Page 146 - CITP Review
P. 146
Buffer –A sequential section of memory dedicated for specific content, such as a single
character or a string of characters or numbers.
Business activity monitoring – BAM is software that assists management in monitoring
business activities, especially automated processes. It refers to aggregating, analyzing, and
presenting business process performance.
Business continuity plan – A plan that takes into account server interruptions, a lengthy
interruption, and the need to not only restore data but also fix or restore computers, operating
systems, and other affected components.
Business intelligence – BI is a structure and process that combines information architecture,
databases, analytical tools, reporting tools, and other applications to gather and communicate
business information for strategic and tactical purposes.
Business performance management – A BPM is a comprehensive structure and process that
measures and analyzes enterprise performance, operational and financial, to achieve strategic
advantages.
Business process management – Business Process Management (BPrM) is a holistic
management approach to managing business processes at the enterprise level to promote
efficiency and effectiveness, while stressing improvements, innovation, and integration with
technology.
Note: To avoid confusion, business process management is labeled BPrM to distinguish it from
business performance management, both of which are referred to as BPM in their disciplines.
Classic buffer overflow –When a program tries to place more data in a buffer than that buffer
can hold or when a program attempts to put data in a memory area past a buffer. Writing data
past or outside the limits of a buffer can cause program crashes and data corruption and could
even trigger malicious code.
Clickjacking – When an attacker uses multiple transparent or opaque layers to trick a user into
clicking on a button or link on another page when they were intending to click on the top level
page. The attacker is effectively "hijacking" clicks meant for their page and sending them to
another page.
Cloud computing – Using a remote server or a network of remote servers hosted on the web to
store and manage data.
Commercial off-the-shelf software – COTS is software that is published and made commercially
available to the general public.
Competitor – A person, company, team or entity that competes against another entity or person.
Computer assisted auditing techniques – CAAT is the employment of computers and
technologies to automate one or more audit procedures or processes. CAATs have the potential
to change the audit from routine documentation of the audit trail (numbers and documents) to
analysis of the evidence (in digital form).
© 2019 Association of International Certified Professional Accountants. All rights reserved. Glossary 2