Secure UD Glossary

Secure UD Glossary

The guide below provides definitions and related resources for the terms used in Secure UD. Use it to explore and learn more about Secure UD and what it offers the University.

Glossary

  1. Administrative controls
  2. Availability
  3. Checklist test
  4. Clear
  5. Client system
  6. Confidentiality
  7. Council for Data Governance (CDG)
  8. Critical
  9. Criticality
  10. Cryptographic Erase
  11. Data center
  12. Data custodian
  13. Data governance
  14. Data management
  15. Data Security Advisory Committee (DSAC)
  16. Data set
  17. Data steward
  18. Data stewardship
  19. Data trustee
  20. Degauss
  21. Destroy
  22. Disposal
  23. Disruptive event
  24. E-communications
  25. Electronic storage media
  26. End user
  27. Functional area
  28. Integrity
  29. IT device
  30. IT resource
  31. IT security incident
  32. Legitimate interest
  33. Level I information
  34. Level II information
  35. Level III information
  36. Local support provider (LSP)
  37. Media Sanitization
  38. Mission critical
  39. Mobile device
  40. Non-critical
  41. Operational controls
  42. Portable device
  43. Privacy statement
  44. Purge
  45. Recovery point objective (RPO)
  46. Recovery time objective (RTO)
  47. Remote access
  48. Risk area
  49. Risk management objective (RMO)
  50. Risk management objective (RMO)
  51. Secure UD
  52. Secure UD Compliance and Risk Survey (Secure UD CARS)
  53. Secure UD Data Governance & Security Program (Secure UD DGSP)
  54. Secure UD Data Steward Guide
  55. Secure UD End User Acknowledgement
  56. Secure UD Toolkit
  57. Secure UD Inventory Tool
  58. Secure UD Security Plan Tool
  59. Secure UD Training
  60. Security control
  61. Security standard
  62. Server system
  63. Shared data repository
  64. Simulation
  65. Structured walkthrough
  66. Technical controls
  67. Technology service provider
  68. Unit
  69. Unit head
  70. Unit information security plan
  71. University Acceptable Use of IT Resources Policy
  72. University activities
  73. University-approved
  74. University Data Management and Governance Policy
  75. University E-Communications Privacy Policy
  76. University information
  77. University information classification
  78. University Information Classification Policy
  79. University Information Security Policy
  80. University Incident Response Policy
  81. University Web Privacy Policy
  82. Visitor

Secure UD Glossary

Term

Definition

More Information

    Administrative controls

    Security controls that focus on the management of risk and IT resources.

    Availability

    The timeliness and reliability of access to and use of University information.

    Checklist test

    A test in which a plan or procedure is reviewed to ensure accuracy and consistency.

    Clear

    A method of sanitization that applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple, non-invasive data recovery techniques using the same interface that is available to the user. Typically applied through the standard read and write commands to the storage device, such as by rewriting with a new value or using a menu option to reset the device to the factory state, where rewriting is not supported.

    Cryptographic Erase

    A purge sanitization technique in which the encryption key (i.e., either the MEK or the KEK protecting the MEK) for encrypted target data is sanitized, making recovery of the decrypted target data infeasible.

    Client system

    Any IT device that is a desktop computer or laptop computer.

    Confidentiality

    The preservation of authorized restrictions on University information access and disclosure, including means for protecting personal privacy and proprietary information.

    Council for Data Governance (CDG)

    The University council responsible for overseeing the appointment and action of data stewards for each of the University's functional areas. It includes the Chief Information Officer, VP & General Counsel, and other members as appointed by the President and/or his or her delegates.

    Critical

    Important to the business continuity or operational effectiveness of the unit. Loss of integrity or availability of critical IT resources would have moderate short-term impact on business continuity or operational effectiveness.

    Criticality

    The combined integrity and availability concerns of University information. Criticality is a reflection of how important data is to business continuity or operational effectiveness.

    Data center

    A group of networked servers used for critical University activities involving data processing, storage, and transmission.

    Data custodian

    A University entity or employee with operational responsibility to manage a shared data repository on behalf of a data steward.

    Data governance

    The responsible oversight of the informational quality, effectiveness, usability, strategic value, and security of data throughout its lifecycle.

    Data management

    The responsible stewardship of data throughout its lifecycle, including acquisition, utilization, maintenance, access, and protection.

