Term
|
Definition
| Conceptualized organization of activities an organization performs to provide value to their customers. |
|
|
Term
|
Definition
| 1. Inbound Logistics 2. Operations Activities 3. Outbound logistics 4. Marketing and sales 5. Service |
|
|
Term
|
Definition
| Receiving, storing, and distributing the materials an organization uses to create the products and services it sells. |
|
|
Term
|
Definition
| Transform inputs into final products or services. |
|
|
Term
|
Definition
| Distribute finished product or service to customers |
|
|
Term
|
Definition
| Help customers buy the products or services the organization provides. |
|
|
Term
|
Definition
| Provide post-sale support to customers |
|
|
Term
|
Definition
| Allow the five primary activities (value chain parts) to be performed effectively and efficiently. |
|
|
Term
| Support Activities Outline |
|
Definition
| 1. Firm Infrastructure 2. Human Resources 3. Technology 4. Purchasing |
|
|
Term
| Firm Infrastructure Activities |
|
Definition
| Accounting, finance, legal and geneal administration activities that allow an organization to function. |
|
|
Term
| Human Resources Activities |
|
Definition
| Recruiting, hiring, training, and providing employee benefits and compensations. |
|
|
Term
|
Definition
| Improve a product or service. |
|
|
Term
|
Definition
| Procure raw materials, supplies, machinery, and the buildings used to carry out the primary activities. |
|
|
Term
|
Definition
| A manufacturing organization interacts with its suppliers and distributors. Value chain is a part of this. |
|
|
Term
| How an AIS can add value to an organization |
|
Definition
| 1. Improving quality & reducing costs 2. Improving efficiency 3. Sharing knowledge 4. improving the efficiency and effectiveness of its supply chain 5. Improving the internal control structure 6. Improving decision making |
|
|
Term
|
Definition
| repetitive, routine, understood well enough to be delegated |
|
|
Term
| semi-structured decisions |
|
Definition
| incomplete decisions need for subjective assessments; can be computer aided |
|
|
Term
|
Definition
| nonrecurring and non-routine, require judgment and intuition. |
|
|
Term
|
Definition
| effective efficient performance of tasks |
|
|
Term
|
Definition
| effective and efficient use or resources |
|
|
Term
|
Definition
| establishing objectives and policies to accomplish objectives. |
|
|
Term
|
Definition
| adding features or services not provided by competitors |
|
|
Term
|
Definition
| be the most efficient producer |
|
|
Term
| variety-based strategic position |
|
Definition
| providing a subset of the industry ex. Jiffy Lube only oil changes |
|
|
Term
| needs-based strategic position |
|
Definition
| trying to serve most or all of the needs of a particular group ex. AARP tries to get all retirees |
|
|
Term
| access-based strategic position |
|
Definition
| serving a subset of customers who are different ex. Edward Jones only operates in small towns |
|
|
Term
|
Definition
| the system is greater than the sum of its parts |
|
|
Term
|
Definition
| use data and algorithms to forecast future events |
|
|
Term
|
Definition
| benefit produced by the information minus the cost of producing it |
|
|
Term
| MAJOR BENEFITS OF INFORMATION: |
|
Definition
| 1. Reduction of uncertainty 2. Improved decisions 3. Better ability to plan activities |
|
|
Term
|
Definition
| required by a governmental entity |
|
|
Term
|
Definition
| required to conduct business with external parties |
|
|
Term
|
Definition
| an agreement between two entities to exchange goods or services |
|
|
Term
| business or transactional processing |
|
Definition
| system which captures transactions and outputs financial statements |
|
|
Term
| Transactional Processing Outline |
|
Definition
| 1. Revenue cycle 2. Expenditure cycle 3. Production cycle 4. Human resources/Payroll cycle 5. Financing cycle |
|
|
Term
|
Definition
| goods and services sold for cash or promise |
|
|
Term
|
Definition
| purchase inventory for resale or production of products for cash or promise |
|
|
Term
|
Definition
| raw materials transformed into finished goods |
|
|
Term
| human resources/ payroll cycle |
|
Definition
| employees are hired, trained, compensated, evaluated, promoted, and terminated. |
|
|
Term
|
Definition
| companies sell shares to investors, borrow money, investors are paid dividends, interests paid on loans |
|
|
Term
| General ledger and reporting system |
|
Definition
| show how transaction processes relate and interface and collects info from each for management and external parties |
|
|
Term
|
Definition
| operations performed on data to generate meaningful and relevant information |
|
|
Term
|
Definition
| records of company data sent to external party and returned as input |
|
|
Term
|
Definition
| devices that capture transaction data in machine-readable form at the time and place of origin |
|
|
Term
|
Definition
| summary-level data for every asset, liability, equity, revenue, and expense account |
|
|
Term
|
Definition
