Audit Trail |
A record of events and activities that provides documentary evidence of the sequence of activities that have affected a specific operation, procedure, or event. |
Availability |
The assurance that information and resources are accessible and usable when needed, without downtime or interruptions. |
Bandwidth |
The maximum amount of data that can be transmitted over a network connection in a given amount of time. |
Business Continuity |
The ability of a business to continue its operations in the event of a disruption or disaster. |
Business Impact Analysis |
The process of identifying the potential impact of disruptions on business operations and their financial consequences. |
Business Resilience |
The ability of a business to adapt, recover, and grow despite disruptions or crises. |
Capital Expenditure |
An expense incurred to acquire an asset like equipment or infrastructure, which is recorded on the balance sheet. |
Cloud Computing |
The delivery of computing services over the internet, including storage, servers, databases, networking, software, analytics, and more. |
Compliance |
The adherence to laws, regulations, guidelines, and standards relevant to an organization's business and industry. |
Confidentiality |
The protection of information from unauthorized access or disclosure, ensuring it is only accessible to authorized individuals. |
Cost-Benefit Analysis |
A systematic approach to comparing the costs and benefits of different options to determine the most favorable course of action. |
Crisis Communication |
The process of delivering timely and accurate information during a crisis to internal and external stakeholders. |
Data Privacy |
The right to control how personal information is collected, used, and shared. |
Data Security |
Measures taken to protect data from unauthorized access, use, disclosure, disruption, modification, or destruction. |
Data Sovereignty |
The concept that data is subject to the laws and regulations of the country in which it is located. |
Depreciation |
The decrease in value or usefulness of an asset over time, typically recorded as an expense on the income statement. |
Disaster Recovery |
The process of restoring and recovering systems, data, and infrastructure after a disaster or disruption. |
Emergency Response Plan |
A plan outlining the immediate actions and procedures to be followed during an emergency situation. |
Incident Management |
The process of responding to and managing incidents to minimize their impact on business operations. |
Latency |
The amount of time it takes for data to travel from one system to another. |
Lifecycle Cost |
The total cost of a product or service over its entire lifecycle, including acquisition, operation, maintenance, and disposal costs. |
Local System |
A computer system that is physically located nearby and operates independently from other systems. |
Network Infrastructure |
The hardware, software, and protocols used to connect devices and systems in a network. |
On-Demand Software |
Software that is delivered over the internet and is available to users whenever they need it. |
Operating Cost |
The ongoing cost incurred to operate or maintain a product or service. |
Operating Expenditure |
An expense incurred to maintain day-to-day business activities, which is recorded on the income statement. |
Reliability |
The ability of a system to consistently perform its intended functions with minimal downtime or failures. |
Remote System |
A computer system that is located elsewhere and can be accessed over a network or the internet. |
Return On Investment |
A measure of the profitability of an investment, calculated by dividing the net profit by the initial investment. |
Risk Assessment |
The process of identifying and evaluating potential risks that could impact business continuity. |
Risk Management |
The process of identifying, assessing, and prioritizing potential risks to minimize their impact on an organization's objectives. |
Scalability |
The ability of a system to handle increased workload or accommodate growth without sacrificing performance. |
Security |
The protection of computer systems and data against unauthorized access, use, disclosure, disruption, modification, or destruction. |
Software As A Service |
A software distribution model in which applications are hosted by a third-party provider and made available to customers over the internet. |
Subscription-Based Model |
A pricing model where customers pay a recurring fee at regular intervals for access to a product or service. |
Sunk Cost |
A cost that has already been incurred and cannot be recovered, regardless of future actions or decisions. |
System Access |
The ability to connect to and interact with a computer system. |
Total Cost Of Ownership |
The complete cost associated with owning and using a product or service over its lifetime, including both upfront and operating costs. |
Upfront Cost |
The initial cost or investment required to acquire or set up a product or service. |
Vendor Lock-In |
Where a customer is dependent on a particular vendor for products and services, making it difficult or costly to switch to another vendor. |
Virtualization |
The process of creating a virtual version of a resource, such as a server, storage device, network, or operating system. |