessment.

Machine Learning

A branch of artificial intelligence that enables systems to learn and improve from experience without being explicitly programmed. Machine learning algorithms build models from training data to make predictions or decisions.

Machine Learning Operations

Practices for deploying, monitoring, and maintaining machine learning models in production, including security, versioning, and performance monitoring.

Mail Security

Procedures for screening incoming mail and packages for potential threats such as suspicious substances, devices, or social engineering materials.

Maintenance Window

A scheduled period during which systems may be taken offline for maintenance, updates, and patches with minimal business impact.

Malware

Any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware types include viruses, worms, trojans, ransomware, spyware, adware, and rootkits.

Malware Analysis

The process of examining malicious software to understand its behavior, origin, purpose, and potential impact, supporting incident response and threat intelligence.

Malware Sandbox

An isolated testing environment used to safely execute and analyze suspicious files or programs to observe their behavior without risking production systems.

Man-in-the-Browser Attack

An attack that uses a trojan to intercept and manipulate web browser sessions, modifying web pages and transactions in real time.

Man-in-the-Middle Attack

An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. MITM attacks can intercept sensitive data such as login credentials and financial information.

Managed Detection and Response

A security service that combines technology and human expertise to monitor, detect, investigate, and respond to threats on behalf of an organization.

Managed Detection and Response (MDR)

A cybersecurity service that combines technology and human expertise to perform threat hunting, monitoring, and response. MDR providers deliver 24/7 security operations capabilities to organisations that lack in-house resources.

Managed Firewall

A firewall service where a third-party provider manages the deployment, configuration, monitoring, and maintenance of firewall infrastructure.

Managed Security Service Provider

A third-party organization that provides outsourced monitoring and management of security devices and systems, delivering 24/7 security operations.

Managed Service Provider

A third-party organization that remotely manages IT infrastructure, systems, and services on behalf of client organizations.

Management Review

A periodic evaluation by top management of the suitability, adequacy, effectiveness, and alignment of the management system with strategic direction. Management reviews are required by all ISO management system standards.

Management System

An integrated set of policies, processes, and procedures that an organization uses to achieve its objectives in a systematic and structured manner.

Management System Audit

An examination of an organization's management system to verify it conforms to the requirements of an applicable standard.

Mandatory Access Control (MAC)

An access control model in which the operating system constrains the ability of a subject to access or perform operations on an object. Access decisions are based on security labels assigned to both subjects and objects.

Mandatory Reporting

Legal obligations requiring organizations or individuals to report specific events such as data breaches, suspicious activities, or safety incidents to authorities.

Mantrap

A physical access control mechanism consisting of two interlocking doors where only one can open at a time, preventing tailgating into secure areas.

Manufacturing Compliance

Regulatory requirements for manufacturing operations including quality standards, safety regulations, environmental compliance, and product liability.

Maritime Cybersecurity

Security measures for protecting maritime vessel systems, port infrastructure, and shipping operations from cyber threats.

Material Risk

A risk of sufficient magnitude that its occurrence could significantly affect the organization's financial condition, operations, or reputation.

Material Weakness

A significant deficiency in internal controls that creates a reasonable possibility of a material misstatement not being prevented or detected.

Maturity Assessment

An evaluation of an organization's processes, capabilities, or programs against a defined maturity model to identify strengths and improvement areas.

Maturity Model

A framework that describes levels of organisational capability or process maturity, typically from initial/ad hoc to optimised. Used to benchmark progress and set improvement targets.

Maximum Acceptable Outage

The longest period of time that a business function or process can be disrupted before causing unacceptable damage to the organization.

Maximum Tolerable Downtime

The maximum time a business process can be unavailable before the resulting harm becomes unacceptable to the organization.

Mean Time to Contain

A metric measuring the average time from when a security incident is detected to when it is fully contained.

Mean Time to Detect

A metric measuring the average time between the occurrence of a security incident and its detection by the organization.

Mean Time to Detect (MTTD)

The average time it takes for an organisation to discover a security incident or threat. Reducing MTTD is a key objective of security operations, as faster detection limits the damage an attacker can cause.

Mean Time to Recover

A metric measuring the average time required to restore normal operations after a security incident or system failure.

Mean Time to Respond

A metric measuring the average time from detection of a security incident to the initiation of response actions.

Mean Time to Respond (MTTR)

The average time it takes for an organisation to contain and remediate a security incident after detection. MTTR measures the efficiency of incident response processes and is a key security operations metric.

Media Compliance

Regulatory requirements for media organizations including content regulations, advertising standards, data protection, and intellectual property laws.

Media Protection

Security controls for protecting storage media including hard drives, USB devices, tapes, and optical media from unauthorized access and damage.

Media Sanitization

The process of rendering data on electronic media unrecoverable through methods such as clearing, purging, or destroying the storage media.

Memory Forensics

The analysis of volatile memory dumps to identify malicious activity, extract artifacts, and investigate security incidents that leave traces in system RAM.

Metadata Privacy

Privacy considerations related to metadata such as communication timestamps, device identifiers, and browsing patterns that can reveal personal information.

Metaverse Compliance

Emerging regulatory considerations for virtual world platforms including user privacy, content moderation, digital commerce, and identity management.

Metrics and Measurement

The definition, collection, and analysis of quantitative data to evaluate performance, effectiveness, and compliance of programs and controls.

Metrics and Reporting

The systematic collection, analysis, and presentation of data that measures the performance and effectiveness of security controls, compliance programmes, and risk management activities. Metrics enable data-driven decision-making.

Micro-Segmentation

A security technique that divides a network into small, isolated segments with individual security policies to limit lateral movement and contain breaches.

Microsegmentation

A network security technique that enables fine-grained security policies to be assigned to individual workloads or applications, limiting lateral movement within a data centre or cloud environment.

Minimal Data Collection

The practice of collecting only the personal data that is strictly necessary for a specific stated purpose, avoiding excessive data gathering.

Minimum Business Continuity Objective

The minimum level of services or products that must be maintained during a disruption to be considered acceptable to the organization.

Minimum Security Requirements

The baseline set of security controls that must be implemented for all systems within an organization, regardless of risk level.

Mining Compliance

Regulations governing mining operations including safety standards, environmental protection, land use, and worker health requirements.

Mobile Application Management

Policies and tools for controlling and securing enterprise applications on mobile devices, including app distribution, configuration, and data protection.

Mobile Code

Software transferred across a network and executed on a local system, such as Java applets and scripts, requiring security controls.

Mobile Device Management

A solution that allows organizations to manage, monitor, and secure employees' mobile devices that access enterprise data and applications.

Mobile Device Management (MDM)

Software that allows IT departments to control, secure, and enforce policies on smartphones, tablets, and other endpoint devices. MDM enables remote wiping, app management, and configuration enforcement.

Mobile Penetration Testing

Authorized security testing of mobile applications and their backend services to identify platform-specific vulnerabilities and data leakage risks.

Mobile Threat Defense

Security solutions that protect mobile devices from device-level, network-level, and application-level threats through continuous monitoring and automated response.

Model Card

A documentation framework for machine learning models that provides details about a model's intended use, performance metrics, training data, limitations, and ethical considerations. Model cards promote transparency and responsible AI use.

Model Contract Clauses

Standardized contractual provisions approved by data protection authorities for international transfers of personal data to countries without adequate protection levels.

Model Governance

The framework for overseeing the development, validation, deployment, and ongoing monitoring of analytical and AI models used in decision-making.

Model Validation

The process of evaluating an AI or analytical model to verify it performs as intended, produces accurate results, and complies with regulatory requirements.

Money Laundering Reporting

Obligations for regulated entities to report suspicious transactions and activities that may indicate money laundering to financial intelligence units.

Monitoring Policy

A documented policy defining what activities and systems are monitored, how monitoring data is used, and retention requirements.

Monte Carlo Simulation

A mathematical technique that uses random sampling to model the probability of different outcomes in risk scenarios that involve uncertainty.

Multi-Cloud

A strategy that uses cloud services from two or more cloud providers simultaneously. Multi-cloud approaches increase flexibility and reduce vendor lock-in but introduce complexity in security, compliance, and governance.

Multi-Cloud Security

Security strategies and tools designed to protect data, applications, and infrastructure across multiple cloud service providers with consistent policies.

Multi-Factor Authentication

An authentication method requiring users to present two or more distinct types of evidence to verify their identity before gaining access.

Multi-Factor Authentication (MFA)

An authentication method that requires users to provide two or more verification factors to gain access to a resource. MFA combines something you know (password), something you have (token), and something you are (biometric).

Multi-Framework Compliance

The practice of simultaneously meeting the requirements of multiple compliance frameworks and standards through integrated control implementation.

Multi-Tenant Security

Security measures that ensure isolation and protection of data and resources between different customers sharing the same cloud infrastructure.

Mutual Aid Agreement

A formal arrangement between organizations to share resources and provide assistance to each other during emergencies or disasters.

Mutual Authentication

A security process in which both parties in a communication verify each other's identity before exchanging data, preventing impersonation attacks.

N43 terms

NAT

Network Address Translation, a method of remapping IP addresses to enable multiple devices to share a single public IP address, providing a layer of obscurity.

NERC CIP

North American Electric Reliability Corporation Critical Infrastructure Protection standards that establish cybersecurity requirements for the bulk electric system.

NIST

The National Institute of Standards and Technology, a US agency that develops cybersecurity standards, guidelines, and frameworks used globally.

NIST 800-171

NIST Special Publication providing requirements for protecting Controlled Unclassified Information in non-federal systems and organizations.

NIST AI Risk Management Framework

A voluntary framework published by NIST that provides guidance for managing risks associated with AI systems. The AI RMF is organised around four core functions: Govern, Map, Measure, and Manage.

NIST CSF (Cybersecurity Framework)

A voluntary framework by the US National Institute of Standards and Technology. Version 2.0 includes six functions: Govern, Identify, Protect, Detect, Respond, and Recover.

NIST Cybersecurity Framework

A voluntary framework published by the National Institute of Standards and Technology that provides a common language for understanding, managing, and expressing cybersecurity risk. The current version (CSF 2.0) includes six functions: Govern, Identify, Protect, Detect, Respond, and Recover.

NIST Privacy Framework

A voluntary tool developed by NIST to help organisations identify and manage privacy risk through an approach that is flexible and outcome-based. The Privacy Framework complements the NIST Cybersecurity Framework.

NIST Risk Management Framework

A structured process for integrating security and risk management activities into the system development lifecycle. The RMF provides a disciplined approach through six steps: Categorise, Select, Implement, Assess, Authorise, and Monitor.

NIST SP 800-171

A NIST publication that provides recommended security requirements for protecting Controlled Unclassified Information (CUI) in non-federal systems and organisations. Compliance with 800-171 is required for US defence contractors.

NIST SP 800-53

A comprehensive catalog of security and privacy controls for federal information systems published by NIST, widely adopted across public and private sectors.

NYDFS Cybersecurity Regulation

New York State Department of Financial Services regulation (23 NYCRR 500) that establishes cybersecurity requirements for financial services companies. It requires risk assessments, CISOs, penetration testing, and incident response plans.

National Vulnerability Database

A U.S. government repository of standards-based vulnerability management data, including CVE identifiers, severity scores, and remediation guidance.

Natural Language Processing

AI technology that enables computers to understand, interpret, and generate human language, powering applications like chatbots and text analysis.

Natural Language Processing (NLP)

A branch of artificial intelligence that deals with the interaction between computers and humans using natural language. NLP enables machines to understand, interpret, and generate human language.

Need to Know

A security principle that restricts access to information to only those individuals who require it to perform their specific job duties.

Net Risk

The remaining level of risk after controls and mitigation measures have been applied, also known as residual risk.

NetFlow

A network protocol for collecting metadata about IP traffic flows passing through network devices, used for security monitoring and traffic analysis.

Network Access Control

Security solutions that enforce policies to control which devices and users can access a network, based on identity, device health, and compliance status.

Network Access Control (NAC)

A security approach that enforces policy compliance on devices before granting them access to the network. NAC verifies that connecting devices meet security requirements such as current patches and active anti-malware.

Network Architecture

The design and structure of a computer network including topology, protocols, and components, with security considerations integrated throughout.

Network Baseline

A documented profile of normal network behavior including traffic patterns, bandwidth usage, and protocol distribution used to detect anomalies.

Network Detection and Response

Security solutions that monitor network traffic patterns to detect suspicious activity, investigate threats, and automate response actions across the network.

Network Encryption

The application of cryptographic techniques to protect data as it travels across network connections from interception and tampering.

Network Forensics

The capture, recording, and analysis of network traffic to detect intrusions, investigate incidents, and gather evidence of malicious network activity.

Network Monitoring

The continuous observation of network performance and security using tools that track traffic, detect anomalies, and alert on potential threats.

Network Penetration Testing

Authorized security testing focused on network infrastructure to identify vulnerabilities in network devices, services, and configurations.

Network Policy

Rules and guidelines governing the configuration, use, and security of an organization's network infrastructure and resources.

Network Security Architecture

The design of network security controls and their placement within the network topology to protect data and systems from threats.

Network Segmentation

The practice of dividing a computer network into smaller subnetworks to improve security and performance. Segmentation limits the blast radius of security incidents and restricts access to sensitive resources.

Network Tap

A hardware device that provides access to network traffic for monitoring, analysis, and security purposes without disrupting normal network operations.

Network Traffic Analysis

The process of intercepting, recording, and analyzing network communication patterns to identify security threats, performance issues, and anomalous behavior.

Network Traffic Analysis (NTA)

A method of monitoring network availability and activity to identify anomalies, including security threats and operational issues. NTA uses machine learning and behavioural analysis to detect threats that evade traditional security tools.

Network and Information Security Directive

EU directive (NIS2) establishing cybersecurity requirements and incident reporting obligations for essential and important service providers.

Neurodiversity in Security

The consideration of diverse cognitive perspectives in security team composition and security awareness programs to improve organizational defense.

Next-Generation Firewall

An advanced firewall that combines traditional packet filtering with application awareness, intrusion prevention, deep packet inspection, and threat intelligence.

