A - GLOSSARY Flashcards

1
Q

Acceptable interruption window

A

The maximum period of time that a system can be unavailable before compromising the achievement of the organization’s business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acceptable use policy

A

A policy that establishes an agreement between users and the organization and defines for all parties the ranges of use that are approved before gaining access to a network or the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Controls

A

The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Access path

A

The logical route that an end user takes to access computerized information. Typically it includes a route through the operating system, telecommunications software, selected application software and the access
control system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Access Rights

A

The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accountability

A

The ability to map a given activity or event back to the responsible party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Address Resolution Protocol (ARP)

A

Defines the exchanges between network interfaces connected to an Ethernet media segment in order to map an IP address to a link layer address on demand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Administrative control

A

The rules, procedures and practices dealing with operational effectiveness, efficiency and adherence to regulations and management policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Advance encryption standard (AES)

A

The international encryption standard that replaced 3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alert situation

A

The point in an emergency procedure when the elapsed time passes a threshold and the interruption is not resolved. The organization entering into an alert situation initiates a series of escalation steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Algorithm

A

A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Alternate facilities

A

Locations and infrastructures from which emergency or backup processes are executed, when the main premises are unavailable or destroyed. This includes other buildings, offices or data processing centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Alternate process

A

Automatic or manual process designed and established to continue critical business processes from point-of-failure to return-to-normal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Annual loss expectancy (ALE)

A

The total expected loss divided by the number of years in the forecast period yielding the average annual loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anomaly detection

A

Detection on the basis of whether the system activity matches that defined as abnormal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anonymous File Transfer Protocol (AFTP)

A

A method of downloading public files using the File Transfer Protocol (FTP). AFTP does not require users to identify themselves before accessing files from a particular server. In general, users enter the word
“anonymous” when the host prompts for a username. Anything can be entered for the password, such as the user’s email address or simply the word “guest.” In many cases, an AFTP site will not prompt a user for a
name and password.

17
Q

Antivirus software

A

An application software deployed at multiple points in an IT architecture.
It is designed to detect and potentially eliminate virus code before damage is done, and repair or quarantine files that have already been infected.

18
Q

Application controls

A

The policies, procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved

19
Q

Application layer

A

In the Open Systems Interconnection (OSI) communications model, the application layer provides services for an application program to ensure
that effective communication with another application program in a network is possible. The application layer is not the application that is doing the communication; it is a service layer that provides these services.

20
Q

Application programming interface (API)

A

A set of routines, protocols and tools referred to as “building blocks” used in business application software development. A good API makes it easier to develop a program by providing all the building blocks related to
functional characteristics of an operating system that applications need to specify, for example, when interfacing with the operating system (e.g., provided by Microsoft Windows, different versions of UNIX). A
programmer utilizes these APIs in developing applications that can operate effectively and efficiently on the platform chosen.

21
Q

Application service provider (ASP)

A

Also known as managed service provider (MSP), it deploys, hosts and manages access to a packaged application to multiple parties from a centrally managed facility. The applications are delivered over networks
on a subscription basis.

22
Q

Architecture

A

Description of the fundamental underlying design of the components of the business system, or of one element of the business system (e.g., technology), the relationships among them, and the manner in which they support the organization’s objectives

23
Q

Asymmetric key

A

A cipher technique in which different cryptographic keys are used to encrypt and decrypt a message

24
Q

Attack signature

A

A specific sequence of events indicative of an unauthorized access attempt. Typically a characteristic byte pattern used in malicious code or an indicator, or set of indicators, that allows the identification of
malicious network activities.

25
Q

Audit trail

A

A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source

26
Q

Authentication

A

The act of verifying the identity (i.e., user, system)

27
Q

Authorization

A

Access privileges granted to a user, program or process, or the act of granting those privileges

28
Q

Availability

A

Information that is accessible when required by the business process now and in the future