Sie sind auf Seite 1von 18

CISA Exam Terminology List:

ENGLISH Meaning

Abend

Acceptance Testing

Access Control

Access Control Table

Access Method

Access Path

Access Rights

Address

Address Space

Addressing

Administrative Controls

Alpha

American Standard Code for Information


Interchange (ASCII)

Analogue, analog

Anonymous File Transfer Protocol (FTP)

Anti-Virus Software

Application Control

Application Layer

Application Program

Application Programmer

Application Programming

Application Tracing and Mapping

Arithmetic-logic Unit (ALU)

Artificial Intelligence (AI)

ASCII (American Standard Code for


Information Interchange)

Assembler
Assembling

Assembly Language

Asymmetric Key (Public Key)

Asynchronous Transfer Mode (ATM)

Asynchronous Transmission

Attenuation

Attribute Sampling

Audit Evidence

Audit Objective

Audit Program

Audit Risk

Audit Trail

Authentication

Authorization

Automated Teller Machine (ATM)

Backup

Bandwidth

Bar Code

Base Case

Baseband

Bastion Host

Batch Control

Batch Processing

BAUD

Baud Rate

Benchmark

Binary Code

Biometric Locks

Biometrics
Black Box Testing

Bridge

Broadband

Browser

Browser caches

Buffer

Buffer (to)

Buffer Capacity

Bus

Bus Topology

Business Continuity Plan

Business Impact Analysis (BIA)

Business Process Re-engineering (BPR)

Business Resumption Plan

Business Risk

Bypass Label Processing (BLP)

Capacity Stress Testing

Card Key

Card Swipes

Central Processing Unit (CPU)

Centralized Data Processing

Certification Authority

Challenge/Response Token

Change Control log

Check Digit

Check Digit Verification (self-checking


digit)

Checkpoint Restart Procedures

Ciphertext
Circuit-switched Network

Circular Routing

Client/Server

Cluster Controller

Coaxial Cable

Cold Site

Communications Controller

Comparison Program

Compensating Control

Compiler

Compiling

Completeness Check

Compliance Testing

Compliance Tests

Comprehensive Audit

Computer Aided Software Engineering


(CASE)

Computer Assisted Audit Technique


(CAAT)

Computer Fraud

Computer Sequence Checking

Computer Virus

Concentrator

Console Log

Contingency Plan

Continuous Auditing Approach

Control Group

Control Risk

Control Section

Cookies
Core Dumps

Corporate Governance

Corrective Control

Critical Path Method (CPM)

CRT (Cathode Ray Tube)

Cyclic redundancy checks

DASD (see Direct Access Storage


Device)

Data Communications

Data Custodian

Data Dictionary

Data Diddling

Data Encryption Standard (DES)

Data Leakage

Data Mirroring

Data Oriented Systems Development

Data Owner

Data Repository

Data Security

Data Structure

Database

Database Administrator (DBA)

Database Management Systems (DBMS)

Database Replication

Database Specifications

DBMS (see Database Management


System)

Decentralization

Decision Support Systems (DSS)

Decryption
Decryption Key

Degauss

Demilitarized Zone

Demodulation

Detection Risk

Detective Control

Dial-back

Dial-In Access Controls

Dial-up Network

Digital Signature

Direct Access Storage Device (DASD)

Disaster Recovery Plan

Discovery Sampling

Diskless Workstations

Distributed Data Processing Network

Domain name server

Down Time Report

Download

Downloading

Dry-pipe Fire Extinguisher System

Dumb Terminal

Dumping

Duplex Routing

Eavesdropping

Echo Checks

eCommerce

EDI (see Electronic Data Interchange)

Edit Controls

Editing
Electronic Cash

Electronic Data Interchange (EDI)

Electronic Funds Transfer (EFT)

E-mail

Embedded Audit Modules

Encapsulation

Encapsulation (objects)

Encryption

Encryption Key

End User Computing

End-user

Ethernet

Exception Reports

Executable Code

Executive Information System

Expected Error Occurrence

Expert Systems

Exposure

Extended Binary-Coded Decimal


Interchange Code (EBCDIC)

Fault-tolerant

Feasibility Study

Fiber Optic Cable

Fiber Optics

Field

File

File Layout

File Server

File Transfer Protocol (FTP)


Financial Audit

Firewall

Firmware

Format Checking

Fourth Generation Language

Frame-relay

Fraud Risk

Full Duplex

Function Point Analysis

GANTT Chart

Gateway

General Computer Controls

Generalized Audit Software

Hacker

Hacking

Half Duplex

Handprint Scanner

Hardware

Hash Totals

Hexadecimal

Hierarchical Database

Host

Hot-site

Image Processing

Incremental Testing

Independence

Indexed Sequential Access Method


(ISAM)

Indexed Sequential File


Inference Engine

Information Engineering

Information Processing Facility (IPF)

Inherent Risk

Inheritance (objects)

Initial Program Load (IPL)

Input Controls

Integrated Service Digital Network


(ISDN)

Integrated Test Facility (ITF)

