FR | NL | EN
   About us     Contact     Glossary index     Sitemap   
 
   HOME     AUDIT     ADVISORY     REFERENCES     NEWS     KNOWLEDGE   





   Home >  KNOWLEDGE CENTER > GLOSSARY

 GLOSSARY     Print

Qualified Advice Partners, your program, program and governance advisor is presenting you this glossary on governance, risk and control concepts and terms.

[end_intro]

Click on the desired term in the list to view its definition.  The Glossary index contains a word index to this glossary.

 › Acceptable Use Policy (AUP)     Print

 › Access control     Print

 › Accountability     Print

 › Accuracy     Print

 › Adequate control     Print

 › Agile Project Management     Print

 › Alignability Process Model     Print

 › Anonymisation     Print

 › Application control     Print

 › Appropriateness     Print

 › Asset     Print

 › Association Française de l'Audit et du conseil Informatique (AFAI) | France     Print

 › Assurance     Print

 › AS/NZS4360 - Risk Management Process     Print

 › Audit     Print

 › Audit brief     Print

 › Audit charter     Print

 › Audit code of ethics     Print

 › Audit committee     Print

 › Audit Committee of the Federal Administration (ACFA) | Belgium     Print

 › Audit evidence     Print

 › Audit finding     Print

 › Audit firm     Print

 › Audit follow up review     Print

 › Audit opinion     Print

 › Audit risk     Print

 › Audit standard     Print

 › Audit trail     Print

 › Audit universe     Print

 › Audit working papers     Print

 › Authentication     Print

 › Authorised Economic Operator (AEO) | Europe      Print

 › Availability     Print

 › Backup     Print

 › Balanced Scorecard (BSC)     Print

 › Banking, Finance and Insurance Commission (CBFA) | Belgium     Print

 › Basel II     Print

 › Benchmarking     Print

 › Best practice     Print

 › Board of Directors     Print

 › British Standards Institution (BSI) | UK     Print

 › BS 25999 - Business Continuity Management (BCM)     Print

 › BSI IT-Grundschutz      Print

 › Business Case     Print

 › Business Continuity Planning (BCP)     Print

 › Capability Maturity Model® Integration (CMMI)     Print

 › Centre of Excellence in Information and Communication Technologies (CETIC) | Belgium     Print

 › Certified in Risk and Information Systems Control (CRISC)     Print

 › Certified in the Governance of Enterprise IT (CGEIT)     Print

 › Certified Internal Auditor (CIA)     Print

 › Cloud Computing     Print

 › Cloud Security Alliance (CSA)     Print

 › Club informatique des grandes entreprises (Cigref) | France     Print

 › COBIT 5     Print

 › COBIT 5 for Information Security     Print

 › CobiT domains and processes (COBIT 5 / 4.1)     Print

 › CobiT Online     Print

 › CobiT Quickstart     Print

 › Commission for the Protection of Privacy (CPP) | Belgium     Print

 › Common Assessment Framework (CAF)     Print

 › Common Security Framework (CSF)     Print

 › Company Secretary     Print

 › Compliance     Print

 › Completeness     Print

 › Comply or explain     Print

 › Confidentiality     Print

 › Conflict of interest     Print

 › Context     Print

 › Control     Print

 › Control activities     Print

 › Control baseline     Print

 › Control deficiency     Print

 › Control environment     Print

 › Control framework     Print

 › Control objective     Print

 › Control Objectives for Information and related Technology (CobiT)     Print

 › Control process     Print

 › Control weakness     Print

 › Corporate Governance     Print

 › Corporate Governance Committee | Belgium     Print

 › Corporate governance, risk management and regulatory compliance (GRC)     Print

