Term
What are typical transactions found in each business cycle?
- Revenue Cycle
-Expenditure Cycle
-Human Resources/Payroll Cycle |
|
Definition
Revnue Cycle - recieve/answer customer inquiries, take customer orders and enter them in AIS, approve credit sales, check inventory availablility
Expenditure Cycle- Request goods and services purchased, prepare, approve, and send purchase orders to vendors, store goods, recieve vendor invoices
Human Resources/Payroll - Recruit, hire, and train new employees, discharge employees, update payroll records, collect and validate time, attendace, and commission data, prepare and disburse payroll |
|
|
Term
What are typical transactions found in each business cycle?
- Production Cycle
- Financing Cycle |
|
Definition
Production Cycle- Design products, forecast, plan, and schedule production, request raw materials for production, store finished products
Financing Cycle- Forecaset cash needs, Sell stock/securities to investors, Borrow money from lenders, pay dividends to investors and interest to lenders |
|
|
Term
|
Definition
Contain the initial record of a transaction that takes place.
Examples, which are usually recorded on preprinted forms, include sales invoices, purchase orders, and employee time cards. |
|
|
Term
|
Definition
Records of company data sent to an external party and then returned to the system as input.
Prepared in machine-readable form to facilitate their subsequent processing as input records.
Example: utility bill that is sent to the customer, returned with the customer's payment, and read by a special scanning device when it is returned. |
|
|
Term
|
Definition
Devices that capture transaction data in machine-readable form at the time and place of their origin.
Examples include ATMs used by banks, point-of-sale (POS), scanners used in retail stores, and bar code scanners used in warehouses. |
|
|
Term
Batch vs. Real-Time Processing |
|
Definition
Batch Processing- Periodic updating of data
-legacy method still used for things like payroll that naturally occur at fixed time periods
-disadvantage- stored data are only current and accurate immediately after the periodic batch updating process
Online, Real-Time Processsing- updating as each transaction occurs
- advantages- more accurate because the system can refuse incomplete or erraneous entries, errors can easily be corrected, ensures that it is always current, thereby increasing its usefulness for making decisions
|
|
|
Term
What is the combination of batch processing and online, real-time processing? |
|
Definition
|
|
Term
Describe the four basic data processing operations. |
|
Definition
Creating - adding new data records, such as adding a new emploee to the payroll master file or database after they have been hired
Reading - retrieving or viewing existing data
Updating - data previously stored about the activity, the resources affected b the activity, or the people who performed the activity
Deleting data, such as purging the vendor master file of all vendors that the company no longer does business with |
|
|
Term
Typical Structure for Chart of Accounts |
|
Definition
-Each account number is usually 3 digits long, each serving a specific purpose
-First digit- represents the major account categories as they appear on financial statements (current assets, noncurrent assets, liabilities, equity accounts, revnues, expenses, and summary accounts)
-Second Digit- represents the primary financial subaccounts withineach category (match the order of their apprearance in financial statemens)
-Third Digit- identifies the specific account to which the transaction data will be posted.
Vary, depending on the nature/purpose of the organization is represents (i.e. partnership will have seperate captial/drawing) |
|
|
Term
What are the three components of the fraud triangle? |
|
Definition
Opportunity, Rationalization, and Pressure |
|
|
Term
Describe the Opportunity component of the Fraud Triangle. |
|
Definition
Opportunity is the condition or situation that allows a person or organization to do three things:
`1. Commit the fraud.
(theft of assets, such as cash, inventory, tools, supplies, info, and computer time and services, financial reporting consists of the overstatement of assets or revenues, the understatement of liabilities, or failure to disclose info)
2. Conceal the fraud. (charge to an expense account, using a lapping scheme (Panzi scheme), usuing a kiting scheme (taking advantage of check lagging time)
3. Convert the theft or misrepresentation to personal gain.
Examples that give opportunity: failure to enforce internal controls, no audit trails, too much trust in key employees, large, unusual, or complex transactions, nuumerous adjusting entries at year-end, accounting department understaffed and overworked, failure to teach/stress corporate honesty |
|
|
Term
Describe the Pressure component of the Fraud Triangle. |
|
Definition
Pressure- a person's incentive or motivation for committing fraud.
