Compliance & Governance Glossary
Clear, concise definitions for the terms you encounter across compliance frameworks, audit reports, and governance documentation. From access control to zero trust.
51 terms
Security considerations and measures for protecting fifth-generation mobile network infrastructure, devices, and services from cyber threats.
A169 terms
The principle that organizations and individuals should be answerable for the outcomes and impacts of AI systems they develop or deploy.
The challenge of ensuring that AI systems pursue goals and behaviors that are aligned with human values, intentions, and ethical principles.
Processes and methods for providing confidence that AI systems operate as intended, producing reliable, fair, and safe outcomes.
A systematic examination of AI systems to evaluate their fairness, transparency, safety, security, and compliance with applicable regulations.
Systematic errors in AI system outputs that result from biased assumptions in the machine learning process or biased training data. AI bias can lead to unfair or discriminatory outcomes and is a key concern of AI governance frameworks.
The categorization of AI systems based on their risk level, capability, or application domain, as defined by regulations like the EU AI Act.
Adherence to emerging regulations governing the development, deployment, and use of artificial intelligence systems, including the EU AI Act.
A structured set of requirements and guidelines for ensuring AI systems are developed and deployed in compliance with applicable regulations.
Policies and processes for managing the data used to train and operate AI systems, ensuring quality, privacy, and regulatory compliance.
Records describing AI system design, training data, performance metrics, limitations, and intended use, supporting transparency and accountability.
The branch of ethics that examines the moral implications of artificial intelligence systems, including issues of fairness, transparency, accountability, privacy, and the societal impact of AI decision-making.
The ability to understand and describe how an AI model reaches its decisions or predictions, supporting transparency, trust, and regulatory compliance.
The principle and practice of ensuring AI systems do not produce discriminatory outcomes or perpetuate biases against any group of individuals.
The framework of policies, processes, and organisational structures that ensure AI systems are developed and deployed responsibly, ethically, and in compliance with applicable laws and regulations.
A systematic evaluation of the potential effects of an AI system on individuals, groups, and society. AI impact assessments examine risks related to fairness, privacy, safety, transparency, and human rights.
An event involving an AI system that causes or could cause harm to individuals, organizations, or society, requiring investigation and response.
The governance of AI systems throughout their entire lifecycle from conception and development through deployment, monitoring, and retirement.
The processes and controls for managing AI models throughout their lifecycle, including development, validation, deployment, monitoring, and retirement. Model governance ensures accuracy, fairness, and compliance.
The potential for adverse consequences arising from decisions based on AI models that are incorrect, misused, or produce unintended outcomes.
The continuous observation and evaluation of AI system performance, behavior, and outputs to detect drift, bias, errors, or security issues.
Structured testing of AI systems by dedicated teams to identify safety risks, vulnerabilities, biases, and unintended behaviors before deployment.
Laws and regulatory frameworks governing the development, deployment, and use of artificial intelligence systems to ensure safety and protect rights.
A systematic evaluation of the potential harms and risks associated with an AI system, including bias, safety, security, and societal impacts.
The process of identifying, assessing, and mitigating risks associated with AI systems. The NIST AI Risk Management Framework provides a structured approach organised around four functions: Govern, Map, Measure, and Manage.
A structured approach for identifying, assessing, and mitigating risks associated with AI systems throughout their lifecycle.
Measures to protect AI systems from adversarial attacks, data poisoning, model theft, and other threats specific to machine learning systems.
Risks arising from dependencies on third-party AI models, training data, cloud services, and components used in AI system development.
Methods for evaluating AI systems including functional testing, bias testing, adversarial testing, and performance benchmarking.
The principle that AI system operations and decisions should be understandable and open to examination. Transparency includes documenting data sources, model architecture, training processes, and decision-making logic.
Techniques for embedding identifiable markers in AI-generated content to enable detection and attribution of synthetically produced media.
The American Institute of Certified Public Accountants, which develops auditing standards and the SOC reporting framework for service organizations.
Laws, regulations, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income.
Practices and technologies for protecting application programming interfaces from attacks, abuse, and unauthorized access while ensuring proper authentication and data protection.
The Australian Prudential Regulation Authority's standard requiring regulated financial entities to maintain information security capabilities.
An attack where a malicious actor sends falsified ARP messages to link their MAC address with a legitimate IP address on a local network.
A security testing technique that identifies ways a system could be misused by threat actors, complementing traditional use case analysis.
A risk that has been evaluated and determined to be within the organization's risk tolerance, requiring no additional mitigation.
The amount of risk that an organization is prepared to accept, tolerate, or be exposed to at any point in time.
The agreed-upon rules governing how users may utilize an organization's IT resources, including internet, email, and software.
A document that outlines the rules and guidelines for using an organization's IT resources, defining permitted and prohibited activities for users.
Predefined conditions that a risk, control, or deliverable must meet to be formally accepted, serving as a benchmark for risk-based decision-making.
A physical credential such as a smart card or proximity badge used to control entry to secure areas and track personnel movements.
A threat actor who specializes in gaining initial access to organizations and selling that access to other cybercriminals for further exploitation.
The periodic review and validation of user access rights to ensure that permissions remain appropriate for each user's current role and responsibilities.
Security measures that regulate who can view or use resources in a computing environment. Access controls include authentication, authorisation, and audit mechanisms.
A list of rules that specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects.
A table that defines the access permissions of subjects to objects in a system, mapping users and roles to specific resource permissions.
Policies and processes for ensuring that user access rights are appropriately granted, reviewed, and revoked based on organizational requirements.
A record of all access attempts to a system or resource, including successful and failed attempts, used for security monitoring and audit purposes.
The set of processes and technologies used to manage and control user access to systems, applications, and data based on defined policies.
A physical location or network device where users connect to an organization's network, requiring security controls to prevent unauthorized access.
A documented set of rules defining who is authorized to access specific resources, under what conditions, and with what level of permission.
The process of granting users the appropriate access rights and permissions to systems and resources based on their role and business need.
A periodic review process where managers verify that existing user access rights remain appropriate and revoke any unnecessary permissions.
A formal request by a data subject to obtain information about what personal data an organization holds about them and how it is processed.
A periodic evaluation of user access rights and permissions to verify they remain appropriate, required by most compliance frameworks.
A digital credential that represents the authorization granted to a user or application to access specific resources or perform specific operations.
Adherence to laws and standards requiring digital content and services to be accessible to people with disabilities, such as WCAG and ADA requirements.
A security feature that temporarily disables a user account after a specified number of failed authentication attempts to prevent brute force attacks.
The processes for creating, modifying, monitoring, and removing user accounts throughout their lifecycle.
The obligation of an individual or organization to account for their activities, accept responsibility for outcomes, and disclose results transparently.
Formal recognition by an authoritative body that an organisation is competent to carry out specific tasks, such as certification audits or testing.
An organization that evaluates and confirms the competence of certification bodies, laboratories, and inspection bodies to perform specific conformity assessments.
An organisation that has been formally recognised by an accreditation body (such as UKAS or ANAB) as competent to conduct certification audits against specific standards such as ISO 27001 or ISO 9001.
Security strategies that proactively seek to detect, respond to, and counter adversary actions rather than relying solely on passive preventive measures.
Security measures and configurations applied to Microsoft Active Directory to protect identity management, authentication, and authorization services from unauthorized access and attacks.
Privacy concerns and regulations related to advertising technology including behavioral tracking, targeted advertising, and real-time bidding of user data.
An authentication approach that dynamically adjusts security requirements based on contextual risk factors such as location, device, and user behavior.
A memory protection technique that randomizes the positions of key data areas in a process address space to prevent exploitation of memory corruption vulnerabilities.
A determination by the European Commission that a non-EU country provides an adequate level of data protection. Adequacy decisions enable the free flow of personal data to the third country without additional safeguards.
Elevated system privileges that allow users to perform configuration changes, install software, and manage other user accounts on a system.
A symmetric block cipher algorithm (AES) adopted as an encryption standard, using key sizes of 128, 192, or 256 bits to protect classified and sensitive data.
A prolonged and targeted cyber attack in which an intruder gains access to a network and remains undetected for an extended period. APTs typically target high-value organisations such as governments and large enterprises.
Security testing that emulates the tactics, techniques, and procedures of real-world threat actors to evaluate an organization's detection and response capabilities.
Adherence to laws and regulations governing advertising practices, including truth in advertising, disclosure requirements, and sector-specific restrictions.
Software that automatically displays or downloads advertising material when a user is online, often bundled with free programs and potentially compromising privacy.
Regulatory requirements specific to the aerospace industry including safety standards, export controls, and quality management systems like AS9100.
Mechanisms used to verify the age of users accessing online services, particularly relevant for protecting children's privacy and complying with age-based regulations.
A technique where individually non-sensitive pieces of information are combined to derive sensitive data, bypassing classification controls.
Regulations governing agricultural practices including food safety, pesticide use, environmental protection, and animal welfare standards.
A security measure that physically isolates a computer or network from unsecured networks, including the internet. Air-gapped systems are used in high-security environments to prevent remote cyber attacks.
A network physically isolated from other networks and the internet, providing maximum security for highly sensitive systems.
A security system designed to detect and alert on unauthorized entry, environmental hazards, or other security-relevant events at physical locations.
The process of linking related security alerts from multiple sources to identify patterns that indicate a coordinated attack or significant incident.
A condition where security analysts become desensitized to alerts due to high volumes of false positives, potentially causing real threats to be overlooked.
The process of evaluating and prioritizing security alerts to determine which require immediate investigation and response.
The examination and evaluation of algorithms and automated decision-making systems for bias, fairness, accuracy, and compliance with regulations.
The principle that organisations developing or deploying algorithms are responsible for the outcomes those algorithms produce. Algorithmic accountability requires monitoring for bias, errors, and unintended consequences.
An evaluation of the potential effects of an automated decision-making system on individuals and groups, particularly regarding fairness and discrimination.
The practice of making the logic, data, and decision processes of algorithms understandable and accessible to affected parties.
A cybersecurity approach that permits only pre-approved applications, IP addresses, or entities to access a system while blocking all others by default.
A facility separate from the primary location where an organization can continue critical operations during a disruption to the main site.
The section of ISO 27001 that contains the reference set of information security controls. The 2022 revision organises 93 controls into four themes: Organisational, People, Physical, and Technological.
A comprehensive yearly evaluation of an organization's compliance program effectiveness, regulatory changes, and areas requiring improvement.
The identification of patterns in data that deviate from expected behavior, used in security to detect intrusions, fraud, and other threats.
The irreversible process of altering personal data so that the individual can no longer be identified, directly or indirectly. Properly anonymised data falls outside the scope of data protection regulations such as GDPR.
The state of being unidentifiable within a group of subjects, where personal data cannot be linked to a specific individual by any means.
The irreversible process of altering personal data so that individuals can no longer be identified directly or indirectly, removing it from data protection regulations.
Laws, regulations, and organizational policies designed to prevent bribery, corruption, and unethical business practices in domestic and international operations.
Software designed to detect, prevent, and remove malicious software such as viruses, worms, trojans, and ransomware from computer systems and networks.
Regulations, policies, and procedures designed to prevent criminals from disguising illegally obtained funds as legitimate income through the financial system.
Technologies, policies, and training programs designed to detect and prevent phishing attacks that attempt to steal credentials or deliver malware through deceptive communications.
Security measures designed to prevent or detect unauthorized modification of hardware, software, or data to maintain system integrity.
Security measures for protecting dedicated hardware devices used for specific functions such as firewalls, load balancers, and storage systems.
A security practice that permits only pre-approved applications to execute on a system while blocking all other software from running.
Security measures that restrict which applications can execute on systems, preventing unauthorized or malicious software from running.
Authorized security testing focused specifically on web, mobile, or desktop applications to identify vulnerabilities in application logic and security controls.
The practice of finding, fixing, and preventing security vulnerabilities in software applications throughout the development lifecycle. Includes code review, penetration testing, and security architecture design.
The process of evaluating software applications for security vulnerabilities using techniques such as static analysis, dynamic analysis, and interactive testing.
The process of categorising information assets based on their sensitivity, criticality, and value to the organisation. Classification levels typically include public, internal, confidential, and restricted.
The process of identifying and cataloging all hardware, software, and data assets within an organization's IT environment to maintain an accurate inventory.
A comprehensive and up-to-date register of all hardware, software, data, and network resources owned or managed by an organisation. Required by most security frameworks including CIS Controls and ISO 27001.
The systematic process of identifying, classifying, tracking, and managing an organization's information assets throughout their lifecycle to ensure proper protection.
An evaluation of the risks associated with specific information assets, considering their value, threats, vulnerabilities, and existing controls.
An engagement in which an auditor expresses a conclusion about the reliability of a subject matter against defined criteria to enhance stakeholder confidence.
A formal document presenting the auditor's findings, conclusions, and opinion on the subject matter examined during an assurance engagement.
A cryptographic method using a pair of mathematically related keys where one key encrypts data and the other decrypts it, enabling secure key exchange.
Automated security testing that replicates real-world attack scenarios against an organization's defenses to validate security control effectiveness.
The total number of possible entry points for unauthorised access to a system. Reducing the attack surface through hardening, patching, and removing unnecessary services is a core security practice.
The continuous discovery, classification, prioritization, and monitoring of an organization's external-facing digital assets to reduce exposure to threats.
The method or pathway used by a threat actor to gain unauthorised access to a target system. Common attack vectors include phishing emails, unpatched software vulnerabilities, and compromised credentials.
A formal declaration by an independent party (such as a CPA firm) that an organisation's controls or processes meet specified criteria. SOC reports are a form of attestation, distinct from certification.
A formal declaration by a qualified security assessor or the organization itself confirming compliance with a specific standard such as PCI DSS.
An access control paradigm that grants or denies access based on policies evaluating attributes of users, resources, actions, and the environment.
A systematic, independent examination of an organisation's activities, processes, or financial records to verify compliance with standards, regulations, or internal policies.
A formal document that defines the audit function's purpose, authority, responsibility, and position within an organization's governance structure.
A committee of the board of directors responsible for overseeing financial reporting, internal controls, and audit activities. Audit committees are required for publicly listed companies and play a key role in corporate governance.
Records, statements of fact, or other information that is relevant and verifiable, used by an auditor to determine whether audit criteria are being fulfilled. Audit evidence can be qualitative or quantitative.
The results of evaluating collected audit evidence against audit criteria. Findings can indicate conformity or nonconformity with the criteria and may include observations or opportunities for improvement.
The defined schedule for conducting internal and external audits based on risk levels, regulatory requirements, and organizational needs.
The requirement that auditors maintain objectivity and freedom from conflicts of interest that could influence their professional judgment.
A chronological record of system activities that provides documentary evidence of the sequence of activities affecting a specific operation, procedure, or event. Audit logs are essential for security monitoring, incident investigation, and compliance.
The administration and coordination of audit activities including planning, scheduling, resource allocation, and tracking of findings and remediation.
The systematic approach and procedures used by auditors to plan, execute, and report on audits, ensuring consistency and thoroughness.
The formal communication to an auditee informing them of an upcoming audit, including scope, timing, and information requirements.
The specific goals and scope of an audit engagement, defining what the audit seeks to evaluate, verify, or assess.
The auditor's formal conclusion about whether the subject matter conforms to applicable criteria, expressed as unqualified, qualified, adverse, or disclaimer.
A document that describes the activities and arrangements for an audit, including scope, objectives, timing, and resource requirements. Audit plans ensure systematic and efficient audit execution.
The activities undertaken by an organization to ready itself for an upcoming audit, including evidence gathering and documentation review.
A scheduled series of audits planned for a specific period, prioritized based on risk assessment and covering key areas of the organization.
A set of one or more audits planned for a specific time frame and directed towards a specific purpose. Audit programmes define the overall approach, scheduling, and resourcing for audit activities over a defined period.
The state of preparedness an organization achieves through proactive measures to ensure successful outcomes when formal audits are conducted.
The formal documentation of audit findings, conclusions, and recommendations presented at the end of an audit engagement. Audit reports communicate the results to stakeholders and management.
The formal communication of audit results including findings, conclusions, and recommendations to management and relevant stakeholders.
The formal reply from audited parties addressing audit findings, including planned corrective actions, responsible parties, and implementation timelines.
The risk that an auditor expresses an inappropriate opinion when the subject matter is materially misstated. Audit risk comprises inherent risk, control risk, and detection risk.
The application of audit procedures to less than 100% of items within a population to draw conclusions about the entire population.
A planned timetable of audit activities across an organization for a defined period, typically one year, based on risk priorities.
The extent and boundaries of an audit, including the locations, organisational units, activities, and processes to be audited, as well as the time period covered by the audit.
Published guidelines and requirements that define how audits should be conducted to ensure quality, consistency, and professional practice.
A chronological record of system activities that enables the reconstruction and examination of events. Essential for forensic analysis and regulatory compliance.
The comprehensive list of all auditable entities, processes, systems, and locations within an organization that the audit function may review.
The documentation of audit procedures performed, evidence obtained, and conclusions reached that support the auditor's report and findings.
The process of verifying the identity of a user, device, or system. Common methods include passwords, biometrics, tokens, and multi-factor authentication (MFA).
A category of credential used to verify identity, including knowledge factors, possession factors, and inherence factors like biometrics.
A set of rules governing the exchange of information for verifying the identity of a user, device, or system in a communication.
The process of determining what actions an authenticated user or system is permitted to perform. Typically enforced through access control lists or role-based access control.
A formal authorisation granted by a senior official to operate a federal information system at an acceptable level of risk. ATO is required under FISMA and FedRAMP and is based on the assessment of security controls.
The process of determining whether a user, program, or device is permitted to access a resource, perform an operation, or execute a command.
Decisions made by algorithms or AI systems without significant human involvement. Under GDPR Article 22, individuals have the right not to be subject to decisions based solely on automated processing that produce legal or similarly significant effects.
Systems that automatically detect, download, test, and deploy software patches across an organization's IT environment to reduce vulnerability exposure.
Pre-configured actions that are automatically triggered when specific security events or conditions are detected, reducing response time.
Security standards and practices for protecting connected vehicles, automotive systems, and vehicle-to-everything communications from cyber threats.
Systems that can perform tasks and make decisions without human intervention, raising governance questions about accountability, safety, and oversight.
The property of being accessible and usable upon demand by authorized users, one of the three pillars of information security along with confidentiality and integrity.
Regulatory requirements and security measures for protecting civil aviation systems, infrastructure, and operations from threats.
An organized effort to educate employees about specific security threats and best practices through multiple communication channels.
B71 terms
An attack that maliciously reroutes internet traffic by corrupting Border Gateway Protocol routing tables to redirect traffic through attacker-controlled networks.
A process that identifies critical business functions and determines the impact of disruption. Used to set recovery time objectives (RTO) and recovery point objectives (RPO).
Security policies and controls for managing risks associated with employees using personal devices to access corporate networks, data, and applications.
A hidden method for bypassing normal authentication or encryption in a computer system, often installed by attackers or built into software for maintenance.
The application of encryption to backup data to protect it from unauthorized access even if backup media is lost, stolen, or compromised.
A documented policy defining requirements for data backup including frequency, scope, retention, encryption, and testing procedures.
A documented plan defining what data is backed up, how frequently, where backups are stored, and how they are tested and restored.
The process of testing backup data to confirm it is complete, intact, and can be successfully restored when needed.
The processes and technologies for creating copies of data and systems so they can be restored after data loss, corruption, or disaster. Backup frequency and retention policies are defined by business requirements and regulatory obligations.
A social engineering attack that lures victims with something enticing, such as a USB drive left in a public area loaded with malware.
The allocation and control of network bandwidth to ensure optimal performance and prevent network abuse or congestion.
A network management technique that limits the data transfer rate to prevent network congestion or mitigate denial-of-service attack impacts.
The framework of laws and rules governing banking operations including capital requirements, lending practices, consumer protection, and risk management.
A technique used to gather information about a computer system on a network by reading the banner messages displayed by services running on the target. Often used in vulnerability scanning and reconnaissance.
An international regulatory framework developed by the Basel Committee on Banking Supervision that sets minimum capital requirements, leverage ratios, and liquidity requirements for banks to strengthen regulation, supervision, and risk management.
A minimum set of security controls or configurations established as a starting point. Baselines can be tailored based on an organisation's risk profile and operating environment.
A specially hardened computer on a network designed to withstand attacks and serve as a single point of entry to internal resources. Bastion hosts are typically placed in a DMZ and run minimal services.
The use of machine learning and statistical analysis to identify unusual patterns in user or entity behavior that may indicate security threats.
The process of comparing an organization's practices, processes, and performance metrics to industry best practices or peer organizations.
The process of identifying and measuring systematic biases in AI models and their outputs. Bias detection involves statistical testing across protected characteristics such as race, gender, age, and disability.
The examination of compiled executable files to understand their functionality, identify vulnerabilities, and detect malicious code without source code.
Internal policies adopted by multinational corporations for transferring personal data within the group across international borders in compliance with data protection laws.
Internal rules adopted by a multinational group of companies that define their global policy regarding international transfers of personal data within the group. BCRs must be approved by the relevant data protection authority.
Physical access control systems that use biological characteristics such as fingerprints, iris scans, or facial recognition to verify identity.
The use of unique biological characteristics such as fingerprints, facial recognition, iris scans, or voice patterns to verify the identity of a user. Considered a strong form of authentication.
Personal data resulting from specific technical processing relating to the physical, physiological, or behavioural characteristics of a natural person, such as facial images or fingerprint data. Classified as special category data under GDPR.
A full disk encryption feature included with Microsoft Windows that protects data by encrypting the entire operating system drive.
A security testing approach where the tester has no prior knowledge of the target system's internal workings, simulating an external attacker.
A security approach that blocks known malicious entities such as IP addresses, domains, or file hashes while allowing everything else by default.
A symmetric encryption algorithm that operates on fixed-size blocks of data. Common block ciphers include AES (Advanced Encryption Standard) and 3DES.
A distributed, immutable ledger technology that records transactions across multiple computers, providing transparency, security, and verification without central authority.
Security measures for protecting blockchain networks, smart contracts, wallets, and decentralized applications from attacks and vulnerabilities.
A symmetric block cipher algorithm designed as a fast, free alternative to existing encryption methods. While once popular, it has largely been superseded by AES for most applications.
The defensive security team responsible for maintaining and improving an organization's security posture by detecting, responding to, and mitigating threats.
Security protocols and practices for protecting wireless communications over Bluetooth connections from eavesdropping, unauthorized pairing, and data theft.
The responsibility of a board of directors to supervise management activities, ensure accountability, and provide strategic direction. Board oversight of cybersecurity and compliance has become a regulatory expectation under NIST CSF 2.0, SEC rules, and corporate governance codes.
A committee of the board of directors specifically responsible for overseeing the organization's risk management framework and risk appetite.
Security mechanisms that verify the integrity of the boot process, ensuring that only authenticated and unmodified code executes during system startup.
Malware that infects the boot sector of a storage device, activating during the system startup process before the operating system loads.
A network of compromised computers (bots) controlled remotely by a threat actor to perform coordinated malicious activities such as distributed denial-of-service attacks, spam distribution, or cryptocurrency mining.
Security controls deployed at network boundaries to monitor, filter, and protect traffic entering and leaving the organization's network.
Security measures implemented at the boundaries between network zones to monitor and control communications, preventing unauthorized access between segments.
A risk analysis method that visually maps the pathways from causes to consequences of a risk event, showing preventive and mitigating controls.
The evaluation of a security incident to determine the scope, severity, and impact of a data breach on affected individuals and the organization.
Immediate actions taken to limit the spread and impact of a data breach, including isolating affected systems and blocking malicious access.
The legal requirement to inform affected individuals, regulators, or other parties when personal data has been compromised. GDPR requires notification within 72 hours.
Financial sanctions imposed by regulators on organizations that fail to comply with data breach notification requirements or other regulatory obligations.
A documented log of all personal data breaches including their nature, affected individuals, consequences, and remedial actions taken.
The coordinated set of actions taken by an organization following the discovery of a data breach, including investigation, notification, and remediation.
Automated platforms that continuously simulate attacks across the kill chain to validate the effectiveness of security controls and detection capabilities.
An emergency access account that bypasses normal access controls during critical situations, with strict monitoring and post-use review procedures.
Security measures and configurations for web browsers to protect against web-based threats including malicious websites, extensions, and exploits.
An attack method that systematically tries every possible combination of passwords or encryption keys until the correct one is found. Mitigated by account lockout policies, rate limiting, and strong password requirements.
A software vulnerability that occurs when a program writes more data to a buffer than it can hold, potentially allowing an attacker to execute arbitrary code. Buffer overflows are among the most common and dangerous security flaws.
A crowdsourced security initiative that rewards external researchers for discovering and responsibly disclosing software vulnerabilities to the organization.
The process of logging, categorizing, prioritizing, and managing software bugs and security vulnerabilities from discovery through resolution.
Physical security measures protecting an organization's buildings and facilities from unauthorized access, theft, vandalism, and environmental threats.
The description of an organization's structure, capabilities, and value streams that aligns business strategy with tactical execution.
Under HIPAA, a person or entity that performs certain functions or activities involving the use or disclosure of Protected Health Information on behalf of a covered entity. Business associates must comply with HIPAA Security and Breach Notification Rules.
A HIPAA-required contract between a covered entity and a business associate that establishes permissible uses and disclosures of PHI.
A legally binding contract between a HIPAA covered entity and a business associate that establishes the permitted and required uses and disclosures of Protected Health Information. BAAs are mandatory under HIPAA.
The capability of an organisation to continue delivering products or services at acceptable levels following a disruptive incident. Governed by frameworks like ISO 22301.
A holistic management process that identifies potential threats and their impacts, providing a framework for building organizational resilience.
A documented strategy defining how an organization will continue to operate during and after a significant disruption to its normal business operations.
A high-level statement of an organization's commitment to maintaining operational continuity and defining the scope and objectives of its BCM program.
Exercises and tests conducted to validate that business continuity plans are effective, current, and capable of achieving recovery objectives.
A sophisticated scam targeting organisations that conduct wire transfers or handle sensitive financial data. Attackers impersonate executives or trusted partners to trick employees into transferring funds or disclosing confidential information.
A systematic process for identifying and evaluating the potential effects of disruptions to critical business operations and processes.
The discipline of managing and optimizing an organization's business processes to improve efficiency, effectiveness, and adaptability.
The process of returning to normal business operations after a disruption, including verification that all critical functions are restored.
The potential for events or conditions to adversely affect an organization's ability to achieve its business objectives and maintain operations.
C295 terms
US federal law that establishes requirements for commercial email messages, gives recipients the right to opt out of receiving them, and imposes penalties for violations. CAN-SPAM does not require prior consent for commercial emails.
A challenge-response test used to determine whether a user is human or an automated bot. CAPTCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart.
A security policy enforcement point placed between cloud service consumers and providers to combine and interject enterprise security policies as cloud resources are accessed. CASBs provide visibility, compliance, data security, and threat protection.
The California Consumer Privacy Act gives California residents rights over their personal information including the right to know, delete, and opt out of sale.
California's consumer privacy law, amended by CPRA in 2023. Gives consumers rights over their personal information including the right to know, delete, opt-out, and non-discrimination.
The right of California consumers under the CCPA to direct a business that sells their personal information to stop selling it. Businesses must provide a clear 'Do Not Sell My Personal Information' link on their website.
The three core principles of information security: Confidentiality, Integrity, and Availability, forming the foundation of security program design.
Consensus-based configuration guidelines developed by the Center for Internet Security for securely configuring IT systems and applications.
A prioritized set of cybersecurity best practices developed by the Center for Internet Security to help organizations defend against common cyber threats.
The Cybersecurity and Infrastructure Security Agency, a US government agency responsible for protecting critical infrastructure from cyber and physical threats.
Certified Information Systems Auditor, an ISACA certification for professionals who audit, control, monitor, and assess IT and business systems.