    Data Security Advisory Committee (DSAC)

    The University council responsible for coordinating information security and risk management efforts and monitoring and recommending necessary security actions to the University. It is chaired by the director of IT Security and includes delegates as may be appointed from time to time by data stewards and/or the chair.

    Data set

    A collection of University information used for a University activities.

    Data steward

    An individual within the University who is the primary institutional authority for a particular data set and who is principally responsible for the management and security of that data set across the institution.

    Data stewardship

    The responsible oversight of a data set, including principal responsibility for the establishment of standards and guidelines for appropriately managing and securing that data across the institution.

    Data trustee

    An executive officer of the University with the highest level of strategic planning and policy-setting authority and responsibility for a functional area.

    Degauss

    To reduce the magnetic flux to virtual zero by applying a reverse magnetizing field. Degaussing any current generation hard disk will render the drive permanently unusable since these drives store location information on the hard drive. Also called “demagnetizing.”

    Destroy

    A method of sanitization that renders target data recovery infeasible using state-of-the-art laboratory techniques and results in the subsequent inability to use the media to store data.

    Disposal

    A release outcome following the decision that media does not contain sensitive data. This occurs if the media never contained sensitive data or after sanitization techniques are applied and the media no longer contains sensitive data.

    Disruptive event

    An event that requires the execution of a plan or procedure to recover from operational loss.

    E-communications

    The network traffic or files containing user's electronic communications, including telephone conversations, electronic mail or transmission, webpage, or content exchanged with other IP addresses.

    Electronic storage media

    Any standalone or integrated electronic media that can be used to store data. Includes optical media, magnetic media, disk drives, and flash drives.

    Functional area

    One or more units that have primary responsibility for managing a core University mission or function.

    Integrity

    The protection against improper modification or destruction of University information; includes non-repudiation and authenticity.

    IT device

    Any device involved in the processing, storage, or transmission of University information and making use of the University IT infrastructure or attached to the University network. These devices include, but are not limited to, desktop computers, laptop computers, personal digital assistants, server systems, network devices such as routers or switches, and printers.

    IT resource

    Any of the full set of University-owned or -controlled IT devices and data involved in the accessing, processing, storage, or transmission of information.

    IT security incident

    Any event that has or is likely to result in the compromise of the confidentiality, integrity, or availability of an IT resource, including, but not limited to, breaches or loss or theft of devices.

    Legitimate interest

    A requirement to access University information commensurate with an end user's conduct of official University activities.

    Level I information

    Also called Low Risk information; University information for which unintentional, unlawful, or unauthorized disclosure would have limited or no adverse effect on organizational operations, organizational assets, individuals, other organizations, or the nation.

    Level II information

    Also called Moderate Risk information; University information for which unintentional, unlawful, or unauthorized disclosure would have a moderate adverse effect on organizational operations, organizational assets, individuals, other organizations, or the nation.

    Level III information

    Also called High Risk information; University information for which unintentional, unlawful, or unauthorized disclosure would have a significant adverse effect on organizational operations, organizational assets, individuals, other organizations, or the nation.

    Local support provider (LSP)

    An individual or unit with primary responsibility for the installation, configuration, security, and ongoing maintenance of an IT device.

    Mission critical

    Vital to the business continuity or operational effectiveness of the unit. Loss of integrity or availability of mission critical IT resources would have significant short-term impact on business continuity or operational effectiveness.

    Media Sanitization

    The actions taken to render data written on media unrecoverable by both ordinary and extraordinary means.

    Mobile device

    Any IT device that is a mobile phone or tablet.

    Non-critical

    Necessary to the business continuity or operational effectiveness of the unit. Loss of integrity or availability of non-critical IT resources would have limited or no short-term impact on business continuity or operational effectiveness.

    Operational controls

    Security controls that are implemented primarily by people rather than by IT devices.

    Portable device

    Any IT device that is a laptop computer, mobile device, or removable electronic storage media.

    Privacy statement

    A posted notice of website practices for obtaining and using data from visitors to that website.

    Purge

    A method of sanitization that applies physical or logical techniques to render target data recovery infeasible using state-of-the-art laboratory techniques.

    Recovery point objective (RPO)

    The targeted maximum time period for which data might be lost as a result of a disruptive event before incurring unacceptable consequences associated with a break in business continuity. Simplified: the acceptable extent of data loss due to a disruptive event.

