ISC Glossary

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/358

flashcard set

Earn XP

Description and Tags

ISC CPA Exam Glossary from Becker

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

359 Terms

1
New cards

Abstraction

Hiding the complexity of tasks to limit user access to relevant information, enhancing security by controlling access to sensitive data

2
New cards

Acceptable Use Policy (AUP)

A document outlining acceptable behaviors, responsibilities, and consequences for employees and vendors using technology

3
New cards

Acceptance Criteria

Measurable and specific criteria established by management to objectively evaluate changes to systems or processes

4
New cards

Active Data Collection

The process of actively collecting new data from employees, customers, users, etc. through surveys, interviews, or forms

5
New cards

Adverse Opinion

An auditor’s report stating that the financial statements “do not present fairly…”

6
New cards

Agile Method

A flexible change management framework with cross-functional teams working on different phases or tasks simultaneously, allowing changes of direction throughout the project lifecycle.

7
New cards

Annualized Loss Expectancy

Single loss expectancy multiplied by the annualized rate of occurrence

8
New cards

Annualized Rate of Occurrence

Expected frequency of occurrences of a negative event in a year

9
New cards

Application Layer (Layer 7)

The top layer of the OSI model that serves as the interface between applications and the network protocol, allowing users to transmit messages

10
New cards

Application Logs

Logs recording application data, such as user access, executed functions, and errors

11
New cards

Application-Based Attacks

Target software (e.g., databases, websites) for unauthorized access or disruption

12
New cards

Artificial Intelligence

An umbrella term used to describe systems that are created to perform complex tasks typically requiring human intelligence and judgement

13
New cards

Assessment Procedures

Objectives with assessment objects and methods, such as examination, interviewing, and testing

14
New cards

Asymmetric Encryption

Encryption using two keys, a public key for encryption and a private key for decryption (or vice versa). It is slower due to longer keys and more complex algorithms

15
New cards

Attackers

Individuals or entities that negatively impact data security through theft, manipulation, or control of sensitive information.

16
New cards

Attest Engagements

An engagement in which a practitioner is engaged to issue or does issue an examination, a review, or an agreed-upon procedures report on subject matter, or on an assertion about the subject matter, that is the responsibility of another party

17
New cards

Attestation Risk

The risk that the practitioner may issue an inappropriate conclusion or report based on their findings during the attestation engagement, potentially leading to a false sense of security regarding the subject matter.

18
New cards

Audit Committee

A committee of the Board of Directors, generally made up of three to five members of the board who are “outside directors,” responsible for the selection and appointment of the independent external auditor, and for reviewing the nature and scope of the engagement

19
New cards

Audit Trail

Evidence indicative of the sequential flow of accounting operations

20
New cards

Availability

The ability of a business to perform its functions or meet business objectives, including system availability (accessibility of business data and normal IT system operations) and availability of human capital (personnel being ready and able to perform normal operations).

21
New cards

Backup

The process of creating and storing copies of data and systems to recover lost information after a failure

22
New cards

BIA Report

A comprehensive report that assesses risks and potential impacts of disruptions at the department, business unit, or product level to form a company-wide business impact analysis

23
New cards

Biometrics

Authentication using human physical characteristics or impressions, such as facial recognition, fingerprint scans, voice recognition, etc.

24
New cards

Blockchain

A control system originally designed to govern the creation of cryptocurrencies like Bitcoin.  It ensures the immutability and security of transactions through decentralized validation

25
New cards

Breach Notification

A requirement added by HITECH to HIPAA, obligating covered entities to notify individuals affected by a data breach within 60 days of discovery

26
New cards

BYOD policies

Policies allowing employees to use personally owned devices for work, covering issues like monitoring, data ownership, liability, and restricted activities

27
New cards

Buffer Overflow

Atype of cyberattack in which an attacker sends more data to a buffer than it can handle, causing data overflow and potentially allowing the execution of malicious code

28
New cards

Business Continuity Plans

Plans focused on keeping the business operational during a disaster, including contingency and mitigation procedures for all business processes, such as relocating facilities, managing human resources, and maintaining customer and supplier relationships

29
New cards

Business Impact Analysis

A process that evaluates the potential effects of an interruption to critical business operations due to a disaster, helping organizations prioritize recovery strategies.

