Lexicon

At PolicyWizard, the words we use are important. Misunderstandings cause confusion and cost money and time. Please use this lexicon to help with your understanding.

Lexicon

The meaning of the words we use.

Accounting

The act of accounting for actions and events (see logging).

Administrative Controls

Security controls enforced using administrative procedures (e.g., the Human Resources disciplinary procedure).

Annual Rate of Occurrence

The number of expected annual losses.

Annualised Loss Expectancy

The calculation used to determine the expected cost of annual losses due to a single event type.

Asset

The device, intellectual property, process, or system that has value to the organisation

Asset Register

A log of all assets.

Asset Value

The asset's value to the business, threat actor, or stakeholder.

Audit

Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures.

Authentication

Validating the authenticity of something or someone.

Authorisation

The power or right to give orders or make decisions.

Availability

Present and ready for use; at hand; accessible.

Compliance

The act of complying with a wish, request, or demand; acquiescence.

Confidentiality

The state or attribute of being secret; privacy.

Consequence/Impact

The possible adverse effect of a security risk.

Control(s)

To exercise an authoritative or dominating influence over someone or something (e.g., implementing security controls to reduce the potential for adverse consequences of an event).

Countermeasure

A measure or action taken to counter or offset another one.

Corrective Controls

A type of security control (countermeasure) used to contain unapproved actions or behaviours.

Cyber Security/Cybersecurity

A buzzword is used to describe the act of protecting information technology (IT).

Detective Controls

A type of security control used to identify unwanted actions.

Exposure Factor

The cost of one incident or loss event.

Governance

The way that organizations or countries are managed at the highest level, and the systems for doing this.

Human Risk

The potential adverse effects of human interaction with information systems and business operations.

Human Risk Management

The art of safeguarding operating conditions and procedures to reduce the potential for adverse effects of human interaction with information systems and business operations.

Incompetence

The quality or state of being incompetent (e.g., a lack of physical, intellectual, or moral ability/lack of qualifications or training (for a particular task)/insufficiency/inadequacy).

Information

Facts provided or learned about something or someone

Information Security

The act of protecting information in all forms (e.g., digital and physical).

Information Security Management System (ISMS)

An organised set of principles and procedures to control information and reduce anxiety about its protection.

Insecure

The feeling or effect of a lack of protection or the presence of an exploitable vulnerability.

Insider Threat

Someone internal to the organisation acting against it or acting in their own self-interest to defraud the organisation of money or future revenue.

Integrity

Steadfast adherence to a strict moral or ethical code.

Least privilege

The principle is that a security architecture is designed to grant each entity the minimum system resources and authorisations needed to perform its function.

Legal Risk

Risks with potential legal or regulatory consequences.

Likelihood/Probability

The extent to which something is likely to happen.

Logging

The act of keeping a log of events in a computer system, such as problems, errors or just information on current operations.

Malware

A malicious code that carries out unauthorised and potentially harmful actions on a computer system.

Management

The process of dealing with or controlling things or people.

Managerial Controls

Security controls enforced using managerial procedures (e.g., the access management procedure).

Mitigating Controls

A type of security control used to reduce the consequences (impact) of unapproved actions or behaviours.

Monte Carlo Simulation

A type of calculation used in the security risk quantification assessments.

Negligence

The state or quality of being negligent (e.g., a negligent act or a failure to act).

Non-repudiation

A service that is used to provide assurance of the integrity and origin of data in such a way that the integrity and origin can be verified and validated by a third party as having originated from a specific entity in possession of the private key (i.e., the signatory).

Operational Risk

A potential impact on information system availability, resulting in contract and customer satisfaction problems.

Opportunity Risk

The potential positive effect of an uncertain outcome.

Policy

A set of ideas or a plan of what to do in particular situations that has been agreed to officially by a group of people, a business organisation, a government, or a political party.

Policy Enforcement

The act of enforcing the implementation of security policies using administrative and managerial security controls.

Possibility

The fact or state of being possible.

Preventative Controls

A type of safeguard (security control) used to prevent unwanted actions.

Privacy

The quality or condition of being secluded from the presence or view of others.

Probability/Likelihood

The extent to which something is likely to happen.

Protection

The action or effect of protecting or securing someone or something.

Pure Risk

The potential adverse effect of an uncertain outcome.

Qualitative Risk Assessment

A method of calculating risk with an output on an ordinal scale (e.g., critical, high, medium, and low).

Quantitative Risk Assessment

A method of calculating risk with a quantitative output (e.g., a percentage chance).

Risk

The effect of uncertainty on objectives.

Risk Appetite

The amount of risk the organisation is willing to accept accountability for (e.g., the cost they are willing to pay if a potential adverse event happens).

Risk Assessment

A repeatable method of assessing security risks.

Risk Decisions

A decision on how to address or mitigate a security risk.

Risk Exception/Tolerance

The amount of risk the organisation is willing to accept accountability for (e.g., the cost they are willing to pay if a potential adverse event happens) in exceptional circumstances (e.g., the potential income from an opportunity risk outweighs the potential cost of the pure risk).

Risk Management

The art of assessing, controlling, and understanding events that may have a potentially damaging impact on an organisation’s normal operations.

Risk Register

A log of all risks.

Risk Scenario

An analysis of a potential adverse security risk scenario.

Safeguard

Something that protects against attack, loss, or injury as a precautionary measure.

Security

The feeling of comfort and safety (e.g., without anxiety or free from care) in the activity or location.

Security Awareness

The act of sharing educational content to impart security knowledge throughout an organisation using all forms of communication.

Security Policy

A security policy is an agreed set of rules relating to the organisation’s security requirements.

Security Risk

A security risk is an adverse event that is possible because the conditions of our environment allow for the action to happen.

Segregation of Duties

The separation of duties ensures one person can not interfere with or complete a critical function as an individual.

Single Loss Expectancy

The expected cost of a single loss event.

System

A set of principles or procedures according to which something is done; an organised scheme or method.

Technical Controls

Security controls enforced using technical measures (e.g., access control using an Identity and Access Management (IAM) solution).

Threat

The behaviour or force applied to an asset that has the potential to cause harm.

Threat Actor

The person responsible for the unwanted behaviour

Vulnerability

An exploitable weakness within a device, process, security control, or system.