    Recovery time objective (RTO)

    The targeted duration of time and degree of business process resumption required following a disruptive event to avoid unacceptable consequences associated with a break in business continuity. Simplified: the acceptable duration of downtime following a disruptive event.

    Remote access

    Access to an IT resource through an off-network connection.

    Risk area

    One of 10 broad groups of IT security risks posed to the University.

    Risk management objective (RMO)

    One of 25 specific goals for managing and mitigating risk to the University.

    Sanitize

    To render access to target data on the media infeasible for a given level of effort.

    Secure UD

    The University's comprehensive, risk-driven information security initiative.

    Secure UD Compliance and Risk Survey (Secure UD CARS)

    A lightweight, streamlined unit compliance and risk assessment tool based on the requirements of the Secure UD DGSP.

    Secure UD Data Governance & Security Program (Secure UD DGSP)

    The University's comprehensive plan for IT and information-related information security and risk management.

    Secure UD Data Steward Guide

    A tool to assist data stewards in identifying, classifying, and defining protection requirements for the data sets from their functional areas.

    Secure UD End User Acknowledgement

    A written acknowledgement of every individual's responsibility to safeguard the confidentiality of University information in their care.

    Secure UD Inventory Tool

    A tool to assist units in inventorying their IT resources; contains both a business process and data inventory and an IT device inventory.

    Secure UD Security Plan Tool (Secure UD SPT)

    A tool to assist unit heads in developing and writing unit information security plans.

    Secure UD Toolkit

    A bundle containing the Secure UD tools and resources necessary for unit heads to begin implementing Secure UD within their units.

    Secure UD Training

    The University's modular, online, self-paced, comprehensive information security and awareness training program.

    Security control

    An administrative, operational, and/or technical requirement or recommendation for meeting security standards.

    Security standard

    A requirement for achieving risk management objectives and compliance with laws, regulations, and policies.

    Server system

    Any IT device that provides application, system, or network services to other information systems.

    Shared data repository

    A collection of University information to which multiple individuals or entities have access.

    Simulation

    A test in which a plan or procedure is executed during a mock disruptive event to ensure its function.

    Structured walkthrough

    A test in which a plan or procedure is reviewed step by step with the individuals responsible for its execution to ensure accuracy and consistency.

    Technical controls

    Security controls that are implemented primarily by IT devices according to their hardware, software, and firmware.

    Technology service provider

    A University unit or third-party vendor that provides online services for the University.

    Unit

    A University department, school, institute, program, office, initiative, center, or other operating unit.

    Unit head

    A University official with the highest level of authority over the day-to-day management or oversight of a unit's operation.

    Unit information security plan

    A document that describes a unit's requirements, including the security controls and processes, for compliance with the Secure UD DGSP and applicable laws, policies, regulations, and contractual obligations.

    University Acceptable Use of IT Resources Policy

    The University policy that establishes the governing philosophy and general rules for regulating use of the University's IT resources.

    University activities

    Actions, processes, and procedures that support University missions, administration, or operation. For the purposes of policy, University activities fo not include an individual's personal scholarship, pedagogy, or academic research.

    University-approved

    Either: required or permitted by a University contract; or approved by a unit head in the interests of facilitating the unit's administrative, operational, or technical ability to fulfill its missions or functions.

    University Data Management and Governance Policy

    The University policy that establishes the rules, roles, and responsibilities for data management at the University.

    University E-Communications Privacy Policy

    The University policy that establishes privacy requirements for e-communications and IT data.

    University information

    Any information from the University's purview, including information that the University may not own but that is governed by laws and regulations to which the University is held accountable. Encompasses all data that pertains to or supports the administration and missions, including research, of the University.

    University information classification

    Any of the three categories of University information that have different security requirements based on their potential impact due to a loss of confidentiality, integrity, or availability.

    University Information Classification Policy

    The University policy that establishes the University information classifications and requires that all University information be classified.

    University Information Security Policy

    The University policy that establishes a University-wide information security framework and the administrative, operational, and technical requirements for information security and risk management.

    University Incident Response Policy

    The University policy that establishes rules, responsibilities, and procedures for reporting, investivating, and responding to IT security incidents.

    University Web Privacy Policy

    The University policy that establishes requirements for posting privacy statements on University websites.

    Visitor

    Any user of a University website.