Beruflich Dokumente
Kultur Dokumente
ENGLISH Meaning
Abend
Acceptance Testing
Access Control
Access Method
Access Path
Access Rights
Address
Address Space
Addressing
Administrative Controls
Alpha
Analogue, analog
Anti-Virus Software
Application Control
Application Layer
Application Program
Application Programmer
Application Programming
Assembler
Assembling
Assembly Language
Asynchronous Transmission
Attenuation
Attribute Sampling
Audit Evidence
Audit Objective
Audit Program
Audit Risk
Audit Trail
Authentication
Authorization
Backup
Bandwidth
Bar Code
Base Case
Baseband
Bastion Host
Batch Control
Batch Processing
BAUD
Baud Rate
Benchmark
Binary Code
Biometric Locks
Biometrics
Black Box Testing
Bridge
Broadband
Browser
Browser caches
Buffer
Buffer (to)
Buffer Capacity
Bus
Bus Topology
Business Risk
Card Key
Card Swipes
Certification Authority
Challenge/Response Token
Check Digit
Ciphertext
Circuit-switched Network
Circular Routing
Client/Server
Cluster Controller
Coaxial Cable
Cold Site
Communications Controller
Comparison Program
Compensating Control
Compiler
Compiling
Completeness Check
Compliance Testing
Compliance Tests
Comprehensive Audit
Computer Fraud
Computer Virus
Concentrator
Console Log
Contingency Plan
Control Group
Control Risk
Control Section
Cookies
Core Dumps
Corporate Governance
Corrective Control
Data Communications
Data Custodian
Data Dictionary
Data Diddling
Data Leakage
Data Mirroring
Data Owner
Data Repository
Data Security
Data Structure
Database
Database Replication
Database Specifications
Decentralization
Decryption
Decryption Key
Degauss
Demilitarized Zone
Demodulation
Detection Risk
Detective Control
Dial-back
Dial-up Network
Digital Signature
Discovery Sampling
Diskless Workstations
Download
Downloading
Dumb Terminal
Dumping
Duplex Routing
Eavesdropping
Echo Checks
eCommerce
Edit Controls
Editing
Electronic Cash
Encapsulation
Encapsulation (objects)
Encryption
Encryption Key
End-user
Ethernet
Exception Reports
Executable Code
Expert Systems
Exposure
Fault-tolerant
Feasibility Study
Fiber Optics
Field
File
File Layout
File Server
Firewall
Firmware
Format Checking
Frame-relay
Fraud Risk
Full Duplex
GANTT Chart
Gateway
Hacker
Hacking
Half Duplex
Handprint Scanner
Hardware
Hash Totals
Hexadecimal
Hierarchical Database
Host
Hot-site
Image Processing
Incremental Testing
Independence
Information Engineering
Inherent Risk
Inheritance (objects)
Input Controls
Integrity
Intelligent Terminal
Interface
Interface Testing
Internal Control
Internal Storage
Internet
Interval Sampling
Irregularities
IT governance
Judgement Sampling
Judgmental Sample
Leased Lines
Librarian
Limit Check
Line of Sight
Log
Logic bombs
Logical Access
Logoff
Logon
Machine Language
Mapping
Masking
Master File
Materiality
Memory Dump
Message Switching
Meta-tags
Metering Software
Microwave Transmission
Middleware
Modem (Modulator-Demodulator)
Modulation
Multiplexing
Multiplexor
Multiprocessing
Multiprogramming
Network
Network Administrator
Network Hubs
Network Protocol
Network Topology
Node
Noise
Non-repudiation
Normalization
Numeric Check
Object Code
Objectivity
Object-oriented
Off-line Files
Off-site Storage
On-Line
Open Systems
Operating System
Operational Audit
Operational Control
Operator Console
Optical Scanner
Output Analyzer
Outsourcing
Packet
Packet Switching
Parallel Simulation
Parallel Testing
Parity Check
Partitioned File
Passive Assault
Password
Performance Testing
Peripherals
Piggy-backing
Plaintext
Polymorphism (objects)
Port
Posting
Preventive Control
Privileged Mode
Production Programs
Production Software
Professional Competence
Program Abends
Program Flowcharts
Program Narratives
Project Management
Protocol
Protocol Converter
Prototyping
Proxy Server
Quality Assurance
Queue
Range Check
Real-Time
Real-time Processing
Reasonable Assurance
Reasonableness Check
Reciprocal Agreement
Reconciliation
Record
Recovery Testing
Redundancy Check
Re-engineering
Regression Testing
Remote Log-On
Repository
Requirements Definition
Reverse Engineering
Ring Topology
Risk
Risk Analysis
Rounding Down
Router
RS-232 Interface
RSA
Run Instructions
Run-to-run Totals
Salami Technique
Scanning
Scheduling
Scratch Tapes
Screening Routers
Security Administrator
Security Software
Security Testing
Segregation of Duties
Separation of Duties
Sequence Check
Sequential File
Service Bureau
Smart Card
Sniffing
Sockets
Software
Source Code
Source Documents
Spoofing
Spoofing Program
Spooling Program
Standing Data
Star Topology
Steering Committee
Stop or Go Sampling
Structured Programming
Substantive Test
Substantive Testing
Surge-Suppression
Synchronous
Synchronous Transmission
System Exit
System Flowcharts
System Narratives
System Software
System Testing
Systems Analyst
Systems Programmer
Table Look-ups
Tape library
TCP-IP Protocol
Telecommunications
Telecommunications Network
Teleprocessing
Terminal
Test Data
Test Generators
Test Programs
Throughput
Time Bomb
Token
Topology
Transaction
Transaction Log
Trap Door
Trojan Horse
Trunks
Twisted Pairs
Uploading
Utility Programs
Vaccine
Validity Check
Variable Sampling
Variables Estimation
Verification
Virtual Memory
Virus
Voice Mail
Wiretapping
Worm Program
X.25 Interface
Balanced scorecard
Deadman door
Digital certificate
Filter
Intranet
Intrusion
Knowledge Management
Metadata
Performance measurement
Referential integrity
Scope creep
Throughput index