Threat: any danger posed by someone or something to your data or systems
Threat Actor: an entity that takes advantage of a vulnerability to exploit your data or systems
Exposure: anything that exposes your data or systems to damage from a threat actor
Vulnerability: a weakness in data or systems that could be exploited by a threat actor
Countermeasure: something that mitigates a risk to data or systems by eliminating the vulnerability or reducing the risk of it being exploited by a threat actor
Risk: the chances of a threat actor taking advantage of a vulnerability to do damage
Risk Reduction: applying countermeasures to reduce a risk despite not fully eliminating it
Residual Risk: the risk that is left over after applying a countermeasure
Assurance: confidence that security components are protecting assets against threats
Confidentiality: protection of data from unauthorized exposure
Integrity: protection of data from unauthorized tampering or modification
Availability: ability of systems to perform consistently and quickly recover from incidents
Event: an observable occurrence within a system that may indicate a security incident
Incident: a confirmed instance of a cybersecurity violation
Risk Management: the process of identifying, analyzing, prioritizing, and addressing risks
Risk Analysis: the process of identifying risks and determining their potential impact on your organization and their potential mitigations
Baseline: something that serves as an example of the expected level of security, performance, or behavior within a system
Anomaly: an occurrence within a network or system that deviates from what is expected
Security Policy: outlines expectations and goals regarding the role of security in a business system, process, or asset
Regulation: certain standards and behaviors that are set by an authorizing body and enforced by law
Standard: established guidelines on how security should be applied to assets and resources
Guidelines: recommended actions on how security is to be applied to assets and resources
Procedures: step-by-step tasks to be performed to adhere to security goals
User: an individual who uses data to perform tasks/workflows
Client: anything that consumes a service and uses said service to perform tasks/workflows
Server: a system that dedicates its resources to providing a technical service to clients
Access Controls: regulate how users interact with systems and utilize the resources provided
Subject: an active person, process, or program that requests access to a resource
Access: information flow between the subject and the object
Object: a passive resource containing information with the expectation that subjects will access it
Identification: verifying that a subject is who they claim to be via credentials
Authentication: a method of validating the legitimacy of credentials provided during identification
Authorization: determining the resources that an authenticated subject is allowed to access and what level of access they should be granted
Accountability: tracking, monitoring, and logging a subject's use of resources to ensure they are utilized properly and that the subject is reprimanded if necessary
Audit: reviewing activities to ensure they comply with pre-determined regulations, standards, policies, or guidelines
Identity: attributes/characteristics that uniquely recognize a subject
Encryption: the act of transforming intelligible data into unintelligible data to prevent exposure to all entities except the intended, validated entity
Password: a sequence of characters that authenticates a subject to an object
Right: the ability of a user to perform an action as designated by a higher authority
Privilege: a special action a user is allowed to perform as determined by their role
Role: a job assignment or function assigned to a user that determines their access rights
Group: an organized collection of users that share the same roles or have the same access rights
Need-To-Know: granting users only the minimum knowledge they need to effectively do their job
