DREAD

DREAD: An acronym for Damage, Reproducibility, Exploitability, Affected Users, and Discoverability, DREAD is a risk assessment model used to quantify, compare, and prioritize the risk levels of security vulnerabilities in a system. It helps stakeholders to understand the potential risk of a vulnerability and to make informed decisions about mitigations.

Due Care

Due Care: In the context of cybersecurity and business, due care refers to the level of judgment, attention, and prudence reasonably expected of a person in a particular position when taking actions to protect the interests of an organization and mitigate risks. It is essentially taking reasonable steps to protect a company and its assets […]

Digital Millennium Copyright Act (DMCA)

Digital Millennium Copyright Act (DMCA): A US law enacted in 1998 to address the challenges of copyright management in the digital age. The DMCA implements two 1996 World Intellectual Property Organization (WIPO) treaties and provides a legal framework for copyright holders to control how their content is distributed online. It also limits the liability of […]

Direct Reporting Engagement

Direct Reporting Engagement: Direct Reporting Engagement is a specific type of assessment where an auditor or reviewer directly communicates the results of their evaluation to interested parties without intermediation. The engagement results in a report or statement detailing the auditor’s findings regarding the subject matter under review, which could pertain to financial, operational, or security-related […]

Directive

Directive: A formal instruction, order, or policy issued by an authority. It sets a course of action, procedure, or standard to be followed. Directives can be used to implement and enforce compliance with laws and regulations, and in an organizational context, they might outline specific requirements related to information protection, user behavior, or the use […]

Disclosure Controls and Procedures

Disclosure Controls and Procedures: Policies and procedures implemented by an organization to ensure that important information, particularly financial information, is accurately and timely reported to those who need to know this information. These controls are established to ensure that data is appropriately processed and disclosed to maintain its integrity and confidentiality and to meet compliance […]