Welcome » Glossary
A B C D E F G H I K L M N O P R S T U V W X
AAccess - The ability to physically or logically enter or make use of an IT system or area (secured or unsecured); the process of interacting with a system.Agency - A legal relationship between two parties who agree that one (the agent) is to act on behalf of another (the principal), subject to the latter’s general control. The principal generally is held liable for the agent’s actions.Availability - Whether or how often a system is available for use by its intended users. Because downtime is usually costly, availability is an integral component of security.BBusiness Continuity - The ability to maintain operations and services, both technology and business, in the event of a disruption to normal operations and services. Assures that any impact or disruption of services is within a documented and acceptable recovery time period and that system or operations are resumed at a documented and acceptable point in the processing cycle.Business Resilience - The capacity to maintain functions and organizational structure in the face of an internal or external change or threat, recover from a significant disruption, and continue critical operations with minimal impact.CCapacity Planning - The process used to determine whether a service, application, or process is sufficient to handle volumes at peak times and meet growth projections for a specific period of time. Analysis should consider hardware (networks, servers, routers, etc.), software (operating system and application software), and personnel.Classification - Categorization (e.g., “confidential,” “sensitive,” or “public”) of the information processed by the service provider on behalf of the receiver company.Computer Security - Technological and managerial procedures applied to computer systems to ensure the availability, integrity, and confidentiality of information managed by the computer system.Confidentiality - Assuring information will be kept secret, with access limited to appropriate persons.Configuration Management - The management of security features and assurances through control of changes made to a system’s hardware, software, firmware, documentation, testing, test fixtures, and test documentation throughout the development and operational life of the system.Contingency Plan - A plan for emergency response, backup operations, and post-disaster recovery maintained by an institution as a part of its security program. The plan ensures the availability of critical resources and facilitates the continuity of operations in an emergency situation.Control Requirements - Process used to document and/or track internal processes to determine that those established procedures and/or physical security policies are being followed.Conversion Plan - A plan that details transition planning and implementation issues in the period between the execution of an outsourcing agreement and the full production use of the outsourced services.Custom Redirect Service - This service enables control over the location of incoming calls or the redirection of calls to various locations or pre-established phone numbers to ensure customer service continuity.Cyber Attack - An attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network; An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.Cyber Resilience - The ability of a system or domain to withstand cyber attacks or failures, and in such events, to reestablish itself quickly.DDASD - Direct access storage device. A magnetic disk storage device historically used in mainframe environments. DASD may also include hard drives used in personal computers. Data Corruption - Errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data. Data Integrity - The property that data has not been destroyed or corrupted in an unauthorized manner; Maintaining and assuring the accuracy and consistency of data over its entire life-cycle.Data Mirroring - A back-up process that involves writing the same data to two physical disks or servers simultaneously.Data Replication - The process of copying data, usually with the objective of maintaining identical sets of data in separate locations. Two common data replication processes used for information systems are synchronous and asynchronous mirroring. Data Synchronization - The comparison and reconciliation of interdependent data files at the same time so that they contain the same information.Database - A database represents the collection of data that is stored on any type of computer storage medium and may be used for more than one purpose.Daylight Overdraft - A daylight overdraft occurs at any point in the business day when the balance in an institution’s account becomes negative. Daylight overdrafts can occur in accounts at Federal Reserve Banks as well as at private financial institutions. Daylight credit can also arise in the form of net debit positions of participants in private payment systems. A daylight overdraft occurs at a Federal Reserve Bank when there are insufficient funds in an institution’s Federal Reserve Bank account to cover outgoing funds transfers or incoming book-entry securities transfers. An overdraft can also be the result of other payment activity processed by the Federal Reserve Bank, such as check or automated clearinghouse transactions. Debit Card - A payment card issued as either a PIN-based debit (ATM) card or as a signature-based debit card from one of the bankcard associations. A payment card issued to a person for purchasing goods and services through an electronic transfer of funds from a demand deposit account rather than using cash, checks, or drafts at the point-of-sale. Debit Entry - An entry to the record of an account to represent the transfer or removal of funds from the account.Dedicated Synchronous Optical NETwork (SONET) - SONET is a standard for telecommunications transmissions over fiber optic cables. SONET is self-healing so that if a break occurs in the lines, it can use a back-up redundant ring to ensure that the transmission continues. SONET networks can transmit voice and data over optical networks.Deferred Net Settlement - See "National Settlement Service".Deliverable - A project goal or expectation. Deliverables include broadly-defined, project or phase requirements and specifically-defined tasks within project phases.Depositary Bank - The institution at which a check is first deposited. While this term is often used interchangeably with “depository,” “depositary” is a term of art in laws and regulations related to check processing. Depositary Bank (Check 21) - Also known as Bank of First Deposit (BOFD). The first bank to which a check is transferred even though it is also the paying bank or the payee. A check deposited in an account is deemed to be transferred to the financial institution holding the account into which the check is deposited, even though the check is physically received and endorsed first by another financial institution. Depository - An institution that holds funds or marketable securities for safekeeping. Depositories may be privately or publicly operated and allow securities transfers through book-entry and offer funds accounts permitting funds transfers as a means of payment.Dictionary Attack - Discovery of authenticators by encrypting likely authenticators and comparing the actual encrypted authenticator with the newly encrypted possible authenticators.Digital Certificate - The electronic equivalent of an ID card that authenticates the originator of a digital signature.Digital Subscriber Line (DSL) - DSL provides the ability to transmit high-speed digital signals over existing telephone lines.Direct Data Feed - A process used by information aggregators to gather information directly from a website operator rather than copying it from a displayed webpage.Direct Debit - Electronic transfer, usually through ACH, out of an individual's checking (or savings) account to pay bills, such as mortgage payments, insurance premiums, and utility payments. Also referred to as “direct payment.” Direct Deposit - Electronic deposits or credit, usually through ACH, to an individual’s deposit account. Common uses of direct deposit include payroll payments, Social Security benefits, and income from investments such as CDs, annuities, and mutual funds.Direct Presentment - Depositary banks can present checks directly to the paying institution. The paying institution may be the depositary bank (no settlement is needed), or, if not, may settle on the books of the Federal Reserve, using the Federal Reserve’s national settlement service.Disaster Recovery Exercise - A test of an institution’s disaster recovery or BCP. Disaster Recovery Plan - A plan that describes the process to recover from major processing interruptions.Disk Shadowing - A back-up process that involves writing images to two physical disks or servers simultaneously.Distributed Denial of Service (DDoS) - A type of attack that makes a computer resource or resources unavailable to its intended users. Although the means to carry out, motives for, and targets of a DDoS attack may vary, it generally consists of the concerted efforts of a group that intends to affect an institution’s reputation by preventing an Internet site, service, or application from functioning efficiently.Distributed Environment - A computer system with data and program components physically distributed across more than one computer.Diversity - A description of financial services sectors in which primary and back-up telecommunications capabilities do not share a single point of failure.DMZ - Abbreviation for “demilitarized zone.” A computer or small subnetwork that sits between a trusted internal network, such as a corporate private LAN, and an untrusted external network, such as the public Internet.DNS Server - Abbreviation for “Domain Name Service server.” A computer that determines Internet Protocol (IP) numeric addresses from domain names presented in a convenient, readable form.DSL - Digital subscriber line. A technology that uses existing copper telephone lines and advanced modulation schemes to provide high-speed telecommunications to businesses and homes. Dual Control - Dividing the responsibility of a task into separate, accountable actions to ensure the integrity of the process.Due Diligence - Technical, functional, and financial review to verify a service provider’s ability to deliver the requirements specified in its proposal. The intent is to verify that the service provider has a well-developed