i,- i,- i,- i,- i,- i,-
Study Guide with complete solutions| i,- i,- i,- i,- i,-
Latest 2025/2026 Update. i,- i,-
Agreement on Trade-Related Aspects of Intellectual Property
i,- i,- i,- i,- i,- i,- i,-
Rights (TRIPS) An agreement of the World Trade
i,- i,-i,- i,- i,- i,- i,- i,- i,- i,-
Organization that requires member governments to ensure that
i,- i,- i,- i,- i,- i,- i,- i,-
intellectual property rights can be enforced under their laws and
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
that penalties for infringement are tough enough to deter further
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
violations.
American Recovery and Reinvestment Act
i,- A wide-ranging act i,- i,- i,- i,-i,- i,- i,- i,- i,-
that authorized $787 billion in spending and tax cuts over a 10-
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
year period and included strong privacy provisions for electronic
i,- i,- i,- i,- i,- i,- i,- i,- i,-
health records, such as banning the sale of health information,
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
promoting the use of audit trails and encryption, and providing
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
rights of access for patients.
i,- i,- i,- i,-
annualized loss expectancy (ALE) The estimated loss from a
i,- i,- i,- i,-i,- i,- i,- i,- i,- i,- i,-
potential risk event over the course of a year. The following
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
equation is used to calculate the annual loss expectancy: ARO ×
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
SLE = ALE. Where ARO is the annualized rate of occurrence, an
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
estimate of the probability that this event will occur over the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
,course of a year and SLE is the single loss expectancy, the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
estimated loss that would be incurred if the event happens.
i,- i,- i,- i,- i,- i,- i,- i,- i,-
annualized rate of occurrence (ARO) An estimate of the
i,- i,- i,- i,- i,-i,- i,- i,- i,- i,- i,-
probability that a risk event will occur over the course of a year.
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
anonymous expression The expression of opinions by people
i,- i,-i,- i,- i,- i,- i,- i,- i,- i,-
who do not reveal their identity.
i,- i,- i,- i,- i,-
anonymous remailer service A service that allows anonymity
i,- i,- i,-i,- i,- i,- i,- i,- i,- i,-
on the Internet by using a computer program that strips the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
originating header and/or IP address from the message and then
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
forwards the message to its intended recipient.
i,- i,- i,- i,- i,- i,-
anti-SLAPP laws Laws designed to reduce frivolous SLAPPs
i,- i,-i,- i,- i,- i,- i,- i,- i,- i,-
(strategic lawsuit against public participation (SLAPP), which is a
i,- i,- i,- i,- i,- i,- i,- i,- i,-
lawsuit filed by corporations, government officials, and others
i,- i,- i,- i,- i,- i,- i,- i,-
against citizens and community groups who oppose them on
i,- i,- i,- i,- i,- i,- i,- i,- i,-
matters of concern). i,- i,-
antivirus software Software that scans for a specific sequence
i,- i,-i,- i,- i,- i,- i,- i,- i,- i,- i,-
of bytes, known as a virus signature, that indicates the presence
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
of a specific virus.
i,- i,- i,-
,artificial intelligence systems The people, procedures,
i,- i,- i,-i,- i,- i,- i,- i,-
hardware, software, data, and knowledge needed to develop
i,- i,- i,- i,- i,- i,- i,- i,-
computer systems and machines that can simulate human
i,- i,- i,- i,- i,- i,- i,- i,-
intelligence processes, including learning (the acquisition ofi,- i,- i,- i,- i,- i,- i,-
information and rules for using the information), reasoning (usingi,- i,- i,- i,- i,- i,- i,- i,- i,-
rules to reach conclusions), and self-correction (using the
i,- i,- i,- i,- i,- i,- i,- i,-
outcome from one scenario to improve its performance on future
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
scenarios).
acceptable use policy (AUP) A document that stipulates
i,- i,- i,- i,-i,- i,- i,- i,- i,- i,-
restrictions and practices that a user must agree in order to use
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
organizational computing and network resources. i,- i,- i,- i,-
acceptance When an organization decides to accept a risk
i,-i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
because the cost of avoiding the risk outweighs the potential loss
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
of the risk. A decision to accept a risk can be extremely difficult
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
and controversial when dealing with safety-critical systems
i,- i,- i,- i,- i,- i,- i,-
because making that determination involves forming personal
i,- i,- i,- i,- i,- i,- i,-
judgments about the value of human life, assessing potential
i,- i,- i,- i,- i,- i,- i,- i,- i,-
liability in case of an accident, evaluating the potential impact on
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
the surrounding natural environment, and estimating the
i,- i,- i,- i,- i,- i,- i,-
system's costs and benefits. i,- i,- i,-
advanced persistent threat (APT) A network attack in which
i,- i,- i,- i,-i,- i,- i,- i,- i,- i,- i,-
an intruder gains access to a network and stays there—
i,- i,- i,- i,- i,- i,- i,- i,- i,-
, undetected—with the intention of stealing data over a long i,- i,- i,- i,- i,- i,- i,- i,- i,-
period of time (weeks or even months).
i,- i,- i,- i,- i,- i,-
agile development
i,- A software development methodology in i,-i,- i,- i,- i,- i,- i,- i,-
which a system is developed in iterations lasting from one to four
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
weeks. Unlike the waterfall system development model, agile
i,- i,- i,- i,- i,- i,- i,- i,-
development accepts the fact that system requirements are i,- i,- i,- i,- i,- i,- i,- i,-
evolving and cannot be fully understood or defined at the start of
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
the project.
i,-
audit committee i,- A group that provides assistance to the i,-i,- i,- i,- i,- i,- i,- i,- i,- i,-
board of directors in fulfilling its responsibilities with respect to
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
the oversight of the quality and integrity of the organization's
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
accounting and reporting practices and controls, including i,- i,- i,- i,- i,- i,- i,-
financial statements and reports; the organization's compliance
i,- i,- i,- i,- i,- i,- i,-
with legal and regulatory requirements; the qualifications,
i,- i,- i,- i,- i,- i,- i,-
independence, and performance of the company's independent i,- i,- i,- i,- i,- i,- i,-
auditor; and the performance of the company's internal audit
i,- i,- i,- i,- i,- i,- i,- i,- i,-
team.
avoidance The elimination of a vulnerability that gives rise to
i,-i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
a particular risk in order to avoid the risk altogether. This is the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
most effective solution but often not possible due to
i,- i,- i,- i,- i,- i,- i,- i,- i,-