CRISC - Certified in Risk and Information Systems Control term definition - Part 54

studied byStudied by 4 people
0.0(0)
Get a hint
Hint

Stakeholder

1 / 19

flashcard set

Earn XP

Description and Tags

IT Governance Basic

20 Terms

1

Stakeholder

Anyone who has a responsibility for, an expectation from or some other interest in the enterprise.

New cards
2

System of internal control

The policies, standards, plans and procedures, and organizational structures designed to provide reasonable assurance that enterprise objectives will be achieved and undesired events will be prevented or detected and corrected

New cards
3

Sampling stratification

The process of dividing a population into subpopulations with similar characteristics explicitly defined, so that each sampling unit can belong to only one stratum

New cards
4

Secure Electronic Transaction (SET)

A standard that will ensure that credit card and associated payment order information travels safely and securely between the various involved parties on the Internet.

New cards
5

Secure Multipurpose Internet Mail Extensions (S/MIME)

Provides cryptographic security services for electronic messaging applications: authentication, message integrity and non-repudiation of origin (using digital signatures) and privacy and data security (using encryption) to provide a consistent way to send and receive MIME data. (RFC 2311)

New cards
6

Secure Shell (SSH)

Network protocol that uses cryptography to secure communication, remote command line login and remote command execution between two networked computers

New cards
7

Security as a Service (SecaaS)

The next generation of managed security services dedicated to the delivery, over the Internet, of specialized information-security services.

New cards
8

Significant deficiency

A deficiency or a combination of deficiencies, in internal control, that is less severe than a material weakness, yet important enough to merit attention by those responsible for oversight.

New cards
9

Single factor authentication (SFA)

Authentication process that requires only the user ID and password to grant access

New cards
10

Source routing specification

A transmission technique where the sender of a packet can specify the route that packet should follow through the network

New cards
11

Spam

Computer-generated messages sent as unsolicited advertising

New cards
12

Spear phishing

A targeted attack where social engineering techniques are used to masquerade as a trusted party to obtain sensitive information (personal, financial, intellectual property, etc.) or install malware.

New cards
13

SQL injection

Results from failure of the application to appropriately validate input. When specially crafted user-controlled input consisting of SQL syntax is used without proper validation as part of SQL queries, it is possible to glean information from the database in ways not envisaged during application design. (MITRE)

New cards
14

Stateful inspection

A firewall architecture that tracks each connection traversing all interfaces of the firewall and makes sure they are valid.

New cards
15

Statutory requirements

Laws created by government institutions

New cards
16

Sufficient evidence

The measure of the quantity of audit evidence; supports all material questions to the audit objective and scope.

New cards
17

Sufficient information

Information is sufficient when evaluators have gathered enough of it to form a reasonable conclusion. For information to be sufficient, however, it must first be suitable.

New cards
18

Suitable information

Relevant (i.e., fit for its intended purpose), reliable (i.e., accurate, verifiable and from an objective source) and timely (i.e., produced and used in an appropriate time frame) information.

New cards
19

Supervisory control and data acquisition (SCADA)

Systems used to control and monitor industrial and manufacturing processes, and utility facilities

New cards
20

System hardening

A process to eliminate as many security risks as possible by removing all nonessential software programs, protocols, services and utilities from the system

New cards

Explore top notes

note Note
studied byStudied by 21 people
... ago
5.0(1)
note Note
studied byStudied by 322 people
... ago
5.0(4)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 65 people
... ago
4.5(2)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 11 people
... ago
5.0(1)
note Note
studied byStudied by 27 people
... ago
5.0(2)
note Note
studied byStudied by 4869 people
... ago
4.6(34)

Explore top flashcards

flashcards Flashcard (130)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (98)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (182)
studied byStudied by 205 people
... ago
5.0(1)
flashcards Flashcard (29)
studied byStudied by 1 person
... ago
5.0(1)
flashcards Flashcard (59)
studied byStudied by 28 people
... ago
5.0(1)
flashcards Flashcard (112)
studied byStudied by 60 people
... ago
5.0(1)
flashcards Flashcard (189)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 8 people
... ago
5.0(1)
robot