Term
|
Definition
which is a fraud in which later payments on account are used to pay off earlier payments that were stolen? |
|
|
Term
fraudulent financial reporting |
|
Definition
associated with as many as 50% of all lawsuits against auditors |
|
|
Term
|
Definition
a fraud scheme involving bank transfers |
|
|
Term
|
Definition
type of investment fraud in which money from new investors is used to pay off earlier investors |
|
|
Term
pressure, opportunity, rationalization |
|
Definition
conditions usually necessary for a fraud to occur |
|
|
Term
|
Definition
damages systems using a segment of executable code that attaches itself to software, replicates itself, and spreads to other systems or files |
|
|
Term
|
Definition
a program that is hidden in a host program and copies and actively transmits itself directly to other systems |
|
|
Term
|
Definition
entering a system using a back door that bypasses normal system controls |
|
|
Term
|
Definition
placing unauthorized computer instructions, such as fraudulently increasing an employee's pay, in an authorized and properly functioning program |
|
|
Term
|
Definition
computer fraud technique that |
|
|
Term
strategic, compliance, reporting, operations |
|
Definition
COSO specified types of objectives that management must meet to achieve company goals (in ERM model) |
|
|
Term
|
Definition
objectives that are high level goals aligned with the company's mission |
|
|
Term
|
Definition
help the company comply with all applicable laws and regulations |
|
|
Term
|
Definition
help the company ensure the accuracy, completeness, and reliability of internal and external reports |
|
|
Term
|
Definition
deal with the effectiveness and efficiency of operations |
|
|
Term
authorization, recording, custody |
|
Definition
accounting related functions that must be segregated |
|
|
Term
Misappropriation of assets |
|
Definition
is the theft, embezzlement, or misuse of company assets for personal gain (e.g. billing schemes, check tampering, skimming, and theft of inventory). |
|
|
Term
|
Definition
the wrongful use of a position to gain personal benefit (e.g. kickback schemes and conflict of interest schemes). |
|
|
Term
Financial statement fraud |
|
Definition
misrepresenting the financial condition of an entity by intentionally altering amounts or disclosures with the goal of influencing the financial statement users to make decisions they may not otherwise make given the true financial condition of the company. Financial statements can be misstated as a result of intentional efforts to deceive or as a result of undetected asset misappropriations that are so large that they cause misstatement. |
|
|
Term
Treadway Commission Recommendations |
|
Definition
What guidance do accountants and auditors have with regard to fraud? |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Denial of service attacks |
|
Definition
|
|
Term
|
Definition
fake emails to get useful info |
|
|
Term
Email forgery (aka, spoofing) |
|
Definition
looks like from someone else |
|
|
Term
|
Definition
|
|
Term
|
Definition
gaining control of computer for illicit activities |
|
|
Term
|
Definition
dormant until some event occurs |
|
|
Term
|
Definition
pull out user names & passwords |
|
|
Term
|
Definition
uses phone line to tag onto a legit user |
|
|
Term
|
Definition
=tricking an employee to get into a system |
|
|
Term
|
Definition
copy software wo permission |
|
|
Term
Spyware & keystroke loggers= |
|
Definition
software to monitor computer habits |
|
|
Term
|
Definition
unsolicited email messages |
|
|
Term
|
Definition
enter system through backdoor |
|
|
Term
|
Definition
unauthorized instructions in an authorized program (Denial of service); no replications |
|
|
Term
bank reconciliation, top level reviews, analytical reviews, reconciling two independently maintained sets of records, comparisons of actual quantities with recorded amounts, double entry acct, and independent reviews, trial balance, periodic comparison of sub ledger totals to control accts |
|
Definition
methods of internal independent checks |
|
|
Term
identify threats, estimate risk and exposure, identify controls, and estimate costs and benefits |
|
Definition
correct order of the risk assessment steps |
|
|
Term
|
Definition
firewalls would be what type of control? |
|
|
Term
filtering which packets are allowed to enter and leave a system |
|
Definition
how are firewalls designed to prevent problems? |
|
|
Term
|
Definition
process of verifying a user's identity |
|
|
Term
|
Definition
process of controlling what actions a user is permitted to perform |
|
|
Term
|
Definition
an authorization control to limit what actions an authenticated user can perform |
|
|
Term
|
Definition
a detective control that identifies when an attack has occurred |
|
|
Term
|
Definition