| all detailed data for any general ledger account that has many individual subaccounts |
|
|
Term
|
Definition
| general ledger account corresponding to a subsidiary ledger |
|
|
Term
|
Definition
| Systematic assignment of numbers or letters to items to classify and organize them |
|
|
Term
|
Definition
| items are numbered consecutively to ensure there will be no gaps in the sequence |
|
|
Term
|
Definition
| blocks of number within a numerical sequence are reserved for categories having meaning to the user |
|
|
Term
|
Definition
| Used in conjunction with block code - two or more subgroups of digits are used to code the item |
|
|
Term
|
Definition
| list of all general ledger accounts an organization uses |
|
|
Term
|
Definition
| used to record infrequent or non routine transactions |
|
|
Term
|
Definition
| used to record repetitive transitions: credit sales. cash receipts, etc |
|
|
Term
|
Definition
| the posting of reference and document numbers |
|
|
Term
|
Definition
| characteristics of interest |
|
|
Term
|
Definition
| something about which information is stored |
|
|
Term
|
Definition
| physical space a data value is stored |
|
|
Term
|
Definition
| set of fields containing data about various attributes of the same entity |
|
|
Term
|
Definition
|
|
Term
|
Definition
| related records are grouped |
|
|
Term
|
Definition
| store cumulative information about an origination's resources and the agents whom it interacts - permament |
|
|
Term
|
Definition
| contain records for individual business transactions that occur during a specific fiscal period |
|
|
Term
|
Definition
| set of interrelated, centrally coordinated files |
|
|
Term
|
Definition
| periodic updating of data |
|
|
Term
| online, real-time processing |
|
Definition
| update data as transaction occurs |
|
|
Term
| Enterprise resource planning (ERP) system |
|
Definition
| designed to overcome problems as they relate to aspects of a company's operations within its traditional AIS |
|
|
Term
|
Definition
| The narratives, flowcharts, diagrams, and other written materials that explain how a system works. |
|
|
Term
|
Definition
| A written step-by-step explanation of system components and interactions. |
|
|
Term
|
Definition
| A graphical description of the source and destination of data that shows data flow within an organization, the processes performed on the data, and how data are stored. |
|
|
Term
|
Definition
| A graphical description of the flow of documents and information between departments or areas of responsibility within an organization. |
|
|
Term
|
Definition
| A graphical description of the relationship among the input, processing, and output in an information system. |
|
|
Term
|
Definition
| A graphical description of the sequence of logical operations that a computer performs as it executes a program. |
|
|
Term
|
Definition
| Represents the flow of data between processes, data stores, and data sources and destinations. |
|
|
Term
|
Definition
| Represent the transformation of data. |
|
|
Term
|
Definition
| A temporary or permanent repository of data. |
|
|
Term
|
Definition
| Provides the reader with a summary-level view of a system. |
|
|
Term
|
Definition
| An Analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner. |
|
|
Term
|
Definition
| Early flowchart supplies - hard plastic template (diecut) |
|
|
Term
| Internal Control Flowcharts |
|
Definition
| Document flowcharts that describe and evaluate internal controls. |
|
|
Term
|
Definition
| Devices or media that provide input to or record output from processing operations. |
|
|
Term
|
Definition
| Either shows what type of device is used to process data or indicate when processing is performed manually. |
|
|
Term
|
Definition
| Device used to store data that the system is not currently using. |
|
|
Term
|
Definition
| Indicate the flow of data and goods. May also include where data begins/ends, where decisions are made, and when to add explanatory flowcharts. |
|
|
Term
|
Definition
| Data that web sites store on your computer to identify their web sites to your computer and to identify you to the web site so you don't have to log on each time you visit the site. |
|
|
Term
|
Definition
| Intent to destroy or harm a system or some of its components. |
|
|
Term
|
Definition
| Gaining an unfair advantage over another person. |
|
|
Term
|
Definition
|
|
Term
| Misappropriation of Assets |
|
Definition
| Employee fraud, or the theft of company assets. |
|
|
Term
| Fraudulent Financial Reporting |
|
Definition
| Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements. |
|
|
Term
|
Definition
| A person's incentive or motivation for committing fraud. |
|
|
Term
|
Definition
| The condition or situation that allows a person or organization to: commit fraud, conceal fraud, and convert the fraud to personal gain. |
|
|
Term
|
Definition
| When a perpetrator steals the cash or check that is sent in by one customer, then covers it with funds from the next payment received, etc. |
|
|
Term
|
Definition
| A perpetrator creates cash by taking advantage of the timing lag between depositing a check and the check clearing the bank. |
