Incident Response Plan
Breach
An impermissible acquisition, access, use, or disclosure under that compromises the security or privacy of the protected information
SIRS
Security Incident Response Simulations (a.k.a called IR Game Days)
SIEM
Security Information and Event Management (SIEM) Tool - Application that provides the ability to gather security data from information system components and present that data as actionable information via a single interface.
Error Detection Code -
A code computed from data and comprised of redundant bits of information designed to detect, but not correct, unintentional changes in the data. SOURCE: FIPS 140-2; CNSSI-4009
File Integrity Checking software Cyclical Redundancy Check (CRC)
A method to ensure data has not been altered after being sent through a communication channel. SOURCE: SP 800-72 Error checking mechanism that verifies data integrity by computing a polynomial algorithm based checksum. SOURCE: CNSSI-4009
Antivirus /AntiSpan Software
A program that monitors a computer or network to identify all major types of malware and prevent or contain malware incidents. Spam: The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
IDPs
Intrusion Detection and Prevention System -Software that automates the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents and attempting to stop detected possible incidents.
Compromise
Unauthorized disclosure/theft, modification, or destruction
CSIRT
is a centralized unit that deals with security issues
Security Operations Center (SOC)
is a centralized unit that deals with security issues