A
C
- Capability-based Security
- Ciphertext
- Cloud Computing
- Cloud Computing Security
- Competence
- Computer Attack
- Computer Crime
- Computer Security Incident Management
- Computer Virus
- Confidentiality
- Conformity
- Consequences
- Continual Improvement
- Control
- Correction
- Corrective Action
- Cryptography
- Cyber Attack
- Cyber Security – A Glossary of Terms
- Cybersecurity Audit
D
E
G
I
- ICO
- Identification
- Identity
- Identity Fraud
- Impact
- Impact assessment
- Incident Management
- Indicator
- Indicator
- Information
- Information Assurance
- Information Classification
- Information Commissioner
- Information Commissioner’s Office
- Information Governance
- Information Need
- Information Privacy
- Information Processing
- Information Processing Facilities
- Information Security
- Information Security Continuity
- Information Security Event
- Information Security Incident
- Information Security Incident Management
- Information Security Policy
- Information Sensitivity
- Information Sharing Community
- Information System
- Information Technology (IT)
- InfoSec
- Integrity
- Interested Party
- Internal Context
- International Association for Contract and Commercial Management
- International Multilateral Partnership Against Cyber Threats
- International Organisation for Standardisation
- ISO 13485
- ISO 27001
- ISO/IEC 27001:2005
M
N
P
R
- Ransomware
- Reliability
- Residual Risk
- Resilience
- Return on Investment
- Review
- Review Objective
- Risk
- Risk Acceptance
- Risk Analysis
- Risk Appetite
- Risk Assessment
- Risk Avoidance
- Risk Communication and Consultation
- Risk Criteria
- Risk Evaluation
- Risk Identification
- Risk Management
- Risk Monitoring
- Risk Ownership
- Risk Reduction
- Risk Treatment