Not sure of any technical term or what an acronym means?
Explore our downloadable PDF glossary, a concise compilation of key terms tailored to provide clear definitions and explanations. Or, search the list below.
#
- 5-Whys
A technique used to determine an issue's root causes. It involves asking the question "Why?" repeatedly until the root causes are identified.
A
- A/B testing
A statistical way of comparing two (or more) techniques, typically an incumbent against a new rival. A/B testing aims to determine not only which technique performs better but also whether the difference is statistically significant. A/B testing usually considers only two techniques using one measurement but can be applied to any finite number of techniques and measures.
- Abend
An abnormal end to a computer job; termination of a task prior to its completion because of an error condition that cannot be resolved by recovery facilities while the task is executing
- Acceptable interruption window (AIW)
The maximum period of time that a system can be unavailable before compromising the achievement of the enterprise's business objectives
- Acceptable use policy (AUP)
A policy that establishes an agreement between users and the enterprise that defines, for all parties, the ranges of use that are approved before gaining access to a network or the Internet
- Acceptance criteria
Criteria that a solution must satisfy to be accepted by customers
- Acceptance testing
Testing performed to determine whether a customer, acquirer, user, or their designee should accept a solution
- Access control
The processes, rules and deployment mechanisms that control access to information systems, resources and physical access to premises
- Access control list (ACL)
An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals
Scope Notes: Also referred to as access control table
- Access control table
An internal computerized table of access rules regarding the levels of computer access permitted to logon IDs and computer terminals
- Access method
The technique used for selecting records in a file, one at a time, for processing, retrieval or storage. The access method is related to, but distinct from, the file organization, which determines how the records are stored.
- Access path
The logical route that an end user takes to access computerized information
Scope Notes: Typically includes a route through the operating system, telecommunications software, selected application software and the access control system.
- Access point
A point that accesses the network
- Access rights
The permission or privileges granted to users, programs or workstations to create, change, delete or view data and files within a system, as defined by rules established by data owners and the information security policy
- Access risk
The risk that information may be divulged or made available to recipients without authorized access from the information owner, reflecting a loss of confidentiality
- Access server
The centralized access control system for managing remote access dial-up services
- Accountability
The ability to map a given activity or event back to the responsible party
- Accountability of governance
The ability of governance to ensure that enterprise objectives are achieved by evaluating stakeholder needs, conditions and options; setting direction through prioritization and decision making; and monitoring performance, compliance and progress against plans. In most enterprises, governance is the responsibility of the board of directors under the leadership of the chairperson.
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Accountable party
The individual, group or entity that is ultimately responsible for a subject matter, process or scope
Scope Notes: Within the IT Assurance Framework (ITAF), the term "management" is equivalent to "accountable party."
- Accuracy
The fraction of predictions that a classification model predicted correctly. In multiclass classification, accuracy is defined as correct predictions divided by total number of examples. In binary classification, accuracy is defined as true positives plus true negatives divided by total number of examples.
- Acknowledgment (ACK)
A flag set in a packet to indicate to the sender that the previously sent packet was accepted correctly by the receiver without error or that the receiver is now ready to accept a transmission
- Acquirer
The stakeholder who obtains a solution from a supplier
See Affected stakeholder.
- Acquisition
The process of obtaining solutions by establishing and executing supplier agreements
See Supplier agreement.
- Action
The mechanism by which the agent transitions between states of the environment in reinforcement learning. The agent chooses the action by using a policy.
- Action plan reappraisal (APR)
A bounded set of appraisal activities performed to address nonsystemic weaknesses that lead to a limited set of unsatisfied practice groups in an appraisal. The APR includes:
Conducting an eligibility analysis
Gaining authorization from ISACA
Reviewing and obtaining approval to proceed from the Appraisal Sponsor
Modifying the existing appraisal plan
Conducting a reappraisal of unsatisfied practice groups
Reporting the results to ISACA
- Active recovery site (Mirrored)
A recovery strategy that involves two active sites, each capable of taking over the other's workload in the event of a disaster
Scope Notes: Each site will have enough idle processing power to restore data from the other site and to accommodate the excess workload in the event of a disaster.
- Active response
A response in which the system either automatically, or in concert with the user, blocks or otherwise affects the progress of a detected attack
Scope Notes: Takes one of three forms: amending the environment, collecting more information or striking back against the user
- Activity
The main actions taken to operate the COBIT process
- Actuator
A device component responsible for enacting physical changes within an environment, e.g., relays, solenoids, switches
- AdaGrad
A sophisticated gradient descent algorithm that rescales the gradients of each parameter, effectively giving each parameter an independent learning rate
- Address
A number, character or group of characters that identifies a given device or a storage location, which may contain data or a program step
A device or storage location referred to by an identifying number, character or group of characters
- Addressing
The method used to identify the location of a participant in a network
Scope Notes: Ideally, specifies where the participant is located rather than who they are (name) or how to get there (routing)
- Addressing exception
An exception that occurs when a program calculates an address that is outside the bounds of the storage that is available to the program
See Unhandled exception.
- Address space
The number of distinct locations that may be referred to with the machine address
Scope Notes: For most binary machines, it is equal to 2n, where n is the number of bits in the machine address.
- Adjusting period
A calendar containing "real" and adjusting accounting periods without overlap or gaps between the "real" periods. Adjusting accounting periods can overlap with other accounting periods.
Scope Notes: For example, a period called DEC-93 can be defined that includes 01-DEC-1993 through 31-DEC-1993. An adjusting period called DEC31-93 can also be defined that includes only one day: 31-DEC-1993 through 31-DEC-1993.
- Administrative access
Elevated or increased privileges granted to an account for that account to manage systems, networks and/or applications. Administrative access can be assigned to an individual’s account or a built-in system account.
- Administrative control
The rules, procedures and practices dealing with operational effectiveness, efficiency and adherence to regulations and management policies
- Administrative distance
A metric used by routers to select the best network traffic path when multiple routes exist
- Advanced Encryption Standard (AES)
A public algorithm that supports keys from 128 bits to 256 bits in size
- Advanced Message Queueing Protocol (AMQP)
A messaging protocol on the application layer usually used with middleware
- Advanced persistent threat (APT)
An adversary that possesses sophisticated levels of expertise and significant resources, which allow them to create opportunities to achieve their objectives by using multiple attack vectors, e.g., cyber, physical and deception. These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information; undermining or impeding critical aspects of a mission themselves to carry out these objectives in the future. An advanced persistent threat (APT):
Pursues its objectives repeatedly over an extended period of time
Adapts to defenders' efforts to resist it
Is determined to maintain the level of interaction needed to execute its objectives
Source: CMMC-NIST SP800-39
- Adversary
A threat agent
- Adware
A software package that automatically plays, displays or downloads advertising material to a computer after the software is installed on it or while the application is being used
Scope Notes: In most cases, this is done without any notification to the user or without the user’s consent. The term adware may also refer to software that displays advertisements, whether or not it does so with the user’s consent; such programs display advertisements as an alternative to shareware registration fees. These are classified as adware in the sense of advertising supported software but not as spyware. Adware in this form does not operate surreptitiously or mislead the user, and it provides the user with a specific service.
- Affected stakeholders
People impacted by a process, activity, work product, or decision
- Affirmation
A written or oral statement confirming implementation, or lack of implementation, of processes that meet the intent and value of one or more model practices. Affirmations must be provided:
By people who have a process role that involves implementing, following, or supporting processes
In an interactive forum where the appraisal team has control over the interaction
Examples of affirmations:
Oral affirmations include: interview responses, presentations, and demonstrations, and can include responses to questions on white boards, Skype/Instant Message chat boards, etc.
Written affirmations include: emails, instant messages, and data contained in systems, documents
See Process role and Appraisal participant
- Agent
In artificial intelligence (AI), an autonomous program or system designed to perceive and interact with its environment to make decisions and take actions to achieve specific goals. Also referred to as an intelligent agent.
- Agile
A methodology of adopting flexible, adaptable and iterative processes (ISACA)
An approach to project management or delivery methodology in which the customer is intimately involved in the project, tasks are divided into short phases of work, and there is frequent reassessment and adaptation of plans (CMMI)
- Agile with Scrum
This is a CMMI context-specific tag is reserved for identifying unique information for agile projects using Scrum. It is a framework for managing work with an emphasis on software development. It is designed for small teams of developers who break their work into actions that can be completed within time-boxed iterations—called sprints—(e.g., two weeks) and track progress and replan in 15-minute stand-up meetings called daily scrums.
See Agile
- Alerting system
Provides real-time information about security issues, including vulnerabilities and exploits that are currently happening
- Alert situation
The point in an emergency procedure when the elapsed time passes a threshold and the interruption is not resolved. The enterprise entering into an alert situation initiates a series of escalation steps.
- Algorithm
A finite set of well-defined, unambiguous rules for the solution of a problem in a finite number of steps. It is a sequence of operational actions that lead to a desired goal and is the basic building block of a program
- Algorithm analysis
A software verification and validation (V&V) task to ensure that the algorithms selected are correct, appropriate and stable, and meet all accuracy, timing and sizing requirements
- Algorithmic justice
Actively identifying and dismantling harmful biases within algorithms, promoting fairer development and deployment, and promoting accountability and transparency
- Alignment
A state where the enablers of governance and management of enterprise IT support the goals and strategies of the enterprise
Scope Notes: COBIT 5 perspective
- Alignment goals
Goals that emphasize the alignment of all IT efforts with business objectives
- Allocated requirement
Requirement that results from levying all or part of a higher-level requirement on a solution's lower-level design component. Requirements can be assigned to logical or physical components, including people, consumables, delivery increments and architecture.
- Allocation entry
A recurring journal entry used to allocate revenues or costs
Scope Notes: For example, an allocation entry could be defined to allocate costs to each department based on head count.
- Alpha
The use of alphabetic characters or an alphabetic character string
- Altcoin
Have no formal definition but are widely considered to be alternative digital currencies; can also be all cryptocurrencies other than bitcoin
- Alternate facilities
Locations and infrastructures from which emergency or backup processes are executed when the main premises are unavailable or destroyed
Scope Notes: Includes other buildings, offices or data processing centers
- Alternate process
An automatic or manual process designed and established to continue critical business processes from point-of-failure to return-to-normal
- Alternative routing
A service that allows the option of having an alternate route to complete a call when the marked destination is not available
Scope Notes: In signaling, alternate routing is the process of allocating substitute routes for a given signaling traffic stream in case of failure(s) affecting the normal signaling links or routes of that traffic stream.
- American National Standards Institute (ANSI)
The organization that coordinates the development of US voluntary national standards for nearly all industries. It is the US member body to the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Information-technology industry standards pertain to programming languages, electronic data interchange, telecommunications and physical properties of diskettes, cartridges and magnetic tapes.
- American Standard Code for Information Interchange (ASCII)
See ASCII
- Amortization
The process of cost allocation that assigns the original cost of an intangible asset to the periods benefited. This is calculated in the same way as depreciation.
- Amplitude
The strength of a radio signal
- Analog
A transmission signal that varies continuously in amplitude and time and is generated in wave formation
Scope Notes: Analog signals are used in telecommunications.
- Analysis
To separate into elemental parts or basic principles to determine the nature of the whole
A course of reasoning showing that a certain result is a consequence of assumed premises
The methodical investigation of a problem and the separation of that problem into smaller related units for further detailed study (Source: ANSI)
- Analytical technique
The examination of ratios, trends and changes in balances and other values between periods to obtain a broad understanding of the enterprise's financial or operational position and to identify areas that may require further or closer investigation
Scope Notes: Often used when planning the assurance assignment
- AngularJS
An open-source JavaScript library maintained by Google and the AngularJS community that lets developers create what are known as Single [web] Page Applications. AngularJS is popular with data scientists, as a way to show the results of their analysis.
- Annotation
The process of labeling or tagging data to provide examples from which a machine learning (ML) algorithm can develop a model
- Anomaly
Unusual or statistically rare
- Anomaly detection
Detection on the basis of whether the system activity matches that defined as abnormal
- Anonymity
The quality or state of not being named or identified
- Anonymization
Irreversible severance of a data set from the identity of the data contributor to prevent any future reidentification, even by the organization collecting the data under any condition
- Antimalware
A widely used technology to prevent, detect and remove many categories of malware, including computer viruses, worms, Trojans, keyloggers, malicious browser plug-ins, adware and spyware
- Antiphishing
Software that identifies phishing content and attempts to block the content or warn the user about the suspicious nature of the content
- Antivirus software
An application software deployed at multiple points in an IT architecture. It is designed to detect and potentially eliminate virus code before damage is done and repair or quarantine files that have already been infected.
- Appearance
The act of giving the idea or impression of being or doing something
- Appearance of independence
The behavior that is appropriate of an IS auditor to meet the situations occurring during audit work (interviews, meetings, reporting, etc.)
Scope Notes: An IS auditor should be aware that appearance of independence depends on the perceptions of others and can be influenced by improper actions or associations.
- Applet
A program written in a portable, platform-independent computer language, such as Java, JavaScript or Visual Basic
Scope Notes: An applet is usually embedded in an HyperText Markup Language (HTML) page downloaded from web servers. Applets can only perform a restricted set of operations, thus preventing, or at least minimizing, the possible security compromise of the host computers. However, applets expose the user's machine to risk if not properly controlled by the browser, which should not allow an applet to access a machine's information without prior authorization of the user.
- Application
A computer program or set of programs that performs the processing of records for a specific function
Scope Notes: Applications contrast with systems programs, such as an operating system or network control program, and with utility programs, such as copy or sort.
- Application acquisition review
An evaluation of an application system being acquired or evaluated, that considers matters such as: appropriate controls being designed into the system, the processing of information in a complete, accurate and reliable manner; the application will function as intended; the application will application functionality in compliance with any applicable statutory provisions and compliance with the established system acquisition process.
- Application architecture
A description of the logical grouping of capabilities that manage the objects necessary to process information and support the enterprise’s objectives
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Application benchmarking
The process of establishing the design and operation of automated controls within an application
- Application containerization
A mechanism that is used to isolate applications from each other within the context of a running operating system instance. In much the same way that a logical partition (LPAR) provides segmentation of system resources in mainframes, a computing environment—employing containers — segments and isolates the underlying system services so that they are logically sequestered from each other.
- Application controls
The policies, procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
- Application development review
An evaluation of an application system under development that considers matters such as: appropriate controls are designed into the system; the application will process information in a complete, accurate and reliable manner; the application will function as intended; the application will function in compliance with any applicable statutory provisions and in compliance with the established system development life cycle process.
- Application development sandbox
A standalone computer, virtual machine or virtual environment used to conduct software development removed from production infrastructure
- Application implementation review
An evaluation of any part of an implementation project
Scope Notes: Examples include project management, test plans and user acceptance testing (UAT) procedures
- Application layer
The application layer provides services for an application program to ensure that effective communication with another application program in a network is possible in the Open Systems Interconnection (OSI) communications model
- Application maintenance review
An evaluation of any part of a project to perform maintenance on an application system
Scope Notes: Examples include project management, test plans and user acceptance testing (UAT) procedures
- Application or managed service provider (ASP/MSP)
A third party that delivers and manages applications and computer services, including security services to multiple users via the Internet or a private network
- Application program
A program that processes business data through activities such as data entry, update or query
Scope Notes: Contrasts with systems programs, such as an operating system or network control program, and with utility programs, such as copy or sort
- Application programming
The act or function of developing and maintaining application programs in production
- Application Programming Interface (API)
A set of routines, protocols and tools referred to as building blocks used in business application software development
- Application proxy
A service that connects programs running on internal networks to services on exterior networks by creating two connections, one from the requesting client and another to the destination service
- Application security
The security aspects supported by the application, primarily with regard to the roles or responsibilities and audit trails within the applications
- Application service provider (ASP)
A managed service provider (MSP) that deploys, hosts and manages access to a packaged application to multiple parties from a centrally managed facility
Scope Notes: The applications are delivered over networks on a subscription basis.
- Application software
A software designed to fill the specific needs of a user; for example, software for navigation, payroll or process control. Contrasts with support software and system software.
- Application software tracing and mapping
A specialized tool that can be used to analyze the flow of data through the processing logic of the application software and document the logic, paths, control conditions and processing sequences
Scope Notes: Both the command language or job control statements and programming language can be analyzed. This technique includes program/system: mapping, tracing, snapshots, parallel simulations and code comparisons.
- Application-specific integrated circuits (ASIC)
A solid-state device designed to perform a single or small group of functions
- Application system
An integrated set of computer programs designed to serve a particular function that has specific input, processing and output activities
Scope Notes: Examples include general ledger, manufacturing resource planning and human resource (HR) management.
- Applistructure
An amalgamation of applications and technical infrastructure
- Appraisal
An examination of one or more processes by a trained team using an appraisal reference model as the basis for determining, at a minimum, strengths and weaknesses
See Action plan reappraisal, Benchmark appraisal, Evaluation appraisal and Sustainment appraisal
- Appraisal Disclosure Statement (ADS)
A summary statement describing the ratings generated as outputs of the appraisal, and the conditions and constraints under which the appraisal was performed. The ADS may be used for public disclosure of maturity level or capability level profile ratings so they can be reported accurately and consistently.
- Appraisal final findings
The results of an appraisal that identify, at a minimum, any strengths and weaknesses within the appraisal scope. Appraisal findings are inferences drawn from corroborated objective evidence.
See Objective evidence
- Appraisal method
A group of appraisal activities that satisfy a defined subset of requirements, as defined by ISACA in the CMMI V2.0 Appraisal Method Definition Document
- Appraisal objectives
The outcomes desired from an appraisal
- Appraisal output
The results of an appraisal
See Appraisal results package
- Appraisal participant
The members of the organizational unit who must perform a process role and are identified in the appraisal plan as someone who will provide information used by an appraisal team
See process role.
- Appraisal rating
A value an appraisal team assigns to a CMMI practice group, practice area or the maturity level or capability level target profile of an organizational unit during a benchmark appraisal, sustainment appraisal or action plan reappraisal. Ratings are determined by following the requirements in the appraisal method.
- Appraisal results package
A package consisting of all the items required to be updated, within the CMMI Appraisal System or retained by the Appraisal Sponsor, during the entire appraisal validity period. For a detailed list, refer to Activity 2.3.4 Record Appraisal Results.
- Appraisal scope
The definition of the boundaries of the appraisal that encompass and describe the organizational unit transparently and in detail. The appraisal scope includes the organizational unit and model scope.
See model scope, and Organizational unit
- Appraisal sponsor
An individual, internal or external to the organization being appraised, who requires the appraisal to be performed, and who provides funding, the contract or other resources to conduct the appraisal. The appraisal sponsor also typically can commit the organization, e.g., approvals for purchases.
- Appraisal tailoring
An appraisal method selected for use in a specific appraisal. Tailoring helps an organization adapt the appraisal method to meet its business needs and objectives.
- Appraisal teamleader (ATL)
The role of the individual who leads the activities of an appraisal and has satisfied the qualification criteria for experience, knowledge and skills as defined by ISACA in the CMMI V2.0 Appraisal Method Definition Document. The appraisal teamleader should also be an active Certified CMMI Lead Appraiser and listed on the CMMI website as sponsored by a CMMI Partner.
- Appraisal team member (ATM)
The role of the person(s) responsible for performing the activities as assigned and identified in the appraisal plan. ATMs must meet the minimum requirements for experience and training/certification as defined by ISACA in the CMMI V2.0 Appraisal Method Definition Document.
- Appropriate evidence
The measure of the quality of the evidence
- Architectural design
The process of defining a collection of hardware and software components and their interfaces to establish the framework for the development of a computer system
See Functional design.
The result of the process outlined in definition 1
See Software engineering.
- Architecture
Description of the fundamental underlying design of the components of the business system, or of one element of the business system (e.g., technology), the relationships among them and the manner in which they support enterprise objectives (ISACA)
The set of structures that need to be considered to establish a solution. These structures are comprised of smaller components or elements, relationships among those structures and elements and the properties of both (CMMI).
See Functional architecture.
- Architecture board
A group of stakeholders and experts who provide guidance on enterprise-architecture-related matters and decisions and for setting architectural policies and standards
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Archive
A lasting collection of computer system data or other records that are in long-term storage
- Arithmetic logic unit (ALU)
The area of the central processing unit that performs mathematical and analytical operations
- Array
An n-dimensional ordered set of data items identified by a single name and one or more indices so that each element of the set is individually addressable (e.g., a matrix, table or vector)
- Artifact
A form of objective evidence that is an output of the work being performed and the process being followed. It must demonstrate the extent of implementing, performing or supporting the organizational or project processes that can be mapped to one or more model practices. Artifacts must be provided by people with a process role to implement, perform, follow or support processes.
See Document, Process role and Appraisal participant
- Artificial intelligence (AI)
An advanced computer system that can simulate human capabilities, such as analysis, based on a predetermined set of rules
- ASCII
The American Standard Code for Information Interchange (ASCII). It uses 7 or 8 bits to represent an alphanumeric symbol or special character.
- Assembler
A computer program that translates programs (source-code files) that are written in assembly language into their machine language equivalents (object-code files). This is in contrast to other programs, including Compiler and Interpreter.
See Cross-assembler, Cross-compiler
- Assembly language
A low-level programming language that corresponds closely to the instruction set of a computer, allows symbolic naming of operations and addresses, and usually results in, a one-to-one translation of program instructions (mnemonics) into machine instructions
- Assertion
Any formal declaration, or set of declarations, about a subject matter made by management
Scope Notes: Assertions should usually be made in writing and commonly contain a list of specific attributes about the subject matter or about a process involving the subject matter.
- Assessment
A broad review of the different aspects of a company or function that includes elements not covered by a structured assurance initiative
Scope Notes: May include opportunities for reducing the costs of poor quality, employee perceptions of quality aspects, proposals to senior management on policy, goals, etc.
- Asset
Something of either tangible or intangible value that is worth protecting, including people, information, infrastructure, finances and reputation
- Asset inventory
A register used to record all relevant assets
- Asset value (AV)
The value of an asset to both the business and to competitors
- Assignable cause of process variation
An extraordinary event outside the bounds of the usual steps following the process
- Assurance
An IT audit and assurance professional is engaged to issue a written communication expressing a conclusion about the subject matters for which the accountable party is responsible. Assurance refers to a number of related activities designed to provide the reader or user of the report with a level of assurance or comfort regarding the subject matter.
Scope Notes: Assurance engagements could include support for audited financial statements, reviews of controls, compliance with required standards and practices, and compliance with agreements, licenses, legislation and regulation.
- Assurance engagement
An objective examination of evidence for the purpose of providing an assessment of risk management, control or governance processes for the enterprise
Scope Notes: Examples may include financial, performance, compliance and system security engagements.
- Assurance initiative
An objective examination of evidence for the purpose of providing an assessment on risk management, control or governance processes for the enterprise
Scope Notes: Examples may include financial, performance, compliance and system security engagements
- Asymmetric cipher
A type of cipher that combines a widely distributed public key and a closely held, protected private key. A message that is encrypted by the public key can only be decrypted by its mathematically related counterpart.
- Asymmetric key (public key)
A cipher technique in which different cryptographic keys are used to encrypt and decrypt a message
Scope Notes: See public key encryption.
- Asynchronous Transfer Mode (ATM)
A high-bandwidth, low-delay switching and multiplexing technology that allows integration of real-time voice, video and data. It is a data-link layer protocol.
Scope Notes: ATM is a protocol-independent transport mechanism. It allows high-speed data transfer rates of up to 155 Mbit/s. The acronym ATM should not be confused with the alternate usage for ATM, which refers to an automated teller machine.
- Asynchronous transmission
A transmission method where characters are sent one at a time
- Atomic
A condition of smart contracts where one or more conditions defined by the smart contract must be met for the transaction to execute in its entirety
- Atomic swaps
A peer-to-peer exchange of assets across separate blockchains triggered by predetermined rules, without the use of a third-party service and through the use of self-enforced smart contracts. It requires an exchange of assets on both sides or the transaction will not occur.
- Attack
An actual occurrence of an adverse event
- Attack mechanism
A method used to deliver the exploit. Unless the attacker is personally performing the attack, an attack mechanism may involve a payload, or container, that delivers the exploit to the target.
- Attack vector
A path or route used by the adversary to gain access to the target (asset)
Scope Notes: There are two types of attack vectors: ingress and egress (also known as data exfiltration).
- Attention mechanism
In artificial intelligence (AI), a powerful feature used in machine learning (ML) and deep learning (DL) that weights the importance of different inputs, thus enhancing the model’s ability to process and interpret complex data patterns, leading to more accurate and relevant outcomes
- Attenuation
A reduction of signal strength during transmission
- Attestation
An engagement in which an IT auditor is engaged to either examine management’s assertion regarding a particular subject matter or the subject matter directly
- Attest reporting engagement
An engagement in which an IS auditor is engaged to either examine management’s assertion regarding a particular subject matter or the subject matter directly
Scope Notes: The audit report should express an opinion about whether, in all material respects, the design and/or operation of control procedures in relation to an area of activity were effective. The report should also include a description of the scope (identification or description of the audit subject or activity, the period under review and the period when the audit was performed, the nature and extent of the work performed, and any qualifications or limitations in scope).
- Attitude
A way of thinking, behaving, feeling, etc.
- Attribute sampling
A method to select a portion of a population based on the presence or absence of a certain characteristic
- Audit
A formal inspection and verification to check whether a standard or set of guidelines is being followed, records are accurate or efficiency and effectiveness targets are being met
Scope Notes: May be carried out by internal or external groups
- Auditability
The level to which transactions can be traced and audited through a system
- Auditable unit
The subjects, units or systems that are capable of being defined and evaluated
Scope Notes: Auditable units may include:
Policies, procedures and practices
Cost centers, profit centers and investment centers
General ledger account balances
Information systems (manual and computerized)
Major contracts and programs
Organizational units, such as product or service lines
Functions, such as information technology (IT), purchasing, marketing, production, finance, accounting and human resources (HR)
Transaction systems for activities, such as sales, collection, purchasing, disbursement, inventory and cost accounting, production, treasury, payroll, and capital assets
Financial statements
Laws and regulations
- Audit accountability
A performance measurement of service delivery including cost, timeliness and quality against agreed service levels
- Audit authority
A statement of an employee's position within the enterprise, including lines of reporting and the rights of access
- Audit charter
A document approved by those charged with governance that defines the purpose, authority and responsibility of the internal audit activity
Scope Notes: The charter should:
- Establish the internal audit function’s position within the enterprise
- Authorize access to records, personnel and physical properties relevant to the performance of IS audit and assurance engagements
- Define the scope of the audit function’s activities
- Audit engagement
A specific audit assignment, task or review activity, such as an audit, control self-assessment review, fraud examination or consultancy. An audit engagement may include multiple tasks or activities designed to accomplish a specific set of related objectives.
- Audit evidence
The information used to support the audit opinion
- Audit expert systems
The expert or decision support systems that can be used to assist IS auditors in the decision-making process by automating the knowledge of experts in the field
Scope Notes: This technique includes automated risk analysis, systems software and control objectives software packages
- Audit log
See Audit trail
- Audit objective
The specific goal(s) of an audit
Scope Notes: These often center on substantiating the existence of internal controls to minimize business risk
- Auditor
An individual assigned by ISACA to evaluate, audit or review an appraisal team leader or an appraisal
- Auditor’s opinion
A formal statement expressed by the IS audit or assurance professional that describes the scope of the audit, the procedures used to produce the report and whether or not the findings support that the audit criteria have been met
Scope Notes: The types of opinions are:
- Unqualified opinion— Notes no exceptions or none of the exceptions noted aggregate to a significant deficiency
- Qualified opinion— Notes exceptions aggregated to a significant deficiency (but not a material weakness)
- Adverse opinion— Notes one or more significant deficiencies aggregating to a material weakness
- Audit plan
A plan containing the nature, timing and extent of audit procedures to be performed by engagement team members in order to obtain sufficient appropriate audit evidence to form an opinion
Scope Notes: Includes the areas to be audited, the type of work planned, the high-level objectives and scope of the work. It also includes topics such as budget, resource allocation, schedule dates, type of report and its intended audience and other general aspects of the work.
A high-level description of the audit work to be performed in a certain period of time
- Audit program
A step-by-step set of audit procedures and instructions that should be performed to complete an audit
- Audit responsibility
The roles, scope and objectives documented in the service level agreement (SLA) between management and audit
- Audit risk
The risk of reaching an incorrect conclusion based upon audit findings
Scope Notes: The three components of audit risk are:
- Control risk
- Detection risk
- Inherent risk
- Audit sampling
The application of audit procedures to less than 100 percent of the items within a population to obtain evidence about a particular characteristic of the population.
- Audit subject matter risk
The risk relevant to the area under review:
- Business risk (customer capability to pay, credit worthiness, market factors, etc.)
- Contract risk (liability, price, type, penalties, etc.)
- Country risk (political, environment, security, etc.)
- Project risk (resources, skill set, methodology, product stability, etc.)
- Technology risk (solution, architecture, hardware and software infrastructure network, delivery channels, etc.).
Scope Notes: See inherent risk
- Audit trail
A logical path linking a sequence of events, in the form of data, used to trace the transactions that have affected the contents of a record
Source : ISO
- Audit universe
An inventory of audit areas that is compiled and maintained to identify areas for audit during the audit planning process
Scope Notes: Traditionally, the list includes all financial and key operational systems and other units that would be audited as part of the overall cycle of planned work. The audit universe serves as the source from which the annual audit schedule is prepared. The universe will be periodically revised to reflect changes in the overall risk profile.
- Augmented reality
A computer-generated simulation that adds enhancements to existing reality enabling a user to interact with reality in a more meaningful way. It is often accessed through mobile applications that blend digital enhancements with the real world while ensuring that the user can easily distinguish between the two.
- Authentication
The act of verifying identity, i.e., user, system
Scope Notes: Can also refer to the verification of the correctness of a piece of data.
The act of verifying the identity of a user or the user’s eligibility to access computerized information
Scope Notes: Authentication is designed to protect against fraudulent logon activity. It can also refer to the verification of the correctness of a piece of data.
- Authentication Header (AH)
The protocol used to provide connectionless integrity and data-origin authentication for Internet Protocol (IP) datagrams and to provide protection against replays (RFC 4302)
Scope Notes: AH ensures data integrity with a checksum that a message authentication code, such as MD5, generates. To ensure data-origin authentication, AH includes a secret shared key in the algorithm that it uses for authentication. To ensure replay protection, AH uses a sequence number field within the IP authentication header.
- Authenticity
The concept of undisputed authorship
- Authorization
The process of determining if the end user is permitted to have access to an information asset or the information system containing the asset
- Automated application controls
The controls that have been programmed and embedded within an application
- Autoregressive model
A model that predicts the probability distribution of each element in a sequence based on previous elements
- Auxiliary storage
A storage device other than main memory (RAM), e.g., disks and tapes
- Availability
The ability to ensure timely and reliable access to, and use of, information
- Availability risk
The risk that service may be lost or data are not accessible when needed
- Average precision
A metric for summarizing the performance of a ranked sequence of results. Average precision is calculated by taking the average of the precision values for each relevant result in a ranked list (each result in the ranked list where the recall increases relative to the previous result).
- Awareness
The idea of being acquainted with, mindful of, conscious of and well informed on a specific subject, which implies knowing and understanding a subject and acting accordingly
B
- Backbone
The main communication channel of a digital network. It is the part of a network that handles major traffic.
Scope Notes: Employs the highest-speed transmission paths in the network and may also run the longest distances. Smaller networks are attached to the backbone, and networks that connect directly to the end-user or customer are called "access networks." A backbone can span a geographic area of any size, from a single building to an office complex to an entire country. Or, it can be as small as a backplane in a single cabinet.
- Backdoor
A means of regaining access to a compromised system by installing software or configuring existing software to enable remote access under attacker-defined conditions
- Backpropagation
An algorithm for iteratively adjusting the weights used in a neural network system. Backpropagation is often used to implement gradient descent.
- Backup
The files, equipment, data and procedures available for use in the event of a failure or loss, if the originals are destroyed or out of service
- Backup center
An alternate facility used to continue IT/IS operations when the primary data processing (DP) center is unavailable
- Bad actor
A term for a cybercriminal or hacker
- Bad actor
An individual, group, country or entity who intentionally causes harm
- Badge
A card or other device that is presented or displayed to obtain access to an otherwise restricted facility as a symbol of authority (e.g., the police) or a simple means of identification
Scope Notes: Also used in advertising and publicity
- Balanced scorecard (BSC)
A coherent set of performance measures organized into four categories that include traditional financial measures and customer, internal business process and learning and growth perspectives. Developed by Robert S. Kaplan and David P. Norton.
- Bandwidth
The range between the highest and lowest transmittable frequencies. It equates to the transmission capacity of an electronic line and is expressed in bytes per second or Hertz (cycles per second).
- Bar code
A printed machine-readable code that consists of parallel bars of varied width and spacing
- Base58 Encoding
A binary-to-text encoding process that converts long bit sequences into alphanumeric text, which is easier for users
- Base64 Encoding
A binary-to-text encoding process that converts long bit sequences into alphanumeric text
- Baseband
A form of modulation in which data signals are pulsed directly on the transmission medium without frequency division and usually utilizes a transceiver
Scope Notes: The entire bandwidth of the transmission medium (e.g., coaxial cable) is utilized for a single channel.
- Base case
A standardized body of data created for testing purposes
Scope Notes: Users normally establish the data. Base cases validate production application systems and test the ongoing accurate operation of the system.
- Baseline
A specification or product that has been formally reviewed and agreed on, serves as the basis for further development and can only be changed through formal change control procedures (ISACA)
A set of specifications or work products that:
Has been formally reviewed and agreed on,
Serves as the basis for further work or change, and
Can be changed only through change control procedures
(CMMI)
See Configuration baseline and Product baseline
- Baseline architecture
The existing description of the underlying design of the components of a business system before entering a cycle of architecture review and redesign
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Base measure
A measure that is functionally independent of other measures and cannot be expressed in other terms. A base measure is defined in terms of an attribute and the method for quantifying it.
See Derived measure
- BASIC
Beginners All-purpose Symbolic Instruction Code (BASIC) is a high-level programming language intended to facilitate learning to program in an interactive environment
- Bastion
A system heavily fortified against attacks
- Batch control
The correctness checks built into data processing systems for batches of input data, particularly in the data preparation stage
Scope Notes: There are two main forms of batch controls: sequence control, which involves numbering the records in a batch consecutively so that the presence of each record can be confirmed, and control total, which is a total of the values in selected fields within the transactions.
- Batch processing
The processing of a group of transactions at the same time
Scope Notes: Transactions are collected and processed against the master files at a specified time.
- Baud rate
The rate of transmission for telecommunications data, expressed in bits per second (bps)
- Bayes' Theorem
An equation for calculating the probability that something is true if something potentially related to it is true. If P(A) means “the probability that A is true” and P(A|B) means “the probability that A is true if B is true,” then Bayes' Theorem tells us that P(A|B) = (P(B|A)P(A)) / P(B).
- Bayesian Analysis
A mathematical model that uses probability to aid in answering theoretical questions about unidentified parameters
- Bayesian network
Graphs that compactly represent the relationship between random variables for a given problem. These graphs aid in reasoning or decision-making in the face of uncertainty. These networks are usually represented as graphs in which the link between any two nodes is assigned a value representing the probabilistic relationship between those nodes.
- Benchmark
A standard against which measurements or comparisons can be made
- Benchmark appraisal
A consistent and reliable assessment method that results in a rating. This includes clear and repeatable process steps, which are capable of achieving high accuracy and reliable appraisal results through the collection of objective evidence from multiple sources. A maturity level profile or capability level profile must be produced as part of this appraisal process and allows Appraisal Sponsors to compare an organization’s or project’s process implementation with others. Like other appraisal methods, benchmark appraisals identify opportunities for improving both process implementation and business performance.
- Benchmarking
A systematic approach to comparing enterprise performance against peers and competitors in an effort to learn the best ways of conducting business
Scope Notes: Examples include benchmarking of quality, logistic efficiency and various other metrics.
- Benchmark model view
A logical grouping of predefined CMMI model components used to define the appraisal model view scope. Benchmark model views are defined in the CMMI V2.0 Model, Appendix B.
For maturity levels, the benchmark model view is a set of practice areas and their levels that are predefined for the purpose of conducting benchmark appraisals or sustainment appraisals.
For capability levels, the benchmark model view may either be a predefined view or a selection of practice or capability areas and their levels that meet the organization’s business needs and performance objectives.
- Benefit
An outcome whose nature and value (expressed in various ways) are considered advantageous by an enterprise
- Benefits realization
An objective of governance. It involves bringing new benefits to the enterprise, maintaining and extending existing forms of benefits, and eliminating initiatives and assets that are not creating sufficient value.
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Best practice
A proven activity or process that has been successfully used by multiple enterprises
- Bias
In machine learning (ML), systemic errors or distortions either in algorithms, data, or models that lead to prejudiced results
- Bidirectional traceability
An association that enables the ability to trace in either direction between logical entities, e.g., from requirements to design to code to test to the end solution, or from customer requirements to product component requirements
See Requirements traceability and Traceability
- Big data
Huge and diverse sets of information, encompassing structured and unstructured data, generated at high volume, velocity, and variety (the three Vs)
- Big game hunter (BGH)
A cyber big game hunter is a type of cyberattack that usually leverages ransomware to target large, high-value organizations or high-profile entities.
- Binary
The base 2 number system (2n). Permissible digits are 0 and 1.
- Binary classification
A type of machine learning (ML) task that categorizes observations into two groups (e.g., positive review/negative review, spam email/nonspam email, healthy patient/diseased patient)
- Binary code
A code whose representation is limited to 0 and 1
- Binding corporate rules (BCRs)
A set of rules that allow multinational organizations to transfer personal data from the EU to their affiliates outside of the EU
- Binomial distribution
A distribution that represents the outcomes of a fixed number of independent events, each with two mutually possible outcomes, a fixed number of trials and a constant probability of success. This is a discrete probability distribution, as opposed to continuous.
- Biometric data
Personal data resulting from specific technical processing relating to the physical, physiological or behavioral characteristics of a natural person, which allow or confirm the unique identification of that natural person, such as facial images or dactyloscopic data
- Biometric locks
Door and entry locks that are activated by biometric features, such as voice, retina, fingerprint or signature
- Biometrics
A security technique that verifies an individual’s identity by analyzing a unique physical attribute, such as a handprint
- BIOS (BIOS)
A basic input/output system
- Bit (Bit)
A contraction of the term binary digit, and the most basic and smallest unit of computing information. A bit may be in one of two states, logic 1 or logic 0. It can be thought of as a switch that is either on or off. Bits are usually combined into computer words of various sizes, called "bytes."
- Bit-stream image
Bit-stream backups, also referred to as mirror image backups, involve the backup of all areas of a computer hard disk drive or other type of storage media
Scope Notes: Such backups exactly replicate all sectors on a given storage device, including all files and ambient data storage areas.
- Black box testing
A testing approach that focuses on the functionality of the application or product and does not require knowledge of the code intervals
- Blockchain
A distributed, protected journaling and ledger system. Use of blockchain technologies can enable anything from digital currency (e.g., Bitcoin) to any other value-bearing transaction.
- Blockchain explorers
Front-end applications or user interfaces that allow a user to view individual records on a blockchain
- Block cipher
A public algorithm that operates on plaintext in blocks (strings or groups) of bits
- Block height
The number of blocks preceding a specific block in a blockchain ledger. It is typically used to identify a specific block (e.g., block ID).
- Block producers
An entity used for proof-of-stake on a blockchain network
- Blueprint
An exact or detailed plan or outline
- Blue team
A team of cybersecurity staff (including incident response consultants) charged with defending the enterprise during scheduled assessments called "red team" exercises
- Bluetooth
A wireless communications standard used for communication over short distances
- Bomb
A Trojan horse that attacks a computer system when a specific logical event occurs (logic bomb) or when a specific time-related logical event occurs (time bomb). It can also be hidden in electronic mail or data and triggers a computer system attack when read in a certain way (letter bomb).
Similar to: Trojan horse, virus and worm
- Boolean
A set of principles of mathematical logic developed by George Boole, a nineteenth century mathematician. Boolean algebra is the study of operations carried out on variables that can have only one of two possible values, i.e., 1 (true) and 0 (false). "Add," "subtract," "multiply" and "divide" are the primary operations of arithmetic, while "and," "or" and "not" are the primary operations of Boolean Logic. In Pascal programming language, a Boolean variable is a type of variable that can have one of two possible values: true or false.
- Boosting
A machine learning technique that iteratively combines a set of simple and not very accurate classifiers (referred to as "weak" classifiers) into a classifier with high accuracy (a "strong" classifier) by upweighting the examples the model is currently misclassifying
- Boot
To initialize a computer system by clearing memory and reloading the operating system
To cause a computer system to reach a known beginning state. A boot program, in firmware, typically performs the boot function, which includes loading basic instructions that tell the computer how to load programs into memory and how to begin executing those programs. A distinction can be made between a warm boot and a cold boot. A cold boot starts the system from a powered-down state. A warm boot restarts the computer while it is powered up. Important differences between the two procedures are:
A power-up self-test, in which various portions of the hardware, e.g., memory, are tested for proper operation, is performed during a cold boot, while a warm boot does not normally perform such self-tests
A warm boot does not clear all memory
- Bootstrap
A short computer program that is permanently resident or easily loaded into a computer, and whose execution brings a larger program, such as an operating system or its loader, into memory
- Botnet
A term derived from a robot network; a large automated and distributed network of previously compromised computers that can be simultaneously controlled to launch large-scale attacks, such as a denial-of-service attack, on targeted victims
- Boundary
Logical and physical controls used to define a perimeter between the organization and the outside world
- Boundary value
A data value that corresponds to a minimum or maximum input, internal or output value specified for a system or component
A value that lies just inside or just outside of a specified range of valid input and output values
- Boundary value analysis
A selection technique in which test data are chosen to lie along boundaries of the input domain or output range classes, data structures, procedure parameters, etc. Choices often include maximum, minimum and trivial values or parameters. This technique is often called stress testing.
See Testing, boundary value.
Source: NBS
- Branch
An instruction that causes program execution to jump to a new point in the program sequence, rather than execute the next instruction. Contrasts with condition coverage, multiple condition coverage, path coverage and statement coverage.
See Decision coverage
- Branch analysis
A test case identification technique that produces enough test cases so that each decision has a true and a false outcome at least once
- Branch coverage
A test coverage criterion that requires that for each decision point, each possible branch is executed at least once. Branch coverage is synonymous with decision coverage and contrasts with condition coverage, multiple condition coverage, path coverage and statement coverage.
- Bridge
A data link layer device developed in the early 1980s to connect local area networks (LANs) or create two separate LAN or wide area network (WAN) segments from a single segment to reduce collision domains
Scope Notes: A bridge acts as a store-and-forward device by moving frames toward their destination. This is achieved by analyzing a data packet's MAC header, which represents the hardware address of an NIC.
- Bring your own device (BYOD)
An enterprise policy used to permit partial or full integration of user-owned mobile devices for business purposes
- Broadband
Multiple channels that are formed by dividing the transmission medium into discrete frequency segments
Scope Notes: Broadband generally requires the use of a modem.
- Broadcast
A method to distribute information to multiple recipients simultaneously
- Brouter
A device that performs the functions of both a bridge and a router
Scope Notes: A brouter operates at both the data link and network layers. It connects same data link type LAN segments as well as different data link ones, which is a significant advantage. Like a bridge, it forwards packets based on the data link layer address to a different network of the same type. Also, it processes and forwards messages to a different data link type network based on the network protocol address whenever required. When connecting same data link type networks, it is as fast as a bridge.
- Browser
A computer program that enables users to retrieve information that has been made publicly available on the Internet and permits multimedia (graphics) applications on the World Wide Web
- Browser protection
Software that evaluates the safety of websites
- Brute force
A class of algorithms that methodically try all possible combinations until a solution is found
- Brute-force attack
An attack that involves methodically trying all possible combinations of passwords or encryption keys until the correct one is found
- Budget
Estimated cost and revenue amounts for a given range of periods and set of books
Scope Notes: There can be multiple budget versions for the same set of books.
- Budget formula
A mathematical expression used to calculate budget amounts based on actual results, other budget amounts and statistics
Scope Notes: With budget formulas, budgets using complex equations, calculations and allocations can be automatically created.
- Budget hierarchy
A group of budgets linked together at different levels such that the budgeting authority of a lower-level budget is controlled by an upper-level budget
- Budget organization
An entity (department, cost center, division or other group) responsible for entering and maintaining budget data
- Buffer
A device or storage area (memory) used to store data temporarily to compensate for differences in rates of data flow, time of occurrence of events or amounts of data that can be handled by the devices or processes involved in the transfer or use of the data
- Buffer overflow
An anomaly that occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold
Scope Notes: Because buffers contain a finite amount of data, excess data can overflow into adjacent buffers, corrupting or overwriting their valid data. Although it may occur accidentally through programming error, buffer overflow is also an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, which in effect, send new instructions to the attacked computer that can damage user files, change data or disclose confidential information.
- Bug
A fault in a program that causes it to perform in an unintended or unanticipated manner
See Anomaly, Defect, Error, Exception and Fault
- Bulk data transfer
A data recovery strategy that includes recovery from complete backups that are physically shipped offsite once a week
Scope Notes: Specifically, logs are batched electronically several times daily and then loaded into a tape library located at the same facility as the planned recovery.
- Bus
A common path or channel between hardware devices
Scope Notes: Can be located between internal computer components or between external computers in a communication network
- Bus configuration
A configuration in which all devices (nodes) are linked along one communication line where transmissions are received by all attached nodes
Scope Notes: This architecture is reliable in very small networks, as well as easy to use and understand. This configuration requires the least amount of cable to connect the computers together and, therefore, is less expensive than other cabling arrangements. It is also easy to extend, and two cables can be easily joined with a connector to make a longer cable to allow more computers to join the network. A repeater can also be used to extend a bus configuration.
- Business balanced scorecard
A tool for managing organizational strategy that uses weighted measures for the areas of financial performance (lag) indicators, internal operations, customer measurements and learning and growth (lead) indicators that are combined to rate the enterprise
- Business case
Documentation of the rationale for making a business investment that is used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cycle
- Business continuity
A term for preventing, mitigating and recovering from disruption
Scope Notes: The terms 'business resumption planning,' 'disaster recovery planning' and 'contingency planning' may also be used in this context as they focus on recovery aspects of continuity. For that reason, the 'resilience' aspect should also be taken into account.
