Shared Flashcard Set

Details

Isys 414 Chapter 9
Isys 414 Chapter 9
329
Computer Science
Undergraduate 1
10/12/2010

Additional Computer Science Flashcards

 


 

Cards

Term
Value Chain
Definition
Conceptualized organization of activities an organization performs to provide value to their customers.
Term
Value Chain Parts
Definition
1. Inbound Logistics 2. Operations Activities 3. Outbound logistics 4. Marketing and sales 5. Service
Term
Inbound Logistics
Definition
Receiving, storing, and distributing the materials an organization uses to create the products and services it sells.
Term
Operations Activities
Definition
Transform inputs into final products or services.
Term
Outbound logistics
Definition
Distribute finished product or service to customers
Term
Marketing and sales
Definition
Help customers buy the products or services the organization provides.
Term
Service
Definition
Provide post-sale support to customers
Term
Support Activities
Definition
Allow the five primary activities (value chain parts) to be performed effectively and efficiently.
Term
Support Activities Outline
Definition
1. Firm Infrastructure 2. Human Resources 3. Technology 4. Purchasing
Term
Firm Infrastructure Activities
Definition
Accounting, finance, legal and geneal administration activities that allow an organization to function.
Term
Human Resources Activities
Definition
Recruiting, hiring, training, and providing employee benefits and compensations.
Term
Technology Activities
Definition
Improve a product or service.
Term
Purchasing Activities
Definition
Procure raw materials, supplies, machinery, and the buildings used to carry out the primary activities.
Term
Supply Chain
Definition
A manufacturing organization interacts with its suppliers and distributors. Value chain is a part of this.
Term
How an AIS can add value to an organization
Definition
1. Improving quality & reducing costs 2. Improving efficiency 3. Sharing knowledge 4. improving the efficiency and effectiveness of its supply chain 5. Improving the internal control structure 6. Improving decision making
Term
Structured Decisions
Definition
repetitive, routine, understood well enough to be delegated
Term
semi-structured decisions
Definition
incomplete decisions need for subjective assessments; can be computer aided
Term
unstructured decisions
Definition
nonrecurring and non-routine, require judgment and intuition.
Term
operational control
Definition
effective efficient performance of tasks
Term
management control
Definition
effective and efficient use or resources
Term
strategic planning
Definition
establishing objectives and policies to accomplish objectives.
Term
product differentiation
Definition
adding features or services not provided by competitors
Term
low-cost strategy
Definition
be the most efficient producer
Term
variety-based strategic position
Definition
providing a subset of the industry ex. Jiffy Lube only oil changes
Term
needs-based strategic position
Definition
trying to serve most or all of the needs of a particular group ex. AARP tries to get all retirees
Term
access-based strategic position
Definition
serving a subset of customers who are different ex. Edward Jones only operates in small towns
Term
synergy
Definition
the system is greater than the sum of its parts
Term
predictive analysis
Definition
use data and algorithms to forecast future events
Term
value of information
Definition
benefit produced by the information minus the cost of producing it
Term
MAJOR BENEFITS OF INFORMATION:
Definition
1. Reduction of uncertainty 2. Improved decisions 3. Better ability to plan activities
Term
mandatory information
Definition
required by a governmental entity
Term
essential information
Definition
required to conduct business with external parties
Term
transaction
Definition
an agreement between two entities to exchange goods or services
Term
business or transactional processing
Definition
system which captures transactions and outputs financial statements
Term
Transactional Processing Outline
Definition
1. Revenue cycle 2. Expenditure cycle 3. Production cycle 4. Human resources/Payroll cycle 5. Financing cycle
Term
revenue cycle
Definition
goods and services sold for cash or promise
Term
expenditure cycle
Definition
purchase inventory for resale or production of products for cash or promise
Term
production cycle
Definition
raw materials transformed into finished goods
Term
human resources/ payroll cycle
Definition
employees are hired, trained, compensated, evaluated, promoted, and terminated.
