Shared Flashcard Set

Details

Audit 2 - Exam 1
Chapter 3
17
Accounting
Graduate
02/21/2009

Additional Accounting Flashcards

 


 

Cards

Term
Application controls
Definition
Programmed checks or other controls pertinent to end-user applications
Term
Attack
Definition
An attack is a series of steps taken by an attacker to achieve an unauthorized result
Term
Authentication
Definition
Process of validating the identity of teh user or program that is requesting access to a computing resource
Term
Confidentiality
Definition
Confidential information is kept away from those who are not supposed to see it. Authorized users with proper access privleges may work with confidential data, but others are not allowed access. The confidentiality of information is maintained by strict access privleges that guard the relese of confidential data. Data may also be garbled (encrypted) to perserve confidentiality.
Term
Control
Definition
Threats are successful only if vulnerabilities in the system exist. A design and implementation of internal control measures make possible the mitigation of vulnerability found in a system. This process of buidling controls is guided by internal control and information security objectives.
Term
Countermeasure
Definition
An action that dilutes the potential impact of a known vulnerability
Term
General controls
Definition
Ensure continued, proper operation of information systems. Typically, general controls affect all application systems that depend on the firm's computing environment. For example, controls concerning operating systems are general controls, whereas any controls built into a payroll application are application controls.
Term
Information integrity
Definition
The term integrity implies truthfulness, something you can depend on. Information integrity exists when the information that users receive from teh system is accurate and reliable. To produce information with high integrity, the entire system needs to function reliably.
Term
Information security
Definition
The term security connotes protection, as in being able to depend on an entity, which in our case is an information system. Often, the term also refers to the confidence or comfort level associated with being safe and protected.
Term
Internal controls
Definition
A set of control measures targeted to achieve control objectives
Term
Message integrity
Definition
The message that a sender transmits is received without any modification during transmission by the receiver. Message integrity does not necessarily imply that teh message itself has information integrity. Thus, a lie that is transmitted without modification in transit has message integrity but not information security.
Term
Nonrepudiation
Definition
Holding a person accountable can be seen as taking away the person's ability to repudiate the action (e.g., placing an order online). This is called the objective of nonrepudiation. "I didn't do this" would be difficult to defend if the circumstances surrounding the act (e.g., time of day and IP address of the computer used) and proof of identity (e.g., passowrd, smart card, or a digital certificate) are used to track the transaction.
Term
Security
Definition
Specific types of controls designed to protect information assets
Term
Systems availability
Definition
Can be interpreted as the state of readiness of systems so that authorized users can access and use the system for their purposes and during expected times of operation
Term
Threat
Definition
The probability of an attack on the information asset
Term
Threat agent
Definition
A threat may be konwn or unknown and is triggered by a threat agent, typically a person within the business or from the outside
Term
Vulnerability
Definition
A vulnerability is a weakness in an information asset that leads to risk
Supporting users have an ad free experience!