Certified Information Security Manager, an ISACA certification for professionals who manage, design, and oversee enterprise information security.
The Chief Information Security Officer is the senior executive responsible for establishing and maintaining an organization's information security strategy, policies, and operations.
The senior executive responsible for an organisation's information security strategy, policies, and operations. Reports to the CEO, CIO, or board depending on the organisation.
Certified Information Systems Security Professional, a widely recognized certification for experienced security practitioners, managers, and executives.
The Cybersecurity Maturity Model Certification is a US Department of Defense framework requiring defense contractors to implement cybersecurity practices at specified maturity levels.
A US Department of Defense framework requiring defence contractors to demonstrate cybersecurity maturity across five levels. Based on NIST 800-171 controls.
Control Objectives for Information and Related Technologies, an IT governance framework by ISACA. COBIT 2019 provides 40 governance and management objectives across five domains.
The internal control framework developed by the Committee of Sponsoring Organizations of the Treadway Commission. COSO defines five components: control environment, risk assessment, control activities, information and communication, and monitoring activities.
An Australian Prudential Regulation Authority (APRA) standard that requires regulated entities to maintain an information security capability commensurate with information security vulnerabilities and threats.
Certified in Risk and Information Systems Control, an ISACA certification for professionals who identify and manage IT and enterprise risk.
The Cloud Security Alliance Security Trust Assurance and Risk program, a framework for assessing the security posture of cloud service providers.
Common Vulnerabilities and Exposures, a catalog of publicly known cybersecurity vulnerabilities identified by unique CVE ID numbers.
The Common Vulnerability Scoring System provides a standardized method for rating the severity of security vulnerabilities on a scale of 0 to 10.
Measures to protect network cabling from physical tampering, interception, and accidental damage that could compromise data confidentiality or availability.
An attack that corrupts cached data to redirect users to malicious destinations, commonly targeting DNS caches and web application caches.
A California state law that gives consumers more control over the personal information that businesses collect about them. CCPA provides rights to know, delete, opt-out of sale, and non-discrimination.
A California state law (CPRA) that amends and expands the CCPA, establishing the California Privacy Protection Agency and adding new consumer privacy rights.
An amendment to the CCPA that expanded consumer privacy rights, created the California Privacy Protection Agency, and introduced new concepts such as sensitive personal information and the right to correction.
A social engineering technique where phishing emails instruct victims to call a phone number controlled by the attacker for further manipulation.
A digital tripwire deployed within a network or data set that triggers an alert when accessed, providing early detection of unauthorized activity.
A framework for assessing and improving an organization's processes and capabilities across defined maturity levels from initial to optimized.
The process of ensuring that IT resources and infrastructure are sufficient to meet current and future business requirements.
The process of determining the production capacity needed by an organization to meet changing demands for its products and services.
A risk event with the potential for severe, widespread, and potentially irreversible damage to an organization's operations, reputation, or survival.
A trusted entity that issues digital certificates used to verify the identity of individuals, organisations, or devices. Certificate Authorities form the basis of the Public Key Infrastructure (PKI) trust model.
The processes for managing the lifecycle of digital certificates including issuance, renewal, revocation, and key storage.
A security technique that associates a host with its expected public key or certificate, preventing man-in-the-middle attacks by rejecting certificates that do not match the pinned values.
The invalidation of a digital certificate before its scheduled expiration date, typically due to key compromise or change of entity information.
A list published by a certificate authority of digital certificates that have been revoked before their expiration date.
A formal document certifying that an organization, product, or process meets specified regulatory or standard requirements.
Formal attestation by an accredited body that an organisation's management system meets the requirements of a specific standard (e.g., ISO 27001, ISO 9001).
A formal assessment conducted by an accredited certification body to determine whether an organisation's management system meets the requirements of a standard such as ISO 27001, ISO 9001, or ISO 22301.
An accredited organization authorized to conduct audits and issue certifications confirming that management systems meet international standards.
The complete sequence of initial certification audit, surveillance audits, and recertification audit, typically spanning a three-year period.
The ongoing activities required to keep a certification valid, including surveillance audits, continuous improvement, and management reviews.
A voluntary process under GDPR through which organizations demonstrate compliance with data protection requirements through approved certification bodies.
The defined boundaries of what a certification covers, including the organizational units, processes, locations, and standards included.
A certification demonstrating competency in ethical hacking techniques, penetration testing, and vulnerability assessment methodologies.
The documented process of maintaining and tracking evidence from collection through presentation. In digital forensics, chain of custody ensures that evidence is admissible and has not been tampered with.
A group of stakeholders that evaluates and approves or rejects proposed changes to IT systems and infrastructure based on risk assessment.
A body that exists to approve changes and assist in the assessment and prioritisation of changes. CABs are a core component of ITIL change management and help balance the need for change with the risk of disruption.
A formal process for managing changes to systems, processes, and configurations to minimize disruption and maintain system integrity.
The processes, tools, and techniques for managing the people side of change to achieve required business outcomes, or the IT process for controlling modifications to hardware, software, and documentation to protect the environment from unintended consequences.
The senior executive responsible for overseeing and managing compliance issues within an organisation, ensuring that the company and its employees comply with all regulatory requirements and internal policies.
The senior executive responsible for managing an organisation's privacy programme, ensuring compliance with privacy laws and regulations, and establishing privacy policies and procedures.
The senior executive responsible for identifying, analysing, and mitigating internal and external events that could threaten an organisation. The CRO oversees the enterprise risk management function.
Legal frameworks and practices for protecting the personal information of children collected online, including COPPA requirements for parental consent.
A US federal law that imposes requirements on operators of websites or online services directed at children under 13 years of age. COPPA requires parental consent before collecting personal information from children.
China's comprehensive cybersecurity legislation that imposes requirements on network operators for data protection, security assessments, and data localization.
An algorithm for performing encryption or decryption of data. Ciphers transform plaintext into ciphertext (encryption) and back again (decryption) using a key.
The result of encryption performed on plaintext using an algorithm (cipher) and a key. Ciphertext is designed to be unintelligible without the corresponding decryption key.
A policy requiring employees to secure sensitive documents and removable media when leaving their workspace to prevent unauthorized access to information.
A web-based attack where a malicious site tricks a user into clicking on something different from what the user perceives, potentially revealing confidential information or taking control of their computer.
Video surveillance systems used for physical security monitoring of facilities, access points, and sensitive areas with recording capabilities.
A security policy enforcement point positioned between cloud service consumers and providers to monitor activity, enforce policies, and protect data.
A security policy enforcement point positioned between cloud service consumers and cloud providers. CASBs provide visibility into cloud application usage, data protection, threat detection, and compliance monitoring.
US legislation that allows law enforcement to compel US-based cloud providers to provide stored data regardless of where the data is physically located.
An entity that manages the use, performance, and delivery of cloud services, negotiating relationships between cloud providers and consumers.
The process of ensuring that cloud computing environments meet regulatory requirements, industry standards, and internal policies. Cloud compliance involves shared responsibility between the cloud provider and customer.
Processes and tools for maintaining secure and compliant configurations of cloud resources, preventing misconfigurations that lead to data exposure.
Security measures for protecting data stored, processed, and transmitted in cloud environments, including encryption, access controls, and data loss prevention.
The use of cryptographic algorithms to protect data at rest, in transit, and in use within cloud computing environments and services.
Digital forensic investigation techniques adapted for cloud computing environments, addressing unique challenges of multi-tenant and distributed systems.
Policies, processes, and controls for managing cloud adoption, usage, security, and compliance across an organization's cloud environments.
The management of user identities, authentication, and authorization across cloud services to ensure secure access to cloud resources.
Security practices for protecting the underlying infrastructure of cloud environments including virtual machines, networks, storage, and orchestration platforms.
Services and practices for managing cryptographic keys in cloud environments, including generation, storage, rotation, and access control of encryption keys.
The process of moving data, applications, and workloads from on-premises infrastructure to cloud computing environments.
Security planning and controls for safely transferring applications, data, and workloads from on-premises environments to cloud platforms.
The continuous observation of cloud resources, services, and applications to detect performance issues, security threats, and compliance violations.
Security practices and tools designed specifically for cloud-native architectures including containers, microservices, and serverless computing. Cloud native security shifts protection closer to the workload and incorporates security into the CI/CD pipeline.
Authorized security testing of cloud environments and applications to identify vulnerabilities, with specific considerations for cloud provider policies.
The set of policies, controls, procedures, and technologies that protect cloud-based systems, data, and infrastructure. Governed by the shared responsibility model between cloud provider and customer.
An industry organization dedicated to defining and raising awareness of best practices for securing cloud computing through research and education.
A non-profit organisation dedicated to defining and raising awareness of best practices for a secure cloud computing environment. CSA publishes the Cloud Controls Matrix and the STAR certification programme.
The design and implementation of security controls, policies, and technologies specifically for protecting cloud computing environments and services.
A category of security tools that continuously monitor cloud infrastructure for gaps in security policy enforcement. CSPM solutions identify misconfigurations, compliance violations, and security risks across multi-cloud environments.
Tools and practices that continuously monitor cloud environments for security misconfigurations, compliance violations, and risks. CSPM automates the identification and remediation of cloud security issues.
A contract defining the performance, availability, security, and support commitments between a cloud service provider and its customer.
A framework that delineates security responsibilities between cloud service providers and customers based on the type of cloud service used.
Security solutions that protect workloads running in cloud environments from vulnerabilities, malware, and unauthorized access across their lifecycle.
A security solution that protects server workloads across cloud, hybrid, and on-premises environments. CWPPs provide capabilities including vulnerability management, network segmentation, system integrity monitoring, and application control.
The systematic examination of source code to identify security vulnerabilities, coding errors, and deviations from secure coding standards before deployment.
The process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed.
A set of rules outlining the norms, responsibilities, and proper practices for an individual or organisation. Codes of conduct set ethical standards and are required by many regulatory frameworks including SOX and industry regulations.
A document establishing ethical principles and expected behaviors for professionals in a field, particularly in cybersecurity and auditing.
A backup facility that has the basic infrastructure (power, networking, cooling) but no pre-installed hardware or data. Cold sites are the least expensive disaster recovery option but have the longest recovery time.
An approach where organizations share threat intelligence, best practices, and resources to collectively improve their security posture.
Database encryption applied to specific columns containing sensitive data, protecting individual data fields while allowing queries on unencrypted columns.
An approach that coordinates various assurance providers to optimize risk and control coverage while minimizing duplication of effort.
The infrastructure and communication channels used by attackers to maintain remote control over compromised systems within a target network.
The infrastructure and communication channels used by attackers to maintain control over compromised systems. C2 servers issue commands to malware or botnets and receive exfiltrated data.
A formal document that defines a committee's purpose, authority, composition, meeting frequency, and responsibilities within the governance structure.
An international standard (ISO/IEC 15408) for computer security certification that provides a framework for evaluating the security properties of IT products. Common Criteria evaluations are mutually recognised by 31 countries.
A documented strategy for communicating with internal and external stakeholders during security incidents, including templates and escalation procedures.
The restoration of communication systems and channels following a disruption, ensuring stakeholders can be reached and information can flow.
An industry certification validating baseline cybersecurity skills including threat assessment, security operations, and incident response.
The principle of restricting information access so that individuals only know what they need for their specific responsibilities.
An alternative security measure employed when a primary control cannot be implemented. Must provide an equivalent level of protection and be documented with justification.
Processes for receiving, investigating, and resolving complaints from data subjects about the handling of their personal information.
The state of conforming to laws, regulations, standards, or internal policies. In information security, compliance is typically demonstrated through audits, certifications, and continuous monitoring.
The structural design of an organization's compliance program, including technology, processes, and roles that support regulatory adherence.
A formal evaluation of an organization's adherence to specific regulatory requirements, standards, or internal policies.
A formal document presenting the results of a compliance evaluation including findings, evidence, and recommendations.
An examination that evaluates whether an organization adheres to applicable laws, regulations, standards, and internal policies.
The use of technology to automate compliance monitoring, evidence collection, control testing, and reporting activities. Compliance automation platforms reduce manual effort and provide continuous compliance visibility.
Programs and activities designed to educate employees about compliance obligations, ethical standards, and the consequences of non-compliance.
The minimum set of compliance requirements that an organization must meet, serving as a starting point for building a comprehensive compliance program.
The financial resources allocated to compliance activities including assessments, technology, training, and remediation.
A tool for tracking regulatory deadlines, filing dates, audit schedules, and compliance milestones to ensure timely fulfillment of all obligations.
A formal document issued upon successful completion of a compliance assessment, confirming that an organization meets specific requirements.
A defined point in a business process where compliance with relevant regulations and policies is verified before proceeding.
Specific measures implemented to ensure adherence to regulatory requirements, including technical controls, policies, and procedures.
An individual responsible for coordinating compliance activities across departments and ensuring consistent adherence to regulatory requirements.
An organizational environment where employees at all levels understand, value, and actively support compliance with laws, regulations, and ethical standards.
A visual display providing real-time status of an organization's compliance posture across multiple regulations, standards, and internal policies.
The collection of policies, procedures, records, and evidence maintained to demonstrate adherence to regulatory and standard requirements.
Documentation and records that demonstrate an organization's adherence to specific regulatory requirements or standards.
A structured set of guidelines, best practices, and standards that organisations follow to meet regulatory requirements, manage risks, and demonstrate compliance. Examples include ISO 27001, SOC 2, NIST CSF, and GDPR.
The process of identifying correspondences between requirements across different compliance frameworks to enable efficient multi-standard adherence.
A deficiency identified between an organization's current practices and the requirements of a specific regulation, standard, or framework.
A confidential reporting channel for employees and stakeholders to report suspected compliance violations, fraud, or ethical concerns.
A formal inquiry into suspected violations of laws, regulations, or organizational policies to determine facts and appropriate corrective actions.
The ongoing cycle of identifying requirements, implementing controls, monitoring compliance, reporting, and continuously improving the compliance program.
An integrated set of policies, processes, and tools used to systematically manage an organization's compliance with legal and regulatory requirements.
The level of sophistication and effectiveness of an organization's compliance program, measured against defined capability levels.
The use of metrics and indicators to quantitatively assess an organization's level of compliance with applicable requirements.
The ongoing process of verifying that an organisation continues to meet its compliance obligations. Compliance monitoring includes regular assessments, control testing, policy reviews, and metrics tracking.
A legal or regulatory requirement that an organization must fulfill to avoid penalties, sanctions, or other adverse consequences.
A designated individual responsible for overseeing and managing an organization's compliance program, ensuring adherence to laws and regulations.
The governance function responsible for monitoring, evaluating, and reporting on the effectiveness of an organization's compliance activities.
A formal document establishing an organization's commitment to compliance and defining the principles, responsibilities, and expectations for regulatory adherence.
A comprehensive system of policies, procedures, training, and oversight designed to ensure an organization meets all applicable legal and regulatory requirements.
A structured set of internal policies, procedures, training, and monitoring activities designed to ensure an organisation adheres to applicable laws, regulations, and industry standards.
A comprehensive inventory of all applicable laws, regulations, standards, and contractual obligations relevant to an organization.
The process of generating and submitting reports to regulatory bodies, management, or stakeholders demonstrating adherence to compliance requirements.
A systematic examination of an organization's practices, controls, and documentation to verify adherence to applicable compliance requirements.
The potential for legal penalties, financial loss, or reputational damage arising from an organization's failure to comply with laws, regulations, or standards.
An evaluation of the risks associated with failing to comply with applicable laws, regulations, and standards.
A strategic plan outlining the steps, timeline, and milestones for achieving and maintaining compliance with specific regulations or standards.
The defined boundaries of what a compliance program covers, including applicable regulations, organizational units, and geographic locations.
The process of verifying that systems, processes, and controls function as intended and meet the requirements of applicable regulations and standards.
Educational programs designed to ensure employees understand their compliance obligations and can fulfill their roles in maintaining regulatory adherence.
The process of confirming through evidence and testing that an organization meets specific compliance requirements.
The defined sequence of activities and approvals required to complete a compliance-related task or process.
The practice of defining compliance policies and controls as machine-readable code that can be automatically tested and enforced.
An organization that handles cybersecurity incidents and coordinates responses, providing technical guidance and threat intelligence.
The application of investigation and analysis techniques to gather and preserve evidence from a computer system in a way that is suitable for presentation in a court of law.
An event that actually or potentially jeopardizes the confidentiality, integrity, or availability of a computer system or the data it processes.
A field of artificial intelligence that enables machines to interpret and understand visual information from the world. Computer vision applications raise privacy concerns when used for facial recognition and surveillance.
The use of software tools and data analytics by auditors to analyze large data sets, test controls, and improve audit efficiency.
Software tools and techniques used by auditors to automate audit procedures such as data extraction, analysis, sampling, and control testing. CAATs improve audit efficiency and enable analysis of larger data sets.
The risk arising from overexposure to a single counterparty, sector, region, or system dependency that could amplify the impact of adverse events.
A security paradigm that protects data in use by performing computation in a hardware-based trusted execution environment. Confidential computing prevents unauthorised access to data even from the infrastructure provider.
The principle of ensuring that information is accessible only to authorised individuals, entities, or processes. One of the three pillars of information security (CIA triad).
An examination of system configurations to verify they comply with security baselines, standards, and organizational requirements.
A documented and agreed-upon specification of a system's configuration at a specific point in time, used as a reference for managing changes.
The adherence of system configurations to defined security baselines and hardening standards.
A component of IT infrastructure that needs to be managed to deliver services, tracked and maintained through configuration management.
A process for systematically managing, organizing, and controlling changes to system configurations to maintain integrity and traceability.
A repository that stores information about the configuration items (CIs) and their relationships within an IT environment. CMDBs support change management, incident management, and compliance reporting.
A documented specification of approved settings and parameters for configuring systems securely and consistently.
A lawful basis for processing personal data under GDPR that requires a clear, specific, informed, and unambiguous indication of the data subject's agreement to their data being processed. Consent must be freely given and as easy to withdraw as to give.
A legally binding agreement between a regulatory body and an organization that resolves compliance violations and mandates specific corrective actions.
Systems and processes for obtaining, recording, and managing user consent for the collection, processing, and sharing of personal data in compliance with privacy laws.
Technology that helps organizations collect, store, and manage user consent preferences for data processing activities and cookie usage on websites and applications.
A technology solution that enables websites and apps to collect, store, and manage user consent for data processing activities. CMPs help organisations comply with privacy regulations such as GDPR and ePrivacy Directive.
A regulatory enforcement action requiring an organization to take specific corrective actions to address compliance violations.
A record or receipt provided to a data subject confirming the details of the consent they have given for data processing.
The right of individuals to revoke their previously given consent for data processing, requiring organizations to cease processing based on that consent.
Regulatory requirements governing construction practices including building codes, safety standards, environmental regulations, and labor laws.
Regulations and practices designed to protect consumers in financial transactions, ensuring fair lending, transparent disclosure, and responsible practices.
Laws and regulations designed to safeguard consumers from unfair business practices, fraud, and harmful products or services.
Security practices for protecting container orchestration platforms like Kubernetes, including access control, network policies, and secrets management.
The practice of protecting containerised applications throughout their lifecycle, from image creation to runtime. Container security addresses image scanning, runtime protection, network policies, and orchestration platform security.
Technology that screens and restricts access to web content, email, or data transfers based on predefined policies to prevent exposure to malicious or inappropriate material.
The practice of monitoring and managing user-generated content on platforms to ensure compliance with policies, laws, and community standards.
A plan for maintaining or restoring business operations when disruptive events occur, covering both prevention and recovery activities.
A federal government initiative ensuring that agencies are able to continue performance of essential functions during emergencies.
An audit approach that uses technology to produce audit results simultaneously with, or shortly after, the occurrence of relevant events. Continuous auditing provides real-time assurance and enables faster identification of control failures.
An approach to compliance that replaces periodic point-in-time assessments with ongoing automated monitoring and evidence collection. Continuous compliance provides real-time visibility into the organisation's compliance posture.
Security controls integrated into continuous deployment pipelines to ensure code is scanned and validated before production release.
An ongoing effort to improve products, services, and processes incrementally over time through small, sustainable changes.
Security practices integrated into continuous integration pipelines, including automated scanning, testing, and policy enforcement during builds.
The ongoing awareness of information security, vulnerabilities, and threats to support organisational risk management decisions. Required by NIST SP 800-137 and recommended by most security frameworks.
An ongoing process of evaluating risks in real time rather than at periodic intervals, enabling more responsive risk management.
The ongoing process of validating that security controls, configurations, and compliance status remain effective and current.
Adherence to the specific terms, conditions, and obligations set forth in contracts and agreements with customers, vendors, and partners.
A measure (policy, procedure, technical mechanism, or physical safeguard) that modifies risk. Controls can prevent, detect, or correct security incidents.
The evaluation of a security or compliance control to determine whether it is properly designed and operating effectively.
The processes for providing confidence that controls are operating effectively and achieving their intended risk mitigation objectives.
A focused examination of specific controls to evaluate their design adequacy and operating effectiveness in achieving control objectives.
The use of technology to automatically implement, monitor, and enforce security and compliance controls without manual intervention.
The minimum set of security controls selected for a system based on its risk level and applicable regulatory requirements.
A comprehensive inventory of available security and compliance controls organized by type, function, and applicable framework requirements.
A weakness in the design or operation of a control that prevents it from effectively mitigating the intended risk or meeting its objective.
The process of defining the specifications and implementation approach for security and compliance controls to address identified risks.
Written records describing the design, implementation, operation, and effectiveness of security and compliance controls.
The degree to which a security or compliance control achieves its intended purpose in mitigating a specific risk or meeting a requirement.
The set of standards, processes, and structures that provide the foundation for carrying out internal control across an organisation. The control environment is established by leadership and sets the tone for the organisation.
Documentation, records, and artifacts that demonstrate a control exists, is properly designed, and operates effectively.
A structured set of controls organized into domains and objectives that provides a systematic approach to managing specific types of risk.
The process of identifying relationships between controls across different frameworks to enable efficient multi-standard compliance.
A deficiency identified when an organisation's existing controls do not fully meet the requirements of a target compliance framework or standard. Control gaps are identified through gap analysis and addressed through remediation plans.
The process of deploying and configuring security and compliance controls according to their design specifications and organizational requirements.
A comprehensive collection of defined security and compliance controls that an organization can select from based on its requirements.
The process of identifying relationships between controls in different frameworks. For example, mapping ISO 27001 Annex A controls to NIST 800-53 controls to identify overlap and gaps.
The ongoing assessment of control performance and effectiveness through testing, metrics, and automated monitoring tools.
A statement of the desired result or purpose to be achieved by implementing a control. Control objectives define what the organisation wants to achieve through its control activities and provide the basis for control design and assessment.
The individual responsible for the design, implementation, operation, and effectiveness of a specific security or compliance control.
The process of optimizing the control environment by eliminating redundant controls and ensuring each control serves a distinct purpose.
A process where operational teams evaluate the effectiveness of their own controls and risk management practices using structured methodology.
The process of evaluating whether controls are designed appropriately and operating effectively to achieve their intended objectives. Control testing is a core component of compliance audits and attestation engagements.
The process of testing and verifying that implemented controls function as intended and effectively mitigate their associated risks.
Regulatory requirements and best practices for deploying chatbots and virtual assistants that handle personal data, make decisions, or interact with consumers.
The requirement under privacy regulations to obtain user permission before placing non-essential cookies on their device. Cookie consent mechanisms must provide clear information about cookie purposes and allow granular choices.
A document that explains what cookies a website uses, their purposes, and how users can manage their cookie preferences.
An organization's adherence to laws, regulations, standards, and internal policies that govern its operations and business practices.
The system of rules, practices, and processes by which an organisation is directed and controlled. Corporate governance balances the interests of stakeholders including shareholders, management, customers, suppliers, government, and the community.
Action taken to eliminate the root cause of a detected nonconformity or other undesirable situation, preventing its recurrence. A key concept in ISO management systems.
A documented set of steps to address audit findings, control deficiencies, or non-conformities, including timelines and responsible parties.
A security control designed to restore systems and processes to their expected state after a security incident or policy violation has been detected.
A predefined logic pattern in SIEM systems that triggers alerts when specific combinations of events or conditions are detected across log sources.
Measures to prevent the use of counterfeit hardware, software, or components that could introduce vulnerabilities or compromise system integrity.
An action, device, procedure, or technique that reduces a threat, vulnerability, or attack by eliminating or preventing it, minimizing harm, or enabling discovery.
Under HIPAA, a health plan, healthcare clearinghouse, or healthcare provider that transmits any health information electronically. Covered entities must comply with all HIPAA Administrative Simplification rules.
A communication path that was not designed for information transfer but can be exploited to secretly transmit data in violation of security policies.
Techniques used by attackers to collect login credentials through methods such as phishing sites, keyloggers, or memory scraping tools.
The processes and tools for securely creating, storing, distributing, rotating, and revoking user credentials throughout their lifecycle.
The practice of regularly changing passwords, keys, certificates, and other credentials to limit the window of exposure from compromised credentials.
An automated attack that uses stolen username-password pairs from previous data breaches to attempt to log into other services. Exploits the tendency of users to reuse passwords across multiple sites.
The processes and protocols for communicating with internal and external stakeholders during a crisis to manage information flow and maintain trust.
The process by which an organization responds to and manages the impact of a major unpredictable event that threatens to harm the organization.
A documented guide for responding to major disruptions, defining leadership roles, communication protocols, and decision-making processes during a crisis.
A designated group of senior leaders responsible for making strategic decisions and coordinating the organization's response during a crisis.
An information asset, system, or resource whose compromise, loss, or failure would have a severe impact on the organization's operations or objectives.
Systems, assets, and networks (whether physical or virtual) so vital to a nation that their incapacitation or destruction would have a debilitating impact on security, economic stability, public health, or safety.
Regulations and security measures to protect essential services and systems such as energy, water, transportation, and healthcare from disruption.
An information system whose failure or compromise would have severe consequences for the organization's operations or mission.
Managing compliance obligations across multiple jurisdictions, addressing conflicting or overlapping regulatory requirements in different countries.
The movement of personal data from one jurisdiction to another. Cross-border transfers are regulated under GDPR, LGPD, and other privacy laws and typically require adequate safeguards such as Standard Contractual Clauses or Binding Corporate Rules.
The practice of monitoring user activity across multiple devices such as phones, tablets, and computers to build comprehensive behavioral profiles.
The discipline of identifying equivalent or related controls across multiple compliance frameworks. Enables unified control sets and reduces duplicate compliance effort.
A team composed of members from different departments or disciplines working together on shared objectives such as security or compliance.
A web security vulnerability that tricks authenticated users into submitting unintended requests to a web application, potentially performing unauthorized actions.
A web application vulnerability that tricks an authenticated user into submitting unintended requests to a web application. CSRF attacks exploit the trust that a site has in the user's browser.
A web application vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users, enabling data theft or session hijacking.
A web security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. XSS attacks can steal session cookies, redirect users, or deface websites.
The study of analysing and breaking cryptographic systems. Cryptanalysis involves finding weaknesses in the mathematical algorithms or implementation of encryption schemes.
The ability of a system to quickly transition between different cryptographic algorithms and protocols in response to new threats or requirements.
Regulations governing cryptocurrency transactions including anti-money laundering requirements, tax reporting, and consumer protection.
A mathematical algorithm that maps data of arbitrary size to a fixed-size bit string (hash value). Hash functions are one-way, deterministic, and designed so that even a small change in input produces a dramatically different output.
A piece of information used by a cryptographic algorithm to transform plaintext into ciphertext or vice versa. Key security is fundamental to the strength of any cryptographic system.
The administration of cryptographic keys throughout their lifecycle including generation, distribution, storage, rotation, revocation, and destruction.
The unauthorized use of someone else's computing resources to mine cryptocurrency, typically delivered through malicious scripts on websites or compromised systems.
The knowledge and attitudes that members of an organization possess regarding the protection of information assets and cybersecurity best practices.