|
|
Term
|
Definition
| Any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution. |
|
|
Term
|
Definition
| Gaining control of someone else's computer to carry out illicit activities without the user's knowledge. |
|
|
Term
|
Definition
| When an attacker sends a recipient so many email bombs, or so many requests for a web page that the destination server crashes. |
|
|
Term
|
Definition
| E-mailing or text messaging the same unsolicited message to many people at the same time, often to try to sell something. |
|
|
Term
|
Definition
| Using special software to guess addresses. |
|
|
Term
|
Definition
| Making an email look as if someone else sent it. |
|
|
Term
|
Definition
| An attack between the time a new vulnerability is discovered and the software developers and security vendors release a patch. |
|
|
Term
|
Definition
| Penetrating a system's defenses, stealing the file containing valid passwords, dectypting them, and using them to gain access. |
|
|
Term
| Masquerading or Impersonation |
|
Definition
| Gaining access to the system by pretending to be an authorized user. |
|
|
Term
|
Definition
| Changing data before, during, or after it is entered into the system to delete, alter, add, or incorrectly update key system data. |
|
|
Term
|
Definition
| The unauthorized copying of company data. |
|
|
Term
|
Definition
| Stealing money a slice at a time from many accounts, which are deposited into a single dummy account. |
|
|
Term
|
Definition
| All interest calculations are truncated at two decimal places and excess decimals put into an account that the perpetrator controls. |
|
|
Term
|
Definition
| Attacking phone systems to obtain free phone line access. |
|
|
Term
|
Definition
| The theft of information, trade secrets, and intellectual property. |
|
|
Term
|
Definition
| Threatening to harm a company if it does not pay a specified amount of money. |
|
|
Term
|
Definition
| When hackers use the internet to disrupt electronic commerce and to destroy company and individual communications. |
|
|
Term
|
Definition
| Using the internet to spread false or misleading information about people or companies. |
|
|
Term
|
Definition
| Intentionally clicking on ads numerous times to inflate advertising bills. |
|
|
Term
|
Definition
| Copying software without the publisher's permission. |
|
|
Term
|
Definition
| Techniques used to obtain confidential information, often by tricking people. |
|
|
Term
|
Definition
| Assuming someone's identity, usually for economic gain, by illegally obtaining and using confidential information, such as a Social Security, bank account, or credit card number. |
|
|
Term
|
Definition
| Acting under false pretenses to gain confidential information. |
|
|
Term
|
Definition
| Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering a product. |
|
|
Term
|
Definition
| Sending an email, instant message, or text message pretending to be a legitimate company and requesting information. |
|
|
Term
|
Definition
| Voice phishing, or phishing involving calling a phone number. |
|
|
Term
|
Definition
| Stolen credit card numbers that are bought and sold. |
|
|
Term
|
Definition
| Redirecting a site's traffic to a bogus web site, usually to gain access to personal and confidential information. |
|
|
Term
|
Definition
| When a hacker sets up a wireless network witht he same name as the wireless access point at a local hot spot to monitor its traffic. |
|
|
Term
|
Definition
| URL hijacking - setting up web sites with names very similar to real web sites so that typos in URLs will result in reaching a different site - often with fraudulent intentions. |
|
|
Term
| Scavenging or Dumpster Diving |
|
Definition
| Gaining access to confidential information by searching corporate or personal records. |
|
|
Term
|
Definition
| Watching or listening to people give out confidential information. |
|
|
Term
|
Definition
| Double-swiping a credit card in a legitimate terminal or swiping a card in a small, hidden card reader that records credit card data for later use. |
|
|
Term
|
Definition
| Posing as a service engineer and planting a small chip in a legitimate credit card reader. |
|
|
Term
|
Definition
| Observing private communications or transmissions of data. |
|
|
Term
|
Definition
| Any software that can be used to do harm. |
|
|
Term
|
Definition
| Secretly collects personal information about users and sends it to someone else without the user's permission. |
|
|
Term
|
Definition
| A type of spyware that causes banner ads to pop up as a user surfs the net. |
|
|
Term
|
Definition
| Software that destroys competing malware. |
|
|
Term
|
Definition
| Records computer activity, such as a user's keystrokes, emails, sites visited, and chat session. |
|
|
Term
|
Definition
| A set of malicious computer instructions in an authorized and otherwise properly functioning program. |
|
|
Term
|
Definition
| Trojan horses that lie idle until triggered by a specified time or circumstance. |
|
|
Term
|
Definition
| A way into a system that bypasses normal system controls. |
