• 17.8.36 An advanced persistent threat (APT)

    An advanced persistent threat (APT) is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specifi...

  • 17.8.35 Information security incident

    Information security incidents are defined as a single or series of unwanted events that compromise (or are likely to compromise) the confidentiality,...

  • 17.8.34 Disaster recovery and Business continuity planning

    Disaster recovery (DR) involves a set of policies, procedures, systems and organization to enable the recovery or continuation of vital technology inf...

  • 17.8.33 Software catalog

    https://groups.oist.jp/it/oist-software ...

  • 17.8.32 CMDB

    The OIST configuration management database (CMDB) is a repository that stores information regarding IT assets, as well as descriptive relationships be...

  • 17.8.31 Anti-malware definition file

    Data which is referred by Anti-Malware software to determine the malicious program. ...

  • 17.8.30 Malicious program (Malware)

    Malware is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or displ...

  • 17.8.29 Encryption

    The process of encoding information assets in such a way that only authorized entities can read it. ...

  • 17.8.28 Account

    Any entity registered into the OIST IDM. ...

  • 17.8.27 Access right management

    To manage the authorization information in accounts and access control. ...