Term
financing cycle
Definition
companies sell shares to investors, borrow money, investors are paid dividends, interests paid on loans
Term
General ledger and reporting system
Definition
show how transaction processes relate and interface and collects info from each for management and external parties
Term
data processing cycle
Definition
operations performed on data to generate meaningful and relevant information
Term
turnaround documents
Definition
records of company data sent to external party and returned as input
Term
source data automation
Definition
devices that capture transaction data in machine-readable form at the time and place of origin
Term
general ledger
Definition
summary-level data for every asset, liability, equity, revenue, and expense account
Term
subsidiary ledger
Definition
all detailed data for any general ledger account that has many individual subaccounts
Term
control account
Definition
general ledger account corresponding to a subsidiary ledger
Term
Coding
Definition
Systematic assignment of numbers or letters to items to classify and organize them
Term
Sequence codes
Definition
items are numbered consecutively to ensure there will be no gaps in the sequence
Term
block code
Definition
blocks of number within a numerical sequence are reserved for categories having meaning to the user
Term
group codes
Definition
Used in conjunction with block code - two or more subgroups of digits are used to code the item
Term
chart of accounts
Definition
list of all general ledger accounts an organization uses
Term
general journal
Definition
used to record infrequent or non routine transactions
Term
specialized journal
Definition
used to record repetitive transitions: credit sales. cash receipts, etc
Term
audit trail
Definition
the posting of reference and document numbers
Term
attributes
Definition
characteristics of interest
Term
entity
Definition
something about which information is stored
Term
field
Definition
physical space a data value is stored
Term
record
Definition
set of fields containing data about various attributes of the same entity
Term
data value
Definition
content of a field
Term
file
Definition
related records are grouped
Term
master file
Definition
store cumulative information about an origination's resources and the agents whom it interacts - permament
Term
transaction files
Definition
contain records for individual business transactions that occur during a specific fiscal period
Term
database
Definition
set of interrelated, centrally coordinated files
Term
batch processing
Definition
periodic updating of data
Term
online, real-time processing
Definition
update data as transaction occurs
Term
Enterprise resource planning (ERP) system
Definition
designed to overcome problems as they relate to aspects of a company's operations within its traditional AIS
Term
Documentation
Definition
The narratives, flowcharts, diagrams, and other written materials that explain how a system works.
Term
Narrative Description
Definition
A written step-by-step explanation of system components and interactions.
Term
Data Flow Diagram (DFD)
Definition
A graphical description of the source and destination of data that shows data flow within an organization, the processes performed on the data, and how data are stored.
Term
Document Flowchart
Definition
A graphical description of the flow of documents and information between departments or areas of responsibility within an organization.
Term
System Flowchart
Definition
A graphical description of the relationship among the input, processing, and output in an information system.
Term
Program Flowchart
Definition
A graphical description of the sequence of logical operations that a computer performs as it executes a program.
Term
Data Flow
Definition
Represents the flow of data between processes, data stores, and data sources and destinations.
Term
Processes
Definition
Represent the transformation of data.
Term
Data Store
Definition
A temporary or permanent repository of data.
Term
Context Diagram
Definition
Provides the reader with a summary-level view of a system.
Term
Flowchart
Definition
An Analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner.
Term
Flowcharting Template
Definition
Early flowchart supplies - hard plastic template (diecut)
Term
Internal Control Flowcharts
Definition
Document flowcharts that describe and evaluate internal controls.
Term
Input/Output Symbols
Definition
Devices or media that provide input to or record output from processing operations.
Term
Processing symbols
Definition
Either shows what type of device is used to process data or indicate when processing is performed manually.
Term
Storage Symbols
Definition
Device used to store data that the system is not currently using.
Term
Flow and Misc. Symbols
Definition
Indicate the flow of data and goods. May also include where data begins/ends, where decisions are made, and when to add explanatory flowcharts.
Term
Cookie
Definition
Data that web sites store on your computer to identify their web sites to your computer and to identify you to the web site so you don't have to log on each time you visit the site.
Term
Sabotage
Definition
Intent to destroy or harm a system or some of its components.
Term
Fraud
Definition
Gaining an unfair advantage over another person.
Term
White-collar Criminals
Definition
Fraud perpetrators.
Term
Misappropriation of Assets
Definition
Employee fraud, or the theft of company assets.
Term
Fraudulent Financial Reporting
Definition
Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.
Term
Pressure
Definition
A person's incentive or motivation for committing fraud.