Security techniques that use decoys, misdirection, and disinformation to confuse attackers, detect intrusions, and gather intelligence about adversary methods.
State-sponsored or organized cyber operations aimed at stealing sensitive government, military, or corporate information.
A UK government-backed certification scheme that helps organisations protect against the most common cyber threats. Cyber Essentials covers five technical controls: firewalls, secure configuration, access control, malware protection, and patch management.
An observable occurrence in cyberspace that may or may not have security implications, requiring analysis to determine significance.
Routine practices and steps that users and organizations take to maintain system health and improve online security, similar to personal health hygiene.
An event that actually or imminently jeopardizes the confidentiality, integrity, or availability of information or information systems.
Insurance coverage designed to protect organisations against financial losses resulting from cyber incidents such as data breaches, ransomware attacks, and business interruption caused by cyber events.
An insurance product designed to protect organizations from the financial impacts of cybersecurity incidents including data breaches and ransomware.
The process by which insurers evaluate an organization's cybersecurity posture and risk profile to determine coverage terms and premiums.
A model developed by Lockheed Martin that describes the stages of a cyber attack: reconnaissance, weaponisation, delivery, exploitation, installation, command and control, and actions on objectives.
Legal and financial exposure arising from cybersecurity incidents, including costs of breach response, regulatory fines, and third-party claims.
A system integrating computation, networking, and physical processes where embedded computers monitor and control physical operations.
A simulated environment used for cybersecurity training, testing, and exercises that replicates real-world networks and scenarios without impacting production systems.
An organisation's ability to continuously deliver intended outcomes despite adverse cyber events. Goes beyond cybersecurity to include preparedness, response, and recovery.
A systematic evaluation of threats, vulnerabilities, and potential impacts to an organization's digital assets and information systems.
The process of calculating the potential financial impact of cyber risks using statistical models, enabling data-driven security investment decisions.
A potential cyber attack that could compromise information systems, data, or services through exploitation of vulnerabilities.
A proactive security practice of searching through networks and datasets to detect advanced threats that evade existing automated security solutions.
Evidence-based knowledge about existing or emerging cyber threats that can be used to inform decisions regarding the organisation's response to those threats. CTI includes indicators of compromise, threat actor profiles, and attack patterns.
The use of digital attacks by nation-states to disrupt, damage, or destroy another nation's computer systems and critical infrastructure.
The practice of protecting systems, networks, and programs from digital attacks that aim to access, change, or destroy sensitive information.
A structured set of guidelines and best practices for managing cybersecurity risk, helping organizations assess and improve their security posture.
The level of sophistication and effectiveness of an organization's cybersecurity practices, measured against a defined scale of capability levels.
An architectural approach that distributes security controls to individual access points rather than a centralized perimeter, enabling more flexible security.
A comprehensive set of policies, procedures, technologies, and personnel dedicated to protecting an organization's digital assets and managing cyber risk.
The potential for financial loss, operational disruption, or reputational damage resulting from the failure of digital technologies and cyber threats.
A high-level plan that defines an organization's approach to managing cybersecurity risk and protecting its digital assets over a defined period.
The personnel responsible for protecting an organization's digital assets, including their skills development, certification, and career pathway management.
D198 terms
Defence Information Systems Agency Security Technical Implementation Guides that provide technical security configuration standards for US Department of Defense information systems. STIGs are based on NIST SP 800-53 controls.
A demilitarized zone is a network segment that acts as a buffer between an organization's internal network and the external internet, hosting public-facing services.
A security technique that blocks access to malicious or unwanted domains by filtering DNS queries based on threat intelligence and policy.
Measures to protect the Domain Name System from attacks such as DNS spoofing, cache poisoning, and hijacking that redirect users to malicious sites.
A suite of specifications for securing information provided by the Domain Name System. DNSSEC adds cryptographic signatures to DNS records to protect against cache poisoning and spoofing attacks.
A protocol that encrypts DNS queries within HTTPS connections to prevent eavesdropping and manipulation of DNS traffic.
Domain Name System Security Extensions, a suite of specifications that adds authentication to DNS responses to protect against cache poisoning and spoofing attacks.
Data Protection Officer certification validating expertise in data protection laws, privacy management, and regulatory compliance.
A deceptive user interface design that tricks users into making unintended choices, increasingly subject to regulatory scrutiny and prohibition.
The practice of scanning dark web forums, marketplaces, and data dumps for an organization's compromised credentials, data, or mentions to enable early response.
The principle that personal data must be accurate, kept up to date, and corrected or erased when inaccuracies are identified.
Techniques applied to personal data to prevent identification of individuals, including generalization, suppression, noise addition, and data swapping methods.
Specific methods for anonymizing data including k-anonymity, l-diversity, t-closeness, differential privacy, and synthetic data generation.
The design of an organization's data structures, policies, and standards that govern how data is collected, stored, and used.
A comprehensive review of an organization's data processing activities to assess compliance with data protection laws and identify privacy risks.
The process of creating copies of data that can be used to restore the original in the event of data loss, corruption, or disaster.
An incident where confidential, private, or protected data is accessed, disclosed, or stolen by an unauthorised party. May trigger breach notification requirements under GDPR, HIPAA, or other regulations.
Legislation requiring organizations to notify affected individuals and authorities when personal data is compromised, with varying requirements by jurisdiction.
The legal obligation to inform affected individuals and regulatory authorities when personal data is compromised in a security incident within specified timeframes.
A documented set of procedures for responding to data breaches, including detection, containment, notification, and recovery steps.
An entity that collects personal information from various sources and sells or licenses it to other organizations for marketing, risk assessment, or other purposes.
A centralized inventory of an organization's data assets with metadata descriptions, ownership, lineage, and classification information to support governance and privacy.
Physical protection measures for data center facilities including perimeter security, access control, environmental monitoring, and video surveillance.
Physical and environmental security measures protecting data center facilities including access controls, surveillance, fire suppression, and power protection.
A classification system that rates data centers on their reliability and availability, from Tier I with basic infrastructure to Tier IV with fault tolerance.
The process of categorising data based on its sensitivity and the impact of unauthorised disclosure. Common levels: Public, Internal, Confidential, Restricted.
A secure environment where multiple parties can collaboratively analyze combined datasets without directly sharing or exposing raw personal data.
Adherence to laws, regulations, and organizational policies governing the collection, storage, processing, and sharing of data.
Under GDPR, the entity that determines the purposes and means of processing personal data. The controller bears primary responsibility for compliance.
An individual or team responsible for the technical management and safekeeping of data assets, implementing the data governance policies defined by data owners.
The process of permanently and irreversibly eliminating data stored on electronic media so that it cannot be recovered. Methods include degaussing, physical destruction, and cryptographic erasure.
A hardware device that allows data to flow in only one direction, providing physical enforcement of one-way information transfer. Used in high-security environments to protect classified or sensitive networks.
The process of identifying and locating sensitive data across an organization's systems, databases, file shares, and cloud services.
The secure destruction or deletion of personal data when it is no longer needed for its original purpose or when retention periods expire.
The process of converting data into a coded form using cryptographic algorithms to prevent unauthorized access and protect confidentiality.
A formerly widely used symmetric encryption algorithm (DES) that has been superseded by AES due to its small key size vulnerability.
The practice of combining first-party data with additional information from external sources, raising privacy considerations about consent and purpose limitation.
The branch of ethics that addresses the moral implications of data collection, processing, and use, including fairness, transparency, and accountability in data practices.
A structured set of principles and guidelines for making ethical decisions about data collection, use, and sharing.
The unauthorised transfer of data from within an organisation to an external destination. Data exfiltration can occur through various channels including email, USB drives, cloud uploads, and covert network channels.
The visual documentation of how personal data moves through an organization's systems, processes, and third parties to identify privacy risks and compliance gaps.
The overall management of the availability, usability, integrity, and security of data employed in an organisation. Data governance includes policies, processes, standards, and metrics that ensure the effective use of information.
A cross-functional committee responsible for making decisions about data management policies, standards, and dispute resolution.
A formal evaluation of how a proposed data processing activity might affect the privacy and rights of individuals whose data is involved.
An event involving personal data that could compromise its confidentiality, integrity, or availability, potentially constituting a data breach.
The assurance that data is accurate, complete, consistent, and unaltered throughout its lifecycle, whether at rest, in transit, or in processing.
A comprehensive catalog of all personal data collected, processed, and stored by an organization, including data categories, purposes, retention periods, and sharing practices.
Policies and controls for managing privacy and security of personal data stored in data lakes where large volumes of diverse data are collected.
Technologies and processes designed to detect and prevent the unauthorised transmission of sensitive information outside the organisation. DLP solutions monitor data in motion, at rest, and in use.
The unauthorized transmission of data from within an organization to an external destination, whether intentional or accidental.
Policies and processes for managing data from creation through archival and deletion, ensuring appropriate protection and compliance at each stage.
The tracking and documentation of the origin, transformations, and movement of data throughout its lifecycle. Data lineage is essential for AI governance, regulatory compliance, and troubleshooting data quality issues.
Legal requirements that mandate personal data of a country's residents to be stored and processed within that country's geographic borders.
Technologies and processes that detect and prevent unauthorized transmission, sharing, or leakage of sensitive information outside the organization.
The process of documenting how personal data flows through an organisation, including what data is collected, where it is stored, how it is processed, who has access, and to whom it is transferred. Data mapping is a foundation for GDPR compliance.
A technique that replaces sensitive data with realistic but fictitious values to protect confidential information while maintaining data usability for testing or analytics.
The level of sophistication of an organization's data management practices, including governance, quality, privacy, and analytics capabilities.
A decentralized data architecture where domain teams own and manage their data as products, requiring governance for consistency and compliance.
Privacy considerations and controls required when transferring personal data between systems, platforms, or storage locations.
The principle that organisations should collect and process only the personal data that is strictly necessary for the specified purpose. Data minimisation is a core principle of GDPR (Article 5) and most modern privacy regulations.
A privacy principle requiring organizations to collect and process only the minimum amount of personal data necessary to fulfill a specific stated purpose.
The ability to understand, diagnose, and manage data health across the data pipeline through monitoring, alerting, and lineage tracking.
The individual or role within an organization who has authority and accountability for the management, quality, and appropriate use of specific data assets.
Security controls applied to data ingestion, transformation, and loading processes to protect data integrity and prevent unauthorized access or manipulation.
The right of individuals to receive their personal data in a structured, commonly used, and machine-readable format, and to transmit that data to another controller. Established under GDPR Article 20.
An international agreement that provides a mechanism for compliant cross-border transfers of personal data, replacing the previous Privacy Shield arrangement.
A process designed to identify and minimise the privacy risks of new projects, systems, or processes that involve personal data. DPIAs are mandatory under GDPR Article 35 for high-risk processing activities.
The comprehensive approach to managing personal data privacy including policies, processes, technology, and training across the organization.
A legally binding contract between a data controller and data processor that specifies the terms and conditions for processing personal data.
A comprehensive record of all data processing activities within an organization, documenting purposes, categories, recipients, and retention periods.
Under GDPR, an entity that processes personal data on behalf of a data controller. Must act only on the controller's instructions and implement appropriate security measures.
The set of strategies and processes used to secure the privacy, availability, and integrity of data throughout its lifecycle.
An independent public authority responsible for monitoring and enforcing data protection regulations within its jurisdiction.
An independent public authority responsible for monitoring the application of data protection law, handling complaints, and enforcing compliance. Each EU member state has at least one DPA under the GDPR framework.
Formal certification that an organization's data protection practices meet the requirements of a recognized standard or regulatory framework.
A systematic process for evaluating the potential privacy impact of a project or system that involves processing personal data, required under GDPR for high-risk processing.
A process required by GDPR Article 35 for assessing the risks of data processing activities that are likely to result in a high risk to individuals' rights and freedoms.
A designated individual responsible for overseeing an organization's data protection strategy and compliance with privacy regulations.
A role required under GDPR Article 37 for organisations that carry out large-scale systematic monitoring or process special categories of data. The DPO acts as the primary contact for data subjects and supervisory authorities.
The principle that the strictest privacy settings should apply automatically without requiring user action. Under GDPR Article 25, only personal data necessary for each specific purpose should be processed by default.
The principle of integrating data protection measures into the design and development of business processes and IT systems from the outset. Required under GDPR Article 25 and considered best practice across all privacy regulations.
A data protection technique that replaces identifying information with artificial identifiers, allowing data to be re-identified when necessary using separately stored keys.
The degree to which data meets the requirements for its intended use in terms of accuracy, completeness, consistency, timeliness, and validity.
Processes for ensuring that data is accurate, complete, consistent, and fit for its intended purpose throughout its lifecycle.
The process of restoring data that has been lost, corrupted, accidentally deleted, or otherwise made inaccessible from backup copies.
A documented strategy for restoring lost or corrupted data from backups, defining recovery procedures and priority sequences.
The residual representation of data that remains on storage media after attempts to erase or delete it, posing a potential security risk.
Legal or regulatory requirements that personal data must be stored and processed within a specific geographic boundary or jurisdiction. Data residency laws exist in countries including Russia, China, India, and several EU member states.
The policies and practices governing how long an organisation keeps personal data. Privacy regulations require that personal data is not kept longer than necessary for the purpose for which it was collected.
A documented policy defining how long different categories of data should be kept, when it should be archived, and when it must be permanently deleted.
The right of individuals to request the deletion of their personal data under certain conditions, also known as the right to be forgotten.
The process of deliberately, permanently, and irreversibly removing or destroying data stored on a memory device. Data sanitisation ensures that residual data cannot be recovered even with advanced forensic tools.
The process of deliberately and permanently destroying data on storage media so it cannot be recovered, using methods such as overwriting, degaussing, or physical destruction.
The automated extraction of data from websites or applications, raising privacy concerns when personal data is collected without consent.
The process of cleaning or removing sensitive information from data sets before they are shared, published, or used for non-production purposes.
The practice of protecting digital information from unauthorized access, corruption, or theft throughout its entire lifecycle.
The practice of separating data into distinct categories or partitions based on sensitivity, purpose, or regulatory requirements for targeted protection.
A formal agreement between organizations that defines the terms, conditions, and safeguards for sharing personal or sensitive data.
The irreversible destruction of data by overwriting it multiple times with random patterns, ensuring it cannot be recovered from storage media.
The concept that data is subject to the laws and governance structures of the country in which it is collected, stored, or processed.
Adherence to laws requiring that data collected within a jurisdiction's borders is subject to that jurisdiction's laws and remains within its territory.
The accidental exposure of classified or sensitive information in an unauthorized system or location, requiring containment and cleanup procedures.
An individual responsible for managing data assets within a specific domain, ensuring data quality, defining data standards, and implementing data governance policies. Data stewards bridge the gap between business needs and technical data management.
The management and oversight of data assets to ensure they are properly maintained, accurate, and used in compliance with policies.
An identified or identifiable natural person whose personal data is being processed. Under GDPR, data subjects have extensive rights including access, rectification, erasure, and portability.
A formal request from an individual to an organization to obtain a copy of the personal data held about them, required to be fulfilled under privacy laws.
A request made by an individual to an organisation to obtain a copy of the personal data held about them. Under GDPR, organisations must respond to DSARs within one month and provide the data free of charge.
The legal rights granted to individuals regarding their personal data, including access, rectification, erasure, portability, and objection.
A legal structure where an independent trustee manages data on behalf of a group of individuals, providing fiduciary oversight of data use.
A secure, isolated storage environment for protecting highly sensitive data with strict access controls, encryption, and comprehensive audit trails.
Data that is stored in any digital form on persistent storage media such as hard drives, SSDs, databases, or cloud storage. Encryption of data at rest is a common security requirement across compliance frameworks.
The protection of stored data using encryption algorithms so that the data remains unreadable without the proper decryption key, even if storage media is compromised.
Data actively being transferred from one location to another across networks, requiring encryption and other protections during transmission.
Data that is actively moving from one location to another, such as across the internet or through a private network. Protecting data in transit typically requires encryption protocols such as TLS/SSL.
The protection of data as it moves between systems or across networks using protocols such as TLS, IPsec, or SSH to prevent interception.
Data that is actively being processed, read, or modified in memory by a CPU or application. Protecting data in use is more challenging than data at rest or in transit and may involve techniques such as confidential computing.
Real-time monitoring and analysis of database activities to detect unauthorized access, policy violations, and anomalous behavior.
The application of encryption to data stored in databases, protecting the confidentiality of records from unauthorized database access.
Measures for protecting database management systems from attacks, unauthorized access, and data breaches including access controls and encryption.
The process of removing or obscuring personal identifiers from data to reduce the risk of identifying individuals. De-identified data may still be re-identifiable under certain conditions, unlike fully anonymised data.
An automated mechanism that triggers a predefined action if a specific condition is not regularly met, used in security for failsafe purposes.
Security considerations for decentralized financial systems and applications built on blockchain technology.
An identity model where individuals control their own digital identity information using cryptographic proofs rather than relying on centralized authorities.
Security tools that deploy decoys, honeypots, and breadcrumbs throughout an enterprise environment to detect, analyse, and defend against advanced threats by misleading attackers.
The defined authority and responsibility for making specific types of decisions within an organization's governance framework.
A fake system or service deployed to attract attackers, diverting them from real assets while providing intelligence about their techniques and objectives.
The process of converting encrypted data back to its original plaintext form using a cryptographic key or algorithm.
The cryptographic key used to convert encrypted ciphertext back into readable plaintext, required for authorized access to protected data.
A subset of machine learning based on artificial neural networks with multiple layers. Deep learning models can learn complex patterns from large datasets and are used in applications such as image recognition, natural language processing, and autonomous systems.
A network analysis technique that examines the full content of data packets as they pass through a checkpoint to detect threats, filter content, or enforce policies.
Synthetic media created using AI techniques, particularly deep learning, to produce realistic but fabricated images, videos, or audio. Deepfakes pose security threats including identity fraud, misinformation, and social engineering.
A security strategy that uses multiple layers of controls to protect assets. If one layer fails, others continue to provide protection.
A regulatory approach that applies multiple overlapping compliance requirements from different laws and standards. Organisations in regulated industries often face concurrent obligations from sector-specific and general compliance frameworks.
Security requirements for organizations in the defense supply chain that handle controlled unclassified information and classified data.
A comprehensive plan for protecting an organization's assets and infrastructure from threats, incorporating multiple layers of security controls.
A layered security strategy that uses multiple security controls at different levels so that if one control fails, others continue to provide protection.
The process of eliminating data from magnetic storage media by exposing it to a strong magnetic field, rendering the data unrecoverable.
An access model where administrative responsibilities are distributed to specific individuals for managing resources within their scope.
A perimeter network segment that sits between an organisation's internal network and the external internet. DMZs host public-facing services while providing an additional layer of security for the internal network.
A list of entities such as IP addresses, email addresses, or file hashes that are explicitly blocked from accessing a system or network.
An attack that disrupts normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic or requests.
An attack that aims to make a computer resource unavailable to its intended users by overwhelming it with traffic or requests. Distributed DoS (DDoS) attacks use multiple compromised systems to amplify the attack.
Security measures and technologies designed to detect and mitigate denial-of-service attacks to maintain service availability.
The identification and mapping of relationships between business processes, systems, and resources to understand cascade effects during disruptions.
Automated analysis of software dependencies and libraries to identify known vulnerabilities that could affect the security of the application.
Security measures for protecting desktop computers from malware, unauthorized access, data theft, and other threats.
A cyberattack intended to permanently destroy data, systems, or infrastructure rather than steal information or extort payment.
The practice of designing, building, testing, and maintaining threat detection rules and analytics to identify malicious activity in security monitoring systems.
A security control designed to identify and alert on security events, policy violations, or anomalous activities after they have occurred.
The practice of integrating security practices within the DevOps process. DevSecOps ensures that security is a shared responsibility throughout the entire software development and deployment lifecycle.
The process of verifying the identity of a hardware device connecting to a network or system before granting it access to resources.
A technique that identifies and tracks devices based on their unique combination of hardware, software, and configuration attributes.
A mathematical framework for sharing information about a dataset while protecting the privacy of individual records. Differential privacy adds calibrated noise to data or query results to prevent identification of individuals.
An electronic document that uses a digital signature to bind a public key with an identity. Digital certificates are issued by Certificate Authorities and used in TLS/SSL, email encryption, and code signing.
Electronic methods for obtaining and recording user consent for data processing, including click-through agreements and digital signature mechanisms.
Information stored or transmitted in digital form that may be used as evidence in legal proceedings or investigations.
The process of uncovering and interpreting electronic data for use in legal proceedings or incident investigations. Digital forensics follows strict procedures to preserve evidence integrity and chain of custody.
The collection of electronically captured and stored personal attributes, credentials, and identifiers that uniquely represent an individual in digital systems.
EU regulation designed to ensure fair and open digital markets by imposing obligations on large online platforms designated as gatekeepers.
An organization's ability to build, assure, and review its technological operational integrity against ICT-related disruptions.
An EU regulation (DORA) that establishes requirements for financial entities to strengthen IT security and ensure operational resilience against ICT-related disruptions.
An EU regulation that establishes uniform requirements for the security of network and information systems in the financial sector. DORA requires financial entities to manage ICT risk, test resilience, and oversee third-party providers.
Technologies that control access to and usage of digital content and devices after sale, protecting intellectual property from unauthorized copying or distribution.
EU regulation establishing a framework for the accountability of online platforms regarding illegal content, advertising transparency, and algorithmic transparency.
A cryptographic mechanism that provides authentication, integrity, and non-repudiation for digital messages or documents. Digital signatures use public key cryptography to verify the sender's identity and ensure the content has not been altered.
Security considerations and controls required when organizations undergo digital transformation initiatives that change technology and business processes.
A virtual replica of a physical system, process, or asset used for simulation, monitoring, and optimization, raising data governance and security considerations.
The specific consent required before sending marketing communications to individuals, with varying requirements across different jurisdictions.
A security control that establishes expected behavior through policies, standards, guidelines, and procedures.
A centralized database that stores, organizes, and provides access to information about network resources and users for authentication and authorization.
A web vulnerability that allows attackers to access files and directories outside of the web root folder by manipulating file path references. Also known as path traversal or dot-dot-slash attacks.
The formal invocation of a disaster recovery plan, triggering predefined response procedures and activating recovery teams and resources.
The process of restoring IT systems and data after a catastrophic event. Typically governed by a Disaster Recovery Plan (DRP) with defined RTOs and RPOs.
A documented set of policies and procedures designed to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster.
The practice of testing disaster recovery plans and procedures to ensure they function as expected and meet recovery time and point objectives.
A cloud-based service that provides disaster recovery capabilities including automated failover, replication, and recovery of IT systems.
A documented policy defining how an organization handles the reporting and disclosure of security vulnerabilities found in its systems.
False or misleading information deliberately created and spread to deceive, manipulate public opinion, or undermine trust in institutions.
The encryption of an entire disk or storage volume so that all data stored on it is automatically encrypted and requires authentication to access.
An event that interrupts normal business operations, potentially causing financial loss, reputational damage, or regulatory consequences.
An attack that uses multiple compromised systems to simultaneously overwhelm a target with traffic, making services unavailable to legitimate users.
A web browser signal requesting that websites and advertisers do not track the user's browsing activity for targeted advertising purposes.
The systematic management of documents throughout their lifecycle including creation, review, approval, distribution, revision, and archival.
US financial reform legislation that increased regulation of the financial industry, established consumer protections, and created new oversight agencies.
A server that responds to security authentication requests within a Windows domain, managing user accounts and security policies.
Email authentication protocols including SPF, DKIM, and DMARC that verify sender identity and prevent email spoofing and phishing attacks.
An email authentication protocol that builds on SPF and DKIM to protect against email spoofing. DMARC policies tell receiving mail servers how to handle emails that fail authentication checks.
Electronic systems that control and log physical entry through doors using credentials such as cards, PINs, biometrics, or mobile devices.
A period when a system, service, or network is unavailable or not functioning, potentially impacting business operations.
A type of cyber attack where malicious code is automatically downloaded to a user's device without their knowledge, typically through exploiting vulnerabilities in browsers, plugins, or operating systems.
Security measures for protecting unmanned aerial vehicles and their control systems from hijacking, data interception, and physical threats.
A security procedure requiring two authorized individuals to perform a critical action simultaneously, preventing any single person from acting alone.
The level of care that a reasonable person would exercise in protecting organizational information assets and complying with security requirements.
The investigation or audit of a potential investment, partner, or vendor to confirm facts and assess risks. In compliance, often refers to vendor risk assessment.
A comprehensive investigation and evaluation conducted before making business decisions such as mergers, acquisitions, or vendor engagements to identify risks.
Searching through an organization's trash to find sensitive information such as documents, passwords, or other data useful for attacks.
The duration between when a threat actor gains initial access to a system and when the breach is detected, a key security performance metric.
A security testing approach that evaluates running web applications by simulating external attacks to find vulnerabilities in a deployed environment.
E92 terms
Security solutions that continuously monitor endpoints to detect, investigate, and respond to cyber threats. EDR provides real-time visibility into endpoint activities with automated response capabilities.
The European Union Agency for Cybersecurity that contributes to EU cyber policy and supports member states in improving cybersecurity capabilities.
The Employee Retirement Income Security Act sets standards for retirement and health benefit plans in the private sector to protect participants.
The data transfer framework between the EU and the United States that replaced the invalidated Privacy Shield. It provides a legal mechanism for transferring personal data from the EU to US companies that have self-certified under the framework.
Network traffic that flows laterally between servers and workloads within a data center, requiring security monitoring for threat detection.
The interception of private communications or data transmissions without the knowledge or consent of the parties involved, a form of passive attack.
Security measures for protecting computing resources, data, and applications deployed at the network edge, closer to data sources and end users.
Regulatory requirements for educational institutions including student privacy, accessibility, financial aid regulations, and accreditation standards.
The practice of monitoring and controlling outbound network traffic to prevent unauthorised data transfers and communication with known malicious destinations. A key defence against data exfiltration and malware beaconing.
Electrical disturbances that can disrupt, degrade, or damage electronic equipment and data transmission, requiring shielding measures.
Laws governing the interception, access, and disclosure of electronic communications including email, phone calls, and stored electronic data.
Protected health information that is created, stored, transmitted, or received in any electronic format. ePHI is specifically protected under the HIPAA Security Rule, which requires administrative, physical, and technical safeguards.
Digital methods of indicating agreement or approval on electronic documents, with legal validity defined by regulations such as eIDAS and ESIGN.
A public-key cryptographic approach based on the algebraic structure of elliptic curves over finite fields. ECC provides equivalent security to RSA with smaller key sizes, making it more efficient for mobile and IoT devices.
Protocols and technologies such as SPF, DKIM, and DMARC that verify the legitimacy of email senders and protect against email spoofing.
A solution that monitors and filters incoming and outgoing email to protect against threats such as phishing, malware, spam, and data loss. Email gateways use multiple detection engines including sandboxing and machine learning.
Security measures designed specifically for embedded systems and IoT devices, addressing unique constraints such as limited processing power and memory.
A computer system with a dedicated function within a larger system, often with limited security capabilities requiring specialized protection.
Procedures for granting immediate temporary access to critical systems during emergencies when normal access control procedures cannot be followed.
Systems and procedures for rapidly communicating with employees, stakeholders, and the public during emergency situations.
The process of preparing for potential emergencies through risk assessment, plan development, training, and exercises.
The immediate actions taken to protect life, property, and the environment when a crisis or disaster occurs, before recovery operations begin.
A documented set of procedures for responding to emergencies including evacuation, communication, medical response, and initial containment actions.
A new or evolving risk that may not be fully understood but has the potential to significantly impact an organization's objectives in the future.
Measures taken to prevent the interception of electromagnetic emissions from electronic equipment that could reveal classified or sensitive information.
The protection of employee personal data in the workplace, including monitoring limitations, consent requirements, and data minimization obligations.
