A
B
C
D
E
100

An attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuals or systems

Confidentiality 

100

A set of information that could uniquely identify an individual

Personally Identifiable Information (PII)

100

A graphical representation of the architectural approach widely used in computer and information security

McCumber Cube

100

An attack that makes use of malware that is not yet known by the anti-malware software companies

Zero-day attack

100

A legal requirement to make compensation or payment resulting from a loss or injury

Restitution

200

A hacker of limited skill who uses expertly written software to attack a system

Script kiddie

200

A form of social engineering, typically conducted via e-mail, in which an organization or some third party indicates that the recipient is due an exorbitant amount of money and needs only a small advance fee or personal banking information to facilitate the transfer

Advance-fee fraud

200

An adverse event that could result in loss of an information asset or assets, but does not currently threaten the viability of the entire organization

Incident

200

A component of policy or law that defines an expected end date for its applicability

Sunset clause

200

A virus that is capable of installing itself in a computer’s operating system, starting when the computer is activated, and residing in the system’s memory even after the host application is terminated

Memory-resident virus

300

The group of senior managers and project members organized to conduct and lead all CP efforts

Contingency Planning Management Team

300

An organizational policy that specifies employees must inspect their work areas and ensure that all classified information, documents, and materials are secured at the end of every workday

Clean Desk Policy

300

The affirmation or guarantee of the confidentiality, integrity, and availability of information in storage, processing, and transmission

Information Assurance

300

The point in time prior to a disruption or system outage to which mission/business process data can be recovered after an outage

Recovery Point Objective 

300

An authentication card that contains digital user data, such as a personal identification number (PIN), against which user input is compared

Dumb Card

400

An attribute of information that describes how data is whole, complete, and uncorrupted.

Integrity

400

An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it

Attack

400

The amount of effort (expressed as elapsed time) necessary to make the business function operational after the technology element is recovered

Word Recovery Time

400

Specifications of authorization that govern the rights and privileges of users to a particular information asset

Access Control List

400

In a cost-benefit analysis, the expected percentage of loss that would occur from a particular attack

Exposure Factor

500

In information security, a combination of hardware and software that filters or prevents specific information from moving between the outside network and the inside network

Firewall

500

An assessment of which controls can and cannot occur based on the consensus and relationships among communities of interest

Political Feasibility 
500

Within TCB, a conceptual piece of the system that manages access controls

Reference Monitor

500

A systems-specific security policy that expresses management’s intent for the acquisition, implementation, configuration, and management of a particular technology, written from a business perspective

Managerial Guidance SysSP

500

A private, secure network operated over a public and insecure network

VPN