ithandbook.ffiec.gov

Website:https://ithandbook.ffiec.gov
Upvotes received0
Downvotes received3
Karma:-2 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (169)

1

0 Thumbs up   0 Thumbs down

acceptable use policy


A document that establishes an agreement between users and the enterprise and defines for all parties the ranges of use that are approved before users can gain access to a network or the Internet.
Source: ithandbook.ffiec.gov

2

0 Thumbs up   0 Thumbs down

access


The ability to physically or logically enter or make use of an IT system or area (secured or unsecured). The process of interacting with a system.
Source: ithandbook.ffiec.gov

3

0 Thumbs up   0 Thumbs down

administrator privileges


Computer system access to resources that are unavailable to most users. Administrator privileges permit execution of actions that would otherwise be restricted.
Source: ithandbook.ffiec.gov

4

0 Thumbs up   0 Thumbs down

air-gapped environment


Security measure that isolates a secure network from unsecure networks physically, electrically, and electromagnetically.
Source: ithandbook.ffiec.gov

5

0 Thumbs up   0 Thumbs down

anomalous activity


Activity that deviates from normal. The result of the process of comparing definitions of what activity is considered normal against observed events to identify significant deviations.
Source: ithandbook.ffiec.gov

6

0 Thumbs up   0 Thumbs down

antivirus/anti-malware software


A program that monitors a computer or network to identify all types of malware and prevent or contain malware incidents.
Source: ithandbook.ffiec.gov

7

0 Thumbs up   0 Thumbs down

asset


In computer security, a major application, general-support system, high-impact program, physical plant, mission-critical system, personnel, equipment, or a logically-related group of systems.
Source: ithandbook.ffiec.gov

8

0 Thumbs up   0 Thumbs down

attack signature


A specific sequence of events indicative of an unauthorized access attempt.
Source: ithandbook.ffiec.gov

9

0 Thumbs up   0 Thumbs down

authentication


The process of verifying the identity of an individual user, machine, software component, or any other entity.
Source: ithandbook.ffiec.gov

10

0 Thumbs up   0 Thumbs down

availability


Whether or how often a system is available for use by its intended users. Because downtime is usually costly, availability is an integral component of security.
Source: ithandbook.ffiec.gov


To view all 169 definitions, please sign in.