A network segment with specific security requirements that is separated from other segments through access controls and monitoring.
The process of converting data into a coded format to prevent unauthorised access. Includes encryption at rest (stored data) and encryption in transit (data being transmitted).
A mathematical procedure used to encrypt and decrypt data, providing the computational basis for protecting information confidentiality.
A string of bits used by a cryptographic algorithm to transform plaintext into ciphertext (encryption) or ciphertext back into plaintext (decryption).
A documented policy defining requirements for encrypting data at rest, in transit, and in use across the organization.
The encryption of data while it is stored on disk, database, or other storage media to protect it from unauthorized access if the storage is compromised.
Encryption of data throughout its entire journey from sender to recipient, preventing any intermediary from accessing the content.
Security solutions that continuously monitor endpoint devices to detect, investigate, and respond to cyber threats using behavioral analysis and automated response.
The administration and security of all endpoint devices connecting to an organization's network, including configuration, patching, and monitoring.
Security software and policies deployed on endpoint devices such as laptops, desktops, and mobile devices to protect against malware, exploits, and unauthorized access.
A comprehensive security solution deployed on endpoint devices (laptops, desktops, mobile devices) to prevent, detect, and respond to threats. EPP typically combines anti-malware, personal firewall, and intrusion prevention capabilities.
Regulations specific to the energy industry including cybersecurity standards, environmental requirements, and grid reliability mandates.
Regulatory measures taken against organizations that violate compliance requirements, including fines, sanctions, cease-and-desist orders, and consent agreements.
The process of registering a user's identity credentials such as biometric data, certificates, or tokens in an authentication system.
A conceptual framework that defines the structure and operation of an organization's IT landscape in alignment with business strategy.
A holistic approach to managing all types of organizational risk including strategic, operational, financial, and compliance risks in an integrated framework.
A holistic approach to identifying, assessing, and managing risks across an entire organisation. Frameworks include COSO ERM and ISO 31000.
The comprehensive approach to protecting all aspects of an organization's information assets across the entire enterprise.
The process of managing fine-grained access rights and permissions assigned to users, defining specifically what actions they can perform on which resources.
Adherence to environmental laws and regulations governing pollution control, waste management, emissions, and natural resource protection.
Systems that maintain optimal environmental conditions in facilities housing IT equipment, including temperature, humidity, and air quality management.
Continuous surveillance of environmental conditions such as temperature, humidity, water presence, and air quality in data centers and server rooms.
A framework evaluating an organization's practices related to environmental sustainability, social responsibility, and corporate governance standards.
Secure processes for decommissioning and disposing of IT equipment to prevent data recovery and ensure compliance with environmental regulations.
Regular servicing and upkeep of IT equipment and security systems to ensure continued proper operation and security compliance.
A formal request from a data subject asking an organization to delete their personal data, triggering an obligation to comply unless exemptions apply.
A defined process for elevating issues, incidents, or decisions to higher levels of authority when they exceed current handling capability.
A contractual arrangement where critical assets such as source code or encryption keys are held by a neutral third party for release under specified conditions.
Eight mitigation strategies recommended by the Australian Signals Directorate to protect organisations against cyber threats. The Essential Eight covers application control, patching, macro settings, user application hardening, admin privileges, MFA, backups, and patching operating systems.
Critical business functions and operations that must be maintained during disruptions to ensure organizational survival and stakeholder obligations.
Security measures applied at the data link layer to protect wired network connections from unauthorized access and eavesdropping.
The development and deployment of AI systems that adhere to ethical principles including fairness, transparency, privacy, and non-maleficence.
The practice of responsibly reporting discovered security vulnerabilities to affected vendors, giving them time to create patches before public disclosure.
Authorized security testing performed by skilled professionals who use the same techniques as malicious hackers to identify vulnerabilities before they can be exploited.
A body within an organisation responsible for reviewing ethical issues, establishing ethical guidelines, and ensuring that business practices align with the organisation's values and ethical standards.
The examination of security events to determine their significance, potential impact, and whether they constitute incidents requiring response.
The systematic recording of security-relevant events and activities across systems and applications for monitoring, analysis, and compliance purposes.
The likelihood that a specific risk event will occur within a defined time period, typically expressed as a percentage or qualitative rating.
The process of gathering documentation, records, screenshots, logs, and other artefacts that demonstrate the design and operating effectiveness of controls. Evidence collection is fundamental to compliance audits and attestation engagements.
The systematic collection, organization, storage, and retrieval of audit evidence to support compliance demonstrations and audits.
The process of securing and maintaining the integrity of digital evidence during and after a security incident for potential legal proceedings.
A centralized storage system for organizing and maintaining compliance evidence, audit artifacts, and supporting documentation.
The formal process of documenting, approving, and tracking instances where an organisation cannot comply with a specific policy or control requirement. Exceptions require documented business justification, compensating controls, and periodic review.
A summary report prepared for senior leadership that communicates key risks, their status, and the effectiveness of risk management activities.
Active support and advocacy from a senior executive for a program, project, or initiative, providing visibility, resources, and organizational authority.
A scheduled series of drills, tabletop exercises, and simulations designed to test and improve emergency response and business continuity plans.
Controls and technologies designed to prevent the unauthorized extraction of data from an organization's network, including DLP and egress filtering.
The degree to which the internal mechanics of an AI or machine learning system can be explained in human terms. Explainability is a key requirement of the EU AI Act for high-risk AI systems.
AI systems and techniques designed to produce explanations of their decision-making processes that are understandable to humans, supporting trust and compliance.
A piece of software, data, or sequence of commands that takes advantage of a vulnerability in a computer system, application, or network to cause unintended behaviour such as unauthorised access or code execution.
A sequence of multiple exploits used together to achieve a goal that no single exploit could accomplish alone, such as gaining root access.
The process of creating code or techniques that leverage security vulnerabilities, conducted by security researchers to understand and mitigate threats.
A toolkit used by attackers to automatically exploit vulnerabilities in client-side software. Exploit kits are typically hosted on compromised websites and target browser and plugin vulnerabilities.
Regulations governing the export of sensitive goods, software, and technology to foreign countries, requiring licenses and compliance with embargo restrictions.
An evaluation of an organization's vulnerable attack surface including internet-facing assets, misconfigurations, and unpatched systems that could be exploited.
An integrated security platform that correlates data across multiple security layers including endpoints, network, cloud, and email for comprehensive threat detection.
A unified security incident detection and response platform that automatically collects and correlates data from multiple security layers including email, endpoint, server, cloud workloads, and network.
Security measures for protecting virtual reality, augmented reality, and mixed reality systems and the data they collect and process.
An independent examination of an organisation's controls, processes, or financial statements conducted by a party outside the organisation. External audits provide objective assurance to stakeholders and regulators.
An independent professional or firm engaged to examine an organisation's financial statements, controls, or compliance with standards. External auditors provide objective assurance to stakeholders, regulators, and the public.
Authorized security testing conducted from outside the organization's network perimeter to identify vulnerabilities accessible from the internet.
The application of privacy laws beyond a country's borders to foreign organizations that process the personal data of that country's residents.
The process of identifying, collecting, and producing electronically stored information for use in legal proceedings or regulatory investigations. eDiscovery requires organisations to preserve and produce relevant electronic data.
EU Directive 2002/58/EC that regulates the processing of personal data and protection of privacy in the electronic communications sector. The ePrivacy Directive covers cookies, electronic marketing, and confidentiality of communications.
A proposed EU regulation that will replace the ePrivacy Directive, governing electronic communications privacy including cookies, direct marketing, and metadata processing.
F60 terms
A quantitative risk analysis model that provides a framework for understanding, measuring, and analysing information risk in financial terms. FAIR decomposes risk into measurable factors: loss event frequency and loss magnitude.
US FDA regulations establishing criteria for accepting electronic records and electronic signatures as equivalent to paper records and handwritten signatures.
The Family Educational Rights and Privacy Act protects the privacy of student education records and gives parents and eligible students control over their information.
The Federal Financial Institutions Examination Council that prescribes uniform principles, standards, and report forms for the federal examination of financial institutions. FFIEC guidance covers cybersecurity, IT, and operational risk.
Federal Information Processing Standards, US government standards for computer systems used by non-military federal agencies and government contractors.
The Federal Information Security Modernization Act requires federal agencies to implement comprehensive security programs for their information systems.
Comprehensive physical security measures for organizational facilities including access controls, surveillance, environmental protection, and visitor management.
A system behavior where access is permitted when a security control fails, prioritizing availability over security in specific use cases.
A design principle where a system defaults to a secure state when a failure occurs, maintaining protection even during malfunction.
The process of restoring operations from a backup or disaster recovery site back to the original primary site after a disruption is resolved.
The automatic switching to a redundant or standby system, server, or network when the primary system fails. Failover ensures continuity of operations and is a critical component of high-availability architectures.
A systematic methodology for evaluating processes to identify potential failure modes, their causes, effects, and priority for corrective action.
US federal law (FCRA) that regulates the collection, dissemination, and use of consumer credit information to protect privacy and ensure accuracy.
A set of internationally recognized principles for protecting personal information privacy, forming the foundation of most modern data protection laws.
A security detection failure where a genuine threat is not identified, allowing malicious activity to proceed undetected.
An alert or detection that incorrectly indicates malicious activity when the activity is actually legitimate. High false positive rates reduce the effectiveness of security monitoring by causing alert fatigue.
The ability of a system to continue operating properly in the event of the failure of some of its components.
The Federal Risk and Authorization Management Program, a US government programme that standardises security assessment and authorisation for cloud services used by federal agencies.
The formal process through which a cloud service provider obtains approval to offer its services to US federal agencies. FedRAMP authorization requires implementing NIST SP 800-53 controls and assessment by a Third Party Assessment Organization.
Adherence to regulations and standards mandated by federal government agencies for organizations operating within their jurisdiction.
US legislation that requires federal agencies to develop, document, and implement information security programmes. FISMA mandates the use of NIST standards and the NIST Risk Management Framework.
A system enabling users to access multiple applications across different organizations using the same credentials through trust relationships.
A machine learning approach where a model is trained across multiple decentralised devices or servers holding local data samples, without exchanging the raw data. Federated learning helps preserve data privacy while enabling collaborative model training.
The legal obligation to act in the best interest of another party, applicable to board members and officers regarding organizational governance.
Encryption applied to individual data fields within a database or application, allowing granular control over which specific data elements are protected.
A security control that detects changes to critical system files, configurations, and content by comparing current states against known good baselines.
A security control that validates the integrity of operating system and application files by comparing their current state against a known good baseline. FIM is required by PCI DSS and recommended by most security frameworks.
Security measures for protecting file transfers including encryption, authentication, and integrity verification when using FTP and its secure variants.
An intergovernmental organisation that sets international standards for combating money laundering, terrorist financing, and other threats to the integrity of the international financial system.
An examination of an organization's financial statements and records to verify accuracy and compliance with accounting standards.
Adherence to laws and regulations governing financial reporting, transactions, and operations within the financial services industry.
The UK regulatory body responsible for overseeing financial markets and firms, ensuring consumer protection, market integrity, and competition.
The possibility of monetary loss arising from financial transactions, market conditions, credit defaults, or other financial factors.
The comprehensive set of regulations governing financial institutions including banking, insurance, securities, and payment processing.
A conclusion drawn from audit evidence that identifies a condition, criteria, cause, and effect. Audit findings range from major nonconformities to minor observations and recommendations for improvement.
The categorization of audit findings by severity such as critical, major, minor, or observation to prioritize remediation efforts.
Systems designed to detect and extinguish fires in facilities, particularly data centers, using methods that minimize damage to equipment and data.
A network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Firewalls establish a barrier between trusted internal networks and untrusted external networks.
Practices and technologies for ensuring the integrity and security of firmware code that controls hardware device behavior and boot processes.
The examination of network flow data including source, destination, volume, and timing to identify anomalous patterns and potential security threats.
An audit conducted to verify that corrective actions from previous audit findings have been effectively implemented and sustained.
The detailed technical examination of digital evidence to determine the cause, scope, and impact of a security incident.
A bit-for-bit copy of a storage device or partition created for digital forensic analysis while preserving the integrity of the original evidence.
The ability of an organization to efficiently collect, preserve, and analyze digital evidence when needed for incident investigation or legal proceedings.
A collection of hardware and software tools used by digital forensic investigators to collect, preserve, and analyze digital evidence.
An encryption technique that produces ciphertext in the same format as the plaintext, useful for encrypting data while maintaining legacy system compatibility.
A property of cryptographic protocols ensuring that session keys cannot be compromised even if the server's private key is later compromised.
A large-scale AI model trained on broad data that can be adapted to a wide range of downstream tasks. Foundation models (such as large language models) are subject to specific transparency requirements under the EU AI Act.
Risks arising from the subcontractors and service providers used by an organization's direct third-party vendors and partners.
A structured set of guidelines, practices, and controls that organisations use to manage specific aspects of their operations. Compliance frameworks provide requirements for achieving and demonstrating compliance.
The process of mapping an organization's existing controls and practices to the requirements of a compliance framework to identify gaps and overlaps.
The analysis of similarities and differences between compliance frameworks to identify overlapping requirements and optimize multi-framework compliance.
The process of creating correspondences between controls in different compliance frameworks to streamline multi-standard compliance efforts.
Federal regulations requiring franchisors to provide prospective franchisees with specific pre-sale disclosures about the franchise system and its performance.
Technologies and processes for identifying fraudulent activities and transactions through pattern analysis, anomaly detection, and rule-based monitoring.
Controls and measures designed to deter and prevent fraudulent activities including financial fraud, identity fraud, and internal fraud.
A security measure that encrypts all data on a storage device, including the operating system, so that data is inaccessible without proper authentication.
The complete restoration of all affected systems, data, and operations to their normal state following a disruption or disaster.
A software testing technique that provides invalid, unexpected, or random data as input to programs to discover security vulnerabilities and coding errors.
An automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. Fuzzing aims to discover coding errors and security vulnerabilities.
G42 terms
The General Data Protection Regulation is a comprehensive EU law governing the collection, processing, and protection of personal data of individuals within the European Union.
The EU's comprehensive data protection regulation (effective May 2018). Applies to any organisation processing personal data of EU residents, regardless of the organisation's location.
The Gramm-Leach-Bliley Act requires financial institutions to explain their data sharing practices and protect sensitive consumer financial information.
US federal law that requires financial institutions to explain their information-sharing practices and safeguard sensitive customer data. GLBA includes the Safeguards Rule, which requires comprehensive information security programmes.
Governance, Risk, and Compliance, an integrated approach to aligning IT with business objectives, managing risk, and meeting compliance requirements.
An integrated approach to managing an organisation's governance, enterprise risk management, and regulatory compliance. GRC platforms provide unified visibility across these three disciplines.
An integrated technology solution that supports governance, risk management, and compliance activities in a unified platform.
A comprehensive approach to managing the interrelationship between governance, risk management, and compliance across an organization.
A comparison between an organisation's current state and the requirements of a target framework or standard. Identifies areas that need improvement to achieve compliance.
An evaluation that compares an organization's current state against the requirements of a standard or regulation to identify areas of non-compliance.
The process of implementing corrective actions to address identified deficiencies between current security practices and required standards or controls.
A documented plan with specific actions, timelines, and responsibilities for addressing gaps identified during compliance assessments.
A network point that serves as an entrance to another network, often implementing security controls such as firewalls and proxy services.
Security controls deployed at network entry and exit points to inspect traffic, enforce policies, and prevent threats from entering or data from leaving.
The EU's comprehensive data protection regulation (EU 2016/679) that harmonises data privacy laws across all member states. GDPR applies to any organisation processing personal data of EU residents, with penalties up to 4% of global annual turnover.
Artificial intelligence systems capable of generating text, images, code, audio, and other content. Generative AI raises unique governance challenges around intellectual property, misinformation, bias, and data privacy.
Policies and controls for managing the risks of generative AI systems including accuracy, bias, intellectual property, data privacy, and misuse.
Personal data relating to the inherited or acquired genetic characteristics of a natural person, which gives unique information about the physiology or health of that person. Classified as special category data under GDPR.
A location-based security control that creates virtual boundaries to trigger actions such as access restrictions or alerts when devices enter or leave defined geographic areas.
Security policies that restrict access to systems or data based on the physical location of the user or device making the request.
Data indicating the real-world geographic location of a device or individual, classified as personal data under most privacy regulations.
A browser-level signal that communicates a user's privacy preferences to websites, automating opt-out requests under applicable privacy laws.
A pre-configured, security-hardened template for operating systems or applications used to deploy standardized and consistent system configurations.
Regulations ensuring that products are consistently produced and controlled according to quality standards, particularly in pharmaceutical and food industries.
The system by which an organisation is directed and controlled. IT governance ensures that IT investments support business objectives and manage risks appropriately.
An examination of an organization's governance structures, processes, and effectiveness to ensure proper oversight and accountability.
The use of technology to automate governance activities including policy management, compliance monitoring, and reporting.
A formal body responsible for strategic direction, oversight, and decision-making regarding information security, risk, and compliance programs.
A formal body responsible for setting direction, making decisions, and providing oversight for specific governance areas.
A visual display providing real-time status of governance metrics, compliance posture, and risk indicators for leadership oversight.
A structured set of policies, processes, and practices that define how an organisation is directed, managed, and held accountable. Governance frameworks provide the foundation for decision-making, risk management, and performance monitoring.
The level of sophistication and effectiveness of an organization's governance practices, measured against defined capability levels.
The organizational structure and processes that define how authority is distributed, decisions are made, and accountability is maintained.
The process of communicating governance performance, compliance status, and risk information to board members and senior management.
An integrated approach to managing organizational governance, enterprise risk management, and regulatory compliance to ensure alignment with business objectives.
The organizational hierarchy and arrangement of roles, committees, and reporting lines that enable effective governance and oversight.
Regulatory requirements specific to government agencies and contractors including security clearances, procurement rules, and transparency mandates.
A security testing approach where the tester has partial knowledge of the target system, such as user credentials or basic architecture information.
Adherence to environmental regulations and sustainability standards related to IT operations including energy efficiency and electronic waste.
The total level of risk before any controls, mitigation measures, or risk treatment actions are applied, also known as inherent risk.
A Windows feature for centrally managing and configuring operating systems, applications, and user settings across an Active Directory environment.
Professional security personnel deployed to protect facilities, control access, monitor surveillance systems, and respond to security incidents.
H38 terms
The Health Insurance Portability and Accountability Act, a US federal law that establishes standards for protecting sensitive health information. Includes the Privacy Rule and Security Rule.
Requirements under HIPAA for covered entities and business associates to notify affected individuals, HHS, and media of breaches of unsecured PHI.
HIPAA regulations that establish standards for the protection of individually identifiable health information held by covered entities and business associates.
HIPAA regulations requiring covered entities to implement administrative, physical, and technical safeguards to protect electronic protected health information.
A web security policy mechanism that forces browsers to interact with websites only over HTTPS connections, preventing protocol downgrade attacks.
The secure version of HTTP that uses TLS/SSL to encrypt communication between a web browser and a web server. HTTPS protects the confidentiality and integrity of data exchanged between the user and the site.
The process of securing a system by reducing its attack surface through removing unnecessary software, disabling unused services, applying patches, and configuring security settings according to established baselines such as CIS Benchmarks.
A detailed document providing step-by-step instructions for configuring a specific system or application to meet security requirements.
A security mechanism where hardware provides cryptographic proof of its identity, configuration, and integrity to verify system trustworthiness.
A dedicated cryptographic processor that provides secure generation, storage, and management of digital keys and performs encryption operations in a tamper-resistant device.
A dedicated physical computing device that safeguards and manages cryptographic keys, performs encryption and decryption, and provides authentication services. HSMs are tamper-resistant and used in high-security environments.
A situation where two different inputs produce the same hash output, which can be exploited in cryptographic attacks if the hash function is weak.
A mathematical algorithm that maps data of arbitrary size to a fixed-size output, used for data integrity verification and password storage.
A fixed-size string produced by a hash function from input data of any size. Hash values are used for data integrity verification, password storage, digital signatures, and blockchain technology.
A periodic assessment of the health and security posture of systems, applications, or programs to identify issues before they become critical.
Personal data related to the physical or mental health of a natural person, including the provision of health care services. Health data is treated as special category data under GDPR and regulated by HIPAA in the United States.
The electronic sharing of health-related information between healthcare organizations, requiring strict privacy and security controls.
Adherence to laws and regulations specific to the healthcare industry, including patient privacy, billing practices, and clinical standards.
Security measures specific to healthcare information technology systems, protecting electronic health records and medical devices from cyber threats.
A visual representation of risks plotted on a matrix by likelihood and impact, using colors to indicate severity levels for prioritization.
Security protocols for help desk operations including identity verification procedures and protection against social engineering attacks.
System design and implementation that ensures a predetermined level of operational performance and uptime, typically 99.9% or higher.
Under the EU AI Act, an AI system that poses significant risks to health, safety, or fundamental rights. High-risk AI systems are subject to mandatory requirements including risk management, data governance, transparency, human oversight, and accuracy.
Data processing activities that pose a significant risk to the rights and freedoms of individuals, requiring enhanced safeguards and impact assessments.
A form of encryption that permits computations on encrypted data without first decrypting it. Homomorphic encryption enables data to be processed in its encrypted form, preserving privacy while allowing analysis.
A security mechanism set to detect, deflect, or counteract attempts at unauthorised use of information systems. Honeypots are decoy systems designed to lure attackers and study their methods.
An attack where a user gains access to resources belonging to another user with the same privilege level.
Regulations governing the hospitality industry including guest data protection, payment card security, food safety, and accessibility requirements.
A software-based firewall running on individual endpoints that controls network traffic to and from that specific device based on security rules.
A security system installed on individual hosts that monitors system calls, file modifications, and logs to detect suspicious activity on that specific device.
An urgent software update released outside the normal patch cycle to address a critical vulnerability or severe bug that needs immediate remediation.
A fully equipped backup facility with hardware, software, and data replication already in place, ready to assume operations within minutes to hours of a disaster. Hot sites are the most expensive but fastest disaster recovery option.
Information that relates to a household rather than a specific individual, with varying classification under different privacy laws.
The element of cybersecurity risk related to human behavior, decision-making, and susceptibility to social engineering attacks.
An AI system design pattern where human oversight is integrated into the decision-making process. Human-in-the-loop ensures that critical decisions receive human review and is required for high-risk AI systems under the EU AI Act.
Security strategies and controls designed to protect environments that combine on-premises infrastructure with public and private cloud services.
A cryptographic approach that combines the efficiency of symmetric encryption with the key management advantages of asymmetric encryption.
Measures to protect the software layer that creates and manages virtual machines from attacks that could compromise all hosted virtual environments.
I160 terms
The process of identifying, assessing, and managing risks associated with information and communication technology. ICT risk management is central to DORA, CPS 234, and other technology-focused regulations.
The International Electrotechnical Commission's numbering for ISO 27001, the international standard for information security management systems.
An international series of standards for industrial automation and control system cybersecurity, covering operator, integrator, and component manufacturer requirements.
A scoring system that evaluates IP addresses based on their historical behavior to identify sources of spam, malware, or other malicious activity.
The creation of Internet Protocol packets with a forged source IP address to impersonate another computing system. IP spoofing is used in denial-of-service attacks and to bypass IP-based authentication.
A security practice that restricts network or application access to only specified trusted IP addresses, blocking all other connection attempts.
A suite of protocols that authenticates and encrypts IP packets to secure communications over IP networks, commonly used in VPN implementations.
A global professional association that provides knowledge, credentials, training, and community for information systems audit, assurance, security, governance, risk, and privacy professionals. ISACA administers CISA, CISM, CRISC, and CGEIT certifications.
The International Information System Security Certification Consortium, a non-profit organization that provides cybersecurity certifications including CISSP.
The Australian Government's cybersecurity framework produced by the Australian Signals Directorate. The ISM provides cybersecurity guidance for all levels of government and is based on risk management principles.
A systematic approach to managing sensitive information so that it remains secure. ISO 27001 specifies the requirements for establishing, implementing, maintaining, and continually improving an ISMS.
The international standard for Environmental Management Systems (EMS) that specifies requirements for establishing, implementing, maintaining, and improving environmental performance. ISO 14001 shares the Annex SL structure with ISO 27001 and ISO 9001.
The international standard that provides guidance on managing audit programmes, conducting internal or external audits, and evaluating the competence of auditors. ISO 19011 applies to all management system audits.
The international standard for IT service management systems, specifying requirements for establishing, implementing, and improving IT service delivery.
The international standard for food safety management systems, specifying requirements for organizations in the food chain to ensure food safety.
The international standard for Business Continuity Management Systems (BCMS) that specifies requirements for planning, establishing, implementing, operating, monitoring, reviewing, maintaining, and continually improving a BCMS.
The international standard for information security management systems (ISMS). The 2022 revision (ISO/IEC 27001:2022) includes 93 controls in Annex A, restructured into four themes.
Formal certification that an organization's information security management system meets all requirements of the ISO 27001 standard.
A professional qualified to lead ISO 27001 audits, assessing information security management systems against the standard's requirements.
A professional qualified to lead the implementation and management of an ISO 27001 information security management system.
The companion standard to ISO 27001 that provides implementation guidance for the Annex A controls. Not a certifiable standard itself. It supports ISO 27001 implementation.
The international standard providing guidelines for information security risk management, supporting the requirements of ISO 27001.
An international standard that provides guidelines for information security controls applicable to the provision and use of cloud services. ISO 27017 extends ISO 27002 with cloud-specific guidance.
An international standard that establishes objectives, controls, and guidelines for implementing measures to protect Personally Identifiable Information (PII) in public cloud computing environments.
An international standard providing guidance on information security controls for the energy utility industry's process control systems.
An international standard providing guidance for improving cybersecurity, addressing the security of cyberspace and its relationship to other security domains.
An international standard providing principles for incident management in information security, covering planning, detection, assessment, and response.
An extension to ISO 27001 and ISO 27002 for privacy information management. ISO 27701 specifies requirements for establishing, implementing, maintaining, and continually improving a Privacy Information Management System (PIMS).
An international standard providing guidance on information security management in health informatics for organizations handling personal health information.
The international standard for risk management that provides principles, a framework, and a process for managing risk. ISO 31000 applies to any type of risk, regardless of its nature, and is applicable to any organisation.
The international standard for anti-bribery management systems, specifying requirements for preventing, detecting, and addressing bribery.
The international standard for occupational health and safety management systems, providing a framework for managing workplace safety risks.
The joint ISO and IEC international standard specifying requirements for establishing, implementing, maintaining, and improving an information security management system.
An examination of an organization's information technology infrastructure, policies, and operations to determine whether controls adequately protect assets.
A documented plan for maintaining or restoring IT operations when systems are disrupted, covering both preventive and recovery measures.
The framework of policies, processes, and organizational structures that ensure IT investments support business objectives and manage technology risks.
The management of an organization's IT investments, projects, and assets as a portfolio to optimize value, manage risk, and align with strategy.
The capability to restore IT services within agreed timeframes after a disruption, forming a critical component of overall business continuity.
A set of policies, processes, and procedures for managing the delivery and support of IT services to meet organizational and customer requirements.
The activities directed by policies, organised and structured in processes and supporting procedures, that are performed by an organisation to plan, deliver, operate, and control IT services offered to customers.
International Traffic in Arms Regulations controlling the export and temporary import of defense articles and services on the US Munitions List.
US regulations that control the export and import of defence-related articles and services. ITAR requires that information related to defence and military technologies is protected from foreign access.
The Information Technology Infrastructure Library, a set of practices for IT service management (ITSM). ITIL 4 aligns with modern ways of working including Agile, DevOps, and Lean.
A set of detailed practices for IT service management that focuses on aligning IT services with the needs of the business. ITIL 4 organises guidance around the Service Value System and 34 management practices.
Security controls and practices specific to Infrastructure as a Service cloud environments where the customer manages the operating system and above.