3 Types:
1. Misappropriation of assets (employee fraud)
-living beyond ones means, having heavy financial losses, or high personal debt
2. Relates to the emotional feelings or problems of employee
-greed, resentment towards company, feel pay is too low or getting taken advantage of)
3. Person's lifestyle
-support gambling habit, support an addition, keep up pace with other people financially |
|
|
Term
Describe the Rationalization component of the Fraud Triangle. |
|
Definition
Rationalization- allows perpetrators to justify their illegal behavior
-justification of one's actions
-lack of personal integrity
-"I am only borrowing the money and will repay it"
-"You would understand if you knew how much I need it"
-"What I did was not that serious"
-"No one will ever know." |
|
|
Term
|
Definition
Dialing thousands of phone lines seraching for idle modems that can be used to enter the system, capture the attached computer, and gain access to the networks(s) to which itt is attached. |
|
|
Term
|
Definition
Looking for unprotected wireless networks using a car or a rocket. |
|
|
Term
Masquerading/Impersonation |
|
Definition
Accessing a system by pretending to be an authorized user. The impersonator enjoyes the same privileges as the legitimate user. |
|
|
Term
|
Definition
Techniques that trick a person into disclosing confidential information. |
|
|
Term
|
Definition
Entering a system using a back door that bypasses normal system controls. |
|
|
Term
|
Definition
Watching people or listening as they enter or give confidential information. |
|
|
Term
|
Definition
An attack between the time a new software vulnerability is discovered and a software patch that fixed the problem is released. |
|
|
Term
|
Definition
Stealing tiny slices of money over time. An example is increasing expenses by a fraction of a percent and placing those funds in a perpetrator-controlled dummy account. |
|
|
Term
|
Definition
Truncating interest calculations at two decimal places. The truncated fraction of a cent is placed in an account controlled by the perpetrator. |
|
|
Term
|
Definition
Illegally copying computer software. |
|
|
Term
|
Definition
Unauthorized code in an authorized and properly functioning program. |
|
|
Term
|
Definition
Trojan horses that lie idle until triggered by a specified time or circumstance. Once triggered, the bomb goes off, destroying programs, data, or both. |
|
|
Term
|
Definition
A segment of executable code that attaches itself to softare, replicated itself, and spreads to other systems or files. Triggered by a predefined event, it damages system resources or displays a message on the monitor. |
|
|
Term
|
Definition
Using software to collect web-surfing and spending data and forward it to advertising or media organizations. It also causes banner ads to pop up on the computer monitors as the internet is surfed. |
|
|
Term
|
Definition
Using software to monitor computing habits and send that data to someone else, often without the computer user's permission. |
|
|
Term
|
Definition
Copying company data, such as computer files, without permission. |
|
|
Term
|
Definition
Changing data before, during, or after they are entered into the system. |
|
|
Term
|
Definition
Sending e-mails requesting recipients to visit a Web page and verify data or fill in missing data. The e-mails and Web sites look like legitimate companies, primaryily financial institutions. |
|
|
Term
|
Definition
A wireless network with the same name as a local wireless access point. The hacker disables the legitimate access point, users unknowingly reconnect to the evil twin, and hackers monitor the traffic looking for useful information. |
|
|
Term
|
Definition
Using spyware to record a user's keystrokes. |
|
|
Term
|
Definition
Using a computer to find confidential information as it travels the Internet and other networks. |
|
|
Term
Scavenging and Dumpster Diving |
|
Definition
Searching for confidential corporate or personal information by searching trash cans or scanning the contents of computer memory. |
|
|
Term
What are the eight interrelated risk and control components of COSO? |
|
Definition
1. Internal Environment
2. Objective Settings
3. Event Identification
4. Risk Assessment
5. Risk response
6. Control Activities
7. Information and Communication
8. Monitoring |
|
|
Term
Definition of Internal Environment with COSO ERM |
|
Definition
This is the tone or culture of a company and helps determine how risk conscious employees are. It is the foundation for all other ERM components, providing discipline and structure. It is essentially the same thing as the control environment in ther internal control integrated framework.