|
|
Term
|
Definition
| Programs that capture data from information packets as they travel over the internet or company networks. |
|
|
Term
|
Definition
| Hides data from one file inside a host file. |
|
|
Term
|
Definition
| Software that conceals processes, files, network connections, memory addresses, systems utility programs, and system data from the operating system. |
|
|
Term
|
Definition
| The unauthorized use of special system programs to bypass regular system controls and perform illegal acts, all without leaving an audit trail. |
|
|
Term
|
Definition
| A segment of self-replicating, executable code that attaches itself to a file or program. |
|
|
Term
|
Definition
| Stealing contact lists, images, and other data from other devices using Bluetooth. |
|
|
Term
|
Definition
| Taking control of someone else's phone to make calls or send text messages, or to monitor communications. |
|
|
Term
|
Definition
| Self-replicating computer program similar to a virus except that it is stand-alone, doesn't require a user input to replicate, and it harms networks (usually by consuming bandwidth). |
|
|
Term
|
Definition
| Any potential adverse occurrence or unwanted event that could be injurious to either the AIS or the organization. |
|
|
Term
|
Definition
| The potential dollar loss should a particular threat become a reality. |
|
|
Term
|
Definition
| The probability that the threat will become a reality. |
|
|
Term
|
Definition
| The process implemented by the board of directors, management, and those under their direction to try to accomplish the following objectives: Safeguard assets, maintain records, provide accurate information, prepare statements in accordance with GAAP, operate efficiently, adhere to prescribed managerial policies, and comply with laws & regulations. |
|
|
Term
|
Definition
| Controls that deter problems before they arise. |
|
|
Term
|
Definition
| Controls that discover problems as soon as they arise. |
|
|
Term
|
Definition
| Controls that remedy control problems that have been discovered. |
|
|
Term
|
Definition
| Help make sure an organization's control environment is stable and well-managed. |
|
|
Term
|
Definition
| Prevent, detect, and correct transaction errors and fraud. |
|
|
Term
| Foreign Corrupt Practices Act |
|
Definition
| An act passed to prevent the bribery of foreign officials in order to obtain business. |
|
|
Term
|
Definition
| Applies to publicly held companies and their auditors and was intended to prevent financial statement fraud, make financial reports more transparent, provide protection to investors, strengthen the internal controls at public companies, and punish executives who perpetrate fraud. |
|
|
Term
|
Definition
| Helps employees act ethically by setting limits beyond which an employee must not pass. |
|
|
Term
| Diagnostic Control System |
|
Definition
| Measures company progress by comparing actual performance to planned performance. |
|
|
Term
| Interactive Control System |
|
Definition
| Helps top-level managers with high-level activities that demand frequent and regular attention. |
|
|
Term
| COBIT Framework (Control Objectives for Information and Related Technology) |
|
Definition
| A framework of generally applicable information systems security and control practices for IT control. |
|
|
Term
| COSO (Committee of Sponsoring Organizations) |
|
Definition
| A private-sector group consisting of the American Accounting Association, the AICPA, the Institute of Internal Auditors, the Institute of Management Accountants, and the Financial Executives Institute. |
|
|
Term
| Internal Control?ÇöIntegrated Framework |
|
Definition
| Defines internal controls and provides guidance for evaluating and enhancing internal control systems. |
|
|
Term
| Enterprise Risk Management?ÇöIntegrated Framework (ERM) |
|
Definition
| Expands on the elements of the internal control integrated framework and provides an all-encompassing focus on the broader subject of enterprise risk management. |
|
|
Term
|
Definition
| High-level goals that are aligned with and support the company's mission. |
|
|
Term
|
Definition
| Deal with the effectiveness and efficiency of company operations. |
|
|
Term
|
Definition
| Help ensure the accuracy, completeness, and reliability of internal and external company reports, of both a financial and nonfinancial nature. |
|
|
Term
|
Definition
| Help the company comply with all applicable laws and regulations. |
|
|
Term
|
Definition
| The most important component of the ERM and internal control frameworks - it influences how organizations establish strategies and objectives, structure business activities, and identify and respond to risk. |
|
|
Term
|
Definition
| The amount of risk a company is willing to accept in order to achieve its goals and objectives. |
|
|
Term
| Policy and Procedures Manual |
|
Definition
| Explains proper business practices, describes the knowledge and experience needed by key personnel, spells out management policy for handling specific transactions, and documents the systems and procedures employed to process those transactions. |
