CIS

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/11

flashcard set

Earn XP

Description and Tags

The information systems and solutions built and deployed by departments other than the information systems department.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

12 Terms

1
New cards

Shadow IT

The information systems and solutions built and deployed by departments other than the information systems department.

2
New cards

process


Definition:A structured set of related activities that takes input, adds value, and creates an output for the customer of that process.


3
New cards

procedure

A set of steps that need to be followed to achieve a specific end result, such as entering a customer order, paying a supplier invoice, or requesting a current inventory report.


4
New cards

CIA security triad

CIA security triadConfidentiality, integrity, and availability form the basis of the CIA security triad.

5
New cards

business continuity plan


Definition:A document that includes an organization’s disaster recovery plan, occupant emergency evacuation plan, continuity of operations plan, and an incident management plan.

6
New cards

mission-critical processes


A process that plays a pivotal role in an organization’s continued operations and goal attainment.


7
New cards

Failover

A backup technique that involves automatically switching applications and programs to a redundant or replicated server, network, or database to prevent interruption of service.

8
New cards

next-generation firewall (NGFW)



Definition:A hardware- or software-based network security system that can detect and block sophisticated attacks by filtering network traffic dependent on the packet contents.

9
New cards

Transport Layer Security (TLS)


A communications protocol or system of rules that ensures privacy between communicating applications and their users on the Internet.

10
New cards

managed security service provider (MSSP)

A company that monitors, manages, and maintains computer and network security for other organizations.

11
New cards

Computer forensics


A discipline that combines elements of law and computer science to identify, collect, examine, and preserve data from computer systems, networks, and storage devices in a manner that preserves the integrity of the data gathered so that it is admissible as evidence in a court of law.


12
New cards