plan and adequate resources and experience to ensure acceptable service, controls, systems backup, availability, and continuity of service to its clients.EE-Banking - The remote delivery of new and traditional banking products and services through electronic delivery channels.Electronic Benefits Transfer (EBT) - A type of EFT system involving the transfer of public entitlement payments, such as welfare or food stamps, through direct deposit or point-of-sale technology (see POS). The recipient can be given an identification card, similar to a benefit card, and a PIN allowing access to the benefits through an electronic network.Electronic Bill Presentment and Payment (EBPP) - An electronic alternative to traditional bill payment, allowing a merchant or utility to present its customers with an electronic bill and the payer to pay the bill electronically. EBPP systems usually fall within two models: direct and consolidation-aggregation. In the direct model, the merchant or utility generates an electronic version of the consumer’s billing information, and notifies the consumer of a pending bill, generally via e-mail. The consumer can initiate payment of the electronically presented bill using a variety of payment mechanisms, typically a credit card. In the consolidation-aggregation model, the consumer’s bills are consolidated by a consolidator acting on behalf of merchants and utilities (or aggregated on behalf of the consumer), combining data from multiple bills and presenting a single source for the consumer to initiate payment. Some consolidators present bills at their own web sites, typically most support the aggregation of bills by consumer service providers such an Internet portals, financial institutions, and brokerage web sites. Electronic Check Conversion - The process by which a check is used as a source of information for the check number, the customer’s account number, and the number that identifies the financial institution. The information is used to make a one-time electronic payment from the customer’s account -- an electronic fund transfer. The check itself is not the method of payment.Electronic Check Presentment (ECP) - Check truncation methodology in which the paper check’s MICR line information is captured and stored electronically for presentment. The physical checks may or may not be presented after the electronic files are delivered, depending on the type of ECP service that is used.Electronic Commerce (E-Commerce) - A broad term encompassing the remote procurement and payment by businesses or consumers of goods and services through electronic systems such as the Internet.Electronic Data Capture (EDC) - Process used for capturing and transferring the encoded information on the magnetic strip from a bankcard or debit card at the point-of-sale to the processor’s database.Electronic Funds Transfer (EFT) - A generic term describing any transfer of funds between parties or depository institutions through electronic data systems.Electronic Funds Transfer Act (EFTA) - The Electronic Funds Transfer Act and Regulation E are designed to ensure adequate disclosure of basic terms, costs, and rights relating to electronic fund transfer (EFT) services provided to consumers. Institutions offering EFT services must disclose to consumers certain information, including: initial and updated EFT terms, transaction information, periodic statements of activity, the consumer’s potential liability for unauthorized transfers, and error resolution rights and procedures. EFT services include automated teller machines, telephone bill payment, point-of-sale transfers in retail stores, fund transfers initiated through the Internet, and pre-authorized transfers to or from a consumer’s account.Electronic Vaulting - A back-up procedure that copies changed files and transmits them to an off-site location using a batch process.Electronically Created Payment Orders - These are payment orders received by merchants from consumers, typically by telephone or the Internet. These payment orders are processed through the check processing system although they were not initiated as paper checks. These payment orders are not subject to check law and are not warranted by the Federal Reserve Banks. E-mail Server - A computer that manages e-mail traffic.Emergency Plan - The steps to be followed during and immediately after an emergency such as a fire, tornado, bomb threat, etc.Encryption - A data security technique used to protect information from unauthorized inspection or alteration. Information is encoded so that data appears as a meaningless string of letters and symbols during delivery or transmission. Upon receipt, the information is decoded using an encryption key.End User - An individual who will utilize a product or program.End-to-End Process Flow - Document that details the flow of the processes, considering automated and manual control points, hardware, databases, network protocols, and real-time versus periodic processing characteristics.End-to-End Recoverability - The ability of an institution to recover a business process from initiation, such as customer contact, through process finalization, such as transaction closure. Enterprise Architecture - The configuration of computer systems within an organization. Includes local area networks (LANs), wide area networks (WANs), bridges, applications, etc.Enterprise-Wide - Encompassing an entire organization, rather than a single business department or function. Expedited Funds Availability Act (EFAA) - See "Regulation CC".Exploit - A technique or code that uses a vulnerability to provide system access to the attacker.Exposure - The potential loss to an area due to the occurrence of an adverse event.Exposure Limit - In reference to the settlement of operating services, this is the maximum amount an ACH originator is allowed to originate. This amount can be based on the originator’s credit rating, historical or predicted funding requirements, and the type of obligation.FFederal Reserve Banks - The Federal Reserve Banks provide a variety of financial services including retail and wholesale payments. The Federal Reserve Bank operates a nationwide system for clearing and settling checks drawn on depository institutions located in all regions of the United States.Fedwire® - The Federal Reserve Bank’s nationwide real time gross settlement electronic funds and securities transfer network. Fedwire® is a credit transfer system. Each funds transfer is settled individually against an institution’s reserve or clearing account on the books of the Federal Reserve. The transaction is considered an irrevocable payment as it is processed.Fedwire® Funds Service - The Federal Reserve Banks’ high-speed electronic funds transfer system. As a real-time gross settlement system, the Fedwire® Funds Service processes and settles individual payments between participants immediately in central bank money. Once processed, these payments are final.Fedwire® Securities Service - The Federal Reserve Banks’ high-speed electronic payments system for maintaining securities accounts and for effecting securities transfers. The Fedwire® Securities Service provides a real-time, delivery-versus-payment (DVP), gross settlement system that allows for the immediate, simultaneous transfer of securities against payment. Once processed, securities transfers are final.FEMA - FEMA is an acronym for Federal Emergency Management Agency.Fibre Channel - A high performance serial link supporting its own, as well as higher-level protocols such as the small computer system interface, high performance parallel interface framing protocol and intelligent peripheral interface. The Fibre Channel standard addresses the need for very fast transfers of large amounts of information. The fast (up to 1 Giga byte per second) technology can be converted for LAN technology by adding a switch specified in the Fibre Channel standard that handles multipoint addressing. Fibre Channel gives users one port that supports both channel and network interfaces, unburdening the computers from large number of input and output (I/O) ports. Fibre Channel provides control and complete error checking over the link. FIN (Financial Application) - The SWIFT application within which all SWIFT user-to-user messages are input and output.Finality - Irrevocable and unconditional transfer of payment during settlement.Financial Authority - A supervisory organization that is responsible for safeguarding and maintaining consumer confidence in the financial system.Financial EDI (FEDI) - Financial electronic data interchange. An instrument for settling invoices by initiating payments, processing remittance data and automating reconciliation, through the exchange of electronic messages.Financial Industry Participants - Financial institutions and other companies that are involved in the banking, securities, and/or insurance industry and are regulated by supervisory authorities.Firewall - A hardware or software link in a network that relays only data packets clearly intended and authorized to reach the other side. Float - Funds held by an institution during the check-clearing process before being made available to a depositor. Interest may be earned on these funds. Flowcharts - Traditional flowcharts involve the use of geometric symbols, such as diamonds, ovals, and rectangles to represent the sequencing of program logic. Software packages are available that automatically chart programs or enable a programmer to chart a program without the need to draw it manually.Frame Relay - A high-performance WAN protocol that operates at the physical and data link layers of the Open Systems Interconnect (OSI) reference model. Frame Relay is an example of a packet-switched technology. Packet-switched networks enable end stations to dynamically share the network medium and the available bandwidth. Frame relay uses existing T-1 and T-3 lines and provides connection speeds from 56 Kbps to T-1.Framing - A frame is an area of a webpage that scrolls independently of the rest of the webpage. Framing generally refers to the use of a standard frame containing information (like company name and navigation bars) that remains on the screen while the user moves around the text in another frame.FS/ISAC - Financial Services Information Sharing and Analysis Center.Full-Duplex - A communications channel that carries data in both directions.Full-Interruption/ Full-Scale Test (IT and Staff) - A business continuity test that activates all the components of the disaster