Key Terms Flashcards

1
Q

What is access control?

A

The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a vulnerability scanner?

A

A piece of software designed to scan a system to determine what services the system is running and whether any unnecessary open ports, operating systems and applications, or back doors can be exploited because of a lack of patching or other flaw.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a vulnerability assessment?

A

An assessment that attempts to discover all potential weaknesses for an asset. Often designed for a third party to come into an organisation, take stock of the assets that will be covered within the scope of the assessment, conduct scans and other tests against those assets, and provide a report of the vulnerabilities that have been found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a vulnerability?

A

A weakness in a system or asset, such as a flaw in software code; it can also be considered to be a lack of protection for an asset, such as an unlocked server room door.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is threat modeling?

A

A threat assessment that attempts to determine all possible vectors of attack and includes risk factors that may affect the ability of a threat actor to initiate or complete a threat event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 5-whys?

A

A technique used to determine an issue’s root causes. It involves asking the question “Why?” repeatedly until the root causes are identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is A/B testing?

A

A statistical way of comparing two (or more) techniques, typically an incumbent against a new rival. A/B testing aims to determine not only which technique performs better but also whether the difference is statistically significant. A/B testing usually considers only two techniques using one measurement but can be applied to any finite number of techniques and measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a threat actor/agent?

A

An entity that has the intent to initiate a threat event. This doesn’t have to be a person; it could also be in nature, in the case of a natural disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Acceptable interruption window (AIW)?

A

The maximum period of time that a system can be unavailable before compromising the achievement of the enterprise’s business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Abend?

A

An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Acceptance criteria?

A

Criteria that a solution must satisfy to be accepted by customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Acceptance testing?

A

Testing performed to determine whether a customer, acquirer, user, or their designee should accept a solution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Access control list?

A

An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Access control table?

A

An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Access rights?

A

The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is access risk?

A

The risk that information may be divulged or made available to recipients without authorized access from the information owner, reflecting a loss of confidentiality

15
Q

What is a Action plan reappraisal (APR)?

A

A bounded set of appraisal activities performed to address nonsystemic weaknesses that lead to a limited set of unsatisfied practice groups in an appraisal. The APR includes:

Conducting an eligibility analysis

Gaining authorization from ISACA

Reviewing and obtaining approval to proceed from the Appraisal Sponsor

Modifying the existing appraisal plan

Conducting a reappraisal of unsatisfied practice groups

Reporting the results to ISACA

16
Q

What is an Advanced persistent threat (APT)?

A

An adversary that possesses sophisticated levels of expertise and significant resources, which allow them to create opportunities to achieve their objectives by using multiple attack vectors, e.g., cyber, physical and deception. These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information; undermining or impeding critical aspects of a mission themselves to carry out these objectives in the future. An advanced persistent threat (APT):

Pursues its objectives repeatedly over an extended period of time

Adapts to defenders’ efforts to resist it

Is determined to maintain the level of interaction needed to execute its objectives

17
Q

What is an audit?

A

A formal inspection and verification to check whether a standard or set of guidelines is being followed, records are accurate or efficiency and effectiveness targets are being met

18
Q

What is an auditable unit?

A

The subjects, units or systems that are capable of being defined and evaluated

Scope Notes: Auditable units may include:

Policies, procedures and practices

Cost centers, profit centers and investment centers

General ledger account balances

Information systems (manual and computerized)

Major contracts and programs

Organizational units, such as product or service lines

Functions, such as information technology (IT), purchasing, marketing, production, finance, accounting and human resources (HR)

Transaction systems for activities, such as sales, collection, purchasing, disbursement, inventory and cost accounting, production, treasury, payroll, and capital assets

Financial statements

Laws and regulations

19
Q

What is audit risk?

A
20
Q

What is a Business continuity plan (BCP)?

A

A plan used by an enterprise to respond to the disruption of critical business processes

21
Q

What is a business dependency assessment? (BDA)

A

A process of identifying resources critical to the operation of a business process

22
Q

What is a Business function?

A

An activity that an enterprise does, or needs to do, to achieve its objectives

23
Q

What is a business impact analysis?

A

The process of evaluating the criticality and sensitivity of information assets by determining the impact of losing the support of any resource to an enterprise. This establishes the escalation of a loss over time, identifies the minimum resources needed to recover and prioritizes the recovery of processes and the supporting system.

Scope Notes: This process captures income loss, unexpected expense, legal issues (regulatory compliance or contractual), interdependent processes and loss of public reputation or public confidence.

24
Q

What is a CASB?

A

Software or appliances that are positioned between an enterprise technology infrastructure and a cloud service provider (CSP)

25
Q

What is compartmentalisation?

A

A process for protecting very high-value assets or environments where trust is an issue. Access to an asset requires two or more processes, controls or individuals.

26
Q

What is compliance risk?

A

The probability and consequences of an enterprise failing to comply with laws, regulations or the ethical standards and codes of conduct applicable to the enterprise’s industry

27
Q

What is continuous risk and control monitoring?

A

A process that includes:

Developing a strategy to regularly evaluate selected information and technology (I&T)-related controls/metrics

Recording and evaluating I&T-related events and the effectiveness of the enterprise in dealing with those events

Recording changes to I&T-related controls or changes that affect I&T-related risk

Communicating the current risk and control status to enable information-sharing decisions involving the enterprise

28
Q
A