Terms and Definitions Flashcards
Acceptable use policy (AUP)
A policy that establishes an agreement between users and the enterprise that defines, for all parties, the ranges of use that are approved before gaining access to a network or the Internet
Access control
The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises
Access control list (ACL)
An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals
Scope Notes: Also referred to as access control table
Access control table
An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals
Access method
The technique used for selecting records in a file, one at a time, for processing, retrieval or storage. The access method is related to, but distinct from, the file organization, which determines how the records are stored.
Access rights
The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy
Administrative controls
The rules, procedures and practices dealing with operational effectiveness, efficiency and adherence to regulations and management policies
Anonymous File Transfer Protocol (AFTP)
A method of downloading public files using the File Transfer Protocol (FTP). AFTP does not require users to identify themselves before accessing files from a particular server. In general, users enter the word anonymous when the host prompts for a username. Anything can be entered for the password, such as the users email address or simply the word guest. In many cases, an AFTP site will not prompt a user for a name and password.
Antivirus software
An application software deployed at multiple points in an IT architecture. It is designed to detect and potentially eliminate virus code before damage is done and repair or quarantine files that have already been infected.
Application
A computer program or set of programs that performs the processing of records for a specific function
Scope Notes: Applications contrast with systems programs, such as an operating system or network control program, and with utility programs, such as copy or sort.
Application controls
The policies, procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
Application layer
The application layer provides services for an application program to ensure that effective communication with another application program in a network is possible in the Open Systems Interconnection (OSI) communications model
Application programming interface (API)
A set of routines, protocols and tools referred to as building blocks used in business application software development
Artificial intelligence (AI)
An advanced computer system that can simulate human capabilities, such as analysis, based on a predetermined set of rules
Asymmetric key (public key)
A cipher technique in which different cryptographic keys are used to encrypt and decrypt a message
Scope Notes: See public key encryption.
Audit evidence
The information used to support the audit opinion
Audit objective
The specific goal(s) of an audit
Scope Notes: These often center on substantiating the existence of internal controls to minimize business risk
Audit plan
- A plan containing the nature, timing and extent of audit procedures to be performed by engagement team members in order to obtain sufficient appropriate audit evidence to form an opinion.
Scope Notes: Includes the areas to be audited, the type of work planned, the high-level objectives and scope of the work. It also includes topics such as budget, resource allocation, schedule dates, type of report and its intended audience and other general aspects of the work.
- A high-level description of the audit work to be performed in a certain period of time
Audit program
A step-by-step set of audit procedures and instructions that should be performed to complete an audit
Audit risk
The risk of reaching an incorrect conclusion based upon audit findings
Scope Notes: The three components of audit risk are:
Control risk
Detection risk
Inherent risk
Audit trail
A logical path linking a sequence of events, in the form of data, used to trace the transactions that have affected the contents of a record
Source : ISO
Authentication
The act of verifying the identity of a user, the users eligibility to access computerized information
Scope Notes: Authentication is designed to protect against fraudulent logon activity. It can also refer to the verification of the correctness of a piece of data.
Backup
The files, equipment, data and procedures available for use in the event of a failure or loss, if the originals are destroyed or out of service
Balanced scorecard (BSC)
A coherent set of performance measures organized into four categories that include traditional financial measures and customer, internal business process and learning and growth perspectives. Developed by Robert S. Kaplan and David P. Norton.
Benchmarking
A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business
Scope Notes: Examples include benchmarking of quality, logistic efficiency and various other metrics.
Biometrics
A security technique that verifies an individuals identity by analyzing a unique physical attribute, such as a handprint
Black box testing
A testing approach that focuses on the functionality of the application or product and does not require knowledge of the code intervals
Broadband
Multiple channels that are formed by dividing the transmission medium into discrete frequency segments
Scope Notes: Broadband generally requires the use of a modem.
Brouter
A device that performs the functions of both a bridge and a router
Scope Notes: A brouter operates at both the data link and network layers. It connects same data link type LAN segments as well as different data link ones, which is a significant advantage. Like a bridge, it forwards packets based on the data link layer address to a different network of the same type. Also, it processes and forwards messages to a different data link type network based on the network protocol address whenever required. When connecting same data link type networks, it is as fast as a bridge.