The use of data analysis and machine learning to detect anomalous identity-related activities and optimize access management decisions.
A system of trust between identity providers and service providers that allows users to authenticate once and access multiple systems across different organisations. Federation protocols include SAML, OAuth, and OpenID Connect.
The policies and processes that manage and control user identities, access rights, and entitlements across the organisation. Identity governance includes access certifications, segregation of duties enforcement, and role management.
The end-to-end management of user identities from creation through modification and eventual deprovisioning when no longer needed.
The process of verifying that a person is who they claim to be before issuing credentials, using documents, biometrics, or knowledge-based verification.
A service that creates, maintains, and manages identity information and provides authentication services to applications in a federated or SSO environment.
The process of connecting disparate data points to a single individual across different data sources and devices, raising privacy implications.
Security capabilities focused on detecting threats targeting identity infrastructure including credential theft, privilege escalation, and lateral movement.
The process of confirming that an individual's claimed identity matches their actual identity through document checks, biometric comparison, or other methods.
A framework of policies, processes, and technologies for managing digital identities and controlling user access to organizational resources.
A framework of policies, processes, and technologies for managing digital identities and controlling user access to critical information within an organisation. IAM ensures the right individuals have appropriate access at the right times.
Cloud-based identity management that provides authentication, authorization, single sign-on, and directory services delivered as a managed service.
A cloud-based authentication infrastructure that provides identity and access management capabilities as a service. IDaaS solutions include single sign-on, multi-factor authentication, directory services, and access governance.
The forensic examination of disk images, memory dumps, or file system snapshots to identify evidence of security incidents or policy violations.
An infrastructure approach where servers are never modified after deployment, instead being replaced with new instances built from updated templates.
The assessment of the potential consequences of a risk event, security incident, or system change on business operations, finances, and reputation.
An analysis of the potential consequences of a specific event, threat, or vulnerability being realised. Impact assessments consider financial, operational, reputational, legal, and regulatory consequences.
A numerical rating assigned to a vulnerability or risk based on the potential severity of consequences if it is exploited or occurs.
A social engineering technique where an attacker pretends to be a trusted individual or authority figure to manipulate victims into revealing information.
Consent inferred from an individual's actions or inaction rather than explicit agreement, with limited applicability under strict privacy regulations.
A classification system for organizing security incidents by type such as malware, phishing, data breach, or denial of service.
The process of categorizing security incidents by type, severity, and impact to ensure appropriate response procedures and resource allocation.
A standardized management structure for coordinating emergency response, defining clear roles, communication channels, and resource management procedures.
The individual with overall authority and responsibility for managing the response to a specific security incident.
The structured process of informing stakeholders, regulators, affected parties, and the public about security incidents according to defined protocols.
Actions taken to limit the scope and impact of a security incident, such as isolating affected systems, blocking malicious traffic, or disabling compromised accounts.
The recording of all aspects of a security incident including timeline, actions taken, evidence collected, and lessons learned.
The phase of incident response focused on removing the root cause of a security incident and eliminating all traces of the threat from affected systems.
The process of elevating a security incident to higher levels of management or specialized response teams based on severity and impact.
A trained professional responsible for detecting, analyzing, and responding to security incidents as part of the incident response team.
The probability that a specific security incident will occur, based on threat intelligence, vulnerability data, and historical incident patterns.
A chronological record of all events, actions, and decisions related to a security incident from detection through resolution.
The process for detecting, reporting, assessing, responding to, and learning from incidents in a systematic and coordinated manner.
The defined workflow for handling security incidents from detection through containment, eradication, recovery, and post-incident review.
Quantitative measures used to track and evaluate the frequency, severity, response time, and cost of security incidents.
A documented set of step-by-step procedures for responding to specific types of security incidents, guiding responders through standardized actions.
A structured review conducted after a security incident to analyze what happened, identify root causes, and develop improvements to prevent recurrence.
The phase of incident response where affected systems are restored to normal operations and verified to be free of threats.
A centralized log of all security incidents including their type, severity, response actions, and resolution status.
The formal documentation and communication of security incidents to management, regulators, and other stakeholders as required by policy and regulation.
The organised approach to addressing and managing a security breach or cyberattack. Includes preparation, identification, containment, eradication, recovery, and lessons learned.
The use of technology to automate steps in the incident response process, such as containment actions, evidence collection, and notifications.
A structured approach providing guidance for preparing for, detecting, containing, and recovering from cybersecurity incidents.
The complete process of handling a security incident from preparation and detection through containment, eradication, recovery, and lessons learned.
A documented set of instructions that outlines an organisation's procedures for detecting, responding to, and recovering from security incidents. Required by frameworks including ISO 27001, NIST CSF, PCI DSS, and HIPAA.
A pre-arranged agreement with a cybersecurity firm to provide incident response services on-demand when a security breach occurs.
A cross-functional group of trained professionals responsible for managing the organization's response to cybersecurity incidents.
A governance body that reviews significant security incidents to evaluate response effectiveness and approve recommendations for improvement.
A classification system that rates security incidents based on their impact and urgency to determine appropriate response priority and resources.
A chronological reconstruction of events before, during, and after a security incident used for analysis and reporting.
The initial assessment and prioritization of security incidents based on severity, impact, and urgency to determine appropriate response actions.
Observable patterns of behavior or events that suggest an active attack is underway, used by security teams to detect threats in real time.
Forensic artifacts such as file hashes, IP addresses, domain names, or registry keys that indicate a system has been breached or infected.
Forensic evidence that suggests a security breach has occurred or is in progress. IoCs include unusual network traffic patterns, unexpected file changes, suspicious login attempts, and known malicious IP addresses or file hashes.
The set of rights granted to data subjects under privacy regulations, enabling them to exercise control over their personal data. Under GDPR, these include rights of access, rectification, erasure, restriction, portability, and objection.
Security measures for protecting SCADA, DCS, and PLC systems that manage critical infrastructure and industrial processes from cyber threats.
The unauthorized acquisition of trade secrets, proprietary information, or intellectual property for commercial advantage.
Voluntary standards, codes of conduct, and best practices adopted by industry participants to regulate their own behavior without government mandate.
Any data, system, or resource that has value to the organization and requires protection based on its classification level.
A catalog of an organization's information assets including their classification, ownership, location, and protection requirements.
Practices for managing risks related to the use, processing, storage, and transmission of information to ensure its confidentiality, integrity, and availability.
A governance process that categorizes information assets based on their sensitivity and criticality to determine appropriate protection measures.
A policy defining how information assets should be categorized based on sensitivity and the handling requirements for each classification level.
The head of a data protection authority responsible for enforcing data protection laws within a jurisdiction. In the UK, the Information Commissioner leads the Information Commissioner's Office (ICO).
The UK's independent body established to uphold information rights, including enforcement of the UK GDPR and Data Protection Act 2018. The ICO has the power to impose fines of up to 17.5 million pounds or 4% of annual global turnover.
The sharing of information between organizations, departments, or systems, requiring security controls to protect data during transfer.
The set of multi-disciplinary structures, policies, procedures, processes, and controls implemented to manage information at an enterprise level. Information governance ensures that data is managed as a valuable organisational asset.
The procedures for creating, processing, storing, transmitting, and disposing of information according to its classification and sensitivity.
The stages through which information passes from creation and collection through use, storage, archival, and eventual destruction.
The right of individuals to control how their personal information is collected, used, and shared by organizations and governments.
Technology that protects sensitive documents by controlling who can access, edit, print, or forward them regardless of where the documents are stored.
The process of identifying, assessing, and treating risks to an organization's information assets to protect their confidentiality, integrity, and availability.
The practice of protecting information by mitigating risks to its confidentiality, integrity, and availability. Governed by frameworks such as ISO 27001 and NIST CSF.
A systematic approach to managing sensitive company information through policies, procedures, and controls to ensure confidentiality, integrity, and availability.
A systematic approach to managing sensitive information so that it remains secure, encompassing people, processes, and technology. An ISMS is central to ISO 27001 certification and includes risk assessment, security controls, and continuous improvement.
A formal document that defines an organisation's approach to managing and protecting its information assets. The policy sets the strategic direction for information security and is typically approved by top management.
The exchange of cybersecurity threat intelligence, vulnerability data, and incident information between organizations to improve collective defense capabilities.
An integrated set of components for collecting, storing, processing, and communicating information that requires security protection.
An examination of an organization's information systems, technology infrastructure, and IT controls to evaluate security, reliability, and compliance.
Authorized security testing of network infrastructure including servers, routers, switches, and firewalls to identify configuration and security weaknesses.
Security measures for protecting the core technology infrastructure including servers, networks, storage, and operating systems from threats.
The practice of managing and provisioning infrastructure through machine-readable configuration files rather than manual processes. IaC enables consistent, repeatable, and auditable infrastructure deployments.
Security practices for scanning and validating infrastructure code templates to prevent misconfigurations before cloud resources are provisioned.
The practice of monitoring and controlling inbound network traffic to block unauthorised access and malicious traffic. Ingress filtering verifies that incoming packets have legitimate source addresses.
The level of risk present in an activity or process before any controls or mitigating actions are applied, representing the natural risk exposure.
The first formal audit conducted by a certification body to determine whether an organization's management system meets standard requirements.
The process of verifying that user-supplied data meets expected formats and constraints before processing, preventing injection attacks and data corruption.
The potential for current or former employees, contractors, or partners to intentionally or accidentally compromise organizational security.
A security risk that originates from within the organisation, typically from current or former employees, contractors, or business partners who have inside information concerning security practices, data, and computer systems.
An organizational initiative that combines policies, procedures, and technologies to detect, deter, and mitigate threats from trusted insiders.
Regulatory requirements for insurance companies including solvency standards, consumer protection, data privacy, and claims handling procedures.
A single management system that addresses the requirements of multiple standards simultaneously, such as ISO 9001, ISO 27001, and ISO 14001. Integration is facilitated by the Annex SL high-level structure shared by all ISO management system standards.
A coordinated approach to managing all types of risk across an organization, breaking down silos between risk management functions.
The principle of ensuring that data is accurate, complete, and has not been modified by unauthorised parties. One of the three pillars of the CIA triad.
Continuous surveillance of systems and data to detect unauthorized modifications, ensuring that information and configurations remain in their authorized state.
The process of confirming that data, systems, or configurations have not been tampered with or altered from their authorized state.
Security measures for safeguarding trade secrets, patents, copyrights, and other proprietary assets from theft and unauthorized use.
The combination of artificial intelligence and automation technologies to streamline business processes, requiring governance and compliance oversight.
A security testing approach that combines elements of static and dynamic analysis to identify vulnerabilities while the application is running.
An independent, objective assurance activity within an organisation that evaluates the effectiveness of risk management, controls, and governance processes.
A professional employed by or contracted to an organisation to conduct independent assessments of risk management, control, and governance processes. Internal auditors follow standards set by the Institute of Internal Auditors (IIA).
A process effected by an organisation's board, management, and other personnel designed to provide reasonable assurance regarding the achievement of objectives in operations, reporting, and compliance. The COSO framework defines the standard for internal control.
Authorized security testing conducted from within the organization's network to simulate attacks by insiders or compromised accounts.
The transmission of personal data from one jurisdiction to another, requiring appropriate safeguards and legal bases under data protection regulations.
US regulations controlling the export and import of defense-related articles and services on the United States Munitions List.
A protocol used in IPsec VPNs to establish security associations by negotiating encryption algorithms and exchanging cryptographic keys.
Security practices for protecting IoT devices, networks, and data from threats including unauthorized access, device hijacking, and data interception.
A security tool that monitors network traffic or system activities for signs of malicious behavior and generates alerts when suspicious activity is detected.
A device or software application that monitors network traffic or system activities for malicious activities or policy violations. IDS alerts security personnel when suspicious activity is detected.
A network security tool that monitors traffic and automatically takes action to block or prevent detected threats from entering the network.
A network security technology that monitors network traffic for malicious activities and can take automated actions to block or prevent detected threats. IPS extends IDS capabilities with active threat mitigation.
A formal document detailing the findings, analysis, and conclusions of a security incident investigation.
A security technique that separates systems, processes, or data from each other to prevent unauthorized access and contain the impact of breaches.
The process of identifying, tracking, escalating, and resolving compliance issues, audit findings, and risk events to ensure timely remediation.
J4 terms
The process of removing software restrictions imposed by the manufacturer on a mobile device. Jailbreaking can expose devices to security vulnerabilities and is typically prohibited by enterprise mobile device management policies.
Two or more entities that jointly determine the purposes and means of processing personal data, sharing data protection responsibilities.
A hardened intermediary server used to access and manage devices in a separate security zone, enforcing access control and audit logging.
A privileged access management approach that grants users elevated permissions only when needed and for a limited duration, reducing standing privilege risk.
K16 terms
The process of verifying the identity and assessing the suitability of customers. A key component of anti-money laundering compliance.
A network authentication protocol that uses secret-key cryptography to authenticate client-server applications. Kerberos provides mutual authentication where both the user and server verify each other's identity.
A critical control that directly addresses a significant risk and whose failure would materially increase the likelihood or impact of that risk.
An arrangement in which cryptographic keys are held by a trusted third party (escrow agent) for later retrieval under defined conditions. Key escrow enables lawful access to encrypted data when the original key holder is unavailable.
The administration of cryptographic keys in a cryptosystem, including generation, exchange, storage, use, destruction, and replacement of keys. Proper key management is essential for maintaining the security of encrypted data.
The secure management of physical keys and locks used for facility access, including key distribution, tracking, and periodic rekeying.
A measurable value that demonstrates how effectively an organization is achieving key business and security objectives.
A measurable value that demonstrates how effectively an organisation is achieving key objectives. In compliance, KPIs track metrics such as control effectiveness, audit findings closure rate, and policy compliance percentages.
A metric that provides early warning signals about increasing risk levels, enabling proactive risk management and timely intervention.
A metric used to signal increasing risk exposures in various areas of an enterprise. KRIs provide early warning signs that enable proactive risk management.
The practice of periodically replacing cryptographic keys with new ones to limit the amount of data encrypted with any single key.
Malicious software or hardware that records keystrokes made by a user. Keyloggers are used to capture passwords, credit card numbers, and other sensitive information without the user's knowledge.
A mechanism built into software or hardware that allows it to be shut down or disabled remotely. In security, kill switches can be used to disable compromised devices or halt the spread of malware.
Regulatory requirements for financial institutions to verify the identity of clients and assess their risk profile before establishing a business relationship.
The process of creating, sharing, using, and managing an organization's knowledge and information to achieve organizational objectives.
Security practices for protecting Kubernetes clusters and containerized applications, including pod security, network policies, RBAC, and secrets management.
L35 terms
Brazil's General Data Protection Law (Lei Geral de Protecao de Dados) that regulates the processing of personal data of individuals in Brazil.
Adherence to employment laws and regulations covering wages, working hours, safety, discrimination, harassment, and employee rights.
An AI model trained on large quantities of text data that can generate, summarise, translate, and reason about natural language. LLMs are a type of foundation model that powers conversational AI and text generation applications.
Techniques used by attackers after gaining initial access to move through a network to find and access higher-value targets. Lateral movement involves using compromised credentials and exploiting trust relationships between systems.
The legal ground for processing personal data under GDPR Article 6. The six lawful bases are: consent, contract performance, legal obligation, vital interests, public task, and legitimate interests.
The legal grounds under data protection law that justify the processing of personal data, including consent, contract performance, legitimate interest, and legal obligation.
A firewall that operates at the application layer of the OSI model, inspecting and filtering traffic based on application-specific content and behavior.
The security principle of granting users only the minimum access rights needed to perform their job functions. Reduces the attack surface and limits damage from compromised accounts.
A security concept requiring that users and systems are granted only the minimum level of access necessary to perform their authorized functions.
Adherence to all applicable laws and statutes that govern an organization's operations, including civil, criminal, and administrative law.
A directive to preserve all relevant documents, data, and records when litigation is anticipated, overriding normal retention and deletion schedules.
Regulatory and ethical requirements for legal professionals and law firms including client confidentiality, conflicts of interest, and data protection.
The protection of communications between an attorney and client from disclosure, relevant to incident investigations and compliance matters.
The potential for financial loss or business disruption arising from legal actions, regulatory enforcement, or failure to comply with legal obligations.
One of six lawful bases for processing personal data under GDPR. Processing is lawful when necessary for the legitimate interests of the controller or a third party, provided those interests are not overridden by the rights of the data subject.
A structured evaluation to determine whether a data controller's legitimate interests override the privacy rights of the individuals affected.
Brazil's comprehensive data protection law modelled after the GDPR. LGPD establishes rules for the collection, processing, storage, and sharing of personal data and applies to any organisation processing data of individuals in Brazil.
The documented knowledge gained from experiences, both positive and negative, used to improve future performance and prevent recurring issues.
A document capturing insights from a security incident or exercise, including what worked well and what needs improvement.
The process of tracking, controlling, and optimizing the use of software licenses to ensure compliance with vendor terms.
Ensuring proper acquisition, tracking, and adherence to the terms and conditions of software licenses and intellectual property agreements.
The evaluation of the probability that a specific threat will exploit a vulnerability, resulting in an adverse event.
Encryption of data at the data link layer that protects all traffic on a communication link, including headers and routing information.
Security considerations for load balancing infrastructure including SSL/TLS termination, traffic inspection, and protection against application-layer attacks.
Security measures for shipping and receiving areas to prevent unauthorized access, theft, and introduction of malicious items into facilities.
The protection of information about an individual's physical movements and geographic position from unauthorized collection and use.
Physical locking mechanisms used to secure doors, cabinets, and equipment, including mechanical locks, electronic locks, and combination locks.
The collection and centralization of log data from multiple sources into a single repository for unified analysis and monitoring.
The examination of system and application logs to identify security events, troubleshoot issues, and support compliance monitoring.
The process of analyzing log data from multiple sources to identify related events and detect patterns that may indicate security threats.
The process of collecting, aggregating, storing, and analysing log data from various sources across an IT environment. Log management supports security monitoring, compliance reporting, and incident investigation.
Policies defining how long log data must be stored based on compliance requirements, security needs, and organizational policies.
A system, device, or application that generates log data used for security monitoring, compliance verification, and forensic analysis.
Malicious code that is deliberately inserted into a system and designed to execute when specific conditions are met, such as a particular date or the deletion of a user account.
An occurrence that results in actual financial loss, operational disruption, or other negative impact to an organization.
M74 terms
A network access control method that allows or denies network access based on the hardware (MAC) address of the connecting device. MAC filtering provides a basic layer of access control for wireless networks.
The Monetary Authority of Singapore's Technology Risk Management guidelines for financial institutions to manage technology and cyber risks.
An authentication method requiring two or more verification factors: something you know (password), something you have (token), or something you are (biometric).
A non-profit organization that operates federally funded research centers and maintains cybersecurity resources including the ATT&CK framework and CVE program.
A globally accessible knowledge base of adversary tactics and techniques based on real-world observations, used for threat modeling and security assessment.
A branch of artificial intelligence that enables systems to learn and improve from experience without being explicitly programmed. Machine learning algorithms build models from training data to make predictions or decisions.
Practices for deploying, monitoring, and maintaining machine learning models in production, including security, versioning, and performance monitoring.
Procedures for screening incoming mail and packages for potential threats such as suspicious substances, devices, or social engineering materials.
A scheduled period during which systems may be taken offline for maintenance, updates, and patches with minimal business impact.
Any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware types include viruses, worms, trojans, ransomware, spyware, adware, and rootkits.
The process of examining malicious software to understand its behavior, origin, purpose, and potential impact, supporting incident response and threat intelligence.
An isolated testing environment used to safely execute and analyze suspicious files or programs to observe their behavior without risking production systems.
An attack that uses a trojan to intercept and manipulate web browser sessions, modifying web pages and transactions in real time.
An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. MITM attacks can intercept sensitive data such as login credentials and financial information.
A security service that combines technology and human expertise to monitor, detect, investigate, and respond to threats on behalf of an organization.
A cybersecurity service that combines technology and human expertise to perform threat hunting, monitoring, and response. MDR providers deliver 24/7 security operations capabilities to organisations that lack in-house resources.
A firewall service where a third-party provider manages the deployment, configuration, monitoring, and maintenance of firewall infrastructure.
A third-party organization that provides outsourced monitoring and management of security devices and systems, delivering 24/7 security operations.
A third-party organization that remotely manages IT infrastructure, systems, and services on behalf of client organizations.
A periodic evaluation by top management of the suitability, adequacy, effectiveness, and alignment of the management system with strategic direction. Management reviews are required by all ISO management system standards.
An integrated set of policies, processes, and procedures that an organization uses to achieve its objectives in a systematic and structured manner.
An examination of an organization's management system to verify it conforms to the requirements of an applicable standard.
An access control model in which the operating system constrains the ability of a subject to access or perform operations on an object. Access decisions are based on security labels assigned to both subjects and objects.
Legal obligations requiring organizations or individuals to report specific events such as data breaches, suspicious activities, or safety incidents to authorities.
A physical access control mechanism consisting of two interlocking doors where only one can open at a time, preventing tailgating into secure areas.
Regulatory requirements for manufacturing operations including quality standards, safety regulations, environmental compliance, and product liability.
Security measures for protecting maritime vessel systems, port infrastructure, and shipping operations from cyber threats.
A risk of sufficient magnitude that its occurrence could significantly affect the organization's financial condition, operations, or reputation.
A significant deficiency in internal controls that creates a reasonable possibility of a material misstatement not being prevented or detected.
An evaluation of an organization's processes, capabilities, or programs against a defined maturity model to identify strengths and improvement areas.
A framework that describes levels of organisational capability or process maturity, typically from initial/ad hoc to optimised. Used to benchmark progress and set improvement targets.
The longest period of time that a business function or process can be disrupted before causing unacceptable damage to the organization.
The maximum time a business process can be unavailable before the resulting harm becomes unacceptable to the organization.
A metric measuring the average time from when a security incident is detected to when it is fully contained.
A metric measuring the average time between the occurrence of a security incident and its detection by the organization.
The average time it takes for an organisation to discover a security incident or threat. Reducing MTTD is a key objective of security operations, as faster detection limits the damage an attacker can cause.
A metric measuring the average time required to restore normal operations after a security incident or system failure.
A metric measuring the average time from detection of a security incident to the initiation of response actions.
The average time it takes for an organisation to contain and remediate a security incident after detection. MTTR measures the efficiency of incident response processes and is a key security operations metric.
Regulatory requirements for media organizations including content regulations, advertising standards, data protection, and intellectual property laws.
Security controls for protecting storage media including hard drives, USB devices, tapes, and optical media from unauthorized access and damage.
The process of rendering data on electronic media unrecoverable through methods such as clearing, purging, or destroying the storage media.
The analysis of volatile memory dumps to identify malicious activity, extract artifacts, and investigate security incidents that leave traces in system RAM.
Privacy considerations related to metadata such as communication timestamps, device identifiers, and browsing patterns that can reveal personal information.
Emerging regulatory considerations for virtual world platforms including user privacy, content moderation, digital commerce, and identity management.
The definition, collection, and analysis of quantitative data to evaluate performance, effectiveness, and compliance of programs and controls.
The systematic collection, analysis, and presentation of data that measures the performance and effectiveness of security controls, compliance programmes, and risk management activities. Metrics enable data-driven decision-making.
A security technique that divides a network into small, isolated segments with individual security policies to limit lateral movement and contain breaches.
A network security technique that enables fine-grained security policies to be assigned to individual workloads or applications, limiting lateral movement within a data centre or cloud environment.
The practice of collecting only the personal data that is strictly necessary for a specific stated purpose, avoiding excessive data gathering.
The minimum level of services or products that must be maintained during a disruption to be considered acceptable to the organization.
The baseline set of security controls that must be implemented for all systems within an organization, regardless of risk level.
Regulations governing mining operations including safety standards, environmental protection, land use, and worker health requirements.
Policies and tools for controlling and securing enterprise applications on mobile devices, including app distribution, configuration, and data protection.
Software transferred across a network and executed on a local system, such as Java applets and scripts, requiring security controls.
A solution that allows organizations to manage, monitor, and secure employees' mobile devices that access enterprise data and applications.
Software that allows IT departments to control, secure, and enforce policies on smartphones, tablets, and other endpoint devices. MDM enables remote wiping, app management, and configuration enforcement.
Authorized security testing of mobile applications and their backend services to identify platform-specific vulnerabilities and data leakage risks.
Security solutions that protect mobile devices from device-level, network-level, and application-level threats through continuous monitoring and automated response.
A documentation framework for machine learning models that provides details about a model's intended use, performance metrics, training data, limitations, and ethical considerations. Model cards promote transparency and responsible AI use.
Standardized contractual provisions approved by data protection authorities for international transfers of personal data to countries without adequate protection levels.
The framework for overseeing the development, validation, deployment, and ongoing monitoring of analytical and AI models used in decision-making.
The process of evaluating an AI or analytical model to verify it performs as intended, produces accurate results, and complies with regulatory requirements.
Obligations for regulated entities to report suspicious transactions and activities that may indicate money laundering to financial intelligence units.
A documented policy defining what activities and systems are monitored, how monitoring data is used, and retention requirements.
A mathematical technique that uses random sampling to model the probability of different outcomes in risk scenarios that involve uncertainty.
A strategy that uses cloud services from two or more cloud providers simultaneously. Multi-cloud approaches increase flexibility and reduce vendor lock-in but introduce complexity in security, compliance, and governance.
Security strategies and tools designed to protect data, applications, and infrastructure across multiple cloud service providers with consistent policies.
An authentication method requiring users to present two or more distinct types of evidence to verify their identity before gaining access.
An authentication method that requires users to provide two or more verification factors to gain access to a resource. MFA combines something you know (password), something you have (token), and something you are (biometric).
The practice of simultaneously meeting the requirements of multiple compliance frameworks and standards through integrated control implementation.
Security measures that ensure isolation and protection of data and resources between different customers sharing the same cloud infrastructure.
A formal arrangement between organizations to share resources and provide assistance to each other during emergencies or disasters.
A security process in which both parties in a communication verify each other's identity before exchanging data, preventing impersonation attacks.
N43 terms
Network Address Translation, a method of remapping IP addresses to enable multiple devices to share a single public IP address, providing a layer of obscurity.
North American Electric Reliability Corporation Critical Infrastructure Protection standards that establish cybersecurity requirements for the bulk electric system.
The National Institute of Standards and Technology, a US agency that develops cybersecurity standards, guidelines, and frameworks used globally.
NIST Special Publication providing requirements for protecting Controlled Unclassified Information in non-federal systems and organizations.
A voluntary framework published by NIST that provides guidance for managing risks associated with AI systems. The AI RMF is organised around four core functions: Govern, Map, Measure, and Manage.
A voluntary framework by the US National Institute of Standards and Technology. Version 2.0 includes six functions: Govern, Identify, Protect, Detect, Respond, and Recover.
A voluntary framework published by the National Institute of Standards and Technology that provides a common language for understanding, managing, and expressing cybersecurity risk. The current version (CSF 2.0) includes six functions: Govern, Identify, Protect, Detect, Respond, and Recover.
A voluntary tool developed by NIST to help organisations identify and manage privacy risk through an approach that is flexible and outcome-based. The Privacy Framework complements the NIST Cybersecurity Framework.
A structured process for integrating security and risk management activities into the system development lifecycle. The RMF provides a disciplined approach through six steps: Categorise, Select, Implement, Assess, Authorise, and Monitor.
A NIST publication that provides recommended security requirements for protecting Controlled Unclassified Information (CUI) in non-federal systems and organisations. Compliance with 800-171 is required for US defence contractors.
A comprehensive catalog of security and privacy controls for federal information systems published by NIST, widely adopted across public and private sectors.
New York State Department of Financial Services regulation (23 NYCRR 500) that establishes cybersecurity requirements for financial services companies. It requires risk assessments, CISOs, penetration testing, and incident response plans.
