CISA Exam Terminology List:
ENGLISH Meaning
Abend
Acceptance Testing
Access Control
Access Control Table
Access Method
Access Path
Access Rights
Address
Address Space
Addressing
Administrative Controls
Alpha
American Standard Code for Information
Interchange (ASCII)
Analogue, analog
Anonymous File Transfer Protocol (FTP)
Anti-Virus Software
Application Control
Application Layer
Application Program
Application Programmer
Application Programming
Application Tracing and Mapping
Arithmetic-logic Unit (ALU)
Artificial Intelligence (AI)
ASCII (American Standard Code for
Information Interchange)
Assembler
Assembling
Assembly Language
Asymmetric Key (Public Key)
Asynchronous Transfer Mode (ATM)
Asynchronous Transmission
Attenuation
Attribute Sampling
Audit Evidence
Audit Objective
Audit Program
Audit Risk
Audit Trail
Authentication
Authorization
Automated Teller Machine (ATM)
Backup
Bandwidth
Bar Code
Base Case
Baseband
Bastion Host
Batch Control
Batch Processing
BAUD
Baud Rate
Benchmark
Binary Code
Biometric Locks
Biometrics
Black Box Testing
Bridge
Broadband
Browser
Browser caches
Buffer
Buffer (to)
Buffer Capacity
Bus
Bus Topology
Business Continuity Plan
Business Impact Analysis (BIA)
Business Process Re-engineering (BPR)
Business Resumption Plan
Business Risk
Bypass Label Processing (BLP)
Capacity Stress Testing
Card Key
Card Swipes
Central Processing Unit (CPU)
Centralized Data Processing
Certification Authority
Challenge/Response Token
Change Control log
Check Digit
Check Digit Verification (self-checking
digit)
Checkpoint Restart Procedures
Ciphertext
Circuit-switched Network
Circular Routing
Client/Server
Cluster Controller
Coaxial Cable
Cold Site
Communications Controller
Comparison Program
Compensating Control
Compiler
Compiling
Completeness Check
Compliance Testing
Compliance Tests
Comprehensive Audit
Computer Aided Software Engineering
(CASE)
Computer Assisted Audit Technique
(CAAT)
Computer Fraud
Computer Sequence Checking
Computer Virus
Concentrator
Console Log
Contingency Plan
Continuous Auditing Approach
Control Group
Control Risk
Control Section
Cookies
Core Dumps
Corporate Governance
Corrective Control
Critical Path Method (CPM)
CRT (Cathode Ray Tube)
Cyclic redundancy checks
DASD (see Direct Access Storage
Device)
Data Communications
Data Custodian
Data Dictionary
Data Diddling
Data Encryption Standard (DES)
Data Leakage
Data Mirroring
Data Oriented Systems Development
Data Owner
Data Repository
Data Security
Data Structure
Database
Database Administrator (DBA)
Database Management Systems (DBMS)
Database Replication
Database Specifications
DBMS (see Database Management
System)
Decentralization
Decision Support Systems (DSS)
Decryption
Decryption Key
Degauss
Demilitarized Zone
Demodulation
Detection Risk
Detective Control
Dial-back
Dial-In Access Controls
Dial-up Network
Digital Signature
Direct Access Storage Device (DASD)
Disaster Recovery Plan
Discovery Sampling
Diskless Workstations
Distributed Data Processing Network
Domain name server
Down Time Report
Download
Downloading
Dry-pipe Fire Extinguisher System
Dumb Terminal
Dumping
Duplex Routing
Eavesdropping
Echo Checks
eCommerce
EDI (see Electronic Data Interchange)
Edit Controls
Editing
Electronic Cash
Electronic Data Interchange (EDI)
Electronic Funds Transfer (EFT)
E-mail
Embedded Audit Modules
Encapsulation
Encapsulation (objects)
Encryption
Encryption Key
End User Computing
End-user
Ethernet
Exception Reports
Executable Code
Executive Information System
Expected Error Occurrence
Expert Systems
Exposure
Extended Binary-Coded Decimal
Interchange Code (EBCDIC)
Fault-tolerant
Feasibility Study
Fiber Optic Cable
Fiber Optics
Field
File
File Layout
File Server
File Transfer Protocol (FTP)
Financial Audit
Firewall
Firmware
Format Checking
Fourth Generation Language
Frame-relay
Fraud Risk
Full Duplex
Function Point Analysis
GANTT Chart
Gateway
General Computer Controls
Generalized Audit Software
Hacker
Hacking
Half Duplex
Handprint Scanner
Hardware
Hash Totals
Hexadecimal
Hierarchical Database
Host
Hot-site
Image Processing
Incremental Testing
Independence
Indexed Sequential Access Method
(ISAM)
Indexed Sequential File
Inference Engine
Information Engineering
Information Processing Facility (IPF)
Inherent Risk
Inheritance (objects)
Initial Program Load (IPL)
Input Controls
Integrated Service Digital Network
(ISDN)
Integrated Test Facility (ITF)
Integrity
Intelligent Terminal
Interface
Interface Testing
Internal Control