Bus
A common path or channel between hardware devices
Scope Notes: Can be located between internal computer components or between external computers in a communication network
Bus configuration
A configuration in which all devices (nodes) are linked along one communication line where transmissions are received by all attached nodes
Scope Notes: This architecture is reliable in very small networks, as well as easy to use and understand. This configuration requires the least amount of cable to connect the computers together and, therefore, is less expensive than other cabling arrangements. It is also easy to extend, and two cables can be easily joined with a connector to make a longer cable to allow more computers to join the network. A repeater can also be used to extend a bus configuration.
Business case
Documentation of the rationale for making a business investment that is used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cycle
Business continuity plan (BCP)
A plan used by an enterprise to respond to the disruption of critical business processes (depends on the contingency plan for the restoration of critical systems)
Business impact analysis (BIA)
The process of evaluating the criticality and sensitivity of information assets by determining the impact of losing the support of any resource to an enterprise. This establishes the escalation of a loss over time, identifies the minimum resources needed to recover and prioritizes the recovery of processes and the supporting system.
Scope Notes: This process captures income loss, unexpected expense, legal issues (regulatory compliance or contractual), interdependent processes and loss of public reputation or public confidence.
Business process reengineering (BPR)
The thorough analysis and significant redesign of business processes and management systems to establish a better-performing structure that is more responsive to the customer base and market conditions while yielding material cost savings
Business risk
The probability that a situation with uncertain frequency and magnitude of loss (or gain) could prevent the enterprise from meeting its business objectives
Capability Maturity Model Integration (CMMI)
An integrated model of best practices that enable businesses to improve performance by improving their processes. Product teams developed the model with global members from across the industry. The CMMI provides a best-practice framework for building, improving and sustaining process capability.
See CMMI product suite
Card swipe
A physical control technique that uses a secured card or ID to gain access to a highly sensitive location
Scope Notes: If built correctly, card swipes act as a preventive control over physical access to sensitive locations. After a card has been swiped, the application attached to the physical card swipe device logs all card users who try to access the secured location. In this way, the card swipe device prevents unauthorized access and logs all attempts to enter the secured location.
Central processing unit (CPU)
Computer hardware that houses the electronic circuits that control/direct all operations of a computer system
Certificate (Certification) authority (CA)
A trusted third party that serves authentication infrastructures or enterprises, registers entities and issues entities certificates
Certificate revocation list (CRL)
An instrument for checking the continued validity of the certificates for which the certification authority (CA) has responsibility
Scope Notes: The CRL details digital certificates that are no longer valid. The time gap between two updates is critical and poses a risk in digital certificate verification.
Certification practice statement (CPS)
A detailed set of rules governing the certificate authority’s (CA) operations. It provides an understanding of the value and trustworthiness of certificates issued by a given CA.
Scope Notes: In terms of the controls an enterprise observes, this is the method used to validate the authenticity of certificate applicants and the CAs expectations of how its certificates may be used.
Chain of custody
The process of evidence handling (from collection to presentation) that is necessary to maintain the validity and integrity of evidence
Scope Notes: Includes documentation of who had access to the evidence and when and the ability to identify that the evidence is the exact item that was recovered or tested. Lack of control over evidence can lead to it being discredited. Chain of custody depends on verifying that evidence could not have been tampered with. This is accomplished by sealing off the evidence so it cannot be changed and providing a documentary record of custody to prove that the evidence was, at all times, under strict control and not subject to tampering.
Challenge/response token
A method of user authentication carried out through use of the Challenge Handshake Authentication Protocol (CHAP)
Scope Notes: When a user tries to log into the server using CHAP, the server sends the user a challenge, which is a random value. The user enters a password, which is used as an encryption key to encrypt the challenge and return it to the server. The server is aware of the password. It, therefore, encrypts the challenge value and compares it with the value received from the user. If the values match, the user is authenticated. The challenge/response activity continues throughout the session, protecting it from password-sniffing attacks. In addition, CHAP is not vulnerable to man-in-the-middle attacks because the challenge value is a random value that changes on each access attempt.
Change management (CM)
A holistic and proactive approach to managing the transition from a current to a desired organizational state, focusing specifically on the critical human, or “soft,” elements of change (ISACA)
Scope Notes: Includes activities such as culture change (values, beliefs and attitudes), development of reward systems (measures and appropriate incentives), organizational design, stakeholder management, human resources policies and procedures, executive coaching, change leadership training, team building and communication planning and execution.