A U.S. government repository of standards-based vulnerability management data, including CVE identifiers, severity scores, and remediation guidance.
AI technology that enables computers to understand, interpret, and generate human language, powering applications like chatbots and text analysis.
A branch of artificial intelligence that deals with the interaction between computers and humans using natural language. NLP enables machines to understand, interpret, and generate human language.
A security principle that restricts access to information to only those individuals who require it to perform their specific job duties.
The remaining level of risk after controls and mitigation measures have been applied, also known as residual risk.
A network protocol for collecting metadata about IP traffic flows passing through network devices, used for security monitoring and traffic analysis.
Security solutions that enforce policies to control which devices and users can access a network, based on identity, device health, and compliance status.
A security approach that enforces policy compliance on devices before granting them access to the network. NAC verifies that connecting devices meet security requirements such as current patches and active anti-malware.
The design and structure of a computer network including topology, protocols, and components, with security considerations integrated throughout.
A documented profile of normal network behavior including traffic patterns, bandwidth usage, and protocol distribution used to detect anomalies.
Security solutions that monitor network traffic patterns to detect suspicious activity, investigate threats, and automate response actions across the network.
The application of cryptographic techniques to protect data as it travels across network connections from interception and tampering.
The capture, recording, and analysis of network traffic to detect intrusions, investigate incidents, and gather evidence of malicious network activity.
The continuous observation of network performance and security using tools that track traffic, detect anomalies, and alert on potential threats.
Authorized security testing focused on network infrastructure to identify vulnerabilities in network devices, services, and configurations.
Rules and guidelines governing the configuration, use, and security of an organization's network infrastructure and resources.
The design of network security controls and their placement within the network topology to protect data and systems from threats.
The practice of dividing a computer network into smaller subnetworks to improve security and performance. Segmentation limits the blast radius of security incidents and restricts access to sensitive resources.
A hardware device that provides access to network traffic for monitoring, analysis, and security purposes without disrupting normal network operations.
The process of intercepting, recording, and analyzing network communication patterns to identify security threats, performance issues, and anomalous behavior.
A method of monitoring network availability and activity to identify anomalies, including security threats and operational issues. NTA uses machine learning and behavioural analysis to detect threats that evade traditional security tools.
EU directive (NIS2) establishing cybersecurity requirements and incident reporting obligations for essential and important service providers.
The consideration of diverse cognitive perspectives in security team composition and security awareness programs to improve organizational defense.
An advanced firewall that combines traditional packet filtering with application awareness, intrusion prevention, deep packet inspection, and threat intelligence.
The failure to adhere to applicable laws, regulations, standards, or organizational policies, potentially resulting in penalties or enforcement actions.
A security property that ensures a party cannot deny having performed an action, such as sending a message or authorising a transaction. Non-repudiation is typically achieved through digital signatures and audit trails.
A failure to fulfil a requirement. In ISO management systems, nonconformities found during audits must be addressed through corrective actions to eliminate the root cause.
A formal document that describes a finding of non-compliance with a requirement, including evidence and the affected requirement.
Network traffic that flows between an organization's internal network and external networks such as the internet, crossing the network perimeter.
A privacy framework where organizations provide clear notice about data practices and give individuals meaningful choices about how their data is used.
Regulatory requirements and security measures for protecting nuclear facilities, materials, and information from theft, sabotage, and cyber threats.
O37 terms
An open standard authorisation protocol that enables applications to obtain limited access to user accounts on third-party services. OAuth 2.0 is widely used for delegated authorisation in web and mobile applications.
A method for checking the revocation status of digital certificates that improves performance by having the server include the certificate status in the TLS handshake.
Operationally Critical Threat, Asset, and Vulnerability Evaluation, a risk assessment methodology developed by Carnegie Mellon University. OCTAVE focuses on organisational risk and strategic practice rather than technology risk alone.
Offensive Security Certified Professional, a hands-on penetration testing certification requiring demonstration of practical exploitation skills.
The Open Worldwide Application Security Project, a non-profit foundation that produces resources and tools for improving software security.
A regularly updated report from the Open Web Application Security Project that lists the ten most critical web application security risks. The OWASP Top 10 is widely adopted as a baseline for web application security testing.
A regularly updated list of the ten most critical web application security risks published by the Open Web Application Security Project.
Techniques used to make code, data, or communications deliberately difficult to understand, used both defensively and by attackers to evade detection.
Security measures for protecting data stored in object storage systems including access policies, encryption, versioning, and immutability settings.
A finding noted during an audit that does not constitute a nonconformity but represents an area where improvement is recommended. Observations may indicate emerging risks or opportunities to strengthen the management system.
A document identifying an area where improvement is possible but that does not constitute a formal nonconformity.
Standards and regulations requiring employers to provide safe working conditions and protect workers from health hazards in the workplace.
Adherence to workplace health and safety regulations designed to prevent injuries, illnesses, and fatalities in the workplace.
The process of securely revoking all access, retrieving assets, and completing security procedures when an employee or contractor leaves the organization.
A proactive approach to security that involves simulating attacks against systems and networks to identify vulnerabilities before malicious actors exploit them.
Backup copies of data stored at a geographically separate location from the primary data center to protect against site-wide disasters.
Regulations specific to the oil and gas industry including environmental protection, worker safety, pipeline security, and operational standards.
Security procedures performed when new employees or contractors join an organization, including background checks, access provisioning, and training.
A password that is valid for only a single login session or transaction, generated dynamically to provide an additional layer of authentication security.
Technologies and practices used to monitor and record user behavior across websites and applications, including cookies, pixels, and fingerprinting.
Security requirements for open banking implementations that share financial data through APIs between banks and authorized third-party providers.
The collection and analysis of publicly available information from open sources to support security investigations and threat intelligence activities.
A description of how an organization delivers value through the arrangement of its people, processes, technology, and governance structures.
An examination of an organization's operations and processes to evaluate efficiency, effectiveness, and compliance with policies.
The ability to maintain critical business operations during and after disruptive events through preparedness and response planning.
The execution of business operations in a manner that achieves consistent, reliable, and superior results through continuous improvement.
The effect that a security incident, system failure, or risk event has on an organization's day-to-day business operations.
The ability of an organisation to continue to deliver critical operations through disruption. Operational resilience goes beyond business continuity to encompass prevention, adaptation, response, recovery, and learning.
The risk of loss resulting from inadequate or failed internal processes, people, systems, or external events in day-to-day business operations.
Security measures for protecting industrial systems and networks that monitor and control physical processes, devices, and infrastructure.
The process of protecting unclassified information that could be used by adversaries to piece together sensitive operational activities.
A consent model requiring individuals to take an affirmative action to agree to data collection or processing before it occurs.
The right of individuals to decline or withdraw consent for certain data processing activities, such as the sale of personal information.
The shared values, beliefs, norms, and behaviors within an organization that influence how people interact and make decisions.
An organization's ability to anticipate, prepare for, respond to, and adapt to incremental change and sudden disruptions to survive and prosper.
Risks associated with using external providers for business functions, including loss of control, service quality issues, and data security concerns.
Security requirements and controls applied to outsourced functions and services to protect organizational data and systems managed by third parties.
P148 terms
The Payment Card Industry Data Security Standard is a set of security requirements for organizations that handle credit card information to protect cardholder data.
PCI DSS requirements for installing and maintaining network security controls including firewalls and network segmentation.
PCI DSS requirements for protecting stored cardholder data through encryption, truncation, masking, and hashing.
PCI DSS requirements for developing and maintaining secure systems and software, including secure coding practices and vulnerability management.
A qualification granted by the PCI SSC to individuals who are authorized to assess compliance with PCI DSS requirements.
The Payment Card Industry Security Standards Council, responsible for developing and managing PCI security standards including PCI DSS.
The organisation responsible for developing, managing, and promoting the PCI Data Security Standard and other payment card security standards. The PCI SSC was founded by American Express, Discover, JCB, Mastercard, and Visa.
Plan-Do-Check-Act, a four-step iterative management methodology used for continuous improvement of processes and products in management systems.
Personal Data Protection Act, data protection legislation enacted by various countries (such as Singapore and Thailand) to regulate the collection and use of personal data.
Under HIPAA, any individually identifiable health information held by a covered entity or business associate, including demographic data, medical records, and billing information.
China's Personal Information Protection Law that regulates the processing of personal information of individuals within China by both domestic and foreign entities.
Public Key Infrastructure, a framework of policies, hardware, software, and procedures for creating, managing, distributing, and revoking digital certificates and encryption keys.
Security considerations specific to Platform as a Service environments where the customer manages applications and data while the provider manages the underlying platform.
The interception and recording of network packets for analysis, troubleshooting, security monitoring, and forensic investigation.
A firewall technique that inspects individual network packets and allows or blocks them based on predefined rules such as source and destination addresses and ports.
The practice of intercepting and examining data packets as they traverse a network. Packet sniffing can be used legitimately for network troubleshooting or maliciously to capture sensitive information.
Business continuity planning that addresses the unique challenges of a widespread disease outbreak, including workforce impacts and extended disruptions.
A passwordless authentication credential based on the FIDO2 standard that uses public key cryptography and biometrics for secure, phishing-resistant sign-in.
Requirements for password composition including minimum length, character variety, and prohibition of common or previously used passwords.
The output of applying a cryptographic hash function to a password, stored instead of the plaintext password for secure authentication.
Software that securely stores and manages login credentials for various accounts and applications. Password managers generate strong, unique passwords and auto-fill them, reducing the risk of password reuse and weak passwords.
A set of rules designed to enhance computer security by encouraging users to create strong passwords and manage them properly. Password policies define minimum length, complexity, rotation frequency, and history requirements.
An attack technique that attempts a small number of commonly used passwords against many accounts simultaneously to avoid triggering account lockout.
Authentication methods that verify user identity without traditional passwords, using alternatives such as biometrics, hardware tokens, or magic links.
A security approach that eliminates traditional passwords in favor of more secure authentication methods such as biometrics and hardware keys.
The regular schedule and process for identifying, testing, and deploying software patches across an organization's systems.
The process of identifying, acquiring, testing, and installing software updates (patches) to address security vulnerabilities and bugs. Effective patch management is a critical security control required by most compliance frameworks.
The evaluation of software patches in a controlled environment before deployment to verify they resolve vulnerabilities without causing system issues.
The protection of medical information and healthcare records from unauthorized access and disclosure under healthcare privacy regulations.
The component of malware that performs the malicious action, such as encrypting files (ransomware), exfiltrating data, or establishing a backdoor. The payload is delivered through an exploit or social engineering.
The collective of organizations including card brands, acquirers, issuers, and merchants involved in payment card transactions and subject to PCI standards.
EU legislation regulating payment services and payment service providers, promoting innovation, competition, and security in electronic payments.
The process by which regulatory bodies determine the severity and amount of fines or sanctions for non-compliance with regulations.
A detailed document presenting the findings, risk ratings, and remediation recommendations from a penetration testing engagement.
A security professional who performs authorized simulated attacks against systems and networks to identify exploitable vulnerabilities.
An authorised simulated cyberattack against a system to evaluate its security. Identifies vulnerabilities that could be exploited by real attackers.
A structured approach to conducting penetration tests, including planning, reconnaissance, exploitation, post-exploitation, and reporting phases.
An assessment of whether an organization's programs, activities, or operations are achieving their intended objectives efficiently and effectively.
The process of ensuring that organizational activities and outputs align with goals and objectives through monitoring, measurement, and improvement.
Physical barriers installed around facilities to define boundaries and prevent unauthorized physical access to the organization's property.
Security measures deployed at the boundary between an organization's internal network and external networks to control access and filter threats.
The process of defining, assigning, and enforcing access permissions for users and groups across an organization's systems and applications.
Any information relating to an identified or identifiable natural person. Under GDPR, this includes names, identification numbers, location data, online identifiers, and factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of a person.
Individually identifiable health information including medical records, treatment history, and insurance data protected under healthcare privacy regulations.
Laws and practices governing the collection, use, disclosure, and safeguarding of personal information, varying by jurisdiction and sector.
Canada's federal privacy law for private-sector organisations that governs the collection, use, and disclosure of personal information in the course of commercial activities.
Any information that can be used to identify, contact, or locate a specific individual, either alone or when combined with other data.
Security measures related to the hiring, management, and termination of personnel, including background checks and access management.
Regulatory requirements for pharmaceutical companies including drug safety, clinical trials, manufacturing quality, and marketing practices.
A social engineering attack that uses fraudulent emails, text messages, or websites to trick users into revealing sensitive information such as passwords, credit card numbers, or personal data. Phishing remains the most common initial attack vector.
Training programs designed to help employees recognize and report phishing attempts through education and simulated phishing exercises.
Controlled tests that send simulated phishing emails to employees to measure susceptibility and reinforce security awareness training.
Privacy considerations related to the collection, storage, and use of photographs, particularly facial images that enable biometric identification.
Security measures that restrict physical entry to facilities, rooms, or areas to authorized individuals using barriers, locks, and authentication systems.
A record of all entries to and exits from physically secured areas, used for security monitoring, investigation, and compliance.
Authorized testing of physical security controls including locks, access cards, surveillance systems, and employee security awareness.
Measures to protect an organization's physical assets, facilities, and personnel from unauthorized access, theft, damage, and environmental threats.
An evaluation of an organization's physical security controls including barriers, access systems, surveillance, and environmental protections.
A documented set of rules and guidelines governing the physical protection of an organization's facilities, equipment, and personnel.
Unencrypted data or information that has not been transformed by a cryptographic algorithm. Plaintext is readable by anyone who has access to it and must be protected through encryption when confidentiality is required.
Exercises conducted to validate the effectiveness and completeness of security, continuity, and recovery plans through simulated scenarios.
Security measures for protecting computing platforms including operating systems, middleware, and runtime environments from threats and vulnerabilities.
Encryption of data from the point of interaction to the secure decryption environment, preventing data exposure at any intermediate point.
A formal statement of management intent and direction. Security policies establish the rules, expectations, and standards that guide an organisation's approach to information security.
The documented confirmation by employees that they have read, understood, and agree to comply with organizational policies.
Adherence to an organization's internal policies, standards, and procedures by employees and other stakeholders.
The process of creating new organizational policies including research, drafting, stakeholder consultation, approval, and implementation.
The mechanisms and processes for ensuring that organizational policies are followed and that violations are identified and addressed.
A formal approval to deviate from an established policy or standard requirement. Policy exceptions must be documented, time-bound, approved by appropriate authority, and include compensating controls.
An organized hierarchy of policies, standards, procedures, and guidelines that provide direction and governance for an organization's operations.
The end-to-end process of creating, reviewing, approving, distributing, implementing, monitoring, and retiring organizational policies.
The process of creating, reviewing, approving, distributing, and enforcing organisational policies. Effective policy management ensures that policies remain current, accessible, and understood by all relevant personnel.
The periodic evaluation of existing policies to ensure they remain current, relevant, effective, and aligned with regulatory requirements.
An instance where an individual or system fails to comply with established organizational policies, requiring investigation and corrective action.
Malicious software that changes its code each time it replicates, making it difficult for signature-based anti-malware tools to detect. Polymorphic malware uses encryption and code mutation to evade detection.
The process of sending packets to specific ports on a host to determine which services are running. Port scanning is used both by security professionals for vulnerability assessment and by attackers for reconnaissance.
The management of risks across a portfolio of projects, programs, or investments to optimize overall risk-return performance.
A structured evaluation conducted after a security incident to identify lessons learned and improvement opportunities for future prevention and response.
Cryptographic algorithms designed to remain secure against attacks by quantum computers, which could break current public key encryption methods.
Systems including UPS, generators, and surge protectors that ensure continuous and clean power supply to critical IT infrastructure.
A preliminary evaluation conducted before a formal audit to identify potential gaps and help an organization prepare for certification.
A social engineering technique where an attacker creates a fabricated scenario to engage a victim and trick them into divulging information or taking action.
A security control designed to stop a security incident or policy violation from occurring in the first place, such as access controls or input validation.
A comprehensive evaluation of an organization's privacy practices, policies, and controls to identify gaps and ensure regulatory compliance.
A systematic examination of an organization's data handling practices to verify compliance with privacy laws, policies, and best practices.
An individual within a business unit who promotes privacy awareness and best practices, serving as a liaison between operations and the privacy team.
The adherence to applicable privacy laws, regulations, and organizational policies governing the handling of personal information.
Technical and organizational measures implemented to protect personal data and ensure compliance with privacy requirements.
A user interface that provides individuals with visibility and control over their personal data held by an organization.
Reusable solutions to common privacy challenges in system design, implementing privacy by design principles in practical ways.
The discipline of building privacy protections directly into systems and processes through technical design choices, privacy-enhancing technologies, and engineering practices.
Technologies that embody fundamental data protection principles by minimising personal data use, maximising data security, and empowering individuals. PETs include differential privacy, homomorphic encryption, and secure multi-party computation.
Tools and techniques that minimize personal data use, maximize data security, and empower individuals with control over their information.
A structured approach that provides guidance for organizations to manage privacy risks and protect personal information systematically.
The organizational structures, roles, and processes established to oversee and manage privacy compliance and risk across the enterprise.
A structured analysis to identify and mitigate the privacy risks associated with a project, system, or process that handles personal information.
A systematic assessment of a project or initiative that identifies the impact of the proposed processing on the privacy of individuals. PIAs help organisations identify and mitigate privacy risks before processing begins.
Legislation that regulates the collection, storage, use, and disclosure of personal information by organizations and governments.
Technology solutions that help organizations automate and manage privacy compliance activities including assessments, consent, and data subject requests.
A framework for assessing and improving an organization's privacy program across defined levels of capability and sophistication.
A document that informs individuals about how their personal data is collected, used, shared, and protected by an organisation. Under GDPR Articles 13 and 14, privacy notices must include specific mandatory information.
An individual responsible for developing and implementing privacy policies and ensuring organizational compliance with data protection regulations.
A public-facing document that describes an organization's practices regarding the collection, use, disclosure, and management of personal data.
Technologies that enable data analysis and processing while protecting the privacy of underlying personal data, including homomorphic encryption.
Fundamental guidelines that form the basis of data protection laws and best practices, including fairness, purpose limitation, and data minimization.
An organized set of activities, policies, and resources dedicated to protecting personal data and ensuring compliance with privacy regulations across an organization.
Laws and rules governing the collection, processing, storage, and sharing of personal information to protect individual privacy rights.
The potential for harm to individuals resulting from the collection, processing, or disclosure of their personal information.
An evaluation of the likelihood and impact of privacy-related risks to determine appropriate mitigating controls and safeguards.
A certification mark awarded to organizations that demonstrate compliance with specific privacy standards, building consumer trust.
A former framework for regulating transatlantic exchanges of personal data between the EU and the United States. Privacy Shield was invalidated by the Court of Justice of the European Union in 2020 (Schrems II) and replaced by the EU-US Data Privacy Framework.
A concise summary provided to individuals at the point of data collection explaining how their information will be used.
An initial evaluation to determine whether a new system or project requires a full privacy impact assessment based on its data processing activities.
Educational programs that teach employees about privacy laws, organizational policies, and best practices for handling personal information.
The principle that systems should be designed to automatically apply the strongest privacy settings without requiring user intervention.
An approach that embeds privacy protections into the design and architecture of systems and processes from the outset, rather than adding them as an afterthought. A principle of GDPR.
Techniques and approaches for training and deploying AI systems while minimizing the use and exposure of personal data, such as differential privacy.
The act of exploiting a vulnerability, design flaw, or configuration oversight to gain elevated access to resources that are normally protected from an application or user. Can be vertical (gaining higher privileges) or horizontal (accessing other users' resources).
Security solutions and practices for controlling, monitoring, and auditing privileged account access to critical systems and sensitive data.
A set of cybersecurity strategies and technologies for exerting control over elevated access and permissions for users, accounts, processes, and systems across an IT environment. PAM protects against credential theft and insider threats.
A hardened and dedicated computing environment used exclusively for performing sensitive administrative tasks, isolated from general-purpose activities and the internet.
A user account with elevated permissions that provide administrative control over systems, databases, networks, or security configurations.
Processes and technologies for managing identities that have elevated access to critical systems and sensitive data.
The monitoring and recording of sessions where privileged accounts are used, providing an audit trail of administrative activities.
The process of identifying the root causes of recurring incidents and implementing solutions to prevent their reoccurrence.
The detailed recording of business processes including steps, roles, inputs, outputs, and decision points for standardization and knowledge transfer.
The systematic approach to identifying, analyzing, and enhancing existing business processes to optimize performance and meet new standards.
A measure of how well-defined, managed, measured, and optimized an organization's processes are, typically assessed against a maturity model.
The analysis of event logs to discover, monitor, and improve business processes, with privacy and security implications for data handling.
Any operation or set of operations performed on personal data, whether or not by automated means. Under GDPR, processing includes collection, recording, storage, retrieval, consultation, use, disclosure, erasure, and destruction.
A documented register of all data processing activities maintained by controllers and processors as required by GDPR Article 30.
A contract between a data controller and processor specifying the scope, duration, and conditions of personal data processing services.
Any form of automated processing of personal data that evaluates certain personal aspects relating to a natural person, particularly to analyse or predict aspects concerning that person's performance at work, economic situation, health, personal preferences, interests, reliability, behaviour, location, or movements.
The requirement to inform individuals about the existence and logic of automated profiling that affects them, including its consequences.
The framework of authority, accountability, and decision-making processes that oversee the management and delivery of a program of related projects.
The framework of authority and accountability that defines the management of a project, including decision rights and escalation procedures.
An attack technique targeting AI language models where malicious instructions are embedded in user inputs to manipulate the model's behaviour. Prompt injection can cause AI systems to ignore safety guidelines or reveal sensitive information.
Documentary evidence demonstrating that an organization meets specific regulatory requirements or standard conditions.
A privacy and data protection principle requiring that data processing measures be proportionate to the legitimate purpose pursued and not excessive.
Under HIPAA, any individually identifiable health information that is created, received, maintained, or transmitted by a covered entity or business associate. PHI includes medical records, billing information, and any health-related data linked to an individual.
The examination of network protocols to verify correct implementation, identify vulnerabilities, and detect malicious protocol-level attacks.
Security measures and best practices for protecting network communication protocols from exploitation, misuse, and vulnerabilities.
An intermediary server that handles requests between clients and destination servers, providing security, privacy, content filtering, and caching capabilities.
The processing of personal data in such a manner that it can no longer be attributed to a specific data subject without the use of additional information. Unlike anonymisation, pseudonymised data is still considered personal data under GDPR.
Personal data that cannot be attributed to a specific individual without the use of additional information kept separately and securely.
A set of roles, policies, hardware, software, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. PKI provides the framework for trusted electronic communications.
A collaborative security approach where red team (offensive) and blue team (defensive) work together to improve detection capabilities and security posture.
The principle that personal data should be collected for specified, explicit, and legitimate purposes and not further processed in a manner incompatible with those purposes. A core principle under GDPR Article 5(1)(b).
Q11 terms
An organization certified by the PCI Security Standards Council to perform PCI DSS compliance assessments of merchants and service providers.
An individual certified by the PCI Security Standards Council to perform PCI DSS assessments. QSAs are authorised to evaluate and attest to an organisation's compliance with the PCI DSS requirements.
A risk assessment approach that uses descriptive scales such as high, medium, and low to evaluate and prioritize risks based on expert judgment.
An examination of a quality management system to verify it meets defined standards and effectively controls processes and outputs.
A systematic approach to ensuring that an organization's products and services consistently meet customer requirements and regulatory standards.
A formalized system that documents processes, procedures, and responsibilities for achieving quality policies and objectives.
A risk analysis approach that assigns numerical values to the probability and impact of risks to calculate expected loss and support cost-benefit decisions.
The potential threat that quantum computers pose to current cryptographic algorithms, requiring migration to quantum-resistant encryption methods.
A method of secure communication that uses quantum mechanics principles to create and distribute cryptographic keys that cannot be intercepted without detection.
The property of cryptographic algorithms that remain secure against attacks by both classical and quantum computers.
A social engineering attack where the attacker offers a service or benefit in exchange for information or access from the victim.
R165 terms
A responsibility assignment matrix that defines roles as Responsible, Accountable, Consulted, or Informed for each task or deliverable. RACI matrices clarify ownership and prevent gaps or overlaps in responsibilities.
An access control model where permissions are assigned to roles rather than individual users. Users are then assigned to roles based on their job functions.
The maximum acceptable amount of data loss measured in time. An RPO of 4 hours means the organisation can tolerate losing up to 4 hours of data.
The maximum acceptable time to restore a system or process after a disruption. An RTO of 2 hours means the system must be back online within 2 hours.
Security standards for protecting railway systems, signaling infrastructure, and passenger information systems from cyber threats.
Malicious software that encrypts a victim's files or systems and demands payment (ransom) for the decryption key. Ransomware has become one of the most financially damaging forms of cyber attack affecting organisations worldwide.
Organizational readiness to prevent, detect, respond to, and recover from ransomware attacks through planning, controls, and exercises.
The processes and procedures for restoring systems and data following a ransomware attack, including backup restoration, system rebuilding, and root cause analysis.
The possibility that anonymized or pseudonymized data could be linked back to specific individuals through additional data or techniques.
A preliminary evaluation of an organisation's preparedness for a formal compliance audit or certification. Readiness assessments identify gaps between current practices and target framework requirements before the formal audit.
Regulations governing real estate transactions and property management including fair housing, disclosure requirements, and anti-money laundering.
A high but not absolute level of assurance that the subject matter is free from material misstatement, the standard for financial and compliance audits.
A comprehensive audit conducted at the end of a certification cycle to renew an organization's certification for another period.
The initial phase of a cyberattack where threat actors gather information about target systems, networks, and organizations to plan their attack strategy.
The systematic creation, maintenance, and disposal of records documenting data processing activities as required by privacy regulations.
The systematic control of records throughout their lifecycle from creation through maintenance, use, and disposition according to retention policies.
Documentation maintained by data controllers and processors listing all categories of data processing activities, purposes, data types, and safeguards.
Documentation required under GDPR Article 30 that describes the personal data processing activities carried out by an organisation. ROPAs must include purposes, data categories, recipients, transfers, retention periods, and security measures.
An organization's ability to restore operations within defined timeframes using available resources, plans, and procedures.
A planned test of recovery procedures to verify that systems and data can be restored within defined timeframes and objectives.
The maximum acceptable amount of data loss measured in time, determining how frequently data backups or replication must occur.
The ranking of business functions and systems based on their criticality, determining the order in which they should be restored after a disruption.
The selected approach for recovering critical business functions and IT systems after a disruption, based on recovery time and cost analysis.
The verification that backup data and disaster recovery procedures can successfully restore systems and data within defined timeframes.
The maximum acceptable duration for restoring a business function or IT system after a disruption before unacceptable consequences occur.
The right of individuals to have inaccurate personal data corrected and incomplete data completed by the data controller.
A group of security professionals authorised to simulate real-world attacks against an organisation to test its defences. Red team exercises are more comprehensive than penetration tests and evaluate people, processes, and technology holistically.
A comprehensive, goal-oriented security engagement that simulates real-world attacks to test an organization's detection and response capabilities.
The process of removing or obscuring sensitive personal information from documents or datasets before sharing or publication.
The duplication of critical components or functions of a system with the intention of increasing reliability. In security, redundancy ensures that the failure of one component does not result in a complete system failure.
Data protection laws specific to a geographic region that impose requirements on organizations processing personal data of residents in that region.
An examination conducted by or on behalf of a regulatory body to verify compliance with applicable laws, regulations, and industry standards.
A government or independent authority responsible for creating, implementing, and enforcing regulations within a specific industry or jurisdiction.
A modification to existing regulations or introduction of new regulations that may affect an organization's compliance obligations.
Processes for monitoring, assessing, and implementing changes to regulations and compliance requirements that affect an organization.
The process of adhering to laws and regulations relevant to an organisation's operations. Non-compliance can result in fines, legal action, and reputational damage.