|
|
|
Term
Components of Internal Environment within COSO ERM. |
|
Definition
1. Management's philosophy, operating style, and risk appetite
2. The board of directors
3. Commitment to integrity, ethical values, and competence
4. Organizational structure
5. Methods of assigning authority and responsiblity
6. Human resource standards
7. External influences |
|
|
Term
Definition of Objective Setting within the COSO ERM framework. |
|
Definition
ERM ensures that company management puts into place a process to formulate strategic, operations, reporting, and compliance objectives that support the company's mission and that are consistent with the company's tolderance for risk. |
|
|
Term
Definition of Event within the COSO ERM framework. |
|
Definition
ERM requires management to identify events that may affect the company's ability to implement its strategy and achieve its objectives. Management must then determine whether these possible events represent risks or opportunities. |
|
|
Term
What are COSO ERM's nine event categories? |
|
Definition
External
-Economic
-Natural Environment
-Political
-Social
-Technological
Internal
-Infrastructure
-Personnel
-Process
-Technology |
|
|
Term
Common techniques used to identify COSO ERM events. |
|
Definition
- Use comprehensive lists of potential events
- Perform an internal analysis
- Monitor leading events and trigger points
- Conduct workshops and interviews
- Perform data mining and analysis
-Analyze business processes |
|
|
Term
Definition of Risk Assessment in the COSO ERM framework. |
|
Definition
Identified risks are assessed to determine how to manage them and how they affect the company's ability to achieve its objectives. Qualitative and quantitative methods are used to assess risks in several different ways. |
|
|
Term
Definition of Risk Response in COSO Erm framework. |
|
Definition
To align identified risks with the company's tolerance for risk, management can choose to avoid, reduce, share, or accept the risks. To select a response, management must ake an entity-wide, view of risk and assess risk likelihood and impact, as well as the costs and benefits of the alternative responses. |
|
|
Term
Inherent Risk
Residual Risk |
|
Definition
Inherent Risk - the risk that exists before management takes any steps to control the likelihood or impact of a risk
Residual Risk - the risk that remains after management implements internal controls, or some other response to risk |
|
|
Term
4 Ways to Respond to Risk |
|
Definition
1. Reduce - most effect way to reduce the likelhood and impace of risk is to implement an effective system of internal controls
2. Accept - accept the likelihood and impact of the risk by not acting to prevent or mitigate it
3. Share- Share some of the risk or transfer it to someone else (buy insurance, outsource an activity, enter into hedging transactions)
4. Avoid- Risk is avoided by not engaging in the activity that produces the risk. (sell a division, exit a product line, or not expand as anticipated) |
|
|
Term
Definition of Control Activities within the COSO ERM framework. |
|
Definition
To implement management's risk responses, control policies and procedures are established and implemented throughout the various levels and functions in the organization. |
|
|
Term
7 Categories of Control Procedures within COSO ERM framework. |
|
Definition
1. Proper authorization of transactions and activities
2. Segregation of Duties
3. Project Ddevelopment and acquisition controls
4. Change management controls
5. Design and use of documents and records
6. Safeguarding assets, records, and data
7. Independent checks on performance. |
|
|
Term
Three Components of Accounting Segregation of Duties |
|
Definition
Authorization- approving transactions and decisions
Recording- preparing source documents, entering data into online systems, maintaining journals, ledgers, files or databases, preparing reconcilations, and preparing performance reports.
