Information Security Glossary - S - Z
Glossary – S
Security Control – Means of managing risk, including policies, procedures, guidelines, practises or organisational structures, which can be of administrative, technical, management, or legal nature.
Security Perimeter – A boundary where security controls are enforced.
Software as a Service (SaaS) – Delivering services using the cloud network.
Statement of Applicability (SOA) – A documented statement describing the control objectives and controls that are relevant and applicable to the organisation’s Information Security Management System (ISMS). A key component of an ISMS defined in ISO/IEC 27001:2005.
Glossary – T
Threat – A potential cause of an unwanted incident that may result in harm to a system or organisation.
Two-Factor Authentification – Authentification utilising any 2 different factors form.
Glossary – U
UKAS – United Kingdom Accreditation Service. Responsible for licensing and monitoring the performance of Certification Bodies.
Glossary – V
Virus – Malicious software that both replicates and has a payload.
Vulnerability – A weakness of an asset or control that can be exploited a threat.