Term
| How do you maintain control over information security (IS)? |
|
Definition
| Through the enactment of a comprehensive, entity-wide information security plan. |
|
|
Term
| ability to make use of any computer-based system is dependent on |
|
Definition
uninterrupted flow of electricity protection of computer hardware from environmental hazards protection of software and data files from unauthorized alteration preservation of functioning communications channels between devices |
|
|
Term
| volatile transaction trails |
|
Definition
| In a computer-based environment, complete audit trails may not exist or be readable. In online and real-time systems, data are entered directly into the computer, eliminating portions of the audit trail traditionally provided by source documents. |
|
|
Term
| How does a computer system affect the chance of detecting errors? |
|
Definition
| B/c employees who enter transactions may never see the final results, the potential for detecting errors is reduced. Also, output from a computer system often carries a mystique of infallibility, reducing the incentive of system users to closely examine reports and transaction logs. |
|
|
Term
| How does computer processing affect transaction processing? |
|
Definition
Computer processing uniformly subjects like transactions to the same processing instructions, therefore virtually eliminating clerical error. Thus, it permits consistent application of predefined business rules and the performance of complex calculations in high volume. However, programming errors result in all like transactions being processed incorrectly. |
|
|
Term
|
Definition
combination of hardware and software that separates an internal network from an external network and prevents passage of traffic deemed suspicious; needed to protect computerized records that are otherwise not as easily protected |
|
|
Term
|
Definition
| duplicate and periodically store offsite computer files (hard drive crash should not lose all data). |
|
|
Term
| reduced individual authorization of transactions |
|
Definition
Certain transactions may be initiated automatically by a computer-based system. This reduced level of oversight for individual transactions is an important compensating control in the absence of segregation of duties and reduced individual authorization. A third party performs the verification. |
|
|
Term
| advantages to outsourcing IT (ASACFA) |
|
Definition
| access to expertise, superior service quality, avoidance of changes in the organization's IT infrastructure, cost predictability, freeing of human and financial capital, and avoidance of fixed costs. |
|
|
Term
| disadvantages to outsourcing IT (ILVD) |
|
Definition
| inflexibility of the relationship, the loss of control, vulnerability of important information, and often dependency on a single vendor. |
|
|
Term
|
Definition
| any program code that enters a computer system that has the potential to degrade that system |
|
|
Term
|
Definition
| apparently innocent program that includes a hidden function that may do damage when activated |
|
|
Term
|
Definition
| program that copies itself from file to file (spread through email attachments and downloads) |
|
|
Term
|
Definition
| from computer to computer |
|
|
Term
| denial-of-service (DOS) attack |
|
Definition
| attempt to overload a system w/ messages so that it cannot function |
|
|
Term
|
Definition
| method of electronically obtaining confidential information through deceit by setting up a legitimate-looking website that is a scam |
|
|
Term
| Control Objectives for Information and Related Technology (COBIT) |
|
Definition
| best-known control and governance framework that addresses IT |
|
|
Term
| four main domains of COBIT (PADM) |
|
Definition
| planning and organization, acquisition and implementation, delivery and support, monitoring |
|
|
Term
| planning and organization |
|
Definition
| deals with how the IT system helps accomplish business objectives |
|
|
Term
| acquisition and implementation |
|
Definition
| deals with how the business acquires and develops IT solutions that address business objectives |
|
|
Term
|
Definition
| deals with how the company can best deliver required IT services including operations, security, and training |
|
|
Term
|
Definition
| deals with how the company can periodically assess the IT processes for quality and control |
|
|
Term
| 5 Key Principles of COBIT 5 |
|
Definition
| Meeting stakeholder needs, Covering the enterprise end-to-end, applying a single, integrated framework, enabling a holistic approach, and separating governance from management. |
|
|
Term
|
Definition
| created in response to stakeholder needs |
|
|
Term
|
Definition
| drawn up to address the enterprise goals |
|
|
Term
| enablers & categories of enablers (PPOCISP) |
|
Definition
support pursuit of the IT-related goals Categories of enablers: principles, policies, and frameworks processes organizational structures culture, ethics, and behavior information services, infrastructure, and applications people, skills, and competencies |
|
|
Term
|
Definition
| setting overall objectives and monitoring progress toward those objectives (BOD) |
|
|
Term
|
Definition
| carrying out of activities in pursuit of enterprise goals (executive management under the CEO) |
|
|
Term
|
Definition
| planning, organizing, leading/directing, and controlling |
|
|
Term
| How does IT implementation affect risk? |
|
Definition
| IT introduces some risks and helps to mitigate others; ex) automated verification. |
|
|
Term
| operational effectiveness |
|
Definition
| degree to which a system (automated or not) serves its intended purpose |
|
|
Term
|
Definition
| to aid in decision-making. Reports that cannot do this are useless. |
|
|
Term
| information security (IS) |
|
Definition
| encompasses not only computer hardware and software but all of an organization's information, no matter what medium it resides on; it involves far more than just user IDs and passwords. |
|
|
Term
| 3 principal goals for IS programs (CIA) |
|
Definition
| confidentiality, integrity, availability of data |
|
|
Term
| steps in creating an IS plan |
|
Definition
