Term
|
Definition
A collection of team-based development processes that expects requirements changes, delivers frequent working versions of a product, works closely with customers, and designs and tests “on the fly.” |
|
|
Term
|
Definition
Encryption that uses two different keys: one to encrypt, one to decrypt. |
|
|
Term
|
Definition
The process whereby an information system approves (validates) a user by checking the user’s password. |
|
|
Term
|
Definition
Uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. |
|
|
Term
|
Definition
Someone who is well versed in the Porter models, organizational strategy, and systems alignment theory such as COBIT, and who also understands the proper role for technology. |
|
|
Term
Business process management (BPM) |
|
Definition
A systematic process of modeling, creating, implementing, and assessing business processes. |
|
|
Term
Continuous improvement process (CIP) |
|
Definition
An ongoing cycle of process improvement through evaluation, remodeling, implementation, and monitoring. |
|
|
Term
|
Definition
Small files that your browser stores on your computer when you visit Web sites. |
|
|
Term
Cross-site scripting (XSS) |
|
Definition
A type of code injection attack common on discussion boards and forums to inject Web page scripting into servers or into user’s computers. |
|
|
Term
|
Definition
A form of problem or attack that makes a server and/or network so resource-starved that it cannot serve legitimate requests. |
|
|
Term
|
Definition
People who drive around while their computer scans for unprotected wireless networks. |
|
|
Term
|
Definition
A process for transforming text into unintelligible text for secure communication and/or storage. |
|
|
Term
|
Definition
A wireless access point that is spoofing an access point with a similar name, then eavesdrops on communications. |
|
|
Term
|
Definition
A computing device that prevents unauthorized access to parts of a network. |
|
|
Term
|
Definition
Passed by Congress in 1999, it protects consumer financial data stored by financial institutions, which are defined as banks, securities firms, insurance companies, and organizations that provide financial advice, prepare tax returns, and provide similar financial services. |
|
|
Term
|
Definition
Gaining unauthorized access to a computer system. |
|
|
Term
|
Definition
A secure form of Hypertext Transport Protocol that uses public/private key and synchronous encryption to secure Internet communications. |
|
|
Term
|
Definition
Restrict access to digital assets to only those users who have authorization and require users to follow authorized procedures for system use and recovery. |
|
|
Term
|
Definition
The process by which a user is identified on a network. Information systems security – the process of protecting information systems vulnerabilities from threats by creating appropriate safeguards. |
|
|
Term
|
Definition
Occurs when a hacker/intruder uses a legitimate IP address to mask his or her own. |
|
|
Term
|
Definition
A number used to encrypt data in an encryption algorithm. |
|
|
Term
|
Definition
A safety procedure by which encryption keys are kept and safeguarded by a trusted third-party. |
|
|
Term
|
Definition
Work performed after system installation that either fixes problems or adds system enhancements. |
|
|
Term
|
Definition
An installation technique in which the new system and the old system are run at the same time, side-by-side, for a period of time to ensure the new system is working properly and yields comparable results to the old system. |
|
|
Term
|
Definition
An installation technique in which a system is installed/implemented in phases across an organization. This does not work for some systems. |
|
|
Term
|
Definition
An individual responsible for conducting a phishing scam. |
|
|
Term
|
Definition
The malicious use of email or a Web site to attempt to acquire an individual’s personal information by masquerading as a legitimate business or organization. |
|
|
Term
|
Definition
The organization implements the entire system/business processes on a limited portion of the business. |
|
|
Term
|
Definition
Refers to an installation process by which the old system is turned off and the new system is turn on. This form of installation process is generally discouraged as being too risky. |
|
|
Term
|
Definition
A form of social engineering (malicious attack) by which someone deceives by pretending to be someone else. |
|
|
Term
|
Definition
A key pair that is used for encryption. The public key is shared with anyone who wishes to send the private key holder an encrypted message. A public key is used to encrypt, while a private key is used to decrypt. |
|
|
Term
|
Definition
Measure that individuals or organizations take to block the threat from obtaining the asset. |
|
|
Term
|
Definition
A plastic card similar to a credit card that contains a microchip. |
|
|
Term
|
Definition
A technique for intercepting electronic communications on a network. |
|
|
Term
|
Definition
A category of threats that involve manipulating a person or group to unknowingly release confidential information. |
|
|
Term
|
Definition
A social engineering term that describes the act of pretending to be someone else. |
|
|
Term
|
Definition
The insertion of SQL into a URL that is unknowingly processed by a Web page to compromise a database. |
|
|
Term
|
Definition
A 15-minute meeting in which each team member states: 1) what he or she has done in the past day; 2) what he or she will do in the coming day; and 3) any factors that are blocking his or her progress. |
|
|
Term
|
Definition
A form of encryption wherein the same key is used to both encrypt and decrypt a message. |
|
|
Term
|
Definition
The process of switching from an old system and/or processes to a new system and/or processes. |
|
|
Term
|
Definition
The process of creating and maintaining an information system. |
|
|
Term
Systems development life cycle (SDLC) |
|
Definition
A structured process for developing an information system that consists of five steps: system definition, requirements determination, system design, system development/testing/implementation, and system maintenance. |
|
|
Term
|
Definition
The asset that is desired by a threat. |
|
|
Term
|
Definition
Security safeguards that specifically address (and may be incorporated into) the hardware, software, and data components of an information system. |
|
|
Term
|
Definition
A formal description of the system’s response to use and misuse scenarios. It is used to test a system prior to implementation. |
|
|
Term
|
Definition
A person or organization that seeks to obtain or alter data or other assets illegally, without the owner’s permission, and often without the owner’s knowledge. |
|
|
Term
|
Definition
Weakness in the IS that provides an opportunity for threats to gain access to individual or organizational assets. |
|
|