GRC
Modeling
Infrastructure
IAM
SecOps
Application Security
100

A suitable level of risk commensurate with the potential benefits as determined by senior management.

What is acceptable risk?

100

A documented, lowest level of security configuration allowed by a standard or organization.

What is a baseline?

100

Not identical on both sides.  In cryptography, key pairs are used, one to encrypt, the other to decrypt.

What is asymmetric?

100

Testing of the functionality of software; also known as black box testing.

What is dynamic testing?

100

Actions, processes, and tools for ensuring an organization can continue critical operations during a contingency.

What is Business Continuity?

100

Formal review of software to ensure that all security controls were built into the software as designed, also know as certification.

What is assessment?

200

Safeguards and countermeasures commensurate with the level of risk

What are adequate controls?

200

Model where all processing is performed at a central location.

What is centralized architecture?

200

A cryptographic operation that works on data arranged in blocks.

What is a block mode cipher?

200

A set of rules, defined by the resource owner, for managing access to a resource and for what purpose.

What is entitlement?

200

The process of jointly addressing business resiliency and restoration of critical infrastructure and functionality after a disruption.

What is Business Continuity and Disaster Recovery (BCDR)?

200

Formal management acceptance of risk and approval for software to be placed into production based on certain operating conditions; also known as accreditation.

What is systems authorization?

300

Ensuring timely and reliable access to and use of information by authorized users.

What is availability?

300

Model where processing can be done at many different connected locations.

What is distributed architecture?

300

A formal statement of ownership of a public encryption key.

What is a certificate?

300

Management of Identities throughout the identity management lifecycle.

What is Identity and Access Management (IAM)?

300

A list of the organization's assets, annotated to reflect the criticality of each asset to the organization.

What is Business Impact Analysis (BIA)?

300

A tool to help ensure that the project's scope, requirements, and deliverables remain “as is ” when compared to the baseline.

What is a Requirements Traceability Matrix (RTM)?

400

Adherence to a mandate; both the actions demonstrating adherence and the tools, processes, and documentation that are used in adherence.

What is compliance?

400

A firewall or other device sitting at the edge of a network to regulate traffic and enforce rules.

What is a gateway device?

400

A packaged software unit.

What are containers?

400

Accounts on a system with higher levels of permissions.

What are privileged accounts?

400

A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.

What is a Computer Security Incident?

400

A specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service.

What is a Web Application Firewall (WAF)?

500

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.

What is confidentiality?

500

A process by which developers can understand security threats to a system, determine risks from those threats, and establish appropriate mitigations.

What is threat modeling?

500

The action of changing a message into another format through the use of a code.

What is encoding?

500

A way to verify ownership of an identity.

What is Proof of Possession?

500

The ability to provide IT services following an interruption, often at an alternate location.

What is Disaster Recovery?

500

An online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security.  

What is The Open Worldwide Application Security Project (OWASP)?

M
e
n
u