FR | NL | EN
   Qui sommes nous?     Contact     Glossary index     Carte du site   
 
   ACCUEIL     AUDIT     CONSEIL     RÉFÉRENCES     NOUVELLES     KNOWLEDGE   



Menu
AUDIT INFORMATIQUE
CONSEIL INFORMATIQUE
FORMATIONS INFORMATIQUES ET EN AUDIT
RÉFÉRENCES
QUI SOMMES NOUS?
NOUVELLES
KNOWLEDGE CENTER


   Home > Glossary index

Glossary index     Print

Cet index couvre le glossaire de gouvernance, risque et contrôle.  Il renvoie vers des définitions en anglais..

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
»
 
   › 27000
         › ISO 27000 - Information Security Standards


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
A
 
   › Accords
         › Basel II
 
   › Accuracy
         › Accuracy
 
   › Activités
         › Control activities
 
   › Adéquat
         › Adequate control
 
   › Administrateurs
         › European Confederation of Directors' Associations (ecoDa) | Europe
         › GUBERNA | Belgium
 
   › Administration
         › Board of Directors
 
   › Aeo
         › Authorised Economic Operator (AEO) - Opérateur Economique Agréé | Monde
 
   › Afai
         › Association Française de l'Audit et du conseil Informatique (AFAI) | France
 
   › Agile_project_management
         › Agile Project Management
 
   › Alignability_process_model
         › Alignability Process Model
 
   › Alignement
         › Alignability Process Model
 
   › Amélioration
         › Define, Measure, Analyse, Improve, Control (DMAIC)
 
   › Analyse
         › Define, Measure, Analyse, Design, and Verify (DMADV)
         › Define, Measure, Analyse, Improve, Control (DMAIC)
 
   › Anonymisation
         › Anonymisation
 
   › Appétit_risque
         › Risk appetite
 
   › Application
         › Application control
         › Open Web Application Security Project (OWASP)
 
   › Applique
         › Comply or explain
 
   › Aptitude_de_processus
         › ISO 15504 - Process capability assessment
 
   › Aptitude_de_service
         › Serviceability
 
   › As
         › AS/NZS 4360 - Risk Management Process
 
   › Association_française_de_l_audit_et_du_conseil_inf
         › Association Française de l'Audit et du conseil Informatique (AFAI) | France
 
   › Assurance
         › Assurance
 
   › Assurance_raisonable
         › Reasonable assurance
 
   › Attack
         › Cyber attack
 
   › Audit
         › Audit
         › Audit brief
         › Audit charter
         › Audit code of ethics
         › Audit finding
         › Audit follow up review
         › Audit risk
         › Audit standard
         › Audit trail
         › Audit universe
         › Audit working papers
         › Global Technology Audit Guide (GTAG)
         › Internal audit
         › ISACA Belgium | Belgium
         › IT audit
         › Performance audit
         › Risk based auditing
 
   › Auditeur
         › Certified Internal Auditor (CIA)
         › Institute of Internal Auditors Belgium (IIABEL) | Belgium
 
   › Auditeur_statutaire
         › Statutory auditor
 
   › Auditors
         › Institute of Internal Auditors (IIA) | World
         › Institute of Registered Auditors (IBR-IRE) | Belgium
 
   › Audit_statutaire
         › Statutory audit
 
   › Authentification
         › Authentication
 
   › Autorité
         › Accountability
         › Responsibility assignment matrix (RACI)
 
   › Auto_évaluation
         › Common Assessment Framework (CAF)
 
   › Avoir
         › ISO 19770 - Software Asset Management
         › Service assets


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
B
 
   › Backup
         › Backup
 
   › Basel
         › Basel II
 
   › Baseline
         › Control baseline
 
   › Bcm
         › BS 25999 - Business Continuity Management (BCM)
 
   › Belgique
         › Banking, Finance and Insurance Commission (CBFA) | Belgium
         › Corporate Governance Committee | Belgium
         › GUBERNA | Belgium
         › ISACA Belgium | Belgium
 
   › Benchmarking
         › Benchmarking
 
   › Bénéfices
         › ISO 10014 - Quality management - Guidelines for realizing financial and economic benefits
 
   › Bien
         › Asset
 
   › Body
         › Governing Body
 
   › Bonne_pratique
         › Best practice
         › Good practice
 
   › Bord
         › Balanced Scorecard (BSC)
 
   › British_standard_institution
         › British Standards Institution (BSI) | UK
 
   › Bs
         › BS 25999 - Business Continuity Management (BCM)
 
   › Bs25999
         › BS 25999 - Business Continuity Management (BCM)
 