|
|
Term
|
Definition
| Includes verifying educational and work experience, talking to references, checking for a criminal record, and checking credit records. |
|
|
Term
|
Definition
| An incident or occurrence emanating from internal or external sources that affects implementation of strategy or achievement of objectives. |
|
|
Term
|
Definition
| The risk that exists before management takes any steps to control the likelihood or impact of risk. |
|
|
Term
|
Definition
| The risk that remains after management implements internal controls, or some other response to risk. |
|
|
Term
|
Definition
| Expected loss = Impact ?ù Likelihood |
|
|
Term
|
Definition
| Policies, procedures, and rules that provide reasonable assurance that management's control objectives are met and the risk responses are carried out. |
|
|
Term
|
Definition
| Empowerment to perform policies established by management. |
|
|
Term
|
Definition
| A means of signing a document with a piece of data that cannot (or, rather, can only with difficulty) be forged. |
|
|
Term
|
Definition
| Authorization to handle routine transactions without special approval. |
|
|
Term
|
Definition
| Authorization that requires special review and approval. |
|
|
Term
|
Definition
| Fraud where two or more people override the preventive aspect of the internal control system. |
|
|
Term
|
Definition
| Responsible for ensuring that the different parts of an information system operate smoothly and efficiently. |
|
|
Term
|
Definition
| Ensure that all applicable devices are linked to the organization's internal and external networks and that the networks operate continuously and properly. |
|
|
Term
|
Definition
| Ensures that all aspects of the system are secure and protected from all internal and external threats. |
|
|
Term
|
Definition
| Help users determine their information needs and then design an information system to meet those needs. |
|
|
Term
|
Definition
| Take the design provided by systems analysts and create an information system by writing the computer programs. |
|
|
Term
|
Definition
| Run the software on the company's computers. |
|
|
Term
| Information System Library |
|
Definition
| Corporate databases, files, and programs in a separate storage area. |
|
|
Term
|
Definition
| Ensures that source data have been properly approved, monitors the flow of work through the computer, reconciles input and output, maintains a record of input errors to ensure their correction and resubmission, and distributes systems throughout. |
|
|
Term
|
Definition
| Shows the projects that must be completed to achieve long-range company goals and addresses the company's hardware, software, personnel, and infrastructure requirements. |
|
|
Term
|
Definition
| Shows how a project will be compoleted, including the modules or tasks to be performed and who will perform them, the dates they should be completed, and project costs. |
|
|
Term
|
Definition
| Significant points when progess is reviewed and actual and estimated completion times are compared. |
|
|
Term
|
Definition
| Format for data processing tasks. |
|
|
Term
|
Definition
| Guides and oversees systems development and acquisition. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Percentage of time the system is being productively used. |
|
|
Term
|
Definition
| How long it takes the system to respond. |
|
|
Term
| Post-implementation review |
|
Definition
| Determines if the anticipated benefits were achieved. |
|
|
Term
|
Definition
| A vendor who uses common standards and manages a cooperative systems development effort involving its own development personnel and those of the client and other vendors. |
|
|
Term
|
Definition
| The process of making sure changes to not negatively affect systems reliability security, confidentiality, integrity, and availability. |
|
|
Term
|
Definition
| An examination of the relationships between different sets of data. |
|
|
Term
|
Definition
| When individual company transactions can be traced through the system from where they originate to where they end up on the financial statements. |
|
|
Term
| Company Security Officer (CSO) |
|
Definition
| In charge of AIS security and should be independent of the information system function and report to the chief operating officer or the CEO. |
|
|
Term
| Chief Compliance Officer (CCO) |
|
Definition
| Officer in charge of ensuring that a company meets SOX and other compliance. |
|
|
Term
|
Definition
| Specialize in fraud detection and investigation. |
|
|
Term
| Computer Forensic Specialists |
|
Definition
| Discover, safeguard, and document computer evidence such that its authenticity, accuracy, and integrity will not succumb to legal challenges. |
|
|
Term
|
Definition
| Programs that mimic the brain and have learning capabilities. |
|
|
Term
| Time-based model of security |
|
Definition
| relationship between preventive, detective, and corrective controls such that P > D + C |
|
|
Term
|
Definition
| employ multiple layers of controls in order to avoid having a single point of failure |