Term
Opportunity
Definition
The condition or situation that allows a person or organization to: commit fraud, conceal fraud, and convert the fraud to personal gain.
Term
Lapping Scheme
Definition
When a perpetrator steals the cash or check that is sent in by one customer, then covers it with funds from the next payment received, etc.
Term
Check Kiting Scheme
Definition
A perpetrator creates cash by taking advantage of the timing lag between depositing a check and the check clearing the bank.
Term
Computer Fraud
Definition
Any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution.
Term
Hijacking
Definition
Gaining control of someone else's computer to carry out illicit activities without the user's knowledge.
Term
Denial-of-service Attack
Definition
When an attacker sends a recipient so many email bombs, or so many requests for a web page that the destination server crashes.
Term
Spamming
Definition
E-mailing or text messaging the same unsolicited message to many people at the same time, often to try to sell something.
Term
Dictionary Attacks
Definition
Using special software to guess addresses.
Term
Spoofing
Definition
Making an email look as if someone else sent it.
Term
Zero-day Attack
Definition
An attack between the time a new vulnerability is discovered and the software developers and security vendors release a patch.
Term
Password Cracking
Definition
Penetrating a system's defenses, stealing the file containing valid passwords, dectypting them, and using them to gain access.
Term
Masquerading or Impersonation
Definition
Gaining access to the system by pretending to be an authorized user.
Term
Data Diddling
Definition
Changing data before, during, or after it is entered into the system to delete, alter, add, or incorrectly update key system data.
Term
Data Leakage
Definition
The unauthorized copying of company data.
Term
Salami Technique
Definition
Stealing money a slice at a time from many accounts, which are deposited into a single dummy account.
Term
Round-down Fraud
Definition
All interest calculations are truncated at two decimal places and excess decimals put into an account that the perpetrator controls.
Term
Phreaking
Definition
Attacking phone systems to obtain free phone line access.
Term
Economic Espionage
Definition
The theft of information, trade secrets, and intellectual property.
Term
Cyber-Extortion
Definition
Threatening to harm a company if it does not pay a specified amount of money.
Term
Internet Terrorism
Definition
When hackers use the internet to disrupt electronic commerce and to destroy company and individual communications.
Term
Internet Misinformation
Definition
Using the internet to spread false or misleading information about people or companies.
Term
Click Fraud
Definition
Intentionally clicking on ads numerous times to inflate advertising bills.
Term
Software Piracy
Definition
Copying software without the publisher's permission.
Term
Social Engineering
Definition
Techniques used to obtain confidential information, often by tricking people.
Term
Identity Theft
Definition
Assuming someone's identity, usually for economic gain, by illegally obtaining and using confidential information, such as a Social Security, bank account, or credit card number.
Term
Pretexting
Definition
Acting under false pretenses to gain confidential information.
Term
Posing
Definition
Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering a product.
Term
Phishing
Definition
Sending an email, instant message, or text message pretending to be a legitimate company and requesting information.
Term
Vishing
Definition
Voice phishing, or phishing involving calling a phone number.
Term
Carding
Definition
Stolen credit card numbers that are bought and sold.
Term
Pharming
Definition
Redirecting a site's traffic to a bogus web site, usually to gain access to personal and confidential information.
Term
Evil Twin
Definition
When a hacker sets up a wireless network witht he same name as the wireless access point at a local hot spot to monitor its traffic.
Term
Typosquatting
Definition
URL hijacking - setting up web sites with names very similar to real web sites so that typos in URLs will result in reaching a different site - often with fraudulent intentions.
Term
Scavenging or Dumpster Diving
Definition
Gaining access to confidential information by searching corporate or personal records.
Term
Shoulder Surfing
Definition
Watching or listening to people give out confidential information.
Term
Skimming
Definition
Double-swiping a credit card in a legitimate terminal or swiping a card in a small, hidden card reader that records credit card data for later use.
Term
Chipping
Definition
Posing as a service engineer and planting a small chip in a legitimate credit card reader.
Term
Eavesdropping
Definition
Observing private communications or transmissions of data.
Term
Malware
Definition
Any software that can be used to do harm.
Term
Spyware
Definition
Secretly collects personal information about users and sends it to someone else without the user's permission.