Non-Compliance

The failure to adhere to applicable laws, regulations, standards, or organizational policies, potentially resulting in penalties or enforcement actions.

Non-Repudiation

A security property that ensures a party cannot deny having performed an action, such as sending a message or authorising a transaction. Non-repudiation is typically achieved through digital signatures and audit trails.

Nonconformity

A failure to fulfil a requirement. In ISO management systems, nonconformities found during audits must be addressed through corrective actions to eliminate the root cause.

Nonconformity Report

A formal document that describes a finding of non-compliance with a requirement, including evidence and the affected requirement.

North-South Traffic

Network traffic that flows between an organization's internal network and external networks such as the internet, crossing the network perimeter.

Notice and Choice

A privacy framework where organizations provide clear notice about data practices and give individuals meaningful choices about how their data is used.

Nuclear Security

Regulatory requirements and security measures for protecting nuclear facilities, materials, and information from theft, sabotage, and cyber threats.

O37 terms

OAuth

An open standard authorisation protocol that enables applications to obtain limited access to user accounts on third-party services. OAuth 2.0 is widely used for delegated authorisation in web and mobile applications.

OCSP Stapling

A method for checking the revocation status of digital certificates that improves performance by having the server include the certificate status in the TLS handshake.

OCTAVE

Operationally Critical Threat, Asset, and Vulnerability Evaluation, a risk assessment methodology developed by Carnegie Mellon University. OCTAVE focuses on organisational risk and strategic practice rather than technology risk alone.

OSCP Certification

Offensive Security Certified Professional, a hands-on penetration testing certification requiring demonstration of practical exploitation skills.

OWASP

The Open Worldwide Application Security Project, a non-profit foundation that produces resources and tools for improving software security.

OWASP Top 10

A regularly updated report from the Open Web Application Security Project that lists the ten most critical web application security risks. The OWASP Top 10 is widely adopted as a baseline for web application security testing.

OWASP Top Ten

A regularly updated list of the ten most critical web application security risks published by the Open Web Application Security Project.

Obfuscation

Techniques used to make code, data, or communications deliberately difficult to understand, used both defensively and by attackers to evade detection.

Object Storage Security

Security measures for protecting data stored in object storage systems including access policies, encryption, versioning, and immutability settings.

Observation

A finding noted during an audit that does not constitute a nonconformity but represents an area where improvement is recommended. Observations may indicate emerging risks or opportunities to strengthen the management system.

Observation Report

A document identifying an area where improvement is possible but that does not constitute a formal nonconformity.

Occupational Health and Safety

Standards and regulations requiring employers to provide safe working conditions and protect workers from health hazards in the workplace.

Occupational Safety Compliance

Adherence to workplace health and safety regulations designed to prevent injuries, illnesses, and fatalities in the workplace.

Off-Boarding

The process of securely revoking all access, retrieving assets, and completing security procedures when an employee or contractor leaves the organization.

Offensive Security

A proactive approach to security that involves simulating attacks against systems and networks to identify vulnerabilities before malicious actors exploit them.

Offsite Backup

Backup copies of data stored at a geographically separate location from the primary data center to protect against site-wide disasters.

Oil and Gas Compliance

Regulations specific to the oil and gas industry including environmental protection, worker safety, pipeline security, and operational standards.

On-Boarding Security

Security procedures performed when new employees or contractors join an organization, including background checks, access provisioning, and training.

One-Time Password

A password that is valid for only a single login session or transaction, generated dynamically to provide an additional layer of authentication security.

Online Tracking

Technologies and practices used to monitor and record user behavior across websites and applications, including cookies, pixels, and fingerprinting.

Open Banking Security

Security requirements for open banking implementations that share financial data through APIs between banks and authorized third-party providers.

Open Source Intelligence

The collection and analysis of publicly available information from open sources to support security investigations and threat intelligence activities.

Operating Model

A description of how an organization delivers value through the arrangement of its people, processes, technology, and governance structures.

Operational Audit

An examination of an organization's operations and processes to evaluate efficiency, effectiveness, and compliance with policies.

Operational Continuity

The ability to maintain critical business operations during and after disruptive events through preparedness and response planning.

Operational Excellence

The execution of business operations in a manner that achieves consistent, reliable, and superior results through continuous improvement.

Operational Impact

The effect that a security incident, system failure, or risk event has on an organization's day-to-day business operations.

Operational Resilience

The ability of an organisation to continue to deliver critical operations through disruption. Operational resilience goes beyond business continuity to encompass prevention, adaptation, response, recovery, and learning.

Operational Risk

The risk of loss resulting from inadequate or failed internal processes, people, systems, or external events in day-to-day business operations.

Operational Technology Security

Security measures for protecting industrial systems and networks that monitor and control physical processes, devices, and infrastructure.

Operations Security

The process of protecting unclassified information that could be used by adversaries to piece together sensitive operational activities.

Opt-In Consent

A consent model requiring individuals to take an affirmative action to agree to data collection or processing before it occurs.

Opt-Out Right

The right of individuals to decline or withdraw consent for certain data processing activities, such as the sale of personal information.

Organizational Culture

The shared values, beliefs, norms, and behaviors within an organization that influence how people interact and make decisions.

Organizational Resilience

An organization's ability to anticipate, prepare for, respond to, and adapt to incremental change and sudden disruptions to survive and prosper.

Outsourcing Risk

Risks associated with using external providers for business functions, including loss of control, service quality issues, and data security concerns.

Outsourcing Security

Security requirements and controls applied to outsourced functions and services to protect organizational data and systems managed by third parties.

P148 terms

PCI DSS

The Payment Card Industry Data Security Standard is a set of security requirements for organizations that handle credit card information to protect cardholder data.

PCI DSS Requirement 1

PCI DSS requirements for installing and maintaining network security controls including firewalls and network segmentation.

PCI DSS Requirement 3

PCI DSS requirements for protecting stored cardholder data through encryption, truncation, masking, and hashing.

PCI DSS Requirement 6

PCI DSS requirements for developing and maintaining secure systems and software, including secure coding practices and vulnerability management.

PCI QSA Certification

A qualification granted by the PCI SSC to individuals who are authorized to assess compliance with PCI DSS requirements.

PCI SSC

The Payment Card Industry Security Standards Council, responsible for developing and managing PCI security standards including PCI DSS.

PCI SSC (PCI Security Standards Council)

The organisation responsible for developing, managing, and promoting the PCI Data Security Standard and other payment card security standards. The PCI SSC was founded by American Express, Discover, JCB, Mastercard, and Visa.

PDCA Cycle

Plan-Do-Check-Act, a four-step iterative management methodology used for continuous improvement of processes and products in management systems.

PDPA

Personal Data Protection Act, data protection legislation enacted by various countries (such as Singapore and Thailand) to regulate the collection and use of personal data.

PHI (Protected Health Information)

Under HIPAA, any individually identifiable health information held by a covered entity or business associate, including demographic data, medical records, and billing information.

PIPL

China's Personal Information Protection Law that regulates the processing of personal information of individuals within China by both domestic and foreign entities.

PKI

Public Key Infrastructure, a framework of policies, hardware, software, and procedures for creating, managing, distributing, and revoking digital certificates and encryption keys.

PaaS Security

Security considerations specific to Platform as a Service environments where the customer manages applications and data while the provider manages the underlying platform.

Packet Capture

The interception and recording of network packets for analysis, troubleshooting, security monitoring, and forensic investigation.

Packet Filtering

A firewall technique that inspects individual network packets and allows or blocks them based on predefined rules such as source and destination addresses and ports.

Packet Sniffing

The practice of intercepting and examining data packets as they traverse a network. Packet sniffing can be used legitimately for network troubleshooting or maliciously to capture sensitive information.

Pandemic Planning

Business continuity planning that addresses the unique challenges of a widespread disease outbreak, including workforce impacts and extended disruptions.

Passkey

A passwordless authentication credential based on the FIDO2 standard that uses public key cryptography and biometrics for secure, phishing-resistant sign-in.

Password Complexity

Requirements for password composition including minimum length, character variety, and prohibition of common or previously used passwords.

Password Hash

The output of applying a cryptographic hash function to a password, stored instead of the plaintext password for secure authentication.

Password Manager

Software that securely stores and manages login credentials for various accounts and applications. Password managers generate strong, unique passwords and auto-fill them, reducing the risk of password reuse and weak passwords.

Password Policy

A set of rules designed to enhance computer security by encouraging users to create strong passwords and manage them properly. Password policies define minimum length, complexity, rotation frequency, and history requirements.

Password Spraying

An attack technique that attempts a small number of commonly used passwords against many accounts simultaneously to avoid triggering account lockout.

Passwordless Authentication

Authentication methods that verify user identity without traditional passwords, using alternatives such as biometrics, hardware tokens, or magic links.

Passwordless Security

A security approach that eliminates traditional passwords in favor of more secure authentication methods such as biometrics and hardware keys.

Patch Cycle

The regular schedule and process for identifying, testing, and deploying software patches across an organization's systems.

Patch Management

The process of identifying, acquiring, testing, and installing software updates (patches) to address security vulnerabilities and bugs. Effective patch management is a critical security control required by most compliance frameworks.

Patch Testing

The evaluation of software patches in a controlled environment before deployment to verify they resolve vulnerabilities without causing system issues.

Patient Privacy

The protection of medical information and healthcare records from unauthorized access and disclosure under healthcare privacy regulations.

Payload

The component of malware that performs the malicious action, such as encrypting files (ransomware), exfiltrating data, or establishing a backdoor. The payload is delivered through an exploit or social engineering.

Payment Card Industry

The collective of organizations including card brands, acquirers, issuers, and merchants involved in payment card transactions and subject to PCI standards.

Payment Services Directive

EU legislation regulating payment services and payment service providers, promoting innovation, competition, and security in electronic payments.

Penalty Assessment

The process by which regulatory bodies determine the severity and amount of fines or sanctions for non-compliance with regulations.

Penetration Test Report

A detailed document presenting the findings, risk ratings, and remediation recommendations from a penetration testing engagement.

Penetration Tester

A security professional who performs authorized simulated attacks against systems and networks to identify exploitable vulnerabilities.

Penetration Testing

An authorised simulated cyberattack against a system to evaluate its security. Identifies vulnerabilities that could be exploited by real attackers.

Penetration Testing Methodology

A structured approach to conducting penetration tests, including planning, reconnaissance, exploitation, post-exploitation, and reporting phases.

Performance Audit

An assessment of whether an organization's programs, activities, or operations are achieving their intended objectives efficiently and effectively.

Performance Management

The process of ensuring that organizational activities and outputs align with goals and objectives through monitoring, measurement, and improvement.

Perimeter Fence

Physical barriers installed around facilities to define boundaries and prevent unauthorized physical access to the organization's property.

Perimeter Security

Security measures deployed at the boundary between an organization's internal network and external networks to control access and filter threats.

Permission Management

The process of defining, assigning, and enforcing access permissions for users and groups across an organization's systems and applications.

Personal Data

Any information relating to an identified or identifiable natural person. Under GDPR, this includes names, identification numbers, location data, online identifiers, and factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of a person.

Personal Health Information

Individually identifiable health information including medical records, treatment history, and insurance data protected under healthcare privacy regulations.

Personal Information Protection

Laws and practices governing the collection, use, disclosure, and safeguarding of personal information, varying by jurisdiction and sector.

Personal Information Protection and Electronic Documents Act (PIPEDA)

Canada's federal privacy law for private-sector organisations that governs the collection, use, and disclosure of personal information in the course of commercial activities.

Personally Identifiable Information

Any information that can be used to identify, contact, or locate a specific individual, either alone or when combined with other data.

Personnel Security

Security measures related to the hiring, management, and termination of personnel, including background checks and access management.

Pharmaceutical Compliance

Regulatory requirements for pharmaceutical companies including drug safety, clinical trials, manufacturing quality, and marketing practices.

Phishing

A social engineering attack that uses fraudulent emails, text messages, or websites to trick users into revealing sensitive information such as passwords, credit card numbers, or personal data. Phishing remains the most common initial attack vector.

Phishing Awareness

Training programs designed to help employees recognize and report phishing attempts through education and simulated phishing exercises.

Phishing Simulation

Controlled tests that send simulated phishing emails to employees to measure susceptibility and reinforce security awareness training.

Photo Privacy

Privacy considerations related to the collection, storage, and use of photographs, particularly facial images that enable biometric identification.

Physical Access Control

Security measures that restrict physical entry to facilities, rooms, or areas to authorized individuals using barriers, locks, and authentication systems.

Physical Access Log

A record of all entries to and exits from physically secured areas, used for security monitoring, investigation, and compliance.

Physical Penetration Testing

Authorized testing of physical security controls including locks, access cards, surveillance systems, and employee security awareness.

Physical Security

Measures to protect an organization's physical assets, facilities, and personnel from unauthorized access, theft, damage, and environmental threats.

Physical Security Assessment

An evaluation of an organization's physical security controls including barriers, access systems, surveillance, and environmental protections.

Physical Security Policy

A documented set of rules and guidelines governing the physical protection of an organization's facilities, equipment, and personnel.

Plaintext

Unencrypted data or information that has not been transformed by a cryptographic algorithm. Plaintext is readable by anyone who has access to it and must be protected through encryption when confidentiality is required.

Plan Testing

Exercises conducted to validate the effectiveness and completeness of security, continuity, and recovery plans through simulated scenarios.

Platform Security

Security measures for protecting computing platforms including operating systems, middleware, and runtime environments from threats and vulnerabilities.

Point-to-Point Encryption

Encryption of data from the point of interaction to the secure decryption environment, preventing data exposure at any intermediate point.

Policy

A formal statement of management intent and direction. Security policies establish the rules, expectations, and standards that guide an organisation's approach to information security.

Policy Acknowledgment

The documented confirmation by employees that they have read, understood, and agree to comply with organizational policies.

Policy Compliance

Adherence to an organization's internal policies, standards, and procedures by employees and other stakeholders.

