Term
|
Definition
| Overall control environment |
|
|
Term
|
Definition
| is a comprehensive plan that helps protect the company from internal and external threats. |
|
|
Term
| Issues considered when developing a security plan: |
|
Definition
1. Identify and evaluate assets to be protected 2. Identify threats 3. Assess risk 4. Establish security policy 5. Implement across the organization 6. Manage the security program |
|
|
Term
| When implementing a security policy what should be considered? |
|
Definition
| International Organization for Standardization (ISO 17799) |
|
|
Term
| What are the five types of organization-level controls for AIS? |
|
Definition
1. Personnel controls 2. File security controls 3. Fault-tolerant system, backup, and contingency planning 4. Computer facility controls 5. Access to computer files |
|
|
Term
| 2 main parts of personnel controls? |
|
Definition
| Segregation of duties, and use of computer accounts |
|
|
Term
| Define System Analysis Function: |
|
Definition
| Analyzing/processing/designing applications programs. |
|
|
Term
| What should a programmer not be allowed to do? |
|
Definition
| Use actual data to test a program (because they can manipulate it then) |
|
|
Term
| What should changes in programs be required to do? |
|
Definition
| All changes should be written and submitted to the manager. |
|
|
Term
| What should the computer operators do? |
|
Definition
| They should rotate throughout different jobs. Logs should be kept and checked. Should not give computer operators access to program documentation or logic. |
|
|
Term
| Where should the AIS librarian information stay? |
|
Definition
| It should stay in a seperate storage area. |
|
|
Term
| What should the data control functions and transaction authorization functions do? |
|
Definition
| Data control functions should be independent of computer operations? |
|
|
Term
| Under use of computer accounts, what should each separate computer have? |
|
Definition
| They should have separate unique passwords |
|
|
Term
| Define File Security controls: |
|
Definition
| used to protect computer files from either accidental or intentional abuse |
|
|
Term
| Define Fault-Tolerant System, Backup, and Contingency Planning: |
|
Definition
| Reduce financial and business risk |
|
|
Term
|
Definition
| Change that a company's financial statements are misstated |
|
|
Term
|
Definition
| Likelihood that an adverse or unwanted even that could injury company will occur. |
|
|
Term
|
Definition
| If one part of the system fails another part immediately takes over, and the system continues with no problem. |
|
|
Term
| Example of areas that use Fault-Tolerant systems: |
|
Definition
| Computer networks, CPU processors, Disks, and processors |
|
|
Term
| Define Consensus-based protocols: |
|
Definition
| Contain an odd number of processors. |
|
|
Term
|
Definition
| If something happens to first processor then other one takes over. |
|
|
Term
|
Definition
| Writing all data in parallel into two disks. |
|
|
Term
| Define Rollback processing: |
|
Definition
| Transactions are never written until finished. If fault happens then lose what was doing but system is at earlier place. |
|
|
Term
| What is the backup procedure typically used under the batch processing system |
|
Definition
| grandfather-father-child procedure |
|
|
Term
|
Definition
| backs up all files on a given disk: lots of time and space |
|
|
Term
|
Definition
| back up only those files that have been modified since the last full or last incremental backup |
|
|
Term
|
Definition
| Backs up only the files that have been changed since the last full backup |
|
|
Term
|
Definition
|
|
Term
|
Definition
| DB is offline and unavailable to its users. |
|
|
Term
| Define electronic vaulting: |
|
Definition
| Backup copies are stored at a remote site. |
|
|
Term
| What does contingency planning include: |
|
Definition
| The development of a disaster recovery plan. This is for unforseen disasters. |
|
|
Term
| What are the key components of the DRP? |
|
Definition
1. Data backup procedure 2. Replacement of infrastructure 3. Period testing 4. Other(insurance coverage, documentation) |
|
|
Term
|
Definition
| includes computers (too much money) |
|
|
Term
|
Definition
| A location that includes everything from a hot site as well as up-to-date backups. |
|
|
Term
| Define Computer Facility Controls (physical access controls) |
|
Definition
| prevent the unintentional/intentional harm to the computer system. |
|
|
Term
| Define Access to computer files: (logical access controls) |
|
Definition
|
|
Term
| Define IT General Controls: |
|
Definition
Changes/development of computer programs is authorized, tested, and approved. Access to files is restricted to only who is allowed to look at it. |
|
|
Term
|
Definition
| Virtual Private Network, a private network that uses public internet. Focus on security, reliability, and timely delivery of messages. Secure because of encryption |
|
|
Term
| What are most risks associated from in AIS: |
|
Definition
| Errors, irregularities, general threats to security |
|
|
Term
| What are risks unique to Micro computer environments? |
|
Definition
Hardware- can easily be stolen or destroyed Data and Software is easily accessed, modified, copied or destroyed.
All very difficult to protect. |
|
|
Term
| Hwo do you keep microcomputers safe? |
|
Definition
1. Lock in cabinets 2. Identify personal laptops 3. Use non-breakable cables to attach to furniture 4. Load antivirus software to disks 5. Backup laptop information |
|
|
Term
| What are application controls concerned about |
|
Definition
| Proventing, detecting, and correcting errors and irregularities in transactions. |
|
|
Term
|
Definition
| Examine selected fields of input data and reject those transactions whose data fields do not meet the pre-established standards of data quality. |
|
|
Term
| What is the objective of application control |
|
Definition
| To provide a good audit trail |
|
|
Term
| Define Batch control total |
|
Definition
| Comparison of items or documents actually processed against a predetermind control total. |
|
|
Term
|
Definition
| A meaningless total that is useful for control purposes only, detects errors only. |
|
|
Term
|
Definition
| Translation from code to machine language by an error-testing compiler. |
|
|