The ability to use, modify, or affect an IT system or to gain entry to a physical area or location.
General content changes like an organization, name, phone number, mailbox or URL in a policy or standard or a clarification or other revision that does not change the effect of the policy or standard.
A computer program or set of programs that meet a defined set of business needs. A program or group of programs designed for end users. These programs are divided into two classes: system software and application software. While system software consists of low-level programs that interact with computers at a basic level, application software resides above system software and includes applications such as database programs, word processors and spreadsheets. Application software may be grouped along with system software or published alone. For the purposes of integration applications consume an integration service such as a web service or API.
An interconnected set of IT resources under the same direct management control that meets a defined set of business needs.
An attempt to bypass security controls on an IT system in order to compromise the data.
The process of ensuring the identity of a connected user or participants exchanging electronic data.