Information Security Glossary - S - Z

Glossary – S

Security Control – Means of managing risk, including policies, procedures, guidelines, practises or organisational structures, which can be of administrative, technical, management, or legal nature.

Security Perimeter – A boundary where security controls are enforced. 

Software as a Service (SaaS) – Delivering services using the cloud network. 

Statement of Applicability (SOA) – A documented statement describing the control objectives and controls that are relevant and applicable to the organisation’s Information Security Management System (ISMS). A key component of an ISMS defined in ISO/IEC 27001:2005. 

Glossary – T

Threat – A potential cause of an unwanted incident that may result in harm to a system or organisation. 

Two-Factor Authentification – Authentification utilising any 2 different factors form. 

Glossary – U

UKAS – United Kingdom Accreditation Service. Responsible for licensing and monitoring the performance of Certification Bodies. 

 

Glossary – V

Virus – Malicious software that both replicates and has a payload. 

Vulnerability – A weakness of an asset or control that can be exploited a threat. 

Glossary Index:

 A - C,    D - G,    H - L,    M - P,    Q - R,    S - Z.

ISMS.online is the fast and simple way to ISO 27001 certification

ISMS Online Rating: 5 out of 5
Share This