recovery plan at the same time. Hardware, software, staff, communications, utilities, and alternate site processing should be thoroughly tested in this type of testing activity. The exercise should include the business line end users and the IT group to ensure that each business line tests its key applications and is prepared to recover and resume its business operations in the event of an emergency. The full test verifies that systems and staff can recover and resume business within established recovery time objectives. End users should verify the integrity of the data at the alternate site after the IT group has restored systems and applications needed for the staff to perform production activities.Functional Drill/Parallel Test - This test involves the actual mobilization of personnel at other sites in an attempt to establish communications and coordination as set forth in the BCP.Functional Requirements - The business, operational, and security features an organization wants included in a program.Functionality Testing - A test designed to validate that a business process or activity accomplishes expected results.GGap Analysis - A comparison that identifies the difference between actual and desired outcomes.Gateway Server - A computer (server) that connects a private network to the private network of a servicer or other business. General Controls - Controls, other than application controls, that relate to the environment within which application systems are developed, maintained, and operated, and that are therefore applicable to all the applications at an institution. The objectives of general controls are to ensure the proper development and implementation of systems, and the integrity of program and data files and of computer operations. Like application controls, general controls may be either manual or programmed. Examples of general controls include the development and implementation of an IT strategy and an IT security policy, the organization of IT staff to separate conflicting duties and planning for disaster prevention and recovery.GETS - Acronym for the Government Emergency Telecommunications Service card program. GETS cards provide emergency access and priority processing for voice communications services in emergency situations. Governance - In computer security, governance means setting clear expectations for the conduct (behaviors and actions) of the entity being governed and directing, controlling, and strongly influencing the entity to achieve these expectations. It includes specifying a framework for decision making, with assigned decision rights and accountability, intended to consistently produce desired behaviors and actions.Gramm-Leach-Bliley Act - The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act of 1999, (Pub.L. 106-102, 113 Stat. 1338, enacted November 12, 1999), repealed part of the Glass-Steagall Act of 1933, allowing commercial banks, investment banks, securities firms and insurance companies to consolidate.Gramm-Leach-Bliley Act (GLBA) - Grandfather-Father-Son - Retaining multiple versions of the back-up files off-site on a “grandfather-father-son” rotating basis is recommended. This tape methodology creates three sets of back-up tapes: daily incremental sets or “sons,” weekly full sets or “fathers,” and end-of-month tapes or “grandfathers.” HHacker - An individual who attempts to break into a computer without authorization.Haircut - With respect of an eligible currency, the percentage increase of a negative currency balance or reduction of a positive currency balance and is based on (a) the volatility of the historic foreign exchange movements in the applicable eligible currency determined by CLS Bank and (b) an add-on component.Hardening - The process of securing a computer’s administrative functions or inactivating those features not needed for the computer’s intended business purpose. Hardware - The physical elements of a computer system; the computer equipment as opposed to the programs or information stored in a machine.Hash - A fixed length cryptographic output of variables, such as a message, being operated on by a formula or cryptographic algorithm.Hash Totals - A numerical summation of one or more corresponding fields of a file that would not ordinarily be summed. Typically used to detect when changes in electronic information have occurred.HBA - Host bus adapter. A host bus adapter provides I/O processing and physical connectivity between a server and storage. As the only part of a storage area network that resides in a server, HBAs also provide a critical link between the storage area network and the operating system and application software. Hierarchical Storage Management (HSM) - HSM is used to dynamically manage the back-up and retrieval of files based on how often they are accessed using storage media and devices that vary in speed and cost.Hijacking - The use of an authenticated user’s communication session to communicate with system components.Hop - Each step of a trip a data packet takes from its origination to its destination. For example, on the Internet a data packet may go through several routers before reaching its final destination. Host - A computer that is accessed by a user from a remote location.Hosting - See "Website Hosting".HTML - Abbreviation for “Hypertext Markup Language.” A set of codes that can be inserted into text files to indicate special typefaces, inserted images, and links to other hypertext documents.Hub - Simple devices that pass all data traffic in both directions between the LAN sections they link. Hubs forward every message they receive to the other sections of the LAN, even those that do not need to go there. HVAC - Heating, ventilation, and air conditioning.Hyperlink - An item on a webpage that, when selected, transfers the user directly to another location in a hypertext document or to another webpage, perhaps on a different machine. Also simply called a “link.”II/O - Input/output.IDS - Intrusion Detection System.Image Archive (Check 21) - Database for storage and easy retrieval of check images.Image Capture (Check 21) - The process of digitizing both sides of physical items and their assorted MICR information as they are processed at the Federal Reserve Bank. Also includes storage of the images for up to 60 days.Image Exchange (Check 21) - Exchange of some or all of the digitized images of a check.Implementation Plan - A plan that details project management requirements and issues to be addressed during the period between the execution of an outsourcing agreement and the full production use of the outsourced services.Incident Response Plan - A plan that defines the action steps, involved resources, and communication strategy upon identification of a threat or potential threat event, such as a breach in security protocol, power or telecommunications outage, severe weather, or workplace violence.Indemnifying Bank (Check 21) - A financial institution that transfers, presents, or returns a substitute check or a paper or electronic representation of a substitute check for which it receives consideration. The financial institution shall indemnify the recipient and any subsequent recipient (including a collecting or returning financial institution, the depository financial institution, the drawer, the drawee, the payee, the depositor, and any endorser) for any loss incurred by any recipient of a substitute check if that loss occurred due to the receipt of a substitute check instead of the original. Independence - Self-governance, freedom from conflict of interest and undue influence. The IT auditor should be free to make his or her own decisions, not influenced by the organization being audited, or by its managers and employees. Independent Sales Organizations(ISO) - Industry Testing - A test designed to validate that business processes, integrated across firms and within the financial industry, which supports the business continuity objectives of the firms, both individually and collectively.Information Security - The result of any system of policies and/or procedures for identifying, controlling, and protecting information from unauthorized disclosure; The process by which an organization protects and secures its systems, media, and facilities that process and maintain information vital to its operations.Information Technology - Systems technologies, including operations such as central computer processing, distributed processing, end-user computing, local area networking, and telecommunications. These operations often represent critical services to financial institutions and their customers.Instruction - Means (i) any instruction submitted by a Member through the submission process directing CLS Bank to settle certain payment entitlements and obligations arising pursuant to an FX transaction eligible for settlement in CLS Bank and (ii) any instructions resulting from the split of Settlement Eligible Instructions.Integrated Services Digital Network (ISDN) - Integrated Test / Exercise - This integrated test/exercise incorporates more than one component or module, as well as external dependencies, to test the effectiveness of the continuity plans for a business line or major function. Integrity - Assurance that information is trustworthy and accurate; Ensuring that information will not be accidentally or maliciously altered or destroyed (see “Data Integrity”).Interbank Checks - Checks that are not “on-us.” They are cleared and settled either by direct presentment, a clearinghouse association, a correspondent bank, or a Federal Reserve Bank.Interchange - Exchange of transactions between financial institutions participating in a bank card network, based on a common set of rules. Card interchange allows a financial institution’s customers to use a bank credit card at any card honoring merchant and to gain access to multiple ATM systems from a single ATM.Interchange (fees) - Fees paid by one financial institution to another to cover handling costs and credit risk in a financial institution card transaction. Interchange fees generally flow toward the institution funding the transaction and assuming the risk. In a credit card transaction, the interchange fee is paid by the merchant acquirer accepting the merchant’s sales draft to the card-issuing institution, which, in turn, passes the fee to its merchants. In EFT/POS transactions, interchange flows in the opposite direction: the card-issuing institution (or customer) pays the fee to the terminal-owning institution. When a transaction