CRISC - Certified in Risk and Information Systems Control term definition - Part 52

studied byStudied by 4 people
5.0(1)
Get a hint
Hint

Source document

1 / 19

flashcard set

Earn XP

Description and Tags

IT Governance Basic

20 Terms

1

Source document

The form used to record data that have been captured.

New cards
2

Source lines of code (SLOC)

Often used in deriving single-point software-size estimations.

New cards
3

Spanning port

A port configured on a network switch to receive copies of traffic from one or more other ports on the switch.

New cards
4

Split data systems

A condition in which each of an enterprise’s regional locations maintains its own financial and operational data while sharing processing with an enterprise wide, centralized database.

New cards
5

Split domain name system (DNS)

An implementation of DNS that is intended to secure responses provided by the server such that different responses are given to internal vs. external users.

New cards
6

Split knowledge/split key

A security technique in which two or more entities separately hold data items that individually convey no knowledge of the information that results from combining the items; a condition under which two or more entities separately have key components that individually convey no knowledge of the plain text key that will be produced when the key components are combined in the cryptographic module.

New cards
7

Spoofing

Faking the sending address of a transmission in order to gain illegal entry into a secure system.

New cards
8

SPOOL (simultaneous peripheral operations online)

An automated function that can be based on an operating system or application in which electronic data being transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information.

New cards
9

Spyware

Software whose purpose is to monitor a computer user’s actions (e.g., web sites visited) and report these actions to a third party, without the informed consent of that machine’s owner or legitimate user.

New cards
10

Stage-gate

A point in time when a program is reviewed and a decision is made to commit expenditures to the next set of activities on a program or project, to stop the work altogether, or to put a hold on execution of further work.

New cards
11

Standard

A mandatory requirement, code of practice or specification approved by a recognized external standards organization, such as International Organization for Standardization (ISO).

New cards
12

Standing data

Permanent reference data used in transaction processing.

New cards
13

Star topology

A type of local area network (LAN) architecture that utilizes a central controller to which all nodes are directly connected.

New cards
14

Static analysis

Analysis of information that occurs on a non-continuous basis; also known as interval-based analysis.

New cards
15

Statistical sampling

A method of selecting a portion of a population, by means of mathematical calculations and probabilities, for the purpose of making scientifically and mathematically sound inferences regarding the characteristics of the entire population.

New cards
16

Storage area networks (SANs)

A variation of a local area network (LAN) that is dedicated for the express purpose of connecting storage devices to servers and other computing devices.

New cards
17

Strategic planning

The process of deciding on the enterprise’s objectives, on changes in these objectives, and the policies to govern their acquisition and use.

New cards
18

Strengths, weaknesses, opportunities and threats (SWOT)

A combination of an organizational audit listing the enterprise’s strengths and weaknesses and an environmental scan or analysis of external opportunities and threats.

New cards
19

Structured programming

A top-down technique of designing programs and systems that makes programs more readable, more reliable and more easily maintained.

New cards
20

Structured Query Language (SQL)

The primary language used by both application programmers and end users in accessing relational databases.

New cards

Explore top notes

note Note
studied byStudied by 58 people
... ago
5.0(1)
note Note
studied byStudied by 10 people
... ago
5.0(1)
note Note
studied byStudied by 37 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 43 people
... ago
5.0(2)
note Note
studied byStudied by 21 people
... ago
4.5(2)
note Note
studied byStudied by 51 people
... ago
5.0(1)
note Note
studied byStudied by 15188 people
... ago
4.6(62)

Explore top flashcards

flashcards Flashcard (61)
studied byStudied by 65 people
... ago
5.0(1)
flashcards Flashcard (26)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 8 people
... ago
5.0(2)
flashcards Flashcard (47)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (461)
studied byStudied by 10 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (59)
studied byStudied by 52 people
... ago
4.0(1)
flashcards Flashcard (69)
studied byStudied by 5 people
... ago
5.0(3)
robot