ISC Glossary Flashcards

1
Q

Abstraction

A

Hiding the complexity of tasks to limit user access to relevant information, enhancing security by controlling access to sensitive data.

Users only get access to what they need to do their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acceptance Criteria

A

Measurable and specific criteria established by management to objectively evaluate changes to systems or processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Application Logs

A

Logs recording application data, such as user access, executed functions, and errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Assessment Procedures

A

Objectives with assessment objects and methods, such as examination, interviewing, and testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attestation Risk

A

In an examination or review attest engagement, attestation risk is the risk that the practitioner expresses an inappropriate opinion or conclusion, respectively, when the subject matter information or assertion is materially misstated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

The ability of a business to perform its functions or meet business objectives, including system availability (accessibility of business data and normal IT system operations) and availability of human capital (personnel being ready and able to perform normal operations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

BIA Report

A

A comprehensive report that assesses risks and potential impacts of disruptions at the department, business unit, or product level to form a company-wide business impact analysis (BIA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blockchain

A

A control system originally designed to govern the creation and distribution of cryptocurrencies like Bitcoin. It ensures the immutability and security of transaction through decentralized validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Breach Notification

A

A requirement added by HITECH to HIPAA, obligating covered entities to notify individuals affected by a data breach within 60 days of discovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer Overflow

A

A type of cyberattack in which attackers overload a program’s temporary storage with more inputs than it is designed to hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business Continuity Plans

A

Plans focused on keeping the business operational during a disaster, including contingency and mitigation procedures for all business processes, such as relocating facilities, managing human resources, and maintaining customer and supplier relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Business Impact Analysis (BIA)

A

An assessment process that identifies essential business units, departments, and processes crucial to an entity’s survival and evaluates the impact of failure or disruption on the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Change Advisory Board (CAB)

A

A formal board responsible for reviewing, approving, and planning for system changes, ensuring separate environments for testing, staging, and production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Change Management Controls

A

Measures put in place to minimize risks during the change management process, including policies, standardized change requests, impact assessment, and ongoing monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Change Management Process

A

Steps to successfully manage change, from identification and approval to implementation and monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Change Request

A

A formal proposal for making changes to a system or process, often submitted for review and approval by a change advisory board.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cold Site

A

An off-site location with electrical connections and other physical requirements for data processing but which lacks actual equipment. It requires one to three days to become operational and is the least costly form of off-site location for disaster recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Common Vulnerabilities and Exposures (CVE) List

A

A nomenclature and dictionary of security-related software flaws. Classification schemes are used to assess the likelihood of exploitation and the impact of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Common Vulnerability Scoring System (CVSS)

A

A system for measuring the relative severity of software flaw vulnerabilities. Classification schemes are used to assess the likelihood of exploitation and the impact of vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Communication Plan

A

A plan outlining the process and stakeholders to be notified during incident response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Community Cloud

A

A cloud infrastructure shared by multiple organizations for a common interest, such as regulatory compliance or collaboration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Compliance Objectives

A

Objectives related to adhering to governmental laws and regulations, including industry standards such as NIST, U.S. regulations like HIPAA, and international laws like GDPR.

23
Q

Composite Primary Key

A

When more than one attribute is required to uniquely identify each record in a table, they form a composite primary key.

24
Q

Corrective Controls

A

Measures implemented to rectify known vulnerabilities in response to security incidents, self-assessments, or changes in industry practices.

25
Q

Covert Channels

A

A type of cyberattack transmitting data using methods not originally intended for data transmission by the system designers.

26
Q

Cryptography

A

The practice of secure communication techniques, converting plaintext into ciphertext using encryption algorithms.

27
Q

Data Center

A

A facility that houses computer systems and related components, such as telecommunications and storage systems, with advanced security measures and climate control.

28
Q

Data Classification Scheme

A

Categorizing data based on sensitivity (e.g., internal, public, sensitive, confidential) to understand implications in case of data loss or compromise.

29
Q

Data Flow Diagram (DFD)

A

A visual representation to describe the flow of data through a process.

30
Q

Data Loss Prevention (DLP) Systems

A

Tools that prevent sensitive data from being leaked or accessed by unauthorized users.

31
Q

Data Management Process

A

Securely managing the entire life cycle of data, from identification and classification to disposal.

32
Q

Data Mapping

A

Identifying software applications that access data based on sensitivity levels and consolidating devices and software into separate networks based on sensitivity.

33
Q

Data Minimization

A

A GDPR principle stating that data processing must be limited to what is necessary for the purpose

34
Q

Data Model

A

Conceptual representations of the data structures in an information system.

35
Q

Data Privacy Framework

A

Published by NIST in early 2020 to protect individuals’ data used in data processing applications. It is designed to be industry-agnostic and consider cultural and individual privacy constructs.

36
Q

Database Elements

A

References to table names, attribute names, or criteria used in SQL queries.

37
Q

Database Management System (DBMS)

A

Software that manages databases, enabling users to interact with the data by storing, retrieving, updating, and deleting information.

38
Q

Decentralized Blockchain

A

A blockchain that is not under the control of a central authority, providing resistance to alteration and enabling multiparty transaction validation.

38
Q

Database Schema

A

Defines how data is organized within a relational database.

A set of instructions to tell the database engine how to organize data to be in compliance with the data models.

39
Q

Deficiencies in Design

A

Refers to either necessary controls that are missing existing controls that are not designed properly in a SOC 2 engagement.

40
Q

Description Criteria

A

The criteria used to determine whether the description of the service organization’s system is presented fairly and includes relevant information.

41
Q

Design Factors and Focus Areas

A

Customization options within the COBIT core model that allow organizations to tailor the application of the framework to their specific needs.

42
Q

Detective Measures

A

Security measures that focus on identifying and detecting potential threats or breaches after they occur, such as monitoring and incident response systems.

43
Q

Deviations in Operations of Controls

A

Occurs when properly designed controls either do not operate as designed or are performed by unauthorized or incompetent individuals in a SOC 2 engagement.

44
Q

Device Spoofing

A

Attacker introduce fake devices to gain unauthorized access to networks.

45
Q

Discretionary Access Control (DAC)

A

A security model where access permissions are determined and granted at the discretion of the data owner or administrator.

46
Q

Domain Name System (DNS) Filtering

A

Blocking access to specific domains by filtering domain name system requests.

47
Q

Encapsulation

A

An object-oriented programming principle where data and methods are encapsulated within a class, controlling access and providing data integrity.

48
Q

Endpoint Detection and Response (EDR) Systems

A

Security solutions that monitor and respond to threats on individual devices or endpoints.

49
Q

Enterprise Log Management Process

A

Addresses the entire like cycle of audit logs, from collection to disposal, for incident response, accountability, compliance, and process improvement.

50
Q

Environment Runtime

A

IT infrastructure that supports the running of a particular codebase in real time.

51
Q

Executive Committee

A

A committee within the board of directors responsible for strategic decision making.

52
Q
A