is an off-line debit sale, the card-issuing institution collects an interchange fee from the merchant, rather than from the customer, unlike in an EFT/POS transaction, where the customer pays the interchange fee. Interchange revenue is derived from fees set by the card associations. Depending on the card association, fees can range from 1% to 3% of the value of the transaction. Interchange revenue is recognized as a card issuer’s second largest revenue line item. Interdependencies - Where two or more departments, processes, functions, and/or third parties support one another in some fashion. Interface - Computer programs that translate information from one system or application into a format required for use by another system or application.Internet - A worldwide network of computer networks, governed by standards and protocols developed by the Internet Engineering Task Force (IETF).Internet Protocol (IP) - IP is a standard format for routing data packets between computers. IP is efficient, flexible, routable, and widely used with many applications, and is gaining acceptance as the preferred communication protocol. Internet Service Provider (ISP) - A company that provides its customers with access to the Internet.Interoperability Standards/Protocols - Commonly agreed on standards that enable different computers or programs to share information. Example: HTTP (Hypertext Transfer Protocol) is a standard method of publishing information as hypertext in HTML format on the Internet.Intrusion Detection - Techniques that attempt to detect unauthorized entry or access into a computer or network by observation of actions, security logs, or audit data; detection of break-ins or attempts, either manually or via software expert systems that operate on logs or other information available on the network. Intrusion Detection System (IDS) - Software/hardware that detects and logs inappropriate, incorrect, or anomalous activity. IDS are typically characterized based on the source of the data they monitor: host or network. A host-based IDS uses system log files and other electronic audit data to identify suspicious activity. A network-based IDS uses a sensor to monitor packets on the network to which it is attached.IPS - Intrusion Prevention System.IPv6 - Version 6 of the Internet Protocol.ISAC - Information Sharing and Analysis Center.iSCSI - Internet small computer system interface. An Internet protocol based storage networking standard for linking data storage facilities, used to facilitate. iSCSI is data transfers over intranets and to manage storage over long distances.ISDN - Integrated systems digital networking. A hierarchy of digital switching and transmission systems that provides voice, data, and image in a unified manner. ISDN is synchronized so that all digital elements communicate in the same protocol at the same speed.ISO - International Organization for Standards.Iterative - Repetitive or cyclical. Iterative software development involves the completion of project tasks or phases in repetitive cycles. Tasks and phase activities are repeated until a desired result is achieved.KKey Fob - A small portable device equipped with chip technology allowing the holder the ability to access network systems, such as those used for payments, and to store personal data.Kiosk - A publicly accessible computer terminal that permits customers to directly communicate with the financial institution via a network. LLAN - Local Area Network.LAR - Legal amount recognition. The handwritten dollar amount of the check.Large Value Funds Transfer System - A wholesale payment system used primarily by financial institutions in which large values of funds are transferred between parties. Fedwire® and CHIPS are the two large-value transfer systems in the United States.Legacy Systems - A term commonly used to refer to existing computers systems and applications with which new systems or applications must exchange information.Lockbox - Deposit mechanism used by commercial firms and businesses to facilitate their deposit transaction volume. Typically, commercial firms and businesses direct customers to send payments directly to a financial institution address or post office box controlled by the institution. Financial institution personnel record payments received and prepare deposit slips, and subsequent processing proceeds as with other deposit taking activities.Lockout - The action of temporarily revoking network or application access privileges, normally due to repeated unsuccessful logon attempts.Long Position - In respect of a currency balance that is greater than zero, the amount by which such currency balance is greater than zero. A position that appreciates in value if market prices increase. When one buys a currency, their position is long.MMagnetic Ink Character Recognition (MICR) - Magnetic codes found on the bottom of checks, deposit slips, and general ledger debit and credit tickets that allow a machine to scan (capture) the information. MICR encoding on a check includes the account number, the routing number, the serial number of the check, and the amount of the check. The amount of the check is encoded when the proof department processes the check. Mainframe - An industry term for a large computer, typically used for the commercial applications of businesses and other large-scale computing purposes. Generally, a mainframe is associated with centralized rather than distributed computing. Malware - Short for malicious software, malware is designed to secretly access a computer system without the owner’s informed consent. The expression is a general term used to mean a variety of forms of hostile, intrusive, or annoying software or program code. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, ransomware, crimeware, most rootkits, and other malicious and unwanted software or programs.Man-In-The-Middle Attack - A man-in-the-middle attack places the attacker’s computer in the communication line between the server and the client. The attacker’s machine can monitor and change communications.Market-Wide Tests - Market-wide tests are also called cross-market tests or “street tests” that are sponsored by the Securities Industry Association, Bond Market Association, and Futures Industry Association. These tests validate the connectivity from alternate sites and include transaction, settlement, and payment processes, to the extent practical.Matched Instructions - Two Instructions in which the information set forth in a specific CLS Bank Rule is matched in accordance with the parameters and procedures set forth in the CLS Bank Rules.Matching - With respect to compared and non-compared transactions, the process of comparing the trade or settlement details provided by counterparties to ensure they agree with respect to the terms of the transaction. Also called comparison checking.Media - Physical objects that store data, such as paper, hard disk drives, tapes, and compact disks (CDs).Merchant Acquirer - Bankcard association members that initiate and maintain contractual agreements with merchants for the purpose of accepting and processing bankcard transactions. Merchant Processing - Activity for the acceptance and settlement of bankcard products and transactions from merchants through the payment system.Metrics - A quantitative measurement.MICR - Magnetic ink character recognition. Magnetic codes found on the bottom of checks, deposit slips, and general ledger debit and credit tickets that allow a machine to scan (capture) the information. MICR encoding on a check includes the account number, the routing number, the serial number of the check and the amount of the check. The amount of the check is encoded when the proof department processes the check.MICR-line information - Magnetic codes found on the bottom of checks, deposit slips, and general ledger debit and credit tickets that allow a machine to scan (capture) the information. MICR encoding on a check includes the account number, the routing number, the serial number of the check, and the amount of the check. The amount of the check is encoded when the proof department processes the check.Microwave Technology - Narrowband technology that requires a direct line-of-sight to transmit voice and data communications and is used to integrate a broad range of fixed and mobile communication networks.Midrange - Computers that are more powerful and capable than personal computers but less powerful and capable than mainframe computers.Milestone - Major project event.MIPS - Millions of instructions per second. A general measure of computing performance and, by implication, the amount of work a larger computer can do.Mirroring - A process that copies data to multiple disks over a computer network in real time or close to real time. Mirroring reduces network traffic, ensures better availability of the website or files, or enables the site or downloaded files to arrive more quickly for users close to the mirror site.MIS - Management information systems. A general term for the computer systems in an enterprise that provide information about its business operations. Mnemonic - A symbol or expression that can help someone remember something. For example, the phrase “Hello! My name is Bill. I'm 9 years old.” might help an individual remember a secure 10-character password of “H!MniBI9yo.”Modeling - The process of abstracting information from tangible processes, systems and/or components to create a paper or computer-based representation of an enterprise-wide or business line activity. Module - A combination of various components of a business process or supporting system. Module Test / Exercise - A test designed to verify the functionality of multiple components of a business line or supporting function at the same time. Multi-Factor Authentication - Strong authentication mechanism relying on more than one type of authentication. A PIN or password alone is representative of single factor authentication. Adding additional authentication mechanisms would result in multi-factor authentication.Multilateral Netting Settlement System - Multilateral netting is an arrangement among three or more parties to net their obligations. In these settlement systems transfers are irrevocable but are only final after the completion of end-of-day-settlement.Multiplexers - A device that encodes or multiplexes information from two or more data sources into a single channel. They are used in situations where the cost of implementing separate channels for each data source is