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Business continuity plan (BCP)
A plan used by an enterprise to respond to the disruption of critical business processes (depends on the contingency plan for the restoration of critical systems)
- Business control
The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented or detected
- Business dependency assessment (BDA)
A process of identifying resources critical to the operation of a business process
- Business function
An activity that an enterprise does, or needs to do, to achieve its objectives
- Business goal
The translation of the enterprise's mission from a statement of intention into performance targets and results
- Business impact
The net effect, positive or negative, on the achievement of business objectives
- Business impact analysis (BIA)
The process of evaluating the criticality and sensitivity of information assets by determining the impact of losing the support of any resource to an enterprise. This establishes the escalation of a loss over time, identifies the minimum resources needed to recover and prioritizes the recovery of processes and the supporting system.
Scope Notes: This process captures income loss, unexpected expense, legal issues (regulatory compliance or contractual), interdependent processes and loss of public reputation or public confidence.
- Business impact analysis/assessment (BIA)
The process of evaluating the criticality and sensitivity of information assets. This exercise determines the impact to an enterprise of losing the support of any resource, establishes the escalation of that loss over time, identifies the minimum resources needed to recover and prioritizes the recovery of processes and the supporting system.
Scope Notes: This process also addresses:
Income loss
Unexpected expense
Legal issues (regulatory compliance or contractual)
Interdependent processes
Loss of public reputation or public confidence
- Business interruption
Any event, whether anticipated (i.e., public service strike) or unanticipated (i.e., blackout), that disrupts the normal course of business operations at an enterprise
- Business Model for Information Security
A holistic and business-oriented model that supports enterprise governance and management information security and provides a common language for information security professionals and business management
- Business objective
A further development of business goals into tactical targets and desired results and outcomes
- Business performance
The accomplishment of a given capability or task measured against known preset objectives (including, but not limited to, quality, cost, speed, accuracy and completeness) for delivery of a solution to a customer. In the CMMI, the term "business performance" refers to performance at the business or organizational level; it can be both organization-specific or aggregated from the project level. For example, it may involve collecting measurement and performance data at the project level and aggregating data to enable organizational performance analysis at the business level.
See Process performance
- Business process
An interrelated set of cross-functional activities or events that result in the delivery of a specific product or service to a customer
- Business process control
The policies, procedures, practices and organizational structures designed to provide reasonable assurance that a business process will achieve its objectives
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Business process integrity
Controls over business processes that are supported by the enterprise resource planning system (ERP)
- Business process owner
The individual responsible for identifying process requirements, approving process design and managing process performance
Scope Notes: Must be at an appropriately high level in the enterprise and have the authority to commit resources to process-specific risk management activities
- Business process reengineering (BPR)
The thorough analysis and significant redesign of business processes and management systems to establish a better-performing structure that is more responsive to the customer base and market conditions while yielding material cost savings
- Business risk
The probability that a situation with uncertain frequency and magnitude of loss (or gain) could prevent the enterprise from meeting its business objectives
- Business service provider (BSP)
An application service provider (ASP) that also outsources business processes, such as payment processing, sales order processing and application development
- Business sponsor
The individual accountable for delivering the benefits and value of an IT-enabled business investment program to the enterprise
- Business-to-business (B-to-B)
Transactions in which the acquirer is an enterprise or individual operating in the scope of their professional activity. In this case, laws and regulations related to consumer protection are not applicable.
Scope Notes: A contract’s general terms should be communicated to the other party and approved. Some companies require the other party to fill out a check-box with a description such as, "I specifically approve the clauses." This is not convincing; the best solution is adopting a digital signature scheme, which allows the approval of clauses and terms with a nonrepudiation condition.
- Business-to-consumer (B-to-C)
Selling processes in which the involved parties are an enterprise, which offers goods or services, and a consumer. In this case, there is comprehensive legislation that protects the consumer.
Scope Notes: Comprehensive legislation can include:
Contracts established outside the merchant’s property (such as the right to end a contract for a full refund or a return policy for goods)
Distance contracts (such as rules that establish how a contract should be written, specific clauses or how a contract should be transmitted to the consumer and approved)
An electronic form of contract (such as an Internet contract or the option for the consumer to exit a procedure without having their data recorded)
- Business-to-consumer ecommerce (B2C)
The processes by which enterprises conduct business electronically with their customers and/or the public at large using the Internet as the enabling technology
- Bus topology
A network topology in which nodes are connected to a single cable
- Bypass label processing (BLP)
A technique that involves reading a computer file while bypassing the internal file/data set label. This process can result in the bypassing of the security access control system.
- Byte
A sequence of adjacent bits, often an octet, operated on as a unit
- Byzantine fault tolerance (BFT)
The property of a system that allows it to withstand failures and continue to function even if some of the nodes fail or act maliciously
C
- C
A general-purpose, high-level programming language created for developing computer operating system software. It strives to combine the power of assembly language with the ease of a high-level language.
- C++
An object-oriented, high-level programming language
- Cadbury
A name associated with the Committee on the Financial Aspects of Corporate Governance (created in May 1991 by the UK Financial Reporting Council, the London Stock Exchange and the UK accountancy profession), which was chaired by Sir Adrian Cadbury. The committee produced a report on the subject commonly known in the UK as the Cadbury Report.
- Calibration layer
A post-prediction adjustment typically used to account for prediction bias. The adjusted predictions and probabilities should match the distribution of an observed set of labels.
- Candidate generation
The initial set of recommendations chosen by a recommendation system
- Capability
An aptitude, competency or resource that an enterprise may possess or require at an enterprise, business function or individual level that has the potential, or is required, to contribute to a business outcome and to create value (ISACA)
Organizational-level skills, abilities and knowledge embedded in people, processes, infrastructure and technology. An organization needs capabilities to implement its business model or fulfill its mission and achieve measurable business results. (CMMI)
- Capability area (CA)
A group of related practice areas that can improve the performance of the skills and activities of an organization or project. Capability areas are a type of view.
- Capability level
A list of practice areas (PAs) and their corresponding capability levels. A capability-level profile represents an organization's progress toward achieving its targeted practice group level for each in-scope PA.
- Capability level profile
A list of practice areas (PAs) and their corresponding capability levels. A capability level profile represents an organization’s progress toward achieving its targeted practice group level for each in-scope PA.
- Capability Maturity Model (CMM)
A model that contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc, immature processes to disciplined, mature processes with improved quality and effectiveness.
A model, from the Software Engineering Institute (SEI), used by many enterprises to identify best practices useful in helping them assess and increase the maturity of their software development processes.
Scope Notes: CMM ranks software development enterprises according to a hierarchy of five process maturity levels. Each level ranks the development environment according to its capability of producing quality software. A set of standards is associated with each of the five levels. The standards for level one describe the most immature or chaotic processes, and the standards for level five describe the most mature or quality processes. This maturity model indicates the degree of reliability or dependency a business can place on a process to achieve its desired goals or objectives. It is also a collection of instructions that an enterprise can follow to gain better control over its software development process.
- Capability Maturity Model Integration (CMMI)
An integrated model of best practices that enable businesses to improve performance by improving their processes. Product teams developed the model with global members from across the industry. The CMMI provides a best-practice framework for building, improving and sustaining process capability.
See CMMI product suite
- Capable process
A stable process that is able to meet the quality and process performance objectives set for it. The process variation is within set specification limits.
See Stable process
- Capacity stress testing
A test for testing an application with large quantities of data to evaluate its performance during peak periods. This is also called volume testing.
- Capital expenditure/expense (CAPEX)
An expenditure that is recorded as an asset because it is expected to benefit more than the current period. The asset is then depreciated or amortized over the expected useful life of the asset.
- Card swipe
A physical control technique that uses a secured card or ID to gain access to a highly sensitive location
Scope Notes: If built correctly, card swipes act as a preventive control over physical access to sensitive locations. After a card has been swiped, the application attached to the physical card swipe device logs all card users who try to access the secured location. In this way, the card swipe device prevents unauthorized access and logs all attempts to enter the secured location.
- Cartel attack
An attack that involves a group of stakers with a large amount of staked tokens in a blockchain manipulating the blockchain in their favor. Alternatively, it is a type of 51% attack on PoS blockchain.
- Category
Logical groups or types of views of related capability areas that address common problems encountered by businesses when producing or delivering solutions
- Cathode ray tube (CRT)
A vacuum tube that displays data by means of an electron beam striking the screen. It is coated with suitable phosphor material or a device similar to a television screen where data can be displayed.
- Causal analysis
A method of searching for the origin of certain effects
See Root cause
- Central bank digital currency (CBDC)
A digital form of fiat money
- Centralized data processing
A distributed processing configuration formed by one central processor and database
- Central processing unit (CPU)
Computer hardware that houses the electronic circuits that control/direct all operations of a computer system
- Centroid
The center of a cluster as determined by a k-means or k-median algorithm. For instance, if k is 3, then the k-means or k-median algorithm finds 3 centroids.
- Certificate (certification) authority (CA)
A trusted third party that serves authentication infrastructures or enterprises, registers entities and issues entities certificates
- Certificate revocation list (CRL)
An instrument for checking the continued validity of the certificates for which the certification authority (CA) has responsibility
Scope Notes: The CRL details digital certificates that are no longer valid. The time gap between two updates is critical and poses a risk in digital certificate verification.
- Certification practice statement (CPS)
A detailed set of rules governing the certificate authority's (CA) operations. It provides an understanding of the value and trustworthiness of certificates issued by a given CA.
Scope Notes: In terms of the controls an enterprise observes, this is the method used to validate the authenticity of certificate applicants and the CA's expectations of how its certificates may be used.
- Certified CMMI High Maturity Lead Appraiser (CHMLA)
The ISACA designation for a person who leads high-maturity appraisal activities and has satisfied the qualification criteria for experience, knowledge and skills defined by the Appraisal Method Definition Document. This person also has an active certification for conducting high-maturity appraisals
See Appraisal team leader
- Chain of custody
The process of evidence handling (from collection to presentation) that is necessary to maintain the validity and integrity of evidence
Scope Notes: Includes documentation of who had access to the evidence and when and the ability to identify that the evidence is the exact item that was recovered or tested. Lack of control over evidence can lead to it being discredited. Chain of custody depends on verifying that evidence could not have been tampered with. This is accomplished by sealing off the evidence so it cannot be changed and providing a documentary record of custody to prove that the evidence was, at all times, under strict control and not subject to tampering.
- Challenge/response token
A method of user authentication carried out through use of the Challenge Handshake Authentication Protocol (CHAP)
Scope Notes: When a user tries to log into the server using CHAP, the server sends the user a "challenge," which is a random value. The user enters a password, which is used as an encryption key to encrypt the "challenge" and return it to the server. The server is aware of the password. It, therefore, encrypts the "challenge" value and compares it with the value received from the user. If the values match, the user is authenticated. The challenge/response activity continues throughout the session, protecting it from password-sniffing attacks. In addition, CHAP is not vulnerable to "man-in-the-middle" attacks because the challenge value is a random value that changes on each access attempt.
- Change
A holistic and proactive approach to managing the transition from a current to a desired organizational state, focusing specifically on the critical human, or "soft" elements of change (ISACA)
Scope Notes: Includes activities such as culture change (values, beliefs and attitudes), development of reward systems (measures and appropriate incentives), organizational design, stakeholder management, human resources policies and procedures, executive coaching, change leadership training, team building and communication planning and execution.
A methodical approach for controlling and implementing changes in a planned and structured manner (CMMI)
- Change control
The processes, authorities and procedures used for all changes made to a computerized system and/or the system data. Change control is a vital subset of the quality assurance program in an enterprise and should be clearly described in the enterprise standard operating procedures.
See Configuration control
- Change enablement
A holistic and systemic process of ensuring that relevant stakeholders are prepared and committed to the changes involved in moving from a current state to a desired future state
- Change management
A holistic and proactive approach to managing the transition from a current to a desired organizational state, focusing specifically on the critical human, or "soft," elements of change (ISACA)
Scope Notes: Includes activities such as culture change (values, beliefs and attitudes), development of reward systems (measures and appropriate incentives), organizational design, stakeholder management, human resources policies and procedures, executive coaching, change leadership training, team building and communication planning and execution.
A methodical approach for controlling and implementing changes in a planned and structured manner (CMMI)
- Change risk
A change in technology, regulation, business process, functionality, architecture, users or other variables that affect the enterprise business and technical environments and the level of risk associated with systems in operation
- Channels
Private channels, also called ledger conduits, in a permissioned blockchain network where two or more nodes perform private transactions
- Channel service unit/digital service unit (CSU/DSU)
Interfaces at the physical layer of the open systems interconnection (OSI) reference model, data terminal equipment (DTE) to data circuit terminating equipment (DCE), for switched carrier networks.
- Chargeback
The redistribution of expenditures to the units within a company that produced them
Scope Notes: Chargeback is important because without such a policy, misleading views may be given as to the real profitability of a product or service because certain key expenditures will be ignored or calculated according to an arbitrary formula.
- Chatbot
A software program that interacts with humans through text or voice using natural language processing (NLP) to understand user queries, respond, and engage in dialogue that simulates human conversation
- Check digit
A numeric value, calculated mathematically, added to data to ensure that original data have not been altered or that an incorrect but valid match has not occurred
Scope Notes: Check digit control is effective in detecting transposition and transcription errors.
- Check digit verification (self-checking digit)
A programmed edit or routine that detects transposition and transcription errors by calculating and checking the check digit
- Checklist
A list of items used to verify the completeness of a task or goal
Scope Notes: Used in quality assurance (and, in general, in information systems audits) to check process compliance, code standardization, error prevention and other items for which consistency processes or standards have been defined
- Checkpointing
The process of storing a block in the history of a blockchain at intervals and refusing to accept divergent blockchain without these blocks
- Checkpoint restart procedures
A point in a routine where sufficient information can be stored to allow the restart of computation from that point
- Checksum
A value generated by an algorithm and associated with an input value and/or whole input file. The checksum value can be used to assess its corresponding input data or file later and verify that the input has not been maliciously altered. If a subsequent checksum value no longer matches the initial value, the input may have been altered or corrupted.
- Chief executive officer (CEO)
The highest ranking individual in an enterprise
- Chief financial officer (CFO)
The individual primarily responsible for managing the financial risk of an enterprise
- Chief information officer (CIO)
The most senior enterprise official who is accountable for IT advocacy, aligning IT and business strategies, and planning, resourcing and managing the delivery of IT services, information and the deployment of associated human resources
Scope Notes: In some cases, the CIO role has been expanded to become the chief knowledge officer (CKO). The CKO deals in knowledge, not just information. Also see chief technology officer (CTO).
- Chief information security officer (CISO)
The individual in charge of information security in an enterprise
- Chief risk officer (CRO)
An executive tasked with assessing and responding to risk to an enterprise’s assets
- Chief security officer (CSO)
The individual typically responsible for all physical and digital security matters in an enterprise
- Chief technology officer (CTO)
The individual who focuses on technical issues in an enterprise
Scope Notes: Often viewed as synonymous with chief information officer (CIO)
- Chipset
An integrated circuit (IC) or group of ICs that provides input and output for computer processing (e.g., RAM, graphics chips or WiFi chips)
- Chi-square test
An analysis technique used to estimate whether two variables in a cross-tabulation are correlated. A chi-square distribution varies from normal distribution based on the “degrees of freedom” used to calculate it.
- Cipher
An algorithm that performs encryption
- Ciphertext
Information generated by an encryption algorithm to protect the plaintext that is unintelligible to the unauthorized reader
- Circuit-switched network
A data transmission service that requires establishing a circuit-switched connection before data can be transferred from source data terminal equipment (DTE) to a sink DTE
Scope Notes: A circuit-switched data transmission service uses a connection network.
- Circular routing
In open systems architecture, the logical path of a message in a communication network based on a series of gates at the physical network layer in the open systems interconnection (OSI) model
- Classification
The identification of two or more categories in which an item belongs
- Cleartext
Data that is not encrypted. This is also known as plaintext.
- Client-server
A term used to broadly describe the relationship between the receiver and provider of a service. Generally, the client-server describes a networked system where front-end applications, like the client, make service requests to another networked system. Client-server relationships are defined primarily by software. In a local area network (LAN), the workstation is the client, and the file server is the server. However, client-server systems are inherently more complex than file-server systems. Two disparate programs must work in tandem, and there are many more decisions to make about separating data and processing between the client workstations and the database server. The database server encapsulates database files and indexes, restricts access, enforces security and provides applications with a consistent interface to data via a data dictionary.
- Clipping
A technique for handling outliers. Specifically, clipping includes reducing feature values that are greater than a set maximum value down to that maximum value. It also involves increasing feature values that are less than a specific minimum value up to that minimum value.
- Cloud access security brokers (CASBs)
Software or appliances that are positioned between an enterprise technology infrastructure and a cloud service provider (CSP)
- Cloud computing
Convenient, scalable on-demand network access to a shared pool of resources that can be provisioned rapidly and released with minimal management effort or service provider interaction
- Cluster controller
A communication terminal control hardware unit that controls a number of computer terminals
Scope Notes: All messages are buffered by the controller and then transmitted to the receiver.
- Clustering
An algorithm for dividing data instances into groups—not a predetermined set of groups, but groups identified by the execution of the algorithm because of similarities found among the instances. The center of each cluster is known as the "centroid."
- CMMI product suite
The integrated set of components that comprise CMMI. The product suite components include the model, appraisal method, training and certification, adoption guidance and systems and tools.
- Co-adaptation
A process by which neurons predict patterns in training data by relying almost exclusively on outputs of other specific neurons instead of the network's behavior as a whole
- Coaxial cable
A cable composed of an insulated wire that runs through the middle of each cable, a second wire that surrounds the insulation of the inner wire like a sheath and the outer insulation that wraps the second wire
Scope Notes: Has a greater transmission capacity than standard twisted-pair cables but has a limited range of effective distance
- COBIT
COBIT 2019: The current iteration of COBIT, which builds on and integrates more than 25 years of developments in the field of enterprise governance of information and technology (I&T). It not only incorporates new insights from science but also operationalizes these insights as practices. COBIT is a broad and comprehensive I&T governance and management framework that continues to establish itself as a generally accepted framework for I&T governance.
Scope Notes: Earlier versions of COBIT focused on information and technology (IT), whereas COBIT 2019 focuses on information and technology aimed at the whole enterprise, recognizing that I&T has become crucial in the support, sustainability and growth of enterprises. (See v3kx.738628.com/cobit for more information.)
COBIT 5: A complete, internationally accepted framework for governing and managing enterprise information and technology (IT) that supports enterprise executives and management in their definition and achievement of business and related IT goals. Formerly known as Control Objectives for Information and related Technology (COBIT), with this iteration used only as the acronym. COBIT describes five principles and seven enablers that support enterprises in the development, implementation and continuous improvement and monitoring of good IT-related governance and management practices.
Scope Notes: Earlier versions of COBIT focused on control objectives related to IT processes, management and control of IT processes and governance aspects. Adoption and use of the COBIT framework are supported by guidance from a growing family of supporting products.
COBIT 4.1 and earlier: A complete, internationally accepted process framework for IT that supports business and IT executives and management in their definition and achievement of business and related IT goals by providing a comprehensive IT governance, management, control and assurance model. Formally known as Control Objectives for Information and related Technology (COBIT). COBIT describes IT processes and associated control objectives, management guidelines (activities, accountabilities, responsibilities and performance metrics) and maturity models. COBIT supports enterprise management in the development, implementation, continuous improvement and monitoring of good IT-related practices.
Scope Notes: Adoption and use of the COBIT framework are supported by guidance for executives and management (Board Briefing on IT Governance, 2nd Edition), IT governance implementers (COBIT Quickstart, 2nd Edition; IT Governance Implementation Guide: Using COBIT and Val IT, 2nd Edition; and COBIT Control Practices: Guidance to Achieve Control Objectives for Successful IT Governance) and IT assurance and audit professionals (IT Assurance Guide Using COBIT). Guidance also exists to support its applicability for certain legislative and regulatory requirements (e.g., IT Control Objectives for Sarbanes-Oxley, IT Control Objectives for Basel II) and its relevance to information security (COBIT Security Baseline). COBIT is mapped to other frameworks and standards to illustrate complete coverage of the IT management life cycle and support its use in enterprises using multiple IT-related frameworks and standards.
- COBOL
A high-level programming language used for solving problems in business data processing (stands for Common Business Oriented Language).
- CoCo
A framework published by the Canadian Institute of Chartered Accountants in 1995 (stands for Criteria of Control)
- Code audit
An independent review of source code by a person, team or tool to verify compliance with software design documentation and programming standards. Correctness and efficiency may also be evaluated. This contrasts with code inspections, code reviews and code walkthroughs.
- Code of ethics
A document designed to influence employees' individual and organizational behavior by defining organizational values and the rules to be applied in certain situations
Scope Notes: A code of ethics is adopted to assist those in the enterprise called upon to make decisions in understanding the difference between 'right' and 'wrong' and to apply this understanding to their decisions.
COBIT 5 and COBIT 2019 perspective
- Coding
In software engineering, the process of expressing a computer program in a programming language
The transforming of logic and data from design specifications (design descriptions) into a programming language
- Coding standards
Written procedures describing coding (programming) style conventions that specify rules governing the use of individual constructs. These are provided by the programming language, naming, formatting and documentation requirements, which prevent programming errors, control complexity and promote the understandability of the source code. They are synonymous with development and programming standards.
- Coefficient
A number or algebraic symbol prefixed as a multiplier to a variable or unknown quantity (e.g., x in x(y + z), 6 in 6ab)
- Coevolving
Originally a biological term, the way two or more ecologically interdependent species become intertwined over time
Scope Notes: As species adapt to their environment, they also adapt to one another. Today’s multibusiness companies need to take their cue from biology to survive. They should assume that links among businesses are temporary and that the number of connections (not just content) matters. Rather than plan a collaborative strategy from the top, as traditional companies do, corporate executives in coevolving companies should simply set the context and let collaboration (and competition) emerge from business units.
- Coherence
A term that refers to establishing a potent binding force and sense of direction and purpose for an enterprise; relating different parts of an enterprise to each other and the whole to act as a seemingly unique entity
- Cohesion
The extent to which a system unit (subroutine, program, module, component, subsystem) performs a single dedicated function
Scope Notes: Generally, the more cohesive the unit, the easier it is to maintain and enhance a system because it is easier to determine where and how to apply a change.
- Cold site
An IS backup facility that has the necessary electrical and physical components of a computer facility but does not have the computer equipment in place
Scope Notes: The site is ready to receive the necessary replacement computer equipment in the event that the users have to move from the main computing location to the alternative computer facility.
- Collaborative filtering
A technique for making predictions about the interests of one user based on the interests of many other users. Collaborative filtering is often used in recommendation systems.
- Collision
The situation that occurs when two or more demands are made simultaneously on equipment that can handle only one at a given time (Federal Standard 1037C)
- Combined Code on Corporate Governance
The consolidation of the Cadbury, Greenbury and Hampel Reports in 1998
Scope Notes: Named after the committee chairs, these reports were sponsored by the UK Financial Reporting Council, the London Stock Exchange, the Confederation of British Industry, the Institute of Directors, the Consultative Committee of Accountancy Bodies, the National Association of Pension Funds and the Association of British Insurers. The Combined Code made to address the financial aspects of corporate governance, directors' remuneration and implementation of the Cadbury and Greenbury recommendations.
- Comment
In programming languages, a language construct that allows explanatory text to be inserted into a program and that does not have any effect on the execution of the program
Information embedded within a computer program, job control statements or a set of data that provides clarification to human readers but does not affect machine interpretation (Source: IEEE)
- Commercial off-the-shelf (COTS)
Items that can be purchased from a commercial supplier and used without tailoring
- Common Attack Pattern Enumeration and Classification (CAPEC)
A catalog of attack patterns that is “an abstraction mechanism for helping describe how an attack against vulnerable systems or networks is executed” (published by the MITRE Corporation)
- Common cause of variation
The variation of a process that exists because of normal and expected interactions among components of a process. This is also referred to as inherent cause of variation.
See Special cause of variation
- Communication processor
A computer embedded in a communications system that generally performs the basic tasks of classifying network traffic and enforcing network policy functions
Scope Notes: An example is the message data processor of a defense digital network (DDN) switching center. More advanced communication processors may perform additional functions.
- Communications controller
Small computers used to connect and coordinate communication links between distributed or remote devices and the main computer, thus freeing the main computer from this overhead function
- Community cloud
A cloud computing environment in which resources are shared among entities that have common interests or are in shared industries, e.g., healthcare or financial services
- Community strings
A string of characters that authenticates access to management information base (MIB) objects and functions as an embedded password
Scope Notes: Examples are:
Read-only (RO): Gives read access to all objects in the MIB (except the community strings) but does not allow write access
Read-write (RW): Gives read and write access to all objects in the MIB but does not allow access to the community strings
Read-write-all: Gives read and write access to all objects in the MIB, including the community strings (only valid for Catalyst 4000, 5000 and 6000 series switches)
Simple Network Management Protocol (SNMP) community strings are sent across the network in cleartext. The best way to protect an operating system software-based device from unauthorized SNMP management is to build a standard IP access list that includes the source address of the management station(s). Multiple access lists can be defined and tied to different community strings. If logging is enabled on the access list, log messages are generated every time the device is accessed from the management station. The log message records the source IP address of the packet.
- Compact disc–read-only memory (CD-ROM)
A compact disk used for the permanent storage of text, graphic or sound information. Digital data is represented compactly by tiny holes that can be read by lasers attached to high-resolution sensors. It is capable of storing up to 680 MB of data, equivalent to 250,000 pages of text or 20,000 medium-resolution images. This storage medium is often used for archival purposes and is synonymous with optical disks and write-once read-many times disks.
- Comparison program
A program for the examination of data that uses logical or conditional tests to identify similarities or differences
- Compartmentalization
A process for protecting very high-value assets or environments where trust is an issue. Access to an asset requires two or more processes, controls or individuals.
- Compensating control
An internal control that reduces the risk of an existing or potential control weakness resulting in errors and omissions
- Competence
The ability to perform a specific task, action or function successfully
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Competencies
The strengths of an enterprise or what it does well
Scope Notes: Can refer to the knowledge, skills and abilities of the assurance team or individuals conducting the work
- Compilation
The process of translating a program expressed in a problem-oriented or procedure-oriented language into object code. Compilation contrasts with assembling and interpret.
- Compiler
A computer program that translates programs expressed in a high-level language into their machine-language equivalents
A computer program that takes the finished source-code listing as input and outputs the machine-code instructions that the computer must have to execute the program
See Assembler and Interpreter
- Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
A type of challenge-response test used in computing to ensure that a response was not generated by a computer. An example is the site request given to website users to recognize and type a phrase posted using various challenging-to-read fonts.
- Completely connected (mesh) configuration
A network topology in which devices are connected with many redundant interconnections between network nodes (primarily used for backbone networks)
- Completeness check
A procedure designed to ensure that no fields are missing from a record
- Compliance
A term that refers to the adherence to, and the ability to demonstrate adherence to, mandated requirements defined by laws and regulations, as well as voluntary requirements resulting from contractual obligations and internal policies
- Compliance documents
Policies, standards and procedures that document actions that are required or prohibited. Violations may be subject to disciplinary actions.
- Compliance risk
The probability and consequences of an enterprise failing to comply with laws, regulations or the ethical standards and codes of conduct applicable to the enterprise's industry
- Compliance testing
Control tests designed to obtain evidence on both the effectiveness of the controls and their operation during the audit period
- Component
A general term used to mean one part of something more complex
Scope Notes: For example, a computer system may be a component of an IT service, or an application may be a component of a release unit. Components are cooperating packages of executable software that make their services available through defined interfaces. Components used in developing systems may be commercial off-the-shelf software (COTS) or purposely built. However, the goal of component-based development is to ultimately use as many predeveloped, pretested components as possible.
- Comprehensive audit
An audit designed to determine the accuracy of financial records and evaluate the internal controls of a function or department
- Computational linguistics
A branch of computer science for parsing the text of spoken languages (e.g., English or Mandarin) to convert it to structured data that can be used to drive program logic
- Computationally greedy
A term that means requiring a great deal of computing power; processor intensive
- Computer
A functional unit that can perform substantial computations, including numerous arithmetic operations (or logic operations), without human intervention during a run
A functional programmable unit that consists of one or more associated processing units and peripheral equipment, is controlled by internally stored programs and can perform substantial computations, including numerous arithmetic operations, or logic operations, without human intervention
- Computer-aided software engineering (CASE)
The use of software packages that aid in the development of all phases of an information system
Scope Notes: System analysis, design programming and documentation are provided. Changes introduced in one CASE chart will update all other related charts automatically. CASE can be installed on a microcomputer for easy access.
- Computer-assisted audit technique (CAAT)
Any automated audit technique, such as generalized audit software (GAS), test data generators, computerized audit programs and specialized audit utilities
- Computer emergency response team (CERT)
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group acts as an efficient corrective control and should also be the single point of contact for all incidents and issues related to information systems.
- Computer forensics
The application of the scientific method to digital media to establish factual information for judicial review
Scope Notes: This process often involves investigating computer systems to determine whether they have been used for illegal or unauthorized activities. As a discipline, it combines elements of law and computer science to collect and analyze data from information systems (e.g., personal computers, networks, wireless communication and digital storage devices) in a way that makes it admissible as evidence in a court of law.
- Computer instruction set
A complete set of the operators of a computer's instructions together with a description of the different meanings that can be attributed to their operands. This is synonymous with machine instruction set.
- Computer language
A language designed to enable humans to communicate with computers
See Programming language
- Computer science
The branch of science and technology concerned with methods and techniques relating to data processing performed by automatic means
- Computer security incident response team (CSIRT)
The technical team responsible for addressing security incidents
- Computer sequence checking
A process that verifies that control numbers follow sequentially and that any control numbers out of sequence are rejected or noted on an exception report for further research
- Computer server
A computer dedicated to servicing requests for resources from other computers on a network. Servers typically run network operating systems.
A computer that provides services to another computer (the client)
- Computer system
A functional unit consisting of one or more computers and associated peripheral input and output devices and software that uses common storage for all or part of a program and all or part of the data necessary for the execution of the program. A computer system executes user-written or user-designated programs; performs user-designated data manipulation, including arithmetic and logic operations; and can execute programs that modify themselves during their execution. A computer system may be a stand-alone unit or may consist of several interconnected units.
See Computer
- Computer vision
A subfield of artificial intelligence (AI) concerned with enabling computers to interpret and understand visual information such as images and videos
- Concurrency control
A class of controls used in a database management system (DBMS) to ensure that transactions are processed in an atomic, consistent, isolated and durable manner (ACID). This class of controls implies that only serial and recoverable schedules are permitted and that committed transactions are not discarded when undoing aborted transactions.
- Concurrent access
A failover process, in which all nodes run the same resource group and access the external storage concurrently. There can be no Internet Protocol (IP) or mandatory access control (MAC) address in a concurrent resource group.
- Concurrent appraisals
Two or more appraisals that have the same appraisal team leader (ATL) performing their conduct appraisal phases at the same time. Concurrent appraisals, also called simultaneous appraisals, are not allowed under any circumstances. Concurrent appraisals typically include:
Appraising one or more organizational units (OUs) with different scopes, or
Using two or more appraisal teams,
with the same time frame for their conduct appraisal phase.
- Confidence interval
A range specified for an estimate to indicate margin of error, combined with a probability that a value will fall in that range
- Confidentiality
Preserving authorized restrictions on access and disclosure, including means for protecting privacy and proprietary information
- Configurable control
Typically, an automated control that is based on, and therefore dependent on, the configuration of parameters within the application system
- Configuration identification
A configuration management activity that involves selecting configuration items for a hardware/software product, assigning them unique identifiers, and recording their functional and physical characteristics in technical documentation
See Configuration item and Configuration management
- Configuration item (CI)
Component of an infrastructure—or an item, such as a request for change, associated with an infrastructure—that is (or is to be) under the control of configuration management (ISACA)
Scope Notes: May vary widely in complexity, size and type, from an entire system (including all hardware, software and documentation) to a single module or a minor hardware component
Work products designated for configuration management and treated as a single entity in the configuration management process (CMMI)
See Configuration management
- Configuration management
The control of changes to a set of configuration items over a system life cycle (ISACA)
The process of managing the integrity of work products using configuration identification, version control, change control and audits (CMMI)
See Configuration identification, Configuration item, Configuration audit and Version control
- Confirmation
The number of blocks added to the blockchain after the network accepts that a particular transaction has been executed
- Consensus
A decision-making method that allows team members to develop a common basis of understanding and develop general agreement concerning a decision that all team members are willing to support
- Consensus mechanism
A fault-tolerant mechanism used in blockchain/distributed ledger systems to achieve the necessary agreement on data values or the state of the network among distributed processes or multiagent systems
- Consent
Any freely given, specific, informed and unambiguous indication of the data subject’s wishes by which he or she, by a statement or by a clear affirmative action, signifies agreement to the processing of personal data relating to him or her
- Consequence
The result of a realized risk. A consequence can be certain or uncertain and can have positive or negative, direct or indirect effects on objectives. Consequences can be expressed qualitatively or quantitatively.
- Consistency
The degree of uniformity, standardization and freedom from contradiction among the documents or parts of a system or component
See Traceability
- Consistency checker
A software tool used to test requirements in design specifications for consistency and completeness
- Console log
An automated detail report of computer system activity
- Consolidation
The practice of collecting and summarizing the information provided into a manageable set to:
Determine the extent to which the objective evidence is corroborated and covers the areas being investigated
Determine the objective evidence sufficiency for making judgments
Revise the objective evidence-gathering plan as necessary to achieve this sufficiency
See Objective evidence
- Consortium blockchain
A subset of private blockchains that provides a unique blend of public and private blockchain
- Constant
A value that does not change during processing; contrasts with variable
- Constrained Application Protocol (CoAP)
A messaging protocol usually implemented with low-powered devices
- Consulted
In a RACI (responsible, accountable, consulted, informed) chart, refers to those people whose opinions are sought on an activity (two-way communication)
- Consumer
One who utilizes goods
- Consumerization
A model in which emerging technologies are first embraced by the consumer market and later spread to the business
- Containers
A packaged environment that includes all necessary dependencies, executables and code for particular applications to run separately from the host computing device
- Containment
Actions taken to limit exposure after an incident has been identified and confirmed
- Content filtering
Controlling access to a network by analyzing the contents of the incoming and outgoing packets, and either letting them pass or denying them, based on a list of rules
Scope Notes: Differs from packet filtering in that content filtering analyzes the data in the packet and packet filtering analyzes the attributes of the packet itself, e.g., source/target IP address and transmission control protocol (TCP) flags
- Context
The overall set of internal and external factors that might influence or determine how an enterprise, entity, process or individual acts
Scope Notes: Context includes:
- Technology context (technological factors that affect the ability of an enterprise to extract value from data)
- Data context (data accuracy, availability, currency and quality)
- Skills and knowledge (general experience and analytical, technical, and business skills)
- Organizational and cultural context (political factors and whether the enterprise prefers data over intuition)
- Strategic context (strategic objectives of the enterprise)
COBIT 5 and COBIT 2019 perspective
- Contingency plan
Plan used by an enterprise or business unit to respond to a specific systems failure or disruption
- Contingency planning
Process of developing advance arrangements and procedures that enable an enterprise to respond to an event that might occur by chance or unforeseen circumstances
- Continuity
Preventing, mitigating and recovering from disruption
Scope Notes: The terms business resumption planning, disaster recovery planning and contingency planning also may be used in this context; they all concentrate on the recovery aspects of continuity.
- Continuous auditing approach
Allows IS auditors to monitor system reliability on a continuous basis and to gather selective audit evidence through the computer
- Continuous availability
Nonstop service, with no lapse in service; the highest level of service in which no downtime is allowed
- Continuous feature
A floating-point feature with an infinite range of possible values; contrasts with discrete feature
- Continuous improvement
The goals of continuous improvement (Kaizen) include elimination of waste (activities that add cost, but do not add value); just-in-time (JIT) delivery; production load leveling of amounts and types; standardized work; paced moving lines; and right-sized equipment.
Scope Notes: A closer definition of the Japanese usage of Kaizen is to take it apart and put it back together in a better way. What is taken apart is usually a process, system, product or service. Kaizen is a daily activity whose purpose goes beyond improvement. It is also a process that, when done correctly, humanizes the workplace, eliminates hard work (both mental and physical), and teaches people how to do rapid experiments using the scientific method and how to learn to see and eliminate waste in business processes.
- Continuous risk and control monitoring
A process that includes:
Developing a strategy to regularly evaluate selected information and technology (I&T)-related controls/metrics
Recording and evaluating I&T-related events and the effectiveness of the enterprise in dealing with those events
Recording changes to I&T-related controls or changes that affect I&T-related risk
Communicating the current risk and control status to enable information-sharing decisions involving the enterprise
- Continuous variable
A variable whose value can be any of an infinite number of values, typically within a particular range
- Contract account
The account (or address) created when a smart contract is deployed by the smart contract owner. Contract account contains the runtime virtual machine bytecode for a contract.
- Contractual requirements
Result of analysis and refinement of customer requirements into a set of requirements suitable for inclusion in solicitation packages or supplier agreements. Contractual requirements include technical and nontechnical requirements necessary to acquire a solution.
See Acquirer and Customer requirement
- Control
The means of managing risk, including policies, procedures, guidelines, practices or organizational structures, which can be of an administrative, technical, management or legal nature
Scope Notes: Also used as a synonym for safeguard or countermeasure
See Internal control
- Control center
Hosts the recovery meetings that manage disaster recovery operations
- Control flow diagram
A diagram that depicts the set of all possible sequences in which operations may be performed during the execution of a system or program. Types include box diagram, flowchart, input-process-output chart and state diagram. Contrasts with data flow diagram.
- Control framework
A set of fundamental controls that facilitates the discharge of business process owner responsibilities to prevent financial or information loss in an enterprise
- Control group
Members of the operations area who are responsible for the collection, logging and submission of input for the various user groups
- Controller
The natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data
- Control objective
A statement of the desired result or purpose to be achieved by implementing control procedures in a particular process
- Control Objectives for Enterprise Governance
A discussion document that presents an enterprise governance model focusing strongly on both the enterprise business goals and the information technology enablers that facilitate good enterprise governance, published by the Information Systems Audit and Control Foundation in 1999
- Control owner
A person to whom the enterprise has assigned the authority and accountability for making control-related decisions and who is responsible for ensuring that the control is implemented and is operating effectively and efficiently
- Control perimeter
The boundary defining the scope of control authority for an entity
Scope Notes: For example, if a system is within the control perimeter, the right and ability exist to control it in response to an attack.
- Control practice
Key control mechanism that supports the achievement of control objectives through responsible use of resources, appropriate management of risk and alignment of IT with business
- Control risk
Risk that assets are lost/compromised or that financial statements are materially misstated, due to lack of, or ineffective, design and/or implementation of internal controls
- Control risk self-assessment
A method/process by which management and staff at all levels collectively identify and evaluate risk and controls within their business areas. This assessment may be under the guidance of a facilitator, such as an auditor or risk manager.
- Control section
The area of the central processing unit (CPU) that executes software, allocates internal memory and transfers operations between the arithmetic-logic, internal storage and output sections of the computer
- Control weakness
A deficiency in the design or operation of a control procedure. Control weaknesses can result in risk not being reduced to an acceptable level in the relevant activity area (relevant risk threatens achievement of the objectives that are relevant to the activity area being examined). Control weaknesses can be material when the design or operation of one or more control procedures does not reduce to a relatively low level the risk that misstatements, caused by illegal acts or irregularities, may occur and not be detected by the related control procedures.
- Convenience sampling
The use of a dataset that is not gathered scientifically in order to run quick experiments. Later on, it is essential to switch to a scientifically gathered dataset.
- Convergence
A state reached during training in which training loss and validation loss change very little or not at all with each iteration after a certain number of iterations
- Convolutional neural network
A deep learning (DL) method that uses layers of filters to extract features and patterns from data, particularly images
- Cookie
A web browser message used for the purpose of identifying users and possibly preparing customized web pages for them
Scope Notes: The first time a cookie is set, a user may be required to go through a registration process. Subsequent to this, whenever the cookie's message is sent to the server, a customized view based on that user's preferences can be produced. The browser's implementation of cookies has, however, brought several security concerns, allowing breaches of security and the theft of personal information (e.g., user passwords that validate the user identity and enable restricted web services).
- Copyright
The protection of writings, recordings or other ways of expressing an idea. The idea itself may be common, but the way it was expressed is unique, such as a song or book.
- Core assets
The assets essential to a solution and may include:
Components
Domain models
Requirements
Performance models
Estimates and plans
Test plans and test descriptions
Process descriptions
- Corporate exchange rate
An exchange rate that can be used to perform foreign currency conversion. The corporate exchange rate is generally a standard market rate determined by senior financial management for use throughout the enterprise.
- Corporate governance
The system by which enterprises are directed and controlled. The board of directors is responsible for the governance of their enterprise. Corporate governance consists of the leadership and organizational structures and processes that ensure the enterprise sustains and extends strategies and objectives.
- Corporate security officer (CSO)
The person responsible for coordinating the planning, development, implementation, maintenance and monitoring of the information security program
- Corrective control
A control designed to correct errors, omissions, unauthorized uses and intrusions, once they are detected
- Correlation
The degree of relative correspondence between two sets of data. The correlation coefficient is a measure of how closely the two data sets correlate.
- Corroboration
The practice of considering multiple pieces of objective evidence in support of a judgment regarding an individual CMMI model practice
See Objective evidence
- COSO (COSO)
The Committee of Sponsoring Organizations of the Treadway Commission
Scope Notes: COSO's "Internal Control--Integrated Framework" is an internationally accepted standard for corporate governance. See www.coso.org.
- Cost-benefit analysis
A net result analysis that relies on the addition of positive factors and the subtraction of negative factors to build a business case supporting a risk response
- COTS
Configurable, off-the-shelf software
- Countermeasure
The reduction of threats or vulnerabilities through any direct process
- Coupling
A measure of interconnectivity among the structure of software programs. Coupling depends on the interface complexity between modules. This can be defined as the point at which entry or reference is made to a module, and what data pass across the interface.
Scope Notes: In application software design, it is preferable to strive for the lowest possible coupling between modules. Simple connectivity among modules results in software that is easier to understand and maintain, and is less prone to a ripple or domino effect caused when errors occur at one location and propagate through the system.
- Covariant
A measure of the relationship between two variables whose values are observed at the same time. Whereas variance measures how a single variable deviates from its mean, covariance measures how two variables vary in tandem from their means.
- Coverage
The proportion of known attacks detected by an intrusion detection system (IDS)
- Coverage analysis
The determination and assessment of measures associated with the invocation of program structural elements to determine the adequacy of a test run. Coverage analysis is useful when attempting to execute each statement, branch, path or iterative structure in a program. Tools that capture this data and provide reports summarizing relevant information have this feature.
See Testing, branch, Testing, path and Testing, statement.
- CPU
See Central processing unit
- Crack
To "break into" or "get around" the security of a software program
Scope Notes: For example, certain newsgroups post serial numbers for pirated versions of software. A cracker may download this information in an attempt to crack the program so he/she can use it. Crack is commonly used in the case of cracking (unencrypting) a password or other sensitive data.
- Crash
The sudden and complete failure of a computer system or component
- Crash blossom
A sentence or phrase with an ambiguous meaning
- Credentialed analysis
In vulnerability analysis, passive monitoring approaches in which passwords or other access credentials are required
Scope Notes: Usually involves accessing a system data object
- Credit risk
The potential that a borrower or creditor will fail to meet financial obligations in accordance with agreed terms
- Criteria
Standards and benchmarks to measure and present the subject matter and against which an IS auditor evaluates the subject matter
Scope Notes: Criteria should be:
- Objective— free from bias
- Measurable— provide for consistent measurement
- Complete— include all relevant factors to reach a conclusion
- Relevant— relate to the subject matter
In an attestation engagement, benchmarks against which management's written assertion on the subject matter can be evaluated. The practitioner forms a conclusion concerning subject matter by referring to suitable criteria.
- Critical control point
(QA) A function or an area in a manufacturing process or procedure, the failure of which, or loss of control over, may have an adverse effect on the quality of the finished product and may result in an unacceptable health risk
- Critical design review
A review to verify that the detailed design of one or more configuration items satisfies specified requirements; to establish the compatibility among the configuration items and other items of equipment, facilities, software and personnel; to assess risk areas for each configuration item; and, as applicable, to assess the results of producibility analyses, review preliminary hardware product specifications, evaluate preliminary test planning and evaluate the adequacy of preliminary operation and support documents
See System design review.
- Critical functions
Business activities or information that cannot be interrupted or unavailable for several business days without significantly jeopardizing operation of the enterprise
- Critical infrastructure
Systems whose incapacity or destruction will have a debilitating effect on the economic security of an enterprise, community or nation
- Criticality
The importance of a particular asset or function to the enterprise, and the impact if that asset or function is not available
- Criticality analysis
Evaluation of resources or business functions to identify their importance to the enterprise, and the impact if a function cannot be completed or a resource is not available.
- Critical success factor (CSF)
The most important issue or action for management to achieve control over and within its IT processes
- Cross-border data transfers
The transfer of personal data to recipients outside of the territory in which the data originate
- Cross-border processing
Processing of personal data in the context of the activities of establishments in more than one country of a controller or processor, where the controller or processor is established in more than one country; or processing of personal data in the context of the activities of a single establishment of a controller or processor union but which substantially affects or is likely to substantially affect data subjects in more than one country
- Cross-certification
A certificate issued by one certificate authority (CA) to a second CA that allows users of the first certification authority to obtain the public key of the second CA and verify the certificates that the second CA created
Scope Notes: Often refers to certificates issued to each other by two CAs at the same level in a hierarchy
- Cross chain
Interoperability between two independent blockchains that allows blockchains to speak to each another, mainly during an asset swap or asset transfer
- Cross-site request forgery (CSRF)
A type of malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts (also known as a one-click attack or session riding). CSRF is pronounced sea-surf.
- Cross-site scripting (XSS)
Injection of malicious scripts into otherwise benign and trusted websites
Scope Notes: Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser-side script, to a different end user. Flaws that allow these attacks to succeed are widespread and occur anywhere a web application uses input from a user within the output that it generates without validating or encoding it.
Source: OWASP
- Cross-validation
A mechanism for estimating how well a model will generalize to new data by testing the model against one or more nonoverlapping data subsets that are withheld from the training set
- Cryptoassets
Decentralized virtual currencies (and their underlying blockchain technology layers) that are meant to achieve something other than the exchange of value
- Cryptocurrency
A digital asset designed and created to function as a unit of account and payment method within its particular ecosystem. Cryptocurrency transactions usually take place within a peer-to-peer network and use cryptography to secure transaction records.
- Cryptography
The study of mathematical techniques related to aspects of information security, such as confidentiality, data integrity, entity authentication and data origin authentication
- Cryptosystem
Set of cryptographic primitives that are used to provide information security services. Most often, the term is used in conjunction with primitives providing confidentiality, i.e., encryption.