Term
Adware
Definition
A type of spyware that causes banner ads to pop up as a user surfs the net.
Term
Torpedo Software
Definition
Software that destroys competing malware.
Term
Key Logger
Definition
Records computer activity, such as a user's keystrokes, emails, sites visited, and chat session.
Term
Trojan Horse
Definition
A set of malicious computer instructions in an authorized and otherwise properly functioning program.
Term
Time Bombs & Logic Bombs
Definition
Trojan horses that lie idle until triggered by a specified time or circumstance.
Term
Trap Door
Definition
A way into a system that bypasses normal system controls.
Term
Packet Sniffers
Definition
Programs that capture data from information packets as they travel over the internet or company networks.
Term
Steganography Program
Definition
Hides data from one file inside a host file.
Term
Rootkit
Definition
Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system.
Term
Superzapping
Definition
The unauthorized use of special system programs to bypass regular system controls and perform illegal acts, all without leaving an audit trail.
Term
Virus
Definition
A segment of self-replicating, executable code that attaches itself to a file or program.
Term
Bluesnarfing
Definition
Stealing contact lists, images, and other data from other devices using Bluetooth.
Term
Bluebugging
Definition
Taking control of someone else's phone to make calls or send text messages, or to monitor communications.
Term
Worm
Definition
Self-replicating computer program similar to a virus except that it is stand-alone, doesn't require a user input to replicate, and it harms networks (usually by consuming bandwidth).
Term
Threat
Definition
Any potential adverse occurrence or unwanted event that could be injurious to either the AIS or the organization.
Term
Exposure/Impact
Definition
The potential dollar loss should a particular threat become a reality.
Term
Likelihood
Definition
The probability that the threat will become a reality.
Term
Internal Control
Definition
The process implemented by the board of directors, management, and those under their direction to try to accomplish the following objectives: Safeguard assets, maintain records, provide accurate information, prepare statements in accordance with GAAP, operate efficiently, adhere to prescribed managerial policies, and comply with laws & regulations.
Term
Preventive Controls
Definition
Controls that deter problems before they arise.
Term
Detective Controls
Definition
Controls that discover problems as soon as they arise.
Term
Corrective Controls
Definition
Controls that remedy control problems that have been discovered.
Term
General Controls
Definition
Help make sure an organization's control environment is stable and well-managed.
Term
Application Controls
Definition
Prevent, detect, and correct transaction errors and fraud.
Term
Foreign Corrupt Practices Act
Definition
An act passed to prevent the bribery of foreign officials in order to obtain business.
Term
Sarbanes-Oxley Act (SOX)
Definition
Applies to publicly held companies and their auditors and was intended to prevent financial statement fraud, make financial reports more transparent, provide protection to investors, strengthen the internal controls at public companies, and punish executives who perpetrate fraud.
Term
Boundary System
Definition
Helps employees act ethically by setting limits beyond which an employee must not pass.
Term
Diagnostic Control System
Definition
Measures company progress by comparing actual performance to planned performance.
Term
Interactive Control System
Definition
Helps top-level managers with high-level activities that demand frequent and regular attention.
Term
COBIT Framework (Control Objectives for Information and Related Technology)
Definition
A framework of generally applicable information systems security and control practices for IT control.
Term
COSO (Committee of Sponsoring Organizations)
Definition
A private-sector group consisting of the American Accounting Association, the AICPA, the Institute of Internal Auditors, the Institute of Management Accountants, and the Financial Executives Institute.
Term
Internal Control?ÇöIntegrated Framework
Definition
Defines internal controls and provides guidance for evaluating and enhancing internal control systems.
Term
Enterprise Risk Management?ÇöIntegrated Framework (ERM)
Definition
Expands on the elements of the internal control integrated framework and provides an all-encompassing focus on the broader subject of enterprise risk management.
Term
Strategic Objectives
Definition
High-level goals that are aligned with and support the company's mission.
Term
Operations Objectives
Definition
Deal with the effectiveness and efficiency of company operations.
Term
Reporting Objectives
Definition
Help ensure the accuracy, completeness, and reliability of internal and external company reports, of both a financial and nonfinancial nature.
Term
Compliance Objectives
Definition
Help the company comply with all applicable laws and regulations.