Policy Development

The process of creating new organizational policies including research, drafting, stakeholder consultation, approval, and implementation.

Policy Enforcement

The mechanisms and processes for ensuring that organizational policies are followed and that violations are identified and addressed.

Policy Exception

A formal approval to deviate from an established policy or standard requirement. Policy exceptions must be documented, time-bound, approved by appropriate authority, and include compensating controls.

Policy Framework

An organized hierarchy of policies, standards, procedures, and guidelines that provide direction and governance for an organization's operations.

Policy Lifecycle

The end-to-end process of creating, reviewing, approving, distributing, implementing, monitoring, and retiring organizational policies.

Policy Management

The process of creating, reviewing, approving, distributing, and enforcing organisational policies. Effective policy management ensures that policies remain current, accessible, and understood by all relevant personnel.

Policy Review

The periodic evaluation of existing policies to ensure they remain current, relevant, effective, and aligned with regulatory requirements.

Policy Violation

An instance where an individual or system fails to comply with established organizational policies, requiring investigation and corrective action.

Polymorphic Malware

Malicious software that changes its code each time it replicates, making it difficult for signature-based anti-malware tools to detect. Polymorphic malware uses encryption and code mutation to evade detection.

Port Scanning

The process of sending packets to specific ports on a host to determine which services are running. Port scanning is used both by security professionals for vulnerability assessment and by attackers for reconnaissance.

Portfolio Risk Management

The management of risks across a portfolio of projects, programs, or investments to optimize overall risk-return performance.

Post-Incident Review

A structured evaluation conducted after a security incident to identify lessons learned and improvement opportunities for future prevention and response.

Post-Quantum Cryptography

Cryptographic algorithms designed to remain secure against attacks by quantum computers, which could break current public key encryption methods.

Power Protection

Systems including UPS, generators, and surge protectors that ensure continuous and clean power supply to critical IT infrastructure.

Pre-Assessment

A preliminary evaluation conducted before a formal audit to identify potential gaps and help an organization prepare for certification.

Pretexting

A social engineering technique where an attacker creates a fabricated scenario to engage a victim and trick them into divulging information or taking action.

Preventive Control

A security control designed to stop a security incident or policy violation from occurring in the first place, such as access controls or input validation.

Privacy Assessment

A comprehensive evaluation of an organization's privacy practices, policies, and controls to identify gaps and ensure regulatory compliance.

Privacy Audit

A systematic examination of an organization's data handling practices to verify compliance with privacy laws, policies, and best practices.

Privacy Champion

An individual within a business unit who promotes privacy awareness and best practices, serving as a liaison between operations and the privacy team.

Privacy Compliance

The adherence to applicable privacy laws, regulations, and organizational policies governing the handling of personal information.

Privacy Controls

Technical and organizational measures implemented to protect personal data and ensure compliance with privacy requirements.

Privacy Dashboard

A user interface that provides individuals with visibility and control over their personal data held by an organization.

Privacy Design Patterns

Reusable solutions to common privacy challenges in system design, implementing privacy by design principles in practical ways.

Privacy Engineering

The discipline of building privacy protections directly into systems and processes through technical design choices, privacy-enhancing technologies, and engineering practices.

Privacy Enhancing Technologies (PETs)

Technologies that embody fundamental data protection principles by minimising personal data use, maximising data security, and empowering individuals. PETs include differential privacy, homomorphic encryption, and secure multi-party computation.

Privacy Enhancing Technology

Tools and techniques that minimize personal data use, maximize data security, and empower individuals with control over their information.

Privacy Framework

A structured approach that provides guidance for organizations to manage privacy risks and protect personal information systematically.

Privacy Governance

The organizational structures, roles, and processes established to oversee and manage privacy compliance and risk across the enterprise.

Privacy Impact Assessment

A structured analysis to identify and mitigate the privacy risks associated with a project, system, or process that handles personal information.

Privacy Impact Assessment (PIA)

A systematic assessment of a project or initiative that identifies the impact of the proposed processing on the privacy of individuals. PIAs help organisations identify and mitigate privacy risks before processing begins.

Privacy Law

Legislation that regulates the collection, storage, use, and disclosure of personal information by organizations and governments.

Privacy Management Platform

Technology solutions that help organizations automate and manage privacy compliance activities including assessments, consent, and data subject requests.

Privacy Maturity Model

A framework for assessing and improving an organization's privacy program across defined levels of capability and sophistication.

Privacy Notice

A document that informs individuals about how their personal data is collected, used, shared, and protected by an organisation. Under GDPR Articles 13 and 14, privacy notices must include specific mandatory information.

Privacy Officer

An individual responsible for developing and implementing privacy policies and ensuring organizational compliance with data protection regulations.

Privacy Policy

A public-facing document that describes an organization's practices regarding the collection, use, disclosure, and management of personal data.

Privacy Preserving Computation

Technologies that enable data analysis and processing while protecting the privacy of underlying personal data, including homomorphic encryption.

Privacy Principles

Fundamental guidelines that form the basis of data protection laws and best practices, including fairness, purpose limitation, and data minimization.

Privacy Program

An organized set of activities, policies, and resources dedicated to protecting personal data and ensuring compliance with privacy regulations across an organization.

Privacy Regulation

Laws and rules governing the collection, processing, storage, and sharing of personal information to protect individual privacy rights.

Privacy Risk

The potential for harm to individuals resulting from the collection, processing, or disclosure of their personal information.

Privacy Risk Assessment

An evaluation of the likelihood and impact of privacy-related risks to determine appropriate mitigating controls and safeguards.

Privacy Seal

A certification mark awarded to organizations that demonstrate compliance with specific privacy standards, building consumer trust.

Privacy Shield

A former framework for regulating transatlantic exchanges of personal data between the EU and the United States. Privacy Shield was invalidated by the Court of Justice of the European Union in 2020 (Schrems II) and replaced by the EU-US Data Privacy Framework.

Privacy Statement

A concise summary provided to individuals at the point of data collection explaining how their information will be used.

Privacy Threshold Analysis

An initial evaluation to determine whether a new system or project requires a full privacy impact assessment based on its data processing activities.

Privacy Training

Educational programs that teach employees about privacy laws, organizational policies, and best practices for handling personal information.

Privacy by Default

The principle that systems should be designed to automatically apply the strongest privacy settings without requiring user intervention.

Privacy by Design

An approach that embeds privacy protections into the design and architecture of systems and processes from the outset, rather than adding them as an afterthought. A principle of GDPR.

Privacy-Preserving AI

Techniques and approaches for training and deploying AI systems while minimizing the use and exposure of personal data, such as differential privacy.

Privilege Escalation

The act of exploiting a vulnerability, design flaw, or configuration oversight to gain elevated access to resources that are normally protected from an application or user. Can be vertical (gaining higher privileges) or horizontal (accessing other users' resources).

Privileged Access Management

Security solutions and practices for controlling, monitoring, and auditing privileged account access to critical systems and sensitive data.

Privileged Access Management (PAM)

A set of cybersecurity strategies and technologies for exerting control over elevated access and permissions for users, accounts, processes, and systems across an IT environment. PAM protects against credential theft and insider threats.

Privileged Access Workstation

A hardened and dedicated computing environment used exclusively for performing sensitive administrative tasks, isolated from general-purpose activities and the internet.

Privileged Account

A user account with elevated permissions that provide administrative control over systems, databases, networks, or security configurations.

Privileged Identity Management

Processes and technologies for managing identities that have elevated access to critical systems and sensitive data.

Privileged Session Management

The monitoring and recording of sessions where privileged accounts are used, providing an audit trail of administrative activities.

Problem Management

The process of identifying the root causes of recurring incidents and implementing solutions to prevent their reoccurrence.

Process Documentation

The detailed recording of business processes including steps, roles, inputs, outputs, and decision points for standardization and knowledge transfer.

Process Improvement

The systematic approach to identifying, analyzing, and enhancing existing business processes to optimize performance and meet new standards.

Process Maturity

A measure of how well-defined, managed, measured, and optimized an organization's processes are, typically assessed against a maturity model.

Process Mining

The analysis of event logs to discover, monitor, and improve business processes, with privacy and security implications for data handling.

Processing

Any operation or set of operations performed on personal data, whether or not by automated means. Under GDPR, processing includes collection, recording, storage, retrieval, consultation, use, disclosure, erasure, and destruction.

Processing Activity Record

A documented register of all data processing activities maintained by controllers and processors as required by GDPR Article 30.

Processor Agreement

A contract between a data controller and processor specifying the scope, duration, and conditions of personal data processing services.

Profiling

Any form of automated processing of personal data that evaluates certain personal aspects relating to a natural person, particularly to analyse or predict aspects concerning that person's performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location, or movements.

Profiling Transparency

The requirement to inform individuals about the existence and logic of automated profiling that affects them, including its consequences.

Program Governance

The framework of authority, accountability, and decision-making processes that oversee the management and delivery of a program of related projects.

Project Governance

The framework of authority and accountability that defines the management of a project, including decision rights and escalation procedures.

Prompt Injection

An attack technique targeting AI language models where malicious instructions are embedded in user inputs to manipulate the model's behaviour. Prompt injection can cause AI systems to ignore safety guidelines or reveal sensitive information.

Proof of Compliance

Documentary evidence demonstrating that an organization meets specific regulatory requirements or standard conditions.

Proportionality Principle

A privacy and data protection principle requiring that data processing measures be proportionate to the legitimate purpose pursued and not excessive.

Protected Health Information (PHI)

Under HIPAA, any individually identifiable health information that is created, received, maintained, or transmitted by a covered entity or business associate. PHI includes medical records, billing information, and any health-related data linked to an individual.

Protocol Analysis

The examination of network protocols to verify correct implementation, identify vulnerabilities, and detect malicious protocol-level attacks.

Protocol Security

Security measures and best practices for protecting network communication protocols from exploitation, misuse, and vulnerabilities.

Proxy Server

An intermediary server that handles requests between clients and destination servers, providing security, privacy, content filtering, and caching capabilities.

Pseudonymisation

The processing of personal data in such a manner that it can no longer be attributed to a specific data subject without the use of additional information. Unlike anonymisation, pseudonymised data is still considered personal data under GDPR.

Pseudonymous Data

Personal data that cannot be attributed to a specific individual without the use of additional information kept separately and securely.

Public Key Infrastructure (PKI)

A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. PKI provides the framework for trusted electronic communications.

Purple Team

A collaborative security approach where red team (offensive) and blue team (defensive) work together to improve detection capabilities and security posture.

Purpose Limitation

The principle that personal data should be collected for specified, explicit, and legitimate purposes and not further processed in a manner incompatible with those purposes. A core principle under GDPR Article 5(1)(b).

Q11 terms

Qualified Security Assessor

An organization certified by the PCI Security Standards Council to perform PCI DSS compliance assessments of merchants and service providers.

Qualified Security Assessor (QSA)

An individual certified by the PCI Security Standards Council to perform PCI DSS assessments. QSAs are authorised to evaluate and attest to an organisation's compliance with the PCI DSS requirements.

Qualitative Risk Analysis

A risk assessment approach that uses descriptive scales such as high, medium, and low to evaluate and prioritize risks based on expert judgment.

Quality Audit

An examination of a quality management system to verify it meets defined standards and effectively controls processes and outputs.

Quality Management

A systematic approach to ensuring that an organization's products and services consistently meet customer requirements and regulatory standards.

Quality Management System

A formalized system that documents processes, procedures, and responsibilities for achieving quality policies and objectives.

Quantitative Risk Analysis

A risk analysis approach that assigns numerical values to the probability and impact of risks to calculate expected loss and support cost-benefit decisions.

Quantum Computing Risk

The potential threat that quantum computers pose to current cryptographic algorithms, requiring migration to quantum-resistant encryption methods.

Quantum Key Distribution

A method of secure communication that uses quantum mechanics principles to create and distribute cryptographic keys that cannot be intercepted without detection.

Quantum Resistance

The property of cryptographic algorithms that remain secure against attacks by both classical and quantum computers.

Quid Pro Quo

A social engineering attack where the attacker offers a service or benefit in exchange for information or access from the victim.

R165 terms

RACI Matrix

A responsibility assignment matrix that defines roles as Responsible, Accountable, Consulted, or Informed for each task or deliverable. RACI matrices clarify ownership and prevent gaps or overlaps in responsibilities.

RBAC (Role-Based Access Control)

An access control model where permissions are assigned to roles rather than individual users. Users are then assigned to roles based on their job functions.

RPO (Recovery Point Objective)

The maximum acceptable amount of data loss measured in time. An RPO of 4 hours means the organisation can tolerate losing up to 4 hours of data.

RTO (Recovery Time Objective)

The maximum acceptable time to restore a system or process after a disruption. An RTO of 2 hours means the system must be back online within 2 hours.

Railway Cybersecurity

Security standards for protecting railway systems, signaling infrastructure, and passenger information systems from cyber threats.

Ransomware

Malicious software that encrypts a victim's files or systems and demands payment (ransom) for the decryption key. Ransomware has become one of the most financially damaging forms of cyber attack affecting organisations worldwide.

Ransomware Preparedness

Organizational readiness to prevent, detect, respond to, and recover from ransomware attacks through planning, controls, and exercises.

Ransomware Recovery

The processes and procedures for restoring systems and data following a ransomware attack, including backup restoration, system rebuilding, and root cause analysis.

Re-identification Risk

The possibility that anonymized or pseudonymized data could be linked back to specific individuals through additional data or techniques.

Readiness Assessment

A preliminary evaluation of an organisation's preparedness for a formal compliance audit or certification. Readiness assessments identify gaps between current practices and target framework requirements before the formal audit.

Real Estate Compliance

Regulations governing real estate transactions and property management including fair housing, disclosure requirements, and anti-money laundering.

Reasonable Assurance

A high but not absolute level of assurance that the subject matter is free from material misstatement, the standard for financial and compliance audits.

Recertification Audit

A comprehensive audit conducted at the end of a certification cycle to renew an organization's certification for another period.

Reconnaissance

The initial phase of a cyberattack where threat actors gather information about target systems, networks, and organizations to plan their attack strategy.

