CRISC - Certified in Risk and Information Systems Control term definition - Part 52

studied byStudied by 4 people
5.0(1)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions
Get a hint
Hint

Source document

1 / 19

flashcard set

Earn XP

Description and Tags

IT Governance Basic

20 Terms

1

Source document

The form used to record data that have been captured.

New cards
2

Source lines of code (SLOC)

Often used in deriving single-point software-size estimations.

New cards
3

Spanning port

A port configured on a network switch to receive copies of traffic from one or more other ports on the switch.

New cards
4

Split data systems

A condition in which each of an enterprise’s regional locations maintains its own financial and operational data while sharing processing with an enterprise wide, centralized database.

New cards
5

Split domain name system (DNS)

An implementation of DNS that is intended to secure responses provided by the server such that different responses are given to internal vs. external users.

New cards
6

Split knowledge/split key

A security technique in which two or more entities separately hold data items that individually convey no knowledge of the information that results from combining the items; a condition under which two or more entities separately have key components that individually convey no knowledge of the plain text key that will be produced when the key components are combined in the cryptographic module.

New cards
7

Spoofing

Faking the sending address of a transmission in order to gain illegal entry into a secure system.

New cards
8

SPOOL (simultaneous peripheral operations online)

An automated function that can be based on an operating system or application in which electronic data being transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information.

New cards
9

Spyware

Software whose purpose is to monitor a computer user’s actions (e.g., web sites visited) and report these actions to a third party, without the informed consent of that machine’s owner or legitimate user.

New cards
10

Stage-gate

A point in time when a program is reviewed and a decision is made to commit expenditures to the next set of activities on a program or project, to stop the work altogether, or to put a hold on execution of further work.

New cards
11

Standard

A mandatory requirement, code of practice or specification approved by a recognized external standards organization, such as International Organization for Standardization (ISO).

New cards
12

Standing data

Permanent reference data used in transaction processing.

New cards
13

Star topology

A type of local area network (LAN) architecture that utilizes a central controller to which all nodes are directly connected.

New cards
14

Static analysis

Analysis of information that occurs on a non-continuous basis; also known as interval-based analysis.

New cards
15

Statistical sampling

A method of selecting a portion of a population, by means of mathematical calculations and probabilities, for the purpose of making scientifically and mathematically sound inferences regarding the characteristics of the entire population.

New cards
16

Storage area networks (SANs)

A variation of a local area network (LAN) that is dedicated for the express purpose of connecting storage devices to servers and other computing devices.

New cards
17

Strategic planning

The process of deciding on the enterprise’s objectives, on changes in these objectives, and the policies to govern their acquisition and use.

New cards
18

Strengths, weaknesses, opportunities and threats (SWOT)

A combination of an organizational audit listing the enterprise’s strengths and weaknesses and an environmental scan or analysis of external opportunities and threats.

New cards
19

Structured programming

A top-down technique of designing programs and systems that makes programs more readable, more reliable and more easily maintained.

New cards
20

Structured Query Language (SQL)

The primary language used by both application programmers and end users in accessing relational databases.

New cards

Explore top notes

note Note
studied byStudied by 9 people
48 days ago
5.0(1)
note Note
studied byStudied by 28 people
313 days ago
5.0(1)
note Note
studied byStudied by 6 people
701 days ago
5.0(1)
note Note
studied byStudied by 140 people
671 days ago
5.0(1)
note Note
studied byStudied by 13 people
741 days ago
5.0(1)
note Note
studied byStudied by 29 people
633 days ago
5.0(2)
note Note
studied byStudied by 3974 people
92 days ago
4.7(19)

Explore top flashcards

flashcards Flashcard (48)
studied byStudied by 220 people
636 days ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 15 people
506 days ago
5.0(4)
flashcards Flashcard (38)
studied byStudied by 93 people
770 days ago
4.0(1)
flashcards Flashcard (31)
studied byStudied by 9 people
473 days ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 10 people
673 days ago
5.0(1)
flashcards Flashcard (21)
studied byStudied by 108 people
483 days ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 17 people
368 days ago
5.0(2)
flashcards Flashcard (39)
studied byStudied by 2 people
661 days ago
5.0(1)
robot