Term
Internal Environment
Definition
The most important component of the ERM and internal control frameworks - it influences how organizations establish strategies and objectives, structure business activities, and identify and respond to risk.
Term
Risk Appetite
Definition
The amount of risk a company is willing to accept in order to achieve its goals and objectives.
Term
Policy and Procedures Manual
Definition
Explains proper business practices, describes the knowledge and experience needed by key personnel, spells out management policy for handling specific transactions, and documents the systems and procedures employed to process those transactions.
Term
Background Check
Definition
Includes verifying educational and work experience, talking to references, checking for a criminal record, and checking credit records.
Term
Event
Definition
An incident or occurrence emanating from internal or external sources that affects implementation of strategy or achievement of objectives.
Term
Inherent Risk
Definition
The risk that exists before management takes any steps to control the likelihood or impact of risk.
Term
Residual Risk
Definition
The risk that remains after management implements internal controls, or some other response to risk.
Term
Expected Loss
Definition
Expected loss = Impact ?ù Likelihood
Term
Control Activities
Definition
Policies, procedures, and rules that provide reasonable assurance that management's control objectives are met and the risk responses are carried out.
Term
Authorization
Definition
Empowerment to perform policies established by management.
Term
Digital Signature
Definition
A means of signing a document with a piece of data that cannot (or, rather, can only with difficulty) be forged.
Term
General Authorization
Definition
Authorization to handle routine transactions without special approval.
Term
Specific Authorization
Definition
Authorization that requires special review and approval.
Term
Collusion
Definition
Fraud where two or more people override the preventive aspect of the internal control system.
Term
Systems Administrators
Definition
Responsible for ensuring that the different parts of an information system operate smoothly and efficiently.
Term
Network Managers
Definition
Ensure that all applicable devices are linked to the organization's internal and external networks and that the networks operate continuously and properly.
Term
Security Management
Definition
Ensures that all aspects of the system are secure and protected from all internal and external threats.
Term
Systems Analysts
Definition
Help users determine their information needs and then design an information system to meet those needs.
Term
Programmers
Definition
Take the design provided by systems analysts and create an information system by writing the computer programs.
Term
Computer Operators
Definition
Run the software on the company's computers.
Term
Information System Library
Definition
Corporate databases, files, and programs in a separate storage area.
Term
Data Control Group
Definition
Ensures that source data have been properly approved, monitors the flow of work through the computer, reconciles input and output, maintains a record of input errors to ensure their correction and resubmission, and distributes systems throughout.
Term
Strategic Master Plan
Definition
Shows the projects that must be completed to achieve long-range company goals and addresses the company's hardware, software, personnel, and infrastructure requirements.
Term
Project Development Plan
Definition
Shows how a project will be compoleted, including the modules or tasks to be performed and who will perform them, the dates they should be completed, and project costs.
Term
Project Milestones
Definition
Significant points when progess is reviewed and actual and estimated completion times are compared.
Term
Data Processing Schedule
Definition
Format for data processing tasks.
Term
Steering Committee
Definition
Guides and oversees systems development and acquisition.
Term
Throughput
Definition
Output per unit of time.
Term
Utilization
Definition
Percentage of time the system is being productively used.
Term
Response Time
Definition
How long it takes the system to respond.
Term
Post-implementation review
Definition
Determines if the anticipated benefits were achieved.
Term
Systems Integrator
Definition
A vendor who uses common standards and manages a cooperative systems development effort involving its own development personnel and those of the client and other vendors.
Term
Change Management
Definition
The process of making sure changes to not negatively affect systems reliability security, confidentiality, integrity, and availability.
Term
Analytical Review
Definition
An examination of the relationships between different sets of data.
Term
Audit Trail
Definition
When individual company transactions can be traced through the system from where they originate to where they end up on the financial statements.
Term
Company Security Officer (CSO)
Definition
In charge of AIS security and should be independent of the information system function and report to the chief operating officer or the CEO.
Term
Chief Compliance Officer (CCO)
Definition
Officer in charge of ensuring that a company meets SOX and other compliance.
Term
Forensic Accountants
Definition
Specialize in fraud detection and investigation.
Term
Computer Forensic Specialists
Definition
Discover, safeguard, and document computer evidence such that its authenticity, accuracy, and integrity will not succumb to legal challenges.