identify threats to the organization's information identify the risks that these threats entail. design compensating controls based on risk analysis. incorporate controls into a coherent, enterprise-wide IS plan, listing how the controls will be put in place and how they will be enforced. create policies |
|
|
Term
|
Definition
| determine the likelihood of identified threats and the level of damage that could potentially be done should the threats materialize |
|
|
Term
| 3 major types of IS controls |
|
Definition
| physical, logical, and policy |
|
|
Term
|
Definition
| that which governs the information resources to which individuals have access and how the level of access will be tied to their job duties. |
|
|
Term
| 3 major types of internal controls |
|
Definition
| preventive, detective, and corrective |
|
|
Term
| IS classic division of controls |
|
Definition
general (aggregate IT environment) vs. application (specific to computers)
general = macro application = micro |
|
|
Term
|
Definition
| sustain the conditions under which application controls can function properly |
|
|
Term
| Should IT be a separate function? If so, how should this be done? |
|
Definition
| Yes. Treating IT as a separating functional area of the organization involves the designation of a CIO or CTO and the establishment of an IS steering committee to set a coherent direction for the organization's systems and prioritize IT projects. |
|
|
Term
|
Definition
| built into the equipment by the manufacturer; they ensure the proper internal handling of data as they are moved and stored. |
|
|
Term
|
Definition
| limit physical access and environmental damage to computer equipment, data, and important documents |
|
|
Term
|
Definition
| established to limit access in accordance with the principle that all persons should have access only to those elements of the organization's IS that are necessary to perform their job duties. Focused on both authentication and authorization. |
|
|
Term
|
Definition
| act of assuring that the person attempting to access the system is in fact who he/she says he/she is. Accomplished through IDs and passwords. |
|
|
Term
|
Definition
| practice of ensuring that, once in the system, the user can only access those programs and data elements necessary for his/her job duties |
|
|
Term
|
Definition
| regulate traffic to an entire network, such as an organization's LAN through packet filtering |
|
|
Term
|
Definition
| The firewall examines the header of each packet. Depending on the rules set up by the network security administrator, packets can be denied entry to the network based on their source, destination, or other data in the header. Packets from a particular source address that repeatedly fail to gain access to the network might indicate a penetration attempt. The firewall can notify network security personnel who can then investigate. |
|
|
Term
|
Definition
| regulate traffic to a specified application, such as email or file transfer |
|
|
Term
| Is a firewall alone enough for IS? |
|
Definition
| A firewall alone is not an adequate defense against computer viruses; specialized antivirus software is a must. |
|
|
Term
|
Definition
| built into each application; designed to ensure that only correct, authorized data enter the system and that the data are processed and reported properly. |
|
|
Term
|
Definition
| designed to prevent unauthorized, invalid, or duplicate data from entering the system (thus authorization) |
|
|
Term
|
Definition
|
|
Term
|
Definition
| some data elements can only contain certain characters, and any transaction that attempts to use an invalid character is halted. (Soc. Sec. number). |
|
|
Term
| Limit (Reasonableness) and Range Checks |
|
Definition
| based on known limits for given information, certain entries can be rejected by the system. |
|
|
Term
|
Definition
| in order for a transaction to be processed, some other record must already exist in another file. |
|
|
Term
|
Definition
| processing efficiency is greatly increased when files are sorted on some designated field(s), called the “key,” before operations such as matching. |
|
|
Term
| Check Digit Verification (Self-Checking Digits) |
|
Definition
| an algorithm is applied to, for instance, a product number and incorporated into the number; this reduces keying errors such as dropped and transposed digits. |
|
|
Term
|
Definition
| the system will reject any transaction or batch thereof in which the sum of all debits and credits does not equal 0. |
|
|
Term
|
Definition
| provide reasonable assurance that processing has been performed as intended for the particular application |
|
|
Term
|
Definition
| record that does not match to master file record is identified and rejected |
|
|
Term
|
Definition
| cross-footing compares an amount to the sum of its components |
|
|
Term
|
Definition
| control adds the debits and credits in a transaction or batch to ensure they sum to 0. |
|
|
Term
|
Definition
| record's “key” is the group of values in designated fields that uniquely identify the record; no application process should be able to alter the data in these key fields |
|
|
Term
|
Definition
| provide assurance that the processing result is accurate and that only authorized personnel receive the output. These procedures are performed at the end of processing to ensure that all transactions the user expected to be processed were actually processed. |
|
|
Term
|
Definition
| every action performed in the application is logged along with the date, time, and ID in use when the action was taken. |
|
|
Term
|
Definition
| all transactions rejected by the system are printed and distributed to the appropriate user department for resolution |
|
|
Term
|
Definition
| the total number of records processed by the system is compared to the number the user expected to be processed |
|
|
Term
| run-to-run control totals |
|
Definition
| the new financial balance should be the sum of the old balance plus the activity that was just processed |
|
|
Term
|
Definition
| the arithmetic sum of a numeric field, which has no meaning by itself, can serve as a check that the same records that should have been processed were processed. Ex) sum of all Soc. Sec. numbers. |