Custody- handling chas, tools, inventory, or fixed assets; receiving incoming customer checks, writing checks on the organization's bank account. |
|
|
Term
Information and Communication definition within the COSO ERM framework. |
|
Definition
Information about the company and the various ERM components must be identified, captured, and communicated so employees can fullfill their responsibilities. To be communicated effectively, info must have a means of flowing through all levels and functions in the company and to and from all external parties. |
|
|
Term
Definition of Monitoring within COSO ERM framework. |
|
Definition
To remain effective, ERM processes must be monitored on an ongoing basis and modified as needed. Monitoring is accomplished with ongoing management activities and separate evaluations. Deficiencies in ERM processes are reported to management. |
|
|
Term
3 Types of High Level Objectives |
|
Definition
Operations
Reporting
Compliance |
|
|
Term
|
Definition
On-going Basis- (part of normal routine)- monitoring systems, responibility accounting, effective supervision, fraud detection software, fraud hotline
One-Time Evaluations- "fresh" pair of eyes, internal auditors, engage forensic assessment, critical self-assessment |
|
|
Term
ERM Framework Vs. Internal Control Framework |
|
Definition
COSO originally examined controls without first examining the purposes and risks of business processes provides little context for evaluating the results, making it hard to know which control sysems are most important, whether they adequately deal with risk, and whether important control systems are missing. Focusing on controls first also causes gias toward past problems and concerns. Long-standing internal control systems often have multiple layers of controls to protect against things that are no longer risks or are no longer important.
COSO recognized this and developed the more comprehensive ERM framework, which takes a risk-based, rather than a controls-based, approach to the organization that is orientated towards the future and constant change. It is more comprehensive, and includes three additional elements: setting objectives, identifying positive and negative events that may affect the company's ability to implement its strategy and achieve those objectives, and developing a response to assessed risk. As a result, controls are flexible and relevant b/c they are linked to current objectives.
Also, ERM model recognizes that risk, in addition to being controlled, can be accepted, avoided, diversified, shared, or transferred. |
|
|
Term
Similarities of COSO and COSO ERM |
|
Definition
Both concentrate on environment, risk, control activities, monitoring, and information and communication, but COSO ERM addresses risk more. |
|
|
Term
What does it mean to do risk assessment with a qualitative approach? |
|
Definition
One must analyze whether or not the benefits exceed the costs of the internal control.
It's hard sometimes to quantify, especially when its things such as increased sales and productivity, reduced losses, better integration with customers and suppliers, increased customer loyalty, competitive advantages, and lower insurance premiums.
Costs are usually easier to measure than benefits (because they are number based). Usually it refers to personal, including the time to perform control procedures, the costs of hiring additional employees to follow segregation of duties, etc.
Most use the Expected Loss equation to help.
Expect Loss = Impact x Likelihood
The value of a control procedure is the difference between the expected loss with the control procedure(s) and expected loss without it.
Sometimes use graph to compare impact and likelihood. |
|
|
Term
Identify segregated duties within a computers system function. |
|
Definition
1. Systems Administration- responsible for ensuring that the different parts of an information system operate smoothly and efficiently.
2. Network Managers- snsure that all applicable devices are linked to the organization's internal and external networks and that the neworks operate continuously and properly
3. Security Management- ensures that all aspects of the system are secure and protected from all internal and external threats.
4. Change Management- These individuals manage all changes to an organization's information system to ensure they are made smoothly and efficiently and to prevent errors and fraud.
5. Users- record transactions, authorize data to be processed, and use system output
6. Systems analysis- helps users determine their information needs and then design an information system to meet those needs
7. Programmers tak ethe design proveded by systems analysts and create an information system by writing the computer programs.
8. Computer operations- run the software on the company's computers. They ensure that data are input properly and correctly processed and needed output is produced.
9. Information system library- maintains custody of corporate databases, files, and programs
10. Data control- ensures that source data have been properly approved, monitors the flow of work through the computer, reconciles input and output, maintains a record of input errors to ensure their correction and resubmission, and distributes systems output. |
|
|
Term
|
Definition
the process implemented by the board of directors, management, and those under their direction to provide reasonable assurance that assets are safeguarded, records are maintained, info is accurate and reliable, financial reporting follows GAAP, promoting and iprovoing operational efficiency, encouraging adherence to prescribed managerial policies, and complying with applicable laws and regulations. |
|
|
Term
|
Definition
deter problems before they arise
ex. hiring qualified personnel, appropriately segreating employee duties, and effectively controlling physical access to assets, |
|
|
Term
|
Definition
Needed to discover problems as soon as they arise
ex. duplicate checking of calculations and preparing bank reconciliations and monthly trial balances |
|
|
Term
|
Definition
remedy control problems that have been discovered. They include procedures taken to identify the cause of a problem, corect resultuing errors or difficultues, and modify the system so that future problems are minimized and eliminated.
ex. maintain backup copies, adhering to procedures to correct data entries |
|
|
Term
|
Definition
designed to make sure an organization's control environment is stable and well managed.
