Glossary

airplane mode: a setting that prevents mobile devices from sending and receiving cellular and wireless communications.

application programming interface (API): a set of computer programming subroutines, definitions, protocols, and tools for building application software.

application-oriented: a methodology focused on interactions with complimentary modules that provide analytical or reporting capabilities.

assets: any resource of value such as people, information, or systems.

attack vectors: paths or means by which an attacker or intruder gains access in order to deliver an exploit.

backplane: a group of electrical connectors in parallel with each other, so that each pin of each connector is linked to the same relative pin of all the other connectors, forming a computer bus.

bad faith: the intentional dishonest act by not fulfilling legal or contractual obligations, misleading another, entering into an agreement without the intention or means to fulfill it, or violating basic standards of honesty in dealing with others.

base discount year: the time period used to first start measuring the effectiveness of cash flows.

best practice: a method or technique that has consistently shown results superior to those achieved with other means, and that is used as a benchmark.

best-of-breed: a term used to describe the solution that generates the most value by providing the greatest functionality for a specific niche or subject area.

black box: a methodology that examines the functionality of an application, system, or object without knowledge of internal structures or workings.

bring your own key: a security model that allows customers to use and manage their own encryption keys to protect data hosted in business applications

chain of command: the line of authority and responsibility along which orders and commands are passed between different units.

cleartext: a form of message or data which is in a form that can be immediately read, understood, and interpreted by humans without additional processing.

click-wrap agreement: a type of non-negotiable contractual agreement where consumers must agree to the terms and conditions set forth before using the product or service.

cloud service providers (CSP): companies that offer and manage components of distributed computing services over the Internet

cluster: a fixed number of contiguous and addressable units of storage space on electronic storage medium.

commercial-off-the-shelf (COTS): describes items that are available for purchase through the commercial marketplace; including, but not limited to, software or hardware products, installation services, training services.

common body of knowledge (CBK): encompasses the complete set of concepts, terms, and activities that make up a professional domain.

continuous improvement transformation: a condition by which any subject matter can achieve and sustain success.

cyclic redundancy check (CRC): an error-detecting calculation that is commonly used in digital networks and storage devices to identify accidental changes to raw data.

data in transit: the flow of information over any type of public or private network environment.

data-at-rest: refers to the protection of inactive data that is physically stored in any digital form (i.e., database, enterprise data warehouse, tapes, hard drives, etc.)

data-in-use: applies to data that is actively stored in a non-persistent state, such as memory, for consumption or presentation.

dimension tables: consist of descriptive attributes that are used in support of fact table measurements.

eggs-in-one-basket: a term used to describe the increased risk of losing an investment as a result of concentrating all resources into a single item

electronically stored information (ESI): for the purpose of the Federal Rules of Civil procedure (FRCP): is information created, manipulated, communicated, stored, and best utilized in digital form, requiring the use of computer hardware and software.

elevator speech: a short, clear, brief message used to quickly and simply share information.

enterprise data warehouse (EDW): a central repository used to store amalgamated data from one or more disparate sources to support analytics and reporting.

entity-relationship (ER) model: describes the connections between others objects typically used in regards to the organization of data or information aspects.

evaluation period: the time period in which effectiveness of cash flows is measured against subjective or objective standards.

exculpatory evidence: exonerates a subjects involvement in an event that establishes innocence.

fact tables: consist of measurements, metrics, or fact of a business process that are located at the center of a data warehouse schema.

false-negative: an error in which results improperly indicate no presence of a condition when it is present.

false-positive: an error in which results improperly indicate the presence of a condition when it is not present.

financial risk: associated with the financial structure, stability, and transactions of the organization.

forensically sound: qualifies and, in some cases, justifies the use of a specific technology or methodology in preserving the authenticity and integrity of electronically stored information.

form factor: a term commonly used to describe the specifications of a computing device, a computer case or chassis, or one of its internal components such as a motherboard.

fruit of crime: applies to material objects that are acquired during a crime

GREP: a utility for searching plain-text data sets for content that matches a specific pattern.

hard-delete: occurs when data is deleted and can no longer be accessed through the filesystem

hash value: a numerical value of fixed length used to uniquely identifies and/or represent large volumes of data.

hearsay evidence: second-hand or indirect evidence that is offered by a witness of which they do not have direct knowledge but, rather, their testimony is based on what another has said to them.

inculpatory evidence: demonstrates a subject’s involvement in an event that establishes guilt.

intangible: costs are unquantifiable costs related to an identifiable source (e.g., employee productivity).

internal rate of return (IRR): the discount rate, commonly used in budgeting, that makes the net present value of all cash flows in a specific project equal to zero.

internet protocol security (IPsec): a protocol suite for securing network communications by establishing mutual authentication between nodes by encrypting each data packet of an entire communication session.

key performance indicators (KPI): a business metric used to evaluate factors that are crucial to the success of an organization.

least privilege access: the practice of limiting subjects’ access to objects at the minimal level required to allow normal operations and functions.

legal risk: associated with the need to comply with the rules and regulations of the appropriate governing bodies.

level of inflation: the sustained increase in the level of costs measured as an annual percentage.

managed security service providers (MSSP): provide outsourced monitoring and managements of security systems and applications

mandatory access control (MAC): a type of access control mechanism where a subjects ability to access resource objects is controlled by the system or an administrator.

market-oriented: a methodology focused on discovering and meeting the needs and wishes of customers through products.

