Glossary of Key Information Security Terms (NIST) part 33 / IN

studied byStudied by 3 people
5.0(1)
get a hint
hint

Information Assurance Component – (IAC)

1 / 19

20 Terms

1

Information Assurance Component – (IAC)

An application (hardware and/or software) that provides one or more Information Assurance capabilities in support of the overall security and operational objectives of a system.

New cards
2

Information Assurance Manager – (IAM)

See Information Systems Security Manager.

New cards
3

Information Assurance Officer – (IAO)

See Information Systems Security Officer.

New cards
4

Information Assurance (IA) Professional –

Individual who works IA issues and has real-world experience plus appropriate IA training and education commensurate with their level of IA responsibility.

New cards
5

Information Assurance Vulnerability Alert (IAVA) –

Notification that is generated when an Information Assurance vulnerability may result in an immediate and potentially severe threat to DoD systems and information; this alert requires corrective action because of the severity of the vulnerability risk.

New cards
6

Information Domain –

A three-part concept for information sharing, independent of, and across information systems and security domains that 1) identifies information sharing participants as individual members, 2) contains shared information objects, and 3) provides a security policy that identifies the roles and privileges of the members and the protections required for the information objects.

New cards
7

Information Environment –

Aggregate of individuals, organizations, and/or systems that collect, process, or disseminate information, also included is the information itself.

New cards
8

Information Flow Control –

Procedure to ensure that information transfers within an information system are not made in violation of the security policy.

New cards
9

Information Management –

The planning, budgeting, manipulating, and controlling of information throughout its life cycle.

New cards
10

Information Operations (IO) –

The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision-making process, information, and information systems while protecting our own.

New cards
11

Information Owner –

Official with statutory or operational authority for specified information and responsibility for establishing the controls for its generation, collection, processing, dissemination, and disposal. See Information Steward. Official with statutory or operational authority for specified information and responsibility for establishing the controls for its generation, classification, collection, processing, dissemination, and disposal.

New cards
12

Information Resources –

Information and related resources, such as personnel, equipment, funds, and information technology.

New cards
13

Information Resources Management (IRM) –

The planning, budgeting, organizing, directing, training, controlling, and management activities associated with the burden, collection, creation, use, and dissemination of information by agencies.

New cards
14

Information Security –

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

New cards
15

Information Security –

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide— 1) integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity; 2) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and 3) availability, which means ensuring timely and reliable access to and use of information.

New cards
16

Information Security Architect –

Individual, group, or organization responsible for ensuring that the information security requirements necessary to protect the organization’s core missions and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting information systems supporting those missions and business processes.

New cards
17

Information Security Architecture –

An embedded, integral part of the enterprise architecture that describes the structure and behavior for an enterprise’s security processes, information security systems, personnel and organizational sub-units, showing their alignment with the enterprise’s mission and strategic plans.

New cards
18

Information Security Continuous Monitoring (ISCM) –

Maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. [Note: The terms “continuous” and “ongoing” in this context mean that security controls and organizational risks are assessed and analyzed at a frequency sufficient to support risk-based security decisions to adequately protect organization information.]

New cards
19

Information Security Continuous Monitoring (ISCM) Process –

A process to: • Define an ISCM strategy; • Establish an ISCM program; • Implement an ISCM program; • Analyze data and Report findings; • Respond to findings; and • Review and Update the ISCM strategy and program.

New cards
20

Information Security Continuous Monitoring (ISCM) Program –

A program established to collect information in accordance with pre-established metrics, utilizing information readily available in part through implemented security controls.

New cards

Explore top notes

note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 40 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11982 people
Updated ... ago
4.8 Stars(50)

Explore top flashcards

flashcards Flashcard67 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard117 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard342 terms
studied byStudied by 159 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard236 terms
studied byStudied by 2 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 27 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard67 terms
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
flashcards Flashcard130 terms
studied byStudied by 5 people
Updated ... ago
4.0 Stars(1)