Glossary Flashcards

1
Q

atomicity

A

The characteristic of a complex transaction whereby it is either performed completely as a single unit or not at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

attribute sampling

A

A sampling technique used to study the characteristics of a population to determine how many samples possess a specific characteristic. See also sampling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

audit charter

A

A written document that defines the mission and goals of the audit program as well as roles and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11

A

The wireless network standard commonly known as “Wi-Fi” that can transport data up to 108 Mbit/sec up to a distance of 300 m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.1X

A

A standard for network authentication and access control for devices designed to attach to a LAN or wireless LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

acceptable use

A

Security policy that defines the types of activities that are acceptable and those that are not acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

access bypass

A

Any attempt by an intruder to bypass access controls in order to gain entry into a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

access control

A

Any means that detects or prevents unauthorized access and that permits authorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

access control list (ACL)

A

An access control method where a list of permitted or denied users (or systems, or services, as the case may be) is used to control access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

access control log

A

A record of attempted accesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

access control policy

A

Statement that defines the policy for the granting, review, and revocation of access to systems and work areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

access management

A

A formal business process that is used to control access to networks and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

access point

A

A device that provides communication services using the 802.11 (Wi-Fi) protocol standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

access review

A

A review of the users, systems, or other subjects that are permitted to access protected objects. The purpose of a review is to ensure that all subjects should still be authorized to have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

account lockout

A

An administrative lock that is placed on a user account when a predetermined event occurs, such as reaching an expiration date, or when there have been several unsuccessful attempts to access the user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

accumulation of privileges

A

A situation where an employee accumulates computer system access privileges over a long period of time, due to internal transfers or other privilege changes, and old access privileges are not removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Address Resolution Protocol (ARP)

A

A standard network protocol used to obtain the address for another station on a local area network (LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

administrative audit

A

An audit of operational efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

administrative control

A

Controls in the form of policies, processes, procedures, and standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

agile development

A

Software development process where a large project team is broken up into smaller teams, and project deliverables are broken up into smaller pieces, each of which can be attained in a few weeks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

algorithm

A

In cryptography, a specific mathematical formula that is used to perform encryption, decryption, message digests, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

annualized loss expectancy (ALE)

A

The expected loss of asset value due to threat realization. ALE is defined as SLE × ARO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

annualized rate of occurrence (ARO)

A

An estimate of the number of times that a threat will occur every year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

anti-malware

A

Software that uses various means to detect and block malware. See also antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

antivirus software

A

Software that is designed to detect and remove viruses and other forms of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

AppleTalk

A

The suite of protocols developed by Apple Computer used to transmit packets from one station to another over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

appliance

A

A type of computer with preinstalled software that requires little or no maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

application firewall

A

A device used to control packets being sent to an application server, primarily to block unwanted or malicious content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

application layer (OSI model)

A

Layer 7 of the OSI network model. See also OSI network model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

application layer (TCP/IP model)

A

Layer 4 of the TCP/IP network model. The purpose of the application layer is the delivery of messages from one process to another on the same network or on different networks. See also TCP/IP network model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

application programming language

A

See programming language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

application server

A

A server that runs application software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

architecture standard

A

A standard that defines technology architecture at the database, system, or network level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

arithmetic logic unit (ALU)

A

The part of a central processing unit that performs arithmetic computations. See central processing unit (CPU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

asset inventory

A

The process of confirming the existence, location, and condition of assets; also, the results of such a process.

36
Q

asset management

A

The processes used to manage the inventory, classification, use, and disposal of assets.

37
Q

asset value (AV)

A

The value of an IT asset, which is usually (but not necessarily) the asset’s replacement value.

38
Q

assets

A

The collection of property that is owned by an organization.

39
Q

asymmetric encryption

A

A method for encryption, decryption, and digital signatures that uses pairs of encryption keys, consisting of a public key and a private key.

40
Q

asynchronous replication

A

A type of replication where writing data to the remote storage system is not kept in sync with updates on the local storage system. Instead, there may be a time lag, and there is no guarantee that data on the remote system is identical to that on the local storage system. See also replication.

41
Q

Asynchronous Transfer Mode (ATM)

A

A LAN and WAN protocol standard for sending messages in the form of cells over networks. On an ATM network, all messages are transmitted in synchronization with a network-based time clock. A station that wishes to send a message to another station must wait for the time clock.

42
Q

audit logging

A

A feature in an application, operating system, or database management system where events are recorded in a separate log.

43
Q

audit methodology

A

A set of audit procedures that is used to accomplish a set of audit objectives.

44
Q

audit objective

A

The purpose or goals of an audit. Generally, the objective of an audit is to determine if controls exist and are effective in some specific aspect of business operations in an organization.

45
Q

audit procedures

A

The step-by-step instructions and checklists required to perform specific audit activities. Procedures may include a list of people to interview and questions to ask them, evidence to request, audit tools to use, sampling rates, where and how evidence will be archived, and how evidence will be evaluated.