   › Bsi
         › British Standards Institution (BSI) | UK
 
   › Business_case
         › Business Case


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
C
 
   › Ca
         › Board of Directors
 
   › Caaf
         › Audit Committee of the Federal Administration (ACFA) | Belgium
 
   › Cadre_d_auto_évalaution_de_la_fonction_publique
         › Common Assessment Framework (CAF)
 
   › Caf
         › Common Assessment Framework (CAF)
 
   › Capability_maturity_model_integration
         › Capability Maturity Model® Integration (CMMI)
 
   › Cartographie_de_la_chaîne_de_valeur
         › Value Stream Mapping (VSM)
 
   › Cbfa
         › Banking, Finance and Insurance Commission (CBFA) | Belgium
 
   › Ccor
         › Customer-Chain Operations Reference-model (CCOR)
 
   › Ccv
         › Value Stream Mapping (VSM)
 
   › Centre_de_recherche_publique_henri_tudor
         › Public Research Centre Henri Tudor | Luxemburg
 
   › Centre_d_excellence_en_technologies_de_
         › Centre of Excellence in Information and Communication Technologies (CETIC) | Belgium
 
   › Certification
         › Certified in Risk and Information Systems Control (CRISC)
         › Certified Internal Auditor (CIA)
         › SAS 70 - Outsourcing Service Audit
 
   › Certified_in_risk_and_information_systems_control
         › Certified in Risk and Information Systems Control (CRISC)
 
   › Certified_in_the_governance_of_enterprise_it
         › Certified in the Governance of Enterprise IT (CGEIT)
 
   › Cetic
         › Centre of Excellence in Information and Communication Technologies (CETIC) | Belgium
 
   › Cgeit
         › Certified in the Governance of Enterprise IT (CGEIT)
 
   › Chain
         › Supply-Chain Operations Reference (SCOR)
 
   › Chain_operations_reference
         › Customer-Chain Operations Reference-model (CCOR)
 
   › Changement
         › Six Change Approaches - Kotter and Schlesinger
 
   › Charte
         › Audit charter
 
   › Cia
         › Certified Internal Auditor (CIA)
 
   › Cloud_computing
         › Cloud Computing
         › Cloud Security Alliance (CSA)
 
   › Club_informatique
         › Club informatique des grandes entreprises (Cigref) | France
 
   › Cmmi
         › Capability Maturity Model® Integration (CMMI)
 
   › Cobit
         › CobiT Online
         › CobiT Quickstart
         › Control Objectives for Information and related Technology (CobiT)
         › Good practice
 
   › Cobit_4
         › CobiT domains and processes (COBIT 5 / 4.1)
         › CobiT Quickstart
 
   › Cobit_5
         › COBIT 5
         › COBIT 5 for Information Security
         › CobiT domains and processes (COBIT 5 / 4.1)
         › Risk IT
         › Val IT
 
   › Code
         › Audit code of ethics
         › ISACA code of professional ethics
 
   › Comité_d_audit
         › Audit committee
 
   › Comité_d_audit_de_l_administration_fédérale
         › Audit Committee of the Federal Administration (ACFA) | Belgium
 
   › Commission
         › Securities and Exchange Commission (SEC) | US
 
   › Commission_bancaire_financière_et_des_assurances
         › Banking, Finance and Insurance Commission (CBFA) | Belgium
 
   › Commission_corporate_governance
         › Corporate Governance Committee | Belgium
 
   › Commission_de_la_protection_de_la_vie_privée
         › Commission for the Protection of Privacy (CPP) | Belgium
 
   › Common_security_framework
         › Common Security Framework (CSF)
 
   › Company
         › Company Secretary
 
   › Completeness
         › Completeness
 
   › Compliance
         › Corporate governance, risk management and regulatory compliance (GRC)
 
   › Conception
         › Define, Measure, Analyse, Design, and Verify (DMADV)
         › Six Sigma
 
   › Confiance
         › ISO 15801 - Recommendations for trustworthiness and reliability of information stored electronically
 
   › Confidentialité
         › Confidentiality
 
   › Conflit
         › Conflict of interest
 
   › Conformité
         › Compliance
 
   › Conseil
         › Board of Directors
 
   › Conseils
         › International Federation of Consulting Engineers (FIDIC) | World
 
   › Constat
         › Audit finding
 
   › Context
         › Context
 
   › Continuité
         › BS 25999 - Business Continuity Management (BCM)
 
   › Control
         › Control baseline
         › Control deficiency
         › Control environment
         › Control objective
         › Control weakness
         › Corrective control
         › Detective control
         › General control
         › Key control
         › Preventive control
 
