CRISC - Certified in Risk and Information Systems Control term definition - Part 50

5.0(1)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

IT Governance Basic

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards
Security metrics
A standard of measurement used in management of security-related activities.
2
New cards
Security perimeter
The boundary that defines the area of security concern and security policy coverage.
3
New cards
Security policy
A high-level document representing an enterprise’s information security philosophy and commitment.
4
New cards
Security procedures
The formal documentation of operational steps and processes that specify how security goals and objectives set forward in the security policy and standards are to be achieved.
5
New cards
Security software
Software used to administer security, which usually includes authentication of users, access granting according to predefined rules, monitoring and reporting functions.
6
New cards
Security standards
Practices, directives, guidelines, principles or baselines that state what needs to be done and focus areas of current relevance and concern; they are a translation of issues already mentioned in the security policy.
7
New cards
Security testing
Ensuring that the modified or new system includes appropriate controls and does not introduce any security holes that might compromise other systems or misuses of the system or its information
8
New cards
Security/transaction risk
The current and prospective risk to earnings and capital arising from fraud, error and the inability to deliver products or services, maintain a competitive position, and manage information.
9
New cards
Segregation/separation of duties (SoD)
A basic internal control that prevents or detects errors and irregularities by assigning to separate individuals the responsibility for initiating and recording transactions and for the custody of assets.
10
New cards
Sensitivity
A measure of the impact that improper disclosure of information may have on an enterprise.
11
New cards
Sequence check
Verification that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research.
12
New cards
Sequential fle
A computer file storage format in which one record follows another.
13
New cards
Service bureau
A computer facility that provides data processing services to clients on a continual basis.
14
New cards
Service delivery objective (SDO)
Directly related to the business needs, SDO is the level of services to be reached during the alternate process mode until the normal situation is restored.
15
New cards
Service desk
The point of contact within the IT organization for users of IT services.
16
New cards
Service level agreement (SLA)
An agreement, preferably documented, between a service provider and the customer(s)/user(s) that defines minimum performance targets for a service and how they will be measured.
17
New cards
Service provider
An organization supplying services to one or more (internal or external) customers.
18
New cards
Service Set Identifier (SSID)
A 32-character unique identifier attached to the header of packets sent over a wireless local area network (WLAN) that acts as a password when a mobile device tries to connect to the base station subsystem (BSS).
19
New cards
Service user
The organization using the outsourced service.
20
New cards
Service-oriented architecture (SOA)
A cloud-based library of proven, functional software applets that are able to be connected together to become a useful online application.