Chapter 2 Terms Flashcards

1
Q

Acceptable Internet

Usage Policy

A

policy that prescribes the code of conduct that governs the behavior of a user while connected to the network/Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acceptable Use Policy (AUP)

A

a comprehensive policy that includes information for all information resources and describes the organizational permissions for the usage of IT and information-related resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audit Trail

A

Provide a map to retrace the flow of a transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Benchmarking

A

A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Benefit Analysis (BA)

A

The user costs (or benefits) and business operational costs (or benefits) derived from the information system(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black Swan Events

A

Those events that are a surprise, have a major effect and after the fact are often inappropriately rationalized with the benefit of hindsight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Budget

A

Allows for forecasting, monitoring and analyzing financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business

Alignment

A

Involves making the services provided by the corporate IT function more closely reflect the requirements and desires of the business users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business Continuity Policy

A

A document approved by top management that defines the extent and scope of the business continuity effort within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business Impact

Analysis (BIA)

A

Used to evaluate the critical processes and to determine time frames, priorities, resources and interdependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Process

Reengineering (BPR)

A

The thorough analysis and significant redesign of business processes and management systems to establish a better performing structure, more responsive to the customer base and market conditions, while yielding material cost savings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Reference Model

A

a function-driven framework that describes the functions and sub-functions performed by the government, independent of the agencies that actually perform them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Capability Maturity
Model Integration (CMMI)
A

a process improvement approach that provides enterprises with the essential elements of effective processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chargeback

A

Provides all involved parties with a marketplace measure of the effectiveness and efficiency of the service provided by the information processing facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Computing

A

A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
COBIT Process
Assessment Model (PAM)
A

developed to address the need to improve the rigor and reliability of IT process reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Compliance Management

A

Focuses on implementing processes that address legal and regulatory policy and contractual compliance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Corporate Governance

A

a set of responsibilities and practices used by an organization’s management to provide strategic direction, thereby ensuring that goals are achievable, risk is properly addressed and organizational resources are properly utilized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Classification Policy

A

policy that should describe the classifications, levels of control at each classification and responsibilities of all potential users including ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Reference Model

A

a framework that describes the data and information that support program and business line operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Disasters

A

Disruptions that cause critical information resources to be inoperative for a period of time, adversely impacting organizational operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Enterprise Architecture (EA)

A

involves documenting an organization’s IT assets in a structured manner to facilitate understanding, management and planning for IT investments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Federal Enterprise

Architecture (FEA)

A

a business and performance based framework to support cross-agency collaboration, transformation and government-wide improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Governance of Enterprise IT (GEIT)

A

a system in which all stakeholders, including the board, senior management, internal customers and departments such as finance, provide input into the decision-making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Governance of | Outsourcing
The set of responsibilities, roles, objectives, interfaces and controls required to anticipate change and manage the introduction, maintenance, performance, costs and control of third-party provided services
26
High-Level Information Security Policy
policy that includes statements on confidentiality, integrity, and availability
27
Impact
The result of a threat agent exploiting a vulnerability
28
Information | Security Governance
a subset of corporate governance that provides strategic direction for security activities and ensures that objectives are achieved, that risk is appropriately managed and enterprise information resources are used responsibly
29
Information Security | Policy
communicates a coherent security standard to users, management and technical staff
30
Information Security Program
a set of activities that provide assurance that information assets are given a level of protection commensurate with their value or the risk their compromise poses to the organization
31
Initiating, Diagnosing, Establishing, Acting, and Learning (IDEAL) Model
forms an infrastructure to guide enterprises in planning and implementing an effective software process improvement program and consists of five phases
32
Insourced
Fully performed by the organization's staff
33
Internal-Use | Software
Software that an entity has no substantive plans to market externally
34
IT Balanced Scorecard | BSC
a process management evaluation technique that can be applied to the GEIT process in assessing IT functions and processes
35
IT Resource Management
Focuses on maintaining an updated inventory of all IT resources and addresses the risk management process
36
Key Performance Indicator (KPI)
A measure that determines how well the process is performing in enabling the goal to be reached
37
Lean Six Sigma
Examines the measurement-oriented strategy focused on process improvement and defect reduction and the efficiency of these processes
38
Life Cycle Cost-Benefit Analysis
The assessment of following element to determine strategic direction for IT enterprise systems and overall IT portfolio management
39
Life Cycle Cost (LCC)
The estimated costs of maintenance/updates, failure, and maintaining interoperability with mainstream and emerging technologies
40
Life Cycle (LC)
A series of stages that characterize the course of existence of an organizational investment
41
Netiquette
a description of language that is considered appropriate to use while online
42
Organizational Change | Management
Involves use of a defined and documented process to identify and apply technology improvements at the infrastructure and application level that are beneficial to the organization and involve all levels of the organization impacted by the changes
43
Organizational Chart
Provides a clear definition of the department's hierarchy and authorities
44
Outsourced
Fully performed by the vendor's staff
45
Outsourcing
The mechanism that allows organizations to transfer the delivery of services to third parties
46
Performance
The service perceived by users and stakeholders
47
Performance | Measurement
the process of measuring, monitoring and reporting on information security processes to ensure that SMART (specific, measurable, attainable, realistic and timely) objectives are achieved
48
Performance Optimization
The process of both improving perceived service performance along with improving information security productivity to the highest level possible without unnecessary, additional investment in the IT infrastructure
49
Performance Reference Model
a framework to measure the performance of major IT investments and their contribution to program performance
50
Plan, Do, Check, Act (PDCA)
An iterative four-step management method used in business for the control and continuous improvement of processes and products
51
Policies
high-level documents that represent the corporate philosophy of an organization
52
Procedures
documented, defined steps for achieving policy objectives
53
Process Integration
the integration of an organization's management assurance processes for security
54
Qualitative Risk Analysis
Uses words or descriptive rankings to describe the impacts or likelihood
55
Quality Assurance (QA)
A planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements
56
Quality Control (QC)
The observation techniques and activities used to fulfill requirements for quality
57
Quantitative Risk | Analysis
Use numeric values to describe the likelihood and impacts of risk, using data from several types of sources
58
Residual Risk
The remaining level of risk after controls have been applied
59
Resource Management
the process of utilizing information security knowledge and infrastructure efficiently and effectively
60
Risk Calculation
Probability of Occurrence x Magnitude of Impact
61
Root Cause Analysis
The process of diagnosis to establish the origins of events
62
Semi-Quantitative Risk Analysis
Descriptive rankings are associated with a numeric scale
63
Service Component Reference Model
a functional framework that classifies the service components that support business and performance objectives
64
Six Sigma
The implementation of a measurement-oriented strategy focused on process improvement and defect reduction
65
Six Sigma Defect
Anything outside customer specifications
66
Technical Reference Model
a framework that describes how technology supports the delivery, exchange and construction of service components
67
Vulnerabilities
Characteristics of information resources that can be exploited by a threat to cause harm