a weakness that an attacker can take advantage of to either disable or take control of a system |
|
|
Term
|
Definition
the code for taking advantage of a weakness |
|
|
Term
|
Definition
code designed to fix a weakness |
|
|
Term
|
Definition
involves the creation and use of a pair of public and private keys |
|
|
Term
|
Definition
users the same secret key to both encrypt and decrypt |
|
|
Term
|
Definition
involves storing a copy of the encryption key in a safe location |
|
|
Term
|
Definition
Training would be what type of control |
|
|
Term
|
Definition
penetration testing would be what kind of control |
|
|
Term
|
Definition
detective control designed to identify weaknesses |
|
|
Term
|
Definition
enhances the effectiveness of security procedures and increases the likelihood that users will comply with security policies |
|
|
Term
|
Definition
compatibility test would be what type of control |
|
|
Term
|
Definition
an authorization of control that uses an access control matrix to determine what actions an authenticated user is allowed to perform |
|
|
Term
|
Definition
biometric tools like fingerprint readers are what type of control |
|
|
Term
fingerprint reader/biometrics |
|
Definition
authentication control used to verify the identity of someone attempting access the system |
|
|
Term
|
Definition
a preventive control that preserves the confidentiality of sensitive information |
|
|
Term
|
Definition
encryption would be what type of control |
|
|
Term
|
Definition
detective control that can be sued to identify unauthorized actions taken by users |
|
|
Term
|
Definition
log analysis would be what type of control |
|
|
Term
|
Definition
the process of applying vendor supplied code to correct existing vulnerabilities |
|
|
Term
|
Definition
modifying default configurations to improve security |
|
|
Term
|
Definition
process used to identify modems |
|
|
Term
|
Definition
sequentially prenumbering source documents and using turnaround documents |
|
|
Term
|
Definition
a record of company data sent to an external party and then returned by the external party to the system as input |
|
|
Term
cancellation of documents |
|
Definition
stamp paid, or "canceled" for electronic documents; NOT disposal |
|
|
Term
forms design, cancellation of storage of documents, authorization & segregation of duties, visual scanning |
|
Definition
input controls for processing integrity |
|
|
Term
|
Definition
scan source documents for reasonableness and propriety before entering into the system |
|
|
Term
|
Definition
determines if the characters in a filed are of the proper type |
|
|
Term
|
Definition
determines if the data in a filed have the appropriate arithmetic sign |
|
|
Term
|
Definition
tests a numerical amount to ensure that id doesn't exceed a predetermined value |
|
|
Term
|
Definition
similar to a limit check except that is has both upper and lower limits |
|
|
Term
|
Definition
ensures that the input data will fit into the assigned field |
|
|
Term
|
Definition
determines if all required data items have been entered |
|
|
Term
|
Definition
compares the ID code or account number in transaction data with similar data in the master field to verify that the account exists |
|
|
Term
|
Definition
determines the correctness of the logical relationship between two data items |
|
|
Term
|
Definition
ensures all necessary data are entered; system requests each input data item and waits for an acceptable response |
|
|
Term
|
Definition
system displays a document with highlighted blank spaces and waits for the data to be entered |
|
|
Term
|
Definition
checks the accuracy of input data b using it to retrieve and display other elated information |
|
|
Term
|
Definition
indicate when an error has occurred, which item is in error, and what the operator should do to correct it |
|
|
Term
|
Definition
includes a detailed record of all transaction data; a unique transaction identifier; date and time; sequence |
|
|
Term
|
Definition
most important component of ERM |
|
|
Term
management philosophy, operating style and risk appetite the board of directors commitment to integrity, ethical values, and competence organizational structure methods of assigning authroity and respojsiblity human resource standards external influences |
|
Definition
7 components of internal environment |
|
|
Term
internal environment, objective setting, event identification, risk assessment and response, control activities, finroatmion and communication, monitoring |
|
Definition
|
|
Term
proper authorization segregation of duties project development and acquisition controls change management controls design and use of documents and records safeguard assets, records and data independent checks on performance |
|
Definition
|
|
Term
|
Definition
risk response to high impact low probability |
|
|
Term
|
Definition
risk response to low impact low probability |