Record Keeping

The systematic creation, maintenance, and disposal of records documenting data processing activities as required by privacy regulations.

Records Management

The systematic control of records throughout their lifecycle from creation through maintenance, use, and disposition according to retention policies.

Records of Processing Activities

Documentation maintained by data controllers and processors listing all categories of data processing activities, purposes, data types, and safeguards.

Records of Processing Activities (ROPA)

Documentation required under GDPR Article 30 that describes the personal data processing activities carried out by an organisation. ROPAs must include purposes, data categories, recipients, transfers, retention periods, and security measures.

Recovery Capability

An organization's ability to restore operations within defined timeframes using available resources, plans, and procedures.

Recovery Exercise

A planned test of recovery procedures to verify that systems and data can be restored within defined timeframes and objectives.

Recovery Point Objective

The maximum acceptable amount of data loss measured in time, determining how frequently data backups or replication must occur.

Recovery Priority

The ranking of business functions and systems based on their criticality, determining the order in which they should be restored after a disruption.

Recovery Strategy

The selected approach for recovering critical business functions and IT systems after a disruption, based on recovery time and cost analysis.

Recovery Testing

The verification that backup data and disaster recovery procedures can successfully restore systems and data within defined timeframes.

Recovery Time Objective

The maximum acceptable duration for restoring a business function or IT system after a disruption before unacceptable consequences occur.

Rectification Right

The right of individuals to have inaccurate personal data corrected and incomplete data completed by the data controller.

Red Team

A group of security professionals authorised to simulate real-world attacks against an organisation to test its defences. Red team exercises are more comprehensive than penetration tests and evaluate people, processes, and technology holistically.

Red Team Assessment

A comprehensive, goal-oriented security engagement that simulates real-world attacks to test an organization's detection and response capabilities.

Redaction

The process of removing or obscuring sensitive personal information from documents or datasets before sharing or publication.

Redundancy

The duplication of critical components or functions of a system with the intention of increasing reliability. In security, redundancy ensures that the failure of one component does not result in a complete system failure.

Regional Privacy Regulation

Data protection laws specific to a geographic region that impose requirements on organizations processing personal data of residents in that region.

Regulatory Audit

An examination conducted by or on behalf of a regulatory body to verify compliance with applicable laws, regulations, and industry standards.

Regulatory Body

A government or independent authority responsible for creating, implementing, and enforcing regulations within a specific industry or jurisdiction.

Regulatory Change

A modification to existing regulations or introduction of new regulations that may affect an organization's compliance obligations.

Regulatory Change Management

Processes for monitoring, assessing, and implementing changes to regulations and compliance requirements that affect an organization.

Regulatory Compliance

The process of adhering to laws and regulations relevant to an organisation's operations. Non-compliance can result in fines, legal action, and reputational damage.

Regulatory Compliance Audit

An examination specifically focused on verifying adherence to applicable laws, regulations, and regulatory standards.

Regulatory Compliance Management

The systematic approach to identifying, implementing, monitoring, and reporting on compliance with all applicable regulations.

Regulatory Filing

The submission of required documents, reports, and disclosures to regulatory authorities within prescribed deadlines and formats.

Regulatory Framework

The system of rules and guidelines established by regulatory bodies that organizations must follow in their operations and practices.

Regulatory Impact Assessment

An analysis of the potential effects of proposed regulations on businesses, individuals, and the economy before they are enacted.

Regulatory Investigation

A formal inquiry by a data protection authority into an organization's data processing practices following a complaint, breach, or routine oversight.

Regulatory Landscape

The overall environment of laws, regulations, and standards that affect an organization's operations, varying by industry and jurisdiction.

Regulatory Penalty

A financial or operational sanction imposed by a regulatory body on an organization for failing to comply with applicable requirements.

Regulatory Reporting

The process of preparing and submitting mandated reports to regulatory authorities demonstrating compliance and providing required disclosures.

Regulatory Risk

The potential impact on an organization from changes in laws and regulations that could affect its operations, profitability, or market position.

Regulatory Sandbox

A framework established by regulators that allows businesses to test innovative products, services, or business models in a controlled environment with reduced regulatory requirements.

Regulatory Technology

Technology solutions (RegTech) that help organizations efficiently comply with regulations through automation, data analytics, and real-time monitoring.

Release Management

The process of planning, scheduling, and controlling software deployments to production environments while maintaining service quality.

Remediation

The process of correcting identified deficiencies, vulnerabilities, or non-conformities to bring systems or processes into compliance.

Remediation Evidence

Documentation proving that corrective actions for audit findings or compliance gaps have been successfully implemented.

Remediation Plan

A documented plan of action for addressing identified compliance gaps, audit findings, or security vulnerabilities. Remediation plans include specific actions, owners, timelines, and priorities for closing each identified gap.

Remediation Tracking

The process of monitoring and managing the progress of vulnerability fixes from identification through verification of successful remediation.

Remediation Verification

Testing performed after vulnerability fixes are applied to confirm that the vulnerabilities have been successfully addressed without introducing new issues.

Remote Access

Technology and processes enabling authorized users to connect to organizational networks and resources from external locations securely.

Remote Access Security

Controls and technologies for securing connections from remote users and devices to organizational networks and resources, including VPN and zero trust approaches.

Remote Access VPN

A virtual private network that allows individual users to connect to a private network from a remote location over the internet. Remote access VPNs encrypt all traffic between the user's device and the corporate network.

Remote Browser Isolation

A security technology that executes web browsing activity in a remote environment, preventing web-based threats from reaching the user's local device.

Remote Monitoring

The continuous observation of systems and networks from a remote location using automated tools and managed security services.

Remote Wipe

The capability to remotely delete all data from a lost or stolen mobile device to prevent unauthorized access to sensitive information.

Replay Attack

A network attack in which a valid data transmission is maliciously repeated or delayed. The attacker intercepts data and retransmits it at a later time to gain unauthorised access or duplicate a transaction.

Reporting Obligation

A legal or regulatory requirement to disclose specific information to authorities, stakeholders, or the public within defined timeframes.

Reputational Risk

The potential for damage to an organization's public image and stakeholder trust resulting from negative events, actions, or perceptions.

Residual Risk

The risk that remains after controls have been applied. If residual risk exceeds the organisation's risk appetite, additional controls or risk treatment is required.

Resilience

The ability of an organization, system, or process to withstand disruptions, adapt to changing conditions, and recover quickly to maintain operations.

Resource Management

The efficient and effective deployment of an organization's resources including personnel, budget, technology, and facilities.

Responsible AI

The practice of developing and deploying AI systems in a manner that is ethical, transparent, accountable, and aligned with human values and societal norms. Responsible AI encompasses fairness, privacy, safety, and sustainability.

Responsible Disclosure

A security vulnerability reporting practice where researchers privately inform the affected vendor and allow time for patching before public disclosure.

Restricted Area

A designated zone within a facility where access is limited to authorized personnel only, requiring enhanced security controls.

Restriction of Processing

The right of individuals to request that a controller limit the processing of their personal data under certain circumstances defined in privacy law.

Retail Compliance

Regulatory requirements for retail businesses including consumer protection, payment security, product safety, and data privacy.

Retention Schedule

A documented timetable specifying how long different categories of personal data should be retained before secure disposal or anonymization.

Return on Security Investment

A metric that quantifies the financial benefit of security investments relative to their cost, supporting budget justification.

Reverse Engineering

The process of analyzing software, hardware, or protocols to understand their design and functionality, used in security research and malware analysis.

Right to Access

A data subject right to obtain confirmation of whether personal data concerning them is being processed and to receive a copy of that data.

Right to Explanation

The right of individuals to receive a meaningful explanation of the logic behind automated decisions that significantly affect them.

Right to Object

The right of data subjects under GDPR Article 21 to object to processing of their personal data based on legitimate interests or public interest grounds. When exercised for direct marketing purposes, the controller must stop processing immediately.

Right to Restriction

The data subject's right to limit how an organization processes their personal data under specified circumstances while the data is retained.

Right to be Forgotten

The right of individuals to request the erasure of their personal data under certain circumstances. Established under GDPR Article 17, also known as the right to erasure, it applies when data is no longer necessary, consent is withdrawn, or processing is unlawful.

Risk Acceptance

A conscious decision to acknowledge and tolerate a specific risk without additional mitigation when the cost of treatment exceeds the potential impact.

Risk Aggregation

The process of combining individual risks to understand their cumulative effect and total exposure across the organization.

Risk Analysis

The systematic examination of risk components including threat sources, vulnerabilities, likelihood, and potential impact to understand and characterize risk.

Risk Appetite

The amount and type of risk an organisation is willing to accept in pursuit of its objectives. Set by the board and communicated throughout the organisation.

Risk Appetite Statement

A formal document expressing the board-approved levels and types of risk an organization is willing to accept in pursuit of its objectives.

Risk Assessment

The process of identifying, analysing, and evaluating risks. Includes identifying assets and threats, assessing likelihood and impact, and determining risk treatment options.

Risk Assessment Methodology

The defined approach and procedures used to identify, analyze, and evaluate risks in a consistent and repeatable manner.

Risk Avoidance

A risk treatment strategy that eliminates a risk entirely by choosing not to engage in the activity or process that gives rise to the risk.

Risk Based Auditing

An audit approach that prioritizes areas for examination based on risk assessment results, focusing resources on the highest-risk areas.

Risk Capacity

The maximum amount of risk an organization can absorb before it threatens its continued viability and ability to achieve core objectives.

Risk Catalog

A comprehensive inventory of identified risks organized by category, including descriptions, owners, ratings, and treatment plans.

Risk Committee

A committee of the board of directors responsible for overseeing the organisation's risk management framework, policies, and risk appetite. Risk committees are required or recommended by banking regulations and corporate governance codes.

Risk Communication

The exchange of information about risks between decision-makers, stakeholders, and affected parties to support informed risk-based decisions.

Risk Concentration

The accumulation of exposure to a single risk factor, counterparty, or geographic area that could result in significant losses.

Risk Correlation

The statistical relationship between different risks that determines whether they tend to occur together or independently.

Risk Criteria

The benchmarks and thresholds used by an organization to evaluate the significance of identified risks and determine appropriate responses.

Risk Culture

The shared values, beliefs, knowledge, and attitudes within an organization that influence how risks are identified, assessed, and managed.

Risk Dashboard

A visual display that presents key risk metrics, indicators, and status information to management for real-time risk monitoring and decision support.

Risk Decomposition

The process of breaking down complex risks into smaller, more manageable components for detailed analysis and treatment.

Risk Escalation

The process of reporting risks that exceed defined thresholds to higher levels of management or governance for decision-making and action.

Risk Event

An occurrence or change in circumstances that has a negative impact on the achievement of organizational objectives.

Risk Exception

A formal approval to accept a risk that exceeds normal tolerance levels, typically requiring senior management or board authorization.

Risk Exposure

The degree to which an organization is vulnerable to a particular risk, typically measured by the potential loss and likelihood of occurrence.

Risk Framework

A structured approach that provides the principles, policies, and processes for managing risk consistently across an organization.

Risk Governance

The organizational structures, policies, and processes that direct and control risk management activities across the enterprise.

Risk Heat Map

A visual representation of risks plotted on a matrix with likelihood on one axis and impact on the other. Risk heat maps use colour coding (typically red, amber, green) to highlight the most significant risks.

Risk Identification

The process of finding, recognizing, and describing risks that could affect the achievement of organizational objectives.

Risk Indicator

A measurable variable that signals changes in risk exposure and helps organizations monitor their risk profile over time.

Risk Intelligence

The capability to gather, analyze, and act upon information about risks to make better-informed decisions about risk management.

Risk Interdependency

The relationship between risks where the occurrence or treatment of one risk affects the likelihood or impact of another.

Risk Landscape

The overall picture of an organization's risk environment, including the types, sources, and interconnections of risks it faces.

Risk Management Framework

A set of components that provide the foundations and organizational arrangements for designing, implementing, and improving risk management.

Risk Management Plan

A documented plan describing how risk management activities will be structured, resourced, and performed throughout a project or program.

Risk Management Policy

A formal statement of an organization's intentions and direction regarding risk management, established by senior leadership.

Risk Management Process

The systematic application of policies, procedures, and practices to activities of communicating, consulting, establishing context, and managing risk.

Risk Materiality

The significance of a risk in terms of its potential impact on the organization's objectives, financial statements, or operations.

Risk Matrix

A tool used in risk assessment that maps identified risks on a grid based on their likelihood and impact to determine priority levels.

Risk Metric

A quantifiable measure used to track and communicate the level of risk exposure and the effectiveness of risk management activities.

Risk Mitigation

Actions taken to reduce the likelihood or impact of an identified risk to an acceptable level through implementing controls or other measures.

Risk Monitoring

The continuous tracking and review of risk levels, control effectiveness, and risk indicators to detect changes in the risk environment.

Risk Opportunity

A potential event or condition that, if it occurs, would have a positive effect on one or more organizational objectives.

Risk Optimization

The process of balancing risk reduction measures with their costs and benefits to achieve the most efficient risk management approach.

Risk Owner

The individual or team accountable for managing a specific risk, including implementing risk treatment plans and monitoring risk levels. Risk ownership ensures clear accountability for risk management activities.

Risk Perception

How stakeholders subjectively view and interpret risk, which may differ from objective risk assessments and influence decision-making.

Risk Prioritization

The ranking of identified risks based on their assessed severity to determine the order in which they should be addressed.

Risk Profile

A comprehensive description of an organization's overall risk exposure, including the types, levels, and distribution of risks across the enterprise.

Risk Quantification

The process of assigning numerical values to risk factors including probability, impact, and exposure to enable objective comparison and prioritization.

Risk Rating

A classification assigned to a vulnerability or finding that indicates its severity and potential impact, guiding prioritization of remediation efforts.

Risk Reduction

Actions taken to decrease the probability or impact of a risk event through the implementation of controls and other mitigation measures.

Risk Register

A documented inventory of identified risks, their assessments, treatment plans, and current status. A key tool in enterprise risk management.

