Shared Flashcard Set

Details

SU 14
IT Security
104
Accounting
Undergraduate 4
05/16/2015

Additional Accounting Flashcards

 


 

Cards

Term
How do you maintain control over information security (IS)?
Definition
Through the enactment of a comprehensive, entity-wide information security plan.
Term
ability to make use of any computer-based system is dependent on
Definition
uninterrupted flow of electricity
protection of computer hardware from environmental hazards
protection of software and data files from unauthorized alteration
preservation of functioning communications channels between devices
Term
volatile transaction trails
Definition
In a computer-based environment, complete audit trails may not exist or be readable. In online and real-time systems, data are entered directly into the computer, eliminating portions of the audit trail traditionally provided by source documents.
Term
How does a computer system affect the chance of detecting errors?
Definition
B/c employees who enter transactions may never see the final results, the potential for detecting errors is reduced. Also, output from a computer system often carries a mystique of infallibility, reducing the incentive of system users to closely examine reports and transaction logs.
Term
How does computer processing affect transaction processing?
Definition
Computer processing uniformly subjects like transactions to the same processing instructions, therefore virtually eliminating clerical error. Thus, it permits consistent application of predefined business rules and the performance of complex calculations in high volume.
However, programming errors result in all like transactions being processed incorrectly.
Term
firewall
Definition
combination of hardware and software that separates an internal network from an external network and prevents passage of traffic deemed suspicious;
needed to protect computerized records that are otherwise not as easily protected
Term
data vulnerability
Definition
duplicate and periodically store offsite computer files (hard drive crash should not lose all data).
Term
reduced individual authorization of transactions
Definition
Certain transactions may be initiated automatically by a computer-based system.
This reduced level of oversight for individual transactions is an important compensating control in the absence of segregation of duties and reduced individual authorization. A third party performs the verification.
Term
advantages to outsourcing IT (ASACFA)
Definition
access to expertise, superior service quality, avoidance of changes in the organization's IT infrastructure, cost predictability, freeing of human and financial capital, and avoidance of fixed costs.
Term
disadvantages to outsourcing IT (ILVD)
Definition
inflexibility of the relationship, the loss of control, vulnerability of important information, and often dependency on a single vendor.
Term
malware
Definition
any program code that enters a computer system that has the potential to degrade that system
Term
Trojan horse
Definition
apparently innocent program that includes a hidden function that may do damage when activated
Term
virus
Definition
program that copies itself from file to file (spread through email attachments and downloads)
Term
worm
Definition
from computer to computer
Term
denial-of-service (DOS) attack
Definition
attempt to overload a system w/ messages so that it cannot function
Term
phishing
Definition
method of electronically obtaining confidential information through deceit by setting up a legitimate-looking website that is a scam
Term
Control Objectives for Information and Related Technology (COBIT)
Definition
best-known control and governance framework that addresses IT
Term
four main domains of COBIT (PADM)
Definition
planning and organization, acquisition and implementation, delivery and support, monitoring
Term
planning and organization
Definition
deals with how the IT system helps accomplish business objectives
Term
acquisition and implementation
Definition
deals with how the business acquires and develops IT solutions that address business objectives
Term
delivery and support
Definition
deals with how the company can best deliver required IT services including operations, security, and training
Term
monitoring
Definition
deals with how the company can periodically assess the IT processes for quality and control
Term
5 Key Principles of COBIT 5
Definition
Meeting stakeholder needs, Covering the enterprise end-to-end, applying a single, integrated framework, enabling a holistic approach, and separating governance from management.
Term
enterprise goals
Definition
created in response to stakeholder needs
Term
IT-related goals
Definition
drawn up to address the enterprise goals
Term
enablers & categories of enablers (PPOCISP)
Definition
support pursuit of the IT-related goals
Categories of enablers:
principles, policies, and frameworks
processes
organizational structures
culture, ethics, and behavior
information
services, infrastructure, and applications
people, skills, and competencies
Term
governance
Definition
setting overall objectives and monitoring progress toward those objectives (BOD)
Term
management
Definition
carrying out of activities in pursuit of enterprise goals (executive management under the CEO)
Term
areas of management
Definition
planning, organizing, leading/directing, and controlling
Term
How does IT implementation affect risk?
Definition
IT introduces some risks and helps to mitigate others; ex) automated verification.
Term
operational effectiveness
Definition
degree to which a system (automated or not) serves its intended purpose
Term
main purpose of reports
Definition
to aid in decision-making. Reports that cannot do this are useless.
Term
information security (IS)
Definition
encompasses not only computer hardware and software but all of an organization's information, no matter what medium it resides on; it involves far more than just user IDs and passwords.
Term
3 principal goals for IS programs (CIA)
Definition
confidentiality, integrity, availability of data
Term
steps in creating an IS plan
Definition
identify threats to the organization's information
identify the risks that these threats entail.
design compensating controls based on risk analysis.
incorporate controls into a coherent, enterprise-wide IS plan, listing how the controls will be put in place and how they will be enforced.
create policies
Term
risk analysis
Definition
determine the likelihood of identified threats and the level of damage that could potentially be done should the threats materialize
Term
3 major types of IS controls
Definition
physical, logical, and policy
Term
most important policy
Definition
that which governs the information resources to which individuals have access and how the level of access will be tied to their job duties.
Term
3 major types of internal controls
Definition
preventive, detective, and corrective
Term
IS classic division of controls
Definition
general (aggregate IT environment) vs. application (specific to computers)

