CISM Vocabulary Flashcards
Administrative controls
policies, processes, procedures, standards
Annualized Loss Expectancy
ALE = SLExARO
architecture standard
defines technology architecture at the database, system, or network level
assessment
an examination that determines the effectiveness of a system or process
asset value
the value of an IT asset - usually but not always the Replacement Value
Asynchronous Replication
writing to data in a remote system is not synchronized with the local system.
No guarantee that remote system is identical to local system
Might be a time lag
Attestation of compliance
assertion of compliance to a law, standard or requirement
Typically signed by high ranking official
authentication
asserting an identity and providing proof of it
typically requires an ID (assertion) and a password (proof)
business email compromise
ceo fraud
perpetrator impersonates a CEO and gets company personnel to transfer large amounts of money, typically for a “secret merger” or “acquisition”
Business Impact Analysis
Study to identify the impact that different disaster scenarios will have on business operations
Business Recovery Plan
activities required to recover and resume critical business processes and activities
capability maturity model
measures relative maturity of an organization and its processes
capability maturity model for Development
CMMi-DEV
maturity model used to measure software development process maturity
certification practicer statement (CPS)
describes practices used by the CA to issue and manage digital certificates
Change Control Board
aka
Change Advisory Board
stakeholders from IT and Business who propose, discuss, approve changes to the IT systems
CIS Controls
framework maintained by the Center for Internet Security (CIS)
COBIT
published by ISACA
control framework for managing information systems and security
COSO
Committee of Sponsoring Organizations of the Treadway Commission
Organization providing control frameworks and guidance on enterprise risk management
COOP
Continuity of Operations Plan
activities required to continue critical and strategic business functions at alternate site
Control
Policy, Process or Procedure created to ensure desired outcomes or to avoid unwanted outcomes
Control Framework
Collection of controls organized in logical categories
Covered Entity
any organization that stores or processes information covered by HIPAA
Critical Path Methodology (CPM)
Technique used to identify the most critical path in a project to understand which tasks are most likely to affect the project schedule
Criticality Analysis (CA)
Study of each system and process, a consideration of the impact on the organization if it’s incapacitated, the likelihood of incapacitation and the estimated cost of mitigating the impact (risk)