message digest algorithm family: a suite of one-way cryptographic hashing algorithms that are commonly used to verify data integrity through the creation of a unique digital fingerprint of differing length based on version used.

message digest version 5 (MD5): a one-way cryptographic algorithm used to verify data integrity through the creation of a unique 128-bit fingerprint.

metadata: data about data that is used to describe how and when and by whom a particular set of information was collected, and how the data is formatted.

net present value (NPV): the sum of the present values of incoming and outgoing cash flows, also described as costs and benefits, over a period of time.

objects are passive: elements that contain or receive information

online analytical processing (OLAP) system: a type of system that performs multidimensional analysis of data to provide complex modeling and trend reporting.

online transaction processing (OLTP): system is a type of system that manages and facilitates the operations of an application typically focused on data entry.

open systems interconnection (OSI) model: a conceptual model that characterizes and standardizes the communication function of a telecommunication or computer system.

operational risk: associated with the organization’s business, operational, and administrative procedures.

other risks: associated with indirect, non-business factors such as natural disasters and others as identified based on the subjectivity of the organization.

passcode: a string of characters used to authenticate access to information technology resources, including lowercase and uppercase letters, numbers, and symbols.

payback period: the time required to regain costs of an investment or to reach the break-even point.

personally identifiable information (PII): is any data that can be used to identify and distinguish one person from another.

phreaking: a blend of the words phone and freaking and is used to describe activities performed to reverse engineer telecommunication systems to allow free calls to be made. Example: the plain old telephone system (POTS).

price year: any subsequent time period following the base year used to continue measuring the effectiveness of cash flows.

proof of concept (POC): a process by which the realization of a certain concept, theory, method, or idea demonstrates its feasibility or proves a principle.

recovery time objective (RTO): the targeted duration of time and service level within which a system, network, or application must be restored to avoid unacceptable consequences

repeatable: refers to obtaining the same results when using the same method on identical test items in the same laboratory by the same operator using the same equipment within short intervals of time.

reproducible: refers to obtaining the same results as those obtained when using the same method on identical test items in different laboratories with different operators utilizing different equipment.

return on investment (ROI): the benefit to the investor resulting from an investment of some resource.

role-based access control (RBAC): an approach where subjects have access to objects based on their associated roles.

runbooks: both electronic and physical, are a compilation of routine procedures and operations used as a reference.

secure boot: a security standard to ensure that a system only loads and uses know-good and trusted software.

secure hashing algorithm (SHA): a one-way suite of cryptographic algorithms used to verify data integrity through the creation of a unique fingerprint of differing length based on version used.

secure hashing algorithm family: a suite of one-way cryptographic hashing algorithms that are commonly used to verify data integrity through the creation of a unique digital fingerprint of differing length based on version used.

service level agreements (SLA): official commitments between parties that define the level of service expected by the customer from the provider.

service level objectives (SLO): specific quantitative characteristics used to measure service delivery in terms of availability, throughput, frequency, response time, or quality.

services: a means of delivering value outcomes to customers without requiring the customer to directly own the specific costs and risks.

shadow price: the gain from an increase, or loss from a decrease, of relaxing the constraint, or, equivocally, the change in the total cost of strengthening the constraint.

snowflake model: a database schema where a central table contains the bulk of data and the smaller sets of related tables containing both values for linked dimension tables as well as volumes of data volumes with further linked dimension tables.

soft-delete: occurs when data is marked for deletion and is only prevented from being accessed

someone with knowledge: describes any person who has awareness or familiarity gained through experience or learning.

star model: a database schema where a central table contains the bulk of data and smaller sets of related table contain values for each linked dimension tables.

strategic risk: associated with the organization’s core business functions and commonly occurs because of business interactions (purchase/sale of goods and services), mergers and acquisitions, or investment relations management.

structured: data include information that resides in a fixed field within a record or file (i.e., databases, spreadsheets).

subject: an active element that operates on information or the system state.

subject-oriented: a methodology focused on building systems that can be used to analyze a particular focus area.

tactics, techniques, and procedures: describes the attack patterns, tools, exploits, infrastructure, victim targeting, and other methods used by the adversary or attacker.

tangible: costs are quantifiable costs related to an identifiable source or asset (e.g. software licensing).

technology-generated data: or background evidence, is any electronically stored information that has been created and is being maintained because of programmatic processes or algorithms.

technology-stored data: or foreground evidence, is any electronically stored information that has been created and is being maintained because of user input and interactions.

threat actors: describes the identification and/or characterization of the adversary or attacker.

threats: any intentional (e.g., cybercrime) or accidental (e.g., natural disaster) course of action with the potential to adversely impact people, processes, or technology.

time value of money (TVM): the principle that the value of money at the present time is worth more than the same amount in the future due to potential earning capacity.

tool of crime: applies to material objects used to perpetrate criminal activities.

total cost of ownership (TCO): a financial estimate to determine the direct and indirect expenses and benefits of an investment.

trier of fact: or finder of fact, is any person or group of persons in a legal proceeding who determines whether, from presented evidence, something existed or some event occurred.

true-positive: occurs when results properly indicate the presence of a condition.

unstructured: data include information that does not resides in a traditional row–column arrangement (e.g., email, productivity documents).

validation: the process of evaluating software to determine whether the products of a given development phase satisfy the condition imposed at the start of that phase.

verification: the process of evaluating software during or at the end of the development process to determine whether it satisfies specified requirements.

white box: a methodology that examines the non-functional, internal structures or workings of an application, system, or object.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.67.54