30
New cards

Business Resiliency

The integration of system availability controls, disaster recovery plans, business continuity plans, and crisis management plans into a central set of procedures to ensure a business can continue to operate or quickly return to operations without irreparable harm to people, information, or assets

31
New cards

Carve-Out Method

A method used to describe the services performed by a subservice organization as a distinct portion of the overall system

32
New cards

Center for internet Security Benchmarks

Publicly available security standards, used by organizations as a starting point for asset reconfiguration. Adhering to these standards assist organizations in complying with any applicable laws and regulations

33
New cards

Center for Internet Security Controls

A set of recommended actions, processes, and best practices for organizations to strengthen their cybersecurity defenses. These controls include measures to track and manage software applications, protect data, and configure enterprise assets securely

34
New cards

Change Advisory Board

A formal board responsibly for reviewing, approving, and planning for system changes, ensuring separate environments for testing, staging, and production

35
New cards

Change Management

Policies, procedures, and resources employed to govern change in an organization, impacting IT infrastructure and governance

36
New cards

Change Management Controls

Measures put in place to minimize risks during the change management process, including policies, standardized change requests, impact assessment, and and ongoing monitoring

37
New cards

Change Management Process

Steps to successfully manage change, from identification and approval to implementation and monitoring

38
New cards

Change Request

A formal proposal for making changes to a system or process, often submitted for review and approval by a change advisory board

39
New cards

Changeover Methods

Different approaches for migrating from an old system to a new system, including direct changeover, parallel changeover, pilot changeover, phased changeover, and hybrid changeover

40
New cards

Chief Operations Officer

The executive officer responsible for the day-to-day operations of a company

41
New cards

CIA Triad

Confidentiality, integrity, and availability making up a common model that forms the basis for the development of security systems

42
New cards

Closed Loop Verification

A critical change management step that involves continuously monitoring the output from the changes, comparing the outputs with the desired outcome, and calibrating the changes to minimize discrepancies from the acceptance criteria

43
New cards

Cloud Computing

A computing model that uses shared resources over the internet, allowing customers to rent storage space, processing power, or proprietary software from cloud service providers (CSPs) instead of owning and managing their infrastructure

44
New cards

COBIT 2019

The latest version of COBIT, launched as a comprehensive global framework mapping enterprise strategy to IT objectives and governance, providing guidelines for organizations to achieve their goals and manage risks effectively.

45
New cards

Cold Site

A backup location that has basic infrastructure but requires additional setup to become operational after a disaster, often used for disaster recovery purposes.

46
New cards

Committee of Sponsoring Organizations (COSO)

An advisory group that offers guidance on internal controls, fraud deterrence, and risk management

47
New cards

Common Vulnerabilities List

A nomenclature and dictionary of security-related software flaws. Classification schemes. Classification schemes are used to assess the likelihood of exploitation and the impact of vulnerabilities

48
New cards

Common Vulnerability Scoring System (CVSS)

A system for measuring the relative severity of software flaw vulnerabilities

49
New cards

Communication Plan

A plan outlining the process and stakeholders to be notified during incident response

50
New cards

Community Cloud

A cloud infrastructure shared by multiple organizations for a common interest, such as regulatory compliance or collaboration

51
New cards

Complementary Subservice Organization Controls

Controls that a subservice organization (a third party used by the service organization) must have in place for the service organization’s controls to achieve its objectives

52
New cards

Complementary User Entity Controls

Controls that users of a service organization’s system must have in place for the service organization’s controls to achieve their objectives

53
New cards

Compliance

An objective qualitative assessment determining whether an application or infrastructure component complies with a particular standard or regulation.

54
New cards

Compliance Objectives

Objectives related to adhering to governmental laws and regulations

55
New cards

Components of Internal Controls

Interrelated elements of the system of internal control used to achieve an entity’s objectives; control components consist of the CRIME framework

56
New cards

Composite Primary Key

When more than one attribute is required to uniquely identify each record in a table, they form this

57
New cards

Confidentiality

Preserving authorized restrictions on access and disclosure of data, including means for protecting personal privacy and proprietary information

58
New cards

Control Activities

The policies and procedures that help ensure that management directives are carried out and that necessary steps are taken to address risks

59
New cards

Control deficiency

a weakness that exists when the design or operation of a control does not allow management or employees, in the normal course of performing their assigned functions, to prevent or detect misstatements on a timely basis

60
New cards

Control Environment

the tone of an organization, including management attitude, participation of those charged with governance, organizational structure, and human resource policies

61
New cards

Control Objectives for Information and Related Technologies (COBIT)

a widely used enterprise IT governance framework developed bu the ISACA to provide best practices for IT governance and management

62
New cards

Corrective Controls

measures implemented to rectify known vulnerabilities in response to security incidents, self assessments, or changes in industry practices

63
New cards

COSO 2017 Enterprise Risk Management

a framework that helps organizations identify, assess, and manage risks to achieve their objectives effectively.

64
New cards

COSO Cube

A 3-D diagram illustrating how various elements of an internal control system work together within the COSO framework

65
New cards

COSO Internal Framework

A framework created by COSO in 1992 to help organizations establish effective Internal Control systems. It became a benchmark for internal control practices

66
New cards

Covert Channels

A type of cyberattack transmitting data using the methods not originally intended for data transmission by the system designers

67
New cards

Crisis

An unexpected and disruptive event or situation that demands urgent attention and response, often threatening the organization's operations, reputation, or stakeholders.

68
New cards

Crisis Management

Policies and procedures to manage crises, making important decisions quickly, protect people and organizational reputation, and restore normal operations

69
New cards

Cryptography

The practice and study of techniques for securing communication and information, ensuring confidentiality, integrity, and authentication.