 › Corrective control     Print

 › COSO | US     Print

 › COSO Enterprise Risk Management (ERM)     Print

 › Critical infrastructure     Print

 › Critical Success Factor (CSF)     Print

 › Customer-Chain Operations Reference-model (CCOR)     Print

 › Cyber attack     Print

 › Cybersecurity     Print

 › Data Governance     Print

 › Data quality      Print

 › Define, Measure, Analyse, Design, and Verify (DMADV)     Print

 › Define, Measure, Analyse, Improve, Control (DMAIC)     Print

 › De-identification     Print

 › Deming cycle (PDCA)     Print

 › Design deficiency     Print

 › Detective control     Print

 › Directive controls     Print

 › Disclosure controls     Print

 › Dynamic Systems Development Method (DSDM)     Print

 › Earned Value Management (EVM)     Print

 › Economic risk     Print

 › Effectiveness     Print

 › Efficiency     Print

 › Engagement     Print

 › Engagement work program     Print

 › Engineering, Procurement and Construction (EPC)     Print

 › Engineering, Procurement and Construction Management (EPCM)     Print

 › Enterprise Risk Management (ERM)     Print

 › Error     Print

 › Ethics     Print

 › European Confederation of Directors' Associations (ecoDa) | Europe     Print

 › European Corporate Governance Institute (ECGI) | Europe     Print

 › European Network and Information Security Agency (ENISA) | Europe     Print

 › European People Governance Network (EPEGON) | Europe     Print

 › External risk     Print

 › Fiduciary     Print

 › Financial reporting     Print

 › Fraud     Print

 › General control     Print

 › Global Network of Director Institutes (GNDI) | World     Print

 › Global Risk and Control (GRC)     Print

 › Global Technology Audit Guide (GTAG)     Print

 › Good practice     Print

 › Governance     Print

 › Governance risk     Print

 › Governing Body     Print

 › Global Privacy Enforcement Network (GPEN) | World     Print

 › GUBERNA | Belgium     Print

 › Guide to the Assessment of IT Risk (GAIT) series     Print

 › Guideline     Print

 › Health Insurance Portability and Accountability Act (HIPAA) | US     Print

 › HERMES     Print

 › Impact     Print

 › Impairment     Print

 › Incident     Print

 › Incident management     Print

 › Independence     Print

 › Information security     Print

 › Information Security Forum (ISF)     Print

 › Information security management (ISM)     Print

 › Information Security Management System (ISMS)     Print

 › Information Systems Security Association (ISSA)     Print

 › Information Technology Infrastructure Library (ITIL)     Print

 › Infrastructure risk     Print

 › Inspection     Print

 › Institut de la Gouvernance des Systèmes d'Information (IGSI) | France     Print

 › Institut Français de l'Audit et du Contrôle Internes (IFACI) | France     Print

 › Institute of Internal Auditors (IIA) | World     Print

 › Institute of Internal Auditors Belgium (IIABEL) | Belgium     Print

 › Institute of Registered Auditors (IBR-IRE) | Belgium     Print

 › Integrity     Print

 › Intentional risk     Print

 › Internal audit     Print

 › Internal control     Print

 › Internal Controls over Financial Reporting (ICFR)     Print

 › International Association of Privacy Professionals (IAPP) | World     Print

 › International Auditing and Assurance Standards Board (IAASB) | World     Print

 › International Federation of Consulting Engineers (FIDIC) | World     Print

 › International Information Systems Security Certification Consortium (ISC2) | World     Print

 › International Organization for Standardization (ISO) | World     Print

 › International Organization of Supreme Audit Institutions (INTOSAI) | World     Print

 › International Standards on Auditing (ISA)     Print

 › Irregularity     Print

 › ISACA | World     Print

 › ISACA Belgium | Belgium     Print

 › ISACA code of professional ethics     Print

 › ISO 10006 - Quality management in projects     Print

 › ISO 10014 - Quality management - Guidelines for realizing financial and economic benefits     Print

 › ISO 13335 - Information technology -- Security techniques     Print

 › ISO 15504 - Process capability assessment      Print

 › ISO 15801 - Recommendations for trustworthiness and reliability of information stored electronically     Print

