Information Security Glossary

Showing: All results

Access Control

Access control determines who can view or use information resources (e.g., data, applications, systems, and networks), and in what circumstances.

 

Access Point

Electronic hardware that acts as a common connection point for devices in a wireless network

Account Owner

In IT, the account owner most likely refers to the individual, organization, or entity with permission to implement changes within the account.

Ad Hoc Review

A risk review conducted outside of the regular assessment schedule

Ad-Hoc Mode

A mode of wireless networking that does not use access points

Advanced Encryption Standard

The Advanced Encryption Standard (AES) is an algorithm that uses a specific encryption procedure to protect…

Advanced Encryption Standard (AES)

A 256-bit encryption standard

Anonymous Data

Anonymous data cannot be traced back to the person or entity that supplied it.

Application

Applications are software designed to perform specific assigned tasks.

Application Idle Timeout

Application Idle Timeout refers to automatic disconnection or logout . . .

Applied Research

Research conducted to gain the knowledge or understanding to meet a specific, recognized need.

Assessment, Authorization, and Monitoring

A family of security controls that enable an organization to periodically assess the security controls effectiveness

Asset

Any hardware, software, system, or data owned, leased, vended, contracted, or operated by the university that is essential to its operations

Assurance Level

The degree of confidence in the identity verification, authentication process, and security measures used to issue and manage digital certificates

Authentication

Authentication is a way of establishing that the user is who they claim to be before granting access to university systems and data.

Authentication Header Protocol (AH) 

An IPSec security protocol that can provide integrity protection for packet headers and data through authentication

Authentication Information

Washington University in St. Louis uses a two-factor (or two-step) authentication service provided by Duo…

Authenticator

A system or device that verifies the identity of a user or network element

Authorization

Possessing official permission or being granted/denied approval by an authoritative source (e.g., owner, steward, automated mechanism) to perform an action or set of activities.

Availability

Availability means data are accessible when you need them.

Baseline Configuration

A documented set of specifications for an information system

Basic Research

Research undertaken primarily to acquire new knowledge without any particular application or use in mind.

Biometrics

Biometrics are unique features of individuals, for example, fingerprints, that can identify a
specific person.

Business Associate Agreement (BAA)

A legally binding agreement between a healthcare provider and a third-party vendor that ensures compliance with HIPAA when handling PHI

Certificate Authority (CA)

A trusted entity that issues and manages digital certificates

Certificate Chain

A sequence of certificates, where each certificate in the chain is signed by the next to a trusted root Certificate Authority

Certificate Revocation List (CRL)

A list of digital certificates that have been revoked by the issuing Certificate Authority before their expiration date

Certificate Signing Request (CSR)

A request sent from an applicant to a Certificate Authority to apply for a digital certificate

Chemical Facility Anti-Terrorism Standards (CFATS)

The Department of Homeland Security has issued Chemical Facility Anti-Terrorism Standards for any facility that manufactures, uses, stores, or distributes certain chemicals above a specified quantity.

Cipher Suite

A set of algorithms that define how the cryptographic operations are performed during a secure communication session

Client Software

Software installed on devices to provide authenticated wireless network connections

Client VPN 

Offers encrypted network communication locally installed VPN client software

Cloud

Cloud computing uses the internet to deliver computing services such as storage in servers, the provision of software, and conducting analytics.

Compliance

Compliance in cyber security means meeting certain standards and obeying by regulations…

Confidential Data

Confidential information is not subject to legal regulation, but it is not freely available to create, store, and transmit.

Confidentiality

Confidentiality refers to protecting information from unauthorized access.

Confidentiality, Integrity, and Availability (CIA)

The three core principles of information security

Containerization

Containerization is the idea of containing code and all the necessary frameworks for a program/software into one unit…

Contingency Planning

a strategy involving plans, procedures, and technical measures that enable the recovery of information systems

Control Zone

A control zone is a categorical designation applied to infrastructure . . .

Controlled Unclassified Information (CUI)

Controlled Unclassified Information (CUI) is a category of unclassified data that federal agencies create or possess…

Critical Information Resources

Critical Information Resources include the information technology hardware, software, networks, and services for which the loss, unavailability, or corruption would have a severe impact on the university.

Cryptography

Cryptography is the use of encryption, through ciphers, to protect sensitive or confidential data…

Cyber Threat

A cyber threat is any act or event that could be harmful to an individual, organization, or even a country through…

Cybersecurity Framework

A cybersecurity framework is a set of best practices adopted by an organization to better understand, manage, and reduce cybersecurity risk.

Data Breach

A data breach happens when an unauthorized person or organization acquires,
accesses, or uses confidential information.

Data Classification

The organized categorization of data based on potential harm from unauthorized access, alteration, or destruction.

Data Disposal

Data disposal is the process of removing, “sanitizing,” or deleting stored information.

Data in Transit

Data that is being transferred between locations over a private network or the Internet

Data Integrity

Ensuring the accuracy and reliability of data throughout its lifecycle

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) refers to strategies to ensure sensitive and Protected Data are not exposed, lost, used inappropriately, or accessed without authorization. . .

Data Management Plan

A data management plan (DMP) is a document that specifies the following….

Deep Web/Dark Web

The Deep Web refers to are parts of the internet, or the World Wide Web (www.) that don’t come up with a standard search engine search