Glossary- I Flashcards

1
Q

dentification

A

The process of asserting one’s identity without providing proof of that identity. See also authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

identity management

A

The activity of managing the identity of each employee, con- tractor, temporary worker, and, optionally, customer, for use in a single environment or multiple environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

impact

A

The actual or expected result from some action such as a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

impact analysis

A

The analysis of a threat and the impact it would have if it were realized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

implementation

A

A step in the software development life cycle where new or updated software is placed into the production environment and started.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

incident

A

Any event that is not part of the standard operation of a service and that causes, or may cause, interruption to, or a reduction in, the quality of that service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

incident management

A

The IT function that analyzes service outages, service slow- downs, security incidents, and software bugs, and seeks to resolve them to restore nor- mal service. See also IT service management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

incident prevention

A

Proactive steps taken to reduce the probability and/or impact of security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

independence

A

The characteristic of an auditor and his or her relationship to a party being audited. An auditor should be independent of the auditee; this permits the audi- tor to be objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

index

A

An entity in a relational database management system (rDBMS) that facilitates rapid searching for specific rows in a table based on one of the fields other than the pri- mary key. See also relational database management system, table, row, field, and primary key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

inert gas

A

A fire suppression system that floods a room with an inert gas, displacing oxygen from the room and extinguishing the fire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

information classification

A

The process of assigning a sensitivity classification to an information asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

information leakage

A

The tendency for sensitive information to leak out of an organi- zation’s databases through various means, most of which are perpetrated by the orga- nization’s personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

information security management

A

The aggregation of policies, processes, proce- dures, and activities to ensure that an organization’s security policy is effective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

information security policy

A

A statement that defines how an organization will clas- sify and protect its important assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Infrared Data Association (IrDA)

A

The organization that has developed technical standards for point-to-point data communications using infrared light. IrDA has large- ly been replaced with Bluetooth and USB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

infrastructure

A

The collection of networks, network services, devices, facilities, and system software that facilitate access to, communications with, and protection of busi- ness applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

infrastructure as a service

A

A cloud computing model where a service provider makes computers and other infrastructure components available to subscribers. See also cloud computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

inherent risk

A

The risk that there are material weaknesses in existing business pro- cesses and no compensating controls to detect or prevent them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

inheritance

A

The property of a class where class attributes are passed to its children. See also class.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

initialization vector (IV)

A

A random number that is needed by some encryption algo- rithms to begin the encryption process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

input authorization

A

Controls that ensure all data that is input into an information system is authorized by management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

input controls

A

Administrative and technical controls that determine what data is per- mitted to be input into an information system. These controls exist to ensure the integ- rity of information in a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

input validation

A

Controls that ensure the type and values of information that are input into a system are appropriate and reasonable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

input/output (I/O) device

A

Any device that can be connected to a computer that per- mits the computer to send data to the device as well as receive data from the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

inquiry and observation

A

An audit technique where an IS auditor asks questions of interviewees and makes observations about personnel behavior and the way they per- form their tasks.

27
Q

inrush

A

A sudden increase in current flowing to a device, usually associated with the startup of a large motor. This can cause a voltage drop that lasts several seconds.

28
Q

insourcing

A

A form of sourcing where an employer will use its own employees to per- form a function.

29
Q

instant messaging (IM)

A

Any of several TCP/IP application layer protocols and tools used to send short text messages over a network.

30
Q

integrated audit

A

An audit that combines an operational audit and a financial audit. See also operational audit, financial audit.

31
Q

integrated services digital network (ISDN)

A

A common carrier telephone network used to carry voice and data over landlines. ISDN can be thought of as a digital version of the PSTN. See also public-switched telephone network (PSTN).

32
Q

integrated test facility (ITF)

A

A type of automated test where an auditor creates ficti- tious transactions to trace their integrity through the system.

33
Q

intellectual property

A

A class of assets owned by an organization; includes an organi- zation’s designs, architectures, software source code, processes, and procedures.

34
Q

interior gateway routing protocol (IGRP)

A

A TCP/IP routing protocol that is used to transmit network routing information from one network router to another in order to determine the most efficient path through a large network.

35
Q

intermediate system to intermediate system (IS-IS)

A

A TCP/IP routing protocol that is used to transmit network routing information from one network router to another in order to determine the most efficient path through a large network.

36
Q

Internet

A

The interconnection of the world’s TCP/IP networks.

OR

Layer 2 of the TCP/IP network model. The purpose of the Internet layer is the delivery of messages (called packets) from one station to another on the same network or on different networks. See also TCP/IP network model.

37
Q

Internet Control Message Protocol (ICMP)

A

A communications diagnostics protocol

that is a part of the TCP/IP suite of protocols.

38
Q

Internet Message Access Protocol (IMAP)

A

A TCP/IP application layer protocol used by an end-user program to retrieve e-mail messages from an e-mail server.

39
Q

Internet Protocol (IP)

A

The network layer protocol used in the TCP/IP suite of proto- cols. IP is concerned with the delivery of packets from one station to another, whether the stations are on the same network or on different networks.

40
Q

Internet Protocol Security (IPsec)

A

A suite of protocols that is used to secure IP-based communications by using authentication and encryption.

41
Q

interprocess communications (IPC)

A

Any of several protocols used for communica- tions between running processes on one system or between systems.

42
Q

intrusion detection system (IDS)

A

A hardware or software system that detects anoma- lies that may be signs of an intrusion.

43
Q

intrusion prevention system (IPS)

A

A hardware or software system that detects and blocks anomalies that may be signs of an intrusion.

44
Q

IP address

A

An address assigned to a station on a TCP/IP network.

45
Q

IS audit

A

An audit of an IS department’s operations and systems.

46
Q

IS operations

A

The day-to-day control of the information systems, applications, and infrastructure that support organizational objectives and processes.

47
Q

ISACA audit guidelines

A

Published documents that help the IS auditor apply ISACA audit standards.

48
Q

ISACA audit procedures

A

Published documents that provide sample procedures for performing various audit activities and for auditing various types of technologies and systems.

49
Q

ISACA audit standards

A

The minimum standards of performance related to security, audits, and the actions that result from audits. The standards are published by ISACA and updated periodically. ISACA audit standards are considered mandatory.

50
Q

ISAE 3402 (International Standard on Assurance Engagement)

A

An external audit of a service provider. An ISAE3402 audit is performed according to rules established by the International Auditing and Assurance Standards Board (IAASB).

51
Q

ISO 15504

A

A world standard for evaluating the maturity of a software development process.

52
Q

ISO 20000

A

A world standard for IT service management.

53
Q

ISO 27001

A

A world standard for IT security management.

54
Q

ISO 38500

A

A world standard for corporate governance of information technology.

55
Q

ISO 9000

A

A world standard for a quality management system.

56
Q

ISO 9126

A

A world standard for evaluating the quality of software.

57
Q

SO 9660

A

A file system used on CD-ROM and DVD-ROM media.

58
Q

IT Assurance Framework (ITAF)

A

An end-to-end framework developed to guide orga-

nizations in developing and managing IT assurance and IT audit.

59
Q

IT balanced scorecard

A

A balanced scorecard used to measure IT organization perfor-

mance and results. See also balanced scorecard.

60
Q

IT governance

A

Management’s control over IT policy and processes.

61
Q

IT Infrastructure Library (ITIL)

A

See IT service management.

62
Q

IT service management

A

The set of activities that ensure the delivery of IT services is efficient and effective, through active management and the continuous improvement of processes.

63
Q

IT steering committee

A

A body of senior managers or executives that discusses high- level and long-term issues in the organization.