CRISC - Certified in Risk and Information Systems Control term definition - Part 48

studied byStudied by 4 people
5.0(1)
Get a hint
Hint

RS-232 interface

1 / 19

flashcard set

Earn XP

Description and Tags

IT Governance Basic

20 Terms

1

RS-232 interface

An interface between data terminal equipment and data communications equipment employing serial binary data interchange.

New cards
2

RSA

A public key cryptosystem developed by R. Rivest, A. Shamir and L. Adleman used for both encryption and digital signatures. The RSA has two different keys, the public encryption key and the secret decryption key. The strength of the RSA depends on the difficulty of the prime number factorization. For applications with high-level security, the number of the decryption key bits should be greater than 512 bits.

New cards
3

Rulebase

The list of rules and/or guidance that is used to analyze event data.

New cards
4

Run instructions

Computer operating instructions which detail the step-by-step processes that are to occur so an application system can be properly executed; also identifies how to address problems that occur during processing.

New cards
5

Run-to-run totals

Provide evidence that a program processes all input data and that it processed the data correctly.

New cards
6

Resource

Any enterprise asset that can help the organization achieve its objectives COBIT 5 perspective

New cards
7

Resource optimization

One of the governance objectives. Involves effective, efficient and responsible use of all resources—human, financial, equipment, facilities, etc. COBIT 5 perspective

New cards
8

Ransomware

Malware that restricts access to the compromised systems until a ransom demand is satisfied

New cards
9

Recovery

The phase in the incident response plan that ensures that affected systems or services are restored to a condition specified in the service delivery objectives (SDOs) or business continuity plan (BCP)

New cards
10

Registered ports

Registered ports--1024 through 49151: Listed by the IANA and on most systems can be used by ordinary user processes or programs executed by ordinary users

New cards
11

Regulation

Rules or laws defined and enforced by an authority to regulate conduct

New cards
12

Regulatory requirements

Rules or laws that regulate conduct and that the enterprise must obey to become compliant

New cards
13

Relevant information

Relating to controls, tells the evaluator something meaningful about the operation of the underlying controls or control component. Information that directly confirms the operation of controls is most relevant. Information that relates indirectly to the operation of controls can also be relevant, but is less relevant than direct information. Refer to COBIT 5 information quality goals

New cards
14

Reliable information

Information that is accurate, verifiable and from an objective source. Refer to COBIT 5 information quality goals

New cards
15

Remediation

After vulnerabilities are identified and assessed, appropriate remediation can take place to mitigate or eliminate the vulnerability

New cards
16

Removable media

Any type of storage device that can be removed from the system while is running

New cards
17

Replay

The ability to copy a message or stream of messages between two parties and replay (retransmit) them to one or more of the parties

New cards
18

Representation

A signed or oral statement issued by management to professionals, where management declares that a current or future fact (e.g., process, system, procedure, policy) is or will be in a certain state, to the best of management’s knowledge.

New cards
19

Return-oriented attacks

An exploit technique in which the attacker uses control of the call stack to indirectly execute cherry-picked machine instructions immediately prior to the return instruction in subroutines within the existing program code

New cards
20

Risk acceptance

If the risk is within the enterprise's risk tolerance or if the cost of otherwise mitigating the risk is higher than the potential loss, the enterprise can assume the risk and absorb any losses

New cards

Explore top notes

note Note
studied byStudied by 43 people
... ago
5.0(2)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 42 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 162 people
... ago
4.6(5)

Explore top flashcards

flashcards Flashcard (38)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 14 people
... ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 275 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 22 people
... ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 44 people
... ago
5.0(1)
flashcards Flashcard (223)
studied byStudied by 19 people
... ago
5.0(1)
robot