Search

1 to 10 of 20
Sort by

Glossary
Firewall

A network security system, often an appliance, which allows or denies incoming and outgoing traffic according to predetermined rules. #RiskManagement #Infrastructure #SecurityManagement


Glossary
Infosec

Abbreviation for Information Security . See Security Management . #RiskManagement #SecurityManagement #ITSM


Glossary
Vulnerability

A weakness that could be exploited by a threat (e.g., an open firewall port or password that is never changed). A missing control is also considered to be a vulnerability. #SecurityManagement #RiskManagement #Technology


Glossary
Threat

Anything that might exploit vulnerability. Any potential cause of an incident can be considered a threat. For example, a fire is a threat that could exploit the vulnerability of flammable floor coverings. This term is commonly used in information security management and IT service continuity...


Glossary
International Standards Organization (ISO)

The international organization that develops standards and is best known for developing OSI, the Open Systems Interconnection reference model. Also known as the International Organization for Standardization, it is a non-governmental organization based in Geneva, Switzerland, with 162 national...


Glossary
Risk Assessment

The initial steps of risk management ; involves analyzing the value of assets to the business, identifying threats to those assets, and evaluating how vulnerable each asset is to those threats. #ITSM #ReleaseManagement #SecurityManagement #RiskManagement #BusinessContinuity ...


Glossary
Risk Management

The process responsible for identifying, assessing, and managing risks. Risk management can be quantitative (based on numerical data) or qualitative.assessments of uncertainty. #ITSM #ReleaseManagement #ITIL #RiskManagement #SecurityManagement #BusinessAlignment #BusinessContinuity


Glossary
Risk

The possibility of suffering harm or loss. In quantitative risk management this is calculated as how likely it is that a specific threat will exploit a particular vulnerability. #RiskManagement #BusinessContinuity #BusinessContinuityPlan #ITSM #BusinessIntelligence #BusinessAlignment


Glossary
Recovery Time Objective

The maximum time allowed for recovery of an IT service following an interruption. The service level to be provided may be less than normal service level targets. Recovery time objectives for each IT service should be negotiated, agreed upon, and documented. #Practices ...


Glossary
Release Unit

The level or complexity at which software of a given type, or a particular software item, is normally released into the test and life environments; for example, a full system, a suite, a program, or a single module. #BusinessContinuity #ReleaseManagement #ITSM #RiskManagement ...