Flashcards in Glossary of Terms Deck (182)
A standardised body of data created for testing purposes.
A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilises a transceiver.
The existing description of the fundamental underlying design of the components of the business system before entering a cycle of architecture review and design (Cobit 5 perspective)
A System that is heavily fortified against attack.
Correctness checks built into data processing systems and applied to batches of input data, particularly in the data preparation stage.
The 2 forms of Batch Control ?
Sequence control, which involves numbering the records in a batch consecutively so that the presence of each record can be confirmed; and control total, which is a total of the values in selected fields within the transactions.
The processing of a group of transactions at the same time.
The rate of transmission for telecommunications data, expressed in bits per second (bps)
A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business.
In business an outcomes whose nature and value (expressed in various ways) are considered advantageous by an enterprise.
One of the objectives of governance. The bring about of new benefits for the enterprise, the maintenance and extension of existing forms of benefits, and the elimination of those initiatives and assets that are not creating sufficient value.
A code whose representation is a 1 or 0
Doors and entry locks that are activated by such biometric features as voice, eye, retina or fingerprint.
A security technique that verifies an individuals identity by analyzing a unique physical attribute.
Bit‐stream backups, also referred to as mirror image backups, involve the backup of all areas of a computer hard disk drive or other types of storage media. This is an exact replicate of all sectors.
A testing approach that focuses on the functionality of the application or product. It does not require knowledge of the code.
A distributed, protected journaling and ledger system. Use of blockchain technologies can enable anything from digital Blockchain currency (e.g. Bitcoin) to any other value‐bearning transaction.
A public algorithm that operates on plain text in blocks (strings or groups) of bits.
A term derived from “robot network;” is a large automated and distributed network of previously compromised computers that can be simultaneously controlled to launch large‐scale attacks such as
a denial‐of‐service attack on selected victims
Logical and Physical controls used to define the perimeter between the organisation and the outside world.
Datalink Layer device designed to connect two local area networks or create two separate network segments (either LAN or WAN) to reduce collision domains.
Bring Your Own Device (BYOD)
An enterprise policy used to permit partial or full integration of user‐owned mobile devices for business purposes.
Multiple channels are formed by dividing the transmission medium into discrete frequency segments.
Scope Note: Broadband generally requires the use of a modem.
A method to distribute information to multiple recipients simultaneously.
A device that performs the function of a both a bridge and a router. (Datalink and network)
A computer program that enables the user to retrieve information that has been made publicly available on the Internet; also, that permits multimedia (graphics) applications on the World Wide Web
A class of algorithms that repeatedly try all possible combinations until a solution is found.
Brute force attack
Repeatedly trying all possible combinations of passwords or encryption keys until the correct one is found.
Estimated cost and revenue amounts for a given range of periods and set of books.
cope Note: There can be multiple budget versions for the same set of books.