Countermeasure

Countermeasure: A tactic, procedure, or technique that is applied to prevent, mitigate, or eliminate vulnerabilities, threats, or attacks. This could be a wide range of actions, such as installing a firewall to block unauthorized access, implementing encryption algorithms to secure data, or deploying intrusion detection systems to identify potential security breaches. Countermeasures are crucial for […]

Confidentiality

Confidentiality: A fundamental principle of information security that mandates restricting access to information to authorized users only. It’s about ensuring that sensitive information is not disclosed to unauthorized individuals or entities. Confidentiality measures include the use of passwords, encryption, access control lists, and security policies that define who can access what data and under which […]

Configurable control

Configurable control: A feature or setting within a system or application that can be adjusted to enhance control over the operating environment. This can include anything from user permissions to data access controls, all aimed at managing risk and safeguarding the system or data within it.

Configuration control

Configuration control: A practice aimed at maintaining consistency of a system or component’s performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. It involves processes such as identifying configurations, controlling changes, and ensuring that configurations conform to applicable standards and requirements, thus helping avoid unnecessary modifications and maintaining system […]

Construct a Platform for Risk Analysis of Security Critical Systems (CORAS)

Construct a Platform for Risk Analysis of Security Critical Systems (CORAS): A model-driven method for conducting security risk analysis. CORAS offers a customized language for threat and risk modeling and comes with detailed guidelines explaining each step of the risk analysis process. It includes tools that support the execution of these steps, as well as […]

Consumerization

Consumerization: The influence that consumer-originated technologies and preferences are exerting on broader business and organizational contexts. In many cases, these consumer technologies are being adopted by businesses due to their ease of use, convenience, or innovative features. However, it poses certain challenges in terms of ensuring security and control over business data and processes, as […]