|
|
Term
|
Definition
| verify the identity of the individual |
|
|
Term
|
Definition
|
|
Term
| multifactor authentication |
|
Definition
| any combo of the three basic authentication methods (know, have, biometrics) |
|
|
Term
|
Definition
| restricts access of authenticated users to specific portions of system |
|
|
Term
|
Definition
| table specifying which portions of the system users are permitted to access |
|
|
Term
|
Definition
| matches the user's authentication credentials against the access control matrix |
|
|
Term
|
Definition
| deception to obtain unauthorized access to infomration resources |
|
|
Term
|
Definition
| connects information system to the internet - lets in all traffic that is not obviously false. |
|
|
Term
|
Definition
| filters which information is allowed to enter and leave the organizations information system - only lets in traffic that is explicitly valid. |
|
|
Term
|
Definition
| separate network that permits controlled access from the internet to selected resources. |
|
|
Term
| (TCP) Transmission control protocol |
|
Definition
| specifies the procedures for dividing files and documents into packets |
|
|
Term
|
Definition
| specifies the structure of those packets and how to route them to the proper destination |
|
|
Term
|
Definition
| reads destination address fields in IP packet headers and sends the packet on towards its destination |
|
|
Term
|
Definition
| determines which packets are allowed entry and which packets are not |
|
|
Term
|
Definition
| screens IP packets based on source/destination fields in IP packet header |
|
|
Term
|
Definition
| Packets are opened inspected internally instead of only being examined by header |
|
|
Term
| intrusion prevention systems (IPS) |
|
Definition
| System that drops packets that are part of an attack. Looks for signatures, patterns of attacks, normal traffic profiling, and packet standars to prevent unwanted packets from being routed to system. |
|
|
Term
| dial-in user service (RADIUS) |
|
Definition
| Dial-users connect to a Remote Access Server and enter in ther log-in credentials, this information is then passed to the RADIUS Server which perfoms tests to verify the identity of the user. |
|
|
Term
|
Definition
| dialing every number associated with the business to see if they are attached to a modem. |
|
|
Term
|
Definition
| Workstations, printers, mobile devices, ect... |
|
|
Term
|
Definition
| Errors or bugs in code that allow outside parties to gain a measure of control over the system. |
|
|
Term
|
Definition
| The process of turning off unnecessary features to reduce potential security threats |
|
|
Term
|
Definition
| The process of turning normal text into unreadable gibberish called cyphertext using an encryption key and an encryption algorythmn |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Total gibberish created by encryption |
|
|
Term
|
Definition
| The process of turning cyphertext into plaintext using the encryption key and a decryption algorythmn |
|
|
Term
|
Definition
| process by which involves making copies of all encryption keys used by employees and storing them securely. less desirable because now the company has protect the real keys, and the copies of those keys. |
|
|
Term
| symmetic encryption systems |
|
Definition
| Same key is used to encrypt and decrypt |
|
|
Term
| asymmetric encryption systems |
|
Definition
| Public Key and Private Key are used. The public is made available to everyone and the private is kept secret and known only to the owner of the pair of keys. Either one can be used to encrypt but the only the other can decrypt the cyphertext |
|
|
Term
|
Definition
|
|
Term
|
Definition
| key that is kept secret and only known to the owner of the pair of keys. |
|
|
Term
|
Definition
| a process that takes plaintext of any length and transforms it into a short code called hash. Ex.. SHA 256 takes plaintext and turns it into a 256 bit hash, no matter how big the file is. No way to convert this back to plaintext. |
|
|
Term
|
Definition
| short code that is generated by hashing |
|
|
Term
|
Definition
| information encrypted by the creator's private key |
|
|
Term
|
Definition
| An electronic document created and digitally signed by a trusted third party that certifies the identity of the owner of a public key. |
|
|
Term
| (PKI) public key infastructure |
|
Definition
| the system and processes used to issue and manage asymmetric keys and digital certificates |
|
|
Term
|
Definition
| the organization that issues the keys and record the public key in a digital certificate |
|
|
Term
|
Definition
| cursive style imprint of a person's name that is applied to an electronic document. Provided by a third party company and is a valid legal signature. |
|
|
Term
|
Definition
| Process of examining logs to monitor security |
|
|
Term
| intrusion detection systems (IDS) |
|
Definition
| creates logs of network traffic and analyzes for signs of intrusion. |
|
|
Term
|
Definition
| use automated tools to identify whether a given system possesses any well-known vulnerabilities. |
