Chapter 2 Terms Flashcards

1
Q

Acceptable Internet

Usage Policy

A

policy that prescribes the code of conduct that governs the behavior of a user while connected to the network/Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acceptable Use Policy (AUP)

A

a comprehensive policy that includes information for all information resources and describes the organizational permissions for the usage of IT and information-related resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Audit Trail

A

Provide a map to retrace the flow of a transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Benchmarking

A

A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Benefit Analysis (BA)

A

The user costs (or benefits) and business operational costs (or benefits) derived from the information system(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black Swan Events

A

Those events that are a surprise, have a major effect and after the fact are often inappropriately rationalized with the benefit of hindsight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Budget

A

Allows for forecasting, monitoring and analyzing financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business

Alignment

A

Involves making the services provided by the corporate IT function more closely reflect the requirements and desires of the business users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Business Continuity Policy

A

A document approved by top management that defines the extent and scope of the business continuity effort within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Business Impact

Analysis (BIA)

A

Used to evaluate the critical processes and to determine time frames, priorities, resources and interdependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Process

Reengineering (BPR)

A

The thorough analysis and significant redesign of business processes and management systems to establish a better performing structure, more responsive to the customer base and market conditions, while yielding material cost savings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Reference Model

A

a function-driven framework that describes the functions and sub-functions performed by the government, independent of the agencies that actually perform them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Capability Maturity
Model Integration (CMMI)
A

a process improvement approach that provides enterprises with the essential elements of effective processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Chargeback

A

Provides all involved parties with a marketplace measure of the effectiveness and efficiency of the service provided by the information processing facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cloud Computing

A

A model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
COBIT Process
Assessment Model (PAM)
A

developed to address the need to improve the rigor and reliability of IT process reviews

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Compliance Management

A

Focuses on implementing processes that address legal and regulatory policy and contractual compliance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Corporate Governance

A

a set of responsibilities and practices used by an organization’s management to provide strategic direction, thereby ensuring that goals are achievable, risk is properly addressed and organizational resources are properly utilized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Classification Policy

A

policy that should describe the classifications, levels of control at each classification and responsibilities of all potential users including ownership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Data Reference Model

A

a framework that describes the data and information that support program and business line operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Disasters

A

Disruptions that cause critical information resources to be inoperative for a period of time, adversely impacting organizational operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Enterprise Architecture (EA)

A

involves documenting an organization’s IT assets in a structured manner to facilitate understanding, management and planning for IT investments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Federal Enterprise

Architecture (FEA)

A

a business and performance based framework to support cross-agency collaboration, transformation and government-wide improvement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Governance of Enterprise IT (GEIT)

A

a system in which all stakeholders, including the board, senior management, internal customers and departments such as finance, provide input into the decision-making process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Governance of

Outsourcing

A

The set of responsibilities, roles, objectives, interfaces and controls required to anticipate change and manage the introduction, maintenance, performance, costs and control of third-party provided services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

High-Level Information Security Policy

A

policy that includes statements on confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Impact

A

The result of a threat agent exploiting a vulnerability

28
Q

Information

Security Governance

A

a subset of corporate governance that provides strategic direction for security activities and ensures that objectives are achieved, that risk is appropriately managed and enterprise information resources are used responsibly

29
Q

Information Security

Policy

A

communicates a coherent security standard to users, management and technical staff

30
Q

Information Security Program

A

a set of activities that provide assurance that information assets are given a level of protection commensurate with their value or the risk their compromise poses to the organization

31
Q

Initiating, Diagnosing, Establishing, Acting, and Learning (IDEAL) Model

A

forms an infrastructure to guide enterprises in planning and implementing an effective software process improvement program and consists of five phases

32
Q

Insourced

A

Fully performed by the organization’s staff

33
Q

Internal-Use

Software

A

Software that an entity has no substantive plans to market externally

34
Q

IT Balanced Scorecard

BSC

A

a process management evaluation technique that can be applied to the GEIT process in assessing IT functions and processes

35
Q

IT Resource Management

A

Focuses on maintaining an updated inventory of all IT resources and addresses the risk management process

36
Q

Key Performance Indicator (KPI)

A

A measure that determines how well the process is performing in enabling the goal to be reached

37
Q

Lean Six Sigma

A

Examines the measurement-oriented strategy focused on process improvement and defect reduction and the efficiency of these processes

38
Q

Life Cycle Cost-Benefit Analysis

A

The assessment of following element to determine strategic direction for IT enterprise systems and overall IT portfolio management

39
Q

Life Cycle Cost (LCC)

A

The estimated costs of maintenance/updates, failure, and maintaining interoperability with mainstream and emerging technologies

40
Q

Life Cycle (LC)

A

A series of stages that characterize the course of existence of an organizational investment

41
Q

Netiquette

A

a description of language that is considered appropriate to use while online

42
Q

Organizational Change

Management

A

Involves use of a defined and documented process to identify and apply technology improvements at the infrastructure and application level that are beneficial to the organization and involve all levels of the organization impacted by the changes

43
Q

Organizational Chart

A

Provides a clear definition of the department’s hierarchy and authorities

44
Q

Outsourced

A

Fully performed by the vendor’s staff

45
Q

Outsourcing

A

The mechanism that allows organizations to transfer the delivery of services to third parties

46
Q

Performance

A

The service perceived by users and stakeholders

47
Q

Performance

Measurement

A

the process of measuring, monitoring and reporting on information security processes to ensure that SMART (specific, measurable, attainable, realistic and timely) objectives are achieved

48
Q

Performance Optimization

A

The process of both improving perceived service performance along with improving information security productivity to the highest level possible without unnecessary, additional investment in the IT infrastructure

49
Q

Performance Reference Model

A

a framework to measure the performance of major IT investments and their contribution to program performance

50
Q

Plan, Do, Check, Act (PDCA)

A

An iterative four-step management method used in business for the control and continuous improvement of processes and products

51
Q

Policies

A

high-level documents that represent the corporate philosophy of an organization

52
Q

Procedures

A

documented, defined steps for achieving policy objectives

53
Q

Process Integration

A

the integration of an organization’s management assurance processes for security

54
Q

Qualitative Risk Analysis

A

Uses words or descriptive rankings to describe the impacts or likelihood

55
Q

Quality Assurance (QA)

A

A planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements

56
Q

Quality Control (QC)

A

The observation techniques and activities used to fulfill requirements for quality

57
Q

Quantitative Risk

Analysis

A

Use numeric values to describe the likelihood and impacts of risk, using data from several types of sources

58
Q

Residual Risk

A

The remaining level of risk after controls have been applied

59
Q

Resource Management

A

the process of utilizing information security knowledge and infrastructure efficiently and effectively

60
Q

Risk Calculation

A

Probability of Occurrence x Magnitude of Impact

61
Q

Root Cause Analysis

A

The process of diagnosis to establish the origins of events

62
Q

Semi-Quantitative Risk Analysis

A

Descriptive rankings are associated with a numeric scale

63
Q

Service Component Reference Model

A

a functional framework that classifies the service components that support business and performance objectives

64
Q

Six Sigma

A

The implementation of a measurement-oriented strategy focused on process improvement and defect reduction

65
Q

Six Sigma Defect

A

Anything outside customer specifications

66
Q

Technical Reference Model

A

a framework that describes how technology supports the delivery, exchange and construction of service components

67
Q

Vulnerabilities

A

Characteristics of information resources that can be exploited by a threat to cause harm