more expensive than the cost and inconvenience of providing the multiplexing/de-multiplexing functions.NNACHA – The Electronic Payments Association (NACHA) - The national association that establishes the rules and procedures governing the exchange of ACH payments.NAS - Network attached storage. Hard disk storage set up with its own network address rather than being attached to the department computer that is serving applications to a network's workstation users. By removing storage access and its management from the department server, both application programming and files can be served faster because they are not competing for the same processor resources. The network-attached storage device is attached to a local area network (typically, an Ethernet network) and assigned an IP address. File requests are mapped by the main server to the NAS file server.National Settlement Service (NSS) - Also referred to as Deferred Net Settlement. The Federal Reserve Banks’ multilateral settlement service. NSS is offered to depository institutions that settle for participants in clearinghouses, financial exchanges, and other clearing and settlement groups. Settlement agents acting on behalf of those depository institutions electronically submit settlement files to the Federal Reserve Banks. Files are processed on receipt, and entries are automatically posted to the depository institutions’ Reserve Bank accounts. Entries are final when posted.Net Debit Cap - The maximum dollar amount of uncollateralized daylight overdrafts that an institution is authorized to incur in its Federal Reserve account. The net debit cap is generally equal to an institution’s capital times the cap multiple for its cap category.Network - Two or more computer systems that are grouped together to share information, software, and hardware.Network Administrator - The individual responsible for the installation, management, and control of a network.Network Attached Storage (NAS) - NAS systems usually contain one or more hard disks that are arranged into logical, redundant storage containers much like traditional file servers. NAS provides readily available storage resources and helps alleviate the bottlenecks associated with access to storage devices. Network Security - The protection of computer networks and their services from unauthorized entry, modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and that there are no harmful side effects. Network security includes providing for data integrity.Non-Repudiation - Ensuring that a transferred message has been sent and received by the parties claiming to have sent and received the message. Non-repudiation is a way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.OObject Code - Software program instructions compiled (translated) from source code into machine-readable formats.Object Program - A program that has been translated into machine language and is ready to be run (i.e., executed) by the computer.Office of Foreign Asset Control (OFAC) - The Office of Foreign Assets Control, United States Department of the Treasury, administers and enforces economic sanctions programs primarily against countries and groups of individuals such as terrorists and narcotics traffickers. The sanctions can be either comprehensive or selective, using the blocking of assets and trade restrictions to accomplish foreign policy and national security goals.Offsite Rotation - Used for backup and/or disaster recovery; moving a copy of the most current database, information, file, or tape to an offsite storage facility to be used only in an emergency.On-Us Checks - Checks that are deposited into the same institution on which they are drawn.Open Market Operations - The buying and selling of government securities in the open market in order to expand or contract the amount of money in the banking system.Operating System - Programs that collectively manage application programs. Operating systems allocate system resources, provide access and security controls, maintain file systems, and manage communications between end users and hardware devices.Originating Depository Financial Institution (ODFI) - A participating financial institution that originates entries at the request of and by agreement with its originators in accordance with the provisions of the NACHA rules.Originator - A person that has authorized an ODFI to transmit a credit or debit entry to the deposit account of a receiver at an RDFI.Outsourcing - The practice of contracting with another entity to perform services that might otherwise be conducted in-house. Contracted relationship with a third party to provide services, systems, or support.PP2P - Peer-to-peer communication, the communications that travel from one user’s computer to another user’s computer without being stored for later access on a server. E-mail is not a P2P communication since it travels from the sender to a server, and is retrieved by the recipient from the server. On-line chat, however, is a P2P communication since messages travel directly from one user to another.Pandemic - An epidemic or infectious disease that can have a worldwide impact.Passwords - A secret sequence of characters that is used as a means of authentication. Patch - Software code that replaces or updates other code. Frequently patches are used to correct security flaws.Patching - Software code that replaces or updates other code. Frequently patches are used to correct security flaws.Paying Bank - A paying bank is the institution where a check is payable and to which it is sent for payment.Payment - A transfer of value.Payment System - The mechanism, the rules, institutions, people, markets, and agreements that make the exchange of payments possible.Payments System Risk Policy (PSR) - The Federal Reserve’s Payments System Risk (PSR) policy addressing the risks that payment systems present to the Federal Reserve Banks, the banking system, and to other sectors of the economy. Payroll Card Account - A bank account that is established directly or indirectly by an employer on behalf of an employee to which an electronic funds transfers the employee’s wages or compensation on a recurring basis. The payroll card, often branded by one of the credit/debit card associations, provides the employee access to the funds. PBX - Private branch exchange. A telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines.PCI Security Standards Council - The governing body, representing key participants of the payment card industry, which establishes and maintains security standards for payment cards.Penetration Test - The process of using approved, qualified personnel to conduct real-world attacks against a system so as to identify and correct security weaknesses before they are discovered and exploited by others. Permanent Virtual Circuit (PVC) - PVC is a pathway through a network that is predefined and maintained by the end systems and nodes along the circuit, but the actual pathway through the network may change due to routing problems. The PVC is a fixed circuit that is defined in advance by the public network carrier. Refer to switched virtual circuit for an additional virtual circuit option.Personal Digital Assistant (PDA) - A pocket-sized, special-purpose personal computer that lacks a conventional keyboard.Person-To-Person (P2P) Payment - Online payments using electronic mail messages to invoke a transfer of value between the parties over existing proprietary networks as on-us transactions.Phase - A project segment.PKI - Abbreviation for “public key infrastructure.” The use of public key cryptog-raphy in which each customer has a key pair (i.e., a unique electronic value called a public key and a mathematically-related private key). The private key is used to encrypt (sign) a message that can only be decrypted by the cor-responding public key or to decrypt a message previously encrypted with the public key. The public key is used to decrypt a message previously encrypted (signed) using an individual's private key or to encrypt a message so that it can only be decrypted (read) using the intended recipient’s private key. See "Encryption".Platform - The underlying computer system on which applications programs run. A platform consists of an operating system, the computer system's coordinating program, which in turn is built on the instruction set for a processor or microprocessor, and the hardware that performs logic operations and manages data movement in the computer. POD - Proof of deposit. The verification of the dollar amount written on a negotiable instrument being deposited. Point-Of-Sale (POS) Network - A network of institutions, debit cardholders, and merchants that permit consumers to make direct payment electronically at the place of purchase. The funds are withdrawn from the account of the cardholder.Pop-Up Box - A dialog box that automatically appears when a person accesses a webpage.Port - Either an endpoint to a logical connection or a physical connection to a computer.POTS - Plain old telephone system. Basic telephone service.Presentment Fee - A fee that an institution receiving a check may impose on the institution that presents the check for payment. No presentment fee may be charged for checks presented by 8 a.m. local time.Private Key - See "PKI".Private Label Card - See "Store Card".Project - A task involving the acquisition, development or maintenance of a technology product.Project Management - Planning, monitoring, and controlling an activity.Protocol - A format for transmitting data between devices.Proxy Server - An Internet server that controls client computers’ access to the Internet. Using a proxy server, a company can stop employees from accessing undesirable websites, improve performance by storing webpages locally, and hide the internal network's identity so monitoring is difficult for external users.Public Key - See "PKI".RRAID - Redundant array of independent disks. The use of multiple hard disks to store the same data in different places. By placing data on multiple disks, I/O operations can overlap in a balanced way, improving performance. Since multiple disks increase the mean time between failures (MTBF), storing data redundantly also increases fault-tolerance. Real Time Gross Settlement (RTGS) System - A type of payments system operating in real time rather than batch processing mode. It provides immediate finality of transactions. Gross settlement refers to the settlement of each transfer individually rather than netting. FedwireÒ is an example of a real time