|
|
Term
|
Definition
| an authorized attempt to break into an information system. |
|
|
Term
| computer emergency response team (CERT) |
|
Definition
| a team composed of IT professionals and senior management who deal with major incidents. |
|
|
Term
|
Definition
| a set of instructions for taking advantage of a vulnerability. |
|
|
Term
|
Definition
| code released by the software company that fixes a particular vulnerability. |
|
|
Term
|
Definition
| the process of regularly applying patches and updates to all software used by the organization. |
|
|
Term
| VPN (Virtual Private Network) |
|
Definition
| A connection that provides the functionality of a privately owned network while using the internet. |
|
|
Term
|
Definition
| A text file created by a web site and stored on a visitor's hard disk. |
|
|
Term
|
Definition
| Determines if the characters in a field are of the proper type. |
|
|
Term
|
Definition
| Determines if the data in a field have the appropriate arithmetic sign. |
|
|
Term
|
Definition
| Tests a numerical amount to ensure that it does not exceed a predetermined value. |
|
|
Term
|
Definition
| Similar to a limit check, but with both upper and lower limits. |
|
|
Term
|
Definition
| Ensures that the input data will fit into the assigned field. |
|
|
Term
|
Definition
| Determines if all required data items have been entered. |
|
|
Term
|
Definition
| Compares the ID code or account number in transaction data with similar data in the master file to verify that the account exists. |
|
|
Term
|
Definition
| Determines the correctness of the logical relationship between two data items. |
|
|
Term
|
Definition
| A digit computed from the other digits in a number (i.e. an ID number, or credit card number) |
|
|
Term
|
Definition
| Verifying that the check digit matches what it should. |
|
|
Term
|
Definition
| Tests if a batch of input data is in the proper numerical or alphabetical sequence. |
|
|
Term
|
Definition
| Summaries of key values for a batch of input records. |
|
|
Term
|
Definition
| Sums a field that contains dollar values, such as the dollar amount of all sales for a batch of sales transactions. |
|
|
Term
|
Definition
| Sums a nonfinancial numeric field, such as the total of the quantity ordered field in a batch of sales transactions. |
|
|
Term
|
Definition
| Sums the number of records in a batch. |
|
|
Term
|
Definition
| When the system requests each input data item and waits for an acceptable response. |
|
|
Term
|
Definition
| When the system displays a document with highlighted blank spaces and waits for the data to be entered. |
|
|
Term
|
Definition
| Checks the accuracy of input data by using it to retrieve and display other related information. |
|
|
Term
|
Definition
| A log that includes a detailed record of all transaction data. |
|
|
Term
|
Definition
| Contains the file name, expiration date, and other identification data at the beginning of a file. |
|
|
Term
|
Definition
| Contains the batch totals calculated during input, located at the end of a file. |
|
|
Term
|
Definition
| An error in which two adjacent digits were inadvertently reversed. |
|
|
Term
| Cross-footing Balance Test |
|
Definition
| Compares the results produced by both summing columns and rows. |
|
|
Term
|
Definition
| Checks that accounts that should be zeroed out are in fact zeroed out. |
|
|
Term
| Concurrent Update Controls |
|
Definition
| Protect records from errors that occur when two or more users attempt to update the same record simultaneously. |
|
|
Term
|
Definition
| An extra digit added to every character to help ensure the correct transmission of data. |
|
|
Term
|
Definition
| Verifying that there are the proper number of bits set to the value 1 in each character received. |
|
|
Term
|
Definition
| When the sending and receiving systems perform the same check and compare to verify accuracy. |
|
|
Term
|
Definition
| Enabling a system to continue functioning in the event that a particular component fails. |
|
|
Term
| Uninterruptible Power Supply (UPS) |
|
Definition
| Provides protection in the event of a prolonged power outage, using battery power to enable the system to operate lone enough to back up critical data and safely shut down. |
|
|
Term
|
Definition
| An exact copy of the most current version of a database, file, or software program. |
|
|
Term
|
Definition
| The process of installing the backup copy for use. |
|
|
Term
|
Definition
| Copying only the data items that have changed since the last backup. |
|
|
Term
|
Definition
| Copies all changes made since the last full backup. |
|
|
Term
| Recovery Point Objective (RPO) |
|
Definition
| Represents the maximum length of time for which a company is wiling to risk the possible loss of transaction details. |
|
|
Term
|
Definition
| Maintaining two copies of the database at two separate data centers at all times and updating both copies in real-time as each transaction occurs. |
|
|
Term
|
Definition
| A copy of the database at a point in time. |
|
|
Term
|
Definition