   › Contrôle
         › Adequate control
         › Application control
         › Control
         › Control activities
         › Control framework
         › Define, Measure, Analyse, Improve, Control (DMAIC)
         › Global Risk and Control (GRC)
         › Internal Controls over Financial Reporting (ICFR)
 
   › Controle_d_acces
         › Access control
 
   › Contrôle_interne
         › Internal control
 
   › Controls
         › Directive controls
         › Disclosure controls
 
   › Corporate
         › Corporate Governance
         › Corporate governance, risk management and regulatory compliance (GRC)
         › European Corporate Governance Institute (ECGI) | Europe
 
   › Corpus_des_connaissances_en_gestion_de_projets
         › Project Management Body of Knowledge (PMBOK)
 
   › Corrective
         › Corrective control
 
   › Cosmic
         › ISO 19761 - COSMIC-FFP -- A functional size measurement method
 
   › Coso
         › COSO | US
         › Tone From the Top
 
   › Cpvp
         › Commission for the Protection of Privacy (CPP) | Belgium
 
   › Crisc
         › Certified in Risk and Information Systems Control (CRISC)
 
   › Critiques
         › Critical Infrastructure
 
   › Csf
         › Common Security Framework (CSF)
 
   › Customer
         › Customer-Chain Operations Reference-model (CCOR)
 
   › Cyber
         › Cyber attack
 
   › Cybersécurité
         › Cybersecurity
 
   › Cycle_deming
         › Deming cycle (PDCA)


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
D
 
   › De
         › De-identification
         › Three lines of defence (TLD)
 
   › Défense
         › Three lines of defence (TLD)
 
   › Déficience_de_conception
         › Design deficiency
 
   › Deficiency
         › Control deficiency
         › Operational deficiency
 
   › Définition
         › Define, Measure, Analyse, Design, and Verify (DMADV)
         › Define, Measure, Analyse, Improve, Control (DMAIC)
 
   › Detective
         › Detective control
 
   › Développement
         › Organisation for Economic Co-operation and Development (OECD) | World
 
   › Devrait
         › Should
 
   › Directive
         › Directive controls
         › Guideline
 
   › Disclosure
         › Disclosure controls
 
   › Disponibilité
         › Availability
 
   › Dmadv
         › Define, Measure, Analyse, Design, and Verify (DMADV)
 
   › Dmaic
         › Define, Measure, Analyse, Improve, Control (DMAIC)
 
   › Dmp
         › Personal Health Record (PHR)
 
   › Données
         › Data Governance
         › Data quality
 
   › Dossier_médical_personnel
         › Personal Health Record (PHR)
 
   › Dsdm
         › Dynamic Systems Development Method (DSDM)
 
   › Dss
         › Payment Card Industry Data Security Standard (PCI DSS)
 
   › Du
         › Payment Card Industry Data Security Standard (PCI DSS)
 
   › Dynamic_systems_development_method
         › Dynamic Systems Development Method (DSDM)


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
E
 
   › Ecgi
         › European Corporate Governance Institute (ECGI) | Europe
 
   › Ecoda
         › European Confederation of Directors' Associations (ecoDa) | Europe
 
   › Economic
         › Economic risk
 
   › Efficace
         › Effectiveness
 
   › Efficacité
         › Effectiveness
 
   › Efficiency
         › Efficiency
 
   › Efficient
         › Efficiency
 
   › Engagement
         › Engagement
 
   › Engagement_work_program
         › Engagement work program
 
   › Engineering_procurement_and_construction
         › Engineering, Procurement and Construction (EPC)
 
   › Engineering_procurement_and_construction_managemen
         › Engineering, Procurement and Construction Management (EPCM)
 
   › Enisa
         › European Network and Information Security Agency (ENISA) | Europe
 
   › Enterprise
         › COSO Enterprise Risk Management (ERM)
 
   › Entreprise
         › Enterprise Risk Management (ERM)
 
   › Environment
         › Control environment
 
   › Epc
         › Engineering, Procurement and Construction (EPC)
 
   › Epcm
         › Engineering, Procurement and Construction Management (EPCM)
 
   › Epegon
         › European People Governance Network (EPEGON) | Europe
 
   › Erm
         › COSO Enterprise Risk Management (ERM)
         › Enterprise Risk Management (ERM)
 
   › Error
         › Error
 
   › Ethics
         › Audit code of ethics
         › Ethics
         › ISACA code of professional ethics
 
   › Europe
         › European Confederation of Directors' Associations (ecoDa) | Europe
 