Risk Reporting

The communication of risk information to stakeholders through reports that summarize risk levels, trends, incidents, and the status of mitigation activities.

Risk Response

The selection and implementation of options for addressing risk, including avoidance, reduction, sharing, transfer, or acceptance.

Risk Retention

A deliberate decision to accept the burden of loss from a particular risk, typically when the cost of mitigation exceeds the expected loss.

Risk Review

A periodic assessment of the risk landscape, control effectiveness, and risk management processes to ensure they remain current and effective.

Risk Scenario

A description of a possible sequence of events that could lead to an adverse outcome, used for risk assessment and contingency planning.

Risk Scoring

A methodology for assigning numerical values to risks based on defined criteria, enabling consistent comparison and prioritization across the organization.

Risk Sharing

A risk treatment strategy where the risk is shared with another party, such as through joint ventures, partnerships, or outsourcing arrangements.

Risk Source

An element that alone or in combination with other elements has the potential to give rise to a risk event.

Risk Statement

A structured description of a risk that clearly identifies the risk source, the event, and its potential consequences.

Risk Taxonomy

A classification system that categorizes risks into a hierarchical structure of risk types and sub-types for consistent identification and reporting.

Risk Threshold

A predefined level of risk at which specific actions must be taken, such as escalation to management or implementation of additional controls.

Risk Tolerance

The acceptable level of variation an organisation is willing to tolerate around specific risk objectives. Risk tolerance provides specific, measurable thresholds that translate the broader risk appetite into operational guidance.

Risk Transfer

A risk treatment strategy that shifts the financial impact of a risk to another party, typically through insurance policies or contractual arrangements.

Risk Treatment

The process of selecting and implementing measures to modify risk. Options include: mitigate (reduce), accept (retain), avoid (eliminate), or transfer (share) the risk.

Risk Treatment Option

The different approaches available for addressing a risk, including avoidance, reduction, sharing, transfer, and acceptance.

Risk Treatment Plan

A documented plan specifying the actions, resources, timelines, and responsibilities for implementing risk treatment measures.

Risk Trend Analysis

The examination of risk data over time to identify patterns, emerging risks, and changes in the risk environment.

Risk Velocity

The speed at which a risk event could impact an organization after it occurs, influencing the urgency of response preparations.

Risk-Based Approach

A methodology that prioritises compliance activities and control implementation based on the level of risk they address. Risk-based approaches are central to ISO 27001, NIST CSF, GDPR, and most modern compliance frameworks.

Risk-Based Audit Planning

An approach to audit planning that prioritizes areas for review based on risk assessment results and organizational risk appetite.

Risk-Based Authentication

An adaptive authentication approach that adjusts security requirements based on the assessed risk level of a login attempt, considering factors like location and device.

Risk-Based Security

An approach to security that prioritizes investments and efforts based on the level of risk to the organization rather than applying uniform controls.

Robotic Process Automation

Software technology that uses bots to automate repetitive, rule-based tasks across applications, requiring governance for access control and audit trails.

Robotic Process Automation (RPA)

The use of software robots to automate repetitive, rule-based tasks typically performed by humans. RPA in compliance can automate evidence collection, control testing, report generation, and data entry tasks.

Rogue Access Point

An unauthorized wireless access point installed on a network that can enable unauthorized network access or serve as a launch point for attacks.

Role Engineering

The process of defining roles and their associated access permissions based on job functions, responsibilities, and the principle of least privilege.

Role Mining

The analysis of existing user access patterns to discover and define roles for implementation in role-based access control systems.

Role-Based Access Control

An access management approach that assigns permissions to defined roles rather than individual users, simplifying administration and enforcing least privilege.

Role-Based Access Control (RBAC)

An access control method that assigns permissions to users based on their role within an organisation rather than their individual identity. RBAC simplifies access management by grouping permissions into roles aligned with job functions.

Roles and Responsibilities

Clear definitions of what each position or team is expected to do, their authority levels, and their accountability relationships within an organization.

Root Cause Analysis

A systematic process for identifying the fundamental causes of problems, nonconformities, or incidents. Root cause analysis ensures that corrective actions address underlying issues rather than symptoms.

Rootkit

Malicious software designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. Rootkits operate at the operating system level.

Router Security

Configuration and hardening measures applied to network routers to prevent unauthorized access, routing attacks, and information disclosure.

Rules of Engagement

Documented guidelines that define the scope, methods, timing, and constraints for authorized security testing activities.

Runbook

A documented set of standardized procedures and actions that guide operators in performing routine operations and responding to specific scenarios.

Runtime Application Self-Protection

A security technology embedded within an application that detects and blocks attacks in real time by monitoring the application's behavior from within.

S230 terms

S/MIME

Secure/Multipurpose Internet Mail Extensions, a standard for public key encryption and signing of email messages to ensure confidentiality, integrity, and authentication.

SAML

Security Assertion Markup Language, an XML-based standard for exchanging authentication and authorization data between identity providers and service providers.

SAML (Security Assertion Markup Language)

An open standard for exchanging authentication and authorisation data between parties, specifically between an identity provider and a service provider. SAML enables Single Sign-On across web applications.

SANS Institute

A leading organization for cybersecurity training, certification, and research that provides security education to practitioners worldwide.

SCAP

Security Content Automation Protocol, a suite of specifications for standardizing the format and nomenclature of security configuration and vulnerability information.

SCAP (Security Content Automation Protocol)

A suite of specifications standardised by NIST that enables automated vulnerability management, measurement, and policy compliance evaluation. SCAP provides a common language for expressing security-related information.

SD-WAN Security

Security features and controls integrated into Software-Defined Wide Area Networks including encryption, segmentation, and threat detection.

SEC Cybersecurity Disclosure

US Securities and Exchange Commission rules requiring public companies to disclose material cybersecurity incidents and describe their risk management programs.

SIEM (Security Information and Event Management)

A technology platform that aggregates and analyses log data from across an organisation's IT infrastructure to detect security threats and support incident response.

SLA (Service Level Agreement)

A commitment between a service provider and customer that defines the expected level of service. Cloud SLAs specify metrics such as uptime percentage, response times, data durability, and remedies for non-compliance.

SNMP Security

Security measures for the Simple Network Management Protocol including SNMPv3 authentication, encryption, and access control configuration.

SOAR

Security Orchestration, Automation and Response platforms that combine security tool integration, workflow automation, and case management for efficient incident handling.

SOC 1

An AICPA audit report on controls at a service organisation relevant to user entities' financial reporting. Available as Type I (design only) or Type II (design and operating effectiveness).

SOC 1 Report

A System and Organization Controls report that addresses internal controls relevant to a service organization's clients' financial reporting.

SOC 2

An AICPA audit report based on the Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. The most common assurance report for technology service providers.

SOC 2 Report

A System and Organization Controls report that evaluates a service organization's controls relevant to security, availability, processing integrity, confidentiality, and privacy.

SOC 2 Type II for Cloud

A SOC 2 Type II report that specifically evaluates the security, availability, processing integrity, confidentiality, and privacy controls of a cloud service provider over a period of time. Cloud customers increasingly require SOC 2 Type II from their providers.

SOC 3

A publicly available summary report based on the same Trust Services Criteria as SOC 2. SOC 3 reports provide a general overview of the service organisation's controls without the detailed testing results included in SOC 2 reports.

SOC 3 Report

A general-use report that provides a summary of a service organization's SOC 2 examination results for public distribution without detailed control descriptions.

SOC Analyst

A security operations center professional who monitors security tools, triages alerts, and performs initial investigation of potential security incidents.

SOC Maturity

The level of capability and effectiveness of a Security Operations Center, assessed across people, processes, and technology dimensions.

SOC for Cybersecurity

An AICPA framework that enables organisations to communicate useful information about the effectiveness of their cybersecurity risk management programmes. SOC for Cybersecurity reports are designed for a broad audience including boards and investors.

SOX (Sarbanes-Oxley Act)

A US federal law (2002) requiring public companies to establish and maintain internal controls over financial reporting. SOX Section 404 requires management assessment of internal controls.

SOX Compliance

Adherence to the requirements of the Sarbanes-Oxley Act, particularly regarding financial reporting accuracy, internal controls, and auditor independence.

SOX Section 302

A provision of the Sarbanes-Oxley Act that requires the CEO and CFO to personally certify the accuracy of financial reports and the effectiveness of internal controls. Certification carries personal criminal liability for knowing violations.

SOX Section 404

A provision of the Sarbanes-Oxley Act that requires management and external auditors to assess and report on the adequacy of internal controls over financial reporting. Section 404 compliance is one of the most costly aspects of SOX.

SQL Injection

A web security vulnerability that allows an attacker to interfere with the queries an application makes to its database. SQL injection can be used to view, modify, or delete data and in some cases gain complete control of the database server.

SSH

Secure Shell, a cryptographic network protocol for secure remote login, command execution, and file transfer between computers over unsecured networks.

SSL Certificate

A digital certificate that authenticates a website's identity and enables encrypted connections using TLS, displayed as the padlock icon in web browsers.

SSL Inspection

The process of intercepting and decrypting SSL/TLS encrypted traffic for security analysis before re-encrypting and forwarding it to its destination.

SSL/TLS Certificate

A digital certificate that authenticates a website's identity and enables an encrypted connection. TLS (Transport Layer Security) is the successor to SSL (Secure Sockets Layer) and is essential for protecting data in transit.

SaaS Security

Security measures for protecting data and access in Software as a Service applications, including identity management, data encryption, and activity monitoring.

Safe Harbor

Legal provisions that protect organizations from liability or penalties when they have acted in good faith compliance with specified requirements.

Sampling

The process of selecting a subset of items from a population for testing or examination. In auditing, sampling methods include statistical sampling, judgmental sampling, and attribute sampling.

Sanctions Compliance

Programs and controls ensuring adherence to government-imposed trade and financial restrictions against specific countries, entities, and individuals.

Sandbox

An isolated testing environment that enables users to run programs or execute code without affecting the rest of the system. In security, sandboxes are used to safely analyse suspicious files and malware.

Sandboxing

A security technique that isolates running programs or processes in a restricted environment to prevent them from affecting other parts of the system.

Sarbanes-Oxley Act

US federal law establishing auditing and financial regulation requirements for public companies to protect shareholders from fraudulent financial reporting.

Sarbanes-Oxley Act (SOX)

US federal law enacted in 2002 that mandates strict financial reporting and internal control requirements for publicly traded companies. SOX Section 404 requires management assessment of internal controls over financial reporting.

Satellite Security

Security measures for protecting satellite communications, ground systems, and space-based assets from interference, jamming, and cyber attacks.

Scan Policy

Configuration settings that define the scope, depth, and checks performed during automated vulnerability scanning.

Scenario Analysis

A process of analyzing possible future events by considering alternative plausible risk scenarios and their potential impacts on the organization.

Schrems II

The 2020 ruling by the Court of Justice of the European Union that invalidated the EU-US Privacy Shield and imposed additional obligations on organisations using Standard Contractual Clauses for international data transfers.

Scope Statement

A document that defines the boundaries and applicability of a management system, audit, or compliance programme. The scope statement specifies which organisational units, processes, locations, and information assets are included.

Second-Party Audit

An audit conducted by an organization on its suppliers, vendors, or partners to verify compliance with contractual requirements and standards.

Secrets Management

Tools and practices for securely storing, distributing, and rotating sensitive credentials such as API keys, passwords, and certificates in cloud environments.

Sector-Specific Regulation

Regulatory requirements that apply specifically to organizations within a particular industry sector such as healthcare, finance, or energy.

Sectoral Regulation

Regulations that apply specifically to particular industries or sectors, imposing specialized compliance requirements beyond general laws.

Secure Access Service Edge

A cloud-delivered architecture that combines network security functions with WAN capabilities to support dynamic secure access for distributed organizations.

Secure Area

A physically protected space with access controls and monitoring designed to safeguard sensitive information, equipment, or operations.

Secure Boot

A security standard that ensures a device boots using only software trusted by the manufacturer, preventing rootkits and boot-level malware from loading.

Secure Coding

The practice of writing software code that is resistant to security vulnerabilities. Secure coding practices include input validation, output encoding, proper error handling, and following guidelines such as the OWASP Secure Coding Practices.

Secure Configuration

The process of implementing security settings and hardening measures on systems and devices according to established security baselines and benchmarks.

Secure Delete

The thorough removal of data from storage so it cannot be recovered using standard data recovery techniques.

Secure Destruction

The complete and irreversible elimination of data and storage media through approved methods such as shredding, incineration, or degaussing.

Secure Development Lifecycle

A process that integrates security practices and testing throughout every phase of software development, from design through deployment and maintenance.

Secure Disposal

The process of safely destroying or sanitizing assets and media containing sensitive information when they are no longer needed.

Secure File Transfer

Protocols and methods for transmitting files between systems with encryption and authentication, such as SFTP, FTPS, and SCP.

Secure Multiparty Computation

A cryptographic technique allowing multiple parties to jointly compute a function over their inputs while keeping those inputs private.

Secure Socket Layer

A deprecated cryptographic protocol (succeeded by TLS) that provided encrypted communication between web browsers and servers to protect data in transit.

Secure Software Development Lifecycle (SSDLC)

An approach to software development that integrates security considerations at every phase of the development lifecycle, from requirements gathering through design, implementation, testing, deployment, and maintenance.

Secure by Design

An approach to product development that integrates security considerations from the earliest design phases rather than adding them after development.

Securities Regulation

Laws governing the issuance and trading of securities, requiring disclosure, fair dealing, and protection of investors.

Security Alert

A notification generated by security tools or systems indicating a potential security threat, policy violation, or anomalous activity.

Security Analyst

A cybersecurity professional who monitors, analyzes, and investigates security events and incidents to protect organizational assets.

Security Architecture

The design artefacts that describe how security controls are positioned and relate to the overall IT architecture. Security architecture provides a structured approach to designing, implementing, and maintaining security across an organisation.

Security Architecture Framework

A comprehensive model for designing and implementing security controls across an organization's technology environment.

