• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
5 focus areas of Control Objectives for Information and Related Technology (COBIT)
Strategic alignment
Value delivery
Resource management
Risk management
Performance measurement
4 characteristics of CObIT Model
Business-focused
Process-oriented
controls-based
Measurement-driven
3 principal goals for information security programs
data confidentiality
data availability
data integrity
Application controls (3 specific tasks)
input control
processing control
output controls
Provides reasonable assurance that data received for processing have been properly authorized,converted into machine-sensible form and identified
Input controls
Provides reasonable assurance that processing has been performed as intended for particular application
Processing controls
Provides assurance that processing result is accurate and that only authorized personnel receive output.
Output controls
Fully operational processing facility that is immediately available
Hot Site
Facility with limited hardware such as communications and networking equipment, already installed but lacking necessary servers and client terminals
Warm site
Shell facility lacking most infrastructure buy readily available for quick installation of hardware and software
Cold site
prevents entry into a system by unauthorized personnel and prevents access by authorized personnel to data elements that are unnecessary to the performance of their job duties
Access control software
process of uniquely distinguishing one user from all others
Identification
process of determining that individuals are who they say they are.
Authentication
controls programmed into the software that prevent certain types of errors from ever getting into the system
Edit routines