An examination specifically focused on verifying adherence to applicable laws, regulations, and regulatory standards.
The systematic approach to identifying, implementing, monitoring, and reporting on compliance with all applicable regulations.
The submission of required documents, reports, and disclosures to regulatory authorities within prescribed deadlines and formats.
The system of rules and guidelines established by regulatory bodies that organizations must follow in their operations and practices.
An analysis of the potential effects of proposed regulations on businesses, individuals, and the economy before they are enacted.
A formal inquiry by a data protection authority into an organization's data processing practices following a complaint, breach, or routine oversight.
The overall environment of laws, regulations, and standards that affect an organization's operations, varying by industry and jurisdiction.
A financial or operational sanction imposed by a regulatory body on an organization for failing to comply with applicable requirements.
The process of preparing and submitting mandated reports to regulatory authorities demonstrating compliance and providing required disclosures.
The potential impact on an organization from changes in laws and regulations that could affect its operations, profitability, or market position.
A framework established by regulators that allows businesses to test innovative products, services, or business models in a controlled environment with reduced regulatory requirements.
Technology solutions (RegTech) that help organizations efficiently comply with regulations through automation, data analytics, and real-time monitoring.
The process of planning, scheduling, and controlling software deployments to production environments while maintaining service quality.
The process of correcting identified deficiencies, vulnerabilities, or non-conformities to bring systems or processes into compliance.
Documentation proving that corrective actions for audit findings or compliance gaps have been successfully implemented.
A documented plan of action for addressing identified compliance gaps, audit findings, or security vulnerabilities. Remediation plans include specific actions, owners, timelines, and priorities for closing each identified gap.
The process of monitoring and managing the progress of vulnerability fixes from identification through verification of successful remediation.
Testing performed after vulnerability fixes are applied to confirm that the vulnerabilities have been successfully addressed without introducing new issues.
Technology and processes enabling authorized users to connect to organizational networks and resources from external locations securely.
Controls and technologies for securing connections from remote users and devices to organizational networks and resources, including VPN and zero trust approaches.
A virtual private network that allows individual users to connect to a private network from a remote location over the internet. Remote access VPNs encrypt all traffic between the user's device and the corporate network.
A security technology that executes web browsing activity in a remote environment, preventing web-based threats from reaching the user's local device.
The continuous observation of systems and networks from a remote location using automated tools and managed security services.
The capability to remotely delete all data from a lost or stolen mobile device to prevent unauthorized access to sensitive information.
A network attack in which a valid data transmission is maliciously repeated or delayed. The attacker intercepts data and retransmits it at a later time to gain unauthorised access or duplicate a transaction.
A legal or regulatory requirement to disclose specific information to authorities, stakeholders, or the public within defined timeframes.
The potential for damage to an organization's public image and stakeholder trust resulting from negative events, actions, or perceptions.
The risk that remains after controls have been applied. If residual risk exceeds the organisation's risk appetite, additional controls or risk treatment is required.
The ability of an organization, system, or process to withstand disruptions, adapt to changing conditions, and recover quickly to maintain operations.
The efficient and effective deployment of an organization's resources including personnel, budget, technology, and facilities.
The practice of developing and deploying AI systems in a manner that is ethical, transparent, accountable, and aligned with human values and societal norms. Responsible AI encompasses fairness, privacy, safety, and sustainability.
A security vulnerability reporting practice where researchers privately inform the affected vendor and allow time for patching before public disclosure.
A designated zone within a facility where access is limited to authorized personnel only, requiring enhanced security controls.
The right of individuals to request that a controller limit the processing of their personal data under certain circumstances defined in privacy law.
Regulatory requirements for retail businesses including consumer protection, payment security, product safety, and data privacy.
A documented timetable specifying how long different categories of personal data should be retained before secure disposal or anonymization.
A metric that quantifies the financial benefit of security investments relative to their cost, supporting budget justification.
The process of analyzing software, hardware, or protocols to understand their design and functionality, used in security research and malware analysis.
A data subject right to obtain confirmation of whether personal data concerning them is being processed and to receive a copy of that data.
The right of individuals to receive a meaningful explanation of the logic behind automated decisions that significantly affect them.
The right of data subjects under GDPR Article 21 to object to processing of their personal data based on legitimate interests or public interest grounds. When exercised for direct marketing purposes, the controller must stop processing immediately.
The data subject's right to limit how an organization processes their personal data under specified circumstances while the data is retained.
The right of individuals to request the erasure of their personal data under certain circumstances. Established under GDPR Article 17, also known as the right to erasure, it applies when data is no longer necessary, consent is withdrawn, or processing is unlawful.
A conscious decision to acknowledge and tolerate a specific risk without additional mitigation when the cost of treatment exceeds the potential impact.
The process of combining individual risks to understand their cumulative effect and total exposure across the organization.
The systematic examination of risk components including threat sources, vulnerabilities, likelihood, and potential impact to understand and characterize risk.
The amount and type of risk an organisation is willing to accept in pursuit of its objectives. Set by the board and communicated throughout the organisation.
A formal document expressing the board-approved levels and types of risk an organization is willing to accept in pursuit of its objectives.
The process of identifying, analysing, and evaluating risks. Includes identifying assets and threats, assessing likelihood and impact, and determining risk treatment options.
The defined approach and procedures used to identify, analyze, and evaluate risks in a consistent and repeatable manner.
A risk treatment strategy that eliminates a risk entirely by choosing not to engage in the activity or process that gives rise to the risk.
An audit approach that prioritizes areas for examination based on risk assessment results, focusing resources on the highest-risk areas.
The maximum amount of risk an organization can absorb before it threatens its continued viability and ability to achieve core objectives.
A comprehensive inventory of identified risks organized by category, including descriptions, owners, ratings, and treatment plans.
A committee of the board of directors responsible for overseeing the organisation's risk management framework, policies, and risk appetite. Risk committees are required or recommended by banking regulations and corporate governance codes.
The exchange of information about risks between decision-makers, stakeholders, and affected parties to support informed risk-based decisions.
The accumulation of exposure to a single risk factor, counterparty, or geographic area that could result in significant losses.
The statistical relationship between different risks that determines whether they tend to occur together or independently.
The benchmarks and thresholds used by an organization to evaluate the significance of identified risks and determine appropriate responses.
The shared values, beliefs, knowledge, and attitudes within an organization that influence how risks are identified, assessed, and managed.
A visual display that presents key risk metrics, indicators, and status information to management for real-time risk monitoring and decision support.
The process of breaking down complex risks into smaller, more manageable components for detailed analysis and treatment.
The process of reporting risks that exceed defined thresholds to higher levels of management or governance for decision-making and action.
An occurrence or change in circumstances that has a negative impact on the achievement of organizational objectives.
A formal approval to accept a risk that exceeds normal tolerance levels, typically requiring senior management or board authorization.
The degree to which an organization is vulnerable to a particular risk, typically measured by the potential loss and likelihood of occurrence.
A structured approach that provides the principles, policies, and processes for managing risk consistently across an organization.
The organizational structures, policies, and processes that direct and control risk management activities across the enterprise.
A visual representation of risks plotted on a matrix with likelihood on one axis and impact on the other. Risk heat maps use colour coding (typically red, amber, green) to highlight the most significant risks.
The process of finding, recognizing, and describing risks that could affect the achievement of organizational objectives.
A measurable variable that signals changes in risk exposure and helps organizations monitor their risk profile over time.
The capability to gather, analyze, and act upon information about risks to make better-informed decisions about risk management.
The relationship between risks where the occurrence or treatment of one risk affects the likelihood or impact of another.
The overall picture of an organization's risk environment, including the types, sources, and interconnections of risks it faces.
A set of components that provide the foundations and organizational arrangements for designing, implementing, and improving risk management.
A documented plan describing how risk management activities will be structured, resourced, and performed throughout a project or program.
A formal statement of an organization's intentions and direction regarding risk management, established by senior leadership.
The systematic application of policies, procedures, and practices to activities of communicating, consulting, establishing context, and managing risk.
The significance of a risk in terms of its potential impact on the organization's objectives, financial statements, or operations.
A tool used in risk assessment that maps identified risks on a grid based on their likelihood and impact to determine priority levels.
A quantifiable measure used to track and communicate the level of risk exposure and the effectiveness of risk management activities.
Actions taken to reduce the likelihood or impact of an identified risk to an acceptable level through implementing controls or other measures.
The continuous tracking and review of risk levels, control effectiveness, and risk indicators to detect changes in the risk environment.
A potential event or condition that, if it occurs, would have a positive effect on one or more organizational objectives.
The process of balancing risk reduction measures with their costs and benefits to achieve the most efficient risk management approach.
The individual or team accountable for managing a specific risk, including implementing risk treatment plans and monitoring risk levels. Risk ownership ensures clear accountability for risk management activities.
How stakeholders subjectively view and interpret risk, which may differ from objective risk assessments and influence decision-making.
The ranking of identified risks based on their assessed severity to determine the order in which they should be addressed.
A comprehensive description of an organization's overall risk exposure, including the types, levels, and distribution of risks across the enterprise.
The process of assigning numerical values to risk factors including probability, impact, and exposure to enable objective comparison and prioritization.
A classification assigned to a vulnerability or finding that indicates its severity and potential impact, guiding prioritization of remediation efforts.
Actions taken to decrease the probability or impact of a risk event through the implementation of controls and other mitigation measures.
A documented inventory of identified risks, their assessments, treatment plans, and current status. A key tool in enterprise risk management.
The communication of risk information to stakeholders through reports that summarize risk levels, trends, incidents, and the status of mitigation activities.
The selection and implementation of options for addressing risk, including avoidance, reduction, sharing, transfer, or acceptance.
A deliberate decision to accept the burden of loss from a particular risk, typically when the cost of mitigation exceeds the expected loss.
A periodic assessment of the risk landscape, control effectiveness, and risk management processes to ensure they remain current and effective.
A description of a possible sequence of events that could lead to an adverse outcome, used for risk assessment and contingency planning.
A methodology for assigning numerical values to risks based on defined criteria, enabling consistent comparison and prioritization across the organization.
A risk treatment strategy where the risk is shared with another party, such as through joint ventures, partnerships, or outsourcing arrangements.
An element that alone or in combination with other elements has the potential to give rise to a risk event.
A structured description of a risk that clearly identifies the risk source, the event, and its potential consequences.
A classification system that categorizes risks into a hierarchical structure of risk types and sub-types for consistent identification and reporting.
A predefined level of risk at which specific actions must be taken, such as escalation to management or implementation of additional controls.
The acceptable level of variation an organisation is willing to tolerate around specific risk objectives. Risk tolerance provides specific, measurable thresholds that translate the broader risk appetite into operational guidance.
A risk treatment strategy that shifts the financial impact of a risk to another party, typically through insurance policies or contractual arrangements.
The process of selecting and implementing measures to modify risk. Options include: mitigate (reduce), accept (retain), avoid (eliminate), or transfer (share) the risk.
The different approaches available for addressing a risk, including avoidance, reduction, sharing, transfer, and acceptance.
A documented plan specifying the actions, resources, timelines, and responsibilities for implementing risk treatment measures.
The examination of risk data over time to identify patterns, emerging risks, and changes in the risk environment.
The speed at which a risk event could impact an organization after it occurs, influencing the urgency of response preparations.
A methodology that prioritises compliance activities and control implementation based on the level of risk they address. Risk-based approaches are central to ISO 27001, NIST CSF, GDPR, and most modern compliance frameworks.
An approach to audit planning that prioritizes areas for review based on risk assessment results and organizational risk appetite.
An adaptive authentication approach that adjusts security requirements based on the assessed risk level of a login attempt, considering factors like location and device.
An approach to security that prioritizes investments and efforts based on the level of risk to the organization rather than applying uniform controls.
Software technology that uses bots to automate repetitive, rule-based tasks across applications, requiring governance for access control and audit trails.
The use of software robots to automate repetitive, rule-based tasks typically performed by humans. RPA in compliance can automate evidence collection, control testing, report generation, and data entry tasks.
An unauthorized wireless access point installed on a network that can enable unauthorized network access or serve as a launch point for attacks.
The process of defining roles and their associated access permissions based on job functions, responsibilities, and the principle of least privilege.
The analysis of existing user access patterns to discover and define roles for implementation in role-based access control systems.
An access management approach that assigns permissions to defined roles rather than individual users, simplifying administration and enforcing least privilege.
An access control method that assigns permissions to users based on their role within an organisation rather than their individual identity. RBAC simplifies access management by grouping permissions into roles aligned with job functions.
Clear definitions of what each position or team is expected to do, their authority levels, and their accountability relationships within an organization.
A systematic process for identifying the fundamental causes of problems, nonconformities, or incidents. Root cause analysis ensures that corrective actions address underlying issues rather than symptoms.
Malicious software designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. Rootkits operate at the operating system level.
Configuration and hardening measures applied to network routers to prevent unauthorized access, routing attacks, and information disclosure.
Documented guidelines that define the scope, methods, timing, and constraints for authorized security testing activities.
A documented set of standardized procedures and actions that guide operators in performing routine operations and responding to specific scenarios.
A security technology embedded within an application that detects and blocks attacks in real time by monitoring the application's behavior from within.
S230 terms
Secure/Multipurpose Internet Mail Extensions, a standard for public key encryption and signing of email messages to ensure confidentiality, integrity, and authentication.
Security Assertion Markup Language, an XML-based standard for exchanging authentication and authorization data between identity providers and service providers.
An open standard for exchanging authentication and authorisation data between parties, specifically between an identity provider and a service provider. SAML enables Single Sign-On across web applications.
A leading organization for cybersecurity training, certification, and research that provides security education to practitioners worldwide.
Security Content Automation Protocol, a suite of specifications for standardizing the format and nomenclature of security configuration and vulnerability information.
A suite of specifications standardised by NIST that enables automated vulnerability management, measurement, and policy compliance evaluation. SCAP provides a common language for expressing security-related information.
Security features and controls integrated into Software-Defined Wide Area Networks including encryption, segmentation, and threat detection.
US Securities and Exchange Commission rules requiring public companies to disclose material cybersecurity incidents and describe their risk management programs.
A technology platform that aggregates and analyses log data from across an organisation's IT infrastructure to detect security threats and support incident response.
A commitment between a service provider and customer that defines the expected level of service. Cloud SLAs specify metrics such as uptime percentage, response times, data durability, and remedies for non-compliance.
Security measures for the Simple Network Management Protocol including SNMPv3 authentication, encryption, and access control configuration.
Security Orchestration, Automation and Response platforms that combine security tool integration, workflow automation, and case management for efficient incident handling.
An AICPA audit report on controls at a service organisation relevant to user entities' financial reporting. Available as Type I (design only) or Type II (design and operating effectiveness).
A System and Organization Controls report that addresses internal controls relevant to a service organization's clients' financial reporting.
An AICPA audit report based on the Trust Services Criteria: Security, Availability, Processing Integrity, Confidentiality, and Privacy. The most common assurance report for technology service providers.
A System and Organization Controls report that evaluates a service organization's controls relevant to security, availability, processing integrity, confidentiality, and privacy.
A SOC 2 Type II report that specifically evaluates the security, availability, processing integrity, confidentiality, and privacy controls of a cloud service provider over a period of time. Cloud customers increasingly require SOC 2 Type II from their providers.
A publicly available summary report based on the same Trust Services Criteria as SOC 2. SOC 3 reports provide a general overview of the service organisation's controls without the detailed testing results included in SOC 2 reports.
A general-use report that provides a summary of a service organization's SOC 2 examination results for public distribution without detailed control descriptions.
A security operations center professional who monitors security tools, triages alerts, and performs initial investigation of potential security incidents.
The level of capability and effectiveness of a Security Operations Center, assessed across people, processes, and technology dimensions.
An AICPA framework that enables organisations to communicate useful information about the effectiveness of their cybersecurity risk management programmes. SOC for Cybersecurity reports are designed for a broad audience including boards and investors.
A US federal law (2002) requiring public companies to establish and maintain internal controls over financial reporting. SOX Section 404 requires management assessment of internal controls.
Adherence to the requirements of the Sarbanes-Oxley Act, particularly regarding financial reporting accuracy, internal controls, and auditor independence.
A provision of the Sarbanes-Oxley Act that requires the CEO and CFO to personally certify the accuracy of financial reports and the effectiveness of internal controls. Certification carries personal criminal liability for knowing violations.
A provision of the Sarbanes-Oxley Act that requires management and external auditors to assess and report on the adequacy of internal controls over financial reporting. Section 404 compliance is one of the most costly aspects of SOX.
A web security vulnerability that allows an attacker to interfere with the queries an application makes to its database. SQL injection can be used to view, modify, or delete data and in some cases gain complete control of the database server.
Secure Shell, a cryptographic network protocol for secure remote login, command execution, and file transfer between computers over unsecured networks.
A digital certificate that authenticates a website's identity and enables encrypted connections using TLS, displayed as the padlock icon in web browsers.
The process of intercepting and decrypting SSL/TLS encrypted traffic for security analysis before re-encrypting and forwarding it to its destination.
A digital certificate that authenticates a website's identity and enables an encrypted connection. TLS (Transport Layer Security) is the successor to SSL (Secure Sockets Layer) and is essential for protecting data in transit.
Security measures for protecting data and access in Software as a Service applications, including identity management, data encryption, and activity monitoring.
Legal provisions that protect organizations from liability or penalties when they have acted in good faith compliance with specified requirements.
The process of selecting a subset of items from a population for testing or examination. In auditing, sampling methods include statistical sampling, judgmental sampling, and attribute sampling.
Programs and controls ensuring adherence to government-imposed trade and financial restrictions against specific countries, entities, and individuals.
An isolated testing environment that enables users to run programs or execute code without affecting the rest of the system. In security, sandboxes are used to safely analyse suspicious files and malware.
A security technique that isolates running programs or processes in a restricted environment to prevent them from affecting other parts of the system.
US federal law establishing auditing and financial regulation requirements for public companies to protect shareholders from fraudulent financial reporting.
US federal law enacted in 2002 that mandates strict financial reporting and internal control requirements for publicly traded companies. SOX Section 404 requires management assessment of internal controls over financial reporting.
Security measures for protecting satellite communications, ground systems, and space-based assets from interference, jamming, and cyber attacks.
Configuration settings that define the scope, depth, and checks performed during automated vulnerability scanning.
A process of analyzing possible future events by considering alternative plausible risk scenarios and their potential impacts on the organization.
The 2020 ruling by the Court of Justice of the European Union that invalidated the EU-US Privacy Shield and imposed additional obligations on organisations using Standard Contractual Clauses for international data transfers.
A document that defines the boundaries and applicability of a management system, audit, or compliance programme. The scope statement specifies which organisational units, processes, locations, and information assets are included.
An audit conducted by an organization on its suppliers, vendors, or partners to verify compliance with contractual requirements and standards.
Tools and practices for securely storing, distributing, and rotating sensitive credentials such as API keys, passwords, and certificates in cloud environments.
Regulatory requirements that apply specifically to organizations within a particular industry sector such as healthcare, finance, or energy.
Regulations that apply specifically to particular industries or sectors, imposing specialized compliance requirements beyond general laws.
A cloud-delivered architecture that combines network security functions with WAN capabilities to support dynamic secure access for distributed organizations.
A physically protected space with access controls and monitoring designed to safeguard sensitive information, equipment, or operations.
A security standard that ensures a device boots using only software trusted by the manufacturer, preventing rootkits and boot-level malware from loading.
The practice of writing software code that is resistant to security vulnerabilities. Secure coding practices include input validation, output encoding, proper error handling, and following guidelines such as the OWASP Secure Coding Practices.
The process of implementing security settings and hardening measures on systems and devices according to established security baselines and benchmarks.
The thorough removal of data from storage so it cannot be recovered using standard data recovery techniques.
The complete and irreversible elimination of data and storage media through approved methods such as shredding, incineration, or degaussing.
A process that integrates security practices and testing throughout every phase of software development, from design through deployment and maintenance.
The process of safely destroying or sanitizing assets and media containing sensitive information when they are no longer needed.
Protocols and methods for transmitting files between systems with encryption and authentication, such as SFTP, FTPS, and SCP.
A cryptographic technique allowing multiple parties to jointly compute a function over their inputs while keeping those inputs private.
A deprecated cryptographic protocol (succeeded by TLS) that provided encrypted communication between web browsers and servers to protect data in transit.
An approach to software development that integrates security considerations at every phase of the development lifecycle, from requirements gathering through design, implementation, testing, deployment, and maintenance.
An approach to product development that integrates security considerations from the earliest design phases rather than adding them after development.
Laws governing the issuance and trading of securities, requiring disclosure, fair dealing, and protection of investors.
A notification generated by security tools or systems indicating a potential security threat, policy violation, or anomalous activity.
A cybersecurity professional who monitors, analyzes, and investigates security events and incidents to protect organizational assets.
The design artefacts that describe how security controls are positioned and relate to the overall IT architecture. Security architecture provides a structured approach to designing, implementing, and maintaining security across an organisation.
A comprehensive model for designing and implementing security controls across an organization's technology environment.
An assessment of an organization's security architecture to identify design weaknesses and verify alignment with security requirements and best practices.
A statement or claim made by an identity provider about a user's authentication status, attributes, or authorization, used in federated identity systems.
A comprehensive evaluation of an organization's security posture including vulnerability assessment, penetration testing, and policy review.
The use of technology to perform security tasks with minimal human intervention, including automated scanning, patching, incident response, and compliance monitoring.
The knowledge and understanding that employees have about cybersecurity threats and their role in protecting organizational information assets.
A structured initiative to build and maintain employee knowledge about cybersecurity risks, policies, and best practices through ongoing education.
Educational programmes designed to teach employees about security risks and best practices. Training covers topics such as phishing recognition, password hygiene, data handling, and incident reporting. Required by ISO 27001, HIPAA, PCI DSS, and NIST CSF.
A set of minimum security standards and configurations that all systems within an organisation must meet. Security baselines provide a consistent foundation for security across the environment and are often based on CIS Benchmarks or vendor hardening guides.
An evaluation comparing an organization's current security posture against established baseline security requirements.
The actions and habits of individuals related to information security, influenced by awareness, training, culture, and organizational policies.
A documented standard of security configuration best practices for specific technologies, used to assess and harden system configurations.
A formal credential awarded to individuals or organizations demonstrating competency in specific areas of information security.
An employee in a non-security role who advocates for security practices within their team, serving as a bridge between security and business functions.
An authorisation granted to individuals allowing them access to classified information after completing a background investigation. Security clearance levels typically include Confidential, Secret, and Top Secret.
A governance body composed of representatives from various departments responsible for overseeing the organization's security strategy and policies.
The adherence to security-related laws, regulations, standards, and organizational policies governing the protection of information assets.
The specific settings and parameters applied to systems and applications to implement security controls and reduce vulnerabilities.
The evaluation of security controls to determine their effectiveness in protecting information systems and meeting security requirements.
An organized collection of security controls structured to help organizations manage cybersecurity risk systematically.
Safeguards or countermeasures designed to protect the confidentiality, integrity, and availability of information systems and data. Controls can be technical (encryption, firewalls), administrative (policies, training), or physical (locks, cameras).
The collective attitudes, beliefs, and behaviors within an organization regarding the importance and practice of information security.
An evaluation of the collective security attitudes, beliefs, and behaviors within an organization to identify strengths and areas for improvement.
A visual display providing real-time visibility into an organization's security posture, including alerts, metrics, and threat intelligence.
The accumulation of security issues, deferred patches, and technical shortcuts that increase an organization's risk exposure over time.
The discipline of designing and building systems that remain dependable in the face of malicious actions, errors, and accidents.
An observable occurrence in a system or network that may have security implications, such as a failed login attempt or configuration change.
A formal procedure for requesting, reviewing, approving, and tracking deviations from security policy requirements.
A structured approach to managing cybersecurity risk through organized policies, procedures, and controls based on industry best practices.
A deficiency in an organization's security posture where expected or required security controls are absent or insufficient.
The set of responsibilities and practices exercised by the board and executive management to provide strategic direction and oversight for information security.
A comprehensive structure for directing and controlling an organization's security activities, ensuring alignment with business objectives and risk appetite.
HTTP response headers that instruct browsers to enforce security policies, including Content-Security-Policy, X-Frame-Options, and Strict-Transport-Security.
An event that actually or potentially compromises the confidentiality, integrity, or availability of information or information systems.
The systematic approach to identifying, managing, recording, and analyzing security threats and incidents in an organized manner.
A formal document that describes a security incident including its discovery, impact, response actions, and recommendations for prevention.
A platform that aggregates and analyzes security log data from across an organization's infrastructure to provide real-time threat detection and compliance reporting.
A technology platform that aggregates and analyses log data from across an organisation's IT infrastructure to detect security threats, support compliance reporting, and facilitate incident investigation in real time.
Financial resources allocated to cybersecurity including technology, personnel, training, and compliance activities.
A record of security-relevant events generated by operating systems, applications, and network devices for monitoring and audit purposes.
The systematic planning, organizing, and controlling of activities to maintain the security of an organization's information assets.
A framework for assessing and improving an organization's security capabilities across defined maturity levels from initial to optimized.
Quantifiable measurements used to assess the effectiveness of security controls, the maturity of security programs, and organizational risk levels.
The continuous observation and analysis of an organization's IT environment to detect security events, threats, and anomalies in real time.
An individual responsible for implementing and maintaining the security policies and controls within an organization or business unit.
The day-to-day activities of monitoring, detecting, investigating, and responding to cybersecurity threats and incidents.
A centralized facility where security professionals monitor, detect, analyze, and respond to cybersecurity incidents using technology and defined processes.
A centralised facility and team responsible for monitoring, detecting, analysing, and responding to cybersecurity incidents on a 24/7 basis. SOC teams use SIEM, EDR, and other tools to maintain security visibility across the organisation.
The administration of day-to-day security activities including monitoring, incident response, vulnerability management, and threat intelligence.
Technology that integrates security tools and automates incident response workflows to improve the speed and consistency of threat response.
Technologies that enable organisations to collect security threat data, automate incident response workflows, and coordinate security operations. SOAR platforms reduce response times and standardise incident handling procedures.
The boundary of the area where security controls are applied to protect internal resources from external threats.
A formal document that provides an overview of the security requirements for an information system and describes the controls in place.
A collection of pre-defined response procedures for specific security scenarios that guide analysts through investigation and response steps.
The degree to which an organization's systems, processes, and personnel adhere to established security policies and standards.
An organized hierarchy of security policies, standards, guidelines, and procedures that govern an organization's information security program.
The overall cybersecurity strength and readiness of an organization, encompassing its security controls, policies, awareness, and ability to detect and respond to threats.
A detailed, step-by-step instruction for performing a specific security task or responding to a particular security event.
A comprehensive evaluation of an organization's overall security program including governance, operations, and technical controls.
The coordinated management of all security initiatives, projects, and operations to achieve organizational security objectives.
A data-driven measurement of an organization's cybersecurity performance and risk, often provided by third-party rating services.
A condition or capability that a system must possess to satisfy a security policy, standard, or contractual obligation.
An examination of systems, applications, or processes to identify security weaknesses and verify compliance with security requirements.
An evaluation that identifies threats to information assets, analyzes vulnerabilities, and determines the level of risk to guide security investment decisions.
The ongoing process of identifying, analyzing, evaluating, and treating risks to an organization's information security.
An automated assessment of systems, networks, or applications to identify known vulnerabilities, misconfigurations, and security weaknesses.
A documented set of specific, mandatory requirements for implementing security controls within an organization's environment.
Data collected from security tools, systems, and sensors that provides visibility into the security state of an organization's IT environment.
The process of evaluating the security of systems, applications, and networks through various testing methodologies to identify vulnerabilities.
A physical or digital device used to authenticate a user's identity. Security tokens generate one-time passwords or cryptographic keys and are used as the 'something you have' factor in multi-factor authentication.
