Arma Glossary Terms Flashcards

1
Q

access control

A

The management of access to a resource or service based on organizational policy and the permission level assigned to the person requesting access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

audit

A
  1. A review of information-related activities to ensure that sufficient policies,
    procedures, and controls are in place and complied with to meet all operational, legal, and regulatory obligations and to identify where and how mprovements should be made.
  2. Any action to confirm that an item has not been altered or changed from the original item.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

audit trail metadata

A

Protected metadata documenting record activity, including information about when and by whom a specific record was created, changed, or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

benchmarking

A

The act of measuring against specified standards or references.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

big data

A

An information dataset that grows so large it becomes awkward to work with using traditional information management tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

business process management (BPM)

A

The business rules according to which information flows, process steps are drawn, tasks are assigned, and results are measured so efficiency can be improved.
See also workflow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

chain of custody

A

The succession of offices or persons having seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

cloud computing

A

A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Source: The NIST Definition of Cloud Computing.
See also community cloud, hosted application, hybrid cloud, infrastructure as a service, platform as a service, private cloud, public cloud, software as a service,
vertical cloud, and virtual private cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

compliance

A

The manner and duties in which an organization conducts its activities in accordance with the requirements of applicable internal and external authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cost avoidance

A

A financial justification based on the premise that future expenses will not be incurred if a particular action is taken now.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cost-benefit analysis

A

The evaluation of an operation, service, or project by quantifying and comparing the projected costs and benefits to aid in decision making or to compare two projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

data dictionary

A

A directory of information about the definition, structure, and use of data that does not contain the data itself but contains the name of each data element, its definition, where and how it is used, and its relationship to other data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data format

A

A standard type of encoding of data for recording, storage, transmission, display, or output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

data loss prevention (DLP)

A

The process of securing or protecting sensitive or proprietary information and data from internal deletion, destruction, or unauthorized release, whether accidental or deliberate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data map

A

A comprehensive and defensible inventory of an organization’s electronically stored information (ESI) that includes all the relevant IT systems and media (online and offline) and the responsible business units, data stewards, and custodians.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

data replication

A

The process of duplicating data between different sites to enable the continued use of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data warehouse

A

A computer information system for extracting data from diverse applications and databases, converting it into a common structure, and aggregating the data for use in business intelligence, decision making, and organization-wide reporting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

decision support system

A

A computer information system that utilizes aggregated data and allows interactive modeling and visualization of the data to support scenario development and decision making.
See also data warehouse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

decryption

A

The process by which the alteration of the data representation performed by encryption is reversed to render the data into its original, readable format.
See also encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

deduplication

A

The process of identifying and designating and/or removing duplicate files and/or records within a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

destruction hold

A

A hold placed on the scheduled destruction of records due to foreseeable or pending litigation, governmental investigation, audit, or special organizational requirements. Also referred to as destruction moratorium, destruction suspension, freeze notice, hold, hold notice, legal hold, litigation hold, preservation order, and suspension order.

22
Q

e-discovery

A

Any process by which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case.
Note: Court-ordered or government-sanctioned hacking for the purpose of obtaining critical evidence is also a type of e-discovery.
See also discovery and document production.

23
Q

electronically stored information (ESI)

A

Any information created, managed, and/or stored in digital form.

24
Q

encrypted drive

A

A specific encryption, which may assume two forms:

  1. The general encryption of the data existing in a computer drive.
  2. The creation of an encrypted file that, when decrypted, shows as an ordinary disk drive for a computer.
25
Q

encryption

A

The rendering of electronic data or documents unintelligible to unauthorized users.

26
Q

encryption key

A

A data value that is used to encrypt and decrypt data.
Note: The number of bits in the encryption key is a rough measure of the encryption strength; generally, the more bits in the encryption key, the more difficult it is to break.

27
Q

extensible markup language (XML)

A

A standard developed by the World Wide Web Consortium (W3C) that defines a format for representing and sharing information between people or computers.

28
Q

file level binary comparison

A

Method of deduplication using the digital fingerprint (hash) of a file to compare the individual content and location of bytes in one file against those of another file.
Source: The Sedona Conference® Glossary.
Note: File level binary comparison ignores metadata.
See also data verification, deduplication, digital fingerprint, and hash coding.

29
Q

governance

A

The oversight, direction, and high-level monitoring and control of an enterprise to ensure the achievement of defined and approved objectives.

30
Q

graphic interchange format (GIF)

A

A bitmap image file format, widely utilized on websites due to its small file size and ability to incorporate animation.

31
Q

graphical user interface (GUI)

A

A type of software interface that utilizes icons and menus and with which users interact through a mouse or pointing device.

