Professional Documents
Culture Documents
CISM Glossary
1. Acceptable interruption window (AIW) - The maximum period of time that a system
can be unavailable before compromising the achievement of the organization’s business
objectives
2. Administrative control - The rules, procedures, and practices dealing with operational
effectiveness, efficiency, and adherence to regulations and management policies
3. Annual loss expectancy (ALE) - The total expected loss divided by the number of
years in the forecast period yielding the average annual loss
4. Architecture - Description of the fundamental underlying design of the components of
the business system, or of one element of the business system (e.g., technology), the
relationships among them, and the manner in which they support the organization’s
objectives
5. Authentication - The act of verifying the identity (i.e., user, system)
6. Authorization - Access privileges granted to a user, program, or process, of the act of
granting those privileges
7. Bit copy - Provides an exact image of the original and is a requirement for legally
justifiable forensics
8. Business case - Documentation of the rationale for making a business investment, used
both to support a business decision on whether to proceed with the investment and as
an operational tool to support management of the investment through its full economic
life cycle
9. Business continuity plan - A plan used by an organization to respond to disruption of
critical business processes. Depends on the contingency plan for restoration of critical
systems
10. Business impact analysis (BIA) - Evaluating the criticality and sensitivity of information
assets. An exercise that determines the impact of losing the support of any resource to
an organization, establishes the escalation of that loss over time, identifies the minimum
resources needed to recover, and prioritizes the recovery of processes and supporting
systems.this process also includes addressing: income loss, unexpected expense, legal
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
20. Data classification - The assignment of a level of sensitivity to data (or information) that
results in the specification of controls for each level of classification. Levels of sensitivity
of data are assigned according to predefined categories as data are created, amended,
enhanced, stored, or transmitted. The classification level is an indication of the value or
importance of the data to the organization.
21. Data custodian - The individual(s) and/or department(s) responsible for the storage and
safeguarding of computerized data
22. Data owner - The individual(s), normally a manager or director, who has responsibility
for the integrity, accurate reporting and use of computerized data
23. Defense in depth - The practice of layering defenses to provide added protection.
Defense in depth increases security by raising the effort needed in an attack. This
strategy places multiple barriers between an attacker and an organization’s computing
and information resources.
24. Disaster recovery plan (DRP) - A set of human, physical, technical, and procedural
resources to recover, within a defined time and cost, an activity interrupted by an
emergency or disaster
25. Discretionary access control (DAC) - A means of restricting access to objects based
on the identity of subjects and/or groups to which they belong. The controls are
discretionary in the sense that a subject with a certain access permission is capable of
passing that permission (perhaps indirectly) on to any other subject.
26. Dual control - A procedure that uses two or more entities (usually persons) operating in
concert to protect a system resource so that no single entity acting alone can access that
resource
27. Due care - The level of care expected from a reasonable person of similar competency
under similar conditions
28. Due diligence - The performance of those actions that are generally regarded as
prudent, responsible, and necessary to conduct a thorough and objective investigation,
review, and/or analysis
29. Enterprise governance - A set of responsibilities and practices exercised by the board
and executive management with the goal of providing strategic direction, ensuring that
objectives are achieved, ascertaining that risks are managed appropriately, and verifying
that the enterprise’s resources are used responsibly
30. Exposure - The potential loss to an area due to the occurrence of an adverse event
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
42. Least privilege - The principle of allowing users or applications the least amount of
permissions necessary to perform their intended function
43. Mandatory access control (MAC) - A means of restricting access to data based on
varying degrees of security requirements for information contained in the objects and the
corresponding security clearance of users or programs acting on their behalf
44. Maximum tolerable outage (MTO) - Maximum time the organization can support
processing in alternate mode
45. Policy - Overall intention and direction as formally expressed by management
46. Procedure - A document containing a detailed description of the steps necessary to
perform specific operations in conformance with applicable standards. Procedures are
defined as part of processes.
