{tableName=glossary, name=Cloud Infrastructure, description=
Cloud Infrastructure is a type of computing infrastructure that provides shared computer processing resources and data to computers and other devices on demand over the internet. It is typically composed of a combination of hardware and software components, such as servers, storage, networks, and applications. Cloud Infrastructure allows users to access their data and applications from any device, anywhere in the world, with minimal setup and maintenance. It is designed to be highly scalable and cost-effective, allowing businesses to quickly and easily expand their computing resources as needed. Cloud Infrastructure also provides enhanced security, reliability, and performance, making it a popular choice for businesses of all sizes., topic=null, hs_path=cloud-infrastructure}--
{tableName=glossary, name=Fraud Management, description=
Fraud Management is the process of identifying, preventing, and responding to fraudulent activities. It involves creating and implementing policies and procedures to detect and prevent fraudulent activities, such as identity theft, credit card fraud, and money laundering. It also involves developing strategies to respond to any fraudulent activity that is detected. Fraud Management requires a comprehensive approach that includes monitoring, analyzing, and responding to any suspicious activity. It also requires companies to have effective internal controls and to ensure that their employees are aware of the potential for fraud and how to detect and prevent it. Additionally, Fraud Management requires companies to stay abreast of changes in the industry and to adjust their policies and procedures accordingly., topic=null, hs_path=fraud-management}--
{tableName=glossary, name=ISO/IEC Internal Audit, description=
ISO/IEC Internal Audit is a systematic and independent assessment of an organization's quality management system, processes, and activities, to determine whether the organization is meeting its objectives and conforming to applicable standards and regulations. It includes a review of the organization's policies, procedures, and processes, and an assessment of the effectiveness of the organization's quality management system. It also includes an evaluation of the organization's internal control systems, risk management processes, and the accuracy and completeness of the organization's records. The internal audit process is designed to identify areas of non-conformance, areas of improvement, and to provide recommendations for corrective action. The objective of ISO/IEC Internal Audit is to ensure that the organization has effective quality management systems in place that meet its objectives and comply with applicable standards and regulations., topic=null, hs_path=iso-iec-internal-audit}--
{tableName=glossary, name=ISO/IEC 27001 Password Policy, description=
ISO/IEC 27001 Password Policy is a set of guidelines and requirements for the creation and maintenance of user passwords in order to protect the confidentiality, integrity, and availability of information systems and data. It is designed to ensure that user passwords are kept secure and are not easily guessed, cracked, or broken. The policy outlines the requirements for password length, complexity, and expiration, as well as the frequency of password changes and the process for resetting forgotten passwords. It also outlines the requirements for password storage and transmission, such as encryption and secure protocols, as well as the requirements for user education and awareness. Furthermore, the policy outlines the requirements for the logging and monitoring of user access and the enforcement of the password policy., topic=[{id=97620570500, createdAt=1673040885276, updatedAt=1716010651854, path='iso-27001', name='
ISO 27001 Guide: A Comprehensive Guide', 1='{type=string, value=ISO 27001}', 2='{type=string, value=This guide provides a comprehensive overview of the ISO 27001 standard, including the requirements, implementation, and certification. Learn how to ensure your organization's information security is up to date and compliant.}', 5='{type=string, value=
This guide provides an authoritative and detailed overview of the ISO/IEC 27001 standard, which defines the requirements for an Information Security Management Systems (ISMS) associated with information security, cybersecurity and privacy protection.
Learn about the purpose and scope of the standard, the key requirements for an ISMS, how to implement and maintain an ISMS, how to establish an effective security risk management program, how to develop and implement security policies, how to implement controls to protect information and services and how to audit and review systems to ensure they meet the requirements of the standard.
This guide is an essential resource for anyone looking to understand and implement ISO 27001.
}', 15='{type=list, value=[{id=97620570500, name='ISO 27001'}]}'}], hs_path=iso-iec-27001-password-policy}--
{tableName=glossary, name=Attribute-Based Access Control (ABAC), description=
Attribute-Based Access Control (ABAC) is an access control system that uses a set of attributes to determine the access privileges of a user. It is a policy-based access control model that is based on the evaluation of attributes associated with a user, the resource being requested, and the environment. ABAC provides a flexible and powerful way to control access to resources, enabling administrators to easily create and manage access control policies. It is an alternative to traditional access control models such as role-based access control (RBAC) and discretionary access control (DAC). ABAC is based on the idea that users should be granted access to resources based on their attributes, rather than their roles or identity. Attributes can include things such as user’s age, location, and job title. The access control decision is made by evaluating the user’s attributes against the attributes of the resource being requested. ABAC is often used in conjunction with other access control models, such as RBAC and DAC, to provide a more comprehensive and secure access control system., topic=null, hs_path=attribute-based-access-control-abac}--
{tableName=glossary, name=ISO/IEC 27001 Annex A Controls, description=
ISO/IEC 27001 Annex A Controls are a set of 114 security controls and associated guidance that can be used to help organizations protect their information assets. These controls are divided into 14 categories, including Access Control, Cryptography, Personnel Security, Physical and Environmental Security, System and Communications Protection, System and Information Integrity, and Organization of Information Security. Each control is accompanied by a detailed description and implementation guidance. The controls are designed to provide organizations with a comprehensive set of security measures that can be tailored to their specific needs and risk profile. The controls provide a framework for organizations to evaluate their current security posture, identify gaps, and develop an action plan to address those gaps. By following the guidance provided in the Annex A Controls, organizations can create a secure and reliable information system that meets their security objectives., topic=[{id=97620570500, createdAt=1673040885276, updatedAt=1716010651854, path='iso-27001', name='
ISO 27001 Guide: A Comprehensive Guide', 1='{type=string, value=ISO 27001}', 2='{type=string, value=This guide provides a comprehensive overview of the ISO 27001 standard, including the requirements, implementation, and certification. Learn how to ensure your organization's information security is up to date and compliant.}', 5='{type=string, value=
This guide provides an authoritative and detailed overview of the ISO/IEC 27001 standard, which defines the requirements for an Information Security Management Systems (ISMS) associated with information security, cybersecurity and privacy protection.
Learn about the purpose and scope of the standard, the key requirements for an ISMS, how to implement and maintain an ISMS, how to establish an effective security risk management program, how to develop and implement security policies, how to implement controls to protect information and services and how to audit and review systems to ensure they meet the requirements of the standard.
This guide is an essential resource for anyone looking to understand and implement ISO 27001.
}', 15='{type=list, value=[{id=97620570500, name='ISO 27001'}]}'}], hs_path=iso-iec-27001-annex-a-controls}--
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77