Internal Storage
Internet
Internet Packet (IP) Spoofing
Internet Service Provider (ISP)
Interval Sampling
IPL (see Initial Program Load)
Irregularities
IT governance
JCL (see Job Control Language)
Job Control Language (JCL)
Judgement Sampling
Judgmental Sample
Leased Lines
Librarian
Limit Check
Line of Sight
Link Editor (Linkage Editor)
Local Area Network (LAN)
Log
Logic bombs
Logical Access
Logical Access Controls
Logoff
Logon
Machine Language
Magnetic Card Reader
Magnetic Ink Character Recognition
(MICR)
Management Information System (MIS)
Mapping
Masking
Master File
Materiality
Memory Dump
Message Switching
Meta-tags
Metering Software
Microwave Transmission
Middleware
Modem (Modulator-Demodulator)
Modulation
Monetary Unit Sampling
Multiplexing
Multiplexor
Multiprocessing
Multiprogramming
Network
Network Administrator
Network Hubs
Network Protocol
Network Topology
Node
Noise
Non-repudiation
Normalization
Numeric Check
Object Code
Objectivity
Object-oriented
Off-line Files
Off-site Storage
On-Line
Online Data Processing
Open Systems
Operating System
Operational Audit
Operational Control
Operator Console
Optical Character Recognition (OCR)
Optical Scanner
Output Analyzer
Outsourcing
Packet
Packet Switching
Parallel Simulation
Parallel Testing
Parity Check
Partitioned File
Passive Assault
Password
Performance Testing
Peripherals
PERT (see Program Evaluation Review
Technique)
Piggy-backing
PIN (Personal Identification Number)
Plaintext
Point Of Sales Systems (POS)
Polymorphism (objects)
Port
Posting
Preventive Control
Private Key Cryptosystems
Privileged Mode
Probability Proportional to Size
Production Programs
Production Software
Professional Competence
Program Abends
Program Evaluation Review Technique
(PERT)
Program Flowcharts
Program Narratives
Project Management
Protocol
Protocol Converter
Prototyping
Proxy Server
Public Key Cryptosystem
Public switched network (PSN)
Quality Assurance
Queue
Random Access Memory (RAM)
Range Check
Real-Time
Real-time Processing
Reasonable Assurance
Reasonableness Check
Reciprocal Agreement
Reconciliation
Record
Record, Screen and Report Layouts
Recovery Testing
Redundancy Check
Re-engineering
Regression Testing
Remote Job Entry (RJE)
Remote Log-On
Repository
Request for Proposal (RFP)
Requirements Definition
Reverse Engineering
Ring Topology
Risk
Risk Analysis
Rounding Down
Router
RS-232 Interface
RSA
Run Instructions
Run Time Exit
Run-to-run Totals
Salami Technique
Scanning
Scheduling
Scratch Tapes
Screening Routers
Security Administrator
Security Software
Security Testing
Segregation of Duties
Separation of Duties
Sequence Check
Sequential File
Service Bureau
Single sign-on process
Smart Card
Sniffing
Sockets
Software
Source Code
Source Code Compare Programs
Source Documents
Split Data Systems
Spoofing
Spoofing Program
Spool (Simultaneous Peripheral
Operations Online)
Spooling Program
Standing Data
Star Topology
Statistical Sampling (SP)
Steering Committee
Stop or Go Sampling
Structured Programming
Structured Query Language (SQL)
Substantive Test
Substantive Testing
Surge-Suppression
Symmetric Key Encryption
Synchronous
Synchronous Data Link
Synchronous Transmission
System Exit
System Flowcharts
System Initialization log
System Narratives
System Software
System Testing
Systems Analyst
Systems Development Life Cycle
(SDLC)
Systems Programmer
Table Look-ups
Tape library
Tape Management System (TMS)
TCP-IP Protocol
Telecommunications
Telecommunications Network
Teleprocessing
Terminal
Test Data
Test Generators
Test Programs
Third Party Reviews
Throughput
Time Bomb
Token
Token Ring Topology
Topology
Transaction
Transaction Log
Trap Door
Trojan Horse
Trunks
Twisted Pair Cable
Twisted Pairs
Uninterruptible Power Supply (UPS)
Unit Testing
Uploading
User Service Levels
Utility Programs
Vaccine
Validity Check
Value Added Network (VAN)
Variable Sampling
Variables Estimation
Verification
Virtual Memory
Virtual Private Networks
Virus
Voice Mail
VSAM (Virtual Storage Access Method)
White Box Testing
Wide Area Network (WAN)
Wiretapping
Worm Program
X.25 Interface
NEW TERMS CISA 2002
Balanced scorecard
Deadman door
Digital certificate
eXtensible Markup Language
Filter
Frame Relay assemble/disassembly
(FRAD) device
Intranet
Intrusion
Knowledge Management
Logical access right
Metadata
Packet assembly/disassembly (PAD)
device
Performance measurement
Redundant array of independent disks
(RAID)
Referential integrity
Scope creep
"Thin client architecture"
Throughput index