   › European
         › European Corporate Governance Institute (ECGI) | Europe
         › European People Governance Network (EPEGON) | Europe
 
   › European_network_information_security_agency
         › European Network and Information Security Agency (ENISA) | Europe
 
   › Evaluation
         › ISO 15504 - Process capability assessment
 
   › Evm
         › Earned Value Management (EVM)
 
   › Exchange
         › Securities and Exchange Commission (SEC) | US
 
   › Explique
         › Comply or explain
 
   › External
         › External risk
 
   › Externalisation
         › Outsourcing
         › SAS 70 - Outsourcing Service Audit


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
F
 
   › Facteurs_critique_de_succès
         › Critical Success Factor (CSF)
 
   › Fédération_internationale_des_ingénieurs
         › International Federation of Consulting Engineers (FIDIC) | World
 
   › Fiabilité
         › ISO 15801 - Recommendations for trustworthiness and reliability of information stored electronically
         › Reliability
 
   › Fidic
         › International Federation of Consulting Engineers (FIDIC) | World
 
   › Fiduciaire
         › Fiduciary
 
   › Finances
         › ISO 10014 - Quality management - Guidelines for realizing financial and economic benefits
 
   › Financial
         › Financial reporting
 
   › Financier
         › Internal Controls over Financial Reporting (ICFR)
 
   › Financière
         › Loi de sécurité financière (LSF) | France
 
   › Follow
         › Audit follow up review
 
   › Fonctionnel
         › ISO 19761 - COSMIC-FFP -- A functional size measurement method
 
   › France
         › Club informatique des grandes entreprises (Cigref) | France
         › Institut de la Gouvernance des Systèmes d'Information (IGSI) | France
         › Loi de sécurité financière (LSF) | France
 
   › Fraud
         › Fraud


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
G
 
   › Gait
         › Guide to the Assessment of IT Risk (GAIT) series
 
   › General
         › General control
 
   › Gestion
         › Enterprise Risk Management (ERM)
 
   › Gestion_des_incidents
         › Incident management
 
   › Gestion_de_la_performance
         › Performance management
 
   › Gestion_de_projet
         › Project management
 
   › Gestion_du_risque
         › ISO 31000 - Risk management
         › Management of Risk (M_o_R)
 
   › Gestion_du_service
         › ISO 20000 - IT Service Management
 
   › Global_network_of_director_institutes
         › Global Network of Director Institutes (GNDI) | World
 
   › Global_pricavy_enforcement_network
         › Global Pricavy Enforcement Network (GPEN) | World
 
   › Gndi
         › Global Network of Director Institutes (GNDI) | World
 
   › Gouvernance
         › Data Governance
         › Governance
         › Governance risk
         › Institut de la Gouvernance des Systèmes d'Information (IGSI) | France
 
   › Gouvernance_humaine
         › People Governance
 
   › Gouvernance_informatique
         › ISO 38500 - IT Governance Standard
         › IT Governance
         › Val IT
 
   › Governance
         › Corporate Governance
         › Corporate governance, risk management and regulatory compliance (GRC)
         › European Corporate Governance Institute (ECGI) | Europe
         › European People Governance Network (EPEGON) | Europe
         › IT Governance Institute (ITGI) | US
 
   › Governing
         › Governing Body
 
   › Gpen
         › Global Pricavy Enforcement Network (GPEN) | World
 
   › Grandes_entreprises
         › Club informatique des grandes entreprises (Cigref) | France
 
   › Grc
         › Corporate governance, risk management and regulatory compliance (GRC)
         › Global Risk and Control (GRC)
 
   › Grundschutz
         › BSI IT-Grundschutz
 
   › Gtag
         › Global Technology Audit Guide (GTAG)
 
   › Guberna
         › GUBERNA | Belgium


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
H
 
   › Health_insurance_portability_and_accountability_ac
         › Health Insurance Portability and Accountability Act (HIPAA) | US
 
   › Hermes
         › HERMES
 
   › Hipaa
         › Health Insurance Portability and Accountability Act (HIPAA) | US


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
I
 
   › Iaasb
         › International Auditing and Assurance Standards Board (IAASB) | World
 
   › Iapp
         › International Association of Privacy Professionals (IAPP) | World
 
   › Ibr
         › Institute of Registered Auditors (IBR-IRE) | Belgium
 
   › Icfr
         › Internal Controls over Financial Reporting (ICFR)
 
   › Identification
         › De-identification
 
   › Ifaci
         › Institut Français de l'Audit et du Contrôle Internes (IFACI) | France
 
   › Igsi
         › Institut de la Gouvernance des Systèmes d'Information (IGSI) | France
 