Formal education programs that develop employee knowledge and skills in cybersecurity topics relevant to their roles and responsibilities.
The process of confirming that security controls meet specified security requirements and are effective in their intended environment.
A governance control that requires more than one person to complete different parts of a task, preventing fraud and errors through shared responsibilities.
A key internal control that distributes critical tasks among multiple people to prevent any single individual from having the ability to commit fraud or errors without detection. SoD is a core requirement in SOX, COBIT, and financial services regulations.
A validation tool used by organizations to self-evaluate their compliance with specific standards such as PCI DSS for merchants and service providers.
A validation tool used by merchants and service providers to report the results of their PCI DSS self-assessment. There are multiple SAQ types depending on the organisation's cardholder data environment and processing methods.
A capability allowing users to securely reset their own passwords through automated verification without requiring help desk assistance.
Specialized procedures and enhanced security measures required for processing sensitive categories of personal data such as health, biometric, or genetic information.
Information that, if disclosed improperly, could cause harm to individuals or the organization, requiring enhanced protection measures.
Categories of personal data that require enhanced protection due to their sensitive nature. Under GDPR, this includes racial or ethnic origin, political opinions, religious beliefs, trade union membership, genetic data, biometric data, health data, and data concerning sex life or sexual orientation.
An analytical technique that determines how variations in input variables affect outcomes, helping identify which risk factors have the greatest impact.
A security principle that divides critical tasks among multiple individuals to prevent fraud, error, and misuse by ensuring no single person controls all aspects of a process.
Physical and environmental security measures specifically designed to protect server rooms and network closets from unauthorized access and environmental threats.
The security practices and considerations specific to serverless computing architectures (Functions as a Service). Serverless security focuses on function permissions, input validation, dependency management, and event injection prevention.
A non-human account used by applications, services, and automated processes to authenticate and interact with other systems and services.
The governance and security of non-human accounts including lifecycle management, credential rotation, and privilege minimization.
A organized collection of IT services offered by an organization, including descriptions, service levels, and ownership information.
A plan for ensuring the continuity of critical services during disruptions, including alternate delivery methods and recovery procedures.
A contract between a service provider and customer that defines the expected level of service, performance metrics, and remedies for non-compliance.
A contract between a service provider and customer that defines the expected level of service, including availability, response times, and responsibilities. SLAs establish measurable performance targets and consequences for non-compliance.
The ITIL practice of setting clear business-based targets for service levels and ensuring that delivery of services is properly assessed, monitored, and managed against these targets.
Security capabilities built into service mesh architectures for microservices, including mutual TLS, policy enforcement, and observability.
A suite of audit reports developed by the AICPA that address controls at a service organisation. SOC 1 covers financial reporting controls; SOC 2 covers security, availability, processing integrity, confidentiality, and privacy; SOC 3 is a public version of SOC 2.
An evaluation of a service provider's security controls, compliance status, and risk profile before engaging them for services.
An attack in which an attacker takes over a valid user's web session by stealing or predicting the session token. Session hijacking gives the attacker the same privileges as the legitimate user.
The process of handling user sessions securely, including session creation, token generation, timeout enforcement, and proper session termination.
A unique identifier issued to a user after successful authentication, used to maintain their authenticated state across subsequent requests.
The use of AI tools, models, or services by employees without the knowledge or approval of the IT or governance team. Shadow AI creates risks around data privacy, security, intellectual property, and regulatory compliance.
Information technology systems and solutions used within an organisation without explicit approval from the IT department. Shadow IT creates security risks because these systems may not comply with security policies or be visible to security monitoring.
A cloud security framework that delineates security obligations between the cloud service provider and the customer. The provider secures the infrastructure ('security of the cloud'), while the customer secures their data and configurations ('security in the cloud').
Regulations governing shipping and logistics operations including customs requirements, hazardous materials handling, and trade compliance.
The practice of observing someone entering sensitive information such as passwords or PINs by looking over their shoulder or using visual aids.
A control weakness that is less severe than a material weakness but important enough to merit attention from those responsible for oversight.
A controlled security exercise that mimics real attack techniques to test employee awareness and organizational response procedures.
An authentication scheme that allows users to access multiple applications and services with one set of login credentials, improving user experience and security.
An authentication scheme that allows a user to log in with a single set of credentials to access multiple, independent software systems. SSO improves user experience while centralising authentication control.
The process of restoring operations at a primary or alternate site following a disaster or major disruption.
Self-executing code stored on a blockchain that automatically enforces the terms of an agreement when predefined conditions are met.
A form of phishing that uses SMS text messages to trick recipients into clicking malicious links or providing sensitive information. Smishing exploits the trust users place in text messages.
The psychological manipulation of people into performing actions or divulging confidential information. Social engineering attacks exploit human trust rather than technical vulnerabilities and include phishing, pretexting, and baiting.
Security controls and training designed to protect against manipulation techniques that exploit human psychology to gain unauthorized access.
A controlled security assessment that evaluates an organization's human vulnerabilities through simulated phishing, pretexting, and other manipulation techniques.
The level of confidence that software functions as intended, is free of vulnerabilities, and provides a required level of security.
A comprehensive inventory of all components, libraries, and dependencies used in a software application, supporting vulnerability management and supply chain security.
A comprehensive inventory of all components, libraries, and dependencies used in a software application. SBOMs enable organisations to identify and manage vulnerabilities in third-party and open-source software components.
Tools and processes that identify open-source components in software and detect known vulnerabilities, licensing issues, and outdated dependencies.
Practices for protecting the integrity and security of software throughout its supply chain, from development through distribution and deployment.
A weakness in software code that can be exploited by attackers to compromise the confidentiality, integrity, or availability of a system.
The automated or manual review of application source code to identify security vulnerabilities, coding errors, and compliance violations.
Security measures for protecting satellite systems, ground control stations, and space-based infrastructure from cyber and physical threats.
A targeted phishing attack directed at a specific individual or organisation. Spear phishing emails are personalised using information gathered about the target to increase credibility and success rates.
Personal data types that require additional protections under GDPR, including racial or ethnic origin, political opinions, religious beliefs, and health data.
A VPN configuration where only certain traffic is routed through the VPN tunnel while other traffic accesses the internet directly.
A technique where an attacker disguises their identity or the source of communication by falsifying data such as IP addresses, email headers, or caller IDs.
The initial phase of a certification audit that reviews documentation and readiness before proceeding to the full implementation assessment.
The second phase of a certification audit that evaluates the actual implementation and effectiveness of the management system.
The process of identifying, analysing, and planning actions to engage with individuals or groups who have an interest in or influence over an organisation's projects, programmes, or compliance initiatives.
Pre-approved contractual terms adopted by the European Commission for international transfers of personal data to ensure adequate protection.
Pre-approved contractual terms issued by the European Commission that provide appropriate safeguards for the transfer of personal data from the EU to countries without an adequacy decision. SCCs were updated in June 2021.
A documented set of step-by-step instructions for completing routine operations consistently, efficiently, and in compliance with standards.
An organization responsible for developing, publishing, and maintaining technical standards that define best practices for industries and professions.
Data protection regulations enacted by individual US states to protect residents' personal information, each with varying requirements and rights.
A required ISO 27001 document listing all Annex A controls, indicating which are applicable, which are implemented, and justification for any exclusions.
A security testing methodology that analyzes source code, bytecode, or binary code for security vulnerabilities without executing the application.
Adherence to requirements imposed by legislation enacted by a governing body, carrying the force of law.
A governance body of senior stakeholders that provides strategic direction, oversight, and decision-making for major programs and initiatives.
The practice of concealing information within other non-secret data, such as hiding a message within an image file. Unlike encryption, steganography aims to hide the existence of the communication rather than its content.
An authentication approach that requires additional verification when a user attempts to access higher-risk resources or perform sensitive operations.
The principle under GDPR Article 5(1)(e) that personal data should be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the personal data is processed.
Security measures for protecting data storage systems and media including access controls, encryption, integrity verification, and secure disposal.
The process of defining an organization's direction and making decisions on allocating resources to pursue strategies aligned with its mission.
Risks that affect or are created by an organization's business strategy and strategic objectives, including market changes and competitive threats.
The simulation of extreme but plausible scenarios to evaluate an organization's ability to withstand significant adverse events and maintain operations.
A third party engaged by a data processor to carry out specific processing activities on behalf of the data controller.
The process of identifying and developing future leaders and key personnel to ensure continuity of critical roles and organizational knowledge.
An independent public authority established by an EU member state responsible for monitoring the application of GDPR within its territory. Supervisory authorities have investigative, corrective, and advisory powers.
The processes for managing supplier relationships, performance, contracts, and risks throughout the lifecycle of supplier engagements.
A cyber attack that targets less secure elements in the supply chain to compromise a primary target. Supply chain attacks can involve inserting malicious code into legitimate software updates, compromising hardware during manufacturing, or exploiting third-party service providers.
Requirements for ensuring that suppliers and partners throughout the supply chain adhere to applicable laws, standards, and contractual obligations.
Planning and measures to maintain supply chain operations during disruptions, including alternative suppliers and logistics arrangements.
Risks arising from dependencies on suppliers and partners in the supply chain, including disruptions, quality issues, and security vulnerabilities.
The process of identifying, assessing, and mitigating risks arising from the extended network of suppliers, vendors, and service providers. Supply chain risk management is addressed by NIST CSF 2.0, ISO 27001 A.5.21, and NIST SP 800-161.
Measures to protect the integrity of products and information throughout the supply chain from manufacturing through delivery to end users.
A periodic audit conducted between certification and recertification to verify that a certified management system continues to meet the standard's requirements.
An evaluation of the privacy implications of surveillance technologies and monitoring practices on individuals and communities.
An integrated system of cameras, monitors, recording devices, and analytics used to monitor and record activities in and around facilities.
A filing required by financial institutions when they detect known or suspected criminal activity or suspicious transactions that may indicate money laundering.
The process by which employees report unusual or potentially malicious activities they observe to the security team for investigation.
Security features and configurations applied to network switches including port security, VLAN segmentation, and storm control.
An encryption method that uses the same key for both encrypting and decrypting data. Symmetric algorithms such as AES are fast and efficient but require secure key exchange between communicating parties.
Artificially generated data that mimics the statistical properties of real-world data without containing actual personal information. Synthetic data can be used for AI training and testing while preserving privacy.
The process of securing a system by reducing its attack surface through removing unnecessary software, closing unused ports, and applying security configurations.
The process of restoring an information system to operational status after a disruption, failure, or security incident.
The risk of widespread failure in a system, market, or industry that could trigger cascading effects across interconnected organizations.
T82 terms
Transport Layer Security, a cryptographic protocol that provides end-to-end encryption for data transmitted over networks, succeeding SSL.
A cryptographic protocol designed to provide communications security over a computer network. TLS encrypts data in transit between clients and servers and is used for securing web browsing, email, messaging, and VoIP.
The decryption and inspection of TLS-encrypted traffic at a security gateway to detect threats hidden within encrypted communications.
A discussion-based exercise where team members walk through simulated scenarios in a classroom setting. Tabletop exercises test incident response plans, business continuity procedures, and decision-making processes without activating real systems.
A physical security breach where an unauthorized person follows an authorized person through a secured entrance without presenting their own credentials.
Physical security measures and awareness training designed to prevent unauthorized individuals from following authorized personnel into secured areas.
Mechanisms that detect and alert on physical tampering with devices, enclosures, or seals protecting sensitive equipment or data.
The encryption of data written to backup tapes to protect the confidentiality of stored data if physical tapes are lost or stolen.
Adherence to tax laws and regulations governing the calculation, reporting, and payment of taxes to relevant authorities.
A security control implemented through technology such as firewalls, encryption, access controls, and intrusion detection systems.
Policies and processes for managing technology investments, architecture decisions, and IT operations in alignment with business strategy and risk appetite.
The processes and procedures for restoring technology systems and infrastructure following a disruption or disaster.
The potential for technology failures, obsolescence, security breaches, or misuse to adversely impact an organization's operations and objectives.
A strategic plan that outlines the technology initiatives, milestones, and investments needed to support business objectives over a defined period.
Regulatory requirements specific to telecommunications providers covering consumer protection, data retention, lawful interception, and network security.
Security measures for protecting telecommunications infrastructure, networks, and services from cyber threats and unauthorized interception.
Time-limited access permissions granted to users for specific tasks or projects, automatically expiring after a defined period.
An evaluation of a vendor or partner's security posture, compliance status, and risk profile conducted as part of vendor management.
Independent verification by an external party that an organisation's controls, processes, or systems meet specified criteria. SOC reports, ISO certifications, and penetration test reports are common forms of third-party assurance.
Independent verification by a qualified external party that an organization's controls or practices meet specified requirements.
An independent audit conducted by an external organization to verify compliance with standards, regulations, or contractual requirements.
The requirement for vendors and partners to adhere to regulatory requirements and contractual security obligations.
Cookies set by domains other than the one a user is visiting, commonly used for cross-site tracking and advertising purposes.
The practice of providing personal data to external organizations, subject to contractual agreements, consent requirements, and regulatory restrictions.
The potential threat to an organisation's data security and privacy posed by the actions or security posture of its vendors, partners, and service providers. Managing third-party risk is essential for GDPR compliance, particularly regarding data processors.
The process of identifying, assessing, and managing risks associated with outsourcing to or partnering with external organisations. Includes vendor due diligence and ongoing monitoring.
The process of identifying, assessing, and controlling risks presented throughout the lifecycle of relationships with third parties. TPRM programmes evaluate vendors' security posture, compliance status, and financial stability.
An individual or group that conducts cyber attacks or exploits vulnerabilities. Threat actors include nation-states, organised crime groups, hacktivists, insider threats, and opportunistic attackers.
The process of examining threat sources, their capabilities, motivations, and historical patterns to understand the threat environment.
The process of evaluating potential threats to an organization by analyzing threat actors, their capabilities, intentions, and the likelihood of attack.
A documented inventory of relevant threats organized by category, including descriptions, associated vulnerabilities, and potential impacts.
The process and technology used to identify malicious activity, policy violations, and other security threats within an organization's environment.
A defined pattern or condition in security monitoring systems that triggers an alert when matching events are observed.
The simulation of specific threat actor techniques and procedures to test whether security controls can detect and prevent known attack methods.
A continuous stream of data providing information about current threats, indicators of compromise, and adversary tactics from external intelligence sources.
The proactive process of searching through networks and datasets to detect and isolate advanced threats that evade existing security solutions. Threat hunting combines human analyst expertise with automated detection tools.
Structured approaches for proactively searching for hidden threats in an environment, including hypothesis-driven, intelligence-driven, and analytics-driven methods.
The process of recognizing and documenting potential threats that could exploit vulnerabilities and adversely affect organizational assets.
A security strategy that uses understanding of adversary behavior and threat intelligence to prioritize defensive measures and resource allocation.
Evidence-based knowledge about existing or emerging threats, including context, mechanisms, indicators, and actionable advice. Used to inform security decisions.
A technology solution that collects, aggregates, and operationalizes threat intelligence from multiple sources to support security decision-making and response.
A technology solution that collects, organises, and analyses threat intelligence data from multiple sources. TIPs enable security teams to understand the threat landscape and make informed decisions about defensive measures.
The current state of threats facing an organization or industry, including active threat actors, attack methods, and emerging attack trends.
A comprehensive assessment of the current and emerging threats facing an organization or industry, informing security strategy and priorities.
The ongoing process of identifying, evaluating, and responding to cybersecurity threats facing an organization.
A structured approach to identifying and prioritizing potential security threats to a system, application, or organization and defining countermeasures.
A structured approach for identifying, quantifying, and addressing security threats to a system or application. Threat modelling analyses potential attack vectors and helps prioritise security controls during the design phase.
A documented catalog of identified threats to an organization including their sources, capabilities, motivations, and historical activity patterns.
Actions taken to address and neutralize identified threats, including containment, eradication, and recovery activities.
A path or means by which a threat actor can gain access to a target system to deliver a malicious payload or carry out an attack.
An ongoing programme for identifying, evaluating, and addressing threats and vulnerabilities in an organisation's IT environment. Combines threat intelligence, vulnerability scanning, risk prioritisation, and remediation tracking.
A governance framework that assigns risk management responsibilities across three lines: operational management, risk oversight, and independent assurance.
A governance model that divides risk management responsibilities into three layers: first line (business operations and management controls), second line (risk management and compliance functions), and third line (internal audit).
An entry-level SOC analyst responsible for monitoring security tools, performing initial alert triage, and escalating potential incidents.
An experienced SOC analyst who performs deep-dive investigations of escalated incidents and conducts advanced threat analysis.
A senior SOC analyst or threat hunter who handles the most complex incidents, performs threat hunting, and develops detection rules.
An algorithm that generates temporary passwords using the current time as a variable, commonly used in two-factor authentication applications.
A temporary passcode generated by an algorithm that uses the current time as one of its factors. TOTP is commonly used in multi-factor authentication applications such as Google Authenticator and Microsoft Authenticator.
An authentication method that uses digitally signed tokens instead of credentials for each request, enabling stateless and scalable access control.
The process of replacing sensitive data with non-sensitive placeholder values (tokens) that have no exploitable meaning. Tokenisation is widely used in payment card processing to protect cardholder data and reduce PCI DSS scope.
A data security technique that replaces sensitive data with non-sensitive placeholder tokens that map back to the original data through a secure vault.
The ethical atmosphere that is created in the workplace by the organisation's leadership. The tone set by senior management and the board directly influences the organisation's culture, control environment, and compliance posture.
The most significant risks to an organization as determined through assessment processes, typically requiring board-level visibility and management attention.
A tiny invisible image embedded in web pages or emails that monitors user activity such as page views, email opens, and conversions.
Adherence to laws and regulations governing international trade, including import/export controls, customs requirements, and trade sanctions.
The examination of network communication patterns, volumes, and metadata to identify anomalies, security threats, or intelligence without necessarily reading content.
Network management techniques that control the flow of network traffic to optimize performance and ensure quality of service for critical applications.
An evaluation of the risks to personal data when transferred to a third country, considering the legal framework and supplementary measures required.
Regulatory frameworks that apply across multiple countries or jurisdictions, requiring organizations to comply regardless of where they are headquartered.
The principle that individuals should be clearly informed about how their personal data is being collected, used, and processed. Transparency is a foundational principle of GDPR and requires clear, plain language in privacy communications.
A data protection requirement that personal data processing information be presented to individuals in a clear, accessible, and easily understandable manner.
Database encryption that automatically encrypts data before writing to storage and decrypts when reading, without requiring application changes.
A cryptographic protocol that secures communications over computer networks, widely used to protect web traffic, email, and other data transmissions.
Regulations governing transportation operations including safety standards, environmental requirements, security mandates, and driver regulations.
Malicious software disguised as legitimate software. Trojans create backdoors in security systems, allowing attackers to gain unauthorised access to the compromised system.
A boundary in a system where the level of trust changes, requiring security controls to validate data and authorize access as information crosses between zones.
The five criteria used in SOC 2 audits: Security (required), Availability, Processing Integrity, Confidentiality, and Privacy. Organisations select which criteria apply.
AI systems that are lawful, ethical, and robust throughout their lifecycle. The concept, promoted by the EU's High-Level Expert Group on AI, encompasses seven key requirements including human agency, technical robustness, privacy, transparency, diversity, societal wellbeing, and accountability.
An authentication method that requires two different types of verification, such as a password and a one-time code, before granting access.
An authentication process that requires exactly two different factors to verify a user's identity. 2FA is a subset of multi-factor authentication and typically combines a password with a mobile device verification.
An audit report that describes an organization's system and the suitability of control design at a specific point in time.
An audit report that evaluates both the design and operating effectiveness of controls over a specified period, typically six to twelve months.
U14 terms
A security control that blocks or allows access to websites based on their URL classification, preventing users from visiting malicious or policy-violating sites.
An approach that maps and consolidates requirements from multiple compliance standards into a single integrated control set.
A comprehensive database that maps and harmonises controls across thousands of regulations and standards worldwide. The UCF enables organisations to identify common controls and reduce compliance duplication.
An integrated security appliance that combines multiple security functions including firewall, antivirus, intrusion prevention, and content filtering in a single platform.
A comprehensive security solution that consolidates multiple security functions into a single appliance, including firewall, intrusion detection/prevention, anti-malware, content filtering, and VPN capabilities.
A device that provides emergency power to equipment when the main power source fails, allowing orderly shutdown or continued operation.
A hardware-based authentication standard using physical security keys that provide strong two-factor authentication resistant to phishing attacks.
A specific security monitoring scenario that defines the events, conditions, and response actions for detecting a particular type of threat or violation.
A periodic examination of user access rights across systems to verify that permissions are appropriate and no unauthorized access exists.
Security technology that uses machine learning and statistical analysis to detect anomalous user behaviour that may indicate insider threats, compromised accounts, or other security risks.
The process of revoking all access rights and disabling accounts when a user leaves the organization or no longer requires access.
The process of creating, managing, and deactivating user accounts and access rights across IT systems according to organizational policies and role requirements.
Security solutions that use machine learning to establish baseline behavior patterns for users and entities, detecting anomalies that may indicate threats.
Regulatory requirements for utility companies including cybersecurity standards, environmental regulations, and service reliability mandates.
V33 terms
Virtual Local Area Network, a logical network segment created within a physical network to isolate traffic and improve security through network segmentation.
A network device that manages multiple VPN connections, handling encryption, authentication, and routing for remote access users.
A networking configuration that routes only specific traffic through a VPN tunnel while allowing other traffic to flow directly to the internet.
Security measures for controlling and monitoring vehicle entry to organizational facilities, including barriers, permits, and inspection procedures.
The evaluation of a vendor's capabilities, security posture, financial stability, and compliance status as part of the procurement process.
The requirement for third-party vendors to adhere to applicable regulations, standards, and contractual security requirements.
The investigation and evaluation of a potential vendor's security practices, financial stability, and compliance posture before establishing a business relationship.
The discipline of managing external vendors and suppliers to maximize value, minimize risk, and ensure service quality and compliance.
An evaluation of a third-party vendor's privacy practices and controls before sharing personal data or engaging them for data processing.
A formal evaluation of the risks associated with using a specific third-party vendor, including security, compliance, operational, and reputational considerations.
The ongoing process of monitoring and managing the risks associated with third-party vendors throughout the lifecycle of the business relationship.
A formal evaluation of a vendor's security controls, certifications, and incident response capabilities before sharing data or granting system access.
An assessment of a vendor's security controls, practices, and certifications to determine whether they meet the organization's security requirements.
An attack where a user gains access to resources or functions intended for users with a higher privilege level.
The use of cameras and recording systems to monitor and record activities in and around facilities for security, safety, and compliance purposes.
A technology that creates an encrypted tunnel between a user's device and a remote server, protecting data in transit and masking the user's IP address.
A technology that creates an encrypted connection over a less secure network, such as the internet. VPNs provide privacy and data integrity for remote access and site-to-site connectivity.
A type of malicious software that attaches itself to a legitimate programme or file and spreads when the infected file is executed. Unlike worms, viruses require human action to propagate.
Voice phishing, a social engineering attack that uses phone calls or voice messages to trick victims into revealing sensitive information. Vishing attacks often impersonate banks, government agencies, or technical support.
Processes for registering, tracking, and controlling visitors to organizational facilities, including identification verification and escort requirements.
Essential records and documents needed for an organization to continue operations during a crisis and to reconstruct operations afterward.
A social engineering attack conducted via telephone where callers impersonate legitimate organizations to trick victims into providing sensitive information.
The encryption of an entire storage volume or partition, protecting all files and data stored within that volume from unauthorized access.
A weakness in a system, application, or process that could be exploited by a threat actor to gain unauthorised access or cause harm. Vulnerabilities can exist in software, hardware, configurations, or procedures.
A systematic process of identifying, quantifying, and prioritising security vulnerabilities in systems, applications, and networks.
A repository of known security vulnerabilities with details including severity ratings, affected systems, and available patches or workarounds.
The practice of reporting security vulnerabilities to the affected vendor or organisation so they can be patched before being exploited. Responsible disclosure policies define timelines and processes for vulnerability reporting.
A published policy describing how an organization accepts and handles vulnerability reports from external security researchers.
The ongoing practice of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software. Vulnerability management programmes include regular scanning, risk-based prioritisation, and timely remediation.
The process of ranking discovered vulnerabilities based on factors such as severity, exploitability, asset criticality, and business impact.
The process of fixing or mitigating identified security vulnerabilities through patching, configuration changes, or compensating controls.
Automated testing that identifies known security weaknesses in systems, networks, and applications by comparing them against databases of known vulnerabilities.
The period between when a vulnerability is discovered or publicly disclosed and when a patch or mitigation is applied.
W21 terms
The latest Wi-Fi Protected Access security protocol providing enhanced encryption, protection against brute force attacks, and improved security for open networks.
An audit procedure in which the auditor traces a single transaction from initiation through final recording to verify that controls are in place and operating as described. Walk-throughs are used to understand and document business processes.
A dedicated physical or virtual space where incident response teams gather during major security incidents to coordinate response activities.
A backup facility that has some but not all the hardware and connectivity needed for operations, requiring some setup before becoming fully operational.
Sensors and monitoring systems that detect water leaks or flooding in facilities to prevent damage to IT equipment and infrastructure.
A targeted attack strategy where the attacker compromises a website frequently visited by the intended victims. When targets visit the compromised site, they are infected with malware tailored to exploit their specific vulnerabilities.
A security solution that monitors, filters, and blocks HTTP/HTTPS traffic to and from web applications to protect against web-based attacks.
A security solution that monitors, filters, and blocks HTTP/HTTPS traffic to and from a web application. WAFs protect against web-based attacks including SQL injection, cross-site scripting, and other OWASP Top 10 threats.
Automated security testing of web applications to identify common vulnerabilities such as SQL injection, XSS, and authentication weaknesses.
Security measures for protecting websites, web applications, and web services from attacks including injection, cross-site scripting, and authentication bypass.
A highly targeted phishing attack aimed at senior executives or other high-profile individuals within an organisation. Whaling attacks are carefully crafted to appear as legitimate business communications.
Legal safeguards and organizational policies that protect individuals who report illegal, unethical, or non-compliant activities from retaliation.
A security testing approach where the tester has full knowledge of the target system including source code, architecture, and credentials.
Security protocols and practices for protecting wireless local area networks, including WPA3 encryption, access control, and rogue AP detection.
Physical measures to protect windows in facilities from break-in attempts, including security film, bars, sensors, and shatter-resistant glass.
Authorized security testing of wireless networks and their security controls to identify vulnerabilities in wireless infrastructure and configurations.
Protocols and practices for protecting wireless networks from unauthorized access and attacks, including WPA3 encryption, SSID management, and rogue AP detection.
The provision of alternative workspace for employees when primary office facilities are unavailable due to a disruption or disaster.
A temporary alternative process or procedure used to maintain operations when normal systems or processes are unavailable.
The digital identity management of employees, contractors, and partners who need access to organizational systems and resources.
A type of malware that self-replicates and spreads across networks without requiring user interaction or a host programme. Worms can consume bandwidth, overload systems, and deliver additional malicious payloads.
Z7 terms
A cryptographic method that allows one party to prove they know a value without revealing the value itself, useful for privacy-preserving authentication.
A security model that assumes no user, device, or network should be trusted by default, even those inside the corporate perimeter. Requires continuous verification for every access request.
A security model that requires strict identity verification for every person and device trying to access resources, regardless of network location.
A security approach that provides secure remote access to applications based on defined access control policies without placing users on the network.
The identification of a previously unknown software vulnerability that has not been publicly disclosed and for which no patch exists.
An attack that targets a previously unknown software vulnerability for which no patch or fix is available, making it particularly dangerous and difficult to defend against.
A software security flaw that is unknown to the vendor and for which no patch or fix is available. Zero-day vulnerabilities are particularly dangerous because they can be exploited before the vendor has an opportunity to address them.