- Cryptotoken
Unit that is used for any function not related to payments within a blockchain; for example, as a function of a decentralized application or a smart contract. Security tokens or utility tokens are examples of cryptotokens. A cryptotoken can also be considered a cryptoasset.
- Culture
A pattern of behaviors, beliefs, assumptions, attitudes and ways of doing things
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Current risk
The risk state that exists in the moment, taking into account those actions that have already been taken but not actions that are anticipated or have been proposed
- Customer
The party responsible for buying or accepting a solution or for authorizing payment for a solution. Customers may also be end users.
- Customer relationship management (CRM)
Practices and strategies to identify, acquire and retain customers. CRM is also an industry term for software solutions that help an enterprise manage customer relationships in an organized manner.
- Customer requirement
The result of eliciting and consolidating needs, and resolving conflicts among those needs, expectations, constraints, and interfaces that clarifies and defines the solutions with affected stakeholders in a way that is acceptable to them
See Customer.
- Cyber and information security risk
The danger, harm or loss related to the use of, or dependence on, information and communications technology, electronic data, and digital or electronic communications
- Cybercop
An investigator of activities related to computer crime
- Cybercrime
Category of crime involving technology that may or may not involve the Internet
- Cybercriminal
An individual or entity that uses technology with malicious intent
- Cyberespionage
Activities conducted for the reason of security, business, politics or technology to find information that ought to remain secret. It is not inherently military.
- Cybersecurity
The protection of information assets by addressing threats to information processed, stored and transported by internetworked information systems (ISACA)
Protection and restoration of products, services, solutions and supply chain, including technology, computers, telecommunications systems and services, and information, to ensure their availability, integrity, authentication, transport, confidentiality and resilience. Cybersecurity is a part of information security. (CMMI)
- Cybersecurity architecture
Description of the structure, components and topology (connections and layout) of security controls within the IT infrastructure of an enterprise
Scope Notes: The security architecture shows how defense-in-depth is implemented and how layers of control are linked, and is essential to designing and implementing security controls in any complex environment.
- Cyberthreat actor (CTA)
See Bad actor
- Cyberthreat actor
- See Bad actor
- Cyberwarfare
Activities supported by military organizations with the purpose of threatening the survival and well-being of society/foreign entity
D
- D3 (Data-driven documents)
A JavaScript library that eases the creation of interactive visualizations embedded in web pages. D3 is popular with data scientists as a way to present the results of their analysis.
- Damage evaluation
The determination of the extent of damage to provide an estimate of the recovery time frame and the potential loss to the enterprise
- DAP tools
Tools used to help control the data that end users can transmit
- DASH7 Alliance Protocol (D7A)
A protocol used to enable wireless communications between actuators and sensors
- Dashboard
A tool that is used for setting enterprise expectations at each level of responsibility and for continuous monitoring of the performance against set targets
- Data
- Representations of facts, concepts or instructions in a manner suitable for communication, interpretation or processing by humans or by automated means. In the simplest terms, data are pieces of information. (ISACA)
- Qualitative or quantitative-based information that can be recorded, communicated and analyzed (CMMI)
- Data accuracy
A component of data quality that indicates whether the data values stored for an object are the correct values and are represented in a consistent and unambiguous form
- Data analysis
Obtaining an understanding of data by considering samples, measurement and visualization. Data analysis can be particularly useful when a data set is first received, before the first model is built, and is crucial for understanding experiments and debugging problems with the system.
- Data anonymization
Protection of private or sensitive information by encrypting or removing personally identifiable information from data sets to keep the people whom the data represent anonymous
- Data augmentation
Artificially boosting the range and number of training examples by transforming existing examples to create additional examples
- Database
A collection of data, often with controlled redundancy, organized according to a schema to serve one or more applications. The data are stored so that they can be used by different programs without considering the data structure or organization. A common approach is used to add new data and modify and retrieve existing data.
See Archival database.
- Database administrator (DBA)
An individual or department responsible for the security and information classification of the shared data stored on a database system. This responsibility includes the design, definition and maintenance of the database.
- Database analysis
A software verification and validation (V&V) task to ensure that the database structure and access methods are compatible with the logical design
- Database management system (DBMS)
A software system that controls the organization, storage and retrieval of data in a database
- Database replication
The process of creating and managing duplicate versions of a database
Scope Notes: Replication not only copies a database but also synchronizes a set of replicas so that changes made to one replica are reflected in all others. The beauty of replication is that it enables many users to work with their own local copy of a database while the database updates as if they were working on a single centralized database. For database applications in which users are distributed widely geographically, replication is often the most efficient method of database access.
- Database security
The degree to which a database is protected from exposure to accidental or malicious alteration or destruction
- Database specifications
The requirements for establishing a database application that include field definitions, field requirements and reporting requirements for the individual information in the database
- Data breach
See Personal data breach.
- Data classification
The assignment of a level of sensitivity to data (or information) that results in the specification of controls for each level of classification. Levels of sensitivity of data are assigned according to predefined categories as data are created, amended, enhanced, stored or transmitted. Classification level is an indication of the value or importance of the data to the enterprise.
- Data classification scheme
An enterprise scheme for classifying data by factors such as criticality, sensitivity and ownership
- Data communications
The transfer of data between separate computer processing sites/devices using telephone lines, microwave and/or satellite links
- Data concerning health
Personal data related to the physical or mental health of a natural person, including the provision of healthcare services, that reveal information about his or her health status
- Data controller
See controller.
- Data custodian
Individual(s) and department(s) responsible for the storage and safeguarding of computerized data
- Data destruction
Elimination, erasure or clearing of data
- Data dictionary
Repository that stores all the details that correspond to the data flow diagram (DFD) stores, processes and flows. It may be called a database that contains the name, type, range of values, source and authorization for access for each data element in a system. It also indicates which application programs use those data so that when a data structure is contemplated, a list of the affected programs can be generated.
- Data diddling
Changing data with malicious intent before or during input into the system
- Data Encryption Standard (DES)
A legacy algorithm for encoding binary data that was deprecated in 2006. DES and its variants were replaced by the Advanced Encryption Standard (AES).
- Data exception
An exception that occurs when a program attempts to use or access data incorrectly
- Data exfiltration
Unauthorized acquisition of data from any network or endpoint
- Data flow
The flow of data from the input (in Internet banking, ordinarily user input at his/her desktop) to the output (in Internet banking, ordinarily data in a bank’s central database). Data flow includes travel through communication lines, routers, switches and firewalls, and processing through various applications on servers that process the data.
- Data flow analysis
A software verification and validation (V&V) task to ensure that the input and output data and their formats are properly defined, and that the data flows are correct
- Data flow diagram (DFD)
A diagram that depicts data sources, data sinks, data storage, processes performed on data (represented as nodes) and logical flow of data (represented as links between the nodes)
- Data frame
A popular data type for representing data sets in pandas. A data frame is analogous to a table. Each column of the data frame has a name (a header), and each row is identified by a number.
- Data governance
Setting direction on data use through prioritization and decision making, and ensuring alignment with agreed-on direction and objectives
- Datagram
A packet (encapsulated with a frame containing information) transmitted in a packet-switching network from source to destination
- Data integrity
The degree to which a collection of data is complete, consistent and accurate
- Data leakage
Unauthorized transmission of data from an organization, either electronically or physically
- Data life cycle
The sequence of steps that data go through, beginning with its collection/generation and ending with archiving or deleting data at the end of its useful life
- Data loss prevention (DLP)
Detecting and addressing data breaches, exfiltration or unwanted destruction of data
- Data minimization
Principle that requires data to be adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed
- Data mining
The use of computers to analyze large data sets to look for patterns that assist people in making business decisions
- Data normalization
A structured process for organizing data into tables in such a way that it preserves the relationships among the data
- Data-oriented systems development
The focus on providing ad hocreporting for users by developing a suitable accessible database of information and useable data rather than a function
- Data owner
Individual(s) who has responsibility for the integrity, accurate reporting and use of computerized data
- Data portability
The ability to transmit a data subject’s data from one controller to another
- Data processing
Any operation or set of operations that are performed on personal data or on sets of personal data, whether or not by automated means, such as collection, recording, organization, structuring, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, restriction, erasure or destruction
- Data processor
A natural or legal person, public authority, agency or other body that processes personal data on behalf of the controller
- Data protection authority
Independent authority that monitors and supervises the application of a data protection law
- Data protection officer (DPO)
Enterprise officer who is responsible for informing and advising the enterprise about its data protection obligations and monitoring its compliance with them. The General Data Protection Regulation (GDPR) requires some enterprises to appoint a data protection officer.
- Data recipient
Any person, public authority, agency or another body to which the personal data are disclosed, including third parties
- Data retention
The policies that govern data and records management for meeting internal, legal and regulatory data archival requirements
- Data science
A new branch of science used to extract knowledge and insights from large and complex data sets. Data science work often requires knowledge of both statistics and software engineering.
- Data security
The controls that seek to maintain confidentiality, integrity and availability of information
- Data set
A collection of related records
- Data structure
A particular arrangement of data units, such as an array or a tree
- Data subject
A natural person whose personal data are collected, held or processed
- Data validation
A process used to determine whether data are inaccurate, incomplete or unreasonable. The process may include format checks, completeness checks, check key tests, reasonableness checks and limit checks.
The checking of data for correctness or compliance with applicable standards, rules and conventions
- Data warehouse (DW)
A generic term for a system that stores, retrieves and manages large volumes of data
Scope Notes: Data warehouse software often includes sophisticated comparison and hashing techniques for fast searches and advanced filtering
- Data wrangling
The conversion of data, often through the use of scripting languages, to make data easier to manage
- Debugging
Determining the exact nature and location of a program error and fixing the error
- Decentralization
The process of distributing computer processing to different locations within an enterprise
- Decentralized autonomous organization (DAO)
A computer program on a blockchain that uses smart contracts to set organizational rules via decentralized means
- Decision boundary
The separator between classes learned by a model in a binary class or multiclass classification problems
- Decision coverage
A test coverage criterion requiring enough test cases so that each decision has a true and false result at least once, and each statement is executed at least once. Synonymous with branch coverage. Contrasts with condition coverage, multiple condition coverage, path coverage, statement coverage
- Decision support systems (DSS)
An interactive system that provides the user with easy access to decision models and data to support semistructured decision-making tasks
- Decision trees
A tree structure to represent a number of possible decision paths and an outcome for each path
- Decoder
In sequence-to-sequence models, the part of the architecture that leverages the vectors provided by the encoder and generates an output sequence (e.g., the component that writes Spanish sentences in an English-to-Spanish machine translator)
- Decryption
A technique used to recover the original plaintext from the ciphertext so that it is intelligible to the reader. The decryption is a reverse process of the encryption.
- Decryption key
A digital piece of information used to recover plaintext from the corresponding ciphertext by decryption
- Deep fake
Media manipulated by deep learning and other AI techniques to generate and synthesize convincing yet false representations of faces and facial expressions, sounds, voices, and speech, to depict individuals or scenes falsely, typically to promote misinformation or other malicious reasons.
- Deep learning
A multilevel algorithm that gradually identifies things at higher levels of abstraction, e.g., image classification
- Deep model
A type of neural network containing multiple hidden layers
- Deep packet inspection
A type of network packet filtering that evaluates the data and header of a packet transmitted through an inspection point
- Default
A computer software setting or preference that states what will automatically happen in the event that the user has not stated another preference. For example, a computer may have a default setting to launch or start Netscape whenever a GIF file is opened; however, if using Photoshop is the preference for viewing a GIF file, the default setting can be changed to Photoshop. Default accounts are provided by the operating system vendor (e.g., root in UNIX).
- Default deny policy
A policy whereby access is denied unless it is specifically allowed or the inverse of default
- Default password
The password used to gain access when a system is first installed on a computer or network device
Scope Notes: A large list published on the Internet and maintained at several locations exists. Failure to change these after the installation leaves the system vulnerable.
- Default value
A standard setting or state taken by the program if no alternate setting or state is initiated by the system or the user or a value assigned automatically if one is not given by the user
- Defect
Refer to bug, error, exception and fault.
- Defect density
Number of defects per unit of solution size (e.g., the number of bugs per thousand lines of code)
- Defense in depth
The practice of layering defenses to provide added protection. Defense in depth improves security by increasing the effort needed in an attack by placing multiple barriers between an attacker and enterprise computing and information resources.
- Defense-in-depth approach
A systematic means of layering defenses to provide resiliency against exploited security vulnerabilities that can include aspects of physical, personnel, process, mission and cybersecurity needs
- Defined process
The essential subset of organizational process assets for any tailored and managed process. A fully defined process has enough detail that it can be consistently performed by trained and skilled people and is both persistent and habitual. A defined process is necessary at the practice group level 3 in the CMMI Practice Areas.
See Managed process.
- Degauss
The application of variable levels of alternating currents for the purpose of demagnetizing magnetic recording media
Scope Notes: The process involves increasing the alternating current field gradually from zero to some maximum value and back to zero, leaving a minimal residue of magnetic induction on the media. Degauss generally means to erase.
- Deidentification
Information that cannot reasonably identify, relate to, describe, be associated with or linked, directly or indirectly, to a particular consumer
- Deliverable
An item provided to an acquirer or other designated recipient as specified in an agreement, including a document, hardware item, software item, service or any type of work product
See Acquirer.
- Demilitarized zone (DMZ)
A small, isolated network that serves as a buffer zone between trusted and untrusted networks
Scope Notes: A demilitarized zone is typically used to house systems, such as web servers, that must be accessible from both internal networks and the Internet.
- Demodulation
The process of converting an analog telecommunications signal into a digital computer signal
- Demographic
A fact determined by measuring and analyzing data about a population, relying heavily on survey research and census data
- Denial-of-service attack (DoS attack)
An assault on a service from a single source that floods it with so many requests that it becomes overwhelmed and either stops completely or operates at a significantly reduced rate
- Dependent variable
In artificial intelligence (AI), the outcome predicted by a model, which is influenced by other independent variables
- Depreciation
The process of cost allocation that assigns the original cost of equipment to the periods benefited
Scope Notes: The most common method of calculating depreciation is the straight-line method, which assumes that assets should be written off in equal amounts over their lives.
- Derived measure
Measure defined as a function of two or more base measures often expressed as ratios, composite indices or other aggregate summary measures
See Base measure.
- Derived requirements
Requirements not explicitly stated in customer requirements but inferred and developed from:
Contextual requirements, e.g., applicable standards, laws, policies, common practices, management decisions
Requirements needed to specify a solution component
Derived requirements can also emerge during the analysis and design of solution components.
See Product component requirements.
- Design
The process of defining the architecture, components, interfaces and other characteristics of a system or component
See Architectural design, Preliminary design and detailed design.
- Designee
A delegated appraisal role responsible for performing some tasks as specified in a defined Appraisal Method Definition Document in place of the appraisal sponsor or appraisal team leader. Designee's tasks performed must be clearly identified in the appraisal plan. Only those tasks not specifically reserved, i.e., via a “must” or “shall” statement, for the appraisal team leader or appraisal sponsor may be delegated.
- Design effectiveness
Occurring when the enterprise's controls are operated as prescribed by persons possessing the necessary authority and competence to perform the control effectively, satisfy the enterprise’s control objectives and effectively prevent or detect errors or fraud that could result in material misstatements in the financial statements
- Design factors
Factors that can influence the design of an enterprise's governance system and position it for success in the use of information and technology (I&T). In COBIT® 2019, design factors include: enterprise strategy, enterprise goals, risk profile, I&T-related issues, threat landscape, compliance requirements, role of IT, sourcing model for IT, IT implantation methods, technology adoption strategy and enterprise size.
- Design phase
The period of time in the software life cycle during which the designs for architecture, software components, interfaces and data are created, documented and verified to satisfy requirements
- Design review
A formal, recorded, comprehensive and systematic examination of a solution or component design to determine whether the design meets applicable requirements, identifies problems and proposes solutions
- Detailed IS controls
Controls over the acquisition, implementation, delivery and support of IS systems and services comprised of application controls and those general controls not included in pervasive controls
- Detection risk
Risk that assets are lost or compromised or financial statements are materially misstated due to failure of an enterprise’s internal controls to detect errors or fraud in a timely manner
- Detective application controls
Controls designed to detect errors that may have occurred based on predefined logic or business rules and usually executed after an action has taken place and often include a group of transactions
- Detective control
Controls designed to detect and report when errors, omissions and unauthorized uses or entries occur
- Develop, use and keep updated
A fundamental principle in CMMI denoting that work products resulting from projects and organizational processes must be used and useful to the work and enable performance. The work products should be kept current to reflect how work is performed or improved.
- Developer
A person or group that designs and/or builds, and/or documents and/or configures the hardware and/or software of computerized systems
- Development (Dev)
Creating a solution by deliberate effort. In some contexts, development can include maintenance of the developed product or service system. In the CMMI product suite, when this term is used with the phrase “development context specific,” it is referring to this definition.
- Development methodology
A systematic approach to software creation that defines development phases and specifies the activities, products, verification procedures and completion criteria for each phase
See Incremental development, Rapid prototyping, Spiral model and Waterfall model.
- Device
A generic term for a computer subsystem, such as a printer, serial port or disk drive that frequently requires its own controlling software termed a device driver
- Device identity
Uniquely identifies a specific device
- Device management provision tools
Tools that help in device provisioning (the process of attaching a certificate to the device identity)
- DevOps
A combination of the terms: “development” and “operations.” An enterprise software development phrase used to denote a type of agile relationship between development and Information Technology (IT) operations. The goal of DevOps is to change and improve the relationship between development and operations by advocating better communication and collaboration between these two business units.
- Diagnostic
Pertaining to the detection and isolation of faults or failures (e.g., a diagnostic message and a diagnostic manual)
- Dial-back
Used as a control over dial-up telecommunications lines. The telecommunications link established through dial-up into the computer from a remote location is interrupted so the computer can dial back to the caller. The link is permitted only if the call is coming from a valid phone number or telecommunications channel.
- Dial-in access control
Prevents unauthorized access from remote users who attempt to access a secured environment. Ranges from dial-back control to remote user authentication.
- Dialogue system
A system that simulates conversations with humans through text or speech using natural language processing (NLP) to understand user input, generate responses, and maintain a coherent flow of conversation when powering various applications like chatbots, virtual assistants, and customer service agents
- Differential privacy
Achieved by adding randomly generated noise to obfuscate personal identifiability. Computations performed on altered data are only statistically/directionally correct (i.e., not accurate).
- DigiCash
An electronic money corporation and the private, secure digital money it delivers
- Digital asset
Any token—whether created in a peer-to-peer and/or cryptographic environment—that exists in a digital format with the token holder having the ability and right to use or transfer the digital asset. All cryptocurrencies and cryptotokens are subsets of digital assets.
- Digital certificate
An electronic credential that permits an entity to exchange information securely via the Internet using the public key infrastructure (PKI)
- Digital certification
A process to authenticate (or certify) a party’s digital signature; carried out by trusted third parties.
- Digital code signing
The process of digitally signing computer code to ensure its integrity.
- Digital forensics
The process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in any legal proceedings
- Digital signal processor (DSP)
Special processing unit specific to audio and telecommunication needs
- Digital signature
An electronic identification of a person or entity using a public key algorithm that serves as a way for the recipient to verify the identity of the sender, integrity of the data and proof of transaction
- Digital signature processor
Special processing unit specific to audio and telecommunication needs
- Dimensionality
In statistics, it refers to how many attributes a dataset has
- Dimension reduction
A technique to extract one or more dimensions that capture as much of the variation in the data as possible
- Direct reporting engagement
An engagement in which management does not make a written assertion about the effectiveness of their control procedures and an IS auditor provides an opinion about subject matter directly, such as the effectiveness of the control procedures.
- Disaster
An emergency event of such great magnitude that it overwhelms the capacity to respond and takes considerable time from which to recover
- Disaster declaration
The communication to appropriate internal and external parties that the disaster recovery plan (DRP) is being put into operation.
- Disaster notification fee
The fee that the recovery site vendor charges when the customer notifies them that a disaster has occurred and the recovery site is required.
Scope Notes: The fee is implemented to discourage false disaster notifications.
- Disaster recovery (DR)
Activities and programs designed to return the enterprise to an acceptable condition. The ability to respond to an interruption in services by implementing a disaster recovery plan (DRP) to restore an enterprise's critical business functions.
- Disaster recovery plan (DRP)
A set of human, physical, technical and procedural resources to recover, within a defined time and cost, an activity interrupted by an emergency or disaster
- Disaster recovery plan (DRP) desk checking (DRP)
Typically a read-through of a disaster recovery plan (DRP) without any real actions taking place.
Scope Notes: Generally involves a reading of the plan, discussion of the action items and definition of any gaps that might be identified
- Disaster recovery plan (DRP) walk-through (DRP)
Generally a robust test of the recovery plan requiring that some recovery activities take place and are tested. A disaster scenario is often given and the recovery teams talk through the steps that they would need to take to recover. As many aspects of the plan as possible should be tested.
- Disaster tolerance
The time gap during which the business can accept the non-availability of IT facilities.
- Disclosure controls and procedures
The processes in place designed to help ensure that all material information is disclosed by an enterprise in the reports that it files or submits to the U.S. Security and Exchange Commission (SEC).
Scope Notes: Disclosure Controls and Procedures also require that disclosures be authorized, complete and accurate, and recorded, processed, summarized and reported within the time periods specified in the SEC rules and forms. Deficiencies in controls, and any significant changes to controls, must be communicated to the enterprise’s audit committee and auditors in a timely manner. An enterprise’s principal executive officer and financial officer must certify the existence of these controls on a quarterly basis.
- Discount rate
An interest rate used to calculate a present value which might or might not include the time value of money, tax effects, risk or other factors.
- Discovery-based appraisal
An appraisal in which limited objective evidence is provided by the appraised organization prior to the appraisal, and the appraisal team probes and uncovers a majority of the OE during the onsite period necessary to obtain sufficient coverage of model components
See Verification-based appraisal for contrast
- Discovery sampling
A form of attribute sampling that is used to determine a specified probability of finding at least one example of an occurrence (attribute) in a population.
- Discrete variable
A variable whose potential values must be one of a specific number of values. Also known as discrete feature.
- Discretionary access control (DAC)
Logical access control filters that may be configured or modified by the users or data owners
- Discriminative model
A model that predicts labels from a set of one or more features. A discriminative model defines the conditional probability of an output based on the features and weights.
- Discriminator
A system that determines whether examples are real or fake
- Disk
A circular rotating magnetic storage hardware component. Disks can be hard (fixed) or flexible (removable) and can come in different sizes.
- Diskless workstation
A workstation or PC on a network that does not have its own disk but instead stores files on a network file server
- Disk mirroring
The practice of duplicating data in separate volumes on two hard disks to make storage more fault-tolerant. Mirroring provides data protection in the case of disk failure because data are constantly updated to both disks.
- Distributed data processing network
A system of computers connected by a communication network
Scope Notes: Each computer processes its data and the network supports the system as a whole. Such a network enhances communication among the linked computers and allows access to shared files.
- Distributed denial-of-service attack (DDoS)
A denial-of-service (DoS) assault from multiple sources
- Diverse routing
A method of routing traffic through split cable facilities or duplicate cable facilities
Scope Notes: This can be accomplished with different or duplicate cable sheaths. If different cable sheaths are used, the cable may be in the same conduit and, therefore, subject to the same interruptions as the cable it is backing up. The communication service subscriber can duplicate the facilities by having alternate routes, although the entrance to and from the customer premises may be in the same conduit. The subscriber can obtain diverse routing and alternate routing, including dual entrance facilities, from the local carrier. However, acquiring this type of access is time-consuming and costly. Most carriers provide facilities for alternate and diverse routing, although the majority of services are transmitted over terrestrial media, which are usually located in the ground or basement. Ground-based facilities are at great risk due to the aging infrastructures of cities. In addition, cable-based facilities usually share space with mechanical and electrical systems that can pose great risk due to potential human error and disasters.
- DMZ
See demilitarized zone.
- Document
A collection of information and data, regardless of the medium, that generally has permanence and can be read by humans or machines. Documents can be work products reflecting the implementation of processes that meet the intent and value of one or more model practices. Documents may be embedded within an automated, robotic or online system. Documents can be physical hard copies or soft copies that are accessible via hyperlinks in a web-based environment or application. Documents are used and kept updated.
See Artifact and Record
- Documentation
Aids for understanding the structure and intended uses of an information system or its components, such as flowcharts, textual material and user manuals
- Documentation, software
Human-readable technical data or information, including computer listings and printouts, that describe or specify design features or other details, explain capabilities, or provide operating instructions to help users obtain desired results from a software system
See Specification; Specification, requirements; Specification, design; Software design description; Test plan, Test report and User's guide.
- Domain
In COBIT, the grouping of control objectives into four logical stages in the life cycle of investments involving IT (Plan and Organize, Acquire and Implement, Deliver and Support, and Monitor and Evaluate).
- Domain name system (DNS)
A hierarchical database distributed across the Internet, which allows names to be resolved into IP addresses (and vice versa) to locate services, such as web and email servers
- Domain name system (DNS) exfiltration
A technique of tunneling over DNS to gain network access; a lower-level attack vector for simple to complex data transmission, slow but difficult to detect
- Domain name system (DNS) poisoning
Corrupts the table of an Internet server's DNS, replacing an Internet address with the address of a vagrant or scoundrel address
Scope Notes: If a web user looks for the page with that address, the request is redirected by the scoundrel entry in the table to a different address. Cache poisoning differs from another form of DNS poisoning in which the attacker spoofs valid email accounts and floods the in-boxes of administrative and technical contacts. Cache poisoning is related to URL poisoning or location poisoning, in which an Internet user's behavior is tracked by adding an identification number to the location line of the browser that can be recorded as the user visits successive pages on the site. It is also called DNS cache poisoning or cache poisoning.
- Double-loop step
Integrates the management of tactics (financial budgets and monthly reviews) and the management of strategy
Scope Notes: A reporting system, based on the balanced scorecard (BSC), that allows process to be monitored against strategy and permits corrective actions to be taken as required
- Double spending
A potential blockchain flaw in which the native digital token or currency can be spent more than once
- Downfade
Wi-Fi signal condition that occurs when signals combine and produce lower signal strength—the inverse of upfade
- Downloading
The act of transferring computerized information from one computer to another computer
- Downsampling
Reducing the amount of information in a feature to train a model more efficiently
- Downtime report
A report of the time that elapses when a computer is not operating correctly because of machine failure
- Driver
A program that links a peripheral device or internal function to the operating system and provides for activation of all device functions; contrasts with test driver
- Driver (value and risk)
An event or other activity that results in the identification of an assurance/audit need
- Dry-pipe fire extinguisher system
A sprinkler system that does not have water in the pipes during idle usage, unlike a fully charged fire extinguisher system that has water in the pipes at all times
Scope Notes: The dry-pipe system is activated at the time of the fire alarm and water is emitted to the pipes from a water reservoir for discharge to the location of the fire.
- Dual control
A procedure in which two or more entities (usually persons) operate in concert to protect a system resource so that no single entity acting alone can access that resource
- Due care
The level of care expected from a reasonable person of similar competency under similar conditions
- Due diligence
The performance of actions generally regarded as prudent, responsible and necessary to conduct a thorough and objective investigation, review or analysis
- Due professional care
The diligence that a person with a special skill would exercise under a given set of circumstances
- Dumb terminal
A display terminal without processing capability
Scope Notes: A dumb terminal is dependent on the main computer for processing. All entered data are accepted without further editing or validation.
- Duplex routing
A method or communication mode of routing data over a communication network
- Dynamic analysis
Analysis that is performed in a real-time or continuous form
- Dynamic Host Configuration Protocol (DHCP)
A protocol used by networked computers (clients) to obtain IP addresses from DHCP servers, and parameters such as default gateways, subnet masks and domain name system (DNS) server IP addresses
Scope Notes: The DHCP server ensures that all IP addresses are unique (e.g., no IP address is assigned to a second client while the first client's assignment is valid [its lease has not expired]). Thus, IP address pool management is done by the server and not by a human network administrator.
- Dynamic model
A model that is trained online in a continuously updating fashion—that is, data are continuously entering the model
- Dynamic partitioning
The variable allocation of central processing unit (CPU) processing and memory to multiple applications and data on a server
- Dynamic ports
Dynamic, or private, ports in the range 49152 through 65535; not listed by IANA because of their dynamic nature
E
- Early stopping
A method for regularization whereby model training ends before training loss finishes decreasing
- Eavesdropping
Listening to a private communication without permission
- Echo checks
The detection of line errors by retransmitting data to the sending device for comparison with the original transmission
- E-commerce
The processes by which enterprises conduct business electronically with their customers, suppliers and other external business partners, using the Internet as an enabling technology
Scope Notes: E-commerce encompasses both business-to-business (B2B) and business-to-consumer (B2C) e-commerce models but does not include existing nonInternet e-commerce methods based on private networks such as the electronic data interchange (EDI) and the Society for Worldwide Interbank Financial Telecommunication (SWIFT).
- Econometrics
The use of mathematical and statistical methods in the field of economics to verify and develop economic theories
- Economic value added (EVA)
A technique developed by G. Bennett Stewart III and registered by the consulting firm of Stern, Stewart in which the performance of the corporate capital base (including depreciated investments such as training, research and development) and more traditional capital investments such as physical property and equipment are measured against what shareholders could earn elsewhere
- Edit control
The manual or automated detection of errors in the input portion of information sent to the computer for processing, allowing the user to edit data errors before processing
- Editing
The process of ensuring that data conform to predetermined criteria and enable early identification of potential errors
- Egress
The exiting of network communications
- Electronic data interchange (EDI)
The electronic transmission of transactions (information) between two enterprises, promoting a more efficient paperless environment and often replacing the use of standard documents, including invoices or purchase orders
- Electronic document
An administrative document (a document with legal validity, such as a contract) in any graphical, photographic, electromagnetic (tape) or other electronic representation of the content
Scope Notes: Almost all countries have developed legislation concerning the definition, use and legal validity of an electronic document. An electronic document in whatever media that contain the data or information used as evidence of a contract or transaction between parties is considered together with the software program capable of reading it. The definition of a legally valid document as any representation of legally relevant data, not only those printed on paper, was introduced into the legislation related to computer crime. In addition, many countries in defining and disciplining the use of such instruments have issued regulations defining specifics, such as the electronic signature and data interchange formats.
- Electronic funds transfer (EFT)
The exchange of money via telecommunications, referring to any financial transaction that originates at a terminal and transfers a sum of money from one account to another
- Electronic signature
Any technique designed to provide the electronic equivalent of a handwritten signature to demonstrate the origin and integrity of specific data (e.g., digital signatures)
- Electronic vaulting
A data recovery strategy that allows enterprises to recover data within hours after a disaster
Scope Notes: Electronic vaulting is typically used for batch/journal updates to critical files to supplement full backups taken periodically, including recovery of data from offsite storage media that mirror data via a communication link.
- Eligibility analysis
The description of the required criteria and analysis for determining and recording when an Action Plan Reappraisal can be conducted following a benchmark appraisal or sustainment appraisal
See Action Plan Reappraisal.
- Elliptical curve cryptography (ECC)
An algorithm that combines plane geometry with algebra to achieve stronger authentication with smaller keys compared to traditional methods, such as RSA, which primarily use algebraic factoring
Scope Notes: Smaller keys are more suitable to mobile devices.
- Embedded audit module (EAM)
An integral part of an application system designed to identify and report specific transactions or other information based on predetermined criteria. Identification of reportable items occurs as part of real-time processing. Reporting may be real-time online or use store and forward methods. It is also known as an integrated test facility or a continuous auditing module.
- Embedded software
Software part of a larger system that performs some of the requirements of that system, e.g., software used in an aircraft or rapid transit system. Such software does not provide an interface with the user.
See firmware
- Empowerment
Authority given to a person or group to perform a specific task
- Encapsulation
The technique used by layered protocols in which a lower-layer protocol accepts a message from a higher-layer protocol and places it in the data portion of a frame in the lower layer. In software development, it is a technique that isolates a system function or a set of data and the operations on those data within a module and provides precise specifications for the module.
See abstraction, information hiding and software engineering
- Encapsulation (objects)
The technique used by layered protocols in which a lower-layer protocol accepts a message from a higher-layer protocol and places it in the data portion of a frame in the lower layer
- Encapsulation Security Payload (ESP)
A protocol designed to provide a mix of security services in IPv4 and IPv6. ESP can be used to provide confidentiality, data origin authentication, connectionless integrity, an antireplay service (a form of partial sequence integrity) and (limited) traffic flow confidentiality. (RFC 4303).
Scope Notes: The ESP header is inserted after the IP header and before the next-layer protocol header (transport mode) or before an encapsulated IP header (tunnel mode).
- Encoder
In sequence-to-sequence models, the part of the architecture that processes the input sequence to provide the vectors that are leveraged by the decoder (e.g., the component that processes English sentences in an English-to-Spanish machine translator)
- Encryption
The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext)
- Encryption algorithm
A mathematically based function or calculation that encrypts/decrypts data, including block or stream ciphers
- Encryption key
A piece of information in a digitized form used by an encryption algorithm to convert the plaintext to the ciphertext
- Encryption tools
Tools used to encrypt data
- End point
A device that can communicate with a connected network
- Endpoint detection and response systems
Systems focused on detecting and investigating suspicious activities on end points
- End user
A person, device, program or computer system that uses an information system for the purpose of data processing in information exchange
A person whose occupation requires the use of an information system but does not require any knowledge of computers or computer programming
See user
- End-user computing
The ability of end users to design and implement their own information system using computer software products
- Engagement letter
Formal document that defines an IS auditor's responsibility, authority and accountability for a specific assignment
- Enterprise
A group of individuals working together for a common purpose, typically within the context of an organizational form such as a corporation, public agency, charity or trust
- Enterprise architecture (EA)
A description of the fundamental underlying design of the business system components or one element of the business system (e.g., technology), the relationships among them and the manner in which they support the enterprise’s objectives
- Enterprise architecture (EA) for IT (EA)
A description of the fundamental underlying design of the IT components of the business, the relationships among them and the manner in which they support the enterprise’s objectives
- Enterprise goal
Scope Notes: See business goal.
- Enterprise governance
A set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risk is managed appropriately and verifying that the enterprise’s resources are used responsibly
- Enterprise governance of information and technology (EGIT)
A concern for the value delivery from digital transformation and the mitigation of business risk that results from digital transformation. Three main outcomes can be expected after successful adoption of EGIT: benefits realization, risk optimization and resource optimization.
- Enterprise risk management (ERM)
The discipline by which an enterprise in any industry assesses, controls, exploits, finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
- Entity relationship diagram (ERD)
A diagram that depicts a set of real-world entities and the logical relationships among them
- Entry criteria
Conditions that must be met before an effort can begin successfully
See exit criteria.
- Environment
Everything that supports a system or the performance of a function
The conditions that affect the performance of a system or function
- Environmental risk
Threats to natural resources, human health and wildlife
- Episode
Each of the repeated attempts by the agent to learn an environment in reinforcement learning
- Epoch
A full training review of the entire dataset such that each example has been seen once. Thus, an epoch represents N/batch size training iterations where N is the total number of examples.
- Epsilon greedy policy
A policy that either follows a random policy with Epsilon probability or a greedy policy otherwise in reinforcement learning
- Eradication
The process of identifying and removing the root cause of an incident from the network when containment measures have been deployed after the incident occurs
- Erasure
The data subject’s ability to obtain the erasure of personal data from the controller; also known as the right to be forgotten
- ERP (enterprise resource planning) system (ERP)
A packaged business software system that allows an enterprise to automate and integrate the majority of its business processes, share common data and practices across the entire enterprise and produce and access information in a real-time environment
Scope Notes: Examples of ERP include SAP®, Oracle Financials® and J.D. Edwards®.
- Error
A deviation between a computed, observed or measured value or condition and the true, specified or theoretically correct value or condition
See anomaly, bug, defect, exception and fault.
- Error detection
Techniques used to identify errors in data transfers
- Escrow agent
A person, agency or enterprise authorized to act on behalf of another to create a legal relationship with a third party regarding an escrow agreement; also known as the custodian of an asset according to an escrow agreement
Scope Notes: As it relates to a cryptographic key, an escrow agent is the agency or enterprise charged with the responsibility for safeguarding the key components of the unique key.
- Escrow agreement
A legal arrangement whereby an asset (often money but sometimes other property such as art, a deed of title, website, software source code or a cryptographic key) is delivered to a third party (named an escrow agent) to be held in trust or otherwise pending a contingency or the fulfillment of a condition(s) in a contract
Scope Notes: Upon the occurrence of the escrow agreement, escrow agents will deliver the asset to the proper recipient; otherwise, the escrow agents are bound by their fiduciary duty to maintain the escrow account. Source code escrow signifies a deposit of the source code for the software into an account held by an escrow agent. Escrow is typically requested by a party licensing software (e.g., licensee or buyer) to ensure maintenance of the software. The software source code is released by the escrow agent to the licensee if the licensor (e.g., seller or contractor) files for bankruptcy or otherwise fails to maintain and update the software as promised in the software license agreement.
- Ethereum
An open source blockchain system enabling smart contracts and producing Ether as its native cryptocurrency
- Ethereum request for comments (ERC)
Ethereum blockchain standards designed to enable Layer 2 tokens
- Ethernet
A popular network protocol and cabling scheme that uses a bus topology and carrier sense multiple access/collision detection (CSMA/CD) to prevent network failures or collisions when two devices attempt to access the network simultaneously
- Evaluation
An examination of products, processes, services or environments to identify strengths and weaknesses
- Evaluation appraisal
A consistent and reliable assessment method typically used to identify improvement opportunities or business performance without a rating. This includes clear and repeatable process steps used to conduct an initial gap analysis, performance improvement progress monitoring or readiness for benchmark appraisals or sustainment appraisals
- Evaluation metric
A measure used to assess how well models perform their tasks like accuracy, precision, or recall
- Event
Something that happens at a specific place and/or time
- Event table
A table that lists events and the corresponding specified effect(s) of or reaction(s) to each event
- Event type
One of three possible types of events for the purpose of IT risk management: threat event, loss event and vulnerability event
Scope Notes: The ability to consistently and effectively discern the different types of events that contribute to risk is a critical element in developing good risk-related metrics and well-informed decisions. Unless these categorical differences are recognized and applied, any resulting metrics lose meaning and, as a result, decisions based on those metrics are far more likely to be flawed.
- Evidence
Information that proves or disproves a stated issue
Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support
Scope Notes: Audit perspective
- Example activities
Possible actions that may be taken when implementing processes that meet the intent of a practice. The intent of "Example Activities" is to serve as guidance and suggestions, not as required activities; it is not intended to be a comprehensive list.
- Example work products
Possible outputs of implementing processes that meet the intent of a practice. The intent of "Example Work Products" is to serve as guidance and suggestions, not as required work products; it is not intended to be a comprehensive list.
- Exception
An event that causes suspension of normal program execution. Types include addressing exception, data exception, operation exception, overflow exception, protection exception and underflow exception.
- Exception reports
Reports generated by a program that identifies transactions or data that appear to be incorrect
Scope Notes: Exception reports contain items that may be outside a predetermined range or may not conform to specified criteria.
- Exclusive-OR (XOR)
An operator that returns a value of TRUE only if just one of its operands is TRUE
Scope Notes: The XOR operation is a Boolean operation that produces a 0 if its two Boolean inputs are the same (0 and 0 or 1 and 1) and that produces a 1 if its two inputs are different (1 and 0). In contrast, an inclusive-OR operator returns a value of TRUE if either or both of its operands are TRUE.
- Executable code
The machine language code generally referred to as the object or load module
- Exit criteria
Conditions that must be met before successful completion of an effort
- Expert system
The most prevalent type of computer system that arises from the research of artificial intelligence
Scope Notes: An expert system has a built-in hierarchy of rules, which are acquired from human experts in the appropriate field. Once input is provided, the system should be able to define the nature of the problem and provide recommendations to solve the problem.
- Explainable artificial intelligence (AI)
Artificial intelligence (AI) systems that provide transparent and understandable explanations for decisions or predictions, enabling users to comprehend the reasoning behind AI-generated outcomes
- Exploding gradient problem
The tendency for gradients in deep neural networks (especially recurrent neural networks) to become surprisingly steep (high)
- Exploit
A method used to take advantage of a vulnerability
- Exposure (EF)
The potential loss to an area due to the occurrence of an adverse event
- Extended Binary Coded Decimal Interchange Code (EBCDIC)
An 8-bit code representing 256 characters; used in most large computer systems
- Extended enterprise
An enterprise that extends outside its traditional boundaries. Such enterprises concentrate on the processes they do best and rely on someone outside the entity to perform the remaining processes.
- eXtensible Access Control Markup Language (XACML)
A declarative online software application user access control policy language implemented in eXtensible Markup Language (XML)
- eXtensible Markup Language (XML)
A web-based application development technique that allows designers to create their own customized tags, thus enabling the definition, transmission, validation and interpretation of data between applications and enterprises; promulgated through the World Wide Web Consortium
- Externally owned account (EOA)
An address generated from a user’s public key. An EOA is typically owned by an individual
- External router
A router at the extreme edge of the network under control, usually connected to an Internet service provider (ISP) or other service provider; also known as a border router
- External storage
The location that contains backup copies to be used in case recovery or restoration is required in the event of a disaster
- Extranet
A private network that resides on the Internet and allows a company to securely share business information with customers, suppliers or other businesses as well as to execute electronic transactions
Scope Notes: Different from an Intranet in that it is located beyond the company's firewall. Therefore, an extranet relies on the use of securely issued digital certificates (or alternative methods of user authentication) and encryption of messages. A virtual private network (VPN) and tunneling are often used to implement extranets, to ensure security and privacy.
F
- Fail-over
The transfer of service from an incapacitated primary component to its backup component
- Fail-safe
A system or component that automatically places itself in a safe operational mode in the event of a failure
Source: IEEE
- Failure
The inability of a system or component to perform its functions within specified performance requirements
Source: IEEE
See Bug, Crash, Exception and Fault.
- Failure analysis
Determining the exact nature and location of a program error to fix the error, to identify and fix other similar errors and to initiate corrective action to prevent future occurrences of this type of error. Contrasts with debugging.
- Fallback procedures
A plan of action or set of procedures to be performed if a system implementation, upgrade or modification does not work as intended
Scope Notes: May involve restoring the system to its state prior to the implementation or change. Fallback procedures are needed to ensure that normal business processes continue in the event of failure and should always be considered in system migration or implementation.
- Fall-through logic
An optimized code, based on a branch prediction, that predicts which way a program will branch when an application is presented
- False authorization
Also called false acceptance, occurs when an unauthorized person is identified as an authorized person by the biometric system
- False negative (FN)
An example in which the model mistakenly predicted the negative class
- False positive (FP)
An example in which the model mistakenly predicted the positive class
- Fault tolerance
A system’s level of resilience to seamlessly react to hardware and/or software failure
- Feasibility study
Analysis of the known or anticipated need for a product, system or component to assess the degree to which the requirements, designs or plans can be implemented
- Feature
The machine-learning expression for a piece of measurable information about something. For example, if researchers store the age, annual income and weight of a set of people, they are storing three features about them.
- Feature cross
A synthetic feature formed by crossing (i.e., taking a Cartesian product of) individual binary features obtained from categorical data or from continuous features via bucketing. Feature crosses help represent nonlinear relationships.
- Feature engineering
The process of extrapolating features from raw data. Depending on the task, this step might involve the selection, manipulation, and transformation of data.
- Federated learning
A distributed machine-learning approach that trains machine-learning models using decentralized examples residing on devices such as smartphones
- Feedforward neural network (FFN)
A neural network without cyclic or recursive connections. For example, traditional deep neural networks are feedforward neural networks.
- Few-shot learning
A machine-learning approach, often used for object classification, designed to learn effective classifiers from only a small number of training examples
- Fiber-optic cable
A cable made of glass fibers that transmits binary signals over a telecommunications network.
Scope Notes: Fiber-optic systems have low transmission losses as compared to twisted-pair cables. They do not radiate energy or conduct electricity. They are free from corruption and lightning-induced interference, and they reduce the risk of wiretaps.
- Field
On a data medium or in storage, a specified area used for a particular class of data, e.g., a group of character positions used to enter or display wage rates on a screen
Defined logical data that is part of a record
The elementary unit of a record that may contain a data item, a data aggregate, a pointer or a link
A discrete location in a database that contains a unique piece of information. A field is a component of a record. A record is a component of a database.
- File
A set of related records treated as a unit, e.g., in stock control, a file can consist of a set of invoices
The largest unit of storage structure that consists of a named collection of all occurrences in a database of records of a particular record type
- File allocation table (FAT)
A table used by the operating system to keep track of where every file is located on the disk.
Scope Notes: Since a file is often fragmented and thus subdivided into many sectors within the disk, the information stored in the FAT is used when loading or updating the contents of the file.
- File-integrity monitoring
Detecting changes to files and configurations to determine any changes to a baseline
- File layout
Specifies the length of the file record and the sequence and size of its fields.
Scope Notes: Also will specify the type of data contained within each field; for example, alphanumeric, zoned decimal, packed and binary.
- File server
A high-capacity disk storage device or a computer that stores data centrally for network users and manages access to those data.
Scope Notes: File servers can be dedicated so that no process other than network management can be executed while the network is available; file servers can be non-dedicated so that standard user applications can run while the network is available.
- File Transfer Protocol (FTP)
A protocol used to transfer files over a Transmission Control Protocol/Internet Protocol (TCP/IP) network (Internet, UNIX, etc.)
- Filing system
Structured set of personal data which are accessible according to specific criteria, whether centralized, decentralized or dispersed on a functional or geographical basis.
- Filtering router
A router that is configured to control network access by comparing the attributes of the incoming or outgoing packets to a set of rules.
- FIN (Final)
A flag set in a packet to indicate that this packet is the final data packet of the transmission.
- Financial audit
An audit designed to determine the accuracy of financial records and information.
- Fine-tuning pretrained models
The process of training only a small portion of a large pretrained model so that it can learn how to perform a task for which it had not been originally trained
- Finger
A protocol and program that allows the remote identification of users logged into a system.
- Fire protection system
Systems that help to mitigate the unwanted effects of a fire
- Firewall
A system or combination of systems that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet
- Firmware
The combination of a hardware device, e.g., an IC, and computer instructions and data that reside as read only software on that device. Such software cannot be modified by the computer during processing.
See Embedded software.
- First responder interfaces
Systems used to document and communicate information about a breach or other security incident by those first responding to the breach or incident
- Fiscal year
Any yearly accounting period without regard to its relationship to a calendar year.
- Flat file
A data file that does not physically interconnect with or point to other files. Any relationship between two flat files is logical, e.g., matching account numbers.
- Flowchart or flow diagram
Graphical representation in which symbols are used to represent such things as operations, data, flow direction and equipment, for the definition, analysis or solution of a problem
A control flow diagram in which suitably annotated geometrical figures are used to represent operations, data or equipment, and arrows are used to indicate the sequential flow from one to another. Synonymous with flow diagram.
