1
2
3
4
5
100

a partial or complete representation of a system or object (existing or in project) in order to test and validate certain aspects and/or behavior (functional model).

Mock-up

100

corresponds to a set of actions carried out by the system in interaction with the actors for a purpose.

Use case

100

A cloud service model where the user can access an app directly in rental mode.

Software as a service

100

Business strategy tool that determines the options available in a strategic area of activity.

SWOT analysis

100

a formal, structured procedure for generating competing offers from different potential suppliers or contractors

Invitation to tender (ITT)

200

unpredictable turn that an event can take.

hazard

200

entire network that allows the delivery of products or services from raw materials to end customers.

supply chain

200

consists of systematic information about the latest techniques and especially about their commercial availability.

technological watch

200

set of operations carried out within an organization to enable it to adapt to change and change in the environment.

change management

200

a software development model based on distributed application components with discovery, access control, data mapping and security features.

Service-oriented architecture (SOA)

300

an act by which an act in progress is amended by correcting, removing, or adding certain provisions.

endorsement

300

orderly list of operations necessary to achieve the desired result, the total duration of which gives the duration of the project.

Critical path method (CPM)

300

Graphic representation of an organization's processes. It highlights the link between the tasks that make up the process and their sequence.

Process Mapping

300

group of executives responsible for ensuring the smooth running of a project within a company.

Steering committee

300

Inspects each package to find a user-defined type of content, such as an IP address, but does not track the status of the sessions.

packet filter

400

attack that involves sending a large stream of data or packets to saturate a victim.

Flood

400

A document that defines the framing of a project as a whole. Needs, objectives, constraints, expected functionalities, deadlines and budget are formalized in the most accurate way possible.

Scope statement

400

this technique allows to optimize choices from an economic perspective in order to limit itself to the necessary and to focus on the real needs of the customer.

value analysis

400

A method by which the data sender gives proof of shipment and the recipient is assured of the identity of the sender, so that no one can subsequently deny having processed that data.

Non-repudiation

400

Any program or set of programs used to conceal activity, malicious or not, on a machine.

Rootkit

500

a program that allows people to receive recognition and compensation after reporting bugs, anomalies, exploits and vulnerabilities on websites, applications or computer systems.

Bug Bounty

500

exhaustive search method. It consists of testing all possible combinations to find a password or key.

Bruteforce

500

group of individuals who can influence or be influenced by the achievement of a company's goals.

stakeholders

500

to ensure that the project is proceeding in accordance with the established schedule and that human, material and financial resources are well defined and used wisely.

Project progress monitoring

500

Program reproducing from machine to machine through network connections and information systems when it spreads

worm

M
e
n
u