Information Security Glossary
Access Control
Access control determines who can view or use information resources (e.g., data, applications, systems, and networks), and in what circumstances.
Access Point
Electronic hardware that acts as a common connection point for devices in a wireless network
Account Owner
In IT, the account owner most likely refers to the individual, organization, or entity with permission to implement changes within the account.
Ad Hoc Review
A risk review conducted outside of the regular assessment schedule
Ad-Hoc Mode
A mode of wireless networking that does not use access points
Advanced Encryption Standard
The Advanced Encryption Standard (AES) is an algorithm that uses a specific encryption procedure to protect…
Advanced Encryption Standard (AES)
A 256-bit encryption standard
Anonymous Data
Anonymous data cannot be traced back to the person or entity that supplied it.
Application
Applications are software designed to perform specific assigned tasks.
Application Idle Timeout
Application Idle Timeout refers to automatic disconnection or logout . . .
Applied Research
Research conducted to gain the knowledge or understanding to meet a specific, recognized need.
Assessment, Authorization, and Monitoring
A family of security controls that enable an organization to periodically assess the security controls effectiveness
Asset
Any hardware, software, system, or data owned, leased, vended, contracted, or operated by the university that is essential to its operations
Assurance Level
The degree of confidence in the identity verification, authentication process, and security measures used to issue and manage digital certificates
Authentication
Authentication is a way of establishing that the user is who they claim to be before granting access to university systems and data.
Authentication Header Protocol (AH)
An IPSec security protocol that can provide integrity protection for packet headers and data through authentication
Authentication Information
Washington University in St. Louis uses a two-factor (or two-step) authentication service provided by Duo…
Authenticator
A system or device that verifies the identity of a user or network element
Authorization
Possessing official permission or being granted/denied approval by an authoritative source (e.g., owner, steward, automated mechanism) to perform an action or set of activities.
Availability
Availability means data are accessible when you need them.
Baseline Configuration
A documented set of specifications for an information system
Basic Research
Research undertaken primarily to acquire new knowledge without any particular application or use in mind.
Biometrics
Biometrics are unique features of individuals, for example, fingerprints, that can identify a
specific person.
Business Associate Agreement (BAA)
A legally binding agreement between a healthcare provider and a third-party vendor that ensures compliance with HIPAA when handling PHI
Certificate Authority (CA)
A trusted entity that issues and manages digital certificates
Certificate Chain
A sequence of certificates, where each certificate in the chain is signed by the next to a trusted root Certificate Authority
Certificate Revocation List (CRL)
A list of digital certificates that have been revoked by the issuing Certificate Authority before their expiration date
Certificate Signing Request (CSR)
A request sent from an applicant to a Certificate Authority to apply for a digital certificate
Chemical Facility Anti-Terrorism Standards (CFATS)
The Department of Homeland Security has issued Chemical Facility Anti-Terrorism Standards for any facility that manufactures, uses, stores, or distributes certain chemicals above a specified quantity.
Cipher Suite
A set of algorithms that define how the cryptographic operations are performed during a secure communication session
Client Software
Software installed on devices to provide authenticated wireless network connections
Client VPN
Offers encrypted network communication locally installed VPN client software
Cloud
Cloud computing uses the internet to deliver computing services such as storage in servers, the provision of software, and conducting analytics.
Compliance
Compliance in cyber security means meeting certain standards and obeying by regulations…
Confidential Data
Confidential information is not subject to legal regulation, but it is not freely available to create, store, and transmit.
Confidentiality, Integrity, and Availability (CIA)
The three core principles of information security
Containerization
Containerization is the idea of containing code and all the necessary frameworks for a program/software into one unit…
Contingency Planning
a strategy involving plans, procedures, and technical measures that enable the recovery of information systems
Control Zone
A control zone is a categorical designation applied to infrastructure . . .
Controlled Unclassified Information (CUI)
Controlled Unclassified Information (CUI) is a category of unclassified data that federal agencies create or possess…
Critical Information Resources
Critical Information Resources include the information technology hardware, software, networks, and services for which the loss, unavailability, or corruption would have a severe impact on the university.
Cryptography
Cryptography is the use of encryption, through ciphers, to protect sensitive or confidential data…
Cyber Threat
A cyber threat is any act or event that could be harmful to an individual, organization, or even a country through…
Cybersecurity Framework
A cybersecurity framework is a set of best practices adopted by an organization to better understand, manage, and reduce cybersecurity risk.
Data Breach
A data breach happens when an unauthorized person or organization acquires,
accesses, or uses confidential information.
Data Classification
The organized categorization of data based on potential harm from unauthorized access, alteration, or destruction.
Data Disposal
Data disposal is the process of removing, “sanitizing,” or deleting stored information.
Data in Transit
Data that is being transferred between locations over a private network or the Internet
Data Integrity
Ensuring the accuracy and reliability of data throughout its lifecycle
Data Loss Prevention (DLP)
Data Loss Prevention (DLP) refers to strategies to ensure sensitive and Protected Data are not exposed, lost, used inappropriately, or accessed without authorization. . .
Data Management Plan
A data management plan (DMP) is a document that specifies the following….
Deep Web/Dark Web
The Deep Web refers to are parts of the internet, or the World Wide Web (www.) that don’t come up with a standard search engine search