See Block diagram, Box diagram, Bubble chart, Graph, Input-Process-output chart and Structure chart.
- Focus area
An area that describes a certain governance topic, domain or issue that can be addressed by a collection of governance and management objectives and their components.
- Fog computing
Computing architecture that conducts a large portion of data computations on edge devices
- Follow-up activity
Activity that determines whether management has taken appropriate corrective actions to resolve deficiencies.
- Foreign key
A value that represents a reference to a tuple (a row in a table) containing the matching candidate key value.
Scope Notes: The problem of ensuring that the database does not include any invalid foreign key values is known as the referential integrity problem. The constraint that values of a given foreign key must match values of the corresponding candidate key is known as a referential constraint. The relation (table) that contains the foreign key is referred to as the referencing relation and the relation that contains the corresponding candidate key as the referenced relation or target relation. (In the relational theory it would be a candidate key, but in real database management systems (DBMSs) implementations it is always the primary key.)
- Forensic examination
The process of collecting, assessing, classifying and documenting digital evidence to assist in the identification of an offender and the method of compromise.
- Format checking
The application of an edit, using a predefined field definition to a submitted information stream; a test to ensure that data conform to a predefined format.
- FORTRAN
An acronym for FORmula TRANslator, the first widely used high-level programming language. Intended primarily for use in solving technical problems in mathematics, engineering and science
- Forward error correction (FEC)
Error controlling mechanism for channels with a large amount of interference
- Fourth-generation language (4GL)
High-level, user-friendly, nonprocedural computer language used to program and/or read and process computer files.
- Frame relay
A packet-switched wide-area-network (WAN) technology that provides faster performance than older packet-switched WAN technologies.
Scope Notes: Best suited for data and image transfers. Because of its variable-length packet architecture, it is not the most efficient technology for real-time voice and video. In a frame-relay network, end nodes establish a connection via a permanent virtual circuit (PVC).
- Framework
A framework is a basic conceptual structure used to solve or address complex issues. An enabler of governance. A set of concepts, assumptions and practices that define how something can be approached or understood, the relationships among the entities involved, the roles of those involved and the boundaries (what is and is not included in the governance system).
See Control framework and IT governance framework.
- Fraud
Any act involving the use of deception to obtain illegal advantage
- Freeware
A type of software available free of charge
- Frequency
A measure of the rate by which events occur over a certain period of time
- Frequency analysis
An analysis that determines how often a particular risk scenario might be expected to occur during a specified period of time
- Full economic life cycle
The period of time during which material business benefits are expected to arise, and/or during which material expenditures (including investments, running and retirement costs) are expected to be incurred by an investment program
Scope Notes: COBIT 5 perspective
- Full node
A critical network device that supports and provides security for the blockchain and is capable of validating and relaying new blocks into the chain
- Function
A mathematical entity whose value (the value of the dependent variable) depends on the values of one or more independent variables, with not more than one value of the dependent variable corresponding to each permissible combination of values from the respective ranges of the independent variables
A specific purpose of an entity, or its characteristic action
In data communication, a machine action, such as carriage return or line feed
- Functional analysis
A type of analysis that verifies whether or not each safety-critical software requirement is covered and that an appropriate criticality level is assigned to each software element (ISACA)
An examination of solution components to broaden and deepen understanding (CMMI)
- Functional architecture
The conceptual structure and logical arrangement of functions. This may include internal and external interface functions.
See Architecture and Functional Analysis
- Functional design
The process of defining the working relationships among the components of a system. See Architectural Design
The result of the process in definition 1
- Functional requirement
A requirement that specifies the function(s) that a system or system component must be able to perform
- Functional safety
The detection of a potentially dangerous condition resulting in the activation of a protective or corrective solution to prevent hazardous events from arising, or the act of providing mitigation to reduce the consequence of the hazardous event.
The aspect of the overall safety of a solution, solution component or piece of equipment that depends on the automatic protection mechanisms operating correctly in response to its inputs or failure in a predictable manner (fail-safe). An automatic protection system may be designed to properly handle likely human errors, hardware, solution or solution component failures and operational/environmental stress.
- Function point analysis (FPA)
A technique used to determine the size of a development task, based on the number of function points
Scope Notes: Function points are factors such as inputs, outputs, inquiries and logical internal sites.
G
- Garbage in, garbage out (GIGO)
The concept of data that is nonsensical, or flawed, especially as it relates to the computational sciences
- Gas
A unit/fee that measures the amount of computational effort required to execute certain operations related to a function or smart contract on a blockchain. Best known in relation to the Ethereum blockchain/network.
- Gas fee
The cost required to process a transaction on the network (specific to the Ethereum blockchain). Miners can set the price of gas and decline to process a transaction if it does not meet the price threshold that they determine.
- Gateway
A physical or logical device on a network that serves as an entrance to another network (e.g., router, firewall or software)
- GB
Gigabyte
- Gemba walk
The term used to describe personal observation of work; where the work is happening. The original Japanese term comes from gembutsu, which means “real thing." It also known as “genba walk.”
- General Architecture for Text Engineering (GATE)
An open-source, Java-based framework for natural language processing tasks. The framework lets developers pipeline other tools designed to be plugged into it. The project is based at the UK University of Sheffield.
- General computer control
A control, other than an application control, that relates to the environment in which computer-based application systems are developed, maintained and operated and is therefore applicable to all applications. The objectives of general controls are to ensure the proper development and implementation of applications and the integrity of program and data files and computer operations. Like application controls, general controls may be either manual or programmed. Examples of general controls include the development and implementation of an IS strategy and security policy, the organization of IS staff to separate conflicting duties and the development of a disaster prevention and recovery plan.
- Generalization
The ability of a model to make correct predictions on new, previously unseen data, as opposed to the data used to train the model
- Generalized audit software (GAS)
Multipurpose audit software that can be used for general processes, such as record selection, matching, recalculation and reporting
- Generative adversarial network
An architecture consisting of two neural networks, the generator and the discriminator, competing as adversaries in a zero-sum game, with the generator creating new data and the discriminator iteratively refining its ability to distinguish real data from generated data
- Generative artificial intelligence (AI)
A branch of artificial intelligence (AI) that, by using models to learn underlying patterns and relationships within data, addresses the creation of new and diverse content, such as images, text, audio, or code
- Generic process control
A control that applies to all processes of the enterprise
- Generic Routing Encapsulation (GRE)
An IP encapsulation protocol for transmitting network traffic between network nodes
- Genetic data
Personal data that relates to the inherited or acquired genetic characteristics of a natural person and gives unique information about the physiology or health of that natural person. Genetic data results, in particular, from an analysis of a biological sample from the natural person in question.
- Geographical information system (GIS)
A tool used to integrate, convert, handle, analyze and produce information regarding the surface of the Earth
Scope Notes: GIS data exist as maps, tri-dimensional virtual models, lists and tables.
- Geographic disk mirroring
A data recovery strategy that takes a set of physically disparate disks and synchronously mirrors them over high-performance communication lines. Any write to a disk on one side will result in a write on the other side. The local write will not return until the acknowledgment of the remote write is successful.
- Gigabyte (GB)
A unit of data storage that equals approximately one-billion bytes (or precisely 230 or 1,073,741,824 bytes)
- Good practice
A proven activity or process that has been successfully used by multiple enterprises and shown to produce reliable results
- Governance
The method by which an enterprise evaluates stakeholder needs, conditions and options to determine balanced, agreed-upon enterprise objectives to be achieved. It involves setting direction through prioritization, decision making and monitoring performance and compliance against the agreed-upon direction and objectives.
- Governance, risk management and compliance (GRC)
A business term used to group the three closely related disciplines responsible for operations and the protection of assets
- Governance/management objective
The outcomes (objectives) for achieving enterprise goals for information and technology. In COBIT 2019, a governance or management objective always relates to one process, a governance objective relates to a governance process and a management objective relates to a management process. Boards and executive management are typically accountable for governance processes, while management processes are the domain of senior and middle management.
- Governance/management practice
For each COBIT 5 process, practices that provide a complete set of high-level requirements for effective and practical governance and management of enterprise IT. They are statements of actions from governance bodies and management.
Scope Notes: COBIT 5 perspective
- Governance component
Factors that, individually and collectively, contribute to the successful operation of the enterprise's governance system over information and technology (I&T). Components interact with each other resulting in a holistic governance system for I&T. Components include processes; organizational structures; principles, policies and procedures; information; culture, ethics and behavior; people, skills and competencies; and services, infrastructure and applications.
- Governance enabler
Something (tangible or intangible) that assists in the realization of effective governance
Scope Notes: COBIT 5 perspective (this term was updated to "governance component" in COBIT 2019)
- Governance framework
A basic conceptual structure used to solve or address complex issues. In the governance context, a framework is used to build a governance system for the enterprise. In COBIT 2019, a governance framework should:
be based on a conceptual model, identifying the key components and relationships among components to maximize consistency and allow automation.
be open and flexible, allowing for the addition of new content and the ability to address new issues in the most flexible way while maintaining integrity and consistency.
align to relevant major standards, frameworks and regulations.
- Governance of enterprise IT
A governance view that ensures that information and related technology support and enable the enterprise strategy and achievement of enterprise objectives. This also includes the functional governance of IT, i.e., ensuring that IT capabilities are provided efficiently and effectively.
Scope Notes: COBT 5 perspective
- Governance system
The core requirements that underlie the governance over enterprise information and technology. In COBIT 2019, the six principles for a governance system are:
Providing stakeholder value
Holistic approach
Dynamic governance system
Governance distinct from management
Tailored to enterprise needs
End-to-end governance system
- Gradient boosting
A machine-learning technique for regression and classification problems that produces a prediction model in the form of an ensemble of weak prediction models, typically decision trees. It builds the model in a stage-wise fashion, like other boosting methods, and generalizes them by allowing the optimization of an arbitrary differentiable loss function.
- Gradient descent
An optimization algorithm for finding the input to a function that produces the largest (or smallest) possible value
- Graph
A diagram or other representation consisting of a finite set of nodes and internode connections called edges or arcs. Contrasts with blueprint.
See Block diagram, Box diagram, Bubble chart, Call graph, Cause-effect graph, Control flow diagram, Data flow diagram, Directed graph, Flowchart, Input-process-output chart, Structure chart and Transaction flowgraph.
- Graphic software specifications
The documents, such as charts, diagrams and graphs, that depict program structure, states of data, control, transaction flow, HIPO and cause-effect relationships. Tables, including truth, decision, event, state-transition, module interface, and exception conditions/responses are necessary to establish design integrity.
- Graphics processing unit
A special processing unit made to render high-quality images and video files
- Greedy policy
A policy in reinforcement learning that always chooses the action with the highest expected return
- Ground truth
The correct answer; reality. Since reality is often subjective, expert raters typically are the proxy for ground truth.
- Guideline
A description of a particular way of accomplishing something that is less prescriptive than a procedure
H
- Habit and persistence
The routine way of doing business and following and improving processes that an enterprise demonstrates as part of its culture
- Hacker
An individual who attempts to gain unauthorized access to a computer system
- Hallucination
In generative artificial intelligence (AI), the generation of false or misleading information presented as fact
- Handprint scanner
A biometric device used to authenticate a user through palm scans
- Haptic technology
A technology feature that renders an event of physical contact to a user through the application of vibrations
- Hard disk drive
Hardware used to read from or write to a hard disk
See Disk and Disk drive
- Harden
The process of configuring a computer or other network device to resist attacks
- Hard fork
A change to blockchain software that make its so any nodes validating according to the old software will see all blocks produced after the new software as invalid. For blockchain nodes to work in alignment with the new software, each will be required to upgrade. If a group of nodes does not upgrade and perpetuate the use of the old version of the software, a permanent split in the blockchain can occur.
- Hardware
Physical equipment, as opposed to programs, procedures, rules and associated documentation; contrasts with software
- Hardware engineering
The application of a systematic, disciplined and measurable approach to transforming a set of requirements using documented techniques and technology to design, implement and maintain a tangible solution. In CMMI, hardware engineering represents all technical fields, e.g., electrical and mechanical, that transform requirements and ideas into tangible solutions.
See Software engineering and Systems engineering
- Hash
A cryptographic function takes an input of an arbitrary length and produces an output (also known as a message digest) that is a standard-sized binary string. The output is unique to the input in such a way that even a minor change to the input results in a completely different output. Modern cryptographic hash functions are also resistant to collisions (situations in which different inputs produce identical output); a collision, while possible, is statistically improbable. Cryptographic hash functions are developed so that input cannot be determined readily from the output.
- Hashed timelocks
A technical approach that involves a type of smart contract utilized in cryptoasset transactions and designed to remove counterparty risk, which is the risk that the other party to a transaction cannot participate in the trade
- Hash function
An algorithm that maps or translates one set of bits into another (generally smaller) so that a message yields the same result every time the algorithm is executed using the same message as input
Fixed values derived mathematically from a text message
- Hashing
A technique involving using a hash function (algorithm) to create hash valued or checksums that validate message integrity
In data processing and machine learning, a mechanism for bucketing categorical data, particularly when the number of categories is large, but the number of categories actually appearing in the dataset is comparatively small
- Hash power
The individual unit of power contributed by a single miner or worker to the proof-of-work (PoW) hash rate
- Hash rate
A measure of computational power. The proof-of-work (PoW) blockchain network measures the security profile using the total hash rate provided by all full nodes in supporting the consensus algorithm. Generally, the higher the total hash rate, the more secure the PoW blockchain network.
- Hash total
The total of any numeric data field in a document or computer file. This total is checked against a control total of the same field to facilitate the accuracy of processing.
- Hazard
A condition or event that poses a risk to safety. Hazards can be internal or external.
- Help desk
A service offered via telephone/Internet by an enterprise to its clients or employees that provides information, assistance and troubleshooting advice regarding software, hardware or networks
Scope Notes: A help desk is staffed by people who can either resolve the problem on their own or escalate the problem to specialized personnel. A help desk is often equipped with dedicated customer relationship management (CRM) software that logs the problems and tracks them until they are solved.
- Heuristic
A quick solution to a problem, which may or may not be the best solution
- Heuristic filter
A method often employed by antispam software to filter spam using criteria established in a centralized rule database
Scope Notes: Every e-mail message is given a rank, based on its header and contents, which is then matched against preset thresholds. A message that surpasses the threshold will be flagged as spam and discarded, returned to its sender or put in a spam directory for further review by the intended recipient.
- Hexadecimal
The base-16 number system. Digits are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E and F. This is a convenient form in which to examine binary data because it collects four binary digits per hexadecimal digit, e.g., decimal 15 is 1111 in binary and F in hexadecimal.
- Hidden layer
A synthetic layer in a neural network between the input layer (the features) and the output layer (the prediction). Hidden layers typically contain an activation function (e.g., ReLU) for training. A deep neural network contains more than one hidden layer.
- Hierarchical database
A database structured in a tree/root or parent/child relationship.
Scope Notes: Each parent can have many children, but each child may have only one parent.
- High-level language
A programming language that requires little knowledge of the target computer; can be translated into several different machine languages; allows symbolic naming of operations and addresses; provides features designed to facilitate the expression of data structures and program logic; and usually results in several machine instructions for each program statement. Examples are PL/1, COBOL, BASIC, FORTRAN, Ada, Pascal and C. This term contrasts with assembly language.
- High maturity
A classification based on the Capability Maturity Model Integration (CMMI) model for processes. CMMI model practice group levels (and their associated practices) of 4 or 5 are considered high maturity. High maturity organizations and projects use quantitative and statistical analysis to determine, identify and manage central tendency and dispersion and understand and address process stability and capability and how these impact the achievement quality and process performance objectives.
- Hijacking
An exploitation of a valid network session for unauthorized purposes
- Histogram
A graphical representation of the distribution of a set of numeric data, usually a vertical bar graph
- Homomorphic encryption
A type of encryption that supports two primitive operations in the ciphertext/encrypted space—multiplication and addition of two homomorphically encrypted values—wherein the decrypted product or sum provides a meaningful (i.e., when decrypted, the result would be the same as if performed on unencrypted values) value (only category of encryption wherein operations of encrypted yield meaningful result[s])
- Honeypot
A specially configured server, also known as a decoy server, designed to attract and monitor intruders in a manner so that their actions do not affect production systems
- Horizontal defense in depth
The controls that are in place to access an asset (this is functionally equivalent to the concentric ring model)
- Hot site
A fully operational offsite data processing facility equipped with both hardware and system software to be used in the event of a disaster
- Hub
A common connection point for devices in a network, hubs are used to connect segments of a local area network (LAN)
Scope Notes: A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
- Human firewall
A person prepared to act as a network layer of defense through education and awareness
- Hurdle rate
A required rate of return, above which an investment makes sense and below which it does not
Scope Notes: Often based on the cost of capital, plus or minus a risk premium, and often varied based on prevailing economic conditions
- Hybrid application controls
A combination of manual and automated activities, all of which must operate for the control to be effective.
Scope Notes: Sometimes referred to as computer-dependent application controls
- Hybrid blockchain
A blockchain that attempts to use optimal parts of private and public blockchain solutions; hybrid blockchains are not open to all parties, but still maintain the immutability, transparency and integrity features of public chains
- Hybrid cloud
A cloud computing environment that combines services and resources from both private and public clouds
- Hypercall
A stopgap between a hypervisor and the host to filter and control privileged operations
- Hyperledger
An umbrella project started by the Linux Foundation, with participation by IBM, Intel and SAP, to build open source blockchains and related tools
- Hyperlink
An electronic pathway that may be displayed in the form of highlighted text, graphics or a button that connects one web page with another web page address
- Hyperparameter
A parameter that specifies the details of the learning process
- Hyperparameter tuning
The parameters that are tweaked during successive runs of training a model
- Hypertext
A language that enables electronic documents that present information to be connected by links instead of being presented sequentially, as is the case with normal text
- Hypertext Markup Language (HTML)
A language designed for the creation of web pages with hypertext and other information to be displayed in a web browser; used to structure information–denoting certain text such as headings, paragraphs and lists–and can be used to describe, to some degree, the appearance and semantics of a document
- Hypertext Transfer Protocol (HTTP)
A communication protocol used to connect to servers on the World Wide Web. Its primary function is to establish a connection with a web server and transmit hypertext markup language (HTML), extensible markup language (XML) or other pages to client browsers.
- Hypertext Transfer Protocol Secure (HTTPS)
A protocol for accessing a secure web server, whereby all data transferred are encrypted. A standard port number is 443.
- Hyperthreading
The intel propriety implementation of simultaneous multithreading
- Hypervisors
A type of software that allows multiple virtual machines to be run on a host machine or group of host machines
I
- I/O
The acronym for input/output
- Identifiability
A condition that results in a personally identifiable information (PII) principal being identified, directly or indirectly, on the basis of a given set of PII
- Identifiable natural person
Someone who can be identified, directly or indirectly, from an identifier, such as a name, identification number, location data, online identifier or from one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person
- Identifier
A set of attribute values that unambiguously distinguishes one entity from another. The total list of an entity's attribute values allows it to be unambiguously distinguished from all other entities within a given context and also recognized as a single identity in that context.
- Identity and access management (IAM)
A framework that encapsulates people, processes and products to identify and manage the data used in an information system, authenticate users and grant or deny access rights to data and system resources. The goal of IAM is to provide appropriate access to enterprise resources.
- Idle standby
A fail-over process in which the primary node owns the resource group and the backup node runs idle, only supervising the primary node
Scope Notes: In case of a primary node outage, the backup node takes over. The nodes are prioritized, which means that the surviving node with the highest priority will acquire the resource group. A higher priority node joining the cluster will thus cause a short service interruption.
- IEEE (Institute of Electrical and Electronics Engineers) (IEEE)
An organization composed of engineers, scientists and students. IEEE is pronounced "I-triple-E."
Scope Notes: Best known for developing standards for the computer and electronics industry
- IEEE 802.11
A family of specifications developed by the Institute of Electrical and Electronics Engineers (IEEE) for wireless local area network (WLAN) technology. 802.11 specifies an over-the-air interface between a wireless client and a base station or between two wireless clients.
- Image processing
The process of electronically inputting source documents by taking an image of the document, thereby eliminating the need for key entry
- Image recognition
A process that classifies objects, patterns or concepts in an image. Image recognition is also known as image classification.
- Image synthesis
The process of creating new images that share characteristics with existing data. Generative adversarial networks excel at generating images.
- Imaging
A process that allows one to obtain a bit-for-bit copy of data to avoid damaging the original data or information when multiple analyses are performed
Scope Notes: The imaging process helps in obtaining residual data, such as deleted files, fragments of deleted files and other information present, from the disk for analysis. This is possible because imaging duplicates the disk surface, sector by sector.
- Immutable
A term that describes something that is unable to be modified after creation
- Impact
A magnitude of loss resulting from a threat exploiting a vulnerability
- Impact analysis
A study to prioritize the criticality of information resources for the enterprise based on the costs (or consequences) of adverse events. In an impact analysis, threats to assets are identified and potential business losses are determined for different time periods. This assessment is used to justify the safeguards required and recovery time frames. This analysis is the basis for establishing the recovery strategy.
- Impact assessment
A review of the possible consequences of a risk
See Impact analysis
- Impairment
A condition that causes a weakness or diminished ability to execute audit objectives
Scope Notes: Impairment to organizational independence and individual objectivity may include a personal conflict of interest; scope limitations; restrictions on access to records, personnel, equipment or facilities; and resource limitations (such as funding or staffing).
- Impersonation
An entity that mimics a system, process or person in an attempt to manipulate the user into an action that can cause an unexpected or unwanted event to a system
- Implement
In business, the full economic life cycle of an investment program through retirement (i.e., when the full expected value of the investment is realized, as much value as is deemed possible has been realized or it is determined that the expected value cannot be realized and the program is terminated)
- Implementation
The process of translating a design into hardware components, software components or both
See Coding
- Implementation life cycle review
The controls that support the process of transforming an enterprise’s legacy information systems into the enterprise resource planning (ERP) applications
Scope Notes: Largely covers all aspects of systems implementation and configuration, such as change management
- Implementation phase
The period of time in the software life cycle during which a software product is created from design documentation and debugged
- Improvement in progress
A type of preliminary or final finding statement that reflects the current state of a practice area or practice newly implemented for a project(s) or organizational unit and shows promise of helping to achieve further improvement. Due to the recent nature of process implementation, artifacts may be limited.
- Improvement opportunity
A type of preliminary or final finding about a particular practice area or practice which typically meets the intent and value of a model practice but represents an opportunity for the process to be improved
- Incident
A violation or imminent threat of violation of computer security policies, acceptable use policies, guidelines or standard security practices
- Incident response
The response of an enterprise to a disaster or other significant event that may significantly affect the enterprise, its people or its ability to function productively. Incident response may include evacuation of a facility, initiating a disaster recovery plan (DRP), performing a damage assessment or any other measures necessary to bring an enterprise to a more stable status.
- Incident response plan (IRP)
The operational component of incident management (also called IRP)
Scope Notes: The plan includes documented procedures and guidelines for defining the criticality of incidents, reporting and escalation processes and recovery procedures.
- Incident response tools
Tools used to identify and address cyberattacks or other digital security threats
- Inconsequential deficiency
A deficiency wherein a reasonable person would conclude, after considering the possibility of further undetected deficiencies, that the deficiency, either individually or when aggregated with others, would be trivial to the subject matter. If a reasonable person could not reach such a conclusion regarding a particular deficiency, that deficiency is more than inconsequential.
- Incremental development
A software development technique in which requirements definition, design, implementation and testing occur in an overlapping, iterative (rather than sequential) manner, resulting in incremental completion of the overall software product. Contrasts with rapid prototyping, the spiral model and the waterfall model.
- Incremental integration
A structured reformation of the program, module by module or function by function, with an integration test being performed following each addition. Methods include top-down, breadth-first, depth-first and bottom-up.
- Incremental testing
The deliberate testing of only the value-added functionality of a software component
- Independence
A type of self-governance that includes freedom from conflict of interest and undue influence. An IT auditor should be free to make his/her own decisions and not be influenced by the organization being audited and its people (managers and employees).
- Independent attitude
An attitude with an impartial point of view. This attitude allows an IS auditor to act objectively and with fairness.
- Independently and identically distributed (i.i.d.)
Data from a distribution that does not change, and where each value drawn does not depend on values that have been drawn previously. An i.i.d. is the ideal gas of machine learning—a useful mathematical construct but almost never exactly found in the real world.
- Indexed Sequential Access Method (ISAM)
A disk access method that stores data sequentially while also maintaining an index of key fields to all the records in the file for direct access capability
- Indexed sequential file
A file format in which records are organized and can be accessed, according to a pre-established key that is part of the record
- Individual data sovereignty
The capability of data subjects (owners of personal data) to manage and/or delimit the use of their personal data, according to applicable laws and regulations
- Industry standard
The procedures and criteria recognized as acceptable practices by peer professionals, credentialing or accrediting organizations
- Inference
The process of making predictions by applying the trained model to unlabeled examples in machine learning
- Information
An asset that, like other important business assets, is essential to an enterprise’s business. It can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by post or by using electronic means, shown on films, or spoken in conversation.
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Information and technology (I&T) operations and service delivery risk (I&T)
Risk related to the performance of IT systems and services. A poorly performing IT operation can bring destruction or reduction of value to the enterprise.
- Information and technology (I&T)-related risk
A part of overall business risk associated with the use, ownership, operation, involvement, influence and adoption of information and technology (I&T) within an enterprise
- Information architecture
One component of IT architecture (together with applications and technology)
- Information criteria
Information attributes that must be satisfied to meet business requirements
- Information engineering
Development techniques that work on the premise that data are at the center of information processing and that certain data relationships are significant to a business and must be represented in the data structure of its systems
- Information hiding
The practice of hiding the details of a function or structure, making them inaccessible to other parts of the program
See Abstraction, Encapsulation and Software engineering.
- Information processing facility (IPF)
The computer room and support areas
- Information security
The assurance that information is protected against disclosure to unauthorized users (confidentiality), improper modification (integrity) and nonaccess when required (availability). Information security deals with all formats of information—paper documents, digital assets, intellectual property in people’s minds and verbal and visual communications.
- Information security governance
The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risk is managed appropriately and verifying that the enterprise’s resources are used responsibly
- Information security governance
- The set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risk is managed appropriately and verifying that the enterprise’s information security resources are used responsibly.
- Information security program
The combination of technical, operational and procedural measures and management structures implemented to provide for the confidentiality, integrity and availability of information based on business requirements and risk analysis
- Information security testing tools
ools used to test the accuracy and completeness of an enterprise’s cybersecurity practices and controls
- Information systems (IS)
The combination of strategic, managerial and operational activities involved in gathering, processing, storing, distributing and using information and its related technologies
Scope Notes: Information systems are distinct from information technology (IT) in that an information system has an IT component that interacts with the process components.
- Information technology (IT)
The hardware, software, communication and other facilities used to input, store, process, transmit and output data in whatever form
- Informative material
A type of material that includes everything other than the required information. Explanatory information in practice are part of the informative material. Informative material also includes the overview and appendices, e.g., glossary and index. Informative material must not be ignored, as it is needed to correctly understand and adopt the model.
External links can be added to the informative material. These are links to external assets such as:
Additional informative material
Adoption examples
Transition and adoption guidance from one model or standard to others
Templates
Training materials
Inherent security risk
The risk level or exposure without taking into account the actions that management has taken or might take
- Informed
Refers to those people who are kept up to date on the progress of an activity (one-way communication) in a RACI (Responsible, Accountable, Consulted, Informed) chart.
- Infrastructure as a Service (IaaS)
A form of cloud computing that offers the capability to provision processing, storage, networks and other fundamental computing resources, enabling the customer to deploy and run arbitrary software, including operating systems and applications
- Infrastructure risk
The risk that information and technology (I&T) infrastructure and systems may be unable to effectively support the current and future needs of the business in an efficient, cost-effective and well-controlled fashion
- Ingestion
A process to convert extracted information to a format that can be understood by investigators
See Normalization
- Ingress
Traffic that comes into a network
- Inherent risk
The level of risk or exposure that does not account for the actions management has taken or might take (e.g., implementing controls)
- Inherent security risk
The level of risk or exposure that does not account for the actions management has taken or might take
- Inheritance (objects)
Database structures that have a strict hierarchy (no multiple inheritance). Inheritance can initiate other objects irrespective of the class hierarchy, thus, there is no strict hierarchy of objects.
- Initialization vector (IV) collisions
A type of attack involving initialization vectors (IVs). Wired equivalent privacy (WEP) can allocate the RC4 IVs used to create the keys that can drive a pseudo-random number generator, which is eventually used for encryption of the wireless data traffic. The IV in WEP is a 24-bit field: a small space that practically guarantees key reuse. The WEP standard also fails to specify how these IVs are assigned. Many wireless network cards reset the IVs to zero and then increment them by one for every use. If an attacker can capture two packets using the same IV (the same key, if the key has not been changed), mechanisms can be used to determine portions of the original packets. This and other weaknesses that result in key reuse can create a susceptibility to attacks. These attacks require a large number of packets (5-6 million) to fully derive the WEP key; on a large, busy network, this can occur in a short time, sometimes as quickly as 10 minutes (however, some of the largest corporate networks will likely require much more time to gather enough packets). In WEP-protected wireless networks, often multiple, or all, stations use the same shared key. This increases the chances of IV collisions greatly. The result is that the network becomes insecure if the WEP keys are not frequently changed, which furthers the need for a WEP key management protocol.
- Initial program load (IPL)
The initialization procedure that causes an operating system to be loaded into storage at the beginning of a workday or after a system malfunction
- Injection
A general term for attack types that inject code that is then interpreted/executed by the application
Source Notes: OWASP
- Input/output (I/O)
A way for microprocessors and computers to communicate with the outside world to get the data needed for programs and communicate the results of its data manipulations. This is accomplished through I/0 ports and devices.
- Input control
Techniques and procedures used to verify, validate and edit data to ensure that only correct data are entered into the computer
- Input-processing-output
A structured software design technique. Identification of the steps involved in each process is performed, including the inputs and outputs in each step. A refinement called hierarchical input-process-output identifies the steps, inputs and outputs for both general and detailed levels.
- Insider threats
Threats to an enterprise that come from individuals within the enterprise, such as employees or contractors
- Insider threat software
Software designed to detect and mitigate actions by insiders who may pose a threat to an enterprise
- Installation
The phase in the system life cycle that includes assembly and testing of the hardware and software of a computerized system. Installation includes installing a new computer system, software or hardware or otherwise modifying the current system.
- Installation and checkout phase
The period of time in the software life cycle during which a software product is integrated into its operational environment and tested to ensure that it performs as required
- Instant messaging (IM)
An online mechanism or a form of real-time communication between two or more people based on typed text and multimedia data
Scope Notes: Text is conveyed via computers or another electronic device (e.g., cellular phone or handheld device) and connected over a network, such as the Internet.
- Institute of Electrical and Electronic Engineers (IEEE)
An organization involved in the generation and promulgation of standards. IEEE standards represent the formalization of current norms of professional practice through the process of obtaining the consensus of concerned practicing professionals in a given field.
- Instruction
A program statement that causes a computer to perform a particular operation or set of operations
In a programming language, a meaningful expression that specifies one operation and identifies its operands, if any
- Instruction set
The complete set of instructions recognized by a given computer or provided by a given programming language
The set of the instructions of a computer, a programming language or the programming languages in a programming system
See Computer instruction set
- Intangible asset
An asset that is not physical in nature
Scope Notes: Examples include intellectual property (patents, trademarks, copyrights and processes), goodwill and brand recognition.
- Integrated circuit (IC)
An electronic circuit comprised of capacitors, transistors and resistors that is the building block of most electronic devices and equipment. It is also referred to as a chip or microchip.
- Integrated services digital network (ISDN)
A public end-to-end digital telecommunications network with signaling, switching and transport capabilities that support a wide range of services accessed by standardized interfaces with integrated customer control
Scope Notes: The standard allows transmission of digital voice, video and data over 64-kbps lines.
- Integrated test facilities (ITF)
A testing methodology in which test data are processed in production systems
Scope Notes: The data usually represent a set of fictitious entities such as departments, customers or products. Output reports are verified to confirm the correctness of the processing.
- Integration environment
The configuration of processes, systems, tools, people and associated infrastructure used when combining components to develop a solution
- Integrity
The guarding against improper information modification or destruction. This includes ensuring information nonrepudiation and authenticity.
- Integrity risk
The risk that data may be unavailable due to incompleteness or inaccuracy
- Intellectual property
Intangible assets that belong to an enterprise for its exclusive use. Examples include patents, copyrights, trademarks, ideas and trade secrets.
- Intent and value
A statement for the purposes of characterization and rating. When the phrases “intent and value” or “meet the intent and value” are used in the Medical Definition Document (MDD), it means the appraisal team must review and analyze Objective Evidence (OE) for the practice area intent, practice statement intent and their corresponding value statements. They must also present any additional required Practice information in order to characterize and rate accurately.
- Intent-based networking (IBN)
A form of network administration that incorporates artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network
- Interactive
A system or mode of operation in which each user entry causes a response from or action by the system. This is in contrast to batch processing.
See Conversational, Online and Real time.
- Interface
A shared boundary between two functional units, defined by functional characteristics, common physical interconnection characteristics, signal characteristics and other characteristics, as appropriate. The concept involves the specification of the connection of two devices having different functions.
A point of communication between two or more processes, persons or other physical entities.
A peripheral device that permits two or more devices to communicate.
- Interface data
Information describing interfaces or connections
- Interface or connection
A shared boundary across components, humans, services, hardware or software that needs or exchanges information or data. Either the term “interface” or “connection” may be used to describe this boundary.
- Interface or connection description
A description of the functional and physical characteristics of a component and its boundaries, e.g., user, system, that describes its interaction with another component
- Interface testing
A testing technique used to evaluate output from one application while the information is sent as input to another application
- Internal control environment
The relevant environment on which the controls have an effect
- Internal control over financial reporting
A process designed by, or under the supervision of, the registrant’s principal executive and principal financial officers, or persons performing similar functions, and effected by the registrant’s board of directors, management and other personnel to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principals. Includes those policies and procedures that:
Pertain to the maintenance of records that, in reasonable detail, accurately and fairly reflect the transactions and dispositions of the assets of the registrant
Provide reasonable assurance that transactions are recorded as necessary to permit the preparation of financial statements in accordance with generally accepted accounting principles and that receipts and expenditures of the registrant are made only in accordance with authorizations of management and directors of the registrant
Provide reasonable assurance regarding the prevention or timely detection of unauthorized acquisition, use or disposition of the registrant’s assets that could have a material effect on the financial statements
- Internal controls
The policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented or detected and corrected
- Internal control structure
The dynamic, integrated processes--effected by the governing body, management and all other staff--that are designed to provide reasonable assurance regarding the achievement of the following general objectives:
Effectiveness, efficiency and economy of operations
Reliability of management
Compliance with applicable laws, regulations and internal policies
Management’s strategies for achieving these general objectives are affected by the design and operation of the following components:
Control environment
Information system
Control procedures
- Internal penetrators
An authorized user of a computer system who oversteps his/her legitimate access rights
Scope Notes: This category is divided into masqueraders and clandestine users.
- Internal rate of return (IRR)
The discount rate that equates an investment cost with its projected earnings
Scope Notes: When discounted at the IRR, the present value of the cash outflow will equal the present value of the cash inflow. The IRR and net present value (NPV) are measures of the expected profitability of an investment project.
- Internal storage
The main memory of the computer’s central processing unit (CPU)
- International Organization for Standardization (ISO)
An organization that sets international standards. It deals with all fields except electrical and electronics, which are governed by the International Electrotechnical Commission (IEC). Synonymous with the International Standards Organization.
- International Standards Organization (ISO)
The world’s largest developer of voluntary International Standards
- Internet
Two or more networks connected by a router
The world’s largest network using Transmission Control Protocol/Internet Protocol (TCP/IP) to link government, university and commercial institutions
- Internet Assigned Numbers Authority (IANA)
Responsible for the global coordination of the DNS root, IP addressing and other Internet protocol resources
- Internet banking
Use of the Internet as a remote delivery channel for banking services
Scope Notes: Services include traditional ones, such as opening an account or transferring funds to different accounts, and new banking services, such as electronic bill presentment and payment (allowing customers to receive and pay bills on a bank’s web site).
- Internet Control Message Protocol (ICMP)
A set of protocols that allow systems to communicate information about the state of services on other systems
Scope Notes: For example, ICMP is used in determining whether systems are up, maximum packet sizes on links and whether a destination host/network/port is available. Hackers typically use (abuse) ICMP to determine information about the remote site.
- Internet Engineering Task Force (IETF)
An organization with international affiliates as network industry representatives that sets Internet standards. This includes all network industry developers and researchers concerned with the evolution and planned growth of the Internet.
- Internet Inter-ORB Protocol (IIOP)
A protocol developed by the object management group (OMG) to implement Common Object Request Broker Architecture (CORBA) solutions over the World Wide Web
Scope Notes: CORBA enables modules of network-based programs to communicate with one another. These modules or program parts, such as tables, arrays and more complex program subelements, are referred to as objects. The use of IIOP in this process enables browsers and servers to exchange both simple and complex objects. This differs significantly from HyperText Transfer Protocol (HTTP), which only supports the transmission of text.
- Internet of Things (IoT)
A collection of sensors, actuators and computing capabilities that work together to solve a problem or provide a service over the Internet
- Internet Protocol (IP)
Specifies the format of packets and the addressing scheme
- Internet Protocol (IP) packet spoofing (IP)
An attack using packets with spoofed source Internet packet (IP) addresses
Scope Notes: This technique exploits applications that use authentication based on IP addresses. This technique may enable an unauthorized user to gain root access to the target system.
- Internet proxy system
A server that acts as a gateway between an individual and the internet
- Internet service provider (ISP)
A third party that provides individuals and enterprises access to the Internet and a variety of other Internet-related services
- Internetwork Packet Exchange/Sequenced Packet Exchange (IPX)
Layer 3 of the open systems interconnect (OSI) model network protocol; SPX is layer 4 transport protocol. The SPX layer sits on top of the IPX layer and provides connection-oriented services between two nodes on the network.
- Interoperability
The ability to exchange, access and make use of information across different systems and/or networks without the need for intermediaries and the capacity to transfer an asset between two or more networks or systems without changing the state of the asset
- Interpret
To translate and execute each statement or construct of a computer program before translating and executing the next. Contrasts with assemble and compile.
- Interpretability
In artificial intelligence (AI), interpretability allows humans to understand the internal mechanisms and reasoning behind a model’s decisions, moving beyond simply observing the outputs to provide transparency into the underlying logic and relationships that produced the results
- Interpreter
A computer program that translates and executes each statement or construct of a computer program before translating and executing the next. The interpreter must be a resident in the computer each time a program [source code file] written in an interpreted language is executed. Contrasts with assembler and compiler.
- Interrogation
Used to obtain prior indicators or relationships from extracted data, including telephone numbers, IP addresses and names of individuals
- Interrupt
A hardware or software signal stemming from an event that requires immediate attention
- Interruption window
The time that the company can wait from the point of failure to the restoration of the minimum critical services or applications. After this time, the progressive losses caused by the interruption are excessive for the enterprise.
- Interview
A meeting (virtual or face-to-face) that includes an interactive discussion between appraisal team members and those who have a process role, e.g., implementing, using, or following the processes, within the organizational unit or project
- Intranet
A private network that uses the infrastructure and standards of the Internet and World Wide Web but is isolated from the public Internet by firewall barriers
- Intruder
An individual or group that gains access to the network and its resources without permission
- Intrusion
Any event during which unauthorized access occurs
- Intrusion detection
The process of monitoring the events occurring in a computer system or network to detect signs of unauthorized access or attack
- Intrusion detection system (IDS)
A system that inspects network and host security activity to identify suspicious patterns that may indicate a network or system attack
- Intrusion prevention
A preemptive approach to network security used to identify potential threats and respond to them to stop, or at least limit, damage or disruption
- Intrusion prevention system (IPS)
A system designed to not only detect attacks but also prevent the intended victim hosts from being affected by the attacks
- Intrusive monitoring
In vulnerability analysis, the process of gaining information by performing checks that affect the normal operation of a system or by crashing the system
- Invalid inputs
Test data that lie outside the domain of the function the program represents
Not only inputs outside the valid range for data to be input, i.e., when the specified input range is 50 to 100, but also unexpected inputs, especially when these unexpected inputs may easily occur, e.g., the entry of alpha characters or special keyboard characters when only numeric data is valid or the input of abnormal command sequences to a program
- Investigation
The collection and analysis of evidence with the goal to identify the perpetrator of an attack or unauthorized use or access
- Investment (or expense) risk
The risk that I&T investment fails to provide value commensurate with its cost or is otherwise excessive or wasteful, including the overall I&T investment portfolio
- Investment portfolio
The collection of investments being considered and/or made
Scope Notes: COBIT 5 perspective
- IP address
A unique binary number used to identify devices on a TCP/IP network. May be IP version 4 or 6.
- IP Authentication Header (AH)
Protocol used to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replays (RFC 4302)
Scope Notes: AH ensures data integrity with a checksum that a message authentication code, such as MD5, generates. To ensure data origin authentication, AH includes a secret shared key in the algorithm it uses for authentication. To ensure replay protection, AH uses a sequence number field within the IP authentication header.
- IP Security (IPSec)
A set of protocols developed by the Internet Engineering Task Force (IETF) to support the secure exchange of packets
- Irregularity
Violation of an established management policy or regulatory requirement. It may consist of deliberate misstatements or omissions of information concerning the area under audit or the enterprise as a whole, gross negligence or unintentional illegal acts.
- ISO
International Organization for Standardization
- ISO/IEC 17799
This standard defines information confidentiality, integrity and availability controls in a comprehensive information security management system
Scope Notes: Originally released as part of the British Standard for Information Security in 1999 and then as the Code of Practice for Information Security Management in October 2000, it was elevated by the International Organization for Standardization (ISO) to an international code of practice for information security management. The latest version is ISO/IEC 17799:2005.
- ISO/IEC 27001
A standard for Information Security Management--Specification with Guidance for Use; the replacement for BS7799-2. It is intended to provide the foundation for third-party audit and is harmonized with other management standards, such as ISO/IEC 9001 and 14001.
- ISO 9001:2000
The code of practice for quality management from the International Organization for Standardization (ISO). ISO 9001:2000 specifies requirements for a quality management system for any enterprise that needs to demonstrate its ability to consistently provide products or services that meet particular quality targets.
- IT application
Electronic functionality that constitutes parts of business processes undertaken by, or with the assistance of, IT
Scope Notes: COBIT 5 perspective
- IT architecture
A description of the fundamental underlying design of the IT components of the business, the relationships among them and the manner in which they support the enterprise’s objectives
- IT goal
A statement describing a desired outcome of enterprise IT in support of enterprise goals. An outcome can be an artifact, a significant change of a state or a significant capability improvement. Note: This was renamed "alignment goal" in COBIT 2019.
Scope Notes: COBIT 5 perspective
- IT governance
The responsibility of executives and the board of directors; consists of the leadership, organizational structures and processes that ensure that the enterprise’s IT sustains and extends the enterprise's strategies and objectives
- IT governance framework
A model that integrates a set of guidelines, policies and methods that represent the organizational approach to IT governance.
See also "governance framework."
Scope Notes: Per COBIT, IT governance is the responsibility of the board of directors and executive management. It is an integral part of institutional governance and consists of the leadership and organizational structures and processes that ensure that the enterprise's IT sustains and extends the enterprise's strategy and objectives.
- IT Governance Institute® (ITGI)
Founded in 1998 by the Information Systems Audit and Control Association (now known as ISACA). ITGI strives to assist enterprise leadership in ensuring long-term, sustainable enterprise success and to increase stakeholder value by expanding awareness.
- ITIL (IT Infrastructure Library) (ITIL)
The UK Office of Government Commerce (OGC) IT Infrastructure Library, which is a set of guides on the management and provision of operational IT services
- IT incident
Any event not part of the ordinary operation of a service that causes, or may cause, an interruption to or a reduction in the quality of that service
- IT infrastructure
The set of hardware, software and facilities that integrate an enterprise's IT assets
Scope Notes: Specifically, the equipment (including servers, routers, switches and cabling), software, services and products used in storing, processing, transmitting and displaying all forms of information for the enterprise’s users
- IT investment dashboard
A tool for setting expectations for an enterprise at each level and continuously monitoring performance against set targets for expenditures on, and returns from, IT-enabled investment projects in terms of business values
- IT-related incident
An IT-related event that causes an operational, developmental and/or strategic business impact
- IT risk
The business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise
- IT risk issue
An instance of IT risk
A combination of control, value and threat conditions that impose a noteworthy level of IT risk
- IT risk profile
A description of the overall (identified) IT risk to which the enterprise is exposed
- IT risk register
A repository of the key attributes of potential and known IT risk issues. Attributes may include name, description, owner, expected/actual frequency, potential/actual magnitude, potential/actual business impact and disposition.
- IT risk scenario
The description of an IT-related event that can lead to a business impact
- IT service
The day-to-day provision to customers of information and technology infrastructure and applications and support for their use—e.g., service desk, equipment supply and moves, and security authorizations
Scope Notes: COBIT 2019 perspective
- IT steering committee
An executive-management-level committee that assists in the delivery of the IT strategy, oversees day-to-day management of IT service delivery and IT projects, and focuses on implementation aspects
- IT strategic plan
A long-term plan (i.e., three- to five-year horizon) in which business and IT management cooperatively describe how IT resources will contribute to the enterprise’s strategic objectives (goals)
- IT strategy committee
A committee at the level of the board of directors to ensure that the board is involved in major IT matters and decisions
Scope Notes: The committee is primarily accountable for managing the portfolios of IT-enabled investments, IT services and other IT resources. The committee is the owner of the portfolio.
- IT tactical plan
A medium-term plan (i.e., six- to 18-month horizon) that translates the IT strategic plan into required initiatives, resource requirements and ways in which resources and benefits will be monitored and managed
- IT user
A person who uses IT to support or achieve a business objective
J
- JavaScript
A scripting language originally designed in the mid-1990s for embedding logic in web pages, but which later evolved into a more general-purpose development language. JavaScript continues to be very popular for embedding logic in web pages.
- Job
A user-defined unit of work to be accomplished by a computer. For example: the compilation, loading and execution of a computer program
See Job control language.
- Job control language (JCL)
Used to control run routines in connection with performing tasks on a computer
- Joint PII controller
A PII controller that determines the purposes and means of the processing of PII with one or more other PII controllers
- Journal entry
A debit or credit to a general ledger account
See Manual journal entry.
