CISA2 Flashcards
(207 cards)
Acceptable use policy
A policy that establishes an agreement between users and the enterprise and defines for all parties’ the ranges of use that are approved before gaining access to a network or the Internet
Alternative routing
A service that allows the option of having an alternate route to complete a call when the marked destination is not available. In signaling, alternate routing is the process of allocating substitute routes for a given signaling traffic stream in case of failure(s) affecting the normal signaling links or routes of that traffic stream.
Asymmetric key (public key)
A cipher technique in which different cryptographic keys are used to encrypt and decrypt a message (See public key encryption)
Asynchronous Transfer Mode (ATM)
A high-bandwidth low-delay switching and multiplexing technology that allows integration of real-time voice, video and data. It is a data link layer protocol. ATM is a protocol-independent transport mechanism. It allows high-speed data transfer rates at up to 155 Mbit/s. The acronym ATM should not be confused with the alternate usage for ATM, which refers to an automated teller machine.
Attribute sampling
An audit technique used to select items from a population for audit testing purposes based on selecting all those items that have certain attributes or characteristics (such as all items over a certain size)
Audit objective
The specific goal(s) of an audit. These often center on substantiating the existence of internal controls to minimize business risk.
Audit plan
- A plan containing the nature, timing and extent of audit procedures to be performed by engagement team members to obtain sufficient appropriate audit evidence to form an opinion. Includes the areas to be audited, the type of work planned, the high-level objectives and scope of the work, and topics such as budget, resource allocation, schedule dates, type of report, its intended audience and other general aspects of the work 2. A high-level description of the audit work to be performed in a certain period of time
Authentication
The act of verifying the identity of a user and the user’s eligibility to access computerized information. Authentication is designed to protect against fraudulent logon activity. It can also refer to the verification of the correctness of a piece of data.
Audit risk
The probability that information or financial reports may contain material errors and that the auditor may not detect an error that has occurred
Audit trail
A visible trail of evidence enabling one to trace information contained in statements or reports back to the original input source
Balanced scorecard (BSC)
Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial measures, but adds customer, internal business process, and learning and growth perspectives
Batch control
Correctness checks built into data processing systems and applied to batches of input data, particularly in the data preparation stage. There are two main forms of batch controls: sequence control, which involves consecutively numbering the records in a batch so that the presence of each record can be confirmed, and control total, which is a total of the values in selected fields within the transactions.
Batch processing
The processing of a group of transactions at the same time. Transactions are collected and processed against the master files at a specified time.
Benchmarking
A systematic approach to comparing organization performance against peers and competitors in an effort to learn the best ways of conducting business. Examples include benchmarking of quality, logistic efficiency and various other metrics.
Bridge
A device that connects two similar networks together
Black box testing
A testing approach that focuses on the functionality of the application or product and does not require knowledge of the code intervals
Base case
A standardized body of data created for testing purposes. Users normally establish the data. Base cases validate production application systems and test the ongoing accurate operation of the system.
Brouters
Devices that perform the functions of both a bridge and a router. A brouter operates at both the data link and the network layers. It connects same data-link-type local area network (LAN) segments and different data-link ones, which is a significant advantage. Like a bridge, it forwards packets based on the data-link layer address to a different network of the same type. Also, whenever required, it processes and forwards messages to a different data-link-type network based on the network protocol address. When connecting same data-link type networks, it is as fast as a bridge and is able to connect different data-link type networks.
Business case
Documentation of the rationale for making a business investment, used to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cycle
Business continuity plan (BCP)
A plan used by an organization to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems.
Business impact analysis (BIA)
A process to determine the impact of losing the support of any resource. The BIA assessment study establishes the escalation of that loss over time. It is predicated on the fact that senior management, when provided reliable data to document the potential impact of a lost resource, can make the appropriate decision.
Business process reengineering (BPR)
The thorough analysis and significant redesign of business processes and management systems to establish a better performing structure, more responsive to the customer base and market conditions, while yielding material cost savings
Capability Maturity Model Integration (CMMI)
CMMI is a model used by many organizations to identify best practices useful in helping them assess and increase the maturity of their software development processes.
Capacity stress testing
Testing an application with large quantities of data to evaluate its performance during peak periods. Also called volume testing.