70
New cards

CSF Core

The foundational component of the NIST CSF, consisting of six functions (Govern, Identify, Protect, Detect, Respond, and Recover) that represent different points in the cybersecurity lifecycle

71
New cards

CSF Organizational Profiles

the mechanisms by which NIST recommends companies measure cybersecurity risk and establish a roadmap to ensure the organization can minimize such risk

72
New cards

CSF Tiers

Four tiers that act as benchmarks for an organization’s information security infrastructure sophistication, indicating the degree to which cybersecurity practices are integrated throughout the organization.  Tier 1 = Partial, Tier 2 = Risk Informed, Tier 3 = Repeatable, Tier 4 = Adaptive.

73
New cards

Cybersecurity

the practice of protecting an organization’s IT infrastructure and critical data from malicious actors using technologies, processes, and best practices to mitigate the impact of attacks

74
New cards

Cybersecurity Event

A cybersecurity change that may have an impact on organizational operations (including mission, capabilities, or reputation)

75
New cards

Cybersecurity Incident

A cybersecurity event that has been determines to have an impact on the organization, prompting the need for response and recovery

76
New cards

Cybersecurity Risk Governance

A component of the CSF Tiers that refers to focusing on the policies, procedures, and structures put in place by an organization’s leadership to oversee and manage cybersecurity risks.  It involves establishing accountability, defining roles and responsibilities, and ensuring that cybersecurity risk management aligns with the organization’s overall risk governance and strategic objectives.

77
New cards

Cybersecurity Risk Management

a component of the CSF Tiers that refers to the continuous process of identifying, assessing, and responding to cybersecurity threats and vulnerabilities to minimize their impact on organizational operations, assets, and reputation. The primary goal is to balance the needs of cybersecurity with the organization's overall business objectives.

78
New cards

Data Backup and Restoration

Mechanisms for data recovery, automated backups, off-site storage, and encryption toprotect data and enable recovery to a trusted state

79
New cards

Data Breach

The unauthorized exposure of confidential information, either intentionally or unintentionally

80
New cards

Data Breach Notification

Obligatory communication to affected individuals and regulation about a data breach

81
New cards

Data Center

A facility that houses computer systems and related components, such as telecommunications and storage systems, with advanced security measures and climate control

82
New cards

Data Classification Scheme

Categorizing data based on sensitivity to understand implications in case of data loss or compromise

83
New cards

Data Flow Diagram (DFD)

A visual representation to describe the flow of data through a process

84
New cards

Data Lake

A repository that contains both structured and unstructured data, with data mostly being in its natural or raw format

85
New cards

Data Life Cycle

The sequential steps that all business data must go through from creation to disposal, including definition, capture, preparation, storage, usage, sharing, archiving, and deletion.

86
New cards

Data Link Layer (Layer 2)

The layer where data packets are formatted for transmission, determined by hardware and networking technology, and media access control addresses are added for source and destination reference.  Protocols used in this layer include Integrated Services Digital Network (ISDN), Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and Address Resolution Protocol (ARP)

87
New cards

Data Loss Prevention (DLP) Systems

Tools that prevent sensitive data from being leaked or accessed by unauthorized users

88
New cards

Data Management Process

Securely managing the entire life cycle of data, from identification and classification to disposal

89
New cards

Data Mapping

Identifying software applications that access data based on sensitivity levels and consolidating devices and software into separate networks based on sensitivity

90
New cards

Data Mart

A subset of a data warehouse, focused on specific purposes such as marketing or logistics, tailored to different departments within a company

91
New cards

Data Minimization

A GDPR principle stating that data processing must be limited to what is necessary for the purpose

92
New cards

Data Model

Conceptual representations of the data structures in an information sysem

93
New cards

Data Privacy

Legal regulations designed to protect an individual’s private life and personal details from being disclosed to the public. They establish rules for data collection, storage, and sharing private information to build trust between consumers and enterprises

94
New cards

Data Privacy Framework

a framework published by NIST in early 2020 to protect individuals’ data used in data processing applications.  It is designed to be industry-agnostic and consider cultural and individual privacy constructs

95
New cards

Data Privacy Laws

Legal Regulations designed to protect an individual’s private life and personal details from being disclosed to the public. They establish rules for collecting, processing, maintaining and disclosing private information to build trust between consumers and enterprises

96
New cards

Data Security Framework

A framework published by NIST in early 2020 to protect data against unauthorized access and breaches. It establishes guidelines to ensure the integrity, confidentiality, and availability of sensitive information

97
New cards

Data Storage

Technology designed for the retention and management of data, ensuring it is organized and accessible when needed.

98
New cards

Data Types

Designated types for attributes that specify how data is stored and analyzed, such as numerical, text, or date/time

99
New cards

Data Warehouse

A large, centralized data repository used for reporting and analysis, pulling from multiple sources and combining it into a single repository

100
New cards

Database Management System (DBMS)

Software that manages databases, enabling users to interact with the data by storing, retrieving, updating, and deleting information