   › Iia
         › Institut Français de l'Audit et du Contrôle Internes (IFACI) | France
         › Institute of Internal Auditors (IIA) | World
 
   › Iiabel
         › Institute of Internal Auditors Belgium (IIABEL) | Belgium
 
   › Impact
         › Impact
         › Risk
 
   › Impairment
         › Impairment
 
   › Incident
         › Incident
 
   › Indépendance
         › Independence
 
   › Indicateurs_clé_de_performance
         › Key Performance Indicators (KPI)
 
   › Information
         › Information security
         › Information security management (ISM)
         › Institut de la Gouvernance des Systèmes d'Information (IGSI) | France
         › ISO 15801 - Recommendations for trustworthiness and reliability of information stored electronically
         › ISO 27000 - Information Security Standards
         › ISO 27002 - Best practice on information security management
 
   › Informations_personnelles_identifiables
         › Personally Identifiable Information (PII)
 
   › Information_security
         › COBIT 5 for Information Security
 
   › Information_systems_security_association
         › Information Systems Security Association (ISSA)
 
   › Information_technology_infrastructure_library
         › Information Technology Infrastructure Library (ITIL)
 
   › Informatique
         › Global Technology Audit Guide (GTAG)
         › Guide to the Assessment of IT Risk (GAIT) series
         › ISO 13335 - Information technology -- Security techniques
         › ISO 20000 - IT Service Management
         › Risk IT
 
   › Infrastructure
         › Infrastructure risk
 
   › Infrstructures
         › Critical Infrastructure
 
   › Inspection
         › Inspection
 
   › Institut
         › Institut de la Gouvernance des Systèmes d'Information (IGSI) | France
         › Institute of Internal Auditors Belgium (IIABEL) | Belgium
 
   › Institute
         › European Corporate Governance Institute (ECGI) | Europe
         › Institute of Internal Auditors (IIA) | World
         › Institute of Registered Auditors (IBR-IRE) | Belgium
         › IT Governance Institute (ITGI) | US
 
   › Institut_français_de_l_audit_et_du_contrôle_intern
         › Institut Français de l'Audit et du Contrôle Internes (IFACI) | France
 
   › Integrité
         › Integrity
 
   › Interêt
         › Conflict of interest
 
   › Internal
         › Institute of Internal Auditors (IIA) | World
         › Internal audit
 
   › International_association_of_privacy_professionals
         › International Association of Privacy Professionals (IAPP) | World
 
   › International_auditing_and_assurance_standard_boar
         › International Auditing and Assurance Standards Board (IAASB) | World
 
   › International_information_systems_security_certifi
         › International Information Systems Security Certification Consortium (ISC2) | World
 
   › International_standard_auditing
         › International Standards on Auditing (ISA)
 
   › Interne
         › Institute of Internal Auditors Belgium (IIABEL) | Belgium
         › Internal Controls over Financial Reporting (ICFR)
 
   › Intosai
         › International Organization of Supreme Audit Institutions (INTOSAI) | World
 
   › Ipi
         › Personally Identifiable Information (PII)
 
   › Ire
         › Institute of Registered Auditors (IBR-IRE) | Belgium
 
   › Irregularity
         › Irregularity
 
   › Isa
         › International Standards on Auditing (ISA)
 
   › Isaca
         › ISACA Belgium | Belgium
         › ISACA code of professional ethics
         › ISACA | World
 
   › Isc2
         › International Information Systems Security Certification Consortium (ISC2) | World
 
   › Isf
         › Information Security Forum (ISF)
 
   › Ism
         › Information security management (ISM)
 
   › Isms
         › Information Security Management System (ISMS)
 
   › Iso
         › International Organization for Standardization (ISO) | World
         › ISO 10006 - Quality management in projects
         › ISO 10014 - Quality management - Guidelines for realizing financial and economic benefits
         › ISO 13335 - Information technology -- Security techniques
         › ISO 15504 - Process capability assessment
         › ISO 15801 - Recommendations for trustworthiness and reliability of information stored electronically
         › ISO 19761 - COSMIC-FFP -- A functional size measurement method
         › ISO 19770 - Software Asset Management
         › ISO 20000 - IT Service Management
         › ISO 27000 - Information Security Standards
         › ISO 27002 - Best practice on information security management
         › ISO 31000 - Risk management
         › ISO 38500 - IT Governance Standard
 
   › Iso_27000
         › Good practice
 
   › Issa
         › Information Systems Security Association (ISSA)
 
   › It
         › IT Governance Institute (ITGI) | US
 
   › Itaf
         › IT Assurance Framework (ITAF)
 