| A copy of a database, master file, or software that will be retained indefinitely as an historical record, usually to satisfy legal and regulatory requirements. |
|
|
Term
| Recovery Time Objective (RTO) |
|
Definition
| Represents the time following a disaster by which the organization's information system must be available again. |
|
|
Term
|
Definition
| An empty building that is prewired for necessary telephone and internet access, plus a contract with one or more vendors to provide all necessary computer and other office equipment within a specified period of time. |
|
|
Term
|
Definition
| A facility that is not only prewired for telephone and internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities. |
|
|
Term
|
Definition
| A systematic process of objectively obtaining and evaluating evidence regarding assertions about economic actions to ascertain the degree of correspondence between those assertions and established criteria and communicating the results to interested users. |
|
|
Term
|
Definition
| Examines the reliability and integrity of accounting records and correlates with the first of the five scope standards. |
|
|
Term
| Information Systems/Internal Control Audit |
|
Definition
| Reviews the controls of an AIS to assess its compliance with internal control policies and procedures and its effectiveness in safeguarding assets. Its scope roughly corresponds to the IIA's second and third standards. |
|
|
Term
| Operational/Management Audit |
|
Definition
| Concerned with the economical and efficient use of resources and the accomplishment of established goals and objectives. Its scope corresponds to the fourth and fifth standards. |
|
|
Term
|
Definition
| The susceptibility to material risk in the absence of controls. |
|
|
Term
|
Definition
| The risk that a material misstatement will get through the internal control structure and into the financial statements. |
|
|
Term
|
Definition
| The risk that auditors and their audit procedures will not detect a material error or misstatement. |
|
|
Term
|
Definition
| What is and is not important in a given set of circumstances. |
|
|
Term
|
Definition
| A reasonable assurance that no material error exists in the information or process audited. |
|
|
Term
|
Definition
| Reviewing system documentation and interviewing appropriate personnel to determine if the necessary procedures are in place. |
|
|
Term
|
Definition
| Determine if procedures are satisfactorily followed. |
|
|
Term
|
Definition
| Procedures that compensate for a control deficiency. |
|
|
Term
|
Definition
| Using a verified copy of the source code to reprocess data and compare its output with the company's actual output. |
|
|
Term
|
Definition
| An auditor writes a program to compare with the company's results to verify the correctness of data. |
|
|
Term
| Test Data Generator Program |
|
Definition
| Automatically prepares test data based on program specifications. |
|
|
Term
| Concurrent Audit Techniques |
|
Definition
| Continually monitor the system and collect audit evidence while live data are processed during regular operating hours. |
|
|
Term
|
Definition
| Segments of program code that perform audit functions. |
|
|
Term
| Integrated Test Facility (ITF) |
|
Definition
| Places a small set of fictitious records in the master files. |
|
|
Term
|
Definition
| Examines the way transactions are processed. Audit modules track selected transactions and their master file records before and after processing. |
|
|
Term
| System Control Audit Review File (SCARF) |
|
Definition
| Uses embedded audit modules to continuously monitor transaction activity and collect data on transactions with special audit significance. |
|
|
Term
|
Definition
| A log containing transactions generated by SCARF, containing transactions with special audit significance. |
|
|
Term
|
Definition
| Audit routines that flag suspicious transactions. |
|
|
Term
|
Definition
| When audit hooks are used and auditors are informed of questionable transactions as they occur. |
|
|
Term
| Automated Flowcharting Programs |
|
Definition
| Interpret program source code and generate a corresponding program flowchart. |
|
|
Term
| Automated Decision Table Programs |
|
Definition
| Generate a decision table representing the program logic. |
|
|
Term
|
Definition
| Search a program for occurrences of a specified variable name or other character combinations. |
|
|
Term
|
Definition
| Identify unexecuted program code. |
|
|
Term
|
Definition
| Sequentialliy prints all application program steps executed during a program run. |
|
|
Term
|
Definition
| Documents the review of source data controls. It shows the control procedures applied to each field of an input record. |
|
|
Term
| Information Systems Audits Objectives |
|
Definition
| Overall security, Program development and acquisition, Program modification, Computer processing, Source data, Data files |
|
|
Term
| Computer Audit Software (CAS) / Generalized Audit Software (GAS) |
|
Definition
| Software written especially for auditors that generates programs that perform the audit functions. |
|
|