Information Security Glossary - H - L
Glossary – H
Hacker – The name given to a person who accesses computer networks by the backdoor. This can be for malicious intent but is just as likely to be performed by someone that is testing a system and looking for vulnerabilities to be fixed.
Hacking – In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network.
Hashing – Applying a mathematical algorithm to a piece of data in order to disguise it.
Glossary – I
ICO – Information Commissioner’s Office
Identification – The process by which a unique identity is assigned to an entity.
Identity – One or more properties that uniquely identify an entity.
Impact – Adverse change to the level of business objectives achieved.
Incident Management – Incident management is a term describing the activities of an organisation to identify, analyse, and correct hazards to prevent future re-occurrences.
Indicator – A sign that a security incident may be in progress.
Information – Raw data to which interpretation/presentation have been applied to provide context.
Information Assurance – The ability to provide demonstrable evidence that your information governance and security are working effectively to manage the risks to the organisation.
Information Classification – Information should be classified to indicate the need, priorities, and expected degree protection when handling the information.
Information Governance – The management framework ensuring that information security controls align to the requirements of the organisation as determined by legal, regulatory, contractual and internal compliance requirements.
Information Security – The preservation of confidentiality, integrity and availability of information.
Information Security Management System (ISMS) – That part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve Information Security.
Information Security Policy – The high-level, organisational information security policy that gives the overall intention and direction for information security as expressed by management.
InfoSec – Information Security.
Integrity – The property of safeguarding the accuracy and completeness of assets.
International Organisation for Standardisation – Widely known as ISO, is an international standard-setting body composed of representatives from various national standards organisations.
ISMS – Information Security Management System.
ISO 27001 – The gold standard in information security management systems (ISMS). Achieving this accreditation demonstrates that an organisation’s ISMS meets the standard of the International Organisation for Standardisation.
Glossary – J
Jailbreak – This process involves removing the security restrictions of a device, often a mobile phone. This then allows the owner to install unofficial apps and make modifications to the system.
Glossary – K
Keyboard Logger – A virus that records the keystrokes performed by the user in order to obtain bank card details.
Key – The numerical value used to control the cryptographic operations.
Glossary – L
Logging – The process of recording events, with a computer program usually an application software in a certain scope in order to provide an audit trail that can be used to understand the activity of the system and to diagnose problems.
Logic Bomb – A logic bomb is a piece of code that gets inserted into a system and contains a set of secret instructions. When a particular action is carried out, this triggers the code to perform a malicious action, like the deletion of files.