   › Itgc
         › IT general controls (ITGC)
 
   › Itgi
         › IT Governance Institute (ITGI) | US
 
   › Itil
         › Good practice
         › Information Technology Infrastructure Library (ITIL)
         › Service assets
         › Service manager
 
   › Itsm
         › IT Service Management (ITSM)
 
   › Itsmf
         › IT Service Management Forum (itSMF)
 
   › It_controls
         › IT controls
 
   › It_general_controls
         › IT general controls (ITGC)
 
   › It_service_management
         › IT Service Management (ITSM)
 
   › It_service_management_forum
         › IT Service Management Forum (itSMF)


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
K
 
   › Key
         › Key control
 
   › Keys
         › Kobayashi’s 20 keys
 
   › Kobayashi
         › Kobayashi’s 20 keys
 
   › Kotter
         › Six Change Approaches - Kotter and Schlesinger
 
   › Kpi
         › Key Performance Indicators (KPI)


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
L
 
   › Lean
         › Lean Six Sigma
 
   › Level
         › Level of risk
 
   › Lignes
         › Three lines of defence (TLD)
 
   › Loi
         › Loi de sécurité financière (LSF) | France
 
   › Lrc
         › Responsibility assignment matrix (RACI)
 
   › Lsf
         › Loi de sécurité financière (LSF) | France
 
   › L_information_et_de_la_communication
         › Centre of Excellence in Information and Communication Technologies (CETIC) | Belgium


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
M
 
   › Maintenabilité
         › Maintainability
 
   › Management
         › Corporate governance, risk management and regulatory compliance (GRC)
         › COSO Enterprise Risk Management (ERM)
         › Information security management (ISM)
 
   › Management_of_risk
         › Management of Risk (M_o_R)
 
   › Managing_successful_programmes
         › Managing Successful Programmes (MSP)
 
   › Material
         › Material weakness
 
   › Maturité
         › Portfolio, Programme & Project Management Maturity Model (P3M3™)
 
   › Mesure
         › Define, Measure, Analyse, Design, and Verify (DMADV)
         › ISO 19761 - COSMIC-FFP -- A functional size measurement method
 
   › Mesurer
         › Define, Measure, Analyse, Improve, Control (DMAIC)
 
   › Méthode_de_la_valeur_acquise
         › Earned Value Management (EVM)
 
   › Model
         › Customer-Chain Operations Reference-model (CCOR)
 
   › Msp
         › Managing Successful Programmes (MSP)
 
   › M_o_r
         › Management of Risk (M_o_R)


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
N
 
   › Network
         › European People Governance Network (EPEGON) | Europe
 
   › Nist
         › National Institute of Standards and Technology (NIST) | US
 
   › Nzs4360
         › AS/NZS 4360 - Risk Management Process


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
O
 
   › Objective
         › Control objective
 
   › Objectivity
         › Objectivity
 
   › Ocde
         › Organisation for Economic Co-operation and Development (OECD) | World
 
   › Oceg
         › Open Compliance and Ethics Group (OCEG)
 
   › Of
         › Institute of Registered Auditors (IBR-IRE) | Belgium
 
   › Office_of_government_commerce
         › Office of Government Commerce (OGC) | UK
 
   › Ogc
         › Office of Government Commerce (OGC) | UK
 
   › Online
         › CobiT Online
 
   › Open_compliance_ethics_group
         › Open Compliance and Ethics Group (OCEG)
 
   › Opérateur_economique_agréé
         › Authorised Economic Operator (AEO) - Opérateur Economique Agréé | Monde
 
   › Operational
         › Operational deficiency
 
   › Opinion_avec_réserve
         › Qualified Audit Opinion
 
   › Opinion_d_audit
         › Audit opinion
         › Qualified Audit Opinion
         › Unqualified audit opinion
 
   › Opinion_sans_réserve
         › Unqualified audit opinion
 
   › Organisation_internationale_des_institutions_supér
         › International Organization of Supreme Audit Institutions (INTOSAI) | World
 
   › Organisation_internationale_de_normalisation
         › International Organization for Standardization (ISO) | World
 
   › Organisation_pour_la_coopération_économique_et_le
         › Organisation for Economic Co-operation and Development (OECD) | World
 
   › Outsourcing
         › Outsourcing
         › SAS 70 - Outsourcing Service Audit
 
   › Owasp
         › Open Web Application Security Project (OWASP)


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
P
 
   › Paiement
         › Payment Card Industry Data Security Standard (PCI DSS)
 