Term
Neural Networks
Definition
Programs that mimic the brain and have learning capabilities.
Term
Time-based model of security
Definition
relationship between preventive, detective, and corrective controls such that P > D + C
Term
defense-in-depth
Definition
employ multiple layers of controls in order to avoid having a single point of failure
Term
authentication
Definition
verify the identity of the individual
Term
biometric identifier
Definition
physical characteristic
Term
multifactor authentication
Definition
any combo of the three basic authentication methods (know, have, biometrics)
Term
authorization
Definition
restricts access of authenticated users to specific portions of system
Term
access control matrix
Definition
table specifying which portions of the system users are permitted to access
Term
compatibility test
Definition
matches the user's authentication credentials against the access control matrix
Term
social engineering
Definition
deception to obtain unauthorized access to infomration resources
Term
border router
Definition
connects information system to the internet - lets in all traffic that is not obviously false.
Term
firewall
Definition
filters which information is allowed to enter and leave the organizations information system - only lets in traffic that is explicitly valid.
Term
(DMZ) demilitarized zone
Definition
separate network that permits controlled access from the internet to selected resources.
Term
(TCP) Transmission control protocol
Definition
specifies the procedures for dividing files and documents into packets
Term
(IP) internet protocol
Definition
specifies the structure of those packets and how to route them to the proper destination
Term
routers
Definition
reads destination address fields in IP packet headers and sends the packet on towards its destination
Term
(ACL)access control list
Definition
determines which packets are allowed entry and which packets are not
Term
static packet filtering
Definition
screens IP packets based on source/destination fields in IP packet header
Term
deep packet inspection
Definition
Packets are opened inspected internally instead of only being examined by header
Term
intrusion prevention systems (IPS)
Definition
System that drops packets that are part of an attack. Looks for signatures, patterns of attacks, normal traffic profiling, and packet standars to prevent unwanted packets from being routed to system.
Term
dial-in user service (RADIUS)
Definition
Dial-users connect to a Remote Access Server and enter in ther log-in credentials, this information is then passed to the RADIUS Server which perfoms tests to verify the identity of the user.
Term
war dialing
Definition
dialing every number associated with the business to see if they are attached to a modem.
Term
hosts
Definition
Workstations, printers, mobile devices, ect...
Term
vulnerabilities
Definition
Errors or bugs in code that allow outside parties to gain a measure of control over the system.
Term
hardening
Definition
The process of turning off unnecessary features to reduce potential security threats
Term
encryption
Definition
The process of turning normal text into unreadable gibberish called cyphertext using an encryption key and an encryption algorythmn
Term
plaintext
Definition
Normal readable text
Term
ciphertext
Definition
Total gibberish created by encryption
Term
decryption
Definition
The process of turning cyphertext into plaintext using the encryption key and a decryption algorythmn
Term
key escrow
Definition
process by which involves making copies of all encryption keys used by employees and storing them securely. less desirable because now the company has protect the real keys, and the copies of those keys.
Term
symmetic encryption systems
Definition
Same key is used to encrypt and decrypt
Term
asymmetric encryption systems
Definition
Public Key and Private Key are used. The public is made available to everyone and the private is kept secret and known only to the owner of the pair of keys. Either one can be used to encrypt but the only the other can decrypt the cyphertext
Term
public key
Definition
Widely distributed key
Term
private key
Definition
key that is kept secret and only known to the owner of the pair of keys.
Term
hashing
Definition
a process that takes plaintext of any length and transforms it into a short code called hash. Ex.. SHA 256 takes plaintext and turns it into a 256 bit hash, no matter how big the file is. No way to convert this back to plaintext.
Term
hash
Definition
short code that is generated by hashing
Term
digital signature
Definition
information encrypted by the creator's private key
Term
digital certificate
Definition
An electronic document created and digitally signed by a trusted third party that certifies the identity of the owner of a public key.
Term
(PKI) public key infastructure
Definition
the system and processes used to issue and manage asymmetric keys and digital certificates
Term
certificate authority
Definition
the organization that issues the keys and record the public key in a digital certificate
Term
e-signature
Definition
cursive style imprint of a person's name that is applied to an electronic document. Provided by a third party company and is a valid legal signature.
