a partial or complete representation of a system or object (existing or in project) in order to test and validate certain aspects and/or behavior (functional model).
Mock-up
corresponds to a set of actions carried out by the system in interaction with the actors for a purpose.
Use case
A cloud service model where the user can access an app directly in rental mode.
Software as a service
Business strategy tool that determines the options available in a strategic area of activity.
SWOT analysis
a formal, structured procedure for generating competing offers from different potential suppliers or contractors
Invitation to tender (ITT)
unpredictable turn that an event can take.
hazard
entire network that allows the delivery of products or services from raw materials to end customers.
supply chain
consists of systematic information about the latest techniques and especially about their commercial availability.
technological watch
set of operations carried out within an organization to enable it to adapt to change and change in the environment.
change management
a software development model based on distributed application components with discovery, access control, data mapping and security features.
Service-oriented architecture (SOA)
an act by which an act in progress is amended by correcting, removing, or adding certain provisions.
endorsement
orderly list of operations necessary to achieve the desired result, the total duration of which gives the duration of the project.
Critical path method (CPM)
Graphic representation of an organization's processes. It highlights the link between the tasks that make up the process and their sequence.
Process Mapping
group of executives responsible for ensuring the smooth running of a project within a company.
Steering committee
Inspects each package to find a user-defined type of content, such as an IP address, but does not track the status of the sessions.
packet filter
attack that involves sending a large stream of data or packets to saturate a victim.
Flood
A document that defines the framing of a project as a whole. Needs, objectives, constraints, expected functionalities, deadlines and budget are formalized in the most accurate way possible.
Scope statement
this technique allows to optimize choices from an economic perspective in order to limit itself to the necessary and to focus on the real needs of the customer.
value analysis
A method by which the data sender gives proof of shipment and the recipient is assured of the identity of the sender, so that no one can subsequently deny having processed that data.
Non-repudiation
Any program or set of programs used to conceal activity, malicious or not, on a machine.
Rootkit
a program that allows people to receive recognition and compensation after reporting bugs, anomalies, exploits and vulnerabilities on websites, applications or computer systems.
Bug Bounty
exhaustive search method. It consists of testing all possible combinations to find a password or key.
Bruteforce
group of individuals who can influence or be influenced by the achievement of a company's goals.
stakeholders
to ensure that the project is proceeding in accordance with the established schedule and that human, material and financial resources are well defined and used wisely.
Project progress monitoring
Program reproducing from machine to machine through network connections and information systems when it spreads
worm