Ex. information systems management controls, security management controls, IT infrastructure controls, and software aquisition, development, and maintenance control. |
|
|
Term
|
Definition
Prevent, detect, and correct transaction errors and fraud. They are concerned with the accuracy, completeness, validity, and authorization of the data caputured, entered into the system, processed, stored, trasmitted to other systems, and reported. |
|
|
Term
What is the Trust Services Framework? |
|
Definition
Focuses specifically on five aspects of information systems controls and governance that most directly pertain to systems reliability:
1. Security- access to the system and its data is controlled and restricted to legitimate users.
2. Confidentiality- sensitive organization information (e.g., marketing plans, trade secrets, etc.) is protected from unauthorized disclosure.
3. Privacy- personal information about customers is collected, used, disclosed and maintained only in compliance with internal policies and external regulatory requirements.
4. Processing Integrity- data is processed accurately, completely, in a timely manner, and only with proper authorization.
5. Availability- the system and its information is available to meet operational and contractual obligations.
It is not a substitute for COBIT, b/c it only addresses a subset of the issues by COBIT, but it provides a useful means for consolidating COBIT's control objectives to focus on a specific of IT governance that has become relevant because of SOX: systems reliablility. |
|
|
Term
Four essential criteria for successfuly implementing each of the five principles in the Trust Services framework related to systems reliability. |
|
Definition
1. Developing and documenting policies.
2. Effectively communicating policies to all authorized users.
3. Designing and employing appropriate control procedures to implement policies.
4. Monitoring the system and taking corrective action to maintain compliance with policies. |
|
|
Term
What is the COBIT framework? |
|
Definition
Provides comprehensive guidance for effectively controlling and managing information systems.
|
|
|
Term
What are the seven criterias of the COBIT framework? |
|
Definition
Seven criterias:
1. Effectiveness- the information must be relevant and timely.
2. Efficiency- the information must be produced in a cost-effective manner.
3. Confidentiality- sensitive information must be protected from unauthorized disclosure.
4. Integrity- the information must be accurate, complete, and valid.
5. Availability- the information must be available whenever needed.
6. Compliance- controls must ensure compliance with internal policies and with external legal and regulatory requirements.
7. Reliability- management must have access to appropriate information needed to conduct daily activities and to exercise its fiduciary and governance responsibilities |
|
|
Term
What are the 4 domains of the COBIT framework? |
|
Definition
1. Plan and Organize
2. Acquire and Implement
3. Deliver and Support
4. Monitor and Evaluate
Also, 34 processes and 100+detailed objectives. |
|
|
Term
Time-based model of security |
|
Definition
focuses on the relationship between preventitive, detective, and corrective controls.
It evaluates the effectiveness of an organization's security by measuring and comparing the relationship among the following three variables:
P= the time it takes an atacker to break through the organization's preventitive controls
D = the time it takes to detect that an attack is in progress
C = the time it takes to respond to the attack
If P > D + C, then the organization's security procedures are effective. |
|
|
Term
|
Definition
The idea of defense-in-depth is to employ multiple layers of controls in order to avoid having a single point of failure. |
|
|
Term
|
Definition
focueses on verifying the identity of the person or device attempting to access the system.
