peterbance.co.uk

Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (129)

1

0   0

access control


A physical or technical control (or system) to ensure authorised access and to prevent unauthorised access to resources, premises or systems to enforce business or security requirements. This could include such things as a lock to which only authorised personnel have the key, a swipe-card entry system, PIN controls on ATMs, file permissions on a se [..]
Source: peterbance.co.uk

2

0   0

access management


This describes the process responsible for permitting user access to information services, information or other protected assets. Access Management supports protective measures assuring the Confidentiality, Integrity and Availability of assets by ensuring that only authorised users are able to access or modify them. Access Management may also be re [..]
Source: peterbance.co.uk

3

0   0

accountability


Responsibility (and, often, culpability) for the effects of one's actions with an explanation of how and why the actions took place.
Source: peterbance.co.uk

4

0   0

accreditation


In the context of HMG security: formal declaration by a designated approving authority that a system is approved to operate in a particular security mode using a prescribed set of safeguards (which may include technical countermeasures, physical controls, personnel processes and operating procedures). In a more general context (e.g. for ISO27001), [..]
Source: peterbance.co.uk

5

0   0

accreditor


The designated approving authority (often a single individual, but frequently one of a team) that undertakes accreditation
Source: peterbance.co.uk

6

0   0

aggregation


Of particular relevance in considering the increased sensitivity/value of large volumes of personal data, but applies also to other information resources. Aggregation is the effect by which information may be combined with other information in order to increase its sensitivity or value. This may be due to: Accumulation - whereby a large quantity o [..]
Source: peterbance.co.uk

7

0   0

administrative system(s)


See Management System(s)
Source: peterbance.co.uk

8

0   0

advisory


In the context of Information Security, and advisory is a report on vulnerabilities, weaknesses or flaws discovered (or existing, or predicted) in software, systems or services, often with advice for dealing with them or working around them.
Source: peterbance.co.uk

9

0   0

antivirus


A piece of software (or other service) that detects, and sometimes removes, viruses, Trojans and other malicious software that is detected. Antivirus software generally works using signatures to recognise malicious content, although may also contain hybrid functionality that allows it to detect suspicious behaviour in software or services, allowing [..]
Source: peterbance.co.uk

10

0   0

architecture


In the context of IT systems, as opposed to buildings, "architecture" describes the approach to designing and constructing of systems, networks, applications or even information storage. A variety of formal methodologies exist to support information architecture development, and even more exist to help develop Security Architecture.
Source: peterbance.co.uk


To view all 129 definitions, please sign in.