Security Architecture Review

An assessment of an organization's security architecture to identify design weaknesses and verify alignment with security requirements and best practices.

Security Assertion

A statement or claim made by an identity provider about a user's authentication status, attributes, or authorization, used in federated identity systems.

Security Assessment

A comprehensive evaluation of an organization's security posture including vulnerability assessment, penetration testing, and policy review.

Security Automation

The use of technology to perform security tasks with minimal human intervention, including automated scanning, patching, incident response, and compliance monitoring.

Security Awareness

The knowledge and understanding that employees have about cybersecurity threats and their role in protecting organizational information assets.

Security Awareness Program

A structured initiative to build and maintain employee knowledge about cybersecurity risks, policies, and best practices through ongoing education.

Security Awareness Training

Educational programmes designed to teach employees about security risks and best practices. Training covers topics such as phishing recognition, password hygiene, data handling, and incident reporting. Required by ISO 27001, HIPAA, PCI DSS, and NIST CSF.

Security Baseline

A set of minimum security standards and configurations that all systems within an organisation must meet. Security baselines provide a consistent foundation for security across the environment and are often based on CIS Benchmarks or vendor hardening guides.

Security Baseline Assessment

An evaluation comparing an organization's current security posture against established baseline security requirements.

Security Behavior

The actions and habits of individuals related to information security, influenced by awareness, training, culture, and organizational policies.

Security Benchmark

A documented standard of security configuration best practices for specific technologies, used to assess and harden system configurations.

Security Certification

A formal credential awarded to individuals or organizations demonstrating competency in specific areas of information security.

Security Champion

An employee in a non-security role who advocates for security practices within their team, serving as a bridge between security and business functions.

Security Clearance

An authorisation granted to individuals allowing them access to classified information after completing a background investigation. Security clearance levels typically include Confidential, Secret, and Top Secret.

Security Committee

A governance body composed of representatives from various departments responsible for overseeing the organization's security strategy and policies.

Security Compliance

The adherence to security-related laws, regulations, standards, and organizational policies governing the protection of information assets.

Security Configuration

The specific settings and parameters applied to systems and applications to implement security controls and reduce vulnerabilities.

Security Control Assessment

The evaluation of security controls to determine their effectiveness in protecting information systems and meeting security requirements.

Security Control Framework

An organized collection of security controls structured to help organizations manage cybersecurity risk systematically.

Security Controls

Safeguards or countermeasures designed to protect the confidentiality, integrity, and availability of information systems and data. Controls can be technical (encryption, firewalls), administrative (policies, training), or physical (locks, cameras).

Security Culture

The collective attitudes, beliefs, and behaviors within an organization regarding the importance and practice of information security.

Security Culture Assessment

An evaluation of the collective security attitudes, beliefs, and behaviors within an organization to identify strengths and areas for improvement.

Security Dashboard

A visual display providing real-time visibility into an organization's security posture, including alerts, metrics, and threat intelligence.

Security Debt

The accumulation of security issues, deferred patches, and technical shortcuts that increase an organization's risk exposure over time.

Security Engineering

The discipline of designing and building systems that remain dependable in the face of malicious actions, errors, and accidents.

Security Event

An observable occurrence in a system or network that may have security implications, such as a failed login attempt or configuration change.

Security Exception Process

A formal procedure for requesting, reviewing, approving, and tracking deviations from security policy requirements.

Security Framework

A structured approach to managing cybersecurity risk through organized policies, procedures, and controls based on industry best practices.

Security Gap

A deficiency in an organization's security posture where expected or required security controls are absent or insufficient.

Security Governance

The set of responsibilities and practices exercised by the board and executive management to provide strategic direction and oversight for information security.

Security Governance Framework

A comprehensive structure for directing and controlling an organization's security activities, ensuring alignment with business objectives and risk appetite.

Security Header

HTTP response headers that instruct browsers to enforce security policies, including Content-Security-Policy, X-Frame-Options, and Strict-Transport-Security.

Security Incident

An event that actually or potentially compromises the confidentiality, integrity, or availability of information or information systems.

Security Incident Management

The systematic approach to identifying, managing, recording, and analyzing security threats and incidents in an organized manner.

Security Incident Report

A formal document that describes a security incident including its discovery, impact, response actions, and recommendations for prevention.

Security Information and Event Management

A platform that aggregates and analyzes security log data from across an organization's infrastructure to provide real-time threat detection and compliance reporting.

Security Information and Event Management (SIEM)

A technology platform that aggregates and analyses log data from across an organisation's IT infrastructure to detect security threats, support compliance reporting, and facilitate incident investigation in real time.

Security Investment

Financial resources allocated to cybersecurity including technology, personnel, training, and compliance activities.

Security Log

A record of security-relevant events generated by operating systems, applications, and network devices for monitoring and audit purposes.

Security Management

The systematic planning, organizing, and controlling of activities to maintain the security of an organization's information assets.

Security Maturity Model

A framework for assessing and improving an organization's security capabilities across defined maturity levels from initial to optimized.

Security Metrics

Quantifiable measurements used to assess the effectiveness of security controls, the maturity of security programs, and organizational risk levels.

Security Monitoring

The continuous observation and analysis of an organization's IT environment to detect security events, threats, and anomalies in real time.

Security Officer

An individual responsible for implementing and maintaining the security policies and controls within an organization or business unit.

Security Operations

The day-to-day activities of monitoring, detecting, investigating, and responding to cybersecurity threats and incidents.

Security Operations Center

A centralized facility where security professionals monitor, detect, analyze, and respond to cybersecurity incidents using technology and defined processes.

Security Operations Centre (SOC)

A centralised facility and team responsible for monitoring, detecting, analysing, and responding to cybersecurity incidents on a 24/7 basis. SOC teams use SIEM, EDR, and other tools to maintain security visibility across the organisation.

Security Operations Management

The administration of day-to-day security activities including monitoring, incident response, vulnerability management, and threat intelligence.

Security Orchestration and Response

Technology that integrates security tools and automates incident response workflows to improve the speed and consistency of threat response.

Security Orchestration, Automation, and Response (SOAR)

Technologies that enable organisations to collect security threat data, automate incident response workflows, and coordinate security operations. SOAR platforms reduce response times and standardise incident handling procedures.

Security Perimeter

The boundary of the area where security controls are applied to protect internal resources from external threats.

Security Plan

A formal document that provides an overview of the security requirements for an information system and describes the controls in place.

Security Playbook

A collection of pre-defined response procedures for specific security scenarios that guide analysts through investigation and response steps.

Security Policy Compliance

The degree to which an organization's systems, processes, and personnel adhere to established security policies and standards.

Security Policy Framework

An organized hierarchy of security policies, standards, guidelines, and procedures that govern an organization's information security program.

Security Posture

The overall cybersecurity strength and readiness of an organization, encompassing its security controls, policies, awareness, and ability to detect and respond to threats.

Security Procedure

A detailed, step-by-step instruction for performing a specific security task or responding to a particular security event.

Security Program Assessment

A comprehensive evaluation of an organization's overall security program including governance, operations, and technical controls.

Security Program Management

The coordinated management of all security initiatives, projects, and operations to achieve organizational security objectives.

Security Rating

A data-driven measurement of an organization's cybersecurity performance and risk, often provided by third-party rating services.

Security Requirement

A condition or capability that a system must possess to satisfy a security policy, standard, or contractual obligation.

Security Review

An examination of systems, applications, or processes to identify security weaknesses and verify compliance with security requirements.

Security Risk Assessment

An evaluation that identifies threats to information assets, analyzes vulnerabilities, and determines the level of risk to guide security investment decisions.

Security Risk Management

The ongoing process of identifying, analyzing, evaluating, and treating risks to an organization's information security.

Security Scan

An automated assessment of systems, networks, or applications to identify known vulnerabilities, misconfigurations, and security weaknesses.

Security Standard

A documented set of specific, mandatory requirements for implementing security controls within an organization's environment.

Security Telemetry

Data collected from security tools, systems, and sensors that provides visibility into the security state of an organization's IT environment.

Security Testing

The process of evaluating the security of systems, applications, and networks through various testing methodologies to identify vulnerabilities.

Security Token

A physical or digital device used to authenticate a user's identity. Security tokens generate one-time passwords or cryptographic keys and are used as the 'something you have' factor in multi-factor authentication.

Security Training

Formal education programs that develop employee knowledge and skills in cybersecurity topics relevant to their roles and responsibilities.

Security Validation

The process of confirming that security controls meet specified security requirements and are effective in their intended environment.

Segregation of Duties

A governance control that requires more than one person to complete different parts of a task, preventing fraud and errors through shared responsibilities.

Segregation of Duties (SoD)

A key internal control that distributes critical tasks among multiple people to prevent any single individual from having the ability to commit fraud or errors without detection. SoD is a core requirement in SOX, COBIT, and financial services regulations.

Self-Assessment Questionnaire

A validation tool used by organizations to self-evaluate their compliance with specific standards such as PCI DSS for merchants and service providers.

Self-Assessment Questionnaire (SAQ)

A validation tool used by merchants and service providers to report the results of their PCI DSS self-assessment. There are multiple SAQ types depending on the organisation's cardholder data environment and processing methods.

Self-Service Password Reset

A capability allowing users to securely reset their own passwords through automated verification without requiring help desk assistance.

Sensitive Data Handling

Specialized procedures and enhanced security measures required for processing sensitive categories of personal data such as health, biometric, or genetic information.

Sensitive Information

Information that, if disclosed improperly, could cause harm to individuals or the organization, requiring enhanced protection measures.

Sensitive Personal Data

Categories of personal data that require enhanced protection due to their sensitive nature. Under GDPR, this includes racial or ethnic origin, political opinions, religious beliefs, trade union membership, genetic data, biometric data, health data, and data concerning sex life or sexual orientation.

Sensitivity Analysis

An analytical technique that determines how variations in input variables affect outcomes, helping identify which risk factors have the greatest impact.

Separation of Duties

A security principle that divides critical tasks among multiple individuals to prevent fraud, error, and misuse by ensuring no single person controls all aspects of a process.

Server Room Security

Physical and environmental security measures specifically designed to protect server rooms and network closets from unauthorized access and environmental threats.

Serverless Security

The security practices and considerations specific to serverless computing architectures (Functions as a Service). Serverless security focuses on function permissions, input validation, dependency management, and event injection prevention.

Service Account

A non-human account used by applications, services, and automated processes to authenticate and interact with other systems and services.

Service Account Management

The governance and security of non-human accounts including lifecycle management, credential rotation, and privilege minimization.

Service Catalog

A organized collection of IT services offered by an organization, including descriptions, service levels, and ownership information.

Service Continuity Plan

A plan for ensuring the continuity of critical services during disruptions, including alternate delivery methods and recovery procedures.

Service Level Agreement

A contract between a service provider and customer that defines the expected level of service, performance metrics, and remedies for non-compliance.

Service Level Agreement (SLA)

A contract between a service provider and customer that defines the expected level of service, including availability, response times, and responsibilities. SLAs establish measurable performance targets and consequences for non-compliance.

Service Level Management

The ITIL practice of setting clear business-based targets for service levels and ensuring that delivery of services is properly assessed, monitored, and managed against these targets.

Service Mesh Security

Security capabilities built into service mesh architectures for microservices, including mutual TLS, policy enforcement, and observability.

Service Organisation Control (SOC)

A suite of audit reports developed by the AICPA that address controls at a service organisation. SOC 1 covers financial reporting controls; SOC 2 covers security, availability, processing integrity, confidentiality, and privacy; SOC 3 is a public version of SOC 2.

Service Provider Assessment

An evaluation of a service provider's security controls, compliance status, and risk profile before engaging them for services.

Session Hijacking

An attack in which an attacker takes over a valid user's web session by stealing or predicting the session token. Session hijacking gives the attacker the same privileges as the legitimate user.

Session Management

The process of handling user sessions securely, including session creation, token generation, timeout enforcement, and proper session termination.

Session Token

A unique identifier issued to a user after successful authentication, used to maintain their authenticated state across subsequent requests.

Shadow AI

The use of AI tools, models, or services by employees without the knowledge or approval of the IT or governance team. Shadow AI creates risks around data privacy, security, intellectual property, and regulatory compliance.

Shadow IT

Information technology systems and solutions used within an organisation without explicit approval from the IT department. Shadow IT creates security risks because these systems may not comply with security policies or be visible to security monitoring.

Shared Responsibility Model

A cloud security framework that delineates security obligations between the cloud service provider and the customer. The provider secures the infrastructure ('security of the cloud'), while the customer secures their data and configurations ('security in the cloud').

Shipping Compliance

Regulations governing shipping and logistics operations including customs requirements, hazardous materials handling, and trade compliance.

Shoulder Surfing

The practice of observing someone entering sensitive information such as passwords or PINs by looking over their shoulder or using visual aids.

Significant Deficiency

A control weakness that is less severe than a material weakness but important enough to merit attention from those responsible for oversight.

Simulated Attack

A controlled security exercise that mimics real attack techniques to test employee awareness and organizational response procedures.

Single Sign-On

An authentication scheme that allows users to access multiple applications and services with one set of login credentials, improving user experience and security.

Single Sign-On (SSO)

An authentication scheme that allows a user to log in with a single set of credentials to access multiple, independent software systems. SSO improves user experience while centralising authentication control.

Site Recovery

The process of restoring operations at a primary or alternate site following a disaster or major disruption.

Smart Contract

Self-executing code stored on a blockchain that automatically enforces the terms of an agreement when predefined conditions are met.

Smishing

A form of phishing that uses SMS text messages to trick recipients into clicking malicious links or providing sensitive information. Smishing exploits the trust users place in text messages.

Social Engineering

The psychological manipulation of people into performing actions or divulging confidential information. Social engineering attacks exploit human trust rather than technical vulnerabilities and include phishing, pretexting, and baiting.

Social Engineering Defense

Security controls and training designed to protect against manipulation techniques that exploit human psychology to gain unauthorized access.

