csi-ltd.com

Website:http://www.csi-ltd.com
Upvotes received1
Downvotes received1
Karma:1 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (52)

1

1 Thumbs up   1 Thumbs down

Privileged User


A user that is authorized (and, therefore, trusted) to perform security relevant functions that ordinary users are not authorized to perform.
Source: csi-ltd.com

2

0 Thumbs up   0 Thumbs down

Access control


The prevention of unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner. Access Authority -
Source: csi-ltd.com

3

0 Thumbs up   0 Thumbs down

access level


A category within a given security classification limiting entry or system connectivity to only authorized persons.  Audit -
Source: csi-ltd.com

4

0 Thumbs up   0 Thumbs down

Authentication


The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data.
Source: csi-ltd.com

5

0 Thumbs up   0 Thumbs down

Business impact analysis


An analysis of an information system’s requirements, functions, and interdependencies used to characterize system contingency requirements and priorities in the event of a significant disruption.
Source: csi-ltd.com

6

0 Thumbs up   0 Thumbs down

Confidentiality


  The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. Chain of Custody
Source: csi-ltd.com

7

0 Thumbs up   0 Thumbs down

Chain of Evidence


A process and record that shows who obtained the evidence; where and when the evidence was obtained; who secured the evidence; and who had control or possession of the evidence.  The “sequencing” of t [..]
Source: csi-ltd.com

8

0 Thumbs up   0 Thumbs down

Contingency Plan


Management policy and procedures used to guide an enterprise response to a perceived loss of mission capability.  The Contingency Plan is the first plan used by the enterprise risk managers to determi [..]
Source: csi-ltd.com

9

0 Thumbs up   0 Thumbs down

credential


An object or data structure that authoritatively binds an identity (and optionally, additional attributes) to a token possessed and controlled by a Subscriber.
Source: csi-ltd.com

10

0 Thumbs up   0 Thumbs down

Data Aggregation


Compilation of individual data systems and data that could result in the totality of the information being classified, or classified at a higher level, or of beneficial use to an adversary. Data Integ [..]
Source: csi-ltd.com


To view all 52 definitions, please sign in.