47. Residual risk - The remaining risk after management has implemented risk response
48. Return on investment (ROI) - A measure of operating performance and efficiency,
computed in its simplest form by dividing net income by the total investment over the
period being considered
49. Return on security investment (ROSI) - An estimate of return on security investment
based on how much will be saved by reduced losses divided by the investment
50. Risk - The combination of the probability of an event and its consequence. (ISO/IEC 73).
Risk has traditionally been expressed as Threats x Vulnerabilities = Risk
51. Risk analysis - The initial steps of risk management: analyzing the value of assets to
the business, identifying threats to those assets, and evaluating how vulnerable each
asset is to those threats. It often involves an evaluation of the probability frequency of a
particular event, as well as the probable impact of that event.
52. Risk appetite - The amount of risk, on a broad level, that an entity is willing to accept in
pursuit of its mission
53. Risk assessment - A process used to identify and evaluate risk and potential effects.
Risk assessment includes assessing the critical functions necessary for an organization
to continue business operations, defining the controls in place to reduce organization
exposure, and evaluating the cost for such control. Risk analysis often involves an
evaluation of the probabilities of a particular event.
54. Risk avoidance - The process for systematically avoiding risk, constituting one
approach to managing risk
55. Risk mitigation - The management and reduction of risk through the use of
countermeasures and controls
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5
56. Risk tolerance - The acceptable level of variation that management is willing to allow for
any particular risk while pursuing its objective
57. Risk transfer - The process of assigning risk to another organization, usually through
the purchase of an insurance policy or outsourcing the service
58. Role-based access control - Assigns users to job functions or titles. Each job function
or title defines a specific authorization level.
59. Segregation/Separation of duties (SoD) - A basic internal control that prevents or
detects errors and irregularities by assigning to separate individuals the responsibility for
initiating and recording transactions and for the custody of assets.
Segregation/separation of duties is commonly used in large IT organizations so that no
single person is in a position to introduce fraudulent or malicious code without detection.
60. Sensitivity - A measure of the impact that improper disclosure of information may have
on an organization
61. Service delivery objective (SDO) - Directly related to business needs, SDO is the level
of services to be reached during the alternate process mode until the normal situation is
restored.
62. Service level agreement (SLA) - An agreement, preferably documented, between a
service provider and the customer(s)/user(s) that defines minimum performance target
for a service and how they will be measured
63. Split knowledge/split key - A security technique in which two or more entities
separately hold data items that individually convey no knowledge of the information that
results from combining the items; a condition under which two or more entities
separately have key components that individually convey no knowledge of the plaintext
key that will be produced when the key components are combined in the cryptographic
module
64. Standard - A mandatory requirement, code of practice, or specification approved by a
recognized external standards organization, such as International Organization for
Standardization (ISO)
65. System owner - Person or organization having responsibility for the development,
procurement, integration, modification, operation, and maintenance, and/or final
disposition of an information system
66. Threat - Anything (e.g., object, substance, human) that is capable of acting against an
asset in a manner that can result in harm. A potential cause of unwanted incident.
(ISO/IEC 13335)
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
6
67. Threat agent - Methods and things used to exploit a vulnerability. Examples include
determination, capability, motive, and resources
68. Threat analysis - An evaluation of the type, scope, and nature of events of actions that
can result in adverse consequences; identification of the threats that exist against
information assets. The threat analysis usually also defines the level of threat and the
likelihood of it materializing.
69. Threat assessment - The identification of types of threats to which an organization
might be exposed
70. Threat event - Any event where a threat element/actor acts against an asset in a
manner that has the potential to directly result in harm
71. Threat model - Used to describe a given threat and the harm it could do to a system if it
has a vulnerability
72. Threat vector - The method a threat uses to exploit the target
73. Total cost of ownership (TCO)- Includes the original cost of the computer plus the cost
of: software, hardware, and software upgrades, maintenance, technical support, training,
and certain activities performed by users
74. Vulnerability - A weakness in the design, implementation, operation, or internal controls
in a process that could be exploited to violate system security
75. Vulnerability analysis - A process of identifying and classifying vulnerabilities
Will Carlson, Teaching Assistant
CISM Review Manual (15th Edition). (2015). Schaumburg, IL: ISACA.
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
7