Glossary Flashcards

1
Q

5-Whys

A

A technique used to determine an issue’s root causes. This technique involves asking the question “Why?” repeatedly until the root cause is identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A/B testing

A

A statistical way of comparing two (or more) techniques, typically an incumbent against a new rival. A/B testing aims to determine not only which technique performs better but also whether the difference is statistically significant. A/B testing usually considers only two techniques using one measurement but can be applied to any finite number of techniques and measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Abend

A

An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Acceptable interruption window

A

The maximum period of time that a system can be unavailable before compromising the achievement of the enterprise’s business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Acceptable use policy

A

A policy that establishes an agreement between users and the enterprise that defines, for all parties, the ranges of use that are approved before gaining access to a network or the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Acceptance criteria

A

Criteria that a solution must satisfy to be accepted by customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acceptance testing

A

Testing performed to determine whether a customer, acquirer, user, or their designee should accept a solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Access control

A

The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Access control list (ACL)

A

An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals

Scope Notes: Also referred to as access control table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Access control table

A

An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals

Scope Notes: Also referred to as Access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Access method

A

The technique used for selecting records in a file, one at a time, for processing, retrieval or storage. The access method is related to, but distinct from, the file organization, which determines how the records are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Access path

A

The logical route that an end user takes to access computerized information.

Scope Notes: Typically includes a route through the operating system, telecommunications software, selected application software and the access control system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access rights

A

The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Access risk

A

The risk that information may be divulged or made available to recipients without authorized access from the information owner, reflecting a loss of confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Access server

A

Provides centralized access control for managing remote access dial-up services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Accountability

A

The ability to map a given activity or event back to the responsible party

17
Q

Accountability of governance

A

Governance ensures that enterprise objectives are achieved by evaluating stakeholder needs, conditions and options; setting direction through prioritization and decision making; and monitoring performance, compliance and progress against plans. In most enterprises, governance is the responsibility of the board of directors under the leadership of the chairperson.

Scope Notes: COBIT 5 and COBIT 2019 perspective

18
Q

Accountable party

A

The individual, group or entity that is ultimately responsible for a subject matter, process or scope

Scope Notes: Within the IT Assurance Framework (ITAF), the term “management” is equivalent to “accountable party.”

19
Q

Accuracy

A

The fraction of predictions that a classification model predicted correctly. In multiclass classification, accuracy is defined as correct predictions divided by total number of examples. In binary classification, accuracy is defined as (true positives plus true negatives) divided by total number of examples.

20
Q

Acknowledgment (ACK)

A

A flag set in a packet to indicate to the sender that the previous packet sent was accepted correctly by the receiver without errors, or that the receiver is now ready to accept a transmission

21
Q

Acquirer

A

The stakeholder who obtains a solution from a supplier

See Affected stakeholder

22
Q

Acquisition

A

Obtaining solutions by establishing and executing supplier agreements

See Supplier agreement

23
Q

Action

A

In reinforcement learning, the mechanism by which the agent transitions between states of the environment. The agent chooses the action by using a policy.