Can be authenticated by verifying:
1. Something you know (passwords)
2. Something you have (ID cards)
3. Some physical characteristic |
|
|
Term
|
Definition
some physical characteristic, such as fingerprints or voice |
|
|
Term
Multifactor Authentication |
|
Definition
the use of two or all three authentication methods in conjunction |
|
|
Term
|
Definition
restricts access of authenticated users to specific portions of the system and specifies what actions they are permitted to perform. |
|
|
Term
|
Definition
a table specifying which portions of the system users are permitted to access and what actions they can perform |
|
|
Term
|
Definition
matches the user's authentication credentials against the access control matrix to determine whether that employee should be allowd to access that resource and perform the requested action. |
|
|
Term
|
Definition
connects an organization's information system to the Internet |
|
|
Term
|
Definition
special-purpose hardware device or software running on a general purpose computer |
|
|
Term
|
Definition
separate network that permits controlled access from the Internet to selected resources, such as the organization's e-commerce Web server |
|
|
Term
Transmission Control Protocol (TCP) |
|
Definition
specifies the procedures for dividing files and documents into packets to be sent over the Internet and the methods for reassembly of the original document or file at the destination. |
|
|
Term
|
Definition
specifies the structure of those packets and how to route them to the proper destination. |
|
|
Term
|
Definition
designed to read the destination address fields in IP packet headers to decide where to send (route) the packets next. |
|
|
Term
|
Definition
determines which packets are allowed entry and which are dropped |
|
|
Term
|
Definition
screens individual IP packets based soley on the contents of the source and/or destination fields in the IP packet header |
|
|
Term
stateful packet filtering |
|
Definition
maintains a table that lists all established connections betweent the organization's computers and the Internet |
|
|
Term
|
Definition
firewalls that examine the data in the body of an IP packet can provide more effective access control than those that look only at information in the IP header |
|
|
Term
intrustion prevention systems (IPS) |
|
Definition
designed to identify and drop packets that are part of an attack |
|
|
Term
Remote Authentication Dial-In User Service (RADIUS) |
|
Definition
standard method for verifying the identity of users attempting to obtain dial-in access. |
|
|
Term
|
Definition
workstations, servers, printers, and other devices that comprise the organization's network |
|
|
Term
|
Definition
flaws in programs which can be exploited to either crash the system or take control of it |
|
|
Term
|
Definition
the process of turning off unnecessary program features |
|
|
Term
|
Definition
the process of transforming normal text, called plain text, into unreadable gibberish, called ciphertext. Encryption is particularly important when confidential data is being transmitted from remote terminals because data transmission lines can be elecgronically monitored without the user's knowledge. |
|
|
Term
|
Definition
normal text that has not been encrypted. |
|
|
Term
|
Definition
Plaintext that has been transformed into unreadable gibberish through the process of encryption |
|
|
Term
|
Definition
transforming ciphertext back into plaintext |
|
|
Term
|
Definition
process of storing a copy of an encryption key in a secure location |
|
|
Term
Symmetric Encryption Systems |
|
Definition
encryption systems that use the same key both to encrypt and to decrypt |
|
|
Term
Asymmetric Encryption Systems |
|
Definition
Uses two keys, one public and one private
Either the public or private key can be used to encrypt, but only the other key can decrypt the ciphertext |
|
|
Term
|
Definition
widely distributed and available to everyone |
|
|
Term
|
Definition
kept secret and known only to the owner of that pair of keys |
|
|
Term
|
Definition
process that takes plaintext of any length and transforms it into a short code called a hash
differs from encryption in two important aspects
1. encryption always produces ciphertext similar in length to the original plaintext, but hasing always produces a hash that is of a fixed short length, regardless of the length of the original plaintext
2. Encryption is reversible, hashing is not b/c it throws away information |
|
|
Term
|
Definition
shorter code or plaintext |
|
|
Term
|
Definition
information encrypted with the creator's private key. |
|
|
Term
|
Definition
an electronic document, created and digitally signed by a trusted 3rd party, that certifies the identity of the owner of a particular public key |
|
|
Term
Public Key Infrastructure (PKI) |
|
Definition
refers tot he system and processes used to issue and manage asymmetric keys and digital certificates |
|
|
Term
|
Definition
the organization that issues public and private keys and records the public key in a digital certificate |
|
|
Term
|
Definition
cursive style imprint of a person's name that is applied to an electronic document |
|
|
Term
|
Definition
the process of examining logs to monitor security |
|
|
Term
intrusion detection systems |
|
Definition
create lots of network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions |
|
|
Term
|
Definition
use automated tools designed to identify whether a given system possesses any well-kinown vulnerabilities |
|
|
Term
|
Definition
authorized attempt by either an internal audit team or an external security consulting firm to break into the organization's info system |
|
|
Term
computer emergency response team (CERT) |
|
Definition
responsible for dealing with major incidents
Recognize, Contain, Recover, and Follow up on major incidents |
|
|
Term
|
Definition
set of instructions for taking advantage of a vulnerability |
|
|
Term
|
Definition
code released by software developers that fixes a particular vulnerability |
|
|
Term
|
Definition
process for regularly applying patches and updates to all software used by the organization |
|
|
Term
Asymmetric Encryption (How it Works) |
|
Definition
Uses two keys
One key, the public key, is widely distributed and available to everyone, the other key, the private key, is kept secret and known only to the owner of the pair of keys. Either the public or private key can be used to encrypt, but only the other key can decrypt the ciphertext.
