Top-level management

Top-level management: The highest level of decision-makers within an organization. These individuals are responsible for creating strategies, plans, and policies to guide the organization, which includes setting security priorities, determining risk appetite, and allocating resources toward the protection and preservation of the organization’s resources and systems. Their buy-in and active involvement are essential for effective […]

The Australian Privacy Act of 1988

The Australian Privacy Act of 1988: A law that regulates the handling of personal information about individuals. This includes the collection, use, storage, and disclosure of personal information and access to and correction of that information. It includes thirteen Australian Privacy Principles that outline standards, rights, and obligations around these processes and applies to most […]

System security plan

System security plan: A comprehensive document that outlines the policies, procedures, and controls established to safeguard a computer system from potential security threats. It encompasses details such as access controls, data backup strategies, and incident response plans, aligning with organizational IT policies and procedures.

Tailoring

Tailoring: The process of customizing or adapting a security solution or standard to fit the specific needs and requirements of an organization. It is used in various industries, including information technology, healthcare, and finance, to ensure that security measures align with the unique risks and challenges faced by the organization. Examples include tailoring a security […]

Tangible asset

Tangible asset: A physical property or item that has value and can be owned or controlled by an individual or organization. It is a common term in accounting and finance, where tangible assets are used to assess the value and performance of a company. Examples include buildings, equipment, machinery, and inventory.

Technology infrastructure plan

Technology infrastructure plan: A document that outlines the design, implementation, and maintenance of an organization’s technology infrastructure. It is used to align technology investments with business goals and to ensure the availability, performance, and security of the infrastructure. Examples include plans for deploying new servers, upgrading network components, and implementing disaster recovery procedures.