gross settlement system.Receiver - An individual, corporation, or other entity that has authorized a company or an originator to initiate a credit or debit entry to a transaction account belonging to the receiver held at its RDFI.Receiving Depository Financial Institution (RDFI) - Any financial institution qualified to receive debits or credits through its ACH operator in accordance with the ACH rules.Reciprocal Agreement - An agreement whereby two organizations with similar computer systems agree to provide computer processing time for the other in the event one of the systems is rendered inoperable. Processing time may be provided on a “best effort” or as “time available” basis; therefore, reciprocal agreements are not usually acceptable as a primary recovery option.Reconverting Bank (Check 21) - The financial institution that creates a substitute check. With respect to a substitute check that was created by a person that is not a financial institution, the reconverting bank is the first financial institution that transfers, presents, or returns that substitute check or, in lieu thereof, the first paper or electronic representation of that substitute check. The reconverting bank warrants that (1) the substitute check is the legal equivalent of the original check; and (2) the original check cannot be presented again in any form so the customer pays the check only once.Recovery Point Objective (RPO) - The amount of data that can be lost without severely impacting the recovery of operations or the point in time in which systems and data must be recovered (e.g., the date and time of a business disruption).Recovery Point Objectives (RPOs) - RPOs represent the amount of data that can be lost without severely impacting the recovery of operations or the point in time in which systems and data must be recovered (e.g., the date and time of a business disruption). Recovery Service Levels - Collectively, terms that define the speed, quality, and quantity of recovery capability in response to a disaster, including recovery time objective, recovery point objective, timely notification, percentage of normal production service level agreements (SLAs) that will be delivered during recovery mode, etc.Recovery Site - An alternate location for processing information (and possibly conducting business) in an emergency. Usually distinguished as “hot” sites that are fully configured centers with compatible computer equipment and “cold” sites that are operational computer centers without the computer equipment.Recovery Time Objective (RTO) - The maximum allowable downtime that can occur without severely impacting the recovery of operations or the time in which systems, applications, or business functions must be recovered after an outage (e.g. the point in time that a process can no longer be inoperable). Recovery Time Objectives (RTOs) - RTOs represent the maximum allowable downtime that can occur without severely impacting the recovery of operations or the time in which systems, applications, or business functions must be recovered after an outage (e.g. the point in time that a process can no longer be inoperable). Recovery Vendors - Organizations that provide recovery sites and support services for a fee. Regulation CC - A regulation (12 CFR 229) promulgated by the Board of Governors of the Federal Reserve System regarding the availability of funds and the collection of checks. The regulation governs the availability of funds deposited in checking accounts and the collection and return of checks.Regulation E - A regulation (12 CFR 205) promulgated by the Board of Governors of the Federal Reserve System to ensure consumers a minimum level of protection in disputes arising from electronic fund transfers.Regulation Z - Regulation Z, the Truth in Lending Act (TILA) (12 CFR 226) promulgated by the Board of Governors of the Federal Reserve System. The regulation prescribes uniform methods for computing the cost of credit, disclosing credit terms, and resolving errors on certain types of credit accounts.Remittance Cards - Payment cards that are typically used to facilitate cross-border movement of funds by individuals and for person-to-person transactions.Remote Access Capabilities - The ability to obtain access to a computer or network from a remote distance.Remote Capture - Process that is used to scan and transmit check images and data electronically.Remote Control Software - Software that is used to obtain access to a computer or network from a remote distance.Remote Deposit Capture (RDC) - A service that enables users at remote locations to scan digital images of checks and transmit the captured data to a financial institution or a merchant that is a customer of a financial institution.Remote Journaling - Process used to transmit journal or transaction logs in real time to a back-up location.Remotely Created Check (RCC) - A check that is drawn on a customer account at a financial institution, is created by the payee, and does not bear a signature in the format agreed to by the paying financial institution and customer. RCCs are also known as “demand drafts,” “telechecks,” “preauthorized drafts,” “paper drafts,” or “digital checks.” Replay Attack - The interception of communications, such as an authentication communication, and subsequently impersonation of the sender by retransmitting the intercepted communication.Repudiation - The denial by one of the parties to a transaction of participation in all or part of that transaction or of the content of the communication.Reserve Account - A non-interest-earning balance account institutions maintain with the Federal Reserve Bank or with a correspondent bank to satisfy the Federal Reserve’s reserve requirements. Reserve account balances play a central role in the exchange of funds between depository institutions.Reserve Requirements - The percentage of deposits that a depository institution may not lend out or invest and must hold either as vault cash or on deposit at a Federal Reserve Bank. Reserve requirements affect the potential of the banking system to create transaction deposits.Resiliency - The ability of an organization to recover from a significant disruption and resume critical operations.Resiliency Testing - Testing of an institution’s business continuity and disaster recovery resumption plans.Retail Payments - Payments, typically small, made in the goods and services market.Retention Requirement - Requirement established by a company or by regulation for the length of time and/or for the amount of information that should be retained.Return (ACH) - Any ACH entry that has been returned to the ODFI by the RDFI or by the ACH operator because it cannot be processed. The reason for each return is included with the return in the form of a “return reason code.” (See the NACHA “Operating Rules and Guidelines” for a complete reason code listing.)Risk - The possibility of an act or event occurring that would have an adverse effect on the organization and its information systems. Risk Analysis - The process of identifying risks, determining their probability and impact, and identifying areas needing safeguards; Risk analysis is an integral part of risk management.Risk Assessment - A prioritization of potential business disruptions based on severity and likelihood of occurrence. The risk assessment includes an analysis of threats based on the impact to the institution, its customers, and financial markets, rather than the nature of the threat. Risk Management - The total process required to identify, control, and minimize the impact of uncertain events. The objective of a risk management program is to reduce risk and obtain and maintain appropriate management approval.Router - A hardware device that connects two or more networks and routes incoming data packets to the appropriate network.Routing - The process of moving information from its source to the destination.Routing Number - Also referred to as the ABA number. A nine-digit number (eight digits and a check digit) that identifies a specific financial institution.SSAN - Storage area network. A high-speed special-purpose network (or sub-network) that connects different types of data storage devices with associated data servers on behalf of a larger network of users. SAS 70 Report - An audit report of a servicing institution prepared in accordance with guidance provided in the American Institute of Certified Public Accountant's Statement of Auditing Standards Number 70.Satellite Technology - These links efficiently extend the reach of typical communication systems to distant areas and provide alternative traffic routing in an emergency.Scalability - A term that refers to how well a hardware and software system can adapt to increased demands. For example, a scalable network system would be one that can start with just a few nodes but can easily expand to thousands of nodes. Scalability can be a very important feature because it means the entity can invest in a system with confidence they will not quickly outgrow it. Script - A file containing active content; for example, commands or instructions to be executed by the computer.SCSI - Small computer systems interface (pronounced ”scuzzy”). A standard way of interfacing a computer to disk drives, tape drives, and other devices that require high-speed data transfer. Also, a secondary SAN protocol that allows computer applications to talk to storage devices.SDLC - Systems Development Life Cycle. A project management technique.Security Architecture - A detailed description of all aspects of the system that relate to security, along with a set of principles to guide the design. A security architecture describes how the system is put together to satisfy the security requirements.Security Audit - An independent review and examination of system records and activities to test for adequacy of system controls, ensure compliance with established policy and operational procedures, and recommend any indicated changes in control, policy, and procedures.Security Event - An event that compromises the confidentiality, integrity, availability, or accountability of an information system.Security Procedure Agreement - An agreement between a financial institution and a Federal Reserve Bank whereby the financial institution agrees to certain security procedures if it uses an encrypted communications line with access controls for the transmission or receipt of a payment order to or from a Federal Reserve Bank.Security Violation - An instance in which a user or