CRISC - Certified in Risk and Information Systems Control term definition - Part 42

studied byStudied by 4 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 19

flashcard set

Earn XP

Description and Tags

IT Governance Basic

20 Terms

1
Privilege
The level of trust with which a system object is imbued.
New cards
2
Problem
In IT, the unknown underlying cause of one or more incidents.
New cards
3
Problem escalation procedure
The process of escalating a problem up from junior to senior support staff, and ultimately to higher levels of management.
New cards
4
Procedure
A document containing a detailed description of the steps necessary to perform specific operations in conformance with applicable standards. Procedures are defined as part of processes.
New cards
5
Process
Generally, a collection of activities influenced by the enterprise’s policies and procedures that takes inputs from a number of sources, (including other processes), manipulates the inputs and produces outputs.
New cards
6
Process maturity assessment
A subjective assessment technique derived from the Software Engineering Institute (SEI) capability maturity model integration (CMMI) concepts and developed as a COBIT management tool. It provides management with a profile of how well developed the IT management processes are.
New cards
7
Process maturity attribute
The different aspects of a process covered in an assurance initiative.
New cards
8
Production program
Program used to process live or actual data that were received as input into the production environment.
New cards
9
Production software
Software that is being used and executed to support normal and authorized organizational operations.
New cards
10
Professional competence
Proven level of ability, often linked to qualifications issued by relevant professional bodies and compliance with their codes of practice and standards.
New cards
11
Professional standards
Refers to standards issued by ISACA. The term may extend to related guidelines and techniques that assist the professional in implementing and complying with authoritative pronouncements of ISACA. In certain instances, standards of other professional organizations may be considered, depending on the circumstances and their relevance and appropriateness.
New cards
12
Program
A structured grouping of interdependent projects that is both necessary and sufficient to achieve a desired business outcome and create value. These projects could include, but are not limited to, changes in the nature of the business, business processes and the work performed by people as well as the competencies required to carry out the work, the enabling technology, and the organizational structure.
New cards
13
Program Evaluation and Review Technique (PERT)
A project management technique used in the planning and control of system projects.
New cards
14
Program flowchart
Shows the sequence of instructions in a single program or subroutine.
New cards
15
Program narrative
Provides a detailed explanation of program flowcharts, including control points and any external input.
New cards
16
Project
A structured set of activities concerned with delivering a defined capability (that is necessary but not sufficient, to achieve a required business outcome) to the enterprise based on an agreed-on schedule and budget.
New cards
17
Project management officer (PMO)
The individual function responsible for the implementation of a specified initiative for supporting the project management role and advancing the discipline of project management.
New cards
18
Project portfolio
The set of projects owned by a company. It usually includes the main guidelines relative to each project, including objectives, costs, time lines and other information specific to the project.
New cards
19
Project team
Group of people responsible for a project, whose terms of reference may include the development, acquisition, implementation or maintenance of an application system.
New cards
20
Promiscuous mode
Allows the network interface to capture all network traffic irrespective of the hardware device to which the packet is addressed.
New cards
robot