   › Papers
         › Audit working papers
 
   › Partie
         › Stakeholder
 
   › Pca
         › BS 25999 - Business Continuity Management (BCM)
         › Business Continuity Planning (BCP)
 
   › Pcaob
         › Public Company Accounting Oversight Board (PCAOB) | US
 
   › Pci
         › Payment Card Industry Data Security Standard (PCI DSS)
 
   › Pdca
         › Deming cycle (PDCA)
 
   › People
         › European People Governance Network (EPEGON) | Europe
 
   › Performance
         › Performance
         › Performance audit
 
   › Pertinence
         › Appropriateness
 
   › Plan_continuité_d_activité
         › Business Continuity Planning (BCP)
 
   › Plan_de_continuité_d_activité
         › BS 25999 - Business Continuity Management (BCM)
 
   › Pmbok
         › Project Management Body of Knowledge (PMBOK)
 
   › Pmi
         › Project Management Institute (PMI) | World
 
   › Politique
         › Policy
 
   › Politique_de_sécurité
         › Security policy
 
   › Politique_d_utilisation_acceptable
         › Acceptable Use Policy (AUP)
 
   › Portefeuille
         › Portfolio, Programme & Project Management Maturity Model (P3M3™)
 
   › Prenante
         › Stakeholder
 
   › Preuves_d_audit
         › Audit evidence
 
   › Preventive
         › Preventive control
 
   › Prince_2
         › PRINCE2
 
   › Privacy
         › Privacy
 
   › Prmia
         › Professional Risk Managers' International Association (PRMIA) | World
 
   › Probabilité
         › Likelihood
 
   › Processus
         › Alignability Process Model
         › Define, Measure, Analyse, Improve, Control (DMAIC)
         › Six Sigma
 
   › Processus_de_controle
         › Control process
 
   › Professional
         › ISACA code of professional ethics
 
   › Professional_risk_managers_international_associati
         › Professional Risk Managers' International Association (PRMIA) | World
 
   › Programme
         › Portfolio, Programme & Project Management Maturity Model (P3M3™)
 
   › Project_management_institute
         › Project Management Institute (PMI) | World
 
   › Projet
         › ISO 10006 - Quality management in projects
         › Portfolio, Programme & Project Management Maturity Model (P3M3™)
         › Project
 
   › Prospectif
         › Balanced Scorecard (BSC)
 
   › Pua
         › Acceptable Use Policy (AUP)
 
   › Public_company_accounting_oversight_board
         › Public Company Accounting Oversight Board (PCAOB) | US


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
Q
 
   › Qualité
         › Data quality
         › ISO 10006 - Quality management in projects
         › ISO 10014 - Quality management - Guidelines for realizing financial and economic benefits
 
   › Quickstart
         › CobiT Quickstart


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
R
 
   › Raci
         › Responsibility assignment matrix (RACI)
 
   › Raci_matrix
         › RACI (Responsible, Accountable, Consulted, Informed) Matrix
 
   › Ram
         › Responsibility assignment matrix (RACI)
 
   › Rapports
         › Internal Controls over Financial Reporting (ICFR)
 
   › Recommandation
         › Recommendation
 
   › Récupération
         › Recovery
 
   › Referentiel
         › Common Assessment Framework (CAF)
 
   › Référentiel
         › Control framework
 
   › Registered
         › Institute of Registered Auditors (IBR-IRE) | Belgium
 
   › Regulatory
         › Corporate governance, risk management and regulatory compliance (GRC)
 
   › Reporting
         › Financial reporting
 
   › Residual_risk
         › Residual Risk
 
   › Resilience
         › Resilience
 
   › Responsabilité
         › Responsibility assignment matrix (RACI)
 
   › Response
         › Response
 
   › Retour_d_expérience
         › Lessons learned
 
   › Réviseur_d_entreprise
         › Audit firm
 
   › Rex
         › Lessons learned
 
   › Risk
         › Audit risk
         › Corporate governance, risk management and regulatory compliance (GRC)
         › COSO Enterprise Risk Management (ERM)
         › Economic risk
         › External risk
         › Infrastructure risk
         › IT risk
         › Level of risk
         › Response
         › Strategy risk
 
   › Risk_it
         › Risk IT
 
   › Risk_management
         › Risk management
 
   › Risque
         › Certified in Risk and Information Systems Control (CRISC)
         › Enterprise Risk Management (ERM)
         › Global Risk and Control (GRC)
         › Governance risk
         › Guide to the Assessment of IT Risk (GAIT) series
         › Risk
         › Risk IT
 