|
|
Term
|
Definition
| IS goal of data availability is primarily the responsibility of the IT function. |
|
|
Term
|
Definition
| continuation of business by other means during the period in which computer processing is unavailable or less than normal |
|
|
Term
|
Definition
| process of resuming normal information processing operations after the occurrence of a major interruption |
|
|
Term
| 3 major types of contingencies |
|
Definition
| those in which the data center is physically available (power failure, random intrusions (viruses), deliberate intrusions (hacking incidents)), and those in which it is not (natural disasters). |
|
|
Term
| most basic part of any disaster recovery/business continuity plan |
|
Definition
| periodic backup and offsite recovery |
|
|
Term
| Which is more valuable to an organization. Its data? Or its hardware? |
|
Definition
|
|
Term
|
Definition
Involves duplicating all data files and application programs periodically (once a month). Incremental changes are then backed up and taken to the offsite location (once a week). Application programs must be backed up in addition to data since programs change too. |
|
|
Term
| characteristics of offsite location |
|
Definition
| temperature- and humidity controlled and guarded against physical intrusion. Just as important, it must be geographically remote enough from the site of the organization's main operations that it would not be affected by the same natural disaster. |
|
|
Term
| What's the maximum amount of information that the organization can afford to lose due to interruptions in normal processing? |
|
Definition
| In case of an interruption of normal processing, the organization's systems can be restored such that, at most, 7 days of business information is lost. |
|
|
Term
|
Definition
identifying and prioritizing the organization's critical applications Determining minimum recovery time and hardware requirements. Developing a recovery plan. Dealing with specific types of contingencies. |
|
|
Term
| Dealing with specific types of contingencies |
|
Definition
| power failures, attacks, natural disasters |
|
|
Term
|
Definition
| deal with by the purchase of backup electrical generators. These can be programmed to automatically begin running as soon as a dip in the level of electric current is detected (the "reorder point" for electricity). |
|
|
Term
| attacks (virus, denial-of-service, etc.) |
|
Definition
The system must be brought down “gracefully” to halt the spread of the infection. The IT staff must know about the latest viruses to know how to isolate the damage and bring the system back to full operation. |
|
|
Term
|
Definition
Contract for alternate processing facility. Take backup files to recovery center if processing is no longer possible at the principal site. |
|
|
Term
| alternate processing facility |
|
Definition
| physical location maintained by an outside contractor for the express purpose of providing processing facilities for customers in case of disaster |
|
|
Term
|
Definition
| fully operational processing facility that is immediately available. |
|
|
Term
|
Definition
| hot site with the latest data and software that permit startup within a few minutes or even a few seconds |
|
|
Term
|
Definition
| facility with limited hardware, such as communications and networking equipment, that is already installed but is lacking the necessary servers and client terminals |
|
|
Term
|
Definition
| shell facility lacing most infrastructure but is readily available for the quick installation of hardware and software |
|
|
Term
|
Definition
identifying and prioritizing the organization's critical applications Determining minimum recovery time and hardware requirements. Developing a recovery plan. Dealing with specific types of contingencies. |
|
|
Term
| Dealing with specific types of contingencies |
|
Definition
| power failures, attacks, natural disasters |
|
|
Term
|
Definition
| deal with by the purchase of backup electrical generators. These can be programmed to automatically begin running as soon as a dip in the level of electric current is detected (the "reorder point" for electricity). |
|
|
Term
| attacks (virus, denial-of-service, etc.) |
|
Definition
The system must be brought down “gracefully” to halt the spread of the infection. The IT staff must know about the latest viruses to know how to isolate the damage and bring the system back to full operation. |
|
|
Term
|
Definition
Contract for alternate processing facility. Take backup files to recovery center if processing is no longer possible at the principal site. |
|
|
Term
| alternate processing facility |
|
Definition
| physical location maintained by an outside contractor for the express purpose of providing processing facilities for customers in case of disaster |
|
|
Term
|
Definition
| fully operational processing facility that is immediately available. |
|
|
Term
|
Definition
| hot site with the latest data and software that permit startup within a few minutes or even a few seconds |
|
|
Term
|
Definition
| facility with limited hardware, such as communications and networking equipment, that is already installed but is lacking the necessary servers and client terminals |
|
|
Term
|
Definition
| shell facility lacing most infrastructure but is readily available for the quick installation of hardware and software |
|
|
Term
| fault-tolerant computer system |
|
Definition
| has additional hardware and software as well as a backup power supply. |
|
|
Term
|
Definition
| has additional chips and disk storage; this technology is used for mission-critical applications that cannot afford to suffer downtime. |
|
|
Term
| redundant array of inexpensive discs (RAID) |
|
Definition
| grouping of multiple hard drives with special software that allows for data delivery along multiple paths. If one drive fails, the other discs can compensate for the loss; enabling technology for fault-tolerance |
|
|
Term
| high-availability computing |
|
Definition
| used for less-critical applications because it provides for a short recovery time rather than the elimination of recovery time |
|
|