|
|
Term
|
Definition
risk response to high probability high impact |
|
|
Term
|
Definition
risk response to high probability low impact |
|
|
Term
more proactive, risk based approached with a future oriented focus; incorporates IC but adds additional components |
|
Definition
differences in new ERM model compared to COSO internal control model |
|
|
Term
security, privacy, confidentiality, availability, processing integrity |
|
Definition
4 components of systems reliability |
|
|
Term
|
Definition
time based model of security |
|
|
Term
the time for an attacker to break the preventative controls |
|
Definition
|
|
Term
the time for the company to detect than an attack has occurred |
|
Definition
|
|
Term
the time for company to respond and correct the effects of the attack |
|
Definition
|
|
Term
something they have, know, or physical |
|
Definition
|
|
Term
using position/influence to get personal gain (kickbacks, bribes) |
|
Definition
|
|
Term
|
Definition
opportunity trail aspects |
|
|
Term
|
Definition
only area where we have control in the opportunity triangle |
|
|
Term
opportunity, rationalization, pressure |
|
Definition
|
|
Term
attitude, justification, lack of personal integrity |
|
Definition
aspects of rationalization triangle |
|
|
Term
financial, lifestyle, emotional |
|
Definition
aspects of pressure triangle |
|
|
Term
swiftness, certainty, severity |
|
Definition
aspects important to making punishment effective |
|
|
Term
|
Definition
unauthorized access to a system |
|
|
Term
|
Definition
|
|
Term
|
Definition
theft of data/confidentiality issue |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
most complicated restoration |
|
|
Term
|
Definition
when a person pretends to be a friend to get information they need |
|
|
Term
|
Definition
|
|
Term
|
Definition
email that looks like it is from a legitimate source |
|
|
Term
PCAOB (public company accounting oversight board) in charge of auditors |
|
Definition
|
|
Term
how to audit internal controls, how transactions are initiated, processed, and recorded; risk assessment |
|
Definition
|
|
Term
if the control is working, it's actually mitigating the risk that it's supposed to mitigate |
|
Definition
|
|
Term
|
Definition
if a control is deigned correctly, that its working properly |
|
|
Term
|
Definition
something that can get thru the controls that would misstate the financial materially and change the mind of a reasonable investor that controls don't prevent or detect |
|
|
Term
|
Definition
The committee of sponsoring organizations was created by what commission |
|
|
Term
|
Definition
internal control framework created that is used as a benchmark to assess controls |
|
|
Term
|
Definition
the standard in the US for assessing controls |
|
|
Term
internal/external audits, fraud consultants, systems consultants, employee fraud hot lines |
|
Definition
|
|
Term
|
Definition
back up each day's work on each day |
|
|
Term
recording, authorization, custody, and reconciliation |
|
Definition
separation of accounting duties |
|
|
Term
|
Definition
|
|
Term
prenumbering, place for authorization/signatures, dates, company names/IDs/address, amounts, quantity, description, price, completeness check, salesperson |
|
Definition
tools for proper design and use of documents and records |
|
|
Term
double counting, run reports, reconciliations |
|
Definition
examples of independent checks on performance |
|
|
Term
|
Definition
process implemented by management and the board to achieve our control objectives |
|
|
Term
management, notice, choice and consent, collection, use and retention, access, disclosure to third parties, security, quality, monitoring and enforcement |
|
Definition
trust services privacy framework-10 best standards |
|
|
Term
|
Definition
establish policies and procedures to protect privacy of personal information collected; assign responsibility to a particular person or group |
|
|
Term
|
Definition
notify individuals when their information is collected |
|
|
Term
|
Definition
give customers a choice to opt our or opt in to the collection of their personal information |
|
|
Term
|
Definition
means collect only what is needed |
|
|
Term
|
Definition
means retain only as long as needed |
|
|
Term
|
Definition
allow customers to access, review, and delete their information |
|
|
Term
disclosure to third parties |
|
Definition
provide to third parties only per policy and require the same protection |
|
|
Term
|
Definition
take reasonable steps to protect the information from loss or unauthorized disclosure |
|
|
Term
|
Definition
maintain the integrity of the information |
|
|
Term
monitoring and enforcement |
|
Definition
assign a third part to assure and verify compliance |
|
|
Term
|
Definition
unauthorized access and use of computer systems, usually by a means of a personal computer and a telecommunications network |