   › Risque_intentionel
         › Intentional risk
 
   › Risque_opérationnel
         › Operational risk


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
S
 
   › Safe_harbor
         › Safe_Harbor | US
 
   › Sarbanes_oxley_act
         › Sarbanes-Oxley Act (SOX) | US
 
   › Sas_70
         › SAS 70 - Outsourcing Service Audit
 
   › Scce
         › Society of Corporate Compliance and Ethics (SCCE) | World
 
   › Schlesinger
         › Six Change Approaches - Kotter and Schlesinger
 
   › Scor
         › Supply-Chain Operations Reference (SCOR)
 
   › Secretary
         › Company Secretary
 
   › Sécurité
         › Cloud Security Alliance (CSA)
 
   › Securité
         › European Network and Information Security Agency (ENISA) | Europe
 
   › Sécurité
         › Information security
         › ISO 13335 - Information technology -- Security techniques
         › ISO 27000 - Information Security Standards
         › ISO 27002 - Best practice on information security management
         › Loi de sécurité financière (LSF) | France
 
   › Securité
         › Open Web Application Security Project (OWASP)
 
   › Sécurité
         › Payment Card Industry Data Security Standard (PCI DSS)
 
   › Securité
         › Security
 
   › Sécurité_de_l_information
         › Information Security Forum (ISF)
 
   › Securities
         › Securities and Exchange Commission (SEC) | US
 
   › Security
         › Information security management (ISM)
 
   › Sensibilité
         › Sensitivity
 
   › Séparation_des_fonctions
         › Segregation of duties (SoD)
 
   › Service
         › Service
         › Service assets
         › Service manager
 
   › Sfia
         › Skills Framework for the Information Age (SFIA) | UK
 
   › Six_sigma
         › Define, Measure, Analyse, Design, and Verify (DMADV)
         › Define, Measure, Analyse, Improve, Control (DMAIC)
         › Lean Six Sigma
         › Six Sigma
 
   › Skills_framework_for_the_information_age
         › Skills Framework for the Information Age (SFIA) | UK
 
   › Society_of_corporate_compliance_and_ethics
         › Society of Corporate Compliance and Ethics (SCCE) | World
 
   › Sox
         › Sarbanes-Oxley Act (SOX) | US
 
   › Standard
         › Audit standard
         › ISO 27000 - Information Security Standards
         › Payment Card Industry Data Security Standard (PCI DSS)
         › Standard
 
   › Standards
         › National Institute of Standards and Technology (NIST) | US
 
   › Strategy
         › Strategy
         › Strategy risk
 
   › Sufficiency
         › Sufficiency
 
   › Supply
         › Supply-Chain Operations Reference (SCOR)
 
   › Systèmes
         › Institut de la Gouvernance des Systèmes d'Information (IGSI) | France


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
T
 
   › Tableau
         › Balanced Scorecard (BSC)
 
   › Tableau_de_bord_prospectif_informatique
         › IT Balanced Scorecard
 
   › Tbp
         › Balanced Scorecard (BSC)
 
   › Technologie
         › Global Technology Audit Guide (GTAG)
         › National Institute of Standards and Technology (NIST) | US
 
   › The_open_group_architecture_framework
         › The Open Group Architecture Framework (TOGAF)
 
   › Tiers_de_confiance
         › Trusted Third Party (TTP)
 
   › Tipa
         › Tudor's IT Process Assessment (TIPA) | Luxemburg
 
   › Togaf
         › The Open Group Architecture Framework (TOGAF)
 
   › Tolérance_du_risque
         › Risk tolerance
 
   › Tone_from_the_top
         › Tone From the Top
 
   › Total_productive_maintenance
         › Total Productive Maintenance (TPM)
 
   › Tpm
         › Total Productive Maintenance (TPM)
 
   › Trail
         › Audit trail
 
   › Traitement_du_risque
         › Risk treatment
 
   › Tudor_itsm_process_assessment
         › Tudor's IT Process Assessment (TIPA) | Luxemburg


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
U
 
   › Universe
         › Audit universe
 
   › Up
         › Audit follow up review


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
V
 
   › Valeur
         › Value
 
   › Validité
         › Validity
 
   › Val_it
         › Val IT
 
   › Vérification
         › Define, Measure, Analyse, Design, and Verify (DMADV)
 
   › Vulnerabilité
         › Risk
         › Vulnerability


 
A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | 
 
W
 
   › Weakness
         › Control weakness
         › Material weakness
 
   › Web
         › Open Web Application Security Project (OWASP)
 
   › Working
         › Audit working papers

<<<
QAP © 2010 | advice[at]qap.eu | audit[at]qap.eu
   Audit     Conseil     Formations     Changement     Disclaimer     Copyright   
pen4web