- Judgment sampling
Any sample that is selected subjectively or in such a manner that the sample selection process is not random or the sampling results are not evaluated mathematically
K
- KB
Kilobyte
- Keras
A popular Python machine-learning API
- Kernel
Primary (of three) component of an operating system
- Kernel mode
Used for execution of privileged instructions for the internal operation of the operating system. In kernel mode, there are no protections from errors or malicious activity, and all parts of the system and memory are accessible.
- Key control indicator (KCI)
A measure of the effectiveness of controls to indicate a failure or weakness which may result in the increased likelihood or impact of risk events
- Key goal indicator (KGI)
A measure that tells management after the fact whether an IT process has achieved its business requirements; usually expressed in terms of information criteria
- Key length
The size of an encryption key measured in bits
- Keylogger
Software used to record all keystrokes on a computer
- Key management
The generation, exchange, storage, use, destruction and replacement of keys in a cryptosystem
- Key management practice
A management practice that is required to successfully execute business processes
- Key performance indicator (KPI)
A type of performance measurement
- Keypoints
The coordinates of particular features in an image
- Key risk indicator (KRI)
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk
Scope Notes: See also Risk indicator.
- Kilobyte (KB)
Approximately one thousand bytes. This term is used to describe the size of computer memory or disk storage space. Because computers use a binary number system, a kilobyte is precisely 210 or 1024 bytes.
- K-means clustering
A data-mining algorithm to cluster, classify or group N objects based on their attributes or features into K number of groups (so-called clusters)
- K-nearest neighbors
A machine-learning algorithm that classifies things based on their similarity to nearby neighbors. The algorithm execution is refined by picking how many neighbors to examine (k) and some notion of distance to indicate how near the neighbors are.
- Knowledge engineering
The process of capturing, representing, and utilizing human knowledge within computer systems to help artificial intelligence (AI) models reason, solve problems, and make informed decisions, often in specific domains
- Knowledge portal
A repository of core information and knowledge for an extended enterprise
Scope Notes: Generally a web-based implementation containing a core repository of information provided for the extended enterprise to resolve any issues
L
- Label
In supervised learning, the answer or result portion of an example
- Lag indicator
A metric for the achievement of a goal; an indicator relating to the outcome or result of an enabler
Scope Notes: This indicator is available only after the fact or event.
- Lag risk indicator
A backward-looking metric that indicates risk has been realized after an event has occurred
- Language model
A statistical model that analyzes text to understand the probabilities of words appearing together, enabling tasks like predicting the next word, generating text, translating languages, and summarizing information
- Large language model (LLM)
A language model trained on massive amounts of text data to generate human-like text, analyze information, translate languages, and output code, among other types of content
- Latency
The time it takes a system or network to respond
Scope Notes: More specifically, system latency is the time a system takes to retrieve data. Network latency is the time it takes for a packet to travel from source to destination.
- Latent variable
A variable that is not directly observed, but rather inferred (through a mathematical model) from other variables that are observed (directly measured)
- Layer 2 switches
Data link layer devices that can divide and interconnect network segments and help to reduce collision domains in Ethernet-based networks
- Layer 2 tokens
A secondary coding on top of the original blockchain coding structure that allows for the evolution of a decentralized blockchain to address limitations, i.e., scaling and smart contracts
- Layer 3 and 4 switches
Switches with operating capabilities at layer 3 and layer 4 of the open systems interconnect (OSI) model. These switches examine the incoming packet’s networking protocol, e.g., IP, and then compare the destination IP address to the list of addresses in their tables to actively calculate the best way to send a packet to its destination.
- Layer 4–7 switches
Used for load balancing among groups of servers
Scope Notes: Also known as content switches, content services switches, web switches or application switches
- Leadership
The ability and process to translate organizational vision into desired behaviors that are followed at all levels of the extended enterprise
- Lead indicator
A metric for the application of good practices; an indicator relating to the functioning of an enabler
Scope Notes: This indicator will provide an indication of the possible outcome of the enabler.
- Lead risk indicator
A forward-looking metric that provides an early warning that risk may soon be realized before an event has occurred
- Lean
A business methodology for optimizing efficiency in a process and minimizing economic waste
- Learning rate
In machine learning (ML), a hyperparameter that defines the update size for model weights during training, controlling the speed and direction of optimization
- Leased line
A communication line permanently assigned to connect two points, as opposed to a dial-up line that is available and open only when a connection is made by dialing the target machine or network. Also known as a dedicated line.
- Legacy system
An outdated computer system
- Legitimate interest
The basis for lawful processing of data
- Level of assurance
The degree to which the subject matter has been examined or reviewed
- Librarian
The individual responsible for the safeguarding and maintenance of all program and data files
- Licensing agreement
A contract that establishes the terms and conditions under which a piece of software is being licensed (i.e., made legally available for use) from the software developer (owner) to the user
- Life cycle
A series of stages that characterize the course of existence of an organizational investment (e.g., product, project, program)
- Life cycle methodology
The use of any one of several structured methods to plan, design, implement, test and operate a system from its conception to the termination of its use
See Waterfall model.
- Life cycle model
A representation or description of the steps and activities for the development and updating of a solution communicated to stakeholders and followed by a project or organization. This description may include:
Phases
Sequences
Interrelationships
Inputs
Outputs
Decision points
Roles and responsibilities
- Lift
Compares the frequency of an observed pattern with how often one expects to see that pattern just by chance
- Likelihood
The probability of something happening
- Limit check
A test that measures specified amount fields against stipulated high or low limits of acceptability
Scope Notes: When both high and low values are used, the test may be called a range check.
- Linear algebra
A branch of mathematics dealing with vector spaces and operations on them, such as addition and multiplication. It is designed to represent systems of linear equations.
- Linear regression
A mathematical technique to look for a linear relationship when starting with a set of data points that do not necessarily line up nicely. A linear relationship is one in which the relationship between two varying amounts, such as price and sales, can be expressed with an equation that can be represented as a straight line on a graph.
- Link editor (linkage editor)
A utility program that combines several separately compiled modules into one, resolving internal references between them
- Linux
Linux is a Unix-like, open-source and community-developed operating system (OS) for computers, servers, mainframes, mobile devices and embedded devices.
http://www.techtarget.com/searchdatacenter/definition/Linux-operating-system
- Listening nodes
A publicly visible blockchain network device whose main function is to communicate and share data or information with any other node that connects with it
- Litecoin
A peer-to-peer cryptocurrency and open-source software project
- Literals
Any notation for representing a value within programming language source code, e.g., a string literal; a chunk of input data that is represented "as is" in compressed data
- Local area network (LAN)
A communication network that serves several users within a specified limited geographic area
- Lock
A mechanism for keeping something secure or restricting access to functionality or data
- Log
To record details of information or events in an organized record-keeping system, usually sequenced in the order in which they occurred
An electronic record of activity (e.g., authentication, authorization and accounting)
- Log analyzer
A tool used to track and analyze logs
- Logical access
The ability to interact with computer resources granted using identification, authentication and authorization
- Logical access controls
The policies, procedures, organizational structure and electronic access controls designed to restrict access to computer software and data files
- Logistic regression
A model similar to linear regression but where the potential results are a specific set of categories, instead of being continuous
- Logoff
The act of disconnecting from a a network or system
- Logon
The act of connecting to a network or system, which typically requires entry of a user ID and password
- Logs/log file
Files created specifically to record various actions occurring on a system being monitored, such as failed login attempts, full disk drives and email delivery failures
- LoRa/LoRaWAN
A proprietary member of the family of low-power wide area network (LPWAN) protocols designed for low-bandwidth, battery-powered devices requiring extended range
- Loss event
Any event during which a threat event results in loss
Scope Notes: From Jones, J.; "FAIR Taxonomy," Risk Management Insight, USA, 2008
- Low-level language
See Assembly language. A programming language, wuch as assembly language or machine code, that provides little or no abstraction from a computer's instruction set architecture, i.e., in which commands or functions are structurally similar to the processor's instructions
- LTE for Machine-Type Communications (LTE-M)
A low-power wide area network (LPWAN) standard from the 3GPP, based on typical Long Term Evolution (LTE)
M
- MAC header
The hardware address of a network interface controller (NIC) inside a data packet
- Machine code
Computer instructions and definitions expressed in a form (binary code) that can be recognized by the CPU of a computer. All source code, regardless of programming language, is eventually converted to machine code.
- Machine language
The logical language a computer understands
- Machine learning (ML)
A program or system that builds (i.e., trains) a predictive model from input data
- Machine learning model
The model artifact created by the machine learning training process. The process of training a machine learning model involves providing a machine learning model algorithm (that is, the learning algorithm) with training data.
- Machine learning overfitting (ML overfitting)
A complex machine learning model that tends to “memorize” noise in a large data set while failing to capture the overall trend
- Machine learning underfitting (ML underfitting)
A machine learning model that is too simple to model complex data
- Machine translation
The systematic translation of text from one language to another using statistical or neural network models to analyze the source language and generate the most likely equivalent text in the target language
- Magnetic card reader
A hardware device used to read cards with a magnetic surface on which data can be stored and retrieved
- Magnetic ink character recognition (MICR)
A technology used to electronically input, read and interpret information directly from a source document
Scope Notes: MICR requires the source document to have specially coded magnetic ink.
- Magnitude
A measure of the potential severity of loss or the potential gain from realized events/scenarios
- Mail relay server
An electronic mail (email) server that relays messages so that neither the sender or recipient is a local user
- Main establishment
The place of central administration for a controller with establishments in more than one country
- Mainframe
A large high-speed computer, especially one supporting numerous workstations or peripherals
- Main memory
A nonmoving storage device that uses one of a number of types of electronic circuitry to store information
- Main program
A software component that is called by the operating system of a computer and that usually calls other software components
See Routine and Subprogram.
- Maintainability
The ease with which a software system or component can be modified to correct faults, improve performance or other attributes, or adapt to a changed environment; synonymous with modifiability
- Maintenance
Quality assurance (QA) activities, such as adjusting, cleaning, modifying and overhauling equipment to assure performance in accordance with requirements. Maintenance of a software system includes correcting software errors, adapting software to a new environment and making enhancements to software.
See Adaptive maintenance, Corrective maintenance and Perfective maintenance.
- Malicious software
See Malware.
- Malignant threat
Malignant threats are threats that are unintentional. There is no motive, good or bad, for causing the losses associated with malignant threats
- Malware
Malicious software designed to infiltrate or damage a computer system or obtain information from it without the owner’s consent. Examples of malware include computer viruses, worms, Trojan horses, spyware and adware.
- Malware analysis tools
Tools used to analyze malware
- Managed discovery
A phased objective evidence collection approach beginning with an initial call by the appraisal team for a predetermined set of artifacts, followed by a set of iterative calls based on the appraisal team’s evaluation of those artifacts and remaining evidence gaps
See Discovery-based appraisal and Verification-based appraisal.
- Managed process
A performed process that is recorded, followed, updated and made persistent and habitual for consistency. A managed process is necessary at the practice group level 2 in the CMMI Practice Areas.
See Performed process.
- Management
The planning, building, running and monitoring of activities in alignment with the direction set by the governance body to achieve the enterprise objectives
- Management information system (MIS)
An organized assembly of resources and procedures required to collect, process and distribute data for use in decision making
- Mandatory access control (MAC)
Logical access control filters used to validate access credentials that cannot be controlled or modified by normal users or data owners
- Man-in-the-middle attack (MitM)
A strategy in which the attacker intercepts the communication stream between two components of the target system and then replaces the traffic with the intruder’s own, eventually assuming control of the communication
- Mapping
Diagramming data that are to be exchanged electronically, including specifications on how they are to be used and what business management systems need them
See Application tracing and Mapping.
Scope Notes: Mapping is a preliminary step for developing an applications link.
- Market risk
Pressures on an asset class
- Markov Chain
An algorithm for working with a series of events (for example, a system being in particular states) to predict the possibility of a certain event based on which other events have occurred and to identify probabilistic relationships between the different events
- Markov decision process (MDP)
A graph representing the decision-making model wherein which decisions (or actions) are taken to navigate a sequence of states, under the assumption that the Markov property holds. In reinforcement learning, these transitions between states return a numerical reward.
- Masking
A computerized technique of blocking out the display of sensitive information, such as passwords, on a computer terminal or report
- Masqueraders
Attackers that penetrate systems by using the identities and logon credentials of legitimate users
- Master file
A file of semi-permanent information that is used frequently for processing data or for more than one purpose
- Masternode
A blockchain network device that can process all the functions of a full node or miner and is also able to facilitate other processes
- Materiality
An auditing concept that considers the importance of an item of information with regard to its impact or effect on the functioning of the entity being audited. Materiality is also an expression of the relative significance or importance of a particular matter in the context of the enterprise as a whole.
- Material misstatement
An untrue statement, whether accidental or intentional, that affects the results of an audit to a measurable extent
- Material weakness
A deficiency or a combination of deficiencies in internal control resulting in a reasonable possibility that a material misstatement will not be prevented or detected in a timely way. Weakness in control is considered "material" if the absence of the control results in failure to provide reasonable assurance that the control objective will be met. A weakness classified as material implies that:
- Controls are not in place, are not in use or are inadequate
- Escalation is warranted
- There is an inverse relationship between materiality and the level of audit risk acceptable to the information security (IS) audit or assurance professional—that is, the higher the materiality level, the lower the acceptability of the audit risk and vice versa
- MATLAB
A commercial computer language and environment popular for visualization and algorithm development
- Matrix
A set of numbers or terms arranged in rows and columns between parentheses or double lines. For purposes of manipulating a matrix with software, think of it as a two-dimensional array. As with its one-dimensional equivalent, a vector, this mathematical representation of the two-dimensional array makes it easier to take advantage of software libraries that apply advanced mathematical operations to the data—including libraries that can distribute the processing across multiple processors for scalability.
- Maturity
The degree of reliability or dependency a business can place on a process to achieve desired goals or objectives
- Maturity level
A rating that describes the degree to which organizational unit processes meet the intentions and values articulated in a predefined set of practice areas. The rating is based on the achievement of a specified set of practice group levels within the predefined set of practice areas.
- Maturity model
Scope Notes: See Capability Maturity Model (CMM).
- Maximum tolerable outage (MTO)
Maximum time an enterprise can support processing in alternate mode
- MB
Megabyte
- Mean
The average value, also known as arithmetic mean
- Mean absolute error
The average error of all predicted values when compared with observed values
- Mean squared error
The average of the squares of all the errors found when comparing predicted values with observed values
- Measure
A standard used to evaluate and communicate performance against expected results
Scope Notes: Measures are normally quantitative in nature capturing numbers, dollars, percentages, etc., but they can also address qualitative information such as customer satisfaction. Reporting and monitoring measures help an enterprise gauge progress toward effective implementation of strategy.
- Measure (IEEE)
A quantitative assessment of the degree to which a software product or process possesses a given attribute
- Measurement and performance objectives
Statements that describe quantitative or qualitative objectives without requiring the additional rigor of statistical or quantitative analysis
- Measurement-based
A type of numerical data obtained by performing measurements but not based on statistical and quantitative management
- Media access control (MAC)
Lower sublayer of the OSI Model Data Link layer
- Media access control (MAC) address (MAC)
A 48-bit unique identifier assigned to network interfaces for communications on the physical network segment
- Median
The value in the middle of a sorted list of values or, if the number of values is even, the average of the two in the middle
- Media oxidation
The deterioration of the media on which data are digitally stored due to exposure to oxygen and moisture
Scope Notes: Tapes deteriorating in a warm, humid environment are an example of media oxidation. Proper environmental controls should prevent, or significantly slow, this process.
- Meet the intent and value
See Intent and value
- Megabit
Approximately 1 million bits. Precisely 1024 K bits, 220 bits or 1,048,576 bits.
- Megabyte
Approximately 1 million bytes. Precisely 1024 K Bytes, 220 bytes or 1,048,576 bytes
See Kilobyte.
- Memorandum of agreement
A record of expectations and arrangements between two or more parties; also known as a “memorandum of understanding”
See Statement of Work.
- Memory
Any device or recording medium that can hold and store binary data, and from which the entire original data set can be retrieved. Two types of memory are main, e.g., ROM and RAM, and auxiliary, e.g., tape and disk.
See Storage device.
- Memory dump
Raw data copied from one place to another with little or no formatting for readability
Scope Notes: Usually, dump refers to data copied from the main memory to a display screen or a printer. Dumps are useful for diagnosing bugs. After a program fails, it is possible to study a dump and analyze the contents of memory at the time of the failure. A memory dump will not help unless each person knows what to look for because dumps are usually output in a difficult-to-read form (binary, octal or hexadecimal).
- Memory inspection tools
Tools used to detect memory leaks, memory accesses and a variety of memory misuses
- Merkle tree
A data structure within which all nodes other than "leaf nodes" (nodes to which no subnodes are attached) include the hash values of all subnodes. Use of a cryptographically strong hashing function (i.e., a message digest) can allow rapid (logarithmic) verification of the integrity of all nodes on the tree.
- Mesh topology
A fault-tolerant topology in which network nodes and endpoints are mostly, if not fully, interconnected
- Message authentication code (MAC)
An American National Standards Institute (ANSI) standard checksum that is computed using Data Encryption Standard (DES).
- Message digest
The result of a cryptographic hash function taking an input of an arbitrary length and producing an output that is a standard-sized binary string. The output is unique to the input and even a minor change to the input results in a completely different output. Modern cryptographic hash functions are also resistant to collisions (situations in which different inputs produce identical outputs). A collision, while possible, is statistically improbable. Cryptographic hash functions are developed so that the input cannot be determined readily from the output.
See Hash.
- Message digest algorithm
A one-way function that serves as a way for a recipient to verify data integrity and sender identity. Common message digest algorithms are MD5, SHA256 and SHA512.
- Message Queue Telemetry Transport (MQTT)
An ultra-lightweight communication protocol widely used in the Internet of Things
- Message switching
A telecommunications methodology that controls traffic by sending a complete message to a concentration point where it is stored until the communications path is established
- Meta-learning
A process that involves training models across varied tasks to acquire generalizable strategies, enabling them to adapt and learn efficiently on new, often data-scarce tasks
- Metering
The monitoring and tracking of resource usage within a cloud environment, e.g., data, memory and storage
- Metric
A quantifiable entity that allows the measurement of the achievement of a process goal
Scope Notes: Metrics should be SMART—specific, measurable, actionable, relevant and timely. Complete metric guidance defines the unit used, measurement frequency, ideal target value (if appropriate), the procedure to carry out the measurement and the procedure to interpret the assessment.
- Metric, software quality
A quantitative measure of the degree to which software possesses a given attribute that affects its quality
- Metropolitan area network (MAN)
A data network intended to serve an area the size of a large city
- Microcontroller
Special processing unit useful in embedded systems, such as fleet vehicles and process control applications
- Microwave transmission
A high-capacity line-of-sight transmission of data signals through the atmosphere, which often requires relay stations
- Middleware
Another term for an application programming interface (API). It refers to the interfaces that allow programmers to access lower- or higher-level services by providing an intermediary layer that includes function calls to the services.
- Milestone
A terminal element that marks the completion of a work package or phase
Scope Notes: A milestone is typically marked by a high-level event such as project completion, receipt, endorsement or signing of a previously defined deliverable or a high-level review meeting at which the appropriate level of project completion is determined and agreed to. A milestone is associated with a decision that outlines the future of a project and, for an outsourced project, may have a payment to the contractor associated with it.
- Miniature fragment attack
An attack method that involves fragmenting the IP packet into smaller ones before pushing it through the firewall, in the hope that only the first in the sequence of fragmented packets will be examined and the others will pass without review
- Mini-team
A subset of the appraisal team members with primary responsibility for collecting sufficient appraisal data and objective evidence to ensure coverage of assigned model practice areas or sampled projects and organizational support functions; may also perform other tasks, e.g., project-level characterizations
- Mirrored site
An alternate site that contains the same information as the original
Scope Notes: Mirrored sites are set up for backup and disaster recovery and to balance the traffic load for numerous download requests. Such download mirrors are often placed in different locations throughout the Internet.
- Mission-critical application
An application that is vital to the operation of the enterprise. The term is very popular for describing the applications required to run day-to-day business operations.
- Misuse detection
Detection based on whether a system activity matches an activity defined as "bad"
- Mnemonic
A symbol chosen to assist human memory and understanding, e.g., an abbreviation such as "MPY" for multiply
- Mobile computing
A technology that extends wireless computing to small devices that run specifically designed applications and is capable of expanding an enterprise network to reach remote places under circumstances that would not permit connectivity by other means
Scope Notes: Mobile computing is comprised of smartphones, tablets and wearable devices
- Mobile device
portable electronic equipment that can connect to the Internet
- Mobile site
A mobile/temporary facility that serves as a business resumption location. The facility is typically delivered to an alternative site and can house information technology and staff.
- Mode
The value that occurs most often in a sample of data. Like the median, the mode cannot be directly calculated.
- Model
A method to describe a given set of components and how those components relate to each other to describe the main workings of an object, system, or concept
In machine learning (ML), the outcome of a training process. A trained model can automatically process data that was not used for its training to perform a specific set of tasks.
- Model component
Any of the five main architectural elements or parts that compose the CMMI model. These include the view, practice area, practice group, practice and informative material.
See Informative material, Practice, Practice area, Practice group and View.
- Modeling
Constructing programs that model the effects of a postulated environment to investigate the dimensions of a problem and observe the effects of algorithmic processes on responsive targets
- Model scope
The practice areas or model components to be appraised, defined in benchmark model views predefined by ISACA or customized for the organization’s needs.
See Appraisal scope and Organizational unit.
- MODEM (modulator/demodulator)
A device that connects a terminal or computer to a communications network via a telephone line. A modem turns digital pulses from a computer into frequencies within the audio range of a telephone system. When acting in the receiver capacity, a modem decodes incoming frequencies.
- Modularity
The degree to which a system or computer program is composed of discrete components so that a change to one component has minimal impact on other components
- Modular software
Software composed of discrete parts
- Modulation
The process of converting a digital computer signal into an analog telecommunications signal
- Module
In programming languages, a self-contained subdivision of a program that may be separately compiled
A discrete set of instructions, usually processed as a unit by an assembler, a compiler, a linkage editor, or a similar routine or subroutine
A packaged functional hardware unit suitable for use with other components
See Unit.
- Monetary unit sampling
A sampling technique that estimates the amount of overstatement in an account balance
- Monitoring policy
A set of rules outlining or delineating the way information about the use of computers, networks, applications and information is captured and interpreted
- Monte Carlo method
The use of randomly generated numbers as part of an algorithm
- Moving average
The mean (or average) of time series data (observations equally spaced in time, such as per hour or per day) from several consecutive periods
- Multifactor authentication (MFA)
A combination of more than one authentication method, such as token and password (or personal identification number [PIN]) or token and biometric device
- Multiplexor
A device used for combining several lower-speed channels into a higher-speed channel
- Multiprocessing
A mode of operation in which two or more processes (programs) are executed concurrently (simultaneously) by separate CPUs that have access to a common main memory. Contrasts with multiprogramming.
See Multitasking and Time sharing.
- Must
A word used in a statement of a method requirement to indicate that it is not tailorable. “Must” may be used interchangeably with “shall.”
See Shall.
- Mutex
A lock set by a smart contract code before access is permitted to a shared resource or function, and released after its use, to prevent multiple threads from simultaneously gaining access to the locked region of the code
- Mutual authentication
A form of authentication in which a device sends a certificate to a server and, in return, is sent authentication of the server
- Mutual takeover
A failover process that is basically a two-way idle standby. Two servers are configured so that each can take over the other's node resource group. Both must have enough central processing unit (CPU) power to run both servers' applications with sufficient speed, or expected performance losses must be taken into account until the failed node reintegrates.
N
- Naive Bayes classifier
A collection of classification algorithms based on Bayes' Theorem. It is a family of algorithms that share a common principle that every feature being classified is independent of the value of any other feature.
- NaN trap
The result of one number in a model becoming a NaN during training, causing many or all other numbers in the model to eventually become a NaN. "NaN" is an abbreviation for "Not a Number."
- Narrowband IoT (NB-IoT)
A low-power wide area network (LPWAN) standard developed by the 3rd Generation Project Partnership (3GPP) for indoor devices requiring low cost, low battery usage and high density
Source: 3rd Generation Partnership
- National Institute for Standards and Technology (NIST)
A US government agency that develops tests, test methods, reference data, proof-of concept implementations and technical analyses to advance the development and productive use of information technology
Scope Notes: NIST creates mandatory standards that are followed by federal agencies and those doing business with them.
- Native tokens
Created at the genesis block and usually used to reward the successful processing of a transaction or the creation of a blockchain
Unit of account for a blockchain
- Natural bounds
The inherent range of variation in a process, as determined by process performance measures. Natural bounds are sometimes referred to as “control limits” or the “voice of the process.”
- Natural language processing (NLP)
Enables computers to analyze and manipulate human language using various techniques, such as text analysis, sentiment analysis, machine translation, and speech recognition, to complete tasks like summarizing information, generating human-like text, and translating languages
- Need-to-know
Principled approach to controlling what individuals can see. Employees can access only the data, systems and spaces necessary to do their job.
- NetBIOS
A program that allows applications on different computers to communicate within a local area network (LAN)
- Netcat
A simple UNIX utility that reads and writes data across network connections using Transmission Control Protocol (TCP) or User Datagram Protocol (UDP). Netcat is designed to be a reliable back-end tool that can be used directly or easily driven by other programs and scripts. It is also a feature-rich network debugging and exploration tool, because it can create almost any kind of connection needed. Netcat is part of the Red Hat Power Tools collection and comes standard on SuSE Linux, Debian Linux, NetBSD and OpenBSD distributions.
- Net-centric technologies
Information and objects (software and data) managed or stored on a network, whose contents and security are of prime importance compared to the contents and security of software and data in traditional computer processing, which emphasizes hardware location
Scope Notes: An example of net-centric technologies is the Internet, where the network is its primary concern.
- Net present value (NPV)
Calculation based on the after-tax discount rate of an investment and a series of expected incremental cash outflows (initial investment and operational costs) and cash inflows (cost savings or revenues) that occur at regular periods during the life cycle of the investment
Scope Notes: To arrive at a fair NPV calculation, cash inflows accrued by the business up to about five years after project deployment also should be taken into account.
- Net return
The revenue that a project or business makes after tax and other deductions; often classified as net profit
- Network
A system of interconnected computers and the communication equipment used to connect them
- Network access control systems
Systems that assist in controlling devices and user access to networks
- Network address
An identifier for a node or host on a telecommunications network
- Network address translation (NAT)
A methodology for modifying network address information in IP datagram packet headers while they are in transit across a traffic routing device for the purpose of remapping one IP address space into another
- Network administrator
An individual who is responsible for planning, implementing and maintaining the telecommunications infrastructure; also may be responsible for voice networks
Scope Notes: For smaller enterprises, the network administrator may also maintain a local area network (LAN) and assist end users.
- Network analyzer
A tool that creates a signal and characterizes the devices that receive it to help diagnose problems with Internet connectivity, WiFi network setups and issues on remote servers
- Network-attached storage (NAS)
An architecture that uses dedicated storage devices to centralize data storage
Scope Notes: NA storage devices generally do not provide traditional file/print or application services.
- Network basic input/output system
See NetBIOS.
- Network hop
A strategy in which an attacker whose identity is obscured successively hacks into a series of connected systems
- Network interface card (NIC)
A card designed for insertion into a computer to enable it to communicate with other computers on a network
Scope Notes: Most NICs are designed for a particular type of network or protocol.
- Network interoperability
The ability of networks comprised of different topologies, configurations and functionalities to transmit data to and from one another
- Network News Transfer Protocol (NNTP)
A protocol that uses a reliable stream-based mechanism for the distribution, inquiry, retrieval and posting of netnews articles. For news-reading clients, NNTP enables retrieval of news articles stored in a central database, enabling subscribers to select only the articles they wish to read. (RFC 3977)
- Network segmentation
A common network security implementation technique that segments an enterprise network into zones that can be separately controlled, monitored and protected
- Network topology
The basic configuration and architecture of a set of interconnected nodes
- Network traffic analysis
A means of identifying patterns in network communications
Scope Notes: Traffic analysis does not need to have the actual content of the communication but analyzes where traffic occurs, when and for how long communications take place, and the quantity of information transferred.
- Neural network
Networks, inspired by the structure of the human brain, that learn by processing data through three layers (input, hidden, and output). They can be trained to match any input to various outputs, including binary ones, making them versatile tools in deep learning (DL) for tasks like image recognition.
- Neuron
A neural network node that typically takes in multiple input values and generates one output value
- N-gram
The analysis of sequences of "n" items (typically, words in natural language) to look for patterns. The value of "n" can be anything. An n-gram is used to construct statistical models of documents (e.g., when automatically classifying them) and to find positive or negative terms associated with a product name.
- Nibble
An equivalent of four binary digits or half a byte. Nibble can be represented by one hexadecimal digit.
- Node
Point at which terminals are given access to a network
- Node (neural network)
A neuron in a hidden layer
- Noise
Data transmission or data set disturbances, such as static, that cause messages to be misinterpreted by the receiver
- Nonce
A limited or single-use value, typically small, used for initialization, seed generation or some other special purpose
- Nondisclosure agreement (NDA)
A legal contract between at least two parties that outlines confidential materials the parties wish to share with one another for certain purposes but wish to restrict from generalized use; a contract through which the parties agree not to disclose information covered by the agreement
Scope Notes: Also called a confidential disclosure agreement (CDA), confidentiality agreement or secrecy agreement, an NDA creates a confidential relationship between the parties to protect any type of trade secret. As such, an NDA can protect non-public business information. In the case of certain governmental entities, the confidentiality of information other than trade secrets may be subject to applicable statutory requirements, and in some cases must be revealed to an outside party requesting the information. Generally, the governmental entity will include a provision in the contract to allow the seller to review a request for information that the seller identifies as confidential and the seller may appeal such a decision requiring disclosure. NDAs are commonly signed when two companies or individuals are considering doing business together and need to understand the processes used in one another’s businesses solely for the purpose of evaluating the potential business relationship. NDAs can be "mutual," meaning that both parties are restricted in their use of the materials provided, or they can only restrict a single party. It is also possible for an employee to sign an NDA or NDA-like agreement with a company at the time of hiring; in fact, some employment agreements will include a clause restricting "confidential information" in general.
- Nonintrusive monitoring
The use of transported probes or traces to assemble information, track traffic and identify vulnerabilities
- Non-model findings
Findings that are not directly traceable to model practices but that may be useful to an organization’s business, performance or improvement goals. Non-model findings cannot be used to determine ratings, but they may identify other areas that the team must consider in order to characterize practices.
- Nonrepudiable transaction
A transaction that cannot be denied after the fact
- Nonrepudiation
The assurance that a party cannot later deny originating data; provision of proof of the integrity and origin of the data, verifiable by a third party
Scope Notes: A digital signature can provide nonrepudiation.
- Nonstatistical sampling
Method of selecting a portion of a population, based in professional judgment and experience, for the purpose of quickly confirming a proposition. This method does not allow drawing mathematical conclusions regarding the entire population.
- Normal distribution
A probability distribution that, when graphed, is a symmetrical bell curve with the mean value at the center. The standard deviation value affects the height and width of the graph. Also known as "Gaussian distribution."
- Normalization
The elimination of redundant data
The process of converting an actual range of values into a standard range of values, typically -1 to +1 or 0 to 1
- NoSQL
A database management system that uses any of several alternatives to the relational, table-oriented model used by SQL databases
- Null
A value whose definition is to be supplied within the context of a specific operating system. This value is a representation of the set of no numbers or no value for the operating system in use.
- Null data
Data for which space is allocated but for which no value currently exists
- Null hypothesis
If the proposed model for a data set indicates that the value of "x" affects the value of "y," then the null hypothesis—i.e., the model compared against the proposed model to check whether "x" really is affecting "y"—will find that the observations are all based on chance and that there is no effect. The smaller the P-value computed from the sample data, the stronger the evidence is against the null hypothesis.
- Null string
A string containing no entries. Note that a null string has a length of zero.
- Numeric check
An edit check designed to ensure that the data element in a particular field is numeric
O
- Obfuscation
The deliberate act of creating source or machine code that is difficult for humans to understand
- Object code
Machine-readable instructions produced from a compiler or assembler program that has accepted and translated the source code
- Objective
A statement of a desired outcome
- Objective evidence (OE)
Artifacts or affirmations used as indicators of the implementation or habit and persistence of processes to meet the intent and value of one or more model practices
See Artifact and Affirmation
- Objective function
A function that combines decision variables, constraints and the goal value to solve an optimization problem. The objective is the goal to maximize or minimize; the objective function is used to find the optimum result.
- Objective in appearance
The avoidance of facts and circumstances that are so significant that a reasonable and informed third party would be likely to conclude, weighing all the specific facts and circumstances, that a firm, audit function or member of the audit team’s integrity, objectivity or professional skepticism has been compromised
- Objectively evaluate
To review activities and work products against criteria that minimize subjectivity and bias by the reviewer
- Objective of mind
The state of mind that permits the expression of a conclusion without being affected by influences that compromise professional judgment, thereby allowing an individual to act with integrity and exercise objectivity and professional skepticism
- Objectivity
The ability to exercise judgment, express opinions and present recommendations with impartiality
- Object management group (OMG)
A consortium with more than 700 affiliates from the software industry whose purpose is to provide a common framework for developing applications using object-oriented programming techniques
Scope Notes: OMG is known principally for promulgating the Common Object Request Broker Architecture (CORBA) specification.
- Object orientation
An approach to system development in which the basic unit of attention is an object, which represents an encapsulation of both data (an object’s attributes) and functionality (an object’s methods)
Scope Notes: Objects are usually created using a general template called a "class." A class is the basis for most design work in objects. A class and its objects communicate in defined ways. Aggregate classes interact through messages, which are directed requests for services from one class (the client) to another class (the server). A class may share the structure or methods defined in one or more other classes, a relationship known as inheritance.
- Object oriented design
A software development technique in which a system or component is expressed in terms of objects and connections between those objects
- Object oriented language
A programming language that allows the user to express a program in terms of objects and messages between those objects. Examples include C++, Smalltalk and LOGO.
- Object oriented programming
A technology for writing programs that are made up of self-sufficient modules containing all the information needed to manipulate a given data structure. The modules are created in class hierarchies so that the code or methods of a class can be passed to other modules. New object modules can be easily created by inheriting the characteristics of existing classes.
See Object and Object-oriented design
- Object oriented system development
A system development methodology that is organized around "objects" rather than "actions" and "data" rather than "logic"
Scope Notes: Object-oriented analysis is an assessment of a physical system to determine which objects in the real world need to be represented as objects in a software system. Any object-oriented design is a software design centered around designing the objects that will make up a program. Any object-oriented program is composed of objects or software parts.
- Observation
The receipt of messages through electronic, sensory or vibrational signals and the human senses
- Observer
An individual assigned by ISACA to evaluate, audit or review an appraisal team leader candidate
See Auditor
- Octal
The base-8 number system. Digits are 0, 1, 2, 3, 4, 5, 6 and 7.
- Offchain
Any blockchain actions that require data outside of the blockchain network
- Offline files
Computer file storage media that are not physically connected to a computer. Typical examples include tapes or tape cartridges used for backup purposes.
- Offline inference
The process of generating a group of predictions, storing those predictions and then retrieving those predictions on demand
- Offsite storage
A facility located away from the building that houses the primary information processing facility (IPF) used for storage of computer media, such as offline backup data and storage files
- Onchain
Cryptoasset or token transactions which occur on and within the data records of a blockchain and are perpetually dependent on the state of that blockchain for their validity
- On-demand self-service
The ability for a customer to self-assign and allocate cloud resources instantaneously without vendor interaction
- One-shot learning
A machine-learning approach often used for object classification that is designed to learn effective classifiers from a single training example
- Online Certificate Status Protocol (OCSP)
A protocol used for receiving the status of an X.509 certificate
- Online data processing
A type of data processing that involves entering information into a computer via a video display terminal
Scope Notes: With online data processing, the computer immediately accepts or rejects the information as it is entered.
- OOP
The acronym for object-oriented programming
- Open Source Security Testing Methodology
An open and freely available methodology and manual for security testing
- Open system
System for which detailed specifications of the composition of its component are published in a nonproprietary environment, thereby enabling competing enterprises to use these standard components to build competitive systems
Scope Notes: The advantages of using open systems include portability, interoperability and integration.
- Open Systems Interconnect (OSI) model (OSI)
A seven-layer conceptual model that describes functions of computer network or telecommunication systems
- Open Web Application Security Project (OWASP)
An open community dedicated to enabling organizations to conceive, develop, acquire, operate and maintain applications that can be trusted
- Operating system (OS)
A master control program that runs the computer and acts as a scheduler and traffic controller
Scope Notes: The operating system is the first program copied into the computer memory after the computer is turned on; it must reside in memory at all times. It is the software that interfaces between the computer hardware (disk, keyboard, mouse, network, modem and printer) and the application software (word processor, spreadsheet email) which also controls access to the devices, is partially responsible for security components and sets the standards for the application programs that run in it.
- Operating system audit trail
Record of system events generated by a specialized operating system mechanism
- Operational audit
An audit designed to evaluate the various internal controls, economy and efficiency of a function or department
- Operational concept
A general description of the way in which a component or solution is used or operates. An operational concept may also be referred to as a “concept of operations.”
- Operational control
Deals with the everyday operation of a company or enterprise to ensure that all objectives are achieved
- Operational level agreement (OLA)
An internal agreement covering the delivery of services that supports the IT organization in its delivery of services
- Operational risk
The potential for losses caused by inadequate systems or controls, human error or mismanagement, and natural disasters
- Operational scenario
A description of a potential sequence of events that includes the interaction of a component or solution with its environment and users, and with other solution components. Operational scenarios are used to evaluate the requirements and design of the system and to verify and validate the system.
- Operation and maintenance phase
The period of time in the software life cycle during which a software product is employed in its operational environment, monitored for satisfactory performance, and modified as necessary to correct problems or to respond to changing requirements
- Operator console
A special terminal used by computer operations personnel to control computer and systems operations functions.
Scope Notes: Operator console terminals typically provide a high level of computer access and should be properly secured.
- Opportunity
An uncertain event that may positively impact meeting objectives
- Optical character recognition (OCR)
Used to electronically scan and input written information from a source document
- Optical scanner
An input device that reads characters and images that are printed or painted on a paper form into the computer
- Optimizing process
A quantitatively managed process that is continually improved to increase its capability. These continuous improvements can be made through both incremental and innovative improvements. An optimizing process is necessary at the practice group level 5 in the CMMI Practice Areas.
See Quantitatively managed process and Defined process.
- Opt-in
A declaration or an active motion in which a data subject agrees to particular data processing. Process or type of policy whereby the personally identifiable information (PII) principal is required to take an action to express explicit, prior consent for their PII to be processed for a particular purpose.
- Opt-out
A choice that is made on behalf of a data subject, indicating the subject’s desire to no longer receive unsolicited information
- Or
In the CMMI model, means either “and” or “or”
- Oracle
A relational-database programming system that incorporates the SQL programming language. It is a registered trademark of the Oracle Corp.
- Oracle problem
A paradoxical situation where the oracle can become the central point of failure for the smart contract due to decreased security and centralization
- Organisation for Economic Co-operation and Development (OECD)
An international organization helping governments tackle the economic, social and governance challenges of the global economy
Scope Notes: The OECD groups 30 member countries in a unique forum to discuss, develop and refine economic and social policies.
- Organization
The manner in which an enterprise is structured. It can also mean the entity.
- Organizational directives
Expectations established by senior management that are adopted by an organization to influence and determine decisions. This may also be referred to as “organizational policies.”
- Organizational structure
A component of a governance system. This includes the enterprise and its structures, hierarchies and dependencies.
Scope Notes: Another example is a "steering committee."
See COBIT 5 perspective
- Organizational support function
A team or entity that provides products and/or services for a bounded set of activities needed by other portions of the organization. Examples of organizational support functions include quality assurance, configuration management, training and other process groups. Organizational support functions should be treated as projects in that there should be processes and process roles with plans, infrastructure and organizational boundaries that describe what they do and how they provide support to other projects within the organization.
- Organizational unit (OU)
The part of an organization that is the subject of an appraisal and to which the appraisal results are generalized. An organizational unit deploys one or more processes that have a coherent process context and defined set of process roles and operate within a coherent set of business objectives.
See Process role
- Organizational unit coordinator (OUC)
An appraisal role, designated by the appraisal sponsor and appraisal team leader, that handles logistics and provides technical, administrative and logistical support, such as coordinating schedules, notifying participants, arranging facilities and resources, obtaining requested documentation and arranging catering
- Organization’s business objectives
A set of objectives developed by senior management to improve performance, build and improve capability and enhance profitability, market share and other factors that influence the organization’s success
- Organization’s measurement repository
A specific location or locations where measurement-based information is stored. The purpose is to collect and make measurement results available throughout the organization. This repository contains or references actual measurement results and related information needed to understand and analyze measurement results that are typically described as part of the organizational process assets.
See Organization’s process assets and Organization’s set of standard processes
- Organization’s process asset library
A specific location or locations where information is stored to make process assets available that are useful to those who are defining, implementing, managing and following processes in the organization
See Organization’s process assets
- Organization’s process assets
Process-related documentation, records and information, such as an organization's policies, standard processes, tailoring guidelines, checklists, lessons learned, templates, standards, procedures, plans, training materials, etc.
See Process description and Organization’s process asset library
- Organization’s set of standard processes
A collection of process descriptions that guide consistent process implementation across an organization. These process descriptions cover the fundamental process elements and their relationships to each other, such as ordering and interfaces that should be incorporated into the defined processes implemented in work groups across the organization. A standard process is essential for long-term stability and improvement.
See Process description and Process element
- Organogram
A hierarchy diagram of an organizational structure
- Orthogonal Frequency Division Multiple Access (OFDMA)
The OFDM multi-user variant that achieves multiple access by assigning subsets of subcarriers to different users, allowing simultaneous data transmission from several users
- Other expert
An individual internal or external to an enterprise that could be an IT auditor from an external firm, a management consultant or an expert in the area of the engagement who has been appointment by top management or the team
- Outcome
A result
- Outcome measure
A measure that represents the consequences of actions previously taken; often referred to as a lag indicator
Scope Notes: Outcome measure frequently focuses on results at the end of a time period and characterizes historic performance. It is also referred to as a key goal indicator (KGI) and used to indicate whether goals have been met. These can be measured only after the fact and, therefore, are called "lag indicators."
- Outlier
Extreme values that might be errors in measurement and recording or accurate reports of rare events
- Output analyzer
A tool that checks the accuracy of the results produced by a test run
Scope Notes: There are three types of checks that an output analyzer can perform. First, if a standard set of test data and test results exist for a program, the output of a test run after program maintenance can be compared with the set of results that should be produced. Second, as programmers prepare test data and calculate the expected results, these results can be stored in a file, and the output analyzer compares the actual results of a test run with the expected results. Third, the output analyzer can act as a query language; it accepts queries about whether certain relationships exist in the file of output results and reports compliance or noncompliance.
- Outsourcing
A formal agreement with a third party to perform IS or other business functions for an enterprise
- Overfitting
A model of training data that, by taking too many of the data quirks and outliers into account, is overly complicated and will not be as useful as it could be to find patterns in test data
- Overflow
In a calculator, the state in which the calculator is unable to accept or process the number of digits in the entry or result
Source: ISO
See Arithmetic overflow
- Overflow exception
An exception that occurs when the result of an arithmetic operation exceeds the size of the storage location that is designated to receive it
Source: IEEE
- Over the air (OTA) updates (OTA)
An update to a device’s firmware or software that is delivered via wireless communication
- Owner
An individual or group that holds or possesses the rights of and the responsibilities for an enterprise, entity or asset
Scope Notes: Examples include process owners and system owners.
See COBIT 5 perspective
P
- Packet
Protocol data unit that is routed from source to destination in a packet-switched network
Scope Notes: A packet contains both routing information and data.
- Packet analyzers
A tool that captures packets as they travel a network to monitor, intercept and decode data
- Packet filtering
Controlling access to a network by analyzing the attributes of the incoming and outgoing packets and either letting them pass or denying them, based on a list of rules
- Packet Internet Groper (PING)
An Internet program (Internet Control Message Protocol [ICMP]) used to determine whether a specific IP address is accessible or online. It is a network application that uses User Datagram Protocol (UDP) to verify reachability of another host on the connected network.
Scope Notes: It works by sending a packet to the specified address and waiting for a reply. PING is used primarily to troubleshoot Internet connections. In addition, PING reports the number of hops required to connect two Internet hosts. There are both freeware and shareware PING utilities available for personal computers (PCs).
- Packet switching
The process of transmitting messages in convenient pieces that can be reassembled at the destination
- PageRank
An algorithm that determines the importance of something, typically to rank it in a list of search results. PageRank works by counting the number and quality of links to a page to determine a rough estimate of importance of the website. The underlying assumption is that more important websites are likely to receive more links from other websites.
- PAN
Acronym for primary account number (also referred to as account number). A unique payment card number (typically for credit or debit cards) that identifies the issuer and the particular cardholder account
- Pandas
A Python library for data manipulation that is popular with data scientists
- Paper test
A walk-through of the steps of a regular test, but without actually performing the steps
Scope Notes: Usually used in disaster recovery and contingency testing; team members review and become familiar with the plans and their specific roles and responsibilities
- Parallel simulation
Involves an IS auditor writing a program to replicate those application processes that are critical to an audit opinion and using this program to reprocess application system data.
Scope Notes: The results produced by parallel simulation are compared with the results generated by the application system and any discrepancies are identified.
- Parallel testing
The process of feeding test data into two systems, the modified system and an alternative system (possibly the original system), and comparing results to demonstrate the consistency and inconsistency between two versions of the application
- Parameter
A constant, variable, or expression that is used to pass values between software modules. Synonymous with argument.
As it relates to neural networks, a variable that determines how a trained model produces a prediction and executes a task. The number of parameters can serve as an indication of the complexity of the model (e.g., a simple Naïve Bayes model can have tens of thousands of parameters, while state-of-the-art large language models [LLMs] have hundreds of billions of parameters).
- Parity check
A general hardware control that helps to detect data errors when data are read from memory or communicated from one computer to another
Scope Notes: A 1-bit digit (either 0 or 1) is added to a data item to indicate whether the sum of that data item’s bit is odd or even. When the parity bit disagrees with the sum of the other bits, the computer reports an error. The probability of a parity check detecting an error is 50 percent.
- Partitioned file
A file format in which the file is divided into multiple sub files and a directory is established to locate each sub file
- Pascal
A high-level programming language designed to encourage structured programming practices
- Passive assault
Intruders' attempt to learn some characteristic of the data being transmitted
Scope Notes: With a passive assault, intruders may be able to read the contents of the data so the privacy of the data is violated. Alternatively, although the content of the data itself may remain secure, intruders may read and analyze the plaintext source and destination identifiers attached to a message for routing purposes, or they may examine the lengths and frequency of messages being transmitted.
