Chapter 2 Terms Flashcards
Acceptable Internet
Usage Policy
policy that prescribes the code of conduct that governs the behavior of a user while connected to the network/Internet
Acceptable Use Policy (AUP)
a comprehensive policy that includes information for all information resources and describes the organizational permissions for the usage of IT and information-related resources
Audit Trail
Provide a map to retrace the flow of a transaction
Benchmarking
A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business
Benefit Analysis (BA)
The user costs (or benefits) and business operational costs (or benefits) derived from the information system(s)
Black Swan Events
Those events that are a surprise, have a major effect and after the fact are often inappropriately rationalized with the benefit of hindsight
Budget
Allows for forecasting, monitoring and analyzing financial information
Business
Alignment
Involves making the services provided by the corporate IT function more closely reflect the requirements and desires of the business users
Business Continuity Policy
A document approved by top management that defines the extent and scope of the business continuity effort within the organization
Business Impact
Analysis (BIA)
Used to evaluate the critical processes and to determine time frames, priorities, resources and interdependencies
Business Process
Reengineering (BPR)
The thorough analysis and significant redesign of business processes and management systems to establish a better performing structure, more responsive to the customer base and market conditions, while yielding material cost savings
Business Reference Model
a function-driven framework that describes the functions and sub-functions performed by the government, independent of the agencies that actually perform them
Capability Maturity Model Integration (CMMI)
a process improvement approach that provides enterprises with the essential elements of effective processes
Chargeback
Provides all involved parties with a marketplace measure of the effectiveness and efficiency of the service provided by the information processing facility
Cloud Computing
A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction
COBIT Process Assessment Model (PAM)
developed to address the need to improve the rigor and reliability of IT process reviews
Compliance Management
Focuses on implementing processes that address legal and regulatory policy and contractual compliance requirements
Corporate Governance
a set of responsibilities and practices used by an organization’s management to provide strategic direction, thereby ensuring that goals are achievable, risk is properly addressed and organizational resources are properly utilized
Data Classification Policy
policy that should describe the classifications, levels of control at each classification and responsibilities of all potential users including ownership
Data Reference Model
a framework that describes the data and information that support program and business line operations
Disasters
Disruptions that cause critical information resources to be inoperative for a period of time, adversely impacting organizational operations
Enterprise Architecture (EA)
involves documenting an organization’s IT assets in a structured manner to facilitate understanding, management and planning for IT investments
Federal Enterprise
Architecture (FEA)
a business and performance based framework to support cross-agency collaboration, transformation and government-wide improvement
Governance of Enterprise IT (GEIT)
a system in which all stakeholders, including the board, senior management, internal customers and departments such as finance, provide input into the decision-making process
Governance of
Outsourcing
The set of responsibilities, roles, objectives, interfaces and controls required to anticipate change and manage the introduction, maintenance, performance, costs and control of third-party provided services
High-Level Information Security Policy
policy that includes statements on confidentiality, integrity, and availability