|
|
Term
|
Definition
gaining control of someone else’s computer to carry out illicit activities without the user’s knowledge |
|
|
Term
|
Definition
emailing or text messaging the same unsolicited message to many people at the same time, often in a n attempt to reach potential customers to steel them something |
|
|
Term
|
Definition
change data before, during, or after it is entered into the system to delete, alter, add, or incorrectly update key system data |
|
|
Term
|
Definition
unauthorized copying of company data |
|
|
Term
|
Definition
process for regularly Applying patches and updates to all software used by the organization |
|
|
Term
|
Definition
process of examining logs to monitor security (leave audit trail) |
|
|
Term
|
Definition
log analysis is what type of control |
|
|
Term
Intrusion detection systems |
|
Definition
create logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions |
|
|
Term
vulnerability scans and penetration test |
|
Definition
two types of security testing as a detective control |
|
|
Term
|
Definition
use automated tools designed to identify whether a given system possesses any well known vulnerabilities |
|
|
Term
|
Definition
an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization’s information system |
|
|
Term
Computer emergency response team computer emergency response team (CERT) |
|
Definition
technical specialists and senior operations management |
|
|
Term
|
Definition
Cert would be what type of control |
|
|
Term
design ,implement, and promote sound security policies and procedures; corrective |
|
Definition
cheif information security officer plays what role in what type of contorl |
|
|
Term
security, confidentiality, privacy, processing integrity, availability |
|
Definition
Five fundamental principles that contribute to the overall objective of systems reliability: |
|
|
Term
|
Definition
focus on verifying the identity of the person or device attempting to access the system; ensure that only l legitimate users can access the system |
|
|
Term
Passwords, tokens, biometrics, MAC addressee |
|
Definition
tools used for authenication |
|
|
Term
|
Definition
restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform |
|
|
Term
compatiblity test, access control matrix |
|
Definition
|
|
Term
|
Definition
a table specifying which portions of the system users are permitted to access and what actions they can perform |
|
|
Term
|
Definition
matches the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action |
|
|
Term
|
Definition
final layer of preventive controls; the process of transforming normal text (plaintext) into unreadable gibberish (cipher text) |
|
|
Term
|
Definition
a company pays invoices an employee fraudulently submits to obtain payments he or she is not entitled to receive |
|
|
Term
|
Definition
the most expensive asset misappropriations. |
|
|
Term
|
Definition
use a fake entity established by a dishonest employee to bill a company for goods or services it does not receive. The employee converts the payment to his or her own benefit. |
|
|
Term
|
Definition
use a shell company established by an employee to purchase goods or services for the employer, which are then marked up and sold to the employer through the shell. The employee converts the mark-up to his or her own benefit. |
|
|
Term
|
Definition
involve an employee purposely causing an overpayment to a legitimate vendor. When the vendor returns the overpayment to the company, the employee embezzles the refund. |
|
|
Term
Personal-purchase schemes |
|
Definition
consist of an employee’s ordering personal merchandise and charging it to the company. In some instances, the crook keeps the merchandise; other times, he or she returns it for a cash refund. |
|
|
Term
|
Definition
any and all means a person uses to gain an unfair advantage over another person. |
|
|
Term
– A false statement (oral or in writing) – About a material fact – Knowledge that the statement was false when said (i.e. the person has to have the intent to commit the act, not just say something false because they did not know it was false) – The victim relies on the statement and therefore suffers a loss |
|
Definition
legal requirements for defining fraud are: |
|
|
Term
misapporporation of assets |
|
Definition
the theft, embezzlement, or misuse of company assets for personal gain (e.g. billing schemes, check tampering, skimming, and theft of inventory). |
|
|
Term
|
Definition
the wrongful use of a position to gain personal benefit (e.g. kickback schemes and conflict of interest schemes). |
|
|
Term
Financial statement fraud |
|
Definition
