Term
|
Definition
| A process of tracking problems reported to an informatin technology help desk. |
|
|
Term
|
Definition
| The administration of the configuration of the components of a system. |
|
|
Term
|
Definition
| The administration of changes in strategy, operations, or components of the information security program. |
|
|
Term
|
Definition
| A method for organizations to internally charge their departments for system use. |
|
|
Term
|
Definition
| A process of reviewing the use of a system, not to check performance but rather to determine if misuse or malfeasance has occured. |
|
|
Term
|
Definition
| An expected level of system performance against which all subsequent levels of performance are compared. |
|
|
Term
| External Monitoring Domain |
|
Definition
| The sector of a maintenance model that provides early awareness of new and emerging threats, threat agents, vulnerabilities, and attacks that the organization needs in order to mount an effective and timely defense. |
|
|
Term
| Internal Monitoring Domain |
|
Definition
| the sector of a maintinence model whose primary goal is to maintain an informed awarness of the state fo allof the organizations networks, information systems, and information security defenses. |
|
|
Term
|
Definition
| A procedure that compares the current state of a network segment (the systems and services it offers) against a known previous state of that same network segmant (the baseline of systems and services.) |
|
|
Term
| Planning and Risk Assessment Domain |
|
Definition
| The domain of the secuirty maintenance model concerned with keeping a lookout on the entire information security program by identifying and planning organization information security activities that furthr reduce risk. |
|
|
Term
|
Definition
| The process of identifying and documenting spcific and provable flaws in the organization's information asset enviorment. |
|
|