46
Q

audit program

A

The plan for conducting audits over a long period.

47
Q

audit report

A

The final, written product of an audit. An audit report will include a description of the purpose, scope, and type of audit performed; persons interviewed; evidence collected; rates and methods of sampling; and findings on the existence and effectiveness of each control.

48
Q

audit scope

A

The process, procedures, systems, and applications that are the subject of an audit.

49
Q

authentication

A

The process of asserting one’s identity and providing proof of that identity. Typically, authentication requires a user ID (the assertion) and a password (the proof). However, authentication can also require stronger means of proof, such as a digital certificate, token, smart card, or biometric.

50
Q

authorization

A

The process whereby a system determines what rights and privileges a user has.

51
Q

automated workpapers

A

Data that has been captured by computer-assisted audit techniques. See also computer-assisted audit technique (CAAT).

52
Q

automatic control

A

A control that is enacted through some automatic mechanism that requires little or no human intervention.

53
Q

availability management

A

The IT function that consists of activities concerned with the availability of IT applications and services. See also IT service management (ITSM).

54
Q

back door

A

A section of code that permits someone to bypass access controls and access data or functions. Back doors are commonly placed in programs during development but are removed before programming is complete.

55
Q

background check

A

The process of verifying an employment candidate’s employment history, education records, professional licenses and certifications, criminal background, and financial background.

56
Q

back-out plan

A

A procedure used to reverse the effect of a change that was not successful.

57
Q

backup

A

The process of copying important data to another media device in the event of a hardware failure, error, or software bug that causes damage to data.

58
Q

backup media rotation

A

Any scheme used to determine how backup media is to be reused.

59
Q

balanced scorecard

A

A management tool that is used to measure the performance and effectiveness of an organization.

60
Q

barbed wire

A

Coiled or straight wire with sharp barbs that may be placed along the top of a fence or wall to prevent or deter passage by unauthorized personnel.

61
Q

benchmark

A

The practice of measuring a process in order to compare its performance and quality with the same process as performed by another firm. The purpose is to discover opportunities for improvement that may result in lower cost, fewer resources, and higher quality.

62
Q

biometrics

A

Any use of a machine-readable characteristic of a user’s body that uniquely identifies the user. Biometrics can be used for strong authentication. Types of biometrics include voice recognition, fingerprint, hand scan, palm vein scan, iris scan, retina scan, facial scan, and handwriting. See also authentication, strong authentication.

63
Q

blackmail

A

An attempt to extort money from an individual or organization through a threat of exposure.

64
Q

blackout

A

A complete loss of electric power for more than a few seconds.

65
Q

blade server

A

A type of computer architecture where a main chassis equipped with a power supply, cooling, network, and console connectors contains several slots that are fitted with individual computer modules called blades. Each blade is an independent computer system.

66
Q

block cipher

A

An encryption algorithm that operates on blocks of data.

67
Q

Bluetooth

A

A short-range airlink standard for data communications between peripherals and low-power consumption devices.

68
Q

bollard

A

A barrier that prevents the entry of vehicles into protected areas.

69
Q

Border Gateway Protocol (BGP)

A

A TCP/IP routing protocol that is used to transmit network routing information from one network router to another in order to determine the most efficient path through a large network.

70
Q

bot

A

A type of malware in which agents are implanted by other forms of malware and which are programmed to obey remotely issued instructions. See also botnet.

71
Q

botnet

A

A collection of bots that are under the control of an individual. See also bot.

72
Q

bridge

A

An Ethernet network device that is used to interconnect two or more Ethernet networks.

73
Q

broadcast address

A

The highest numeric IP address in an IP subnet. When a packet is sent to the network’s broadcast address, all active stations on the network will receive it.

74
Q

brownout

A

A sustained drop in voltage that can last from several seconds to several hours.

75
Q

budget

A

A plan for allocating resources over a certain time period.

76
Q

bug sweeping

A

The practice of electronically searching for covert listening devices.

77
Q

bus

A

A component in a computer that provides the means for the different components of the computer to communicate with each other.

78
Q

bus topology

A

A network topology where each station is connected to a central cable.

79
Q

business case

A

An explanation of the expected benefits to the business that will be realized as a result of a program or project.

80
Q

business continuity planning (BCP)

A

The activities required to ensure the continuation of critical business processes.

81
Q

business functional requirements

A

Formal statements that describe required business functions that a system must support.

82
Q

business impact analysis (BIA)

A

A study that is used to identify the impact that different disaster scenarios will have on ongoing business operations.

83
Q

business process reengineering

A

The set of activities related to the process of making changes to business processes.

84
Q

business realization

A

The result of strategic planning, process development, and systems development, which all contribute toward a launch of business operations to reach a set of business objectives.

85
Q

business recovery plan

A

The activities required to recover and resume critical business processes and activities. See also response document.