- Passive response
A response option in intrusion detection in which the system simply reports and records the problem detected, relying on the user to take subsequent action.
- Password
A protected, generally computer-encrypted string of characters that authenticate a computer user to the computer system
- Password cracker
A tool that tests the strength of user passwords by searching for passwords that are easy to guess. It repeatedly tries words from specially crafted dictionaries and often also generates thousands (and in some cases, even millions) of permutations of characters, numbers and symbols.
- Patch
Fixes to software programming errors and vulnerabilities
- Patch management
An area of systems management that involves acquiring, testing and installing multiple patches (code changes) to an administered computer system to maintain up-to-date software and often to address security risk
Scope Notes: Patch management tasks include maintaining current knowledge of available patches, deciding what patches are appropriate for particular systems, ensuring that patches are installed properly, testing systems after installation and documenting all associated procedures, such as specific configurations required. A number of products are available to automate patch management tasks. Patches are sometimes ineffective and can sometimes cause more problems than they fix. Patch management experts suggest that system administrators take simple steps to avoid problems, such as performing backups and testing patches on noncritical systems prior to installations. Patch management can be viewed as part of change management.
The process to identify, acquire, install, and verify a set of changes to a computer program or its supporting data for solutions and systems. A patch is typically an isolated change of a specified scope and is sometimes referred to as a bug fix. (CMMI)
- Patent
Protection of research and ideas that led to the development of a new, unique and useful product to prevent the unauthorized duplication of the patented item
- Path
A sequence of instructions that may be performed in the execution of a computer program
- Path analysis
Analysis of a computer program (i.e., source code) to identify all possible paths through the program, to detect incomplete paths or discover portions of the program that are not on any path
- Payback period
The length of time needed to recoup the cost of capital investment
Scope Notes: Financial amounts in the payback formula are not discounted. Note that the payback period does not take into account cash flows after the payback period and therefore is not a measure of the profitability of an investment project. The scope of the internal rate of return (IRR), net present value (NPV) and payback period is the useful economic life of the project up to a maximum of five years.
- Payload
A piece of malicious software that lets an attacker control a compromised computer system. The payload is typically attached to and delivered by an exploit.
- Payment system
A financial system that establishes the means for transferring money between suppliers and users of funds, ordinarily by exchanging debits or credits between banks or financial institutions
- Payroll system
An electronic system for processing payroll information and the related electronic (e.g., electronic timekeeping and/or human resources [HR] system), human (e.g., payroll clerk), and external party (e.g., bank) interfaces. In a more limited sense, it is the electronic system that performs the processing for generating payroll checks and/or bank direct deposits to employees.
- Peer reviews
The examination of work products performed by similarly skilled personnel during the development of work products to identify defects for removal. Peer reviews are sometimes called work product inspections.
See Work product
- Penetration testing
A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers
- Perceptron
Neural network that approximates a single neuron with n binary inputs. It computes a weighted sum of its inputs and fires if that weighted sum is zero or greater.
- Performance
In IT, the actual implementation or achievement of a process
- Performance driver
A measure that is considered the "driver" of a lag indicator. It can be measured before the outcome is clear and, therefore, is called a "lead indicator."
Scope Notes: There is an assumed relationship between the two that suggests that improved performance in a leading indicator will drive better performance in the lagging indicator. They are also referred to as key performance indicators (KPIs) and are used to indicate whether goals are likely to be met.
- Performance indicators
A set of metrics designed to measure the extent to which performance objectives are being achieved on an on-going basis
Scope Notes: Performance indicators can include service level agreements (SLAs), critical success factors (CSFs), customer satisfaction ratings, internal or external benchmarks, industry best practices and international standards.
- Performance management
In IT, the ability to manage any type of measurement, including employee, team, process, operational or financial measurements. The term connotes closed-loop control and regular monitoring of the measurement.
- Performance parameters
Measurable criteria used to monitor progress toward quantitative objectives. Collectively, performance parameters provide a metric for determining the success of the business or project.
- Performance testing
A test for comparing the system’s performance to other equivalent systems using well-defined benchmarks
- Performance work statement (PWS)
A statement of work (SOW) for performance-based acquisitions that clearly describes the performance objectives and standards expected of the contractor. When a contract is awarded, the PWS is a legally binding document for the contractor.
See SOW
- Performed process
A simple approach or set of steps that produces solutions or work products. A performed process is characteristic of Practice Group Level 1 in the CMMI Practice Areas.
- Peripheral device
Equipment that is directly connected to a computer. A peripheral device can be used to input data, e.g., a keypad, bar code reader, transducer or laboratory test equipment or to output data, e.g., a printer, disk drive, video system, tape drive, valve controller or motor controller. It is synonymous with "peripheral equipment."
- Peripherals
Auxiliary computer hardware equipment used for input, output and data storage
Scope Notes: Examples of peripherals include disk drives and printers.
- Perplexity
One measure of how well a model is accomplishing its task
- Persistent and habitual
The routine way of doing business and following and improving a process that an organization follows as part of its culture
- Personal computer (PC)
Synonymous with microcomputer, a computer that is functionally similar to large computers but serves only one user
- Personal data
Information relating to an identified or identifiable natural person
- Personal data breach
Any accidental or unlawful destruction, loss, alteration, unauthorized disclosure or access of a subject’s data
- Personal digital assistant (PDA)
Also called a "palmtop" or "pocket computer," a handheld device that has computing, Internet, networking and telephone characteristics
- Personal identification number (PIN)
A type of password (i.e., a secret number assigned to an individual) that, in conjunction with some means of identifying the individual, serves to verify the authenticity of the individual
Scope Notes: PINs have been adopted by financial institutions as the primary means of verifying customers in an electronic funds transfer (EFT) system.
- Personal information
A synonym for "personal data"
- Personally identifiable information (PII)
Any information that can be used to establish a link between the information and the natural person to whom such information relates or that is or might be directly or indirectly linked to a natural person
- Pervasive IS control
A general control designed to manage and monitor the IS environment and which, therefore, affects all IS-related activities
- Phase of BCP
A step-by-step approach consisting of various phases
Scope Notes: Phase of BCP is usually comprised of the following phases: pre-implementation phase, implementation phase, testing phase and post-implementation phase.
- Phishing
A type of electronic mail (email) attack that attempts to convince a user that the originator is genuine with the intention of obtaining information for use in social engineering
Scope Notes: For example, phishing attacks may take the form of an attacker masquerading as a lottery organization advising the recipient or the user's bank of a large win; in either case, the intent is to obtain account and personal identification number (PIN) details. Alternative attacks may seek to obtain apparently innocuous business information, which can be used in another form of active attack.
- Phreakers
Those who crack security, most frequently telephone and other communication networks
- Piggybacking
The act of following an authorized person into a restricted access area
The act of electronically attaching to an authorized telecommunications link to intercept and possibly alter transmissions
- PII controller
A privacy stakeholder (or privacy stakeholders) who determines the purposes and means for processing personally identifiable information (PII) other than natural persons who use data for personal purposes
- PII principal
The natural person to whom personally identifiable information (PII) relates
- PII processor
The privacy stakeholder who processes personally identifiable information (PII) on behalf of and in accordance with the instructions of a PII controller
- PIN
See Personal identification number (PIN)
- Pipeline
A set of structured practices, tools and flows that DevOps practitioners adopt throughout the development and operational life cycle
- Pivot table
A tool that quickly summarizes long lists of data without requiring a single formula or copying a single cell. However, the most notable feature of pivot tables is that they can be arranged dynamically.
- Plain old telephone service (POTS)
A wired telecommunications system
- Plaintext
Digital information, such as cleartext, that is intelligible to the reader
- Platform
The hardware and software that must be present and functioning for an application program to run (perform) as intended. A platform includes, but is not limited to, the operating system or executive software, communication software, microprocessor, network, input/output hardware, any generic software libraries, database management, user interface software, and the like.
- Platform as a Service (PaaS)
Offers the capability to deploy onto the cloud infrastructure customer-created or acquired applications that are created using programming languages and tools supported by the provider
- PMBOK (Project Management Body of Knowledge) (PMBOK)
A project management standard developed by the Project Management Institute (PMI)
- Point-of-presence (POP)
A telephone number that represents the area in which the communication provider or Internet service provider (ISP) provides service
- Point-of-sale (POS) systems (POS)
Enables the capture of data at the time and place of transaction
Scope Notes: POS terminals may include use of optical scanners for use with bar codes or magnetic card readers for use with credit cards. POS systems may be online to a central computer or may use stand-alone terminals or microcomputers that hold the transactions until the end of a specified period when they are sent to the main computer for batch processing.
- Point-to-point Protocol (PPP)
A protocol used for transmitting data between two ends of a connection
- Point-to-point Tunneling Protocol (PPTP)
A protocol used to transmit data securely between two end points to create a virtual private network (VPN)
- Poisson distribution
A distribution of independent events, usually over a period of time or space, used to help predict the probability of an event. Like the binomial distribution, this is a discrete distribution.
- Policy
A document that communicates required and prohibited activities and behaviors
- Polymorphism (Objects)
Polymorphism refers to database structures that send the same command to different child objects that can produce different results depending on their family hierarchical tree structure.
- Polynomial
Mathematical expression of more than two algebraic terms, especially the sum of several terms that contain different powers of the same variable(s)
- Population
The entire set of data from which a sample is selected and about which an IT auditor wishes to draw conclusions
- Port
A process or application-specific software element serving as a communication endpoint for the transport layer IP protocols (UDP and TCP)
- Port (Port number)
A process or application-specific software element serving as a communication endpoint for the Transport Layer IP protocols (UDP and TCP)
- Portfolio
A grouping of "objects of interest" (investment programs, IT services, IT projects, other IT assets or resources) managed and monitored to optimize business value. (The investment portfolio is of primary interest to Val IT. IT service, project, asset and other resource portfolios are of primary interest to COBIT.)
- Port scanning
The act of probing a system to identify open ports
- Posting
The process of actually entering transactions into computerized or manual files
Scope Notes: Posting transactions might immediately update the master files or may result in memo posting, in which the transactions are accumulated over a period of time and then applied to master file updating.
- Practical Byzantine fault tolerance (pBFT)
Consensus mechanism in which all nodes are ordered in sequence with one node being primary node or leader, and all others referred to as backup nodes. All nodes in pBFT systems communicate with one another with the goal being that all honest nodes will come to an agreement of the state of the system using a majority rule. Nodes communicate for two reasons: to prove that messages came from a specific peer node and to confirm that messages were not modified during transmission. pBFT can be used for private and public blockchains and allows for instant transaction finality. However, such methodology requires a great number of messages between nodes, hence making a large blockchain network challenging.
- Practice
A practice consists of two parts:
Required practice information: Information required to understand the full intent and value of the practice, which includes the practice statement (intent), the value statement, and the additional required information
Explanatory practice information: Remaining parts of the practice, including additional explanatory PA/practice information, example activities and work products, which are important and useful to better understand the practice statement (intent), value statement, and additional required information
- Practice area (PA)
A collection of similar practices that together achieve the defined intent, value, and required information described in that practice area
- Practice area (PA) required information (PA)
The intent, value, and any additional required information for a practice area
- Practice group
The organizing structure for practices within a practice area to aid understanding and adoption and provide a path for performance improvement
- Predictive analytics
The analysis of data to predict future events, typically to aid in business planning. Predictive analytics incorporates predictive modeling and other techniques. Machine learning may be considered a set of algorithms to help implement predictive analytics.
- Predictive modeling
The development of statistical models to predict future events
- Preliminary design
The process of analyzing design alternatives and defining the architecture, components, interfaces and timing and sizing estimates for a system or component
See Detailed design.
The result of the process in definition 1
- Preliminary findings
Draft strength and weakness statements developed by the appraisal team after evaluating objective evidence. Preliminary findings are validated with appraisal participants prior to the rating and final finding activities.
See Appraisal final findings
- Preprocessing
Procedures and techniques for cleaning, transforming, and formatting data to enhance its quality and suitability for analysis and modeling
- Preventive application control
Application control that is intended to prevent an error from occurring. Preventive application controls are typically executed at the transaction level, before an action is performed.
- Preventive control
An internal control that is used to avoid undesirable events, errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
- Prime number
A natural number greater than 1 that can only be divided by 1 and itself
- Primitive
A primitive is a fundamental interface, block of code or basic functionality that can be deployed and reused within broader systems or interfaces. Primitives can be combined in various ways to accomplish particular tasks. In cryptosystems, primitives form the building blocks of cryptographic algorithms.
- PRINCE2 (Projects in a Controlled Environment) (PRINCE2)
Developed by the Office of Government Commerce (OGC), PRINCE2 is a project management method that covers the management, control and organization of a project
- Principal component analysis
An algorithm that looks at the direction with the most variance and then determines that as the first principal component. This is very similar to how regression works in that it determines the best direction to map data.
- Principle
A component of a governance system. Principles translate desired behavior into practical guidance for day-to-day management.
- Principle of least privilege (PoLP)
A principled approach of controlling what someone can do. This is an extension of need-to-know, whereby individuals are only granted the least amount of system access necessary to perform their jobs.
- Principle of least privilege/access
Controls used to allow the least privilege access needed to complete a task
- Printed circuit board (PCB)
The foundation of most electronic devices onto which the electrical components, including semiconductors, connectors, resistors, capacitors, memory chips and processors, are mounted and linked via conductive copper circuits
- Prior distribution
In Bayesian inference, a distribution that models the many plausible values of the unknown quantity to be estimated. Bayesian inference is then using data (that is considered unchanging) to build a tighter posterior distribution for the unknown quantity.
- Privacy
The right of an individual to trust that others will appropriately and respectfully use, store, share and dispose of his/her associated personal and sensitive information within the context and according to the purposes for which it was collected or derived
- Privacy breach
A situation where personally identifiable information (PII) is processed in violation of one or more relevant privacy safeguarding requirements
- Privacy by design
The integration of privacy into the entire engineering process
- Privacy controls
Measures that treat privacy risk by reducing its likelihood or consequences. Privacy controls include organizational, physical and technical measures, e.g., policies, procedures, guidelines, legal contracts, management practices or organizational structures. Control is also used as a synonym for "safeguard" or "countermeasure."
- Privacy engineering
Within systems engineering, a discipline focused on maximizing the freedom of data subjects from adverse consequence associated with illicit or illegal disclosures or abuse during (or as a result of) processing
- Privacy impact
Anything that has an effect on the privacy of personally identifiable information (PII) owned by a data subject and/or group of data subjects
- Privacy impact assessment
The overall process of identifying, analyzing, evaluating, consulting, communicating and planning the treatment of potential privacy impacts with regard to the processing of personally identifiable information (PII) within the broader risk management framework of an enterprise
- Privacy incident management
The process by which an enterprise addresses a privacy breach
- Privacy information management system (PIMS)
An information security management system that addresses the protection of privacy potentially affected by the processing of personally identifiable information (PII)
- Privacy notice
A notification that provides individuals with information on how their personal data will be processed
- Privacy policy
The intention, direction, rules and commitment, as formally expressed by the personally identifiable information (PII) controller, related to the processing of PII in a particular setting. It is a set of shared values governing the privacy protection of PII when processed in information and communication technology systems.
- Privacy preferences
Specific choices made by an individual about how their personally identifiable information (PII) should be processed for a particular purpose
- Privacy principles
A set of shared values governing the privacy protection of personally identifiable information (PII) when processed in information and communication technology systems
- Privacy risk
Any risk of informational harm to data subjects and/or organization(s), including deception, financial injury, health and safety injuries, unwanted intrusion and reputational injuries, where the harm or damage goes beyond economic and tangible losses
- Privacy risk assessment
A process used to identify and evaluate privacy-related risk and its potential effects
- Private blockchain
A blockchain system in which all physical and digital assets are owned by one entity, group or permissioned participant
- Private branch exchange (PBX)
A telephone exchange owned by a private business as opposed to a common carrier or telephone company
- Private cloud
An on- or off-premises cloud environment in which a specific enterprise controls all infrastructure resources
- Private key
A mathematical key (kept secret by the holder) used to create digital signatures and, depending on the algorithm, decrypt messages or files encrypted for confidentiality with the corresponding public key
- Private key cryptosystems
A cryptosystem that involves secret, private keys. The keys are also known as "symmetric ciphers" because the same key both encrypts message plaintext from the sender and decrypts resulting ciphertext for a recipient.
See Symmetric cipher
- Privilege
The level of trust with which a system object is imbued
- Privileged access management (PAM)
An access control mechanism that uses a combination of people, processes and technology to safeguard identities with special access or capabilities beyond regular users
- Privileged access management systems
Solutions that help control, secure, manage and monitor privileged access to critical assets
- Privileged user
Any user account with greater than basic access privileges. Typically, these accounts have elevated or increased privileges with more rights than a standard user account.
- Probability
A mathematical-driven measure of the possibility of a specific outcome as a ratio of all possible outcomes
- Probability distribution
For a discrete random variable, a listing of all possible distinct outcomes and their probabilities of occurring. Because all possible outcomes are listed, the sum of the probabilities must add up to 1.0.
- Probe
The act of inspecting a network or system to find weak spots
- Problem
In IT, the unknown underlying cause of one or more incidents
- Problem escalation procedure
The process of escalating a problem from junior to senior support staff and ultimately to higher levels of management
Scope Notes: Problem escalation procedure is often used in help desk management when an unresolved problem is escalated up the chain of command until it is solved.
- Procedure
A document containing a detailed description of the steps necessary to perform specific operations in conformance with applicable standards. Procedures are defined as parts of processes.
- Process
Generally, a collection of activities influenced by the enterprise’s policies and procedures that takes inputs from a number of sources, (including other processes), manipulates the inputs and produces outputs (ISACA)
Scope Notes: Processes have clear business reasons for existing, accountable owners, clear roles and responsibilities around the execution of the process and the means to measure performance.
A set of interrelated activities that transform inputs into outputs to achieve a given purpose (CMMI)
See Process element
- Process action team
A team with responsibility for developing and implementing process-improvement activities for an organization
See Process group
- Process architecture
The ordering, interfaces, interdependencies and other relationships among the process elements in a standard process or standard processes
- Process capability
A recorded range of expected results that can be achieved by following a process
- Process description
A record for a specific process. Process descriptions may be documents, embedded or automated steps or instructions in a robot, component, system, tool, or graphical representations, etc.
- Process element
The fundamental unit of a process that cannot be further broken down
- Process goals
A statement describing the desired outcome of a process
Scope Notes: An outcome can be an artifact, a significant change of a state or a significant capability improvement of other processes.
COBIT 5 perspective
- Process group
The people or team who hold a process role and are responsible for developing, deploying and updating the organization's process assets
See Process role
- Process improvement
Tasks and activities planned, performed and used to improve an organization's process capability and performance to achieve business objectives more effectively
See Organization’s business objectives
- Process improvement objectives
A set of measurement objectives established to focus process improvement in a specific, measurable way that improves performance to achieve an organization’s business objectives and build or improve capability
See Measurement and performance objective, Organization’s business objectives and Quantitative objective
- Process improvement plan
A process improvement plan records the objectives, activities, resources, oversight, schedules, and associated risks to improve processes
- Processing
Any operation or set of operations performed on personal data or on sets of personal data, whether or not by automated means, such as collecting, recording, organizing, structuring, storing, adapting or altering, retrieving, consulting, using, disclosing (by transmission, dissemination or otherwise making available), aligning or combining, restricting, erasing or destructing
Scope Notes: In the context of privacy (e.g., GDPR)
- Processing PII
Operation or set of operations performed on personally identifiable information (PII). Examples of processing operations of PII include, but are not limited to, the collection, storage, alteration, retrieval, consultation, disclosure, anonymization, pseudonymization, dissemination or otherwise making available, deletion or destruction of PII.
- Process maturity assessment (PAM)
A subjective assessment technique derived from the Software Engineering Institute (SEI) Capability Maturity Model Integration (CMMI) concepts and developed as a COBIT management tool. It provides management with a profile of how well-developed the IT management processes are.
Scope Notes: It enables management to easily place itself on a scale and appreciate what is required if improved performance is needed. It is used to set targets, raise awareness, capture broad consensus, identify improvements and positively motivate change.
- Process maturity attribute
The different aspects of a process covered in an assurance initiative
- Process measurement
Activities performed to collect information and assign numeric values related to the activities, steps and outputs of following a process. This information is analyzed to determine the effectiveness and efficiency of a process.
See Measurement and Process performance
- Process monitoring
This context focuses on evaluating process adherence and performance improvement. This can be done within a single organization or included in the teaming relationship between an acquiring organization and a supplier organization. An acquiring organization typically conducts appraisals to monitor supplier process implementation, and results can serve as input toward:
Tailoring contract monitoring or process monitoring activities
Deciding incentive/award fees
Developing and keeping updated risk and opportunity management plans
- Processor (Data)
A natural or legal person, public authority, agency or other body that processes personal data on behalf of the controller
- Processor (IT) (IT)
See Central processing unit (CPU).
- Process owner
The person or team responsible for developing, updating or following a process. An organization or project can have multiple owners at different levels of responsibility for:
An organization’s set of standard processes
Project-specific and project-defined processes
- Process performance
A measure of results achieved by following a process. Process performance may be characterized by both process measures (e.g., effort, cycle time and defect removal efficiency) and solution measures (e.g., reliability, defect density and response time).
See Business performance
- Process performance baseline
A record and description of historical process performance resulting from following a defined process, which can include central tendency, e.g., mean, medium, mode, variation, and reflects how the process is being performed. Process performance baselines can be used as benchmarks for comparing actual process performance to expected process performance and can be used in process performance models to predict future process performance.
See Process performance and Process performance model
- Process performance model
A predictive analytical tool that identifies the controllable factors and describes the relationships between measurable attributes of one or more processes, subprocesses, process elements, or work products
See Process performance baseline and Quality and process performance objectives
- Process role
A description of the roles of people who develop, use, or follow a process in an organization. This role is typically recorded in a process description or related artifact, e.g., a roles and responsibility table or matrix. People in these roles provide objective evidence OE showing and explaining their roles and responsibilities and how they participate in the processes.
- Product component
A work product that is a building block of the product or solution. Product components can be integrated to produce the final product or solution. There can be multiple levels of components.
- Production program
Program used to process live or actual data that were received as input into the production environment
- Production software
Software being used and executed to support normal and authorized organizational operations
Scope Notes: Production software is to be distinguished from test software, which is being developed or modified, but has not yet been authorized for use by management.
- Product life cycle
A representation of the set of steps or activities, consisting of phases, that begins at conception of a product or service and ends when the product or service is no longer available for use. For example, a product life cycle could consist of the following phases:
Concept and vision
Feasibility
Design/development
Production
Delivery
Phaseout, retirement or sunset.
Organizations can produce multiple products or services for multiple customers, and so may define multiple product life cycles. These life cycles may be adapted from published literature for use in an organization.
- Product line
A group of products:
Sharing a common, managed set of features
Satisfying specific needs of a selected market or mission
Developed from a common set of core assets in a prescribed way
- Professional competence
Proven level of ability, often linked to qualifications issued by relevant professional bodies and compliance with their standards and codes of practice.
- Professional judgement
The application of relevant knowledge and experience in making informed decisions about the courses of action that are appropriate in the circumstances of the IS audit and assurance engagement
- Professional skepticism
An attitude that includes a questioning mind and a critical assessment of audit evidence
Scope Notes: Source: American Institute of Certified Public Accountants (AICPA) AU 230.07
- Professional standards
Refers to standards issued by ISACA. The term may extend to related guidelines and techniques that assist the professional in implementing and complying with authoritative pronouncements of ISACA. In certain instances, standards of other professional organizations may be considered, depending on the circumstances and their relevance and appropriateness.
- Profiling
The automated processing of personal data to evaluate or make a decision about an individual. Any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyze or predict aspects concerning that natural person's performance at work, economic situation, health, personal preferences, interests, reliability, behavior, location or movements
- Program (IT) (IT)
A sequence of instructions suitable for processing. Processing may include the use of an assembler, compiler, interpreter or another translator to prepare the program for execution. The instructions may include statements and necessary declarations.
(ISO) To design, write, and test programs
(ANSI) In programming languages, a set of one or more interrelated modules capable of being executed
Loosely, a routine
Loosely, to write a routine
- Program (Project Management)
A structured grouping of interdependent projects that is both necessary and sufficient to achieve a desired business outcome and create value. These projects could include, but are not limited to, changes in the nature of the business, business processes and the work performed by people as well as the competencies required to carry out the work, the enabling technology and the organizational structure.
- Program and project management office (PMO)
The function responsible for supporting program and project managers, and gathering, assessing and reporting information about the conduct of their programs and constituent projects
- Program Evaluation and Review Technique (PERT)
A project management technique used in the planning and control of system projects
- Program flowchart
Shows the sequence of instructions in a single program or subroutine
Scope Notes: The symbols used in program flowcharts should be the internationally accepted standard. Program flowcharts should be updated when necessary.
- Programmable read-only memory (PROM)
A chip that can be programmed using a PROM programming device. It can be programmed only once. It cannot be erased and reprogrammed. Each of its bit locations is a fusible link. An unprogrammed PROM has all links closed, establishing a known state of each bit. Programming the chip consists of sending an electrical current of a specified size through each link that is to be changed to the alternate state. This causes the fuse to blow, opening that link.
- Programming language
A language used to express computer programs
Source: IEEE
See Computer language, High-level language and Low-level language.
- Program narrative
Provides a detailed explanation of program flowcharts, including control points and any external input
- Project
A structured set of activities concerned with delivering a defined capability (one that is necessary but not sufficient to achieve a required business outcome) to the enterprise based on an agreed-upon schedule and budget (ISACA)
A managed set of interrelated activities and resources, including people, that delivers one or more solutions to a customer or end user. A project typically has an intended beginning (project startup) and end and may be continuous. Projects typically operate according to a plan and set of requirements. The term “project” includes where and how the work gets done—whether developing a product, providing a service, performing an organizational function, acquiring and managing suppliers, etc. Work in support of a project is sometimes performed by workgroups. The operational parameters of workgroups can vary based on objectives and should therefore be clearly defined. Workgroups can operate as a project, if designated accordingly. (CMMI)
See Process role and Organizational and in-scope projects.
- Project management officer (PMO)
The individual responsible for the implementation of a specified initiative for supporting the project management role and advancing the discipline of project management
- Project ownership risk
The risk that information and technology (I&T) projects fail to meet objectives through lack of accountability and commitment
- Project plan
A management document describing the project approach. The plan typically describes work to be done, resources required, methods to be used, configuration management and quality assurance procedures to be followed, schedules to be met, project organization, etc. Project in this context is a generic term. Some projects may also need integration plans, security plans, test plans, quality assurance plans, etc. (ISACA)
Source: NIST
See Documentation plan, Software development plan, Test plan and Software engineering.
A plan that provides the basis for performing and controlling project activities and addresses commitments to the customer. A project plan is based on estimating the attributes of work products and tasks, determining the resources needed, negotiating commitments, producing a schedule and identifying and analyzing risks. Iterating through these activities can be necessary to establish the project plan. (CMMI)
- Project portfolio
The set of projects owned by a company
Scope Notes: It usually includes the main guidelines relative to each project, including objectives, costs, time lines and other information specific to the project.
- Project risk
A failed IT project that poses a significant risk to an enterprise, manifesting as lost market share, failure to seize new opportunities or other adverse impacts on customers, shareholders and staff
- Project startup
Initial time period when a project begins
See Project
- Project team
Group of people responsible for a project whose terms of reference may include the development, acquisition, implementation or maintenance of an application system
Scope Notes: The project team members may include line management, operational line staff, external contractors and IS auditors.
- Promiscuous mode
Allows the network interface to capture all network traffic irrespective of the hardware device to which the packet is addressed
- Prompt engineering
In generative artificial intelligence (AI), the process of providing instructions to guide a model toward generating the desired output. Also known as prompting.
- Proof of elapsed time (PoET)
A consensus mechanism algorithm often used on permissioned blockchain networks to randomly decide the next block publisher
- Proof of importance (PoI)
A variation of proof of stake that takes into consideration the role of validators and shareholders in the blockchain operation
- Proof of stake (PoS)
Proof of stake is a type of consensus algorithm by which a cryptocurrency blockchain network aims to achieve distributed consensus. In PoS consensus, the creator of the next block of data is chosen via several combinations of random selection and wealth or age (i.e., the stake) within the blockchain. With PoS, miners can mine or validate block transactions based on amount of cryptocurrency a miner holds. PoS was created as an alternative to PoW, which requires large amounts of energy. PoS gives mining power based on the percentage of cryptocurrency held by a miner. It is seen as less risky in terms of network attacks and security and used only for public blockchains.
- Proof of work (PoW)
PoW is conducted through miners (participants who keep the blockchain running by providing computing resources) who are competing to solve a cryptographic problem (i.e., hash puzzle). The PoW algorithm is used to confirm transactions and produce new blocks which are added to the chain. With PoW, miners compete against each other to complete transactions on the network and get rewarded. The computational work required to accomplish this is fairly (and usually increasingly) difficult for miners to perform, but easy for the network to verify. As difficulty increases over time, the amount of computational power, and hence, energy consumption, grows. Bitcoin is the first widespread application use of PoW. PoW is applicable to public blockchains.
- Protection domain
The area of the system that the intrusion detection system (IDS) is meant to monitor and protect
- Protective measure
A measure intended to achieve adequate risk reduction
- Protocol
The rules by which a network operates and controls the flow and priority of transmissions
- Protocol code
Cryptographically secure code prescribing strict adherence to the design and functioning of blockchains/distributed networks. This code can only be expanded or modified with approval from the network consensus mechanism.
- Protocol converter
Hardware devices, such as asynchronous and synchronous transmissions, that convert between two different types of transmission
- Protocol stack
A set of utilities that implements a particular network protocol
Scope Notes: For instance, in Windows machines a Transmission Control Protocol/Internet Protocol (TCP/IP) stack consists of TCP/IP software, sockets software and hardware driver software.
- Prototyping
The process of quickly putting together a working model (a prototype) to test various aspects of a design, illustrate ideas or features and gather early user feedback. Prototyping uses programmed simulation techniques to represent a model of the final system to the user for advisement and critique. The emphasis is on end-user screens and reports. Internal controls are not a priority item since this is only a model.
- Provisioning
Allocating resources for cloud computing infrastructure or instance
- Proxy (sensitive attributes)
An attribute used as a stand-in for a sensitive attribute
- Proxy server
A server that acts on behalf of a user
Scope Notes: Typical proxies accept a connection from a user, make a decision as to whether the user or client IP address is permitted to use the proxy, perhaps perform additional authentication, and complete a connection to a remote destination on behalf of the user.
- Pseudocode
A combination of programming language and natural language used to express a software design. If used, it is usually the last document produced prior to writing the source code.
- Pseudonymization
The processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person
- Public blockchain
A blockchain system in which physical and digital assets are decentralized, zero-trust based and hosted/maintained on ephemeral networks and nodes
- Public cloud
A cloud environment in which resources are shared between enterprises and individuals
- Public key
In an asymmetric cryptographic scheme, the key that may be widely published to enable the operation of the scheme
- Public key cryptosystem
A cryptosystem that combines a widely distributed public key and a closely held, protected private key. A message that is encrypted by the public key can only be decrypted by the mathematically related counterpart private key. Conversely, only the public key can decrypt data that was encrypted by its corresponding private key.
See Asymmetric cipher
- Public key encryption
A cryptographic system that uses two keys: a public key, which is known to everyone, and a private or secret key, which is only known to the recipient of the message
See also Asymmetric key
- Public key infrastructure (PKI)
A series of processes and technologies for the association of cryptographic keys with the entity to whom those keys were issued
- Public switched telephone network (PSTN)
A communications system that sets up a dedicated channel (or circuit) between two points for the duration of the transmission
- Purple team
A cooperative engagement where the red team simulates attacks and exploits while the blue team actively defends against them, allowing for real-time feedback, analysis and evaluation of defensive measures, detection capabilities, incident response processes and overall security controls. The purpose of a purple team is to improve the enterprise’s security posture by enhancing communication and collaboration between the red and blue teams.
- Purpose limitation
A process where data are collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes
- P value
The probability, under the assumption of no effect or no difference (the null hypothesis), of obtaining a result equal to or more extreme than what was actually observed
- Python
A scripting programming language created in 1994 that is popular for data science
Q
- QA
The acronym for quality assurance
- QC
The acronym for quality control
- Qualitative risk analysis
An approach based on expert opinion, judgment, intuition and experience
- Quality
A term that means being fit for purpose (and achieving intended value)
Scope Notes: COBIT 5 perspective
- Quality and process performance objectives
Quantitative objectives and performance requirements for solution quality and process performance. These objectives include the use of statistical and quantitative analysis on the related data.
See Measurement and performance objectives
- Quality assurance (QA)
A planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements (ISO/IEC 24765)
- Quality assurance, software
A planned and systematic pattern of all actions necessary to provide adequate confidence that an item or product conforms to established technical requirements
A set of activities designed to evaluate the process by which products are developed or manufactured
- Quality attribute
A property of a solution by which affected stakeholders will judge its quality. Quality attributes are nonfunctional, significantly influence architecture and characterized by one or more measures.
Scope Notes: Examples include availability, maintainability, modifiability, reliability, responsiveness, scalability, security, timeliness, throughput and usability.
- Quality control
The operational techniques and procedures used to achieve quality requirements
- Quality management system (QMS)
A system that outlines the policies and procedures necessary to improve and control the various processes that will ultimately lead to improved enterprise performance
- Quantile, quartile
When a set of sorted values is divided into groups that each have the same number of values (for example, if the values are divided into two groups at the median), each group is known as a quantile. If values are divided into four groups, they are called quartiles, which is a common way to divide values for discussion and analysis purposes. If there are five groups, they are called quintiles, and so forth.
- Quantitatively managed process
A defined process evaluated and controlled using statistical and other quantitative techniques. A quantitatively managed process is necessary at the Practice Group Level 4 in the CMMI Practice Areas.
- Quantitative management
A type of project management that uses quantitative techniques to understand actual or predicted process performance relative to quality and process performance objectives, variation and corrective action needed to meet the objectives
- Quantitative objective
A desired target value expressed using measures
See Measure, Process improvement objectives and Quality and process performance objectives
- Quantitative risk analysis
An approach that is based on a calculation of a risk’s likelihood and impact using numerical and statistical techniques
- Question answering
Systems that retrieve answers to user-posed questions using a variety of natural language processing (NLP), information retrieval and reasoning techniques
- Queue
A group of items that is waiting to be serviced or processed
- Quick ship
A recovery solution provided by recovery and/or hardware vendors that includes a pre-established contract to deliver hardware resources within a specified number amount of hours after a disaster occurs
Scope Notes: The quick ship solution usually provides enterprises with the ability to recover within 72 hours.
R
- R
An open-source programming language and environment for statistical computing and graph generation available for Linux, Windows and Mac
- RACI chart
A matrix that illustrates who is Responsible, Accountable, Consulted and Informed within an organizational framework
- RACI model
A method to define and depict roles and responsibilities
- Radio-wave interference
The superposition of two or more radio waves resulting in a different radio-wave pattern that is more difficult to intercept and decode properly
- RAM
Random-access memory
- Random-access memory (RAM)
A type of primary computer memory. RAM is volatile, and data is lost with power loss.
- Random forest
An ensemble approach to finding the decision tree that best fits the training data by creating many decision trees and then determining the average one. The random part of the term refers to building each of the decision trees from a random selection of features; the forest refers to the set of decision trees.
- Randomness
An important concept, also called entropy, in many cryptographic implementations. It is used to create keys, generate initialization vectors (i.e., random values that seed or initialize an algorithm), generate nonces (i.e., single-use, disposable values) and supply padding (i.e., additional data completing a block of fixed length).
- Range check
A measurement that ensures that data fall within a predetermined range
- Rank (ordinality)
The ordinal position of a class in a machine-learning problem that categorizes classes from highest to lowest
- Ransomware
Malware that restricts access to the compromised system until a ransom demand is satisfied
- Ransomware detectors
Tools used to detect ransomware
- Rapid application development (RAD)
A well-defined methodology that enables enterprises to develop strategically important systems faster, while reducing development costs and maintaining quality by using a series of proven application development techniques
- Rapid elasticity
The ability to quickly increase or reduce the amount of resources utilized by a cloud computing instance or infrastructure
- Rapid prototyping
A structured software requirements discovery technique that emphasizes generating prototypes early in the development process to permit early feedback and analysis in support of that process. Contrasts with incremental development, spiral model and waterfall model.
See Prototyping.
- Rater
A human who provides labels in examples. Sometimes called an annotator.
- Read-only memory (ROM)
A type of primary computer memory. ROM is nonvolatile, and data stored there survives power loss.
- Real-time analysis
Analysis that is performed on a continuous basis, with results gained in time to alter the run-time system
- Real-time database activity monitoring solutions
Solutions that capture database query activity in the present time
- Real-time processing
A fast-response (immediate response) online system that obtains data from an activity or a physical process, performs computations and returns a response rapidly enough to affect (i.e., control) the outcome of the activity or process, for example in a process control application. Contrasts with batch processing.
- Reasonable assurance
A level of comfort short of a guarantee, but considered adequate given the costs of the control and the likely benefits achieved
- Reasonableness check
A measurement that compares data to predefined reasonability limits or occurrence rates established for that data
- Recall
A metric for classification models that answers the following question: Out of all the possible positive labels, how many did the model correctly identify?
- Recipient
A natural or legal person, public authority, agency or other body to which personal data are disclosed, whether a third party or not. However, public authorities that may receive personal data in the framework of a particular inquiry in accordance with state law are not regarded as recipients; the processing of those data by those public authorities should be in compliance with the applicable data protection rules, according to the purposes of the processing.
- Reciprocal agreement
An emergency processing agreement between two or more enterprises with similar equipment or applications
Scope Notes: Typically, participants in a reciprocal agreement promise to provide processing time to each other when an emergency arises.
- Record
A collection of related information that is treated as a unit. Separate fields within the record are used for processing of the information.
- Record, screen and report layouts
Layouts that provide information regarding the type of record, its size and the type of data contained in the record (record layouts), or that describe what information is provided and necessary for input (screen and report layouts)
- Recovery
The phase in the incident response plan that ensures that affected systems or services are restored to a condition specified in the service delivery objectives (SDOs) or business continuity plan (BCP)
- Recovery action
A response or task executed to recover from a disruption in operations according to a written procedure
- Recovery point objective (RPO)
The earliest point in time that is acceptable to recover data, determined based on the acceptable data loss in case of a disruption in operations . The RPO effectively quantifies the permissible amount of data loss in case of interruption.
- Recovery strategy
An approach by an enterprise that will ensure its recovery and continuity in the face of a disaster or other major outage
Scope Notes: Plans and methodologies are determined by the enterprise's strategy. There may be more than one methodology or solution for an enterprise's strategy. Examples of methodologies and solutions include: contracting for a hot site or cold site, building an internal hot site or cold site, identifying an alternate work area, a consortium or reciprocal agreement, contracting for mobile recovery or crate and ship, and many others.
- Recovery testing
A test to check the system’s ability to recover after a software or hardware failure
- Recovery time objective (RTO)
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
- Rectification
A data subject’s ability to have any incorrect personal data be corrected
- Recurrent neural network
A neural network that is intentionally run multiple times, where parts of each run feed into the next run
- Redo logs
Files maintained by a system, primarily a database management system (DBMS), for the purpose of reapplying changes following an error or outage recovery
- Red team
A group of skilled professionals who simulate real-world cyberattacks, security breaches and physical security compromises to evaluate the effectiveness of an enterprise’s defenses. The red team identifies vulnerabilities, weaknesses and potential exploits in the enterprise’s systems, networks, applications and physical security controls. They often use the same tactics, techniques and procedures as real-world adversaries to provide a realistic testing environment.
- Redundancy check
A test that detects transmission errors by appending calculated bits onto the end of each segment of data
- Redundant array of inexpensive disks (RAID)
A storage configuration that uses hardware or software to write information to multiple disks to improve performance and fault-tolerant capabilities and/or save large files simultaneously
- Redundant site
A recovery strategy involving the duplication of key IT components, including data or key business processes, whereby fast recovery can take place
- Reengineering
A process involving the extraction of components from existing systems and restructuring these components to develop new systems or to enhance the efficiency of existing systems
Scope Notes: Existing software systems can be modernized to prolong their functionality. An example is a software code translator that can take an existing hierarchical database system and transpose it to a relational database system. Computer-aided software engineering (CASE) includes a source-code reengineering feature.
- Reference model
A defined model describing practices and activities that is used for improving performance or as a benchmark for measuring capability or maturity
- Refraction
A form of signal degradation due to an RF signal being bent, typically when the signal passes through a medium of different density. This can decrease data rates and cause retransmissions.
- Registered interpreter
A role that works across the spoken languages of all appraisal stakeholders to simultaneously, clearly and accurately interpret and communicate appraisal information. Interpreters must be registered with ISACA. The interpreter’s job is to translate the content of original source information into the spoken language of the Appraisal Team Leader and the appraisal team. Certified CMMI Lead Appraisers may fulfill the role of Registered Interpreter and ATM if approved by ISACA, and consistent with the MDD requirements.
- Registered ports
Ports 1024 through 49151, which are listed by the IANA and can be used on most systems by ordinary user processes or programs executed by ordinary users
- Registration authority (RA)
An authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it
- Regression analysis and testing
A software verification and validation (V&V) task to determine the extent of V&V analysis and testing that must be repeated when changes are made to any previously examined software products
Source: IEEE
See Testing, regression.
- Regression analysis tools
Tools that provide the information to allow for examination of the relationship between two or more variables
- Regression model
A type of model that outputs continuous (typically floating-point) values
- Regression testing
A testing technique used to retest earlier program abends or logical errors that occurred during the initial testing phase
- Regularization
A set of techniques that control a model’s complexity during training by penalizing features or weights to prevent overfitting the training data
- Regulation
Rules or laws defined and enforced by an authority to regulate conduct
- Regulatory requirements
Rules or laws that regulate conduct and that the enterprise must obey to be compliant
- Reidentification
The process of discovering the individual to whom deidentified data belong by matching anonymous data with publicly available information or auxiliary data
- Reinforcement learning
A class of machine-learning algorithms in which the process is not given specific goals to meet but, as it makes decisions, is instead given indications of whether it is doing well or not
- Rekeying
The process of changing cryptographic keys. Periodic rekeying limits the amount of data encrypted by a single key.
- Relational database
A database organization method that links files together as required. Relationships between files are created by comparing data, such as account numbers and names. A relational system can take any two or more files and generate a new file from the records that meet the matching criteria. Routine queries often involve more than one data file, e.g., a customer file and an order file can be linked to answer a question that relates to information in both files, such as the names of the customers that purchased a particular product. Contrasts with network database and flat file.
- Relational database management system (RDBMS)
A relational database management system (RDBMS) is a collection of programs and capabilities that enable IT teams and others to create, update, administer and interact with a relational database
Scope Notes: Database management systems have evolved from hierarchical to network to relational models. Today, the most widely accepted database model is the relational model. The relational model has three major aspects or conditions of the populatioin. An Oracle database is a collection of data that is treated as a unit.
- Release
The formal notification and distribution of an approved version
See Version.
- Release candidate (RC)
A software version that can possibly be released to end users
- Release-candidate push solutions
Solutions that push release-candidate software
- Relevance risk
The risk that the correct information may not get to the correct recipients at the correct time to allow the correct action to be taken or the correct decisions to be made
- Relevant audit evidence
Audit evidence that pertains to the audit objectives and has a logical relationship to the findings and conclusions it is used to support
- Relevant information
Relating to controls, information that tells the evaluator something meaningful about the operation of the underlying controls or control component. Information that directly confirms the operation of controls is most relevant. Information that relates indirectly to the operation of controls can also be relevant, but is less relevant than direct information.
Scope Notes: Refer to COBIT 5 information quality goals.
- Relevant sampling factor
A sampling factor that describes aspects or conditions that affect the way work is performed in the organizational unit. This effect results in work being performed differently, by either a project team or an organizational function.
See Sampling factors.
- Reliable audit evidence
Audit evidence that, in the IS auditor's opinion, is valid, factual, objective and supportable
- Reliable information
Information that is accurate, verifiable and from an objective source
Scope Notes: Refer to COBIT 5 information quality goals.
- Remediation
Actions taken to mitigate or eliminate a vulnerability after it has been identified and assessed
- Remote access
An authorized user’s ability to access a computer or network from anywhere through a network connection
- Remote access controllers
Hardware and software solutions for remote systems management
- Remote access service (RAS)
Any combination of hardware and software that enables remote access to tools or information that typically reside on a network of IT devices
Scope Notes: Originally coined by Microsoft when referring to its built-in NT remote access tools, RAS was a service provided by Windows NT that allowed most of the assets that would be available on a network to be accessed over a modem link. Over the years, many vendors have provided hardware and software solutions to create remote access to various types of networked information. In fact, most modern routers include a basic RAS capability that can be enabled for any dial-up interface.
- Remote Authentication Dial-in User Service (RADIUS)
A type of service providing an authentication and accounting system often used for dial-up and remote access security
- Remote job entry (RJE)
The transmission of job control language (JCL) and batches of transactions from a remote terminal location
- Remote Procedure Call (RPC)
The traditional Internet service protocol widely used for many years on UNIX-based operating systems and supported by the Internet Engineering Task Force (IETF) that allows a program on one computer to execute a program on another (e.g., a server)
Scope Notes: The primary benefit derived from using a remote procedure call is that a system developer need not develop specific procedures for the targeted computer system. For example, in a client-server arrangement, the client program sends a message to the server with appropriate arguments, and the server returns a message containing the results of the program executed. Common Object Request Broker Architecture (CORBA) and Distributed Component Object Model (DCOM) are two newer object-oriented methods for related RPC functionality.
- Removable media
Any type of storage device that can be removed from the system while it is running
- Repeaters
A physical layer device that regenerates and propagates electrical signals between two network segments
Scope Notes: Repeaters receive analog or digital signals from a network segment and amplify (regenerate) them to compensate for distortion from transmission loss caused by reduction of signal strength during transmission (i.e., attenuation).
- Replay
The ability to copy a message or stream of messages between two parties and replay (retransmit) them to one or more of the parties
- Replication
In a broad computing sense, the use of redundant software or hardware elements to provide greater availability and fault-tolerant capabilities. In a database context, replication involves the sharing of data between databases to reduce workload among database servers, thereby improving client performance while maintaining consistency across all systems.
