Information Security Glossary - H - L

Glossary – H

Hacker – The name given to a person who accesses computer networks by the backdoor. This can be for malicious intent but is just as likely to be performed by someone that is testing a system and looking for vulnerabilities to be fixed. 

Hacking – In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

Hashing – Applying a mathematical algorithm to a piece of data in order to disguise it. 

Glossary – I

ICO – Information Commissioner’s Office

Identification – The process by which a unique identity is assigned to an entity.

Identity – One or more properties that uniquely identify an entity. 

Impact – Adverse change to the level of business objectives achieved. 

Incident Management – Incident management is a term describing the activities of an organisation to identify, analyse, and correct hazards to prevent future re-occurrences. 

Indicator – A sign that a security incident may be in progress. 

Information – Raw data to which interpretation/presentation have been applied to provide context. 

Information Assurance – The ability to provide demonstrable evidence that your information governance and security are working effectively to manage the risks to the organisation. 

Information Classification – Information should be classified to indicate the need, priorities, and expected degree protection when handling the information. 

Information Governance – The management framework ensuring that information security controls align to the requirements of the organisation as determined by legal, regulatory, contractual and internal compliance requirements.

Information Security – The preservation of confidentiality, integrity and availability of information.

Information Security Management System (ISMS) – That part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve Information Security. 

Information Security Policy – The high-level, organisational information security policy that gives the overall intention and direction for information security as expressed by management. 

InfoSec – Information Security.

Integrity – The property of safeguarding the accuracy and completeness of assets.

International Organisation for Standardisation – Widely known as ISO, is an international standard-setting body composed of representatives from various national standards organisations. 

ISMS – Information Security Management System. 

ISO 27001 – The gold standard in information security management systems (ISMS). Achieving this accreditation demonstrates that an organisation’s ISMS meets the standard of the International Organisation for Standardisation. 

Glossary – J

Jailbreak – This process involves removing the security restrictions of a device, often a mobile phone. This then allows the owner to install unofficial apps and make modifications to the system. 

Glossary – K

Keyboard Logger – A virus that records the keystrokes performed by the user in order to obtain bank card details. 

 Key – The numerical value used to control the cryptographic operations. 

Glossary – L

Logging – The process of recording events, with a computer program usually an application software in a certain scope in order to provide an audit trail that can be used to understand the activity of the system and to diagnose problems. 

Logic Bomb – A logic bomb is a piece of code that gets inserted into a system and contains a set of secret instructions. When a particular action is carried out, this triggers the code to perform a malicious action, like the deletion of files. 

Glossary Index:

 A - C,    D - G,    H - L,    M - P,    Q - R,    S - Z.

ISMS.online is the fast and simple way to ISO 27001 certification

ISMS Online Rating: 5 out of 5
Share This