CRISC - Certified in Risk and Information Systems Control term definition - Part 43

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

IT Governance Basic

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards
Protection domain
The area of the system that the intrusion detection system (IDS) is meant to monitor and protect.
2
New cards
Protocol
The rules by which a network operates and controls the flow and priority of transmissions.
3
New cards
Protocol converter
Hardware devices, such as asynchronous and synchronous transmissions, that convert between two different types of transmission.
4
New cards
Protocol stack
A set of utilities that implement a particular network protocol. For instance, in Windows machines a Transmission Control Protocol/Internet Protocol (TCP/IP) stack consists of TCP/IP software, sockets software and hardware driver software.
5
New cards
Prototyping
The process of quickly putting together a working model (a prototype) in order to test various aspects of a design, illustrate ideas or features and gather early user feedback. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphasis is on end-user screens and reports. Internal controls are not a priority item since this is only a model.
6
New cards
Proxy server
A server that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether the user or client IP address is permitted to use the proxy, perhaps perform additional authentication, and complete a connection to a remote destination on behalf of the user.
7
New cards
Public key
In an asymmetric cryptographic scheme, the key that may be widely published to enable the operation of the scheme.
8
New cards
Public key encryption
A cryptographic system that uses two keys: one is a public key, which is known to everyone, and the second is a private or secret key, which is only known to the recipient of the message. See also Asymmetric Key.
9
New cards
Public key infrastructure (PKI)
A series of processes and technologies for the association of cryptographic keys with the entity to whom those keys were issued.
10
New cards
Principle
An enabler of governance and of management. Comprises the values and fundamental assumptions held by the enterprise, the beliefs that guide and put boundaries around the enterprise’s decision making, communication within and outside the enterprise, and stewardship--caring for assets ownedby another- COBIT 5 perspective
11
New cards
Process goals
A statement describing the desired outcome of a process. An outcome can be an artifact, a significant change of a state or a significant capability improvement of other processes. COBIT 5 perspective
12
New cards
Program and project management office (PMO)
The function responsible for supporting program and project managers, and gathering, assessing and reporting information about the conduct of their programs and constituent projects
13
New cards
Patch
Fixes to software programming errors and vulnerabilities
14
New cards
Payload
The section of fundamental data in a transmission. In malicious software this refers to the section containing the harmful data/code.
15
New cards
Plain old telephone service (POTS)
A wired telecommunications system.
16
New cards
Port (Port number)
A process or application-specific software element serving as a communication endpoint for the Transport Layer IP protocols (UDP and TCP)
17
New cards
Port scanning
The act of probing a system to identify open ports
18
New cards
Prime number
A natural number greater than 1 that can only be divided by 1 and itself.
19
New cards
Principle of least privilege/access
Controls used to allow the least privilege access needed to complete a task
20
New cards
Probe
Inspect a network or system to find weak spots