Term
log analysis
Definition
Process of examining logs to monitor security
Term
intrusion detection systems (IDS)
Definition
creates logs of network traffic and analyzes for signs of intrusion.
Term
vulnerability scans
Definition
use automated tools to identify whether a given system possesses any well-known vulnerabilities.
Term
penetration test
Definition
an authorized attempt to break into an information system.
Term
computer emergency response team (CERT)
Definition
a team composed of IT professionals and senior management who deal with major incidents.
Term
exploit
Definition
a set of instructions for taking advantage of a vulnerability.
Term
patch
Definition
code released by the software company that fixes a particular vulnerability.
Term
patch management
Definition
the process of regularly applying patches and updates to all software used by the organization.
Term
VPN (Virtual Private Network)
Definition
A connection that provides the functionality of a privately owned network while using the internet.
Term
Cookie
Definition
A text file created by a web site and stored on a visitor's hard disk.
Term
Field Check
Definition
Determines if the characters in a field are of the proper type.
Term
Sign Check
Definition
Determines if the data in a field have the appropriate arithmetic sign.
Term
Limit Check
Definition
Tests a numerical amount to ensure that it does not exceed a predetermined value.
Term
Range Check
Definition
Similar to a limit check, but with both upper and lower limits.
Term
Size Check
Definition
Ensures that the input data will fit into the assigned field.
Term
Completeness Check
Definition
Determines if all required data items have been entered.
Term
Validity Check
Definition
Compares the ID code or account number in transaction data with similar data in the master file to verify that the account exists.
Term
Reasonableness Test
Definition
Determines the correctness of the logical relationship between two data items.
Term
Check Digit
Definition
A digit computed from the other digits in a number (i.e. an ID number, or credit card number)
Term
Check Digit Verification
Definition
Verifying that the check digit matches what it should.
Term
Sequence Check
Definition
Tests if a batch of input data is in the proper numerical or alphabetical sequence.
Term
Batch Totals
Definition
Summaries of key values for a batch of input records.
Term
Financial Total
Definition
Sums a field that contains dollar values, such as the dollar amount of all sales for a batch of sales transactions.
Term
Hash Total
Definition
Sums a nonfinancial numeric field, such as the total of the quantity ordered field in a batch of sales transactions.
Term
Record Count
Definition
Sums the number of records in a batch.
Term
Prompting
Definition
When the system requests each input data item and waits for an acceptable response.
Term
Preformatting
Definition
When the system displays a document with highlighted blank spaces and waits for the data to be entered.
Term
Closed-loop verification
Definition
Checks the accuracy of input data by using it to retrieve and display other related information.
Term
Transaction Log
Definition
A log that includes a detailed record of all transaction data.
Term
Header Record
Definition
Contains the file name, expiration date, and other identification data at the beginning of a file.
Term
Trailer Record
Definition
Contains the batch totals calculated during input, located at the end of a file.
Term
Transposition Error
Definition
An error in which two adjacent digits were inadvertently reversed.
Term
Cross-footing Balance Test
Definition
Compares the results produced by both summing columns and rows.
Term
Zero-balance Test
Definition
Checks that accounts that should be zeroed out are in fact zeroed out.
Term
Concurrent Update Controls
Definition
Protect records from errors that occur when two or more users attempt to update the same record simultaneously.
Term
Parity Bit
Definition
An extra digit added to every character to help ensure the correct transmission of data.
Term
Parity Checking
Definition
Verifying that there are the proper number of bits set to the value 1 in each character received.
Term
Echo Check
Definition
When the sending and receiving systems perform the same check and compare to verify accuracy.
Term
Fault Tolerance
Definition
Enabling a system to continue functioning in the event that a particular component fails.
Term
Uninterruptible Power Supply (UPS)
Definition
Provides protection in the event of a prolonged power outage, using battery power to enable the system to operate lone enough to back up critical data and safely shut down.
Term
Backup
Definition
An exact copy of the most current version of a database, file, or software program.
Term
Restoration
Definition
The process of installing the backup copy for use.
Term
Incremental Backup
Definition
Copying only the data items that have changed since the last backup.
Term
Differential Backup
Definition
Copies all changes made since the last full backup.