- Repository
An enterprise database that stores and organizes data
- Representation
A signed or oral statement issued by management to professionals, in which management declares that a current or future fact (e.g., a process, system, procedure or policy) is or will be in a certain state, to the best of management’s knowledge
- Repudiation
A denial by one of the parties to a transaction of participation in all or part of that transaction, or of the content of a communication related to that transaction
- Reputation risk
The current and prospective effect on earnings and capital arising from negative public opinion
Scope Notes: Reputation risk affects a bank’s ability to establish new relationships or services, or to continue servicing existing relationships. It may expose the bank to litigation, financial loss or a decline in its customer base. A bank’s reputation can be damaged by Internet banking services that are executed poorly or otherwise alienate customers and the public. An Internet bank has a greater reputation risk as compared to a traditional brick-and-mortar bank, because it is easier for its customers to leave for a different bank and since it cannot discuss any problems in person with the customer.
- Request for comments (RFC)
A document approved by the Internet Engineering Task Force (IETF) and assigned a unique number once published
Scope Notes: If the RFC gains enough interest, it may evolve into an Internet standard.
- Request for proposal (RFP)
A document distributed to software vendors requesting them to submit a proposal to develop or provide a software product
- Requirement
A condition or capability needed by a user to solve a problem or achieve an objective
A condition or capability that must be met or possessed by a system or system component to satisfy a contract, standard, specification or other formally imposed document
A documented representation of a condition or capability as in definition 1 or 2
See Design requirement, Functional requirement, Implementation requirement, Interface requirement, Performance requirement and Physical requirement.
(ISACA)
A recorded description of an aspect, performance or capability required by a user or customer (CMMI)
- Requirements analysis
The process of studying user needs to arrive at a definition of a system, hardware or software requirements
The process of studying and refining system, hardware or software requirements (ISACA)
Source: IEEE
See Prototyping and Software engineering.
Tasks that determine the needs or conditions to meet a new or altered solution, accounting for multiple perspectives, e.g., balancing stakeholder needs and constraints, the allocation of requirements to components, or breaking down complex requirements to lower-level requirements (CMMI)
- Requirements definition
A technique in which affected user groups explain what is needed from a system
Scope Notes: Some of these are business-, regulatory- or security-related requirements as well as development-related requirements.
- Requirements elicitation
A technique for gathering knowledge or information to proactively identify and record customer and end-user needs
- Requirements management
The process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. It is a continuous process throughout a project.
- Requirements phase
The period in the software life cycle during which requirements, such as functional and performance capabilities for a software product, are defined and documented
Source: IEEE
- Requirements review
A process or meeting during which the requirements for a system, hardware item or software item are presented to project personnel, managers, users, customers or other interested parties for comment or approval. Types include system requirements review and software requirements review. Contrasts with code review, design review, formal qualification review and test readiness review.
Source: IEEE
- Requirements traceability
A record of the relationships between requirements and related requirements, implementations and verifications
See Bidirectional traceability.
- Residual risk
The remaining risk after management has implemented a risk response
- Residual security risk
The remaining probability of an event occurring and its consequence that still exists after a risk response has been implemented
- Resilience
The ability of a system or network to resist failure or to recover quickly from any disruption, usually with minimal recognizable effect
- Resource
Any enterprise asset that can help the organization achieve its objectives
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Resource management
The coordinated activities taken by an enterprise to plan, schedule, and allocate resources to meet its business objectives
Scope Notes: In the International Standard, the term "control" is used as a synonym for "measure." (ISO/IEC Guide 73:2002)
One of the governance objectives. Entails recognizing risk; assessing the impact and likelihood of that risk; and developing strategies, such as avoiding the risk, reducing the negative effect of the risk and/or transferring the risk, to manage it within the context of the enterprise's risk appetite.
Scope Notes: COBIT 5 perspective
- Resource optimization
One of the governance objectives. Involves effective, efficient and responsible use of all resources—human, financial, equipment, facilities etc.
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Resource pooling
In cloud computing, the ability to combine computing resources and services to serve multiple customers at once
- Responsible (RACI)
In a Responsible, Accountable, Consulted, Informed (RACI) chart, refers to the person who must ensure that activities are completed successfully
- Restricted access window (RAW)
A set access window in which a device can receive communications from other devices
- Restriction of processing
The marking of stored personal data with the aim of limiting their processing in the future
- Return on investment (ROI)
A measure of operating performance and efficiency, computed in its simplest form by dividing net income by the total investment over the period being considered (ISACA)
The ratio of benefit of a process or solution improvement to implementation costs to determine the value (CMMI)
- Return-oriented programming attacks
An exploit technique in which the attacker uses control of the call stack to indirectly execute cherry-picked machine instructions immediately prior to the return instruction in subroutines within the existing program code
- Reverse engineering
A software engineering technique whereby existing application system code can be redesigned and coded using computer-aided software engineering (CASE) technology
- Review
A process or meeting during which a work product or set of work products is presented to project personnel, managers, users, customers or other interested parties for comment or approval. Types include code review, design review, formal qualification review, requirements review and test readiness review. Contrasts with audit and inspection.
Source: IEEE
See Static analysis.
- Ring configuration
A type of network architecture in which all stations (nodes) are connected to a multi-station access unit (MSAU) that physically resembles a star-type topology. This configuration is used in either token ring or fiber distributed data interface (FDDI) networks.
Scope Notes: A ring configuration is created when MSAUs are linked together in forming a network. Messages in the network are sent in a deterministic fashion from sender to receiver via a small frame, referred to as a token ring. To send a message, a sender obtains the token with the right priority as the token travels around the ring, with each receiving node reading those messages addressed to it.
- Ring topology
A type of local area network (LAN) architecture in which the cable forms a loop, with stations attached at intervals around the loop
Scope Notes: In ring topology, signals transmitted around the ring take the form of messages. Each station receives the messages and each station determines, on the basis of an address, whether to accept or process a given message. After receiving a message, each station also acts as a repeater, retransmitting the message at its original signal strength.
- Risk
The combination of the likelihood of an event and its impact (ISACA)
A potential uncertain event that may be harmful or may negatively impact objective achievement (CMMI)
- Risk acceptance
A decision to accept a risk, made according to the risk appetite and risk tolerance set by senior management, where the enterprise can assume the risk and absorb any losses
- Risk aggregation
The process of integrating risk assessments at a corporate level to obtain a complete view of the overall risk for the enterprise
- Risk analysis
A process by which the frequency and magnitude of IT risk scenarios are estimated
The initial steps of risk management: analyzing the value of assets to the business, identifying threats to those assets and evaluating how vulnerable each asset is to those threats
Scope Notes: Risk analysis often involves an evaluation of the probable frequency of a particular event, as well as the probable impact of that event.
- Risk appetite
The amount of risk, on a broad level, that an entity is willing to accept in pursuit of its mission
- Risk assessment
A process used to identify and evaluate risk and its potential effects
Scope Notes: Risk assessments are used to identify those items or areas that present the highest risk, vulnerability or exposure to the enterprise for inclusion in the IS annual audit plan. Risk assessments are also used to manage project delivery risk and project benefit risk.
- Risk avoidance
The process for systematically avoiding risk, constituting one approach to managing risk
- Risk awareness program
A program that creates an understanding of risk, risk factors and the various types of risk that an enterprise faces
- Risk capacity
The objective magnitude or amount of loss that an enterprise can tolerate without risking its continued existence
- Risk culture
An organization's shared values and beliefs that govern attitudes toward risk-taking, care and integrity, and determine how openly risk and losses are reported and discussed
- Risk evaluation
The process of comparing estimated risk against given risk criteria to determine the significance of the risk (ISO/IEC Guide 73:2002)
- Risk factor
A condition that can influence the frequency, the magnitude and ultimately the business impact of IT-related risk scenarios
- Risk gap
A gap that exists when the acceptable level of risk and the current state of risk are different
- Risk identification
The process for determining and documenting the risk an enterprise faces
- Risk indicator
A metric capable of showing that the enterprise may realize a risk.
- Risk management
The coordinated activities to direct and control an enterprise with regard to risk
Scope Notes: In the International Standard, the term "control" is used as a synonym for "measure." (ISO/IEC Guide 73:2002)
One of the governance objectives. Entails recognizing risk; assessing the impact and likelihood of that risk; and developing strategies, such as avoiding the risk, reducing the negative effect of the risk and/or transferring the risk, to manage it within the context of the enterprise's risk appetite
Scope Notes: COBIT 5 perspective
- Risk map
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
- Risk mitigation
The management of risk through the use of countermeasures and controls (ISACA)
A set of planned activities that, if performed, may minimize the probability or impact of the risk (CMMI)
- Risk owner
The person in whom the organization has invested the authority and accountability for making risk-based decisions and who owns the loss associated with a realized risk scenario
Scope Notes: The risk owner may not be responsible for the implementation of risk treatment.
- Risk portfolio view
A method to identify interdependencies and interconnections among risk, as well as the effect of risk responses on multiple types of risk
A method to estimate the aggregate impact of multiple types of risk (e.g., cascading and coincidental threat types or scenarios, or risk concentration or correlation across silos) and the potential effect of risk response across multiple types of risk
- Risk reduction
The implementation of controls or countermeasures to reduce the likelihood or impact of a risk to a level within the organization’s risk tolerance
- Risk register
A list of risk scenarios that have been identified, analyzed and prioritized
- Risk response
Any combination of risk avoidance, risk acceptance, risk sharing or transfer, or risk mitigation that leads to a situation in which as much future residual risk (i.e., current risk with the risk response defined and implemented) as possible (usually depending on budgets available) falls within risk appetite limits
- Risk scenario
A tangible and assessable representation of risk
Scope Notes: One of the key information items needed to identify, analyze and respond to risk (COBIT 2019 objective APO12)
- Risk scope
The selection of items included in the risk activities, based on understanding the full risk universe and then down-selecting to the specific part of the enterprise to which the risk activities will be applied
- Risk sharing
Scope Notes: See Risk transfer
- Risk source
An element that, alone or in combination, has the potential to give rise to risk
- Risk statement
A description of the current conditions that may lead to a loss, along with a description of the potential loss
Source: Software Engineering Institute (SEI)
Scope Notes: For a risk to be understandable, it must be expressed clearly. Such a treatment must include a description of the current conditions that may lead to the loss; and a description of the loss.
- Risk taxonomy
A scheme for classifying sources and categories of risk that provides a common language for discussing and communicating risk to stakeholders
- Risk tolerance
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
- Risk transfer
The process of assigning risk to another enterprise, usually through the purchase of an insurance policy or by outsourcing the service
Scope Notes: Also known as risk sharing
- Risk treatment
The process of selection and implementation of measures to modify risk (ISO/IEC Guide 73:2002)
- Risk universe
An enterprise's overall conception of risk, which encompasses the overall risk environment, defines the areas that risk management activities will address and provides a structure for information and technology (I&T)-related risk management
- Robotics
The design, development, and operation of autonomous or semiautonomous machines capable of performing tasks in the physical world
- Robustness
The degree to which a software system or component can function correctly in the presence of invalid inputs or stressful environmental conditions
See Software reliability.
- ROI
See Return on Investment.
- ROM
See Read-only memory.
- Root cause
The underlying source of a defect or problem
- Root cause analysis
A process of diagnosis to establish the origins of events that can be used for learning from consequences, typically from errors and problems
- Rootkit
A software suite designed to aid an intruder in gaining unauthorized administrative access to a computer system
- Root mean squared error
The root mean square error (RMSE) measures the average difference between a statistical model's predicted values and the actual values. RMSE is one of two main performance indicators for regression models.
- Rotating standby
A failover process in which there are two nodes (as in idle standby but without priority)
Scope Notes: The node that enters the cluster first owns the resource group, and the second will join as a standby node.
- Rounding down
A method of fraud involving a computer code that instructs the computer to remove small amounts of money from authorized transactions by rounding down to the nearest whole-value denomination and rerouting the rounded-off amount to the perpetrator’s account
- Router
A networking device that can send (route) data packets from one local area network (LAN) or wide area network (WAN) to another, based on addressing at the network layer (Layer 3) in the open systems interconnection (OSI) model
Scope Notes: Networks connected by routers can use different or similar networking protocols. Routers usually are capable of filtering packets based on parameters such as source addresses, destination addresses, protocols and network applications (ports).
- Routine
A subprogram that is called by other programs and subprograms
Scope Notes: This term is defined differently in various programming languages.
Source: IEEE
See Module.
- RS-232 interface
An interface between data terminal equipment and data communications equipment employing serial binary data interchange
- RSA (RSA)
A public key cryptosystem developed by R. Rivest, A. Shamir and L. Adleman used for both encryption and digital signatures
Scope Notes: The RSA has two different keys, the public encryption key and the secret decryption key. The strength of the RSA depends on the difficulty of the prime number factorization. For applications with high-level security, the number of the decryption key bits should be greater than 512.
- Ruby
A scripting language that first appeared in 1996. Ruby is popular in the data science community, but not as popular as Python, which has more specialized libraries available for data science tasks.
- Rulebase
The list of rules and/or guidance used to analyze event data
- Run instructions
Computer operating instructions that detail the step-by-step processes that are to occur so an application system can be properly executed. These instructions also identify how to address problems that occur during processing.
- Run-to-run totals
Aggregate numbers that provide evidence that a program processed all input data and that it processed the data correctly
S
- Safeguard
A practice, procedure or mechanism that reduces risk
- Safety
A condition of protection from harm. The two key domains of safety are workplace environment and functional safety.
- Salami technique
A method of computer fraud involving a computer code that instructs the computer to slice off small amounts of money from authorized transactions and reroute these amounts to the perpetrator’s account
- Sample eligible (SE)
A project or organizational support function in an OU that is suitable to be considered for the randomly generated sample (RGS) because the project is performing process activities that are believed to align to model practices
- Sampling factors
Context that reflects potential differences in processes and the way work is performed
See Relevant sampling factor.
- Sampling risk
The probability that an IT auditor has reached an incorrect conclusion because an audit sample, rather than the entire population, was tested
Scope Notes: While sampling risk can be reduced to an acceptably low level by using an appropriate sample size and selection method, it can never be eliminated.
- Sampling stratification
The process of dividing a population into subpopulations with similar characteristics explicitly defined, so that each sampling unit can belong to only one stratum
- Sandboxing
Using an isolated environment for testing purposes
- SAS
A commercial statistical software suite that includes a programming language also known as SAS
- Scalar
A quantity that has magnitude but no direction in space, such as volume or temperature
- Scaling
A commonly used practice in feature engineering to tame the range of values of a feature to match the scale of other features in the data set
- Scattering
Signal degradation that occurs when RF signal increases in size due to reflection or passing through objects
- Schedule risk
The risk that information and technology (I&T) projects will take longer than expected
- Scheduling
A method used in the information processing facility (IPF) to determine and establish the sequence of computer job processing
- Scope creep
Uncontrolled changes in a project’s scope. Also called requirement creep.
Scope Notes: Scope creep can occur when the scope of a project is not properly defined, documented and controlled. Typically, the scope increase consists of either new products or new features of already approved products. Hence, the project team drifts away from its original purpose. Because of the tendency to focus on only one dimension of a project, scope creep can also result in a project team overrunning its original budget and schedule. For example, scope creep can be a result of poor change control, lack of proper identification of which products and features are required to bring about the achievement of project objectives or a weak project manager or executive sponsor.
- Scoping process
A process for identifying the boundary or extent to which a process, procedure, certification, contract, etc., applies
- Scoring
The part of a recommendation system that provides a value or ranking for each item produced by the candidate generation phase
- Screening router
A router configured to permit or deny traffic based on a set of permission rules installed by the administrator
- Scripting
Generally, the use of a computer language to write a program or script that can be run directly, with no need to compile it to binary code, as with languages such as Python, Java and C
- S curve
A type of curve that shows the growth of a variable in terms of another variable, often expressed as units of time. The S curve is often mentioned when someone predicts that a rising value will eventually level off.
- Secure development life cycle
The inclusion of security in the software development life cycle
- Secure Electronic Transaction (SET)
A standard that ensures credit card and associated payment order information travel safely and securely between the various involved parties on the Internet
- Secure multiparty computation (SMP or MPC)
Data operation in which multiple parties transact jointly while maintaining privacy of their individual and/or several input(s) during processing
- Secure Multipurpose Internet Mail Extensions (S/MIME)
Cryptographic security services for electronic messaging applications: authentication, message integrity and nonrepudiation of origin (using digital signatures); and privacy and data security (using encryption) to provide a consistent way to send and receive MIME data (RFC 2311)
- Secure Shell (SSH)
Network protocol that uses cryptography to secure communication, remote command line login and remote command execution between two networked computers
- Secure Sockets Layer (SSL)
A protocol used to transmit private documents through the Internet
Scope Notes: The SSL protocol uses a private key to encrypt the data to be transferred through the SSL connection.
- Security/transaction risk
The current and prospective risk to earnings and capital arising from fraud, error and the inability to deliver products or services, maintain a competitive position and manage information
Scope Notes: Security risk is evident in each product and service offered, and it encompasses product development and delivery, transaction processing, systems development, computing systems, complexity of products and services and the internal control environment. A high level of security risk may exist with Internet banking products, particularly if those lines of business are not adequately planned, implemented and monitored.
- Security administrator
The person responsible for implementing, monitoring and enforcing security rules established and authorized by management
- Security as a Service (SecaaS)
The next generation of managed security services dedicated to the delivery over the Internet of specialized information-security services
- Security awareness
The extent to which every member of an enterprise and every other individual who potentially has access to the enterprise's information understand:
Security and the levels of security appropriate to the enterprise
The importance of security and consequences of a lack of security
Their individual responsibilities regarding security (and act accordingly)
Scope Notes: This definition is based on the definition for IT security awareness as defined in Implementation Guide: How to Make Your Organization Aware of IT Security, European Security Forum (ESF), United Kingdom, 1993.
- Security awareness campaign
A predefined, organized number of actions aimed at improving the security awareness of a special target audience about a specific security problem. Each security awareness program consists of several security awareness campaigns.
- Security awareness coordinator
The individuals responsible for creating and maintaining the security awareness program and coordinating the different campaigns and efforts of the various groups involved in the program. They are also responsible for ensuring that all materials are prepared, advocates/trainers are trained, campaigns are scheduled, events are publicized and the program as a whole moves forward.
- Security awareness program
A clearly and formally defined plan, structured approach and set of related activities and procedures with the objective of realizing and maintaining a security-aware culture
Scope Notes: This definition clearly states that the goal is to realize and maintain a security-aware culture, i.e., attaining and sustaining security awareness at all times. This implies that a security awareness program is not a one-time effort but a continuous process.
- Security forum
Responsible for information security governance within the enterprise
Scope Notes: A security forum can be part of an existing management body. Because information security is a business responsibility shared by all members of the executive management team, the forum needs to involve executives from all significant parts of the enterprise. Typically, a security forum has the following tasks and responsibilities:
Defining a security strategy in line with the business strategy
Identifying security requirements
Establishing a security policy
Creating an overall security program or plan
Approving major initiatives to enhance information security
Reviewing and monitoring information security incidents
Monitoring significant changes in the exposure of information assets to major threats
- Security incident
A series of unexpected events that involves an attack or series of attacks (compromise and/or breach of security) at one or more sites. A security incident typically includes an estimation of its level of impact. A limited number of impact levels are defined and, for each, the specific actions required and the people who need to be notified are identified.
- Security incident response team (SIRT)
Cross-functional team responsible for addressing security incidents
- Security management
The process of establishing and maintaining security for a computer or network system
Scope Notes: The stages of the process of security management include prevention of security problems, detection of intrusions and investigation of intrusions and resolution. In network management, the stages comprise controlling access to the network and resources, finding intrusions, identifying entry points for intruders and repairing or otherwise closing those avenues of access.
- Security metrics
A standard of measurement used in management of security-related activities
- Security model
An engineering model informed by policies that specify how a system will enforce security
- Security perimeter
The boundary that defines the area of security concern and security policy coverage
- Security policy
A high-level document representing an enterprise’s information security philosophy and commitment
- Security procedures
The formal documentation of operational steps and processes that specify how security goals and objectives established in the security policy and standards are to be achieved
- Security resilience
The ability to prepare for and adapt to changing conditions and withstand and recover rapidly from security disruptions, including cybersecurity. Resilience includes the capability to withstand and recover from deliberate attack, accidents or naturally occurring threats, vulnerabilities or other security events
- Security reviews and evaluations
The coverage or inclusion of security needs, constraints, efforts and activities in a continuous manner over time throughout the life cycle of a solution or when triggered by a security event. These reviews and evaluations focus on identifying and addressing, and when possible, preventing the most critical and urgent security issues first. Security events, trends, potential threats and disruptions can also trigger reviews or evaluations.
- Security software
Software used to administer security, which usually includes authentication of users, access granting according to predefined rules, monitoring and reporting functions
- Security standards
Practices, directives, guidelines, principles or baselines that state the required work and focus areas of current relevance and concern and are a translation of issues already mentioned in the security policy
- Security steps or actions
The terms used interchangeably to indicate the same intent or meaning as “security measures” in the CMMI Product Suite®. Most security standards and frameworks refer to “security measures,” where measures are not measurements (a noun) but rather steps or actions (a verb).
- Security testing
Assurance that the modified or new system includes appropriate controls and does not introduce any security holes that might compromise other systems or misuses of the system or its information
- Security threats
Any circumstance or event with the potential to adversely impact organizational operations including mission, functions, assets, personnel, processes, systems or brand reputation through unauthorized access, destruction, disclosure, modification of information or denial of service. Source: CMMC without redundancies
- Security token
Digital assets or tokens created to represent a quantity of a specified investment, including rights to ownership, payment of a specific sum under a contract, entitlement to future profits, etc.
- Security vulnerabilities
Weakness in a solution, information system, system security procedure, internal control or implementation that could be exploited by a threat source
Source: CMMC/NIST SP 800-30 Rev 1
- Segmentation
See Network segmentation
- Segregation/separation of duties (SoD)
A basic internal control that prevents or detects errors and irregularities by assigning the responsibility for initiating and recording transactions and the custody of assets to separate individuals
Scope Notes: Segregation/separation of duties is commonly used in large IT organizations so that no single person is in a position to introduce fraudulent or malicious code without detection.
- Segregation of duty (SoD)
See Segregation/separation of duties (SoD).
- Semiconductor
Substrate for integrated circuit that regulates electric current and often made primarily of silicon
- Senior management
The person or persons who provide the policy and overall guidance for the process but do not typically provide the direct day-to-day monitoring and controlling of the process. A senior manager has authority to direct the allocation or reallocation of resources in support of organizational process improvement effectiveness. A senior manager can be any manager who satisfies this description, including the CEO of the organization.
- Sensitive attribute
A human attribute that may be given special consideration for legal, ethical, social or personal reasons
- Sensitive PII
Category of personally identifiable information (PII), either whose nature is sensitive, such as those that relate to the PII principal’s most intimate sphere, or that might have a significant impact on the PII principal. It can consist of PII that reveals the racial origin; political opinions or religious or other beliefs; personal data on health, sex life or criminal convictions; and other PII that may be defined as sensitive.
- Sensitivity
A measure of the impact that improper disclosure of information may have on an enterprise
- Sensor
A device or component that gathers information critical to an IoT application and converts it to data
- Sentiment analysis
The process of automatically determining the emotional tone, such as positive, negative, or neutral, expressed in a piece of text (e.g., opinions, reviews, social media posts) using natural language processing (NLP) and machine learning (ML) models trained on labeled data
- Separation of duty (SoD)
See Segregation/separation of duties (SoD).
- Sequence check
Verification that the control number follows sequentially and any control numbers out of sequence are rejected or noted in an exception report for further research
Scope Notes: Can be alpha or numeric and usually utilizes a key field
- Sequence-to-sequence model
A model that processes an input sequence to generate a new output sequence (e.g., transforming the text of an input in one language to generate an output in a different language)
- Sequential file
A computer file storage format in which one record follows another
Scope Notes: Records can be accessed sequentially only.
- Serial correlation
The relationship between a variable and a lagged version of itself over various time intervals. Repeating patterns often show serial correlation when the level of a variable affects its future level.
- Server
A high-speed computer in a network shared by multiple users that holds the programs and data shared by all users
- Service
An activity that provides a promised exchange of value between a service provider and customer, product or work product. Services do not always produce tangible or storable products; in such instances, the service itself is the deliverable.
See Solution.
- Service bureau
A computer facility that provides data processing services to clients on a continual basis
- Service catalogue
Structured information on all IT services available to customers
Scope Notes: COBIT® 5 perspective
- Service delivery objective (SDO)
The level of services directly related to the business needs that must be reached during the alternate process mode until the normal situation is restored
- Service desk
The point of contact within the IT organization for users of IT services
- Service level agreement (SLA)
An agreement, preferably documented, between a service provider and the customer(s)/user(s) that defines minimum performance targets for a service and how they will be measured (ISACA)
A contract between a service provider, either internal or external, and the customer or end user that defines the level of service expected from the service provider. SLAs are output-based in that their purpose is specifically to define what the customer will receive. SLAs do not define how the service itself is provided or delivered. (CMMI®)
- Service-oriented architecture (SOA)
A cloud-based library of proven, functional software applets that can be connected together to become a useful online application
- Service provider
An organization supplying services to one or more (internal or external) customers.
- Service set identifier (SSID)
A 32-character unique identifier attached to the header of packets sent over a wireless local area network (WLAN) that acts as a password when a mobile device tries to connect to the base station subsystem (BSS)
Scope Notes: The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because an SSID can be sniffed in plaintext from a packet, it does not supply any security to the network. An SSID is also referred to as a network name because it is a name that identifies a wireless network.
- Service system
An integrated and interdependent combination of components that satisfy stakeholder requirements
- Service system component
A process, work product, person, consumable, customer or other resource required for a service system to deliver value that can include components owned by the customer or a third party
- Service system consumable
An item used by the service system that ceases to be available or becomes permanently changed by its use during the delivery of a service
- Service user
The organization using the outsourced service
- Servlet
A Java applet or a small program that runs within a web server environment
Scope Notes: A Java servlet is similar to a common gateway interface (CGI) program, but unlike a CGI program, once started, it stays in memory and can fulfill multiple requests, thereby saving server execution time and speeding up the services.
- Session border controller (SBC)
Security features for Voice-over IP (VoIP) traffic similar to that provided by firewalls
Scope Notes: SBCs can be configured to filter specific VoIP protocols, monitor for denial-of-service (DOS) attacks and provide network address and protocol translation features.
- Shadow IT
The use of systems, services, hardware or software on an enterprise network or within an enterprise’s infrastructure without proper vetting and approval from the IT or cybersecurity department
- Shall
An indication of a method requirement and hence not a tailoring option when used in any statement in the Appraisal Method Definition Document (MDD). In the MDD, “shall” may be used interchangeably with the word “must.”
See Must
- Shared responsibility model (SRM)
A cloud security framework that dictates the security obligations of a cloud service provider and its users to ensure accountability
- Shared vision
A common understanding of guiding principles, including mission, objectives, expected behavior, values and final outcomes developed and used by a project or work group
- Shell
Command line scripting languages, such as Perl and Python. Popular for data wrangling, Linux-based shell tools (which are either included with or easily available for Mac and Windows machines), include grep, diff, split, comm, head and tail.
- Shell programming
A script written for the shell or command line interpreter of an operating system and often considered a simple domain-specific programming language
Scope Notes: Typical operations performed by shell scripts include file manipulation, program execution and printing text. Usually, shell script refers to scripts written for a UNIX shell, while command.com (DOS) and cmd.exe (Windows) command line scripts are usually called batch files. Many shell script interpreters also act as a command line interface such as the various UNIX shells, Windows PowerShell or the MS-DOS command.com. Others, such as AppleScript, add scripting capability to computing environments lacking a command line interface. Other examples of programming languages primarily intended for shell scripting include digital command language (DCL) and job control language (JCL).
- Sidechain
A separate blockchain that links data entries or transactions to a primary blockchain, allowing operations both from and to the sidechain
- Signal-to-noise ratio (SNR)
A measurement of the level of a desired signal to background noise documented in decibels. Ratios greater than 1 dB indicates the signal exceeds noise by that level. Signal power less than 1 dB represents an unusable signal.
- Signature verification solutions
Secure solutions used to validate the identity of an individual
- Significant deficiency
A deficiency or a combination of deficiencies in internal control that is less severe than a material weakness yet important enough to merit attention by those responsible for oversight
Scope Notes: A material weakness is a significant deficiency or a combination of significant deficiencies that result in more than a remote likelihood of an undesirable event(s) not being prevented or detected.
- Sign-on procedure
The procedure performed by a user to gain access to an application or operating system
Scope Notes: If the users are properly identified and authenticated by the system’s security, they will be able to access the software.
- Simple fail-over
A fail-over process in which the primary node owns the resource group
Scope Notes: The backup node runs a noncritical application (e.g., a development or test environment) and takes over the critical resource group but not vice versa.
- Simple Mail Transport Protocol (SMTP)
The standard electronic mail (email) protocol on the Internet
- Simple Object Access Protocol (SOAP)
A platform-independent formatted protocol based on extensible markup language (XML) enabling applications to communicate with each other over the Internet
Scope Notes: Use of SOAP may provide a significant security risk to web application operations because use of SOAP piggybacks onto a web-based document object model and is transmitted via HyperText Transfer Protocol (HTTP) (port 80) to penetrate server firewalls, which are usually configured to accept port 80 and port 21 File Transfer Protocol (FTP) requests. Web-based document models define how objects on a web page are associated with each other and how they can be manipulated while being sent from a server to a client browser. SOAP typically relies on XML for presentation formatting and also adds appropriate HTTP-based headers to send it. SOAP forms the foundation layer of the web services stack, providing a basic messaging framework on which more abstract layers can build. There are several different types of messaging patterns in SOAP, but by far the most common is the Remote Procedure Call (RPC) pattern in which one network node (the client) sends a request message to another node (the server), and the server immediately sends a response message to the client.
- Simple Text-Oriented Message Protocol (STOMP)
A plaintext protocol with semantics similar to HTTP designed for messaging applications
- Single factor authentication (SFA)
Authentication process that requires only the user ID and password to grant access
- Single point of failure
A resource whose loss will result in the loss of service or production
- Single sign-on (SSO)
A single point authentication system used by multiple systems and applications
- Size
Number of items or volume of work effort or work products being produced, such as activities, pages, requirements, number of components, solutions. Use size as a basis for scoping when producing estimates and plans.
- Skill
The learned capacity to achieve predetermined results
Scope Notes: COBIT® 5 and COBIT® 2019 perspective
- Slack time (float)
Time in the project schedule, the use of which does not affect the project’s critical path; the minimum time to complete the project based on the estimated time for each project segment and their relationships
Scope Notes: Slack time is commonly referred to as "float" and generally is not "owned" by either party of the transaction.
- Small form factor
An engineering design that allows device components to use as little physical space as possible while still remaining functional
- SMART (SMART)
Specific, measurable, attainable, realistic and timely, generally used to describe appropriately set goals
- Smart card
A small electronic device that contains electronic memory and possibly an embedded integrated circuit
Scope Notes: Smart cards can be used for a number of purposes including the storage of digital certificates or digital cash, or they can be used as a token to authenticate users.
- Smart contract
Software (computer code) that automatically executes transactions and/or enforces agreements based on the fulfillment of the terms of the agreement by leveraging decentralized ledger technology that uses public validation to ensure correct and reliable performance according to agreed rules
- Sniff
The act of capturing network packets, including those not necessarily destined for the computer running the sniffing software
- Sniffers
Programs or hardware that monitor Internet traffic in real time
- Sniffing
The process by which data traversing a network are captured or monitored
- Social engineering
An attack based on deceiving users or administrators at the target site into revealing confidential or sensitive information
- Social IoT (SIoT)
A network of IoT-enabled devices that work together to provide a service or feature
- Soft fork
A software upgrade that is backward compatible with previous versions of the blockchain software. Thus, a soft fork does not require all blockchain nodes to upgrade to maintain functionality.
- Software
Programs, procedures, rules and any associated documentation pertaining to the operation of a system. It contrasts with hardware.
See Application software, Operating system, System software and Utility software.
- Software as a Service (SaaS)
Offers the capability to use the provider’s applications running on cloud infrastructure. The applications are accessible from various client devices through a thin client interface, such as a web browser (e.g., web-based email).
- Software as a service, platform as a service and infrastructure as a service (SPI)
The acronym used to refer to the three cloud delivery models
- Software-defined access (SD-Access)
An intent-based networking technology that enables reduction of manual work, faster resolution of performance issues and better security. It is an evolution of SDN.
- Software-defined networking (SDN)
Microsegmentation network infrastructure technology that separates the management and data planes. Typically used on core distribution networks, SDN aids performance management, policy administration and bandwidth on demand.
- Software-defined wide area network (SD-WAN)
An extension of SDN across a WAN. It focuses on routing and traffic prioritization.
- Software development kit (SDK)
A group of utilities and libraries provided by a manufacturer or open source community to develop software for a particular framework or device
- Software development plan
The project plan for the development of a software product. It contrasts with software development process and software life cycle.
- Software development process
The process by which user needs are translated into a software product. The process involves translating user needs into software requirements, transforming the software requirements into design, implementing the design in code, testing the code and sometimes installing and reviewing the software for operational activities. Note that these activities may overlap or be performed iteratively.
See Incremental development, Rapid prototyping, Spiral model and Waterfall model.
- Software distribution solutions
Applications that build software installation packages and distribute them to end users
- Software documentation
Technical data or information, including computer listings and printouts in human-readable form, that describe or specify the design or details, explain the capabilities or provide operating instructions for using the software to obtain desired results from a software system. Types of software documentation include:
Project planning documents, i.e., software development plans and software verification and validation (V&V) plans
Software requirements and design specifications
Test documentation
Customer-deliverable documentation
Program source code
Representation of software solutions implemented in firmware
Reports, e.g., review, audit and project status
Data, i.e., defect detection and test
It contrasts with software item.
See: Specification; Specification, requirements; Specification, design; Software design description; Test plan, Test report, User's guide.
- Software element analysis
See Software review.
- Software engineering
The application of a systematic, disciplined, quantifiable approach to the development, operation and maintenance of software, i.e., the application of engineering to software
See Project plan, Requirements analysis, Architectural design, Structured design, System safety, Testing and Configuration management.
- Software engineering environment
The hardware, software and firmware used to perform a software engineering effort. Typical elements include computer equipment, compilers, assemblers, operating systems, debuggers, simulators, emulators, test tools, documentation tools and database management systems.
- Software life cycle
Period of time, beginning when a software product is conceived and ending when the product is no longer available for use. The software life cycle is typically broken into phases, denoting activities, such as requirements, design, programming, testing, installation, operation and maintenance. It contrasts with software development process.
See waterfall model.
- Software reliability
The probability that software will not cause the failure of a system for a specified time under specified conditions. The probability is a function of the inputs to and use of the system in the software. The inputs to the system determine whether existing faults, if any, are encountered.
The ability of a program to perform its required functions accurately and reproducibly under stated conditions for a specified period of time
- Software review
An evaluation of software elements to ascertain discrepancies from planned results and to recommend improvement. This evaluation follows a formal process. It is synonymous with software audit.
See Code audit, Code inspection, Code review, Code walk-through, Design review, Specification analysis and Static analysis.
- Solution
A product, product component, service, service system, service system component or delivered or acquired product or service including relevant safety or security components
- Solution component
A work product that is a building block of the solution. Solution components are integrated to produce the solution. There can be multiple levels of solution components.
See Product component
- Solution stack
A collection of hardware, software and services that work simultaneously to provide an enterprise or user with a final product
- SOPs
Standard operating procedures
- Source code
Computer instructions and data definitions documented in a form suitable for input to an assembler, compiler or other translator
- Source code compare program
Assurance that the software being audited is the correct version of the software by providing a meaningful listing of any discrepancies between the two versions of the program
- Source document
The form used to record data that have been captured
Scope Notes: A source document may be a piece of paper, a turnaround document or an image displayed for online data input.
- Source lines of code (SLOC)
Often a deriver of single-point software-size estimations
- Source program
A computer program that must be compiled, assembled or otherwise translated to be executed by a computer. It contrasts with object program.
See Source code.
- Source routing specification
A transmission technique where the sender of a packet can specify the route that packet should follow through the network
- Spaghetti code
Program source code written without a coherent structure. It implies the excessive use of GOTO instructions and contrasts with structured programming.
- Spam
Computer-generated messages sent as unsolicited advertising
- Spanning port
A port configured on a network switch to receive copies of traffic from one or more other ports on the switch
- Spatiotemporal data
Time series data that also include geographic identifiers, such as latitude-longitude pairs
- Spear phishing
An attack designed to entice specific individuals or groups to reveal important information. Social engineering techniques are used to masquerade as a trusted party to obtain important information, such as passwords from the victim.
- Special cause of variation
A cause of process variation that is a result of a known factor that results in a nonrandom distribution of output. It is also referred to as “exceptional” or “assignable” cause variation and is temporary in nature and not an inherent part of the process.
See Common cause of variation
- Specification, requirements
A specification that documents the requirements of a system or system component. It typically includes functional requirements, performance requirements, interface requirements, design requirements (attributes and constraints), development (coding) standards, etc. This contrasts with "requirement."
Source: NIST
- Specification tree
A diagram that depicts all the specifications for a given system and shows their relationship to one another
Source: IEEE
- Spiral model
A model of the software development process in which the constituent activities (typically requirements analysis, preliminary and detailed design, coding, integration and testing) are performed iteratively until the software is complete. It is synonymous with "evolutionary model." Spiral model contrasts with "incremental development," "rapid prototyping" and "waterfall model."
- Split data systems
A condition in which each of an enterprise’s regional locations maintains its own financial and operational data while sharing processing with an enterprise-wide, centralized database
Scope Notes: Split data systems permit easy sharing of data while maintaining a certain level of autonomy.
- Split domain name system (DNS)
An implementation of DNS that is intended to secure responses provided by the server such that different responses are given to internal vs. external users
- Split knowledge/split key
A security technique in which two or more entities separately hold data items that individually convey no knowledge of the information that results from combining the items. This is a condition under which two or more entities separately have key components that individually convey no knowledge of the plaintext key that will be produced when the key components are combined in the cryptographic module.
- Spoofing
The act of faking the sending address of a transmission in order to gain illegal entry into a secure system
- SPOOL (simultaneous peripheral operations online) (SPOOL)
An automated function that can be based on an operating system or application in which electronic data transmitted between storage areas are spooled or stored until the receiving device or storage area is prepared and able to receive the information
Scope Notes: Spool allows more efficient electronic data transfers from one device to another by permitting higher speed sending functions, such as internal memory, to continue with other operations instead of waiting on the slower speed receiving device, such as a printer.
- SPSS
A commercial statistical software package used for predictive analysis
- Spyware
Software whose purpose is to monitor a computer user’s actions (e.g., websites visited) and report these actions to a third party without the informed consent of that machine’s owner or legitimate user
- SQL (SQL)
The ISO standard query language used by application programmers and end users to access relational databases. Variations of this popular language are often available for data storage systems that are not strictly relational.
- SQL injection
An attack that results from the failure of an application to appropriately validate input. When specially crafted user-controlled input consisting of SQL syntax is used without proper validation as part of SQL queries, it is possible to glean information from the database in ways not envisaged during application design.
Source: MITRE
- Stablecoins
A type of cryptocurrency that is tied to an outside currency, such as the US dollar, to stabilize its value
- Stable process
The state in which special causes of process variation have been removed from the process and prevented from recurring. In a stable process, only common cause variation of the process remains.
See Capable process, Common cause of variation and Special cause of variation
- Stage-gate
A point in time when a program is reviewed and a decision is made to commit expenditures to the next set of activities on a program or project, to stop the work altogether or to put a hold on execution of further work
- Stakeholder
Anyone who has a responsibility for, an expectation of or some other interest in an enterprise
Scope Notes: Examples include shareholders, users, government, suppliers, customers and the public.
- Standard
A mandatory requirement, code of practice or specification approved by a recognized external standards organization, such as the International Organization for Standardization (ISO)
- Standard deviation
The square root of a variance and a common way to indicate how different a particular measurement is from the mean
- Standardized score
A score that transforms a raw score into units of standard deviation above or below the mean. This translates the scores so they can be evaluated in reference to the standard normal distribution.
- Standard normal distribution
A normal distribution with a mean of 0 and a standard deviation of 1. When graphed, it is a bell-shaped curve centered around the y axis, where x=0.
- Standard operating procedures (SOP)
Written procedures that prescribe and describe the steps to be taken in normal and defined conditions and that are necessary to ensure control of production and processes
- Standing data
Permanent reference data used in transaction processing
Scope Notes: These data are changed infrequently, e.g., a product price file or a name and address file.
- Star topology
A type of local area network (LAN) architecture that utilizes a central controller to which all nodes are directly connected
Scope Notes: With star topology, all transmissions from one station to another pass through the central controller, which is responsible for managing and controlling all communication. The central controller often acts as a switching device.
- Stata
A commercial statistical software package; not to be confused with "strata"
- State
A condition or mode of existence in which a system, component or simulation may be, e.g., the preflight state of an aircraft navigation program or input state of a given channel
- State diagram
A diagram that depicts the states that a system or component can assume and shows the events or circumstances that cause or result from a change from one state to another. It is synonymous with "state graph."
See State-transition table
- Stateful inspection
A firewall architecture that tracks each connection traversing all interfaces of the firewall and makes sure they are valid
- Statement of objectives (SOO)
The recorded top-level objectives of an acquisition or procurement used to guide discussions and negotiations between the acquirer and supplier
- Statement of work (SOW)
A description of work to be performed and their respective groupings of tasks or activities
See Memorandum of agreement
- Static analysis
An analysis of information that occurs on a noncontinuous basis; also known as interval-based analysis
- Statistical and other quantitative techniques
A term used to acknowledge that while statistical techniques are required, other quantitative techniques can also be used effectively. Analytic techniques allow parameters describing a task or work product to be quantified.
Use statistical and other quantitative techniques to:
Analyze variation in process performance
Monitor the selected processes that help achieve quality and process performance objectives
This term is used at levels 4 and 5, where practices describe how statistical and other quantitative techniques are used to improve understanding of work groups and organizational processes and performance.
See Statistical techniques and Quantitative management
- Statistical process control
Statistical analysis that identifies common and special causes of process variation and seeks to maintain process performance within limits
See Common cause of variation, Special cause of variation and Statistical techniques
- Statistical sampling
A method of selecting a portion of a population by means of mathematical calculations and probabilities for the purpose of making scientifically and mathematically sound inferences regarding the characteristics of the entire population
- Statistical stratification
A method of selecting a portion of a population by means of mathematical calculations and probabilities for the purpose of making scientifically and mathematically sound inferences regarding the characteristics of the entire population
- Statistical techniques
Mathematical techniques used with the collection, analysis, interpretation and presentation of masses of numerical data to understand process variation and predict process performance. Examples include sampling techniques, analysis of variance, chi-squared tests, regression analysis and process control charts.
- Statutory requirements
Laws created by government institutions
- Storage area networks (SANs)
A variation of a local area network (LAN) that is dedicated for the express purpose of connecting storage devices to servers and other computing devices
Scope Notes: SANs centralize the process for the storage and administration of data.
- Storage device
A unit into which data or programs can be placed, retained and retrieved
See Memory.
- Storage limitation
The principle that personal data must be kept in a form that permits identification of data subjects for no longer than is necessary for the purposes for which the personal data are processed
- Strata, stratified sampling
Sampling technique used to divide the units into homogeneous groups (strata) and draw a simple random sample from each group
- Strategic planning
The process of deciding on the enterprise’s objectives, changes in these objectives, and the policies to govern their acquisition and use
- Strategic risk
The risk associated with the future business plans and strategies of an enterprise
- Strength
A type of preliminary or final finding that is an exemplary or noteworthy implementation of a process that meets the intent and value of a CMMI model practice
- Strengths, weaknesses, opportunities and threats (SWOT)
A combination of an organizational audit listing the enterprise’s strengths and weaknesses and an environmental scan or analysis of external opportunities and threats
- String
A sequence of characters
A linear sequence of entities, such as characters or physical elements
- Structured design
Any disciplined approach to software design that adheres to specified rules based on principles such as modularity, top-down design and stepwise refinement of data; system structure and processing steps
See Data structure centered design, Input-processing-output, Modular decomposition, Object-oriented design, Rapid prototyping, Stepwise refinement, Structured programming, Transaction analysis, Transform analysis, Graphical software specification/design documents, Modular software and Software engineering.
- Structured programming
Any software development technique that includes structured design and results in the development of structured programs
See Structured design.
- Structured Query Language (SQL)
A language used to interrogate and process data in a relational database. Originally developed for IBM mainframes, many implementations have been created for mini- and microcomputer database applications. SQL commands can be used to interactively work with a database or embedded with a programming language to interface with a database.
- Subject access
This is the data subject’s right to obtain from the data controller, on request, certain information relating to the processing of his/her personal data
- Subject access request
Request by data subject to receive a copy of personal data that an enterprise processes, to understand the purpose of said processing, or to understand and/or delimit how the data may be shared by the enterprise
- Subject matter
The specific information subject to an IS auditor’s report and related procedures, which can include things such as the design or operation of internal controls and compliance with privacy practices or standards or specified laws and regulations (area of activity)
- Subprocess
A process that is part of a larger process. Subprocesses can be further decomposed into subprocesses and/or process elements.
See Process, Process description and Process element
- Subprogram
A separately compilable, executable component of a computer program. Note that this term is defined differently in various programming languages.
See Coroutine, Main program, Routine and Subroutine.
- Subroutine
A routine that returns control to the program or subprogram that called it. Note that this term is defined differently in various programming languages.
See Module.
- Subroutine trace
A record of all or selected subroutines or function calls performed during the execution of a computer program and, optionally, the values of parameters passed to and returned by each subroutine or function
- Substantive testing
Obtaining audit evidence on the completeness, accuracy or existence of activities or transactions during the audit period
- Sufficient audit evidence
Audit evidence is sufficient if it is adequate, convincing and would lead another IS auditor to form the same conclusions
- Sufficient evidence
The measure of the quantity of audit evidence, supports all material questions to the audit objective and scope
Scope Notes: See evidence
- Sufficient information
Information is sufficient when evaluators have gathered enough of it to form a reasonable conclusion. For information to be sufficient, however, it must first be suitable.
Scope Notes: Refer to COBIT 5 information quality goals
- Suitable information
Relevant (i.e., fit for its intended purpose), reliable (i.e., accurate, verifiable and from an objective source) and timely (i.e., produced and used in an appropriate time frame) information
Scope Notes: Refer to COBIT 5 information quality goals
- Supervised learning
A type of machine learning algorithm in which a system is taught to classify input into specific, known classes
- Supervisory authority
An independent public authority
- Supervisory control and data acquisition (SCADA)
Systems used to control and monitor industrial and manufacturing processes and utility facilities
- Supplier
An entity having an agreement with an acquirer to design, develop, manufacture, maintain, modify, deliver or supply solutions under terms of an agreement. Examples include individuals, partnerships, companies, corporations, and associations.