general = macro
application = micro
Term
general controls
Definition
sustain the conditions under which application controls can function properly
Term
Should IT be a separate function? If so, how should this be done?
Definition
Yes. Treating IT as a separating functional area of the organization involves the designation of a CIO or CTO and the establishment of an IS steering committee to set a coherent direction for the organization's systems and prioritize IT projects.
Term
hardware controls
Definition
built into the equipment by the manufacturer; they ensure the proper internal handling of data as they are moved and stored.
Term
physical controls
Definition
limit physical access and environmental damage to computer equipment, data, and important documents
Term
logical controls
Definition
established to limit access in accordance with the principle that all persons should have access only to those elements of the organization's IS that are necessary to perform their job duties. Focused on both authentication and authorization.
Term
authentication
Definition
act of assuring that the person attempting to access the system is in fact who he/she says he/she is. Accomplished through IDs and passwords.
Term
authorization
Definition
practice of ensuring that, once in the system, the user can only access those programs and data elements necessary for his/her job duties
Term
network firewalls
Definition
regulate traffic to an entire network, such as an organization's LAN through packet filtering
Term
packet filtering
Definition
The firewall examines the header of each packet. Depending on the rules set up by the network security administrator, packets can be denied entry to the network based on their source, destination, or other data in the header. Packets from a particular source address that repeatedly fail to gain access to the network might indicate a penetration attempt. The firewall can notify network security personnel who can then investigate.
Term
application firewall
Definition
regulate traffic to a specified application, such as email or file transfer
Term
Is a firewall alone enough for IS?
Definition
A firewall alone is not an adequate defense against computer viruses; specialized antivirus software is a must.
Term
application controls
Definition
built into each application; designed to ensure that only correct, authorized data enter the system and that the data are processed and reported properly.
Term
input controls
Definition
designed to prevent unauthorized, invalid, or duplicate data from entering the system (thus authorization)
Term
preformatting
Definition
mirror paper documents
Term
Field Checks
Definition
some data elements can only contain certain characters, and any transaction that attempts to use an invalid character is halted. (Soc. Sec. number).
Term
Limit (Reasonableness) and Range Checks
Definition
based on known limits for given information, certain entries can be rejected by the system.
Term
Validity Checks
Definition
in order for a transaction to be processed, some other record must already exist in another file.
Term
Sequence Checks
Definition
processing efficiency is greatly increased when files are sorted on some designated field(s), called the “key,” before operations such as matching.
Term
Check Digit Verification (Self-Checking Digits)
Definition
an algorithm is applied to, for instance, a product number and incorporated into the number; this reduces keying errors such as dropped and transposed digits.
Term
Zero-Balance Checks
Definition
the system will reject any transaction or batch thereof in which the sum of all debits and credits does not equal 0.
Term
processing controls
Definition
provide reasonable assurance that processing has been performed as intended for the particular application
Term
Completeness
Definition
record that does not match to master file record is identified and rejected
Term
Arithmetic controls
Definition
cross-footing compares an amount to the sum of its components
Term
Zero-Balance Checking
Definition
control adds the debits and credits in a transaction or batch to ensure they sum to 0.
Term
key integrity
Definition
record's “key” is the group of values in designated fields that uniquely identify the record; no application process should be able to alter the data in these key fields
Term
output controls
Definition
provide assurance that the processing result is accurate and that only authorized personnel receive the output. These procedures are performed at the end of processing to ensure that all transactions the user expected to be processed were actually processed.
Term
transaction logs
Definition
every action performed in the application is logged along with the date, time, and ID in use when the action was taken.
Term
error listings
Definition
all transactions rejected by the system are printed and distributed to the appropriate user department for resolution
Term
record counts
Definition
the total number of records processed by the system is compared to the number the user expected to be processed
Term
run-to-run control totals
Definition
the new financial balance should be the sum of the old balance plus the activity that was just processed
Term
hash totals
Definition
the arithmetic sum of a numeric field, which has no meaning by itself, can serve as a check that the same records that should have been processed were processed. Ex) sum of all Soc. Sec. numbers.
Term
contingency planning
Definition
IS goal of data availability is primarily the responsibility of the IT function.
Term
business continuity
Definition
continuation of business by other means during the period in which computer processing is unavailable or less than normal
Term
disaster recovery
Definition