32
Q

hardware as a service (HaaS)

A

Hardware utilized on a pay-per-use basis, either onsite or in cloud computing.
See also infrastructure as a service, platform as a service, and software as a service.

33
Q

hierarchical storage management

A

A mass storage device that automatically moves data from expensive, rapid-access online media to less-expensive, near-line storage based on the frequency of use of the data.
Source: A Glossary of Archival and Records Terminology.
See also near-line and periodic transfer.

34
Q

infrastructure as a service (IaaS)

A

A cloud computing service model where the fundamental infrastructure of networks, servers, and storage is delivered as a service over the Internet. Note: In this model, the customer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed
applications; and possibly limited control of select networking components (e.g., host firewalls). Note source: The NIST Definition of Cloud Computing.
See also cloud computing, hardware as a service, platform as a service, and software as a service.

35
Q

journaling

A

A method used in electronic messaging systems where messages and/or information about messages are captured, often in real-time, and retained in separate storage as a method of preservation.
Note: Journaling offers advantages over traditional archiving in that it captures messages that may have been both created and deleted before an archive or backup takes place. Messages placed in journaling storage are typically encrypted for additional security.

36
Q

lossy compression

A

The reduction in the size of an informational object by removing irrelevant and selected relevant data and preventing an exact recovery of the original.
See also JPEG and lossless compression.

37
Q

mapping

A
  1. (information) The methods of producing structured documents and communications to quickly understand the information contained on those documents.
  2. (computing) A method of assigning internal or external drives or jukeboxes to specific characters for the purpose of processing data.
    See also data map.
38
Q

metadata

A

The structured information that describes, explains, locates, or otherwise makes it easier to retrieve, use, or manage information resources.
Note: Metadata is typically broken down into broad types that include, but are not limited to, administrative metadata, content metadata, descriptive metadata,
preservation metadata, and structural metadata.
See also audit trail metadata, contextual information, embedded metadata, and vendor-added metadata.

39
Q

payback period

A

The length of time required to recover the cost of an investment (e.g., purchase of hardware or software) from its cost savings or revenues.
See also return on investment.

40
Q

platform as a service (PaaS)

A

A cloud computing service model where the computing platform (generally, operating system, database, and web server) is delivered as a service over the Internet. Note: In this model, the customer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for
the application-hosting environment. Note source: The NIST Definition of Cloud Computing.
See also cloud computing, hardware as a service, infrastructure as a service, and software as a service.

41
Q

private cloud

A

The cloud infrastructure provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises.
Source: The NIST Definition of Cloud Computing.
See also cloud computing, community cloud, hybrid cloud, public cloud, and virtual private cloud.

42
Q

public cloud

A

The cloud infrastructure provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider.
Source: The NIST Definition of Cloud Computing.
See also cloud computing, community cloud, hybrid cloud, and private cloud.

43
Q

return on investment (ROI)

A

A cost justification method for an investment (e.g., purchase of hardware or software) that compares the cost outflows (expenses) to the cash inflows (benefits).
See also payback period.

44
Q

risk management

A

The identification, assessment, and prioritization of risks (defined as the effect of uncertainty on objectives, whether positive or negative) followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of undesired events.

45
Q

sandboxing

A

An isolated environment within a computer that allows for testing or running software while preventing the application or its data from affecting the production system.
Note: Used as a security mechanism to protect an unknown or untested program from compromising the rest of a computer system.

46
Q

service level agreement (SLA)

A

A contract between parties defining and guaranteeing the service(s) to be provided and the metrics to determine agreed-upon performance targets for the service(s).

47
Q

software as a service (SaaS)

A

A cloud computing service model where application software is delivered as a service over the Internet.
Note: In this model, the customer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even
individual application capabilities, with the possible exception of limited user-specific application configuration settings. Note source: The NIST Definition of Cloud Computing.
See also cloud computing, hardware as a service, hosted application, infrastructure as a service, and platform as a service.

48
Q

SWOT analysis

A

A particular method for presenting information in the form of an assessment of strengths, weaknesses, opportunities, and threats that serves as an aid to decision making.

49
Q

trojan

A

A program that does something undocumented that the programmer intended, but that the user would not approve of if it was known to the user. Sometimes referred to as a “trojan horse.”
See also malware, phishing, virus, and worm.

50
Q

virtual private cloud (VPC)

A

A private cloud that exists within a shared or public cloud.

51
Q

virtual private network (VPN)

A

A method of using public communications channels, such as the Internet, to securely connect to a private network.
Note: These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

52
Q

workflow

A
  1. A series of tasks defined within an organization to produce a final outcome.
  2. The technology of implementing business processes as a controlled and conditional sequence of steps, ad hoc or business rule-based, each having tasks to be performed by users or other applications where information has to be analyzed and new information is fed into a system.
    See also business process management.