IDSC - Test D

  1. physical components of information technology, which includes the computer and the peripherals (storage devices, input devices, output devices)
    computing hardware
  2. computer program or collection of programs - precise set of instructions that tells hardware what to do
    software
  3. user > application > OS > hardware
    layers of the hardware/software stack
  4. includes graphical items like scroll bars and menus
    user interface
  5. software stored on nonvolatile memory chips
    firmware
  6. special-purpose software designed and included inside physical products
    embedded systems
  7. a form of computing where systems in different locations communicate and collaborate to complete a task
    distributed computing
  8. program that fulfills the requests of a client (hardware context - computer that has been configured to support requests from other computers; software context - program that fulfills requests)
    server
  9. software program that makes requests of a server program
    client
  10. process of development of methodical technology specifications, models, and guidelines
    architecture
  11. a common technology term that is used for a variety of computing environments, standards, and marketplaces
    platform
  12. technology, computing, utility, interaction, marketplaces, on-demand, crowdsourcing, data harvesting
    the 8 platform types
  13. a plan/guidance for business functions and technology built upon a variety of different technologies (hardware, networks, devices) - looks like a pyramid with the business function/requirements/architecture at the top, providing direction for key technology decisions, followed by data architecture > application architecture > technology architecture
    enterprise architecture
  14. mobilization > current state > target state > roadmap
    architecture methodology
  15. software that houses business logic for use (and reuse) by multiple applications
    application server
  16. small pieces of code that are accessed via the application server that permit interoperable machine-to-machine interaction over a network
    web services
  17. programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data
    API (application programming interface)
  18. set of web services built around an organization's processes and procedures
    SOA (service-oriented architecture)
  19. Linux, Apache, MySQL, PHP
    components of a LAMP stack
  20. organization or firm that provides access to the internet - providers connect to one another, exchanging traffic and ensuring that messages can get to any other computer that's online and willing to communicate
    ISP (internet service provider)
  21. identifies resources on the internet along with the application protocol needed to retrieve it
    URL (uniform resource locator)/web address
  22. application transfer protocol that allows web browsers and web servers to communicate with each other
    HTTP (hypertext transfer protocol)
  23. enables communication by defining the format of data and rules for exchange
    protocol
  24. a server to hold email
    SMTP (simple mail transfer protocol)
  25. application transfer protocol that is used to copy files from one computer to another
    FTP
  26. application transport protocol (https://), host name (www.), domain name, top level domain (.com), path (case sensitive), file (case sensitive)
    anatomy of a web address
  27. a security standard that creates an encrypted link between a web server and a browser
    SSL (secure sockets layer)
  28. distributing a computing or networking workload across multiple systems in order to avoid congestion and slow performance
    load balancing
  29. systems that are capable of continuing operation even if a component fails
    fault tolerance
  30. a firm that provides hardware and servers to run the websites of others
    web hosting services
  31. a nonprofit governance and standards-setting body that accredits registrars throughout the world
    ICANN (Internet Corporation for Assigning Names and Numbers)
  32. language used to compose web pages
    hypertext markup language
  33. value used to identify a device that is connected to the internet - can be used to identify a user's physical location, tailor search results, customize advertising
    IP address
  34. conserves IP addresses by mapping devices on a private network to single internet-connected devices that acts on their behalf - helps delay the impact of the IP address drought but slows down internet access and is complex, cumbersome, and expensive to administer
    NAT (network address translation)
  35. internet directory service that allows devices and services to be named and discoverable - distributed database that looks up host and domain names and returns the actual IP address for them - likened to a big, hierarchical set of phone books capable of finding web and email servers and more
    DNS (domain name service)
  36. the 'phonebooks' of a DNS - work together to create the DNS and can get you anywhere you need to go online
    nameservers
  37. temporary storage space used to speed computing tasks
    cache
  38. governments, partnerships-imposed standards, and industry standards that oversee and control the data that an organization collects, stores, and uses
    GRC (governance, risk, and compliance)
  39. 1. regulatory requirements
    2. monetary and/or reputation risks
    reasons for implementing GRC programs
  40. data retention, protecting confidential info, financial accountability, disasters recovery
    GRC regulations
  41. financial reporting, labor laws, data privacy
    horizontal (cross-industry)
  42. business partners, supply chain, outsourcers, service providers, and contractors
    contractual obligations
  43. regulatory requirements for food, medical devices, higher education, etc.
    vertical obligations
  44. maintaining visibility and control
    strategic objectives
  45. provides transparency for shareholders, create a high barrier of entry for new competitors, discourages current competitors from cheating
    GRC pros
  46. expensive and time consuming, can limit innovation and risk taking, risk of fines and penalties
    GRC cons
  47. the set of processes, policies, laws, customs, and rules affecting the way a corporation is directed, managed, and controlled - has a top-down component
    corporate governance
  48. play a key role in overseeing, administering, and monitoring a company
    board of directors
  49. the accountability of individuals in an organization through information systems
    delegation of authority
  50. how organizations align IT strategy with business strategy - has a bottom-up component - technology plays a critical role in monitoring of key regulatory and compliance indicators - enterprise-wide visibility for compliance - monitoring all existing processes is a daunting task - requires access to numerous information systems and timely reporting
    IT governance
  51. when implemented properly, helps companies increase visibility into the effectiveness of compliance efforts - poorly designed leaves companies vulnerable to a variety of potential issues
    IT systems
  52. strategy and direction, performance monitoring, structure and relationship, corporate citizenship, compliance and accountability, transparency and disclosure
    aspects of corporate governance & MIS framework
  53. enterprise risk management, compliance management, vendor risk management - RSA Archer, SAP GRC, Riskonnect, ServiceNow
    governance/regtech ESG software
  54. DEI, labor practices, health and safety - Affirmity, Equal Reality, Spot, Wolters Kluwer, Safesite
    social ESG software
  55. sustainability and carbon management, hazardous substances, waste recycling, water use - Emitwise, SINAI, Watershed, South Pole
    environmental ESG software
  56. outcome focused direction for decision making (e.g. hiring principles) - high strategy, high risk
    principles
  57. formal guidelines (e.g. travel expense policy) - med-high strategic, med-high risk
    policies
  58. methods and resources provided to support policy (e.g. ISO 9001 standards) - medium strategic/tactical, medium risk
    standards
  59. detailed directions on how policies should be followed (e.g. procedure to file for travel reimbursement) - med-high tactical, med-low risk
    procedures
  60. informal suggested practices (e.g. social media guidelines) - high tactical, low risk
    guidelines
  61. internal financial, external financial, tax, operational, compliance, information system, payroll
    examples of audits
  62. log-in credentials, approvals, legal review of contracts, spending authority and spending limits, segregation of duties, account reconciliation
    examples of controls
  63. executive > operational > compliance
    Gartner risk management phases
  64. aims to enforce corporate governance and strengthen corporate accountability by internal checks and balances, levels of approval and sign-off, full transparency, adequate controls, support of enterprise applications (ERP, CRM, SCM)
    SOX (Sarbanes-Oxley)
  65. employees, mobile devices, third parties, cloud service providers
    biggest IT compliance challenges
  66. the European Union's new privacy law - many companies worldwide fear it will make collecting and handling personal info prohibitively complicated - prioritizes privacy and attempts to put individuals back in charge
    GDPR (General Data Protection Regulation)
  67. provide transparency to stakeholders
    main point of GRC
Author
gabeernst
ID
366095
Card Set
IDSC - Test D
Description
Updated