USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

Key Information Security Concepts and Terminology

Lesson 2/24 | Study Time: 30 Min

Understanding key information security concepts and terminology is essential for anyone working with or studying Information Security Management Systems (ISMS).

The ISO/IEC 27000 family of standards provides formal definitions and vocabulary used across ISO/IEC 27001 and related documents, making it easier to communicate security needs, policies, and practices clearly and accurately.

A good grasp of these terms helps to avoid misunderstandings and supports consistency in applying and auditing security controls.​

Core Information Security Principles

At the heart of information security are three guiding principles—often called the C-I-A triad:


1. Confidentiality: Ensuring that only authorized individuals, processes, or systems have access to information. Protection is achieved through access controls, encryption, and authentication mechanisms. Breaches of confidentiality could occur when unauthorized parties access sensitive data.​


2. Integrity: Guaranteeing the accuracy, completeness, and reliability of data throughout its lifecycle. Integrity can be compromised by accidental or malicious modifications, deletions, or errors. Controls like checksums, audit trails, and restricted access help maintain integrity.​


3. Availability: Ensuring information and resources are accessible to authorized users when needed. Disruptions (such as cyberattacks or system outages) threaten availability. Strategies like redundancy, backup, and disaster recovery planning are used to safeguard availability.​


These three attributes underpin every security measure in an ISMS.

Common Terms in ISO/IEC 27001


TermDefinition
AssetAnything valuable to an organization, including data, hardware, software, people, or reputation.
ThreatA potential cause of an unwanted incident that may harm an asset, such as cyberattacks, human error, or natural disasters.
VulnerabilityA weakness in an asset or control that could be exploited by threats.
RiskThe likelihood and impact of a threat exploiting a vulnerability; central to ISMS risk assessment and treatment.
ControlPolicies, procedures, practices, or technical measures that reduce risks to acceptable levels—organizational, human, physical, or technological.
AuthenticationValidating that a user or system is who it claims to be through methods like passwords, biometrics, or multi-factor authentication.
Business ContinuityProcedures that ensure the organization continues operating during and after disruptive incidents.
IncidentAn information security event that could disrupt business operations or cause data loss, modification, or exposure.
NonconformityFailure to meet a requirement of the ISMS or the ISO 27001 standard.
Statement of Applicability (SoA)A key ISMS document specifying which controls are implemented and the rationale for their selection.

Control Attributes (ISO/IEC 27001:2022)

Recent updates to the standard also introduce control attributes that help classify and group security measures.