Glossary- A Flashcards

1
Q

acceptable use

A

Security policy that defines the types of activities that are acceptable and those that are not acceptable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

access bypass

A

Any attempt by an intruder to bypass access controls in order to gain entry into a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

access control

A

Any means that detects or prevents unauthorized access and that per- mits authorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

access control list (ACL)

A

An access control method where a list of permitted or de- nied users (or systems, or services, as the case may be) is used to control access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

access control log

A

A record of attempted accesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

access control policy

A

Statement that defines the policy for the granting, review, and
revocation of access to systems and work areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

access management

A

A formal business process that is used to control access to net- works and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

access point

A

A device that provides communication services using the 802.11 (Wi-Fi) protocol standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

access review

A

A review of the users, systems, or other subjects that are permitted to access protected objects. The purpose of a review is to ensure that all subjects should still be authorized to have access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

account lockout

A

An administrative lock that is placed on a user account when a pre- determined event occurs, such as reaching an expiration date, or when there have been several unsuccessful attempts to access the user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

address resolution protocol (ARP)

A

A standard network protocol used to obtain the address for another station on a local area network (LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

administrative audit

A

An audit of operational efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

administrative control

A

Controls in the form of policies, processes, procedures, and

standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

agile development

A

Software development process where a large project team is bro- ken up into smaller teams, and project deliverables are broken up into smaller pieces, each of which can be attained in a few weeks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

algorithm

A

In cryptography, a specific mathematical formula that is used to perform encryption, decryption, message digests, and digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

annualized loss expectancy (ALE)

A

The expected loss of asset value due to threat real- ization. ALE is defined as SLE × ARO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

annualized rate of occurrence (ARO)

A

An estimate of the number of times that a threat will occur every year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

anti-malware

A

See antivirus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

antivirus software

A

Software that is designed to detect and remove viruses and other
forms of malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AppleTalk

A

The suite of protocols used to transmit packets from one station to an- other over a network.

21
Q

appliance

A

A type of computer with preinstalled software that requires little or no maintenance.

22
Q

application

A

Layer 7 of the OSI network model. See also OSI network model.

OR

Layer 4 of the TCP/IP network model. The purpose of the application layer is the delivery of messages from one process to another on the same network or on different networks. See also TCP/IP network model.

23
Q

application firewall

A

A device used to control packets being sent to an application server, primarily to block unwanted or malicious content.

24
Q

application programming language

A

See programming language.

25
Q

application server

A

A server that runs application software.

26
Q

architecture standard

A

A standard that defines technology architecture at the data- base, system, or network level.

27
Q

arithmetic logic unit (ALU)

A

The part of a central processing unit that performs arith- metic computations. See central processing unit.

28
Q

asset inventory

A

The process of confirming the existence, location, and condition of assets; also, the results of such a process.

29
Q

asset management

A

The processes used to manage the inventory, classification, use, and disposal of assets.

30
Q

assets

A

The collection of property that is owned by an organization.

31
Q

asset value (AV)

A

The value of an IT asset, which is usually (but not necessarily) the
asset’s replacement value.

32
Q

asymmetric encryption

A

A method for encryption, decryption, and digital signatures that uses pairs of encryption keys, consisting of a public key and a private key.

33
Q

asynchronous replication

A

A type of replication where writing data to the remote storage system is not kept in sync with updates on the local storage system. Instead,there may be a time lag, and there is no guarantee that data on the remote system is identical to that on the local storage system. See also replication.

34
Q

asynchronous transfer mode (ATM)

A

A LAN and WAN protocol standard for sending messages in the form of cells over networks. On an ATM network, all messages are transmitted in synchronization with a network-based time clock. A station that wishes to send a message to another station must wait for the time clock.

35
Q

atomicity

A

The characteristic of a complex transaction whereby it is either performed completely as a single unit or not at all.

36
Q

attribute sampling

A

A sampling technique used to study the characteristics of a pop- ulation to determine how many samples possess a specific characteristic. See also sampling.

37
Q

audit charter

A

A written document that defines the mission and goals of the audit program as well as roles and responsibilities.

38
Q

audit logging

A

A feature in an application, operating system, or database management system where events are recorded in a separate log.

39
Q

audit methodology

A

A set of audit procedures that is used to accomplish a set of audit objectives.

40
Q

audit objective

A

The purpose or goals of an audit. Generally, the objective of an audit is to determine if controls exist and are effective in some specific aspect of business operations in an organization.

41
Q

audit procedures

A

The step-by-step instructions and checklists required to perform specific audit activities. Procedures may include a list of people to interview and ques- tions to ask them, evidence to request, audit tools to use, sampling rates, where and how evidence will be archived, and how evidence will be evaluated.

42
Q

audit program

A

The plan for conducting audits over a long period.

43
Q

audit report

A

The final, written product of an audit. An audit report will include a description of the purpose, scope, and type of audit performed; persons interviewed; evidence collected; rates and methods of sampling; and findings on the existence and effectiveness of each control.

44
Q

audit scope

A

The process, procedures, systems, and applications that are the subject of an audit.

45
Q

authentication

A

The process of asserting one’s identity and providing proof of that identity. Typically, authentication requires a user ID (the assertion) and a password (the proof). However, authentication can also require stronger means of proof, such as a digital certificate, token, smart card, or biometric.

46
Q

authorization

A

The process whereby a system determines what rights and privileges a user has.

47
Q

automated workpapers

A

Data that has been captured by computer-assisted audit tech- niques. See also computer-assisted audit technique (CAAT).

48
Q

automatic control

A

A control that is enacted through some automatic mechanism that requires little or no human intervention.

49
Q

availability management

A

The IT function that consists of activities concerned with the availability of IT applications and services. See also IT service management.