Integrity

Intelligent Terminal

Interface

Interface Testing

Internal Control

Internal Storage

Internet

Internet Packet (IP) Spoofing

Internet Service Provider (ISP)

Interval Sampling

IPL (see Initial Program Load)

Irregularities

IT governance

JCL (see Job Control Language)

Job Control Language (JCL)

Judgement Sampling

Judgmental Sample

Leased Lines

Librarian
Limit Check

Line of Sight

Link Editor (Linkage Editor)

Local Area Network (LAN)

Log

Logic bombs

Logical Access

Logical Access Controls

Logoff

Logon

Machine Language

Magnetic Card Reader

Magnetic Ink Character Recognition


(MICR)

Management Information System (MIS)

Mapping

Masking

Master File

Materiality

Memory Dump

Message Switching

Meta-tags

Metering Software

Microwave Transmission

Middleware

Modem (Modulator-Demodulator)

Modulation

Monetary Unit Sampling

Multiplexing
Multiplexor

Multiprocessing

Multiprogramming

Network

Network Administrator

Network Hubs

Network Protocol

Network Topology

Node

Noise

Non-repudiation

Normalization

Numeric Check

Object Code

Objectivity

Object-oriented

Off-line Files

Off-site Storage

On-Line

Online Data Processing

Open Systems

Operating System

Operational Audit

Operational Control

Operator Console

Optical Character Recognition (OCR)

Optical Scanner

Output Analyzer

Outsourcing
Packet

Packet Switching

Parallel Simulation

Parallel Testing

Parity Check

Partitioned File

Passive Assault

Password

Performance Testing

Peripherals

PERT (see Program Evaluation Review


Technique)

Piggy-backing

PIN (Personal Identification Number)

Plaintext

Point Of Sales Systems (POS)

Polymorphism (objects)

Port

Posting

Preventive Control

Private Key Cryptosystems

Privileged Mode

Probability Proportional to Size

Production Programs

Production Software

Professional Competence

Program Abends

Program Evaluation Review Technique


(PERT)

Program Flowcharts
Program Narratives

Project Management

Protocol

Protocol Converter

Prototyping

Proxy Server

Public Key Cryptosystem

Public switched network (PSN)

Quality Assurance

Queue

Random Access Memory (RAM)

Range Check

Real-Time

Real-time Processing

Reasonable Assurance

Reasonableness Check

Reciprocal Agreement

Reconciliation

Record

Record, Screen and Report Layouts

Recovery Testing

Redundancy Check

Re-engineering

Regression Testing

Remote Job Entry (RJE)

Remote Log-On

Repository

Request for Proposal (RFP)

Requirements Definition
Reverse Engineering

Ring Topology

Risk

Risk Analysis

Rounding Down

Router

RS-232 Interface

RSA

Run Instructions

Run Time Exit

Run-to-run Totals

Salami Technique

Scanning

Scheduling

Scratch Tapes

Screening Routers

Security Administrator

Security Software

Security Testing

Segregation of Duties

Separation of Duties

Sequence Check

Sequential File

Service Bureau

Single sign-on process

Smart Card

Sniffing

Sockets

Software
Source Code

Source Code Compare Programs

Source Documents

Split Data Systems

Spoofing

Spoofing Program

Spool (Simultaneous Peripheral


Operations Online)

Spooling Program

Standing Data

Star Topology

Statistical Sampling (SP)

Steering Committee

Stop or Go Sampling

Structured Programming

Structured Query Language (SQL)

Substantive Test

Substantive Testing

Surge-Suppression

Symmetric Key Encryption

Synchronous

Synchronous Data Link

Synchronous Transmission

System Exit

System Flowcharts

System Initialization log

System Narratives

System Software

System Testing
Systems Analyst

Systems Development Life Cycle


(SDLC)

Systems Programmer

Table Look-ups

Tape library

Tape Management System (TMS)

TCP-IP Protocol

Telecommunications

Telecommunications Network

Teleprocessing

Terminal

Test Data

Test Generators

Test Programs

Third Party Reviews

Throughput

Time Bomb

Token

Token Ring Topology

Topology

Transaction

Transaction Log

Trap Door

Trojan Horse

Trunks

Twisted Pair Cable

Twisted Pairs

Uninterruptible Power Supply (UPS)


Unit Testing

Uploading

User Service Levels

Utility Programs

Vaccine

Validity Check

Value Added Network (VAN)

Variable Sampling

Variables Estimation

Verification

Virtual Memory

Virtual Private Networks

Virus

Voice Mail

VSAM (Virtual Storage Access Method)

White Box Testing

Wide Area Network (WAN)

Wiretapping

Worm Program

X.25 Interface

NEW TERMS CISA 2002

Balanced scorecard

Deadman door

Digital certificate

eXtensible Markup Language

Filter

Frame Relay assemble/disassembly


(FRAD) device

Intranet

Intrusion

Knowledge Management

Logical access right

Metadata

Packet assembly/disassembly (PAD)


device

Performance measurement

Redundant array of independent disks


(RAID)

Referential integrity

Scope creep

"Thin client architecture"

Throughput index

Das könnte Ihnen auch gefallen