 › ISO19761 - COSMIC-FFP -- A functional size measurement method     Print

 › ISO19761 - COSMIC-FFP -- A functional size measurement method     Print

 › ISO 19770 - Software Asset Management     Print

 › ISO 20000 - IT Service Management     Print

 › ISO 27000 - Information Security Standards     Print

 › ISO 27002 - Best practice on information security management     Print

 › ISO 31000 - Risk management     Print

 › ISO 38500 - IT Governance Standard     Print

 › IT audit     Print

 › IT Assurance Framework (ITAF)      Print

 › IT Balanced Scorecard     Print

 › IT controls     Print

 › IT general controls (ITGC)     Print

 › IT Governance     Print

 › IT Governance Institute (ITGI)     Print

 › IT risk     Print

 › IT Service Management (ITSM)     Print

 › IT Service Management Forum (itSMF)     Print

 › Key control     Print

 › Key Performance Indicators (KPI)     Print

 › Kobayashi’s 20 keys     Print

 › Lean Six Sigma     Print

 › Lessons learned     Print

 › Level of risk     Print

 › Likelihood     Print

 › Financial Security Law of France (LSF) | France     Print

 › Management of Risk (M_o_R)     Print

 › Managing Successful Programmes (MSP)      Print

 › Maintainability     Print

 › Material weakness     Print

 › National Institute of Standards and Technology (NIST) | US     Print

 › Objectivity     Print

 › Office of Government Commerce (OGC) | UK     Print

 › Open Compliance and Ethics Group (OCEG)     Print

 › Open Web Application Security Project (OWASP)     Print

 › Operational deficiency     Print

 › Operational risk     Print

 › Organisation for Economic Co-operation and Development (OECD) | World     Print

 › Outsourcing     Print

 › Payment Card Industry Data Security Standard (PCI DSS)     Print

 › People Governance     Print

 › Performance      Print

 › Performance audit     Print

 › Performance management     Print

 › Personal Health Record (PHR)     Print

 › Personally Identifiable Information (PII)     Print

 › Policy     Print

 › Portfolio, Programme & Project Management Maturity Model (P3M3™)     Print

 › Preventive control     Print

 › Privacy     Print

 › PRINCE2     Print

 › Professional Risk Managers' International Association (PRMIA) | World     Print

 › Project     Print

 › Project management     Print

 › Project Management Body of Knowledge (PMBOK)     Print

 › Project Management Institute (PMI) | World     Print

 › Public Company Accounting Oversight Board (PCAOB) | US     Print

 › Qualified Audit Opinion     Print

 › RACI (Responsible, Accountable, Consulted, Informed) Matrix     Print

 › Ransomware     Print

 › Public Research Centre Henri Tudor | Luxemburg     Print

 › Reasonable assurance     Print

 › Recommendation     Print

 › Recovery     Print

 › Reliability     Print

 › Residual risk     Print

 › Resilience     Print

 › Response     Print

 › Responsibility assignment matrix (RACI)     Print

 › Risk     Print

 › Risk appetite     Print

 › Risk evaluation     Print

 › Risk based auditing     Print

 › Risk IT     Print

 › Risk management     Print

 › Risk tolerance     Print

 › Risk treatment     Print

 › Safe_Harbor | US     Print

 › Sarbanes-Oxley Act (SOX) | US     Print

 › SAS 70 - Outsourcing Service Audit     Print

 › Securities and Exchange Commission (SEC) | US     Print

 › Security      Print

 › Security policy     Print

 › Segregation of duties (SoD)     Print

 › Sensitivity     Print

 › Service     Print

 › Service assets     Print

 › Service manager     Print

 › Serviceability     Print

 › Should     Print

 › Six Change Approaches - Kotter and Schlesinger     Print

 › Six Sigma     Print

 › Skills Framework for the Information Age (SFIA) | UK     Print

 › Society of Corporate Compliance and Ethics (SCCE) | World     Print

 › Software Process Improvement and Capability Determination (SPICE)     Print

 › Stakeholder     Print

 › Standard     Print

 › Statutory audit     Print

 › Statutory auditor     Print

 › Strategy     Print

 › Strategy risk     Print

 › Sufficiency     Print

 › The Open Group Architecture Framework (TOGAF)     Print

 › Three lines of defence (TLD)     Print

 › Tone From the Top     Print

 › Total Productive Maintenance (TPM)     Print

 › Trusted Third Party (TTP)     Print

 › Tudor's IT Process Assessment (TIPA) | Luxemburg     Print

 › Unqualified audit opinion     Print

 › Supply-Chain Operations Reference (SCOR)     Print

 › Val IT     Print

 › Validity     Print

 › Value     Print

 › Value Stream Mapping (VSM)     Print

 › Vulnerability     Print

<<<
QAP © 2010 | advice[at]qap.eu | audit[at]qap.eu
   Audit     Advisory     Training     Change     Disclaimer     Copyright   
pen4web