other person circumvents or defeats the controls of a system to obtain unauthorized access to information or system resources.Server - A computer or other device that manages a network service. An example is a print server, which is a device that manages network printing.Service Level Agreement (SLA) - Formal documents that outline the institution's predetermined requirements for the service and establish incentives to meet, or penalties for failure to meet, the requirements. They should specify and clarify performance expectations, establish accountability, and detail remedies or consequences if performance or service quality standards are not met.Service Provider - Also referred to as a technology service provider (TSP). Among a broad range of entities, including affiliated entities, non-affiliated entities, and alliances of companies providing products and services. Other terms used to describe service providers include vendors, subcontractors, external service providers, application service providers, and outsourcers.Settlement - The final step in the transfer of ownership involving the physical exchange of securities or payment. In a banking transaction, settlement is the process of recording the debit and credit positions of the parties involved in a transfer of funds. In a financial instrument transaction, settlement includes both the transfer of securities by the seller and the payment by the buyer. Settlements can be “gross” or “net.” Gross settlement means each transaction is settled individually. Net settlement means parties exchanging payments will offset mutual obligations to deliver identical items (e.g., dollars or EUROS), at a specified time, after which only one net amount of each item is exchanged.Settlement Date (ACH) - The date on which an exchange of funds with respect to an entry is reflected on the books of the Federal Reserve Bank.Settlement Eligible Instructions - See "Matched Instructions". Short Position - In respect of a currency balance that is less than zero, the amount by which such currency balance is less than zero. An investment position that benefits from a decline in market price. When one sells a currency their position is short.Short Position Limit - In respect of an eligible currency, the maximum short position a Settlement Member may have at any time in that eligible currency and, unless otherwise reduced pursuant to the CLS Bank Rules, shall equal (i) the total amount of all available committed liquidity facilities in such eligible currency (or such lesser amount that CLS Bank may determine from time to time) minus (ii) the amount of the largest available committed liquidity facility among such liquidity facilities (after taking into account any amounts already drawn. Significant Firms - Firms that process a significant share of transactions in critical financial markets. Simulated Loss of Data Center Site(s) Test / Exercise - A type of disaster recovery test that involves the simulation of the loss of the primary, alternate, and/or tertiary data processing sites to verify that the institution can continue its data processing activities. Simulation - The process of operating a model of an enterprise-wide or business line activity in order to test the functionality of the model. Computer systems may support the simulation of business models to aid in evaluating the BCP. Single-Entry (ACH) - A one-time transfer of funds initiated by an originator in accordance with the receiver’s authorization for a single ACH credit or debit to the receiver's consumer account.SLA - Service level agreement. SLAs detail the responsibilities of an IT service provider, the rights of the service provider’s customers, and the penalties assessed when the service provider violates any element of the SLA. SLAs also identify and define the service offering itself, plus the supported products, evaluation criteria, and quality of service customers should expect. SLAs are typically measured in terms of metrics. Examples include processing completion times and systems availability times.Smart Cards - A card with an embedded computer chip on which information can be stored and processed.Sniffing - The passive interception of data transmissions.Social Engineering - Obtaining information from individuals by trickery.SONET - Synchronous optical network. A standard that defines interface standards for connecting fiber-optic transmission systems. Sound Practices - Defined in the “Interagency Paper on Sound Practices to Strengthen the Resilience of the U.S. Financial System,” which was issued by the Board of Governors of the Federal Reserve System, Office of the Comptroller of the Currency, and Securities and Exchange Commission. Source Code - Software program instructions written in a format (language) readable by humans.Source Program - A program written in a programming language (such as C, Pascal, or COBOL). A compiler translates the source code into a machine-language object program.Spiral Development - An iterative project management model that focuses on the identification of project and product risks and the selection of project management techniques that best control the identified risks.Split Processing - The ongoing operational practice of dividing production processing between two or more geographically dispersed facilities.Spoofing - A form of masquerading where a trusted IP address is used instead of the true IP address as a means of gaining access to a computer system.Spot - The most common foreign exchange transaction. Spot or spot date refers to the spot transaction value date that requires settlement within two business days, subject to value date calculation.Sreen Scraping - A process used by information aggregators to gather information from a customer’s website, whereby the aggregator accesses the target site by logging in as the customer, electronically reads and copies selected information from the displayed webpage(s), then redisplays the information on the aggregator’s site. The process is analogous to “scraping” the information off the computer screen. SSL (Secure Socket Layer) - An encryption system developed by Netscape. SSL protects the privacy of data exchanged by the website and the individual user. It is used by websites whose names begin with https instead of http.Standard Entry Class (SEC) Code - Three-character code in an ACH company/batch header record used to identify the payment type within an ACH batch.Stateful Inspection - A firewall inspection technique that examines the claimed purpose of a communication for validity. For example, a communication claiming to respond to a request is compared to a table of outstanding requests.Storage Area Network (SAN) - SAN represents several storage systems that are interconnected to form one back-up network, which allows various systems to be connected to any storage device and prevents dependence on a single line of communication.Storage Virtualization - The process of taking many different physical storage networks and devices, and making them appear as one “virtual” entity for purposes of management and administration.Store Card - A credit card issued by a financial institution for a specific merchant or vendor that does not carry a bankcard association logo. Store cards can only be used at the merchant or vendor whose name appears on the front of the card.Stored-Value Card - A card-based payment system that assigns a value to the card. The card’s value can be stored on the card itself (i.e., on the magnetic stripe or in a computer chip) or in a network database. As the card is used for transactions, the transaction amounts are subtracted from the card’s balance. As the balance approaches zero, some cards can be "reloaded" through various methods and others are designed to be discarded. These cards are often used in closed systems for specific types of purchases.Stovepipe Application - Stand-alone programs that may not easily integrate with other applications or systems.Street Tests - Street tests are also called cross-market tests or market-wide tests that are sponsored by the Securities Industry Association, Bond Market Association, and Futures Industry Association. These tests validate the connectivity from alternate sites and include transaction, settlement, and payment processes, to the extent practical. Substitute Check (Check 21) - Also known as the Image Replacement Document (IRD). A paper reproduction of an original check that (1) contains an image of the front and back of the original check; (2) bears a MICR line that, except as provided under ANS X9.100-140, contains all the information appearing on the MICR line of the original check when it was issued and any additional information that was encoded on the original check’s MICR line before an image of the original check was captured; (3) conforms in paper stock, dimension, and otherwise with ANS X9.100-140; and (4) is suitable for automated processing in the same manner as the original check. The Federal Reserve Board of Governors can by rule or order determine different standards. Suspicious Activity Report (SAR) - Reports required to be filed by the Bank Secrecy Act when a financial institution identifies or suspects fraudulent activity. Sustainability - The period of time for which operations can continue at an alternate processing facility. Switch - A device that connects more than two LAN segments that use the same data link and network protocol. Switched Virtual Circuit (SVC) - SVC is a temporary connection between workstations that is disabled after communication is complete. Refer to Permanent Virtual Circuit (PVC) for an additional communication method using circuits.Synchronous Data Replication - A process for copying data from one source to another in which an acknowledgement of the receipt of data at the copy location is required for application processing to continue. Consequently, the content of databases stored in alternate facilities is identical to those at the original storage site, and copies of data contain current information at the time of a disruption in processing.System Resources - Capabilities that can be accessed by a user or program either on the user’s machine or across the network. Capabilities can be services, such as file or print services, or devices, such as routers.Systems Development Life Cycle - An approach used to plan, design, develop, test, and implement an application system or a major modification to an application system. TT-1 Line - A special type of telephone line for digital communication and transmission. T-1 lines provide for digital transmission with signaling speed of 1.544Mbps (1,544,000 bits per second). This is the standard for digital transmissions in North America. Usually delivered on fiber optic lines.Table Top Exercise/ Structured Walk- Through Test - TCO - Total cost of ownership. A term defining the true cost of ownership of a PC or other technology system. TCO includes:
- Original cost of the computer and software;
- Hardware and software upgrades;
- Technical support; and
- Training TCP/IP - Transmission control protocol/Internet protocol. A communication standard for transmitting data packets from one computer to another. TCP/IP is used on the Internet and other networks. The two parts of TCP/IP are TCP, which deals with constructions of data packets, and IP, which routes them from machine to machine. Terminal Services - A component of Microsoft Windows operating systems (both client and server versions) that allows a user to access applications or data stored on a remote computer over a network connection.Test Assumptions - The concepts underlying an institution’s test strategies and plans. Test Key - Internal controls used to verify the authenticity of incoming wire requests involve the use of test keys. A test key is a formula used to develop or interpret test codes or test words. Test codes or words consist of a series of numbers signifying different types of information and usually precede the text of the message. As an example, a test code may contain a bank number, the amount of the transaction, and a number indicating the day and week of the month. As an additional precaution, many test codes contain a variable (sequence number) based on the number of messages received. Test Plan - A document that is based on the institution’s test scope and objectives and includes various testing methods. Test Scenario - A potential event, identified as the operating environment for a business continuity or disaster recovery test, which the institution’s recovery and resumption plan must address. Test Scripts - Documents that define the specific activities, tasks, and steps that test participants will conduct during the testing process. Test Strategy - Testing strategies establish expectations for individual business lines across the testing life cycle of planning, execution, measurement, reporting, and test process improvement. Testing strategies include the testing scope and objectives, which clearly define what functions, systems, or processes are going to be tested and what will constitute a successful test.Third-Party Sender - A special subset of a technology service provider that is authorized to transmit ACH files on behalf of an originator. Typically, the ODFI must rely upon warranties by the third- party sender regarding the originators’ identity and credit worthiness, which places additional risks on the ODFI.Third-Party Service Provider (TPSP)(For ACH) - A third party, other than the ODFI or RDFI, that performs any function on behalf of the ODFI or the RDFI related to ACH processing. These functions would include the creation and sending of ACH files or acting as a sending or receiving point on behalf of a participating depository financial institution. Tokens - A small device with an embedded computer chip that can be used to store and transmit electronic information. Topology - A description of any kind of locality in terms of its physical layout. In the context of communication networks, a topology describes pictorially the configuration or arrangement of a network, including its nodes and connecting communication lines.Transaction Testing - A testing activity designed to validate the continuity of business transactions and the replication of associated data. Trojan Horse - Malicious code that is hidden in software that has an apparently beneficial or harmless use.Truncating Bank (Check 21) - The financial institution that truncates the original check. If a person other than a financial institution truncates the original check, the truncating bank is the first financial institution that transfers, presents, or returns, in lieu of such original check, a substitute check or, by agreement with the recipient, information relating to the original check (including data taken from the MICR line of the original check or an electronic image of the original check), whether with or without the subsequent delivery of the original check.Two-way Polling - An emergency notification system that allows management to ensure that all employees are contacted and have confirmed delivery of pertinent messages.UUltra Forward Service - This service allows control over the re-routing of incoming phone calls to pre-determined alternate locations in the event of a telecommunications outage.UPS - Uninterruptible power supply. A device that allows your computer to keep running for at least a short time when the primary power source is lost. A UPS may also provide protection from power surges. A UPS contains a battery that "kicks in" when the device senses a loss of power from the primary source allowing the user time to save any data they are working on and to exit before the secondary power source (the battery) runs out. When power surges occur, a UPS intercepts the surge so that it doesn't damage your computer. URL - Abbreviation for “Uniform (or Universal) Resource Locator.” A way of specifying the location of publicly available information on the Internet, in the form: protocol://machine:port number/filename. Often the port number and/or filename are unnecessary.USA Patriot Act - The USA PATRIOT Act (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (Public Law Pub.L. 107-56), commonly known as the "Patriot Act", was enacted by Congress to deter and punish terrorist acts in the United States and around the world by enhancing the law enforcement investigatory tools of both domestic law enforcement and foreign intelligence agencies.User Identification - The process, control, or information by which a user identifies himself or herself to the system as a valid user (as opposed to authentication).Utility - A program used to configure or maintain systems, or to make changes to stored or transmitted data.Utility programs - A program used to configure or maintain systems, or to make changes to stored or transmitted data.VVESDA - Very early smoke detection alert. A system that samples the air on a continuing basis and can detect fire at the pre-combustion stage.Virtual Mall - An Internet website offering products and services from multiple vendors or suppliers.Virtual Private Network (VPN) - A computer network that uses public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. Virus - Malicious code that replicates itself within a computer.VLAN - Virtual local area network.Voice over Internet Protocol (VoIP) - The transmission of voice telephone conversations using the Internet or Internet Protocol networks.VOIP - Voice over Internet protocol. A term used in IP telephony for a set of facilities for managing the delivery of voice information using the Internet Protocol. Vulnerability - Hardware, firmware, or software flaw that leaves an information system open to potential exploitation; a weakness in automated system security procedures, administrative controls, physical layout, internal controls, etc., that could be exploited to gain unauthorized access to information or to disrupt critical processing. Vulnerability Analysis - Systematic examination of an information system or product to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures, and confirm the adequacy of such measures after implementation.Vulnerability Scanning - Systematic examination of systems to determine the adequacy of security measures, identify security deficiencies, and provide data from which to predict the effectiveness of proposed security measures.WWalk-Through Drill/Simulation Test - This test represents a preliminary step in the overall testing process that may be used for training employees but not as a preferred testing methodology. During this test, participants choose a specific scenario and apply the BCP to it. Wallet Card - Portable information cards that provide emergency communications information for customers and employees. Warehouse Attack - The compromise of systems that store authenticators.WEB SEC Code - An ACH debit entry initiated by an originator resulting from the receiver’s authorization through the Internet to make a transfer of funds from a consumer account of the receiver.Weblinking - The use of hyperlinks to direct users to webpages of other entities.Website - A webpage or set of webpages designed, presented, and linked together to form a logical information resource and/or transaction initiation function.Website Hosting - The service of providing ongoing support and monitoring of an Internet-addressable computer that stores webpages and processes transactions initiated over the Internet.Wide-Scale Disruption - An event that disrupts business operations in a broad geographic area. Wireless Application Protocol (WAP) - A data transmission standard to deliver wireless markup language (WML) content.Wireless Communication - The transfer of signals from place to place without cables, usually using infrared light or radio waves.Wireless Gateway Server - A computer (server) that transmits messages between a computer network and a cellular telephone or other wireless access device. Wireless Phone - See "Cellular Telephone".Work Program - A series of specific, detailed steps to achieve an audit objective. Workstation - Any computer connected to a local-area network. Work-Transfer - Work-transfer is a process whereby the staff located at a recovery site accepts the workload of staff located at a primary production site, and a data center located at a recovery site accepts the workload of the primary data processing site. Worm - A self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is primarily because of security vulnerabilities on the target computers. WORM (Acronym) - Write once, read many times. A type of optical disk where a computer can save information once, can then read that information, but cannot change it.XXML - XML (Extensible Markup Language) is a ”metalanguage” – a language for describing other languages – which lets you design your own customized markup languages for different types of documents. It is designed to improve the functionality of the Web by providing more flexible and adaptable information identification.