Category:FISCAM Terms
Federal Information System Controls Audit Manual
Terms from documents which support the Federal Information System Controls Audit Manual.
Pages in category "FISCAM Terms"
The following 200 pages are in this category, out of 415 total.
(previous page) (next page)T
- Term:Acceptance Testing
- Term:Access Control
- Term:Access Control List
- Term:Access Control Software
- Term:Access Method
- Term:Access Path
- Term:Access Path Diagram
- Term:Access Privileges
- Term:Access Rights
- Term:Account Management
- Term:Accountability
- Term:Accreditation
- Term:Accreditation Boundary
- Term:Accuracy
- Term:Accuracy Control
- Term:Adequate Security
- Term:Advanced Encryption Standard
- Term:Alternate Work Site
- Term:Application Controls
- Term:Application Level General
- Term:Application Programmer
- Term:Application Programs
- Term:Application System
- Term:Assertion
- Term:Attack
- Term:Audit Logging
- Term:Audit Plan
- Term:Audit Risk
- Term:Audit Strategy
- Term:Audit Trail
- Term:Auditable Event
- Term:Authentication
- Term:Authenticity
- Term:Authorization
- Term:Authorizing Official
- Term:Availability
- Term:Backdoor
- Term:Backup
- Term:Backup Procedures
- Term:Baseline Configuration
- Term:Biometric
- Term:Boundary Protection
- Term:Browsing
- Term:Business Impact Analysis
- Term:Business Process
- Term:Business Process Application
- Term:Business Process Application Controls
- Term:Business Process Application Level
- Term:Business Process Controls
- Term:Bypass Label Processing
- Term:Caat
- Term:Cd-Rom
- Term:Central Processing Unit
- Term:Certificate
- Term:Certificate Authority
- Term:Certificate Management
- Term:Certification
- Term:Certification and Accreditation
- Term:Certification Authority
- Term:Checkpoint
- Term:Chief Information Officer
- Term:Cipher Key Lock
- Term:Cipher Text
- Term:Code
- Term:Cold Site
- Term:Collaborative Computing
- Term:Command
- Term:Compact Disc-Read Only
- Term:Compensating Control
- Term:Compiler
- Term:Completeness Control
- Term:Component
- Term:Computer Facility
- Term:Computer Operations
- Term:Computer Processing Location
- Term:Computer Resource
- Term:Computer Room
- Term:Computer Security
- Term:Computer System
- Term:Computer-Assisted Audit
- Term:Computer-Related Controls
- Term:Computing Environment
- Term:Confidentiality
- Term:Confidentiality Control
- Term:Configuration Auditing
- Term:Configuration Control
- Term:Configuration Control Board
- Term:Configuration Identification
- Term:Configuration Management
- Term:Configuration Settings
- Term:Configuration Status Accounting
- Term:Console
- Term:Contingency Plan
- Term:Contingency Planning
- Term:Continuity of Operations Plan
- Term:Control Activities
- Term:Control Categories
- Term:Control Deficiency
- Term:Control Dependency
- Term:Control Environment
- Term:Control Objectives
- Term:Control Risk
- Term:Control Techniques
- Term:Controlled Interface
- Term:Countermeasures
- Term:Cpu
- Term:Critical Control Point
- Term:Cryptography
- Term:Data
- Term:Data Access Method
- Term:Data Administration
- Term:Data Center
- Term:Data Communications
- Term:Data Communications Systems
- Term:Data Definition
- Term:Data Design
- Term:Data File
- Term:Data Management Systems
- Term:Data Owner
- Term:Data Processing
- Term:Data Processing Center
- Term:Data Quality Standard
- Term:Data Security
- Term:Data Strategy
- Term:Data Validation
- Term:Data Warehouse
- Term:Database
- Term:Database Administrator
- Term:Database Management
- Term:Database Management System
- Term:Dba
- Term:Dbms
- Term:Debug
- Term:Decryption
- Term:Defense-In-Depth
- Term:Delete Access
- Term:Denial of Service
- Term:Denial of Service (Dos) Attack
- Term:Detection Risk
- Term:Dial-Back
- Term:Dial-Up Access
- Term:Digital Certificate
- Term:Digital Signature
- Term:Direct Access
- Term:Disaster Recovery Plan
- Term:Diskette
- Term:Dns
- Term:Download
- Term:Edit Controls
- Term:Electronic Signature
- Term:Embedded Audit Module
- Term:Encryption
- Term:Enterprise Resource Planning
- Term:Entity Or Component Level
- Term:Entitywide Information Security Program
- Term:Entry Points
- Term:Environmental Controls
- Term:Execute Access
- Term:Exit
- Term:Ffmia
- Term:Field
- Term:File
- Term:Firewall
- Term:Firmware
- Term:FISMA
- Term:Flowchart
- Term:Fmfia
- Term:Fraud
- Term:Ftp
- Term:Gagas
- Term:Gateway
- Term:General Controls
- Term:General Support System
- Term:Hacker
- Term:Hardware
- Term:Hashing
- Term:HTTP
- Term:HTTPS
- Term:Identification
- Term:IDS
- Term:IEEE
- Term:Implementation
- Term:Incident
- Term:Incident Response Program
- Term:Incompatible Duties
- Term:Information
- Term:Information Resource Owner
- Term:Information Security
- Term:Information System
- Term:Information System (IS) Control
- Term:Information System Boundaries
- Term:Information System Owner
- Term:Information Systems
- Term:Information Type
- Term:Infrastructure Application
- Term:Input
- Term:Integration Testing
- Term:Integrity
- Term:Interface
- Term:Interface Controls