Original Text-> Encrypt with Public Key->Decrypt with Private Key-> Original Text
or
Original Text->Encrypt with Private Key->Decrypt with Public Key->Original Text |
|
|
Term
|
Definition
Uses the same key both to encrypt and decrypt.
Key must be kept secret. |
|
|
Term
What source data controls regulare the integrity of input? |
|
Definition
1. Forms design (how forms are designed so you don't forget info)
2. Cancellation and storage of documents
3. Authorization and segregation of duties.
4. Visual scanning |
|
|
Term
|
Definition
determines if the characters in a field are of the proper type (ex. if only numbers are supposed to be there and letters are included) |
|
|
Term
|
Definition
determines if the data in a field have the appropriate arithmetic sign (the quanitity of order should never be negative) |
|
|
Term
|
Definition
tests a numberical amount to ensure that it does not exceed a perdetermined value (working 40 hours a week and not 400) |
|
|
Term
|
Definition
similar to a limit check except that it has both upper and lower limits |
|
|
Term
|
Definition
ensures that the input data will fit into the assigned field |
|
|
Term
|
Definition
on each input record determines if all required data items have been entered |
|
|
Term
|
Definition
compares the ID code or account number in transaction data with similar data in the master file to verifty that the account exists (checking customer account numbers) |
|
|
Term
|
Definition
determines the correctness of the logical relationship between two data items |
|
|
Term
|
Definition
authorized ID numbers can contain a check digit that is computed from the other digits (such as the first nine digits of a number calculate the tenth digit to verify the numbers are right) |
|
|
Term
|
Definition
tests if a batch of input data is in the proper numerical or alphabetical sequence |
|
|
Term
|
Definition
info about data input or data processing errors (date they occurred, cause of the error, date corrected and resubmitted), errors should be investiaged, corrected, and resubmitted on a timely basis and reedited suing the same input validation routine |
|
|
Term
|
Definition
summarize key values for a batch of input records should be calculated
Three commonly used batched totals:
1. Financial Total- sums a field that contains dollar values, such as the total dollar amount of all sales for a batch of sales transactions
2. Hash total- sums a nonfinancial numeric field, such as the total of the quantity ordered field in a batch of sales transactions.
3. Record Count- sums the number of records in a batch |
|
|
Term
|
Definition
the system requests each input data item an dwaits for an acceptable response- ensures all necessary data is entered |
|
|
Term
|
Definition
the system displays a document with the highlighted blank spaces and waits for the data to be entered |
|
|
Term
|
Definition
checks the accuracy of input data by using it to retrieve and display other related info |
|
|
Term
|
Definition
Data Matching- two or more items of data must match before an action can take place
File Labels- need to be checked to ensure that the correct and most current files are being updated (both internal, which are readable by machine, and external, which are read my humans)
-header record- internal label - located at the beginning of each file and contains the file name, expiration date, and other identification data
-trailer record- internal label- located at the end of the file and ocntains the batch totals calculated during input
Recalculation of batch totals- batch totals can be recomputed as each transaction record is processed and compared to the values in the trailