Word of the Day – August 2, 2019
Information Security Management
Acronyms
- None
Preferred Term
- None
Non-standard Terms
- None
Definitions
Type | Definition | Sources |
---|---|---|
Noun | The person or persons who handle, monitor, and control the processes and activities responsible for ensuring the confidentiality, integrity, and availability of an organizations assets, information, data, and IT services. (used 6 times in citations and controls) |
|
Role | The purpose of this role is to provide administrative oversight to more specific information security roles, such as encryption, privacy, etc. Any process or activity that provides managerial oversight to information security roles should be assigned to this role. (used 62 times in citations and controls) |
|
Other Forms
Type | Other Form |
---|---|
Plural | Information Security Management |
Plural Possessive | Information Security Management's |
Possessive | Information Security Management's |
Relationships
Common Controls
Displaying Controls in which this term is tagged –
Show all Controls containing this term regardless of tagging
Displaying Controls containing this term –
Show only Controls in which this term is tagged
ID | Control |
---|---|
{{ control.id }} | {{ control.name }} |
None |
Citations
Displaying Citations in which
this term is tagged –
Show all Citations containing this term regardless of tagging
Displaying Citations containing this term –
Show only Citations in which
this term is tagged
AD ID | Authority Document | CT ID | Reference | Guidance | CC ID |
---|---|---|---|---|---|
{{ citation.authority_document.id }} | {{ citation.authority_document.common_name }} | {{ citation.id }} | {{ citation.reference }} | {{ citation.guidance_as_tagged || citation.guidance }} | {{ citation.control.id }} None |
None |