Ciphertext
Information generated by an encryption algorithm to protect the plaintext that is unintelligible to the unauthorized reader
Circuit-switched network
A data transmission service that requires establishing a circuit-switched connection before data can be transferred from source data terminal equipment (DTE) to a sink DTE
Scope Notes: A circuit-switched data transmission service uses a connection network.
Circular routing
In open systems architecture, the logical path of a message in a communication network based on a series of gates at the physical network layer in the open systems interconnection (OSI) model
Client-server
A term used to broadly describe the relationship between the receiver and provider of a service. Generally, the client-server describes a networked system where front-end applications, like the client, make service requests to another networked system. Client-server relationships are defined primarily by software. In a local area network (LAN), the workstation is the client, and the file server is the server. However, client-server systems are inherently more complex than file-server systems. Two disparate programs must work in tandem, and there are many more decisions to make about separating data and processing between the client workstations and the database server. The database server encapsulates database files and indexes, restricts access, enforces security and provides applications with a consistent interface to data via a data dictionary.
Cloud computing
Convenient, scalable on-demand network access to a shared pool of resources that can be provisioned rapidly and released with minimal management effort or service provider interaction
Coaxial cable
A cable composed of an insulated wire that runs through the middle of each cable, a second wire that surrounds the insulation of the inner wire like a sheath and the outer insulation that wraps the second wire
Scope Notes: Has a greater transmission capacity than standard twisted-pair cables but has a limited range of effective distance
Cold site
An IS backup facility that has the necessary electrical and physical components of a computer facility but does not have the computer equipment in place
Scope Notes: The site is ready to receive the necessary replacement computer equipment in the event that the users have to move from the main computing location to the alternative computer facility.
Compensating control
An internal control that reduces the risk of an existing or potential control weakness resulting in errors and omissions
Completely connected (mesh) configuration
A network topology in which devices are connected with many redundant interconnections between network nodes (primarily used for backbone networks)
Compliance testing
Control tests designed to obtain evidence on both the effectiveness of the controls and their operation during the audit period
Comprehensive audit
An audit designed to determine the accuracy of financial records and evaluate the internal controls of a function or department
Computer emergency response team (CERT)
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group acts as an efficient corrective control and should also be the single point of contact for all incidents and issues related to information systems.
Computer forensics
The application of the scientific method to digital media to establish factual information for judicial review
Scope Notes: This process often involves investigating computer systems to determine whether they have been used for illegal or unauthorized activities. As a discipline, it combines elements of law and computer science to collect and analyze data from information systems (e.g., personal computers, networks, wireless communication and digital storage devices) in a way that makes it admissible as evidence in a court of law.
Computer-assisted audit technique (CAAT)
Any automated audit technique, such as generalized audit software (GAS), test data generators, computerized audit programs and specialized audit utilities
Configuration management (CM)
The control of changes to a set of configuration items over a system life cycle
Contingency planning
Process of developing advance arrangements and procedures that enable an enterprise to respond to an event that might occur by chance or unforeseen circumstances
Continuous auditing approach
Allows IS auditors to monitor system reliability on a continuous basis and to gather selective audit evidence through the computer
Control objective
A statement of the desired result or purpose to be achieved by implementing control procedures in a particular process
Control practice
Key control mechanism that supports the achievement of control objectives through responsible use of resources, appropriate management of risk and alignment of IT with business
Control risk
Risk that assets are lost/compromised or that financial statements are materially misstated, due to lack of, or ineffective, design and/or implementation of internal controls
Cookie
A web browser message used for the purpose of identifying users and possibly preparing customized web pages for them
Scope Notes: The first time a cookie is set, a user may be required to go through a registration process. Subsequent to this, whenever the cookies message is sent to the server, a customized view based on that users preferences can be produced. The browsers implementation of cookies has, however, brought several security concerns, allowing breaches of security and the theft of personal information (e.g., user passwords that validate the user identity and enable restricted web services).
Corrective control
A control designed to correct errors, omissions, unauthorized uses and intrusions, once they are detected
Countermeasure
The reduction of threats or vulnerabilities through any direct process
Critical success factor (CSF)
The most important issue or action for management to achieve control over and within its IT processes
Data custodian
Individual(s) and department(s) responsible for the storage and safeguarding of computerized data
Data Encryption Standard (DES)
A legacy algorithm for encoding binary data that was deprecated in 2006. DES and its variants were replaced by the Advanced Encryption Standard (AES).