Term
Recovery Point Objective (RPO)
Definition
Represents the maximum length of time for which a company is wiling to risk the possible loss of transaction details.
Term
Real-time Mirroring
Definition
Maintaining two copies of the database at two separate data centers at all times and updating both copies in real-time as each transaction occurs.
Term
Checkpoint
Definition
A copy of the database at a point in time.
Term
Archive
Definition
A copy of a database, master file, or software that will be retained indefinitely as an historical record, usually to satisfy legal and regulatory requirements.
Term
Recovery Time Objective (RTO)
Definition
Represents the time following a disaster by which the organization's information system must be available again.
Term
Cold Site
Definition
An empty building that is prewired for necessary telephone and internet access, plus a contract with one or more vendors to provide all necessary computer and other office equipment within a specified period of time.
Term
Hot Site
Definition
A facility that is not only prewired for telephone and internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities.
Term
Auditing
Definition
A systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions to ascertain the degree of correspondence between those assertions and established criteria and communicating the results to interested users.
Term
Financial Audit
Definition
Examines the reliability and integrity of accounting records and correlates with the first of the five scope standards.
Term
Information Systems/Internal Control Audit
Definition
Reviews the controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets. Its scope roughly corresponds to the IIA's second and third standards.
Term
Operational/Management Audit
Definition
Concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives. Its scope corresponds to the fourth and fifth standards.
Term
Inherent Risk
Definition
The susceptibility to material risk in the absence of controls.
Term
Control Risk
Definition
The risk that a material misstatement will get through the internal control structure and into the financial statements.
Term
Detection Risk
Definition
The risk that auditors and their audit procedures will not detect a material error or misstatement.
Term
Materiality
Definition
What is and is not important in a given set of circumstances.
Term
Reasonable Assurance
Definition
A reasonable assurance that no material error exists in the information or process audited.
Term
Systems Review
Definition
Reviewing system documentation and interviewing appropriate personnel to determine if the necessary procedures are in place.
Term
Tests of Controls
Definition
Determine if procedures are satisfactorily followed.
Term
Compensating Controls
Definition
Procedures that compensate for a control deficiency.
Term
Reprocessing
Definition
Using a verified copy of the source code to reprocess data and compare its output with the company's actual output.
Term
Parallel Simulation
Definition
An auditor writes a program to compare with the company's results to verify the correctness of data.
Term
Test Data Generator Program
Definition
Automatically prepares test data based on program specifications.
Term
Concurrent Audit Techniques
Definition
Continually monitor the system and collect audit evidence while live data are processed during regular operating hours.
Term
Embedded Audit Modules
Definition
Segments of program code that perform audit functions.
Term
Integrated Test Facility (ITF)
Definition
Places a small set of fictitious records in the master files.
Term
Snapshot Technique
Definition
Examines the way transactions are processed. Audit modules track selected transactions and their master file records before and after processing.
Term
System Control Audit Review File (SCARF)
Definition
Uses embedded audit modules to continuously monitor transaction activity and collect data on transactions with special audit significance.
Term
Audit Log
Definition
A log containing transactions generated by SCARF, containing transactions with special audit significance.
Term
Audit Hooks
Definition
Audit routines that flag suspicious transactions.
Term
Real-Time Notification
Definition
When audit hooks are used and auditors are informed of questionable transactions as they occur.
Term
Automated Flowcharting Programs
Definition
Interpret program source code and generate a corresponding program flowchart.
Term
Automated Decision Table Programs
Definition
Generate a decision table representing the program logic.
Term
Scanning Routines
Definition
Search a program for occurrences of a specified variable name or other character combinations.
Term
Mapping Programs
Definition
Identify unexecuted program code.
Term
Program Tracing
Definition
Sequentialliy prints all application program steps executed during a program run.
Term
Input Controls Matrix
Definition
Documents the review of source data controls. It shows the control procedures applied to each field of an input record.
Term
Information Systems Audits Objectives
Definition
Overall security, Program development and acquisition, Program modification, Computer processing, Source data, Data files
Term
Computer Audit Software (CAS) / Generalized Audit Software (GAS)
Definition
Software written especially for auditors that generates programs that perform the audit functions.
Supporting users have an ad free experience!