misrepresenting the financial condition of an entity by intentionally altering amounts or disclosures with the goal of influencing the financial statement users to make decisions they may not otherwise make given the true financial condition of the company. Financial statements can be misstated as a result of intentional efforts to deceive or as a result of undetected asset misappropriations that are so large that they cause misstatement. |
|
|
Term
Treadway Commission Recommendations SAS-99 Requirements |
|
Definition
What guidance do accountants and auditors have with regard to fraud? |
|
|
Term
• Auditors must: – Understand fraud – Discuss the risks of material fraudulent misstatements – Obtain information – Identify, assess, and respond to risks – Evaluate the results of their audit tests – Communicate findings – Document their audit work – Incorporate a technology focus |
|
Definition
|
|
Term
– A worm is a stand-alone program, while a virus is only a segment of code hidden in a host program or executable file. – A worm will replicate itself automatically, while a virus requires a human to do something like open a file. |
|
Definition
• A worm is similar to a virus except for: |
|
|
Term
|
Definition
any potential adverse occurrence or unwanted event that could be injurious to either the AIS or the organization |
|
|
Term
|
Definition
The potential dollar loss should a particular threat become a reality |
|
|
Term
|
Definition
Probability that the threat will happen |
|
|
Term
|
Definition
the process implemented by the board of directors, mgmt, and those under their direction to provide reasonable assurance the control objectives are achieved |
|
|
Term
|
Definition
needed to discover problems as soon as they arise (bank recs, trial balances) |
|
|
Term
|
Definition
remedy control problems that have been discovered (backup copies) |
|
|
Term
|
Definition
designed to make sure an organization’s control environment is stable and well managed |
|
|
Term
|
Definition
prevent, detect, and correct transaction errors and fraud (concerned with accuracy, completeness, validity and authorization of data captured, entered, processed, stored, transmitted, and reported) |
|
|
Term
applies to publicly held companies and their auditors; intended to prevent financial statement fraud, make financial reports more transparent, provide protection to investors, strengthen the internal controls at public companies, and punish executives who perpetrate fraud |
|
Definition
some objectives of Sarbanes Oxley act |
|
|
Term
|
Definition
Control objectives for information and related technology |
|
|
Term
expands on the elements of the internal control integrated framework and provides an all encompassing focus on the broader subject of enterprise risk management; risk based vs. controls based; oriented toward the future and constant change |
|
Definition
|
|
Term
Enterprise risk management |
|
Definition
a process, affected by an entity’s board of directors, management, and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives |
|
|
Term
|
Definition
The possibility that something will occur to affect adversely the company’s ability to create value or to erode existing value |
|
|
Term
|
Definition
The possibility that something will occur to affect positively the company’s ability to create or preserve value |
|
|
Term
strategic, operations, reporting, comliance |
|
Definition
Four types of objectives that management must meet to achieve company goals |
|
|
Term
|
Definition
high level goals that are aligned with and support the company’s mission |
|
|
Term
|
Definition
deal with the effectiveness and efficiency of company operations, such as performance and profitability goals and safeguarding assets |
|
|
Term
|
Definition
help ensure the accuracy, completeness, reliability of internal/external company reports, of both a financial and nonfinancial nature; improve decision making and monitory company activities/performance efficiently |
|
|
Term
|
Definition
help the company comply with all applicable laws and regulations |
|
|
Term
internal environment, objective setting, event identification, risk assessment, risk response, control activities, monitoring, information and communication |
|
Definition
8 interrelated risk and control components of COSO |
|
|
Term
|
Definition
tone or culture of company; helps determine how risk conscious employees are; foundation for all other ERM components, providing discipline and structure |
|
|
Term
|
Definition
mgmt puts into place a process to formulate strategic, operations, reporting, and compliance objectives that support the company’s mission and that are consistent with the company’s tolerance for risk |
|
|
Term
|
Definition
requires management to identify events that may affect the company’s ability to implement its strategy and achieve its objectives; determine if events are risks or opportunities |
|
|
Term
|
Definition
how to manage risks; how risks affect company’s ability to achieve objectives |
|
|
Term
|
Definition
management can choose to avoid, reduce, share, or accept risks |
|
|
Term
|
Definition
most important component of the ERM and internal control frameworks; influences how organizations establish strategies and objectives; structure business activities; and identify, assess, and respond to risk |
|
|
Term
Management’s philosophy, operating style, and risk appetite The board of directors Commitment to integrity, ethical values, and competence Organizational structure Methods of assigning authority and responsibility Human resource standards External influences |
|
Definition
components of internal environment of COSO |
|
|
Term
|
Definition
the amount of risk a company is willing to accept in order to achieve its goals and objectives |
|
|
Term
|
Definition
composed entirely of outside, independent directors; responsible for overseeing the corporation’s internal control structure, financial reporting process, and compliance with laws etc. |
|
|
Term
|
Definition
Defines lines of authority, responsibility, and reporting Provides framework for planning, directing, executing, controlling, and monitoring operations (centralized v. decentralized) |
|
|
Term
|
Definition
why the company exists and what it hopes to achieve |
|
|
Term
|
Definition
“an incident or occurrence mandating from internal or external sources that affects implementation of strategy or achievement of objectives; may have positive or negative impacts or both" |
|
|
Term
|
Definition
risk that exists before management takes any steps to control the likelihood or impact of a risk |
|
|
Term
|
Definition
risk that remains after management implements internal controls |
|
|
Term
|
Definition
risk that remains after management implements internal controls |
|
|
Term
Reduce (internal controls!) accept share avoid |
|
Definition
four ways to respond to risk: |
|
|
Term
|
Definition
policies, procedures, and rules that provide reasonable assurance that management’s control objectives are met and the risk responses are carried out |
|
|
Term
Independent checks on performance Safeguarding assets, records, and data Design and use of documents and records Change management controls Project development and acquisition controls Proper authorization Segregation of duties |
|
Definition
the control activities of COSO |
|
|
Term
Change management controls |
|
Definition
the process of making sure changes do not negatively affect systems reliability, security, confidentiality, integrity, and availability |
|
|
Term
|
Definition
when individual company transactions can be traced through the system from where they originate to where they end up on the financial statements |
|
|
Term
|
Definition
Foundation of systems reliability |
|
|
Term
security, confidentiality, privacy, processing integrity, availability |
|
Definition
Five fundamental principles that contribute to the overall objective of systems reliability |
|
|
Term
|
Definition
access to the system and its data is controlled and restricted to legitimate users |
|
|
Term
|
Definition
sensate organizational information is protected from unauthorized disclosure |
|
|
Term
|
Definition
personal information about customers is collected, used, disclosed and maintained only in compliance with internal policies and external regulatory requirements |
|
|
Term
|
Definition
data is processed accurately, completely, in a timely manner, and only with proper authorization |
|
|
Term
|
Definition
the system and its information is available to meet operational and contractual obligations |
|
|
Term
Time based model of security |
|
Definition
focuses on the relationship between preventative, detective, and corrective controls; all are necessary |
|
|
Term
|
Definition
limit actions to those in accord with the organization’s security policy and to not allow undesired actions |
|
|
Term
|
Definition
to identify when preventive controls have been breached |
|
|
Term
|
Definition
to repair damage from any problems that occurred and to improve the functioning of both preventative and detective controls in order to reduce the likelihood of future problems |
|
|
Term
|
Definition
employ multiple layers of controls in order to avoid having a single point of failure |
|
|
Term
authentication, authorization, training, Physical access controls, Remote access controls, Host and application hardening procedures, Encryption |
|
Definition
seven major types of preventive controls |
|
|
Term
|
Definition
focus on verifying the identity of the person or device attempting to access the system; ensure that only l legitimate users can access the system |
|
|
Term
|
Definition
restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform |
|
|
Term
|
Definition
involves making copies of all encrypting keys used by employees and storing the copies security |
|
|
Term
key length, key management policies, nature of the encryption algorithm |