See Acquirer
- Supplier deliverable
An item to be provided to an acquirer or other recipient as specified in an agreement. The item can be a document, hardware or software item, service, solution, or any type of work product.
- Supply chain management (SBx)
A concept that allows an enterprise to more effectively and efficiently manage the activities of design, manufacturing, distribution, service and recycling of products and service its customers
- Support software
Software that aids in the development and maintenance of other software, e.g., compilers, loaders and other utilities
- Support vector machine
A supervised learning algorithm used for classification and regressions tasks
- Surge suppressor
Filters out electrical surges and spikes
- Suspense file
A computer file used to maintain information (transactions, payments or other events) until the proper disposition of that information can be determined
Scope Notes: Once the proper disposition of the item is determined, it should be removed from the suspense file and processed in accordance with the proper procedures for that particular transaction. Two examples of items that may be included in a suspense file are receipt of a payment from a source that is not readily identified or data that do not yet have an identified match during migration to a new application.
- Sustainment appraisal
A consistent and reliable assessment method that is a type of benchmark appraisal with reduced sampling. A sustainment appraisal can only be performed if eligibility requirements are met. This includes clear and repeatable process steps that when followed are capable of achieving high accuracy and reliable appraisal results through the collection of objective evidence (OE) from multiple sources. A maturity level (ML) profile or capability level (CL) profile must be produced as part of this appraisal process and allows Appraisal Sponsors to compare an organization’s or project’s process implementation with others. Like other appraisal methods, sustainment appraisals identify opportunities for improving both process implementation and business performance.
- Switches
A data link layer device that enables local area network (LAN) segments to be created and interconnected, giving the added benefit of reducing collision domains in Ethernet-based networks
- Symmetric cipher
An algorithm that encrypts data using a single key. In symmetric cryptographic algorithms, a single key is used for encipherment (encrypting) and decipherment (decrypting).
- Symmetric key encryption
A system in which a different key (or set of keys) is used by each pair of trading partners to ensure that no one else can read their messages. The same key is used for encryption and decryption.
See Private key cryptosystem
- Synchronize (SYN)
A flag set in the initial setup packets to indicate that the communicating parties are synchronizing the sequence numbers used for the data transmission
- Synchronous
A term that means occurring at regular, timed intervals, i.e., timing dependent
- Synchronous transmission
Block-at-a-time data transmission
- Syntax
The structural or grammatical rules that define how symbols in a language are to be combined to form words, phrases, expressions and other allowable constructs
- System
People, machines and methods organized to accomplish a set of specific functions
A composite, at any level of complexity, of personnel, procedures, materials, tools, equipment, facilities and software. The elements of this composite entity are used together in the intended operational or support environment to perform a given task or achieve a specific purpose, support or mission requirement. (DOD)
- System analysis
A systematic investigation of a real or planned system to determine its functions and how they relate to each other and any other system
See Requirements phase
- System design
A process of defining the hardware and software architecture, components, modules, interfaces and data for a system to satisfy specified requirements
See Design phase, Architectural design and Functional design
- System design review
A review conducted to evaluate the manner in which the requirements for a system have been allocated to configuration items, the system engineering process that produced the allocation, the engineering planning for the next phase of the effort, manufacturing considerations and the planning for production engineering
Source: IEEE
See Design review
- System development life cycle (SDLC)
The phases deployed in the development or acquisition of a software system
Scope Notes: SDLC is an approach used to plan, design, develop, test and implement an application system or major modification to an application system. Typical phases of SDLC include the feasibility study, requirements study, requirements definition, detailed design, programming, testing, installation and postimplementation review but not the service delivery or benefits realization activities.
- System documentation
The collection of documents that describe the requirements, capabilities, limitations, design, operation and maintenance of an information processing system
Source: ISO
See Specification, Test documentation and User's guide
- System exit
Special system software features and utilities that allow the user to perform complex system maintenance
Scope Notes: The use of system exits often permits the user to operate outside of the security access control system.
- System flowchart
Graphic representations of the sequence of operations in an information system or program
Scope Notes: Information system flowcharts show how data from source documents flow through the computer to final distribution to users. Symbols used should be the internationally accepted standard. System flowcharts should be updated when necessary.
- System hardening
A process to eliminate as much security risk as possible by removing all nonessential software programs, protocols, services and utilities from the system
- System integration
The progressive linking and testing of system components into a complete system
Source: ISO
See Incremental integration
- System life cycle
The course of developmental changes through which a system passes from its conception to the termination of its use, e.g., the phases and activities associated with the analysis, acquisition, design, development, test, integration, operation, maintenance and modification of a system
See Software life cycle
- System narrative
An overview explanation of system flowcharts, including key control points and system interfaces
- System of internal control
The policies, standards, plans and procedures and organizational structures designed to provide reasonable assurance that enterprise objectives will be achieved and undesired events will be prevented or detected and corrected
Scope Notes: COBIT 5 perspective
- Systems acquisition process
Procedures established to purchase application software, or an upgrade, including evaluation of the supplier's financial stability, track record, resources and references from existing customers
- Systems analysis
The systems development phase in which systems specifications and conceptual designs are developed based on end-user needs and requirements
- Systems engineering
An interdisciplinary approach governing the technical and managerial effort required to transform a set of customer needs, expectations and constraints into solutions and to support solutions throughout their life cycle
- System software
Application-independent software that supports the running of application software
Software designed to facilitate the operation and maintenance of a computer system and its associated programs, e.g., operating systems, assemblers and utilities. This contrasts with application software.
See Support software
- Systems thinking
A means of helping people to see overall structures, patterns and cycles in systems rather than seeing only specific events or elements. It allows the identification of solutions that simultaneously address different problem areas and leverage improvement throughout the wider system.
- System testing
Testing conducted on a complete, integrated system to evaluate the system's compliance with its specified requirements
Scope Notes: System test procedures are typically performed by the system maintenance staff in their development library.
T
- Tableau
A commercial data visualization package often used in data science projects
- Table look-up
Used to ensure that input data agree with predetermined criteria stored in a table
- Tailoring
Developing or adapting a process description or work product according to organizational defined standard guidelines to achieve a result. For example, a project develops its tailored process from the organization’s set of standard processes to meet objectives and constraints within the project environment.
See Organization’s set of standard processes and Process description
- Tailoring guidelines
Organizational guidelines that enable individuals, projects, and organizational functions to appropriately adapt standard processes for their use. Tailoring guidelines may allow additional flexibility when dealing with less critical processes or those that only indirectly affect business objectives.
See Organization’s set of standard processes and Tailoring
- Tangible asset
Any assets that have physical form
- Tape management system (TMS)
A system software tool that logs, monitors and directs computer tape usage
- Taps
Wiring devices that may be inserted into communication links for use with analysis probes, local area network (LAN) analyzers and intrusion detection security systems
- Target
Person or asset selected as the aim of an attack
- Target wake time (TWT)
A set time interval in which a device can receive communications from other devices
- TB
Terabyte
- Tcpdump
A network monitoring and data acquisition tool that performs filter translation, packet acquisition and packet display
- T-distribution
A variation on normal distribution that accounts for the fact that only a sampling of all the possible values is being used instead of all of them
- Technical data package
A set of work products and information used to implement the design, e.g., coding standards, version control information, and engineering drawings
- Technical infrastructure security
Refers to the security of the infrastructure that supports the enterprise resource planning (ERP) networking and telecommunications, operating systems, and databases
- Technical performance
Characteristic of a process or solution generally defined by a functional or technical requirement that is often recorded in a contract or statement of work
- Technology infrastructure
Technology, human resources (HR) and facilities that enable the processing and use of applications
- Technology infrastructure plan
A plan for the technology, human resources and facilities that enable the current and future processing and use of applications
- Technology stack
The underlying elements used to build and run an application
- Telecommunications
Electronic communication by special devices over distances or around devices that preclude direct interpersonal exchange
- Teleprocessing
Using telecommunications facilities for the handling and processing of computerized information
- Telnet
Network protocol used to enable remote access to a server computer
Scope Notes: Commands typed are run on the remote server.
- TensorFlow
A large-scale, distributed, machine-learning platform
- Terabyte
Approximately one-trillion bytes; precisely 240 or 1,099,511,627,776 bytes
See Kilobyte, Megabyte and Gigabyte.
- Terminal
A device, usually equipped with a CRT display and keyboard, used to send and receive information to and from a computer via a communication channel
- Terminal Access Controller Access Control System Plus (TACACS+)
An authentication protocol, often used by remote-access servers
- Terms of reference
A document that confirms a client's and an IS auditor's acceptance of a review assignment
- Test
An activity in which a system or component is executed under specified conditions, the results are observed or recorded and an evaluation is made of some aspect of the system or component
- Testability
The degree to which a system or component facilitates the establishment of test criteria and the performance of tests to determine whether those criteria have been met
The degree to which a requirement is stated in terms that permit establishment of test criteria and performance of tests to determine whether those criteria have been met
See Measurable.
- Test case
Documentation specifying inputs, predicted results and a set of execution conditions for a test item
- Test case generator
A software tool that accepts as input source code, test criteria and specifications or data structure definitions, then uses these inputs to generate test input data and, sometimes determines expected results
Synonymous with test data generator and test generator
- Test data
Simulated transactions that can be used to test processing logic, computations and controls actually programmed in computer applications. Individual programs or an entire system can be tested.
Scope Notes: This technique includes Integrated Test Facilities (ITFs) and Base Case System Evaluations (BCSEs).
- Test design
Documentation specifying the details of the test approach for a software feature or combination of software features and identifying the associated tests
See Testing functional; Cause effect graphing; Boundary value analysis; Equivalence class partitioning; Error guessing; Testing, structural; Branch analysis; Path analysis; Statement coverage; Condition coverage; Decision coverage and Multiple-condition coverage.
- Test documentation
Documentation describing plans for, or results of, the testing of a system or component. Types include test case specification, test incident report, test log, test plan, test procedure and test report.
- Test driver
A software module used to invoke a module under test and, often, provide test inputs, control and monitor execution, and report test results
Synonymous with test harness
- Test generators
Software used to create data for use in the testing of computer programs
- Testing
The examination of a sample from a population to estimate characteristics of the population
In machine learning (ML), evaluating the performance and robustness of models with the aim of assessing the model’s generalization ability and identifying potential issues such as overfitting or underfitting
- Testing, acceptance
Testing conducted to determine whether a system satisfies its acceptance criteria and to enable the customer to determine whether to accept the system. Contrasts with testing, development and testing, operational.
- Testing, alpha
Acceptance testing performed by the customer in a controlled environment at the developer's site. The software is used by the customer in a setting approximating the target environment, with the developer observing and recording errors and usage problems. Source: Pressman.
- Testing, beta
Acceptance testing performed by the customer in a live application of the software, at one or more end-user sites, in an environment not controlled by the developer. Source: Pressman
For medical device software, such use may require an Investigational device exemption [IDE] or Institutional Review Board [IRB] approval.
- Testing, boundary value
A testing technique using input values just below and just above the defined limits of an input domain, and with input values causing outputs to be just below and just above the defined limits of an output domain
See Boundary value analysis and Testing, stress.
- Testing, branch
Testing technique to satisfy coverage criteria that require each possible branch (outcome) to be executed at least once for each decision point. Contrasts with testing, path and testing, statement.
See Branch coverage.
- Testing, compatibility
The process of determining the ability of two or more systems to exchange information. In a situation where the developed software replaces an already working program, an investigation should be conducted to assess possible comparability problems between the new software and other programs or systems.
See Different software system analysis, testing, integration and testing, interface.
- Testing, design based functional
The application of test data derived through functional analysis that is extended to include design functions and requirement functions
Source: NBS
See Testing, functional.
- Testing, development
Testing conducted during the development of a system or component, usually in the development environment, by the developer. Contrasts with testing, acceptance and testing, operational.
- Testing, functional
Testing that ignores the internal mechanism or structure of a system or component and focuses on the outputs generated in response to selected inputs and execution conditions
Testing conducted to evaluate the compliance of a system or component with specified functional requirements and corresponding predicted results
Synonymous with black-box testing and input/output driven testing. Contrasts with testing, structural.
- Testing, integration
An orderly progression of testing in which software elements, hardware elements or both are combined and tested to evaluate their interactions, until the entire system has been integrated
- Testing, interface
Testing to evaluate whether systems or components pass data and control correctly to one another. Contrasts with testing, unit and testing, system.
See Testing, integration.
- Testing, invalid case
A testing technique using erroneous (invalid, abnormal or unexpected) input values or conditions
See Equivalence class partitioning.
- Testing, operational
Testing to evaluate a system or component in its operational environment. Contrasts with testing, development and testing, acceptance.
See Testing, system.
- Testing, parallel
Testing a new or an altered data processing system with the same source data used in another system. The other system is considered as the standard of comparison. Synonymous with parallel run
- Testing, path
Testing to satisfy coverage criterion that each logical path through the program be tested. Often, paths through the program are grouped into a finite set of classes. One path from each class is then tested. Synonymous with path coverage. Contrasts with testing, branch; testing, statement; branch coverage; condition coverage; decision coverage; multiple condition coverage and statement coverage.
- Testing, performance
Functional testing to evaluate the compliance of a system or component with specified performance requirements
- Testing, regression
Rerunning test cases that a program has previously executed correctly to detect errors spawned by changes or corrections made during software development and maintenance
- Testing, special case
A testing technique using input values that seem likely to cause program errors, e.g., 0, 1, NULL and empty string
See Error guessing.
- Testing, statement
Testing to satisfy the criterion that each statement in a program be executed at least once during program testing. Synonymous with statement coverage. Contrasts with testing, branch; testing, path; branch coverage; condition coverage; decision coverage; multiple condition coverage and path coverage.
- Testing, storage
A determination of whether certain processing conditions use more storage (i.e., memory) than estimated
- Testing, stress
Testing to evaluate a system or component at or beyond the limits of its specified requirements. Synonymous with testing, boundary value.
- Testing, system
The process of testing an integrated hardware and software system to verify that the system meets its specified requirements. Such testing may be conducted in the development environment and the target environment.
- Testing, unit
Testing of a module for typographic, syntactic and logical errors; for correct implementation of its design; and for satisfaction of its requirements
Testing to verify the implementation of the design for one software element, e.g., a unit or module, or a collection of software elements
Source: IEEE
Synonymous with component testing.
- Testing, usability
Tests designed to evaluate the machine/user interface. Determines if the communication devices are designed in a manner so that the information displayed is understandable, enabling the operator to correctly interact with the system
- Testing, valid case
A testing technique using valid (normal or expected) input values or conditions
See Equivalence class partitioning.
- Testing, volume
Testing designed to challenge the ability of a system to manage the maximum amount of data over a period of time. This type of testing also evaluates the ability of a system to handle overload situations in an orderly fashion.
- Testing, worst case
Testing that encompasses upper and lower limits and circumstances that pose the greatest chance of finding errors. Synonymous with most appropriate challenge conditions.
See Testing, boundary value; Testing, invalid case; Testing, special case; Testing, stress and Testing, volume.
- Test item
A software item that is the object of testing
- Test log
A chronological record of all relevant details about the execution of a test
- Test phase
The period of time in the software life cycle in which the components of a software product are evaluated and integrated, and the software product is evaluated to determine whether or not requirements have been satisfied
- Test plan
Documentation specifying the scope, approach, resources and schedule of intended testing activities. It identifies test items, the features to be tested, the testing tasks, responsibilities, required resources and any risk requiring contingency planning.
See Test design and Validation protocol.
- Test procedure
A formal document developed from a test plan that presents detailed instructions for the setup, operation and evaluation of the results for each defined test
See Test case.
- Test programs
Programs that are tested and evaluated before approval into the production environment
Scope Notes: Test programs, through a series of change control moves, migrate from the test environment to the production environment and become production programs.
- Test readiness review
A review conducted to evaluate preliminary test results for one or more configuration items; to verify that the test procedures for each configuration item are complete, comply with test plans and descriptions, and satisfy test requirements; and to verify that a project is prepared to proceed to formal testing of the configuration items
A review, as in definition 1, for any hardware or software component
Contrasts with code review, design review, formal qualification review and requirements review
- Test report
A document describing the conduct and results of the testing carried out for a system or system component
- Test scripts
A set of instructions to be performed on a system or program to test functionality and anticipated output
- Test set
The subset of the data set used to test a model after the model has gone through initial vetting by the validation set
- Test types
Test types include:
Checklist test—Copies of the business continuity plan (BCP) are distributed to appropriate personnel for review
Structured walk-through—Identified key personnel walk through the plan to ensure that the plan accurately reflects the enterprise's ability to recover successfully
Simulation test—All operational and support personnel are expected to perform a simulated emergency as a practice session
Parallel test—Critical systems are run at alternate site (hot, cold, warm or reciprocal)
Complete interruption test--Disaster is replicated, normal production is shut down with realtime recovery process
- Text generation
The process of creating new text sequences using generative models capable of generating coherent and contextually relevant text
- Text summarization
The process of automatically generating a concise version of a given text, capturing the key points and main ideas, using techniques like sentence extraction, keyword identification, and information compression
- Third party
A natural or legal person, public authority, agency or body, other than the data subject, controller, processor and persons who, under the direct authority of the controller or processor, are authorized to process personal data
- Third-party review
An independent audit of the control structure of a service organization, such as a service bureau, with the objective of providing assurance to the users of the service organization that the internal control structure is adequate, effective and sound
- Thread Protocol
An IEEE 802.15.4-based protocol for IPv6 over low-power wireless personal area networks (6LoWPAN)
- Threat
Anything (e.g., object, substance, human) that is capable of acting against an asset in a manner that can result in harm
Scope Notes: A potential cause of an unwanted incident (ISO/IEC 13335)
- Threat agent
Methods and things used to exploit a vulnerability
Scope Notes: Examples include determination, capability, motive and resources.
- Threat analysis
An evaluation of the type, scope and nature of events or actions that can result in adverse consequences, identification of the threats that exist against enterprise assets
Scope Notes: The threat analysis usually defines the level of threat and the likelihood of it materializing.
- Threat event
Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
- Threat intelligence
Threat intelligence, or cyber threat intelligence, is information an organization uses to understand the threats that have, will, or are currently targeting the organization. This information is used to prepare, identify, and prevent security and cybersecurity threats looking to take advantage of valuable resources.
- Threat intelligence analysis
The application of individual and collective methods to analyze data and test hypotheses within various organizational or solution contexts. Threat intelligence data is extracted from multiple data sources, some of which will be deliberately deceptive. The threat intelligence analyst must analyze, isolate, separate, and sort the data to determine truth from deception. Although this discipline is found in its purest form inside national intelligence agencies, its methods are also applied and used for business or competitive intelligence.
Source: CMMC/NIST 800 171B and CSF
- Threat intelligence systems
Systems that perform threat intelligence
- Threat vector
The path or route used by the adversary to gain access to the target
- Throughput
The quantity of useful work made by the system per unit of time. Throughput can be measured in instructions per second or some other unit of performance. When referring to a data transfer operation, throughput measures the useful data transfer rate.
- Thundering herd
Loss of service resulting from a lapse in connectivity that causes devices to simultaneously attempt reconnection
- Timelines
Chronological graphs where events related to an incident can be mapped to look for relationships in complex cases
Scope Notes: Timelines can provide simplified visualization for presentation to management and other nontechnical audiences.
- Timely information
Information produced and used in a time frame that makes it possible to prevent or detect control deficiencies before they become material to an enterprise
Scope Notes: Refer to COBIT 5 information quality goals
- Time series data
Time series data have measurements of observations accompanied by datetime stamps
- Token
In security systems, a physical device that is used to authenticate a user, typically in addition to a username and password; in programming languages, a single element of the language
In natural language processing (NLP), a unit of data representing individual words, subwords, or characters typically used as input for models
- Tokenization
The process of breaking down text or data into smaller units
- Token ring topology
A type of local area network (LAN) ring topology in which a frame containing a specific format, called the token, is passed from one station to the next around the ring
Scope Notes: When a station receives the token, it is allowed to transmit. The station can send as many frames as desired until a predefined time limit is reached. When a station either has no more frames to send or reaches the time limit, it transmits the token. Token passing prevents data collisions that can occur when two computers begin transmitting at the same time.
- Tolerable error
The maximum error in the population that professionals are willing to accept and still conclude that the test objective has been achieved. For substantive tests, tolerable error is related to professionals’ judgment about materiality. In compliance tests, it is the maximum rate of deviation from a prescribed control procedure that the professionals are willing to accept.
- Tolerable risk
Risk that is within a tolerable or acceptable range, based on management's appetite
- Toolchain
The portfolio of tools and technologies used by DevOps practitioners to automate and enable the DevOps practices.
- Top-level management
The highest level of management in the enterprise, responsible for direction and control of the enterprise as a whole (such as director, general manager, partner, chief officer and executive manager)
- Topology
The physical layout of how computers are linked together
Scope Notes: Examples of topology include ring, star and bus.
- Total cost of ownership (TCO)
Includes the original cost of the computer plus the cost of software, hardware and software upgrades, maintenance, technical support, training and certain activities performed by users
- Touch screen
A touch-sensitive display screen that uses a clear panel over or on the screen surface. The panel is an input device, a matrix of cells that transmits pressure information to the software.
- Traceability
The degree to which a relationship can be established between two or more products of the development process, especially products having a predecessor-successor or master-subordinate relationship to one another, e.g., the degree to which the requirements and design of a given software component match
See Consistency.
The degree to which each element in a software development product establishes its reason for existing, e.g., the degree to which each element in a bubble chart references the requirement that it satisfies
See Traceability analysis and Traceability matrix.
- Traceability analysis
The tracing of:
Software requirements specifications to system requirements in concept documentation
Software design descriptions to software requirements specifications and software requirements specifications to software design descriptions
Source code to corresponding design specifications and design specifications to source code
Analyze identified relationships for correctness, consistency, completeness and accuracy
See: Traceability and Traceability matrix.
- Traceability matrix
A matrix that records the relationship between two or more products, e.g., a matrix that records the relationship between the requirements and the design of a given software component
See Traceability and Traceability analysis.
- Trademark
A sound, color, logo, saying or other distinctive symbol closely associated with a certain product or company
- Trade study
An evaluation of alternatives based on criteria and systematic analysis, to select the best alternative for attaining determined objectives
- Training
The process of determining the ideal parameters comprising a model
- Transaction
Business events or information grouped together because they have a single or similar purpose
Scope Notes: Typically, a transaction is applied to a calculation or event that then results in the updating of a holding or master file.
- Transaction (IT) (IT)
A command, message or input record that explicitly or implicitly calls for a processing action, such as updating a file
An exchange between an end user and an interactive system
In a database management system, a unit of processing activity that accomplishes a specific purpose, such as a retrieval, an update, a modification or a deletion of one or more data elements of a storage structure
- Transaction analysis
A structured software design technique, deriving the structure of a system from analyzing the transactions that the system is required to process
- Transaction log
A manual or automated log of all updates to data files and databases
- Transaction protection
Also known as "automated remote journaling of redo logs," a data recovery strategy similar to electronic vaulting except that instead of transmitting several transaction batches daily, the archive logs are shipped as they are created
- Transfer learning
A process that uses knowledge gained from solving one task to improve performance on another related task, typically by transferring learned representations or parameters from a pretrained model to a new model trained for a different but related task
- Transformer
An artificial intelligence (AI) model architecture that uses “attention” to collect relationships in data, particularly language. It processes information all at once, leading to faster learning and tasks like translation and text generation.
- Translation
Converting from one language form to another
Source: NIST
See Assembling, Compilation and Interpret.
- Transmission Control Protocol (TCP)
A connection-based Internet protocol that supports reliable data transfer connections
Scope Notes: Packet data are verified using checksums and retransmitted if they are missing or corrupted. The application plays no part in validating the transfer.
- Transmission Control Protocol/Internet Protocol (TCP/IP)
Provides the basis for the Internet, a set of communication protocols that encompass media access, packet transport, session communication, file transfer, electronic mail (email), terminal emulation, remote file access and network management
- Transparency
Refers to an enterprise’s openness about its activities and is based on the following concepts:
How the mechanism functions is clear to those who are affected by or want to challenge governance decisions
A common vocabulary has been established
Relevant information is readily available
Scope Notes: Transparency and stakeholder trust are directly related; the more transparency in the governance process, the more confidence in the governance.
- Transport Layer Security (TLS)
A cryptographic protocol that provides secure communications, endpoint security and privacy on the Internet
- Trap door
Unauthorized electronic exit, or doorway, out of an authorized computer program into a set of malicious instructions or programs
- Triple DES (3DES)
A block cipher created from the Data Encryption Standard (DES) cipher by using it three times. 3DES was broken in 2016.
- Trojan horse
Purposefully hidden malicious or damaging code within an authorized computer program
- Trusted process
A process certified as supporting a security goal
- Trusted system
A system that employs sufficient hardware and software assurance measures to allow their use for processing a range of sensitive or classified information
- Tunnel
The paths that the encapsulated packets follow in an Internet virtual private network (VPN)
- Tunneling
Commonly used to bridge between incompatible hosts/routers or to provide encryption, a method by which one network protocol encapsulates another protocol within itself
Scope Notes: When protocol A encapsulates protocol B, a protocol A header and optional tunneling headers are appended to the original protocol B packet. Protocol A then becomes the data link layer of protocol B. Examples of tunneling protocols include IPSec, Point-to-point Protocol Over Ethernet (PPPoE) and Layer 2 Tunneling Protocol (L2TP).
- Tunnel mode
Used to protect traffic between different networks when traffic must travel through intermediate or untrusted networks. Tunnel mode encapsulates the entire IP packet with an AH or ESP header and an additional IP header.
- Tuple
A row or record consisting of a set of attribute value pairs (column or field) in a relational data structure
- Turing-complete
A computational term meant to describe a system that can successfully be used as a Turing Machine, i.e., a system whose programming language can simulate what another programming language can accomplish
- Twisted pair
A low-capacity transmission medium, a pair of small, insulated wires that are twisted around each other to minimize interference from other wires in the cable
- Two-factor authentication
The use of two independent mechanisms for authentication (e.g., requiring both a smart card and a password), typically the combination of something you know, are or have
U
- UIMA
A framework used to analyze unstructured information, especially natural language. OASIS Unstructured Information Management Architecture (UIMA) is a specification that standardizes this framework, and Apache UIMA is an open-source implementation of it.
- Unambiguous
A term that means not having two or more possible meanings
A term that means not susceptible to different interpretations
A term that means not obscure or vague
A term that means clear, definite and certain
- Uncertainty
The difficulty of predicting an outcome due to limited knowledge of all components
- Underfitting
When a machine learning (ML) model is too simple to capture the complexities and underlying structure of the data, resulting in poor performance for both the training and text data
- Unicode
A standard for representing characters as integers
Scope Notes: Unicode uses 16 bits, which means that it can represent more than 65,000 unique characters; this is necessary for languages such as Chinese and Japanese.
- Uniform resource locator (URL)
The string of characters that form a web address
- Uninterruptible power supply (UPS)
A type of power supply that provides short-term backup power from batteries to a computer system when the electrical power fails or drops to an unacceptable voltage level
- Unit
A separately testable element specified in the design of a computer software element
A logically separable part of a computer program. It is synonymous with "component" and "module."
Synonymous with component and module
- Unit testing
A testing technique used to test program logic within a particular program or module (ISACA)
Scope Notes: The purpose of the test is to ensure that the internal operation of the program performs according to specification. It uses a set of test cases that focus on the control structure of the procedural design.
Testing of individual hardware or software units
- Universal description, discovery and integration (UDDI)
A web-based version of the traditional telephone book's yellow and white pages that enables businesses to be publicly listed and promotes greater e-commerce activities
- Universal Serial BUS (USB)
An external bus standard that provides capabilities to transfer data at a rate of 12 Mbps
Scope Notes: A USB port can connect to up to 127 peripheral devices.
- UNIX
A multitasking, multiple-user (time-sharing) operating system developed at Bell Labs to create a favorable environment for programming research and development
- Unlinkability
A condition of privacy-relevant data that cannot be linked (i.e., related) across domains
- Unsupervised learning
A class of machine-learning algorithms designed to identify groupings of data without knowing what the groups will be in advance
- Untrustworthy host
A host that cannot be protected by the firewall. As a result, hosts on trusted networks can place only limited trust in it.
Scope Notes: To the basic border firewall, add a host that resides on an untrusted network where the firewall cannot protect it. That host is minimally configured and carefully managed to be as secure as possible. The firewall is configured to require incoming and outgoing traffic to go through the untrustworthy host.
- Upfade
A byproduct of multipath whereby the RF signal takes multiple paths and results in stronger signal strength
- Uploading
The process of electronically sending computerized information from one computer to another computer
Scope Notes: When uploading, most often the transfer is from a smaller computer to a larger one.
- Usability
The ease with which a user can learn to operate, prepare inputs for and interpret outputs of a system or component
- User
Any person, organization or functional unit that uses the services of an information processing system
See End user
- User's guide
Documentation that describes how to use a functional unit and may include a description of the rights and responsibilities of the user, the owner and the supplier of the unit. It is synonymous with "user manual" and "operator manual."
- User acceptance testing (UAT)
A type of functional testing that validates the results of the development phase where software is tested by the intended audience or business representative (from Stanford University)
- User awareness
A training process in security-specific issues to reduce security problems. Users are often the weakest link in the security chain.
- User Datagram Protocol (UDP)
A connectionless Internet protocol that is designed for network efficiency and speed at the expense of reliability
- User entity and behavioral analytics (UEBA)
The process of monitoring an account for abnormal activity and atypical usage to identify patterns (heuristics) that highlight user activity trends. UEBA can act as a proactive access control mechanism by identifying threat indicators, alerting on malicious behavior earlier and improving threat intelligence.
- User interface impersonation
A pop-up ad that impersonates a system dialog, an ad that impersonates a system warning or an ad that impersonates an application user interface in a mobile device
- User mode
A mode used for the execution of normal system activities
- User provisioning
A process to create, modify, disable and delete user accounts and their profiles across IT infrastructure and business applications
- Utility program
A computer program that generally supports the processes of a computer, e.g., a diagnostic program, a trace program and a sort program
- Utility script
A sequence of commands input into a single file to automate a repetitive and specific task
Scope Notes: The utility script is executed, either automatically or manually, to perform the task. In UNIX, these are known as shell scripts.
- Utility software
Computer programs or routines designed to perform some general support function required by other application software, the operating system or the system users. They perform general functions, such as formatting electronic media, making copies of files or deleting files.
- Utility token
Digital assets or tokens created and utilized to finance the creation of a network by providing its buyers with the ability to use some of the network ecosystem or products. They do not give any legal or economic right of ownership over the developer or any part of the ecosystem.
V
- V&V
The acronym for verification and validation
- Vaccine
A program designed to detect computer viruses
- Validate
A term that means to prove to be valid
- Validation
The process of establishing documented evidence that provides a high degree of assurance that a specific process will consistently produce a product meeting its predetermined specifications and quality attributes
- Validation, process
The process of establishing documented evidence that provides a high degree of assurance that a specific process will consistently produce a product meeting its predetermined specifications and quality characteristics
Source: FDA
- Validation, software
The process of determining the correctness of the final program or software produced from a development project with respect to the user's needs and requirements. Validation is usually accomplished by verifying each stage of the software development life cycle.
See Verification, software
- Validation, verification and testing
Techniques used as an entity to define a procedure of review, analysis and testing throughout the software life cycle to discover errors, determine functionality and ensure the production of quality software
Source: NIST
- Valid input
Test data that lies within the domain of the function that the program represents
- Validity check
Programmed checking of data validity in accordance with predetermined criteria
- Val IT
The standard framework for enterprises to select and manage IT-related business investments and IT assets by means of investment programs such that they deliver optimal value to the enterprise. It is based on COBIT.
- Value
The relative worth or importance of an investment for an enterprise, as perceived by its key stakeholders, expressed as total life cycle benefits net of related costs, adjusted for risk and (in the case of financial value) the time value of money
- Value-added network (VAN)
A data communication network that adds processing services, such as error correction, data translation and/or storage, to the basic function of transporting data
- Value creation
The main governance objective of an enterprise, achieved when the three underlying objectives (benefits realization, risk optimization and resource optimization) are all balanced
Scope Notes: COBIT 5 and COBIT 2019 perspective
- Variable
A name, label, quantity or data item whose value may be changed many times during processing. This contrasts with constant.
- Variable sampling
A sampling technique used to estimate the average or total value of a population based on a sample. It is a statistical model used to project a quantitative characteristic, such as a monetary amount.
- Variable trace
A record of the name and values of variables accessed or changed during the execution of a computer program. It is synonymous with data-flow trace, data trace and value trace.
Source: IEEE
See Execution trace, Retrospective trace, Subroutine trace and Symbolic trace
- Variance
The measure of how much a list of numbers varies from the mean (average) value. It is frequently used in statistics to measure how large the differences are in a set of numbers. It is calculated by averaging the squared difference of every number from the mean.
In artificial intelligence (AI), the measure of how much the model varies when it is trained on different subsets of the training data. A model with high variance is very sensitive to the training data and might tend to overfit.
- Vaults
A secure environment to store critical data that is isolated from production and backup storage environments to limit exposure to cyberthreats
- Vector
An ordered set of real numbers, each denoting a distance on a coordinate axis. These numbers may represent a series of details about a single person, movie, product or the entity being modeled.
- Vectorization
The process of representing input data as an array of vectors that can be processed by a machine learning (ML) algorithm or model
- Vector space
A collection of vectors, e.g., a matrix
- Vendor
A person or an organization that provides software, hardware, firmware and/or documentation to the user for a fee or in exchange for services, e.g., a medical device manufacturer
- Verifiable
A term that means can be proved or confirmed by examination or investigation
See Measurable
- Verification
Checks that data is entered correctly
- Verification, software
In general, the demonstration of consistency, completeness and correctness of the software at each stage and between each stage of the development life cycle
Source: NBS
See Validation, software
- Verification-based appraisal
An appraisal in which the appraisal team focuses on verifying the set of objective evidence provided by the appraised organization in advance in order to reduce the amount of discovery during the appraisal onsite period
See Discovery-based appraisal
- Verify
A term that means to determine whether a transcription of data or other operation has been accomplished accurately
Source: ANSI
A term that means to check the results of data entry, e.g., keypunching
A term that means to prove to be true by demonstration
- Version
An initial release or a complete rerelease of a software item or software element
See Release
- Version control
A practice that identifies the correct versions of work products and ensures they are available for use or for restoring to a previous version. It also includes the establishment and maintenance of baselines and the identification of changes to baselines to obtain previous baselines.
- Version number
A unique identifier used to identify software items and related software documentation that are subject to configuration control
- Vertical defense in depth
A strategy where controls are placed at different system layers, including hardware, operating system, application, database or user levels
- View
A selection of model components relevant to the organization or user. Two primary types of views currently exist:
Predefined view: A logical grouping of predefined CMMI model components used to define the appraisal model view scope. Examples include CMMI-DEV Maturity Level 2 and CMMI-SVC Maturity Level 5.
Customized view: Any combination of capability areas, practice areas, practice groups or practices that are defined by the end user. Customized views are defined to be relevant to business objectives.
See Benchmark model view
- Virtual appraisal
Any appraisal (benchmark, evaluation, sustainment or APR) where any appraisal activity is performed virtually or remotely by the Appraisal Team Leader or appraisal team
- Virtual currency
Digital representations of value, not created or issued by a central bank or sovereign state, which can be used as a method of exchange
- Virtual face-to-face (F2F)
A meeting over a remote or virtual platform such as Teams, Zoom, FaceTime, etc., where the participants can actively, clearly and continually see and hear each other on camera with audio
- Virtualization
The process of adding a guest application and data onto a virtual server, recognizing that the guest application will ultimately be removed from the physical server
- Virtual local area network (VLAN)
Logical segmentation of a LAN into different broadcast domains
Scope Notes: A VLAN is set up by configuring ports on a switch so devices attached to these ports may communicate as if they were attached to the same physical network segment even though the devices are located on different LAN segments. A VLAN is based on logical rather than physical connections.
- Virtual machine (VM)
An emulation of a computing environment or operating system separate from the host computing system
- Virtual machine (VM) jumping (VM)
Exploitation of a hypervisor that allows an attacker to gain access to one virtual machine from another
- Virtual organizations
An organization that has no official physical site presence and is made up of diverse, geographically dispersed or remote employees
- Virtual private network (VPN)
A secure private network that uses the public telecommunications infrastructure to transmit data
Scope Notes: In contrast to a much more expensive system of owned or leased lines that can only be used by one enterprise, VPNs are used by enterprises for both extranets and wide areas of intranets. Using encryption and authentication, a VPN encrypts all data that passes between two Internet points, maintaining privacy and security.
- Virtual private network (VPN) concentrator (VPN)
A system used to establish VPN tunnels and handle large numbers of simultaneous connections. This system provides authentication, authorization and accounting services.
- Virtual reality
Computer-generated simulations that present the user with an altered reality. VR users typically wear a headset and hold a hand controller while experiencing an immersive recreation of a real or imaginary environment that masks their actual environment.
- Virtual solution delivery
A solution that includes the use of virtual, remote or hybrid methods to deliver a given service, process, activity, task or solution to customers and affected stakeholders. For context, the terms virtual delivery and remote delivery are used interchangeably.
- Virus
A piece of code that can replicate itself and spread from one computer to another. It requires intervention or execution to replicate and/or cause damage.
See Bomb, Trojan horse and Worm
- Virus signature
The file of virus patterns that are compared to existing files to determine whether they are infected with a virus or worm
- Virus signature file
The file of virus patterns that are compared to existing files to determine whether they are infected with a virus or worm
- VMS
The acronym for virtual memory system
- Voice mail
A system of storing messages in a private recording medium to allow the called party to retrieve the messages later
- Voice-over Internet Protocol (VoIP)
Also called IP Telephony, Internet Telephony and Broadband Phone, a technology that makes it possible to have a voice conversation over the Internet or any dedicated Internet Protocol (IP) network instead of over dedicated voice transmission lines
- Volatile data
Data that changes frequently and can be lost when the system power is shut down
- Vulnerability
A weakness in the design, implementation, operation or internal control of a process that could expose the system to adverse threats from threat events
- Vulnerability analysis
A process of identifying and classifying vulnerabilities
- Vulnerability event
Any event during which a material increase in vulnerability occurs. Note that this increase in vulnerability can result from changes in control conditions or threat capability/force.
Scope Notes: From Jones, J.; "FAIR Taxonomy," Risk Management Insight, USA, 2008
- Vulnerability scanning
An automated process to proactively identify security weaknesses in a network or individual system
W
- Walk-through
A thorough demonstration or explanation that details each step of a process
- Wallet
An application or other service that gives holders of cryptocurrency the ability to store and retrieve their digital assets. Such wallets come in many forms, including hot wallets (any wallet application or service connected to the Internet) and cold wallets (or cold storage, often hardware devices that can be disconnected from the Internet or other electronic services).
- War dialer
Software packages that sequentially dial telephone numbers, recording any numbers that answer
- Warm site
A site that is similar to a hot site but not fully equipped with all of the necessary hardware needed for recovery
- Waterfall development
Also known as traditional development, a procedure-focused development cycle with formal sign-off at the completion of each level
- Waterfall model
A model of the software development process in which the constituent activities, typically a concept phase, requirements phase, design phase, implementation phase, test phase, installation and checkout phase, and operation and maintenance, are performed in that order, possibly with overlap but with little or no iteration. It contrasts with incremental development, rapid prototyping and spiral model.
- Weakness
A type of preliminary or final finding, which involves an ineffective, or nonexistent, implementation of one or more processes that meet the intent and value of a practice based on verified objective evidence. It is applicable across the project(s) and organizational support functions or organizational unit as a whole. This is realized if a) the process itself does not address a CMMI practice requirement or b) the project(s) or organizational support functions are not following their process that is compliant with the intent and value of the applicable CMMI practice.
- Web application firewalls
A buffer used between a web application and the Internet to mitigate cyberattacks
- Webapp security tools
Open-source tools used to identify threats to applications and data
- Web hosting
The business of providing the equipment and services required to host and maintain files for one or more web sites and providing fast Internet connections to those sites
Scope Notes: Most hosting is "shared," which means that web sites for multiple companies are on the same server to share/reduce costs.
- Web page
A viewable screen displaying information, presented through a web browser in a single view, sometimes requiring the user to scroll to review the entire page
Scope Notes: An enterprise's web page may display the enterprise’s logo, provide information about the enterprise's products and services or allow a customer to interact with the enterprise or third parties contracted with the enterprise.
- Web server
End-point hardware or software that serves web pages to users
- Web Services Description Language (WSDL)
A language formatted with extensible markup language (XML). It is used to describe the capabilities of a web service as collections of communication endpoints capable of exchanging messages. WSDL is the language used by Universal Description, Discovery and Integration (UDDI).
See also Universal Description, Discovery and Integration (UDDI)
- Web site
One or more web pages that may originate at one or more web server computers
Scope Notes: A person can view the pages of a web site in any order, as he/she would read a magazine.
- Weight
A coefficient for a feature in a linear model or an edge in a deep network
- Weka
An open-source set of command line and graphical user interface data analysis tools developed at the University of Waikato in New Zealand
- Well-known ports
Ports controlled and assigned by the Internet Assigned Numbers Authority (IANA). On most systems, they can be used only by system (or root) processes or programs executed by privileged users. The assigned ports use the first portion of the possible port numbers. Initially, these assigned ports were in the range 0-255. Currently, the range for assigned ports managed by the IANA has been expanded to 0-1023.
- White box testing
A testing approach that uses knowledge of a program/module’s underlying implementation and code intervals to verify its expected behavior
- Wide area network (WAN)
A computer network connecting multiple offices or buildings over a larger area
- Wide area network (WAN) switch
A data link layer device used for implementing various WAN technologies, such as asynchronous transfer mode, point-to-point frame relay solutions and integrated services digital network (ISDN)
Scope Notes: WAN switches are typically associated with carrier networks providing dedicated WAN switching and router services to enterprises via T-1 or T-3 connections.
- Width
The number of neurons in a particular layer of a neural network
- Wi-Fi HaLow
An IEEE 802.11 modification that uses license-exempt 900 MHz bands to extend the WiFi connectivity range up to 1 kilometer
- Wi-Fi Protected Access (WPA)
A class of security protocols used to secure wireless (Wi-Fi) computer networks
- Wi-Fi Protected Access II (WPA2)
A wireless security protocol that supports 802.11i encryption standards to provide greater security. This protocol uses Advanced Encryption Standards (AES) and Temporal Key Integrity Protocol (TKIP) for stronger encryption.
- Windows NT
A version of the Windows operating system that supports preemptive multitasking
- Wired Equivalent Privacy (WEP)
A scheme that is part of the IEEE 802.11 wireless networking standard to secure IEEE 802.11 wireless networks (also known as Wi-Fi networks)
Scope Notes: Because a wireless network broadcasts messages using radio, it is particularly susceptible to eavesdropping. WEP was intended to provide comparable confidentiality to a traditional wired network (in particular, it does not protect network users from each other), hence the name. Cryptoanalysts identified several serious weaknesses, and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003 and then by the full IEEE 802.11i standard (also known as WPA2) in 2004. Despite the weaknesses, WEP provides a level of security that can deter casual snooping.
- Wireless computing
The ability of computing devices to communicate in a form to establish a local area network (LAN) without cabling infrastructure (wireless). This involves those technologies converging around IEEE 802.11 and 802.11b and radio band services used by mobile devices.
- Wireless local area network (WLAN)
A wireless communication network that serves several users within a specified limited geographic area
- Wiretapping
The practice of eavesdropping on information being transmitted over telecommunications links
- Workaround
A sequence of actions the user should take to avoid a problem or system limitation until the computer program is changed. They may include manual procedures used in conjunction with the computer system.
- Work Breakdown Structure (WBS)
A list of tasks and activities, related work elements and their relationship to each other and the end product or service
- Workgroup
A collection of people who work together closely on highly interdependent tasks to achieve shared objectives. A workgroup typically reports to a responsible individual who may be involved in managing its daily activities. The operational parameters of workgroups can vary based on objectives and should, therefore, be clearly defined. Workgroups can operate as a project if designated accordingly.
- Work product
An output from a process, activity or task that may be stand-alone or part of a solution
- Work product and task attributes
Characteristics of solutions and tasks used to estimate work. These characteristics often include size, complexity, weight, form, fit and function. Characteristics are typically used as one input to deriving other resource estimates, e.g., effort, cost, schedule.
See Work product
- World Wide Web (WWW)
A sub network of the Internet through which information is exchanged by text, graphics, audio and video
- World Wide Web Consortium (W3C)
Founded in 1994, an international consortium of affiliates from public and private organizations involved with the Internet and web
Scope Notes: The W3C's primary mission is to promulgate open standards to further enhance the economic growth of Internet web services globally.
- Worm
A programmed network attack in which a self-replicating program does not attach itself to programs but rather spreads independently of users’ action
- WPA2
A wireless security protocol that supports 802.11i encryption standards to provide greater security. This protocol uses advanced encryption standards (AES) and temporal key integrity protocol (TKIP) for stronger encryption.
- WPA3
A wireless security protocol released in mid-2018 that improves on WPA2 by eliminating the preshared key (PSK), which is susceptible to dictionary attacks
- Write blocker
A device that allows the acquisition of information on a drive without creating the possibility of accidentally damaging the drive
- Write protect
The use of hardware or software to prevent data from being overwritten or deleted
X
- X.25
A protocol for packet-switching networks
- X.25 Interface
An interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for terminals operating in packet mode on some public data networks
- X.500
A standard that defines how global directories should be structured
Scope Notes: X.500 directories are hierarchical with different levels for each category of information, such as country, state and city.
Z
- Zero-day exploit
A vulnerability that is exploited before the software creator/vendor is aware of its existence. It may also refer to known flaws that do not have an available patch.
- Zero-knowledge proof
A critical aspect of cryptography, a method by which one party (Party A) is able to prove to another party (Party B) that Party A is aware of the value of a specific variable without conveying any additional information about that variable other than that they know its value
- Zero trust
A security model anchored in the assumption of breach, which means that anything outside or inside the network cannot be trusted and anyone who tries to access the network needs to be verified in advance
- Zero-trust architecture (ZTA)
A security model based on microsegmentation and the continuous validation of digital interactions to address the threat of lateral movement within a network.
See also Zero trust.
- Zigbee
An IEEE 802.15.4 personal area network (PAN) protocol developed in 1998 that aims to provide moderate throughput and reliable connectivity via a mesh topology (similar to Z-Wave)
- Z-Wave
A protocol that operates in the Part 15 unlicensed industrial, scientific and medical (ISM) band (approximately 900 MHz, depending on the location), giving it excellent barrier penetration and low power utilization. Z-Wave is similar to LoRa. It was originally developed by Zensys in 1999 for system on a chip (SoC) applications.