Social Engineering Test

A controlled security assessment that evaluates an organization's human vulnerabilities through simulated phishing, pretexting, and other manipulation techniques.

Software Assurance

The level of confidence that software functions as intended, is free of vulnerabilities, and provides a required level of security.

Software Bill of Materials

A comprehensive inventory of all components, libraries, and dependencies used in a software application, supporting vulnerability management and supply chain security.

Software Bill of Materials (SBOM)

A comprehensive inventory of all components, libraries, and dependencies used in a software application. SBOMs enable organisations to identify and manage vulnerabilities in third-party and open-source software components.

Software Composition Analysis

Tools and processes that identify open-source components in software and detect known vulnerabilities, licensing issues, and outdated dependencies.

Software Supply Chain Security

Practices for protecting the integrity and security of software throughout its supply chain, from development through distribution and deployment.

Software Vulnerability

A weakness in software code that can be exploited by attackers to compromise the confidentiality, integrity, or availability of a system.

Source Code Analysis

The automated or manual review of application source code to identify security vulnerabilities, coding errors, and compliance violations.

Space Systems Security

Security measures for protecting satellite systems, ground control stations, and space-based infrastructure from cyber and physical threats.

Spear Phishing

A targeted phishing attack directed at a specific individual or organisation. Spear phishing emails are personalised using information gathered about the target to increase credibility and success rates.

Special Category Data

Personal data types that require additional protections under GDPR, including racial or ethnic origin, political opinions, religious beliefs, and health data.

Split Tunneling

A VPN configuration where only certain traffic is routed through the VPN tunnel while other traffic accesses the internet directly.

Spoofing

A technique where an attacker disguises their identity or the source of communication by falsifying data such as IP addresses, email headers, or caller IDs.

Stage 1 Audit

The initial phase of a certification audit that reviews documentation and readiness before proceeding to the full implementation assessment.

Stage 2 Audit

The second phase of a certification audit that evaluates the actual implementation and effectiveness of the management system.

Stakeholder Management

The process of identifying, analysing, and planning actions to engage with individuals or groups who have an interest in or influence over an organisation's projects, programmes, or compliance initiatives.

Standard Contractual Clauses

Pre-approved contractual terms adopted by the European Commission for international transfers of personal data to ensure adequate protection.

Standard Contractual Clauses (SCCs)

Pre-approved contractual terms issued by the European Commission that provide appropriate safeguards for the transfer of personal data from the EU to countries without an adequacy decision. SCCs were updated in June 2021.

Standard Operating Procedure

A documented set of step-by-step instructions for completing routine operations consistently, efficiently, and in compliance with standards.

Standards Body

An organization responsible for developing, publishing, and maintaining technical standards that define best practices for industries and professions.

State Privacy Laws

Data protection regulations enacted by individual US states to protect residents' personal information, each with varying requirements and rights.

Statement of Applicability (SoA)

A required ISO 27001 document listing all Annex A controls, indicating which are applicable, which are implemented, and justification for any exclusions.

Static Application Security Testing

A security testing methodology that analyzes source code, bytecode, or binary code for security vulnerabilities without executing the application.

Statutory Compliance

Adherence to requirements imposed by legislation enacted by a governing body, carrying the force of law.

Steering Committee

A governance body of senior stakeholders that provides strategic direction, oversight, and decision-making for major programs and initiatives.

Steganography

The practice of concealing information within other non-secret data, such as hiding a message within an image file. Unlike encryption, steganography aims to hide the existence of the communication rather than its content.

Step-Up Authentication

An authentication approach that requires additional verification when a user attempts to access higher-risk resources or perform sensitive operations.

Storage Limitation

The principle under GDPR Article 5(1)(e) that personal data should be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data is processed.

Storage Security

Security measures for protecting data storage systems and media including access controls, encryption, integrity verification, and secure disposal.

Strategic Planning

The process of defining an organization's direction and making decisions on allocating resources to pursue strategies aligned with its mission.

Strategic Risk

Risks that affect or are created by an organization's business strategy and strategic objectives, including market changes and competitive threats.

Stress Testing

The simulation of extreme but plausible scenarios to evaluate an organization's ability to withstand significant adverse events and maintain operations.

Sub-processor

A third party engaged by a data processor to carry out specific processing activities on behalf of the data controller.

Succession Planning

The process of identifying and developing future leaders and key personnel to ensure continuity of critical roles and organizational knowledge.

Supervisory Authority

An independent public authority established by an EU member state responsible for monitoring the application of GDPR within its territory. Supervisory authorities have investigative, corrective, and advisory powers.

Supplier Management

The processes for managing supplier relationships, performance, contracts, and risks throughout the lifecycle of supplier engagements.

Supply Chain Attack

A cyber attack that targets less secure elements in the supply chain to compromise a primary target. Supply chain attacks can involve inserting malicious code into legitimate software updates, compromising hardware during manufacturing, or exploiting third-party service providers.

Supply Chain Compliance

Requirements for ensuring that suppliers and partners throughout the supply chain adhere to applicable laws, standards, and contractual obligations.

Supply Chain Continuity

Planning and measures to maintain supply chain operations during disruptions, including alternative suppliers and logistics arrangements.

Supply Chain Risk

Risks arising from dependencies on suppliers and partners in the supply chain, including disruptions, quality issues, and security vulnerabilities.

Supply Chain Risk Management

The process of identifying, assessing, and mitigating risks arising from the extended network of suppliers, vendors, and service providers. Supply chain risk management is addressed by NIST CSF 2.0, ISO 27001 A.5.21, and NIST SP 800-161.

Supply Chain Security

Measures to protect the integrity of products and information throughout the supply chain from manufacturing through delivery to end users.

Surveillance Audit

A periodic audit conducted between certification and recertification to verify that a certified management system continues to meet the standard's requirements.

Surveillance Impact Assessment

An evaluation of the privacy implications of surveillance technologies and monitoring practices on individuals and communities.

Surveillance System

An integrated system of cameras, monitors, recording devices, and analytics used to monitor and record activities in and around facilities.

Suspicious Activity Report

A filing required by financial institutions when they detect known or suspected criminal activity or suspicious transactions that may indicate money laundering.

Suspicious Activity Reporting

The process by which employees report unusual or potentially malicious activities they observe to the security team for investigation.

Switch Security

Security features and configurations applied to network switches including port security, VLAN segmentation, and storm control.

Symmetric Encryption

An encryption method that uses the same key for both encrypting and decrypting data. Symmetric algorithms such as AES are fast and efficient but require secure key exchange between communicating parties.

Synthetic Data

Artificially generated data that mimics the statistical properties of real-world data without containing actual personal information. Synthetic data can be used for AI training and testing while preserving privacy.

System Hardening

The process of securing a system by reducing its attack surface through removing unnecessary software, closing unused ports, and applying security configurations.

System Recovery

The process of restoring an information system to operational status after a disruption, failure, or security incident.

Systemic Risk

The risk of widespread failure in a system, market, or industry that could trigger cascading effects across interconnected organizations.

T82 terms

TLS

Transport Layer Security, a cryptographic protocol that provides end-to-end encryption for data transmitted over networks, succeeding SSL.

TLS (Transport Layer Security)

A cryptographic protocol designed to provide communications security over a computer network. TLS encrypts data in transit between clients and servers and is used for securing web browsing, email, messaging, and VoIP.

TLS Inspection

The decryption and inspection of TLS-encrypted traffic at a security gateway to detect threats hidden within encrypted communications.

Tabletop Exercise

A discussion-based exercise where team members walk through simulated scenarios in a classroom setting. Tabletop exercises test incident response plans, business continuity procedures, and decision-making processes without activating real systems.

Tailgating

A physical security breach where an unauthorized person follows an authorized person through a secured entrance without presenting their own credentials.

Tailgating Prevention

Physical security measures and awareness training designed to prevent unauthorized individuals from following authorized personnel into secured areas.

Tamper Detection

Mechanisms that detect and alert on physical tampering with devices, enclosures, or seals protecting sensitive equipment or data.

Tape Encryption

The encryption of data written to backup tapes to protect the confidentiality of stored data if physical tapes are lost or stolen.

Tax Compliance

Adherence to tax laws and regulations governing the calculation, reporting, and payment of taxes to relevant authorities.

Technical Control

A security control implemented through technology such as firewalls, encryption, access controls, and intrusion detection systems.

Technology Governance

Policies and processes for managing technology investments, architecture decisions, and IT operations in alignment with business strategy and risk appetite.

Technology Recovery

The processes and procedures for restoring technology systems and infrastructure following a disruption or disaster.

Technology Risk

The potential for technology failures, obsolescence, security breaches, or misuse to adversely impact an organization's operations and objectives.

Technology Roadmap

A strategic plan that outlines the technology initiatives, milestones, and investments needed to support business objectives over a defined period.

Telecommunications Compliance

Regulatory requirements specific to telecommunications providers covering consumer protection, data retention, lawful interception, and network security.

Telecommunications Security

Security measures for protecting telecommunications infrastructure, networks, and services from cyber threats and unauthorized interception.

Temporary Access

Time-limited access permissions granted to users for specific tasks or projects, automatically expiring after a defined period.

Third-Party Assessment

An evaluation of a vendor or partner's security posture, compliance status, and risk profile conducted as part of vendor management.

Third-Party Assurance

Independent verification by an external party that an organisation's controls, processes, or systems meet specified criteria. SOC reports, ISO certifications, and penetration test reports are common forms of third-party assurance.

Third-Party Attestation

Independent verification by a qualified external party that an organization's controls or practices meet specified requirements.

Third-Party Audit

An independent audit conducted by an external organization to verify compliance with standards, regulations, or contractual requirements.

Third-Party Compliance

The requirement for vendors and partners to adhere to regulatory requirements and contractual security obligations.

Third-Party Cookies

Cookies set by domains other than the one a user is visiting, commonly used for cross-site tracking and advertising purposes.

Third-Party Data Sharing

The practice of providing personal data to external organizations, subject to contractual agreements, consent requirements, and regulatory restrictions.

Third-Party Risk

The potential threat to an organisation's data security and privacy posed by the actions or security posture of its vendors, partners, and service providers. Managing third-party risk is essential for GDPR compliance, particularly regarding data processors.

Third-Party Risk Management

The process of identifying, assessing, and managing risks associated with outsourcing to or partnering with external organisations. Includes vendor due diligence and ongoing monitoring.

Third-Party Risk Management (TPRM)

The process of identifying, assessing, and controlling risks presented throughout the lifecycle of relationships with third parties. TPRM programmes evaluate vendors' security posture, compliance status, and financial stability.

Threat Actor

An individual or group that conducts cyber attacks or exploits vulnerabilities. Threat actors include nation-states, organised crime groups, hacktivists, insider threats, and opportunistic attackers.

Threat Analysis

The process of examining threat sources, their capabilities, motivations, and historical patterns to understand the threat environment.

Threat Assessment

The process of evaluating potential threats to an organization by analyzing threat actors, their capabilities, intentions, and the likelihood of attack.

Threat Catalog

A documented inventory of relevant threats organized by category, including descriptions, associated vulnerabilities, and potential impacts.

Threat Detection

The process and technology used to identify malicious activity, policy violations, and other security threats within an organization's environment.

Threat Detection Rule

A defined pattern or condition in security monitoring systems that triggers an alert when matching events are observed.

Threat Emulation

The simulation of specific threat actor techniques and procedures to test whether security controls can detect and prevent known attack methods.

Threat Feed

A continuous stream of data providing information about current threats, indicators of compromise, and adversary tactics from external intelligence sources.

Threat Hunting

The proactive process of searching through networks and datasets to detect and isolate advanced threats that evade existing security solutions. Threat hunting combines human analyst expertise with automated detection tools.

Threat Hunting Methodology

Structured approaches for proactively searching for hidden threats in an environment, including hypothesis-driven, intelligence-driven, and analytics-driven methods.

Threat Identification

The process of recognizing and documenting potential threats that could exploit vulnerabilities and adversely affect organizational assets.

Threat Informed Defense

A security strategy that uses understanding of adversary behavior and threat intelligence to prioritize defensive measures and resource allocation.

Threat Intelligence

Evidence-based knowledge about existing or emerging threats, including context, mechanisms, indicators, and actionable advice. Used to inform security decisions.

Threat Intelligence Platform

A technology solution that collects, aggregates, and operationalizes threat intelligence from multiple sources to support security decision-making and response.

Threat Intelligence Platform (TIP)

A technology solution that collects, organises, and analyses threat intelligence data from multiple sources. TIPs enable security teams to understand the threat landscape and make informed decisions about defensive measures.

Threat Landscape

The current state of threats facing an organization or industry, including active threat actors, attack methods, and emerging attack trends.

Threat Landscape Analysis

A comprehensive assessment of the current and emerging threats facing an organization or industry, informing security strategy and priorities.

Threat Management

The ongoing process of identifying, evaluating, and responding to cybersecurity threats facing an organization.

Threat Modeling

A structured approach to identifying and prioritizing potential security threats to a system, application, or organization and defining countermeasures.

Threat Modelling

A structured approach for identifying, quantifying, and addressing security threats to a system or application. Threat modelling analyses potential attack vectors and helps prioritise security controls during the design phase.

Threat Register

A documented catalog of identified threats to an organization including their sources, capabilities, motivations, and historical activity patterns.

Threat Response

Actions taken to address and neutralize identified threats, including containment, eradication, and recovery activities.

Threat Vector

A path or means by which a threat actor can gain access to a target system to deliver a malicious payload or carry out an attack.

Threat and Vulnerability Management

An ongoing programme for identifying, evaluating, and addressing threats and vulnerabilities in an organisation's IT environment. Combines threat intelligence, vulnerability scanning, risk prioritisation, and remediation tracking.

Three Lines Model

A governance framework that assigns risk management responsibilities across three lines: operational management, risk oversight, and independent assurance.

Three Lines of Defence

A governance model that divides risk management responsibilities into three layers: first line (business operations and management controls), second line (risk management and compliance functions), and third line (internal audit).

Tier 1 Analyst

An entry-level SOC analyst responsible for monitoring security tools, performing initial alert triage, and escalating potential incidents.