|
Definition
Factors of encryption strength |
|
|
Term
use encryption software that creates built in master key |
|
Definition
Best way the decrypt data in event an employee leaves |
|
|
Term
Intrusion detection systems |
|
Definition
create logs of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions |
|
|
Term
log analysis, Intrusion detection systems, Managerial reports, Security testing (vulnerability/penetration) |
|
Definition
examples of detective controls |
|
|
Term
|
Definition
use automated tools designed to identify whether a given system possesses any well known vulnerabilities |
|
|
Term
|
Definition
an authorized attempt by either an internal audit team or an external security consulting firm to break into the organization’s information system |
|
|
Term
|
Definition
The set of instructions for taking advantage of a vulnerability: |
|
|
Term
|
Definition
code released by software developers that fixes a particular vulnerability |
|
|
Term
|
Definition
process for regularly Appling patches and updates to all software used by the organization ; Modifications to complex software |
|
|
Term
|
Definition
Fundamental control procedure for protecting the confidentiality of sensitive information |
|
|
Term
VPN virtual private network |
|
Definition
created when encrypting information before sending it over the internet (provides functionality of a privately owned network) |
|
|
Term
Protecting personal information about customers rather than organizational data |
|
Definition
How does privacy differ from confidentiality? |
|
|
Term
|
Definition
establish privacy policies to protect personal info it collects; assigns responsibility and accountability for those policies to a specific person/group |
|
|
Term
|
Definition
provides notice about privacy policies at or before the time it collects personal information from customers |
|
|
Term
|
Definition
collect only information needed |
|
|
Term
|
Definition
a text file created by a web site and stored in a visitor’s hard disk |
|
|
Term
|
Definition
use personal info only in manner stated; retain only as long as needed |
|
|
Term
disclosure to third parties |
|
Definition
discloses to third parties only when stated; third parties provide equivalent protection |
|
|
Term
|
Definition
ability to access, review, correct, and delete |
|
|
Term
|
Definition
protect customers’ personal information from loss or unauthorized disclosure |
|
|
Term
|
Definition
1. maintains integrity of customers’ personal information |
|
|
Term
monitoring and enforcement |
|
Definition
assigns someone to be responsible for assuring compliance with privacy policies |
|
|
Term
: source data prep/authorization, source data collection/entry, accuracy, completeness, and authenticity checks, processing integrity and validity, output review, reconciliation, and error handling, transaction authenticity and integrity |
|
Definition
6 application controls of processing integrity |
|
|
Term
forms design, cancellation of storage of documents, authorization & segregation of duties, visual scanning |
|
Definition
input controls for processing integrity |
|
|
Term
field check, sign check, limit check, range check, size check, completeness check, validity check, reasonableness test, check digit verification |
|
Definition
data entry controls for processing integrity |
|
|
Term
|
Definition
use of redundant components, enabling a system to continue functioning in the event that a particular component fails |
|
|
Term
|
Definition
the process of installing the backup copy for use |
|
|
Term
|
Definition
exact copy of the most current version of a database, file or software program |
|
|
Term
|
Definition
represents the maximum length of tie from which it is willing to risk the possible loss of transaction data |
|
|
Term
|
Definition
involves maintaining two copies of the database at two separate data centers at all times and updating both copies in real time as each transaction occurs; almost entirely eliminates the risk of losing any data |
|
|
Term
|
Definition
a copy of a database, master file, or software that will be retained indefinitely as an historical record, usually to satisfy legal and regulatory requirements |
|
|
Term
reciprocal agreement with another organization |
|
Definition
least expensive method of infrastructure replacement |
|
|
Term
|
Definition
empty building that is prewired for necessary telephone and internet access, plus a contract with one or more vendors to provide all necessary computer/equipment within a specified period of time |
|
|
Term
|
Definition
facility that is not only prewired but also contains all the computing and office equipment the organization needs to perform its essential business activities (backup infrastructure designed to provide fault tolerance in major disaster) |
|
|