process of resuming normal information processing operations after the occurrence of a major interruption
Term
3 major types of contingencies
Definition
those in which the data center is physically available (power failure, random intrusions (viruses), deliberate intrusions (hacking incidents)), and those in which it is not (natural disasters).
Term
most basic part of any disaster recovery/business continuity plan
Definition
periodic backup and offsite recovery
Term
Which is more valuable to an organization. Its data? Or its hardware?
Definition
Its data.
Term
typical backup routine
Definition
Involves duplicating all data files and application programs periodically (once a month).
Incremental changes are then backed up and taken to the offsite location (once a week).
Application programs must be backed up in addition to data since programs change too.
Term
characteristics of offsite location
Definition
temperature- and humidity controlled and guarded against physical intrusion. Just as important, it must be geographically remote enough from the site of the organization's main operations that it would not be affected by the same natural disaster.
Term
What's the maximum amount of information that the organization can afford to lose due to interruptions in normal processing?
Definition
In case of an interruption of normal processing, the organization's systems can be restored such that, at most, 7 days of business information is lost.
Term
IT risk assessment
Definition
identifying and prioritizing the organization's critical applications
Determining minimum recovery time and hardware requirements.
Developing a recovery plan.
Dealing with specific types of contingencies.
Term
Dealing with specific types of contingencies
Definition
power failures, attacks, natural disasters
Term
power failures
Definition
deal with by the purchase of backup electrical generators. These can be programmed to automatically begin running as soon as a dip in the level of electric current is detected (the "reorder point" for electricity).
Term
attacks (virus, denial-of-service, etc.)
Definition
The system must be brought down “gracefully” to halt the spread of the infection.
The IT staff must know about the latest viruses to know how to isolate the damage and bring the system back to full operation.
Term
natural disasters
Definition
Contract for alternate processing facility.
Take backup files to recovery center if processing is no longer possible at the principal site.
Term
alternate processing facility
Definition
physical location maintained by an outside contractor for the express purpose of providing processing facilities for customers in case of disaster
Term
hot site
Definition
fully operational processing facility that is immediately available.
Term
flying-start site
Definition
hot site with the latest data and software that permit startup within a few minutes or even a few seconds
Term
warm site
Definition
facility with limited hardware, such as communications and networking equipment, that is already installed but is lacking the necessary servers and client terminals
Term
cold site
Definition
shell facility lacing most infrastructure but is readily available for the quick installation of hardware and software
Term
IT risk assessment
Definition
identifying and prioritizing the organization's critical applications
Determining minimum recovery time and hardware requirements.
Developing a recovery plan.
Dealing with specific types of contingencies.
Term
Dealing with specific types of contingencies
Definition
power failures, attacks, natural disasters
Term
power failures
Definition
deal with by the purchase of backup electrical generators. These can be programmed to automatically begin running as soon as a dip in the level of electric current is detected (the "reorder point" for electricity).
Term
attacks (virus, denial-of-service, etc.)
Definition
The system must be brought down “gracefully” to halt the spread of the infection.
The IT staff must know about the latest viruses to know how to isolate the damage and bring the system back to full operation.
Term
natural disasters
Definition
Contract for alternate processing facility.
Take backup files to recovery center if processing is no longer possible at the principal site.
Term
alternate processing facility
Definition
physical location maintained by an outside contractor for the express purpose of providing processing facilities for customers in case of disaster
Term
hot site
Definition
fully operational processing facility that is immediately available.
Term
flying-start site
Definition
hot site with the latest data and software that permit startup within a few minutes or even a few seconds
Term
warm site
Definition
facility with limited hardware, such as communications and networking equipment, that is already installed but is lacking the necessary servers and client terminals
Term
cold site
Definition
shell facility lacing most infrastructure but is readily available for the quick installation of hardware and software
Term
fault-tolerant computer system
Definition
has additional hardware and software as well as a backup power supply.
Term
fault-tolerant computer
Definition
has additional chips and disk storage; this technology is used for mission-critical applications that cannot afford to suffer downtime.
Term
redundant array of inexpensive discs (RAID)
Definition
grouping of multiple hard drives with special software that allows for data delivery along multiple paths. If one drive fails, the other discs can compensate for the loss; enabling technology for fault-tolerance
Term
high-availability computing
Definition
used for less-critical applications because it provides for a short recovery time rather than the elimination of recovery time
Supporting users have an ad free experience!