Tier 2 Analyst

An experienced SOC analyst who performs deep-dive investigations of escalated incidents and conducts advanced threat analysis.

Tier 3 Analyst

A senior SOC analyst or threat hunter who handles the most complex incidents, performs threat hunting, and develops detection rules.

Time-Based One-Time Password

An algorithm that generates temporary passwords using the current time as a variable, commonly used in two-factor authentication applications.

Time-Based One-Time Password (TOTP)

A temporary passcode generated by an algorithm that uses the current time as one of its factors. TOTP is commonly used in multi-factor authentication applications such as Google Authenticator and Microsoft Authenticator.

Token-Based Authentication

An authentication method that uses digitally signed tokens instead of credentials for each request, enabling stateless and scalable access control.

Tokenisation

The process of replacing sensitive data with non-sensitive placeholder values (tokens) that have no exploitable meaning. Tokenisation is widely used in payment card processing to protect cardholder data and reduce PCI DSS scope.

Tokenization

A data security technique that replaces sensitive data with non-sensitive placeholder tokens that map back to the original data through a secure vault.

Tone at the Top

The ethical atmosphere that is created in the workplace by the organisation's leadership. The tone set by senior management and the board directly influences the organisation's culture, control environment, and compliance posture.

Top Risk

The most significant risks to an organization as determined through assessment processes, typically requiring board-level visibility and management attention.

Tracking Pixel

A tiny invisible image embedded in web pages or emails that monitors user activity such as page views, email opens, and conversions.

Trade Compliance

Adherence to laws and regulations governing international trade, including import/export controls, customs requirements, and trade sanctions.

Traffic Analysis

The examination of network communication patterns, volumes, and metadata to identify anomalies, security threats, or intelligence without necessarily reading content.

Traffic Shaping

Network management techniques that control the flow of network traffic to optimize performance and ensure quality of service for critical applications.

Transfer Impact Assessment

An evaluation of the risks to personal data when transferred to a third country, considering the legal framework and supplementary measures required.

Transnational Regulation

Regulatory frameworks that apply across multiple countries or jurisdictions, requiring organizations to comply regardless of where they are headquartered.

Transparency

The principle that individuals should be clearly informed about how their personal data is being collected, used, and processed. Transparency is a foundational principle of GDPR and requires clear, plain language in privacy communications.

Transparency Principle

A data protection requirement that personal data processing information be presented to individuals in a clear, accessible, and easily understandable manner.

Transparent Data Encryption

Database encryption that automatically encrypts data before writing to storage and decrypts when reading, without requiring application changes.

Transport Layer Security

A cryptographic protocol that secures communications over computer networks, widely used to protect web traffic, email, and other data transmissions.

Transportation Compliance

Regulations governing transportation operations including safety standards, environmental requirements, security mandates, and driver regulations.

Trojan Horse

Malicious software disguised as legitimate software. Trojans create backdoors in security systems, allowing attackers to gain unauthorised access to the compromised system.

Trust Boundary

A boundary in a system where the level of trust changes, requiring security controls to validate data and authorize access as information crosses between zones.

Trust Services Criteria

The five criteria used in SOC 2 audits: Security (required), Availability, Processing Integrity, Confidentiality, and Privacy. Organisations select which criteria apply.

Trustworthy AI

AI systems that are lawful, ethical, and robust throughout their lifecycle. The concept, promoted by the EU's High-Level Expert Group on AI, encompasses seven key requirements including human agency, technical robustness, privacy, transparency, diversity, societal wellbeing, and accountability.

Two-Factor Authentication

An authentication method that requires two different types of verification, such as a password and a one-time code, before granting access.

Two-Factor Authentication (2FA)

An authentication process that requires exactly two different factors to verify a user's identity. 2FA is a subset of multi-factor authentication and typically combines a password with a mobile device verification.

Type I Report

An audit report that describes an organization's system and the suitability of control design at a specific point in time.

Type II Report

An audit report that evaluates both the design and operating effectiveness of controls over a specified period, typically six to twelve months.

U14 terms

URL Filtering

A security control that blocks or allows access to websites based on their URL classification, preventing users from visiting malicious or policy-violating sites.

Unified Compliance Framework

An approach that maps and consolidates requirements from multiple compliance standards into a single integrated control set.

Unified Compliance Framework (UCF)

A comprehensive database that maps and harmonises controls across thousands of regulations and standards worldwide. The UCF enables organisations to identify common controls and reduce compliance duplication.

Unified Threat Management

An integrated security appliance that combines multiple security functions including firewall, antivirus, intrusion prevention, and content filtering in a single platform.

Unified Threat Management (UTM)

A comprehensive security solution that consolidates multiple security functions into a single appliance, including firewall, intrusion detection/prevention, anti-malware, content filtering, and VPN capabilities.

Uninterruptible Power Supply

A device that provides emergency power to equipment when the main power source fails, allowing orderly shutdown or continued operation.

Universal Second Factor

A hardware-based authentication standard using physical security keys that provide strong two-factor authentication resistant to phishing attacks.

Use Case

A specific security monitoring scenario that defines the events, conditions, and response actions for detecting a particular type of threat or violation.

User Access Review

A periodic examination of user access rights across systems to verify that permissions are appropriate and no unauthorized access exists.

User Behaviour Analytics (UBA)

Security technology that uses machine learning and statistical analysis to detect anomalous user behaviour that may indicate insider threats, compromised accounts, or other security risks.

User Deprovisioning

The process of revoking all access rights and disabling accounts when a user leaves the organization or no longer requires access.

User Provisioning

The process of creating, managing, and deactivating user accounts and access rights across IT systems according to organizational policies and role requirements.

User and Entity Behavior Analytics

Security solutions that use machine learning to establish baseline behavior patterns for users and entities, detecting anomalies that may indicate threats.

Utilities Compliance

Regulatory requirements for utility companies including cybersecurity standards, environmental regulations, and service reliability mandates.

V33 terms

VLAN

Virtual Local Area Network, a logical network segment created within a physical network to isolate traffic and improve security through network segmentation.

VPN Concentrator

A network device that manages multiple VPN connections, handling encryption, authentication, and routing for remote access users.

VPN Split Tunneling

A networking configuration that routes only specific traffic through a VPN tunnel while allowing other traffic to flow directly to the internet.

Vehicle Access Control

Security measures for controlling and monitoring vehicle entry to organizational facilities, including barriers, permits, and inspection procedures.

Vendor Assessment

The evaluation of a vendor's capabilities, security posture, financial stability, and compliance status as part of the procurement process.

Vendor Compliance

The requirement for third-party vendors to adhere to applicable regulations, standards, and contractual security requirements.

Vendor Due Diligence

The investigation and evaluation of a potential vendor's security practices, financial stability, and compliance posture before establishing a business relationship.

Vendor Management

The discipline of managing external vendors and suppliers to maximize value, minimize risk, and ensure service quality and compliance.

Vendor Privacy Assessment

An evaluation of a third-party vendor's privacy practices and controls before sharing personal data or engaging them for data processing.

Vendor Risk Assessment

A formal evaluation of the risks associated with using a specific third-party vendor, including security, compliance, operational, and reputational considerations.

Vendor Risk Management

The ongoing process of monitoring and managing the risks associated with third-party vendors throughout the lifecycle of the business relationship.

Vendor Security Assessment

A formal evaluation of a vendor's security controls, certifications, and incident response capabilities before sharing data or granting system access.

Vendor Security Review

An assessment of a vendor's security controls, practices, and certifications to determine whether they meet the organization's security requirements.

Vertical Privilege Escalation

An attack where a user gains access to resources or functions intended for users with a higher privilege level.

Video Surveillance

The use of cameras and recording systems to monitor and record activities in and around facilities for security, safety, and compliance purposes.

Virtual Private Network

A technology that creates an encrypted tunnel between a user's device and a remote server, protecting data in transit and masking the user's IP address.

Virtual Private Network (VPN)

A technology that creates an encrypted connection over a less secure network, such as the internet. VPNs provide privacy and data integrity for remote access and site-to-site connectivity.

Virus

A type of malicious software that attaches itself to a legitimate programme or file and spreads when the infected file is executed. Unlike worms, viruses require human action to propagate.

Vishing

Voice phishing, a social engineering attack that uses phone calls or voice messages to trick victims into revealing sensitive information. Vishing attacks often impersonate banks, government agencies, or technical support.

Visitor Management

Processes for registering, tracking, and controlling visitors to organizational facilities, including identification verification and escort requirements.

Vital Records

Essential records and documents needed for an organization to continue operations during a crisis and to reconstruct operations afterward.

Voice Phishing

A social engineering attack conducted via telephone where callers impersonate legitimate organizations to trick victims into providing sensitive information.

Volume Encryption

The encryption of an entire storage volume or partition, protecting all files and data stored within that volume from unauthorized access.

Vulnerability

A weakness in a system, application, or process that could be exploited by a threat actor to gain unauthorised access or cause harm. Vulnerabilities can exist in software, hardware, configurations, or procedures.

Vulnerability Assessment

A systematic process of identifying, quantifying, and prioritising security vulnerabilities in systems, applications, and networks.

Vulnerability Database

A repository of known security vulnerabilities with details including severity ratings, affected systems, and available patches or workarounds.

Vulnerability Disclosure

The practice of reporting security vulnerabilities to the affected vendor or organisation so they can be patched before being exploited. Responsible disclosure policies define timelines and processes for vulnerability reporting.

Vulnerability Disclosure Policy

A published policy describing how an organization accepts and handles vulnerability reports from external security researchers.

Vulnerability Management

The ongoing practice of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software. Vulnerability management programmes include regular scanning, risk-based prioritisation, and timely remediation.

Vulnerability Prioritization

The process of ranking discovered vulnerabilities based on factors such as severity, exploitability, asset criticality, and business impact.

Vulnerability Remediation

The process of fixing or mitigating identified security vulnerabilities through patching, configuration changes, or compensating controls.

Vulnerability Scanning

Automated testing that identifies known security weaknesses in systems, networks, and applications by comparing them against databases of known vulnerabilities.

Vulnerability Window

The period between when a vulnerability is discovered or publicly disclosed and when a patch or mitigation is applied.

W21 terms

WPA3

The latest Wi-Fi Protected Access security protocol providing enhanced encryption, protection against brute force attacks, and improved security for open networks.

Walk-Through

An audit procedure in which the auditor traces a single transaction from initiation through final recording to verify that controls are in place and operating as described. Walk-throughs are used to understand and document business processes.

War Room

A dedicated physical or virtual space where incident response teams gather during major security incidents to coordinate response activities.

Warm Site

A backup facility that has some but not all the hardware and connectivity needed for operations, requiring some setup before becoming fully operational.

Water Detection

Sensors and monitoring systems that detect water leaks or flooding in facilities to prevent damage to IT equipment and infrastructure.

Watering Hole Attack

A targeted attack strategy where the attacker compromises a website frequently visited by the intended victims. When targets visit the compromised site, they are infected with malware tailored to exploit their specific vulnerabilities.

Web Application Firewall

A security solution that monitors, filters, and blocks HTTP/HTTPS traffic to and from web applications to protect against web-based attacks.

Web Application Firewall (WAF)

A security solution that monitors, filters, and blocks HTTP/HTTPS traffic to and from a web application. WAFs protect against web-based attacks including SQL injection, cross-site scripting, and other OWASP Top 10 threats.

Web Application Scanning

Automated security testing of web applications to identify common vulnerabilities such as SQL injection, XSS, and authentication weaknesses.

Web Security

Security measures for protecting websites, web applications, and web services from attacks including injection, cross-site scripting, and authentication bypass.

Whaling

A highly targeted phishing attack aimed at senior executives or other high-profile individuals within an organisation. Whaling attacks are carefully crafted to appear as legitimate business communications.

Whistleblower Protection

Legal safeguards and organizational policies that protect individuals who report illegal, unethical, or non-compliant activities from retaliation.

White Box Testing

A security testing approach where the tester has full knowledge of the target system including source code, architecture, and credentials.

Wi-Fi Security

Security protocols and practices for protecting wireless local area networks, including WPA3 encryption, access control, and rogue AP detection.

Window Security

Physical measures to protect windows in facilities from break-in attempts, including security film, bars, sensors, and shatter-resistant glass.

Wireless Penetration Testing

Authorized security testing of wireless networks and their security controls to identify vulnerabilities in wireless infrastructure and configurations.

Wireless Security

Protocols and practices for protecting wireless networks from unauthorized access and attacks, including WPA3 encryption, SSID management, and rogue AP detection.

Work Area Recovery

The provision of alternative workspace for employees when primary office facilities are unavailable due to a disruption or disaster.

Workaround

A temporary alternative process or procedure used to maintain operations when normal systems or processes are unavailable.

Workforce Identity

The digital identity management of employees, contractors, and partners who need access to organizational systems and resources.

Worm

A type of malware that self-replicates and spreads across networks without requiring user interaction or a host programme. Worms can consume bandwidth, overload systems, and deliver additional malicious payloads.

Z7 terms

Zero Knowledge Proof

A cryptographic method that allows one party to prove they know a value without revealing the value itself, useful for privacy-preserving authentication.

Zero Trust

A security model that assumes no user, device, or network should be trusted by default, even those inside the corporate perimeter. Requires continuous verification for every access request.

Zero Trust Architecture

A security model that requires strict identity verification for every person and device trying to access resources, regardless of network location.

Zero Trust Network Access

A security approach that provides secure remote access to applications based on defined access control policies without placing users on the network.

Zero-Day Discovery

The identification of a previously unknown software vulnerability that has not been publicly disclosed and for which no patch exists.

Zero-Day Exploit

An attack that targets a previously unknown software vulnerability for which no patch or fix is available, making it particularly dangerous and difficult to defend against.

Zero-Day Vulnerability

A software security flaw that is unknown to the vendor and for which no patch or fix is available. Zero-day vulnerabilities are particularly dangerous because they can be exploited before the vendor has an opportunity to address them.

See these terms in action across 692 compliance frameworks