Page 146 - CITP Review
P. 146

Buffer –A sequential section of memory dedicated for specific content, such as a single
            character or a string of characters or numbers.

            Business activity monitoring – BAM is software that assists management in monitoring
            business activities, especially automated processes. It refers to aggregating, analyzing, and
            presenting business process performance.
            Business continuity plan – A plan that takes into account server interruptions, a lengthy
            interruption, and the need to not only restore data but also fix or restore computers, operating
            systems, and other affected components.

            Business intelligence – BI is a structure and process that combines information architecture,
            databases, analytical tools, reporting tools, and other applications to gather and communicate
            business information for strategic and tactical purposes.

            Business performance management – A BPM is a comprehensive structure and process that
            measures and analyzes enterprise performance, operational and financial, to achieve strategic
            advantages.

            Business process management – Business Process Management (BPrM) is a holistic
            management approach to managing business processes at the enterprise level to promote
            efficiency and effectiveness, while stressing improvements, innovation, and integration with
            technology.

            Note: To avoid confusion, business process management is labeled BPrM to distinguish it from
            business performance management, both of which are referred to as BPM in their disciplines.
            Classic buffer overflow –When a program tries to place more data in a buffer than that buffer
            can hold or when a program attempts to put data in a memory area past a buffer. Writing data
            past or outside the limits of a buffer can cause program crashes and data corruption and could
            even trigger malicious code.

            Clickjacking – When an attacker uses multiple transparent or opaque layers to trick a user into
            clicking on a button or link on another page when they were intending to click on the top level
            page. The attacker is effectively "hijacking" clicks meant for their page and sending them to
            another page.

            Cloud computing – Using a remote server or a network of remote servers hosted on the web to
            store and manage data.
            Commercial off-the-shelf software – COTS is software that is published and made commercially
            available to the general public.

            Competitor – A person, company, team or entity that competes against another entity or person.

            Computer assisted auditing techniques – CAAT is the employment of computers and
            technologies to automate one or more audit procedures or processes. CAATs have the potential
            to change the audit from routine documentation of the audit trail (numbers and documents) to
            analysis of the evidence (in digital form).



            © 2019 Association of International Certified Professional Accountants. All rights reserved.    Glossary 2
   141   142   143   144   145   146   147   148   149   150   151