Data leakage
Unauthorized transmission of data from an organization, either electronically or physically
Data owner
Individual(s) who has responsibility for the integrity, accurate reporting and use of computerized data
Data security
The controls that seek to maintain confidentiality, integrity and availability of information
Database
A collection of data, often with controlled redundancy, organized according to a schema to serve one or more applications. The data are stored so that they can be used by different programs without considering the data structure or organization. A common approach is used to add new data and modify and retrieve existing data.
Database administrator (DBA)
An individual or department responsible for the security and information classification of the shared data stored on a database system. This responsibility includes the design, definition and maintenance of the database.
Database management system (DBMS)
A software system that controls the organization, storage and retrieval of data in a database
Decision support systems (DSS)
An interactive system that provides the user with easy access to decision models and data to support semistructured decision-making tasks
Decryption
A technique used to recover the original plaintext from the ciphertext so that it is intelligible to the reader. The decryption is a reverse process of the encryption.
Decryption key
A digital piece of information used to recover plaintext from the corresponding ciphertext by decryption
Degauss
The application of variable levels of alternating current for the purpose of demagnetizing magnetic recording media.
Scope Notes: The process involves increasing the alternating current field gradually from zero to some maximum value and back to zero, leaving a very low residue of magnetic induction on the media. Degauss loosely means to erase.
Detective control
Controls designed to detect and report when errors, omissions and unauthorized uses or entries occur
Digital certificate
An electronic credential that permits an entity to exchange information securely via the Internet using the public key infrastructure (PKI)
Digital signature
An electronic identification of a person or entity using a public key algorithm that serves as a way for the recipient to verify the identity of the sender, integrity of the data and proof of transaction
Disaster recovery plan (DRP)
A set of human, physical, technical and procedural resources to recover, within a defined time and cost, an activity interrupted by an emergency or disaster
Discovery sampling
A form of attribute sampling that is used to determine a specified probability of finding at least one example of an occurrence (attribute) in a population.
Discretionary access control (DAC)
Logical access control filters that may be configured or modified by the users or data owners
Domain name system (DNS)
A hierarchical database distributed across the Internet, which allows names to be resolved into IP addresses (and vice versa) to locate services, such as web and email servers
Domain name system (DNS) poisoning
Corrupts the table of an Internet servers DNS, replacing an Internet address with the address of a vagrant or scoundrel address
Scope Notes: If a web user looks for the page with that address, the request is redirected by the scoundrel entry in the table to a different address. Cache poisoning differs from another form of DNS poisoning in which the attacker spoofs valid email accounts and floods the in-boxes of administrative and technical contacts. Cache poisoning is related to URL poisoning or location poisoning, in which an Internet users behavior is tracked by adding an identification number to the location line of the browser that can be recorded as the user visits successive pages on the site. It is also called DNS cache poisoning or cache poisoning.
Dry-pipe fire extinguisher system
A sprinkler system that does not have water in the pipes during idle usage, unlike a fully charged fire extinguisher system that has water in the pipes at all times
Scope Notes: The dry-pipe system is activated at the time of the fire alarm and water is emitted to the pipes from a water reservoir for discharge to the location of the fire.
Dynamic Host Configuration Protocol (DHCP)
A protocol used by networked computers (clients) to obtain IP addresses from DHCP servers, and parameters such as default gateways, subnet masks and domain name system (DNS) server IP addresses
Scope Notes: The DHCP server ensures that all IP addresses are unique (e.g., no IP address is assigned to a second client while the first clients assignment is valid [its lease has not expired]). Thus, IP address pool management is done by the server and not by a human network administrator.
Ecommerce
The processes by which enterprises conduct business electronically with their customers, suppliers and other external business partners, using the Internet as an enabling technology.
Scope Notes: Ecommerce encompasses both business-to-business (B2B) and business-to-consumer (B2C) ecommerce models, but does not include existing non-Internet ecommerce methods based on private networks such as electronic data interchange (EDI) and Society for Worldwide Interbank Financial Telecommunication (SWIFT).
Electronic data interchange (EDI)
The electronic transmission of transactions (information) between two enterprises. EDI promotes a more efficient paperless environment. EDI transmissions can replace the use of standard documents, including invoices or purchase orders.