Glossary of Terms Flashcards Preview

CISM > Glossary of Terms > Flashcards

Flashcards in Glossary of Terms Deck (182)
Loading flashcards...
121

Base Case

A standardised body of data created for testing purposes.

122

BaseBand

A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilises a transceiver.

123

Baseline Architecture

The existing description of the fundamental underlying design of the components of the business system before entering a cycle of architecture review and design (Cobit 5 perspective)

124

Bastion

A System that is heavily fortified against attack.

125

Batch Control

Correctness checks built into data processing systems and applied to batches of input data, particularly in the data preparation stage.

126

The 2 forms of Batch Control ?

Sequence control, which involves numbering the records in a batch consecutively so that the presence of each record can be confirmed; and control total, which is a total of the values in selected fields within the transactions.

127

Batch Processing

The processing of a group of transactions at the same time.

128

Baud Rate

The rate of transmission for telecommunications data, expressed in bits per second (bps)

129

Benchmark

A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business.

130

Benefit

In business an outcomes whose nature and value (expressed in various ways) are considered advantageous by an enterprise.

131

Benefits Realisation

One of the objectives of governance. The bring about of new benefits for the enterprise, the maintenance and extension of existing forms of benefits, and the elimination of those initiatives and assets that are not creating sufficient value.

132

Binary Code

A code whose representation is a 1 or 0

133

Biometric locks

Doors and entry locks that are activated by such biometric features as voice, eye, retina or fingerprint.

134

Biometrics

A security technique that verifies an individuals identity by analyzing a unique physical attribute.

135

Bit-stream image

Bit‐stream backups, also referred to as mirror image backups, involve the backup of all areas of a computer hard disk drive or other types of storage media. This is an exact replicate of all sectors.

136

Blackbox testing

A testing approach that focuses on the functionality of the application or product. It does not require knowledge of the code.

137

Blockchain

A distributed, protected journaling and ledger system. Use of blockchain technologies can enable anything from digital Blockchain currency (e.g. Bitcoin) to any other value‐bearning transaction.

138

Block Cipher

A public algorithm that operates on plain text in blocks (strings or groups) of bits.

139

Botnet

A term derived from “robot network;” is a large automated and distributed network of previously compromised computers that can be simultaneously controlled to launch large‐scale attacks such as
a denial‐of‐service attack on selected victims

140

Boundary

Logical and Physical controls used to define the perimeter between the organisation and the outside world.

141

Bridge

Datalink Layer device designed to connect two local area networks or create two separate network segments (either LAN or WAN) to reduce collision domains.

142

Bring Your Own Device (BYOD)

An enterprise policy used to permit partial or full integration of user‐owned mobile devices for business purposes.

143

Broadband

Multiple channels are formed by dividing the transmission medium into discrete frequency segments.
Scope Note: Broadband generally requires the use of a modem.

144

Broadcast

A method to distribute information to multiple recipients simultaneously.

145

Brouter

A device that performs the function of a both a bridge and a router. (Datalink and network)

146

Browser

A computer program that enables the user to retrieve information that has been made publicly available on the Internet; also, that permits multimedia (graphics) applications on the World Wide Web

147

Brute force

A class of algorithms that repeatedly try all possible combinations until a solution is found.

148

Brute force attack

Repeatedly trying all possible combinations of passwords or encryption keys until the correct one is found.

149

Budget

Estimated cost and revenue amounts for a given range of periods and set of books.
cope Note: There can be multiple budget versions for the same set of books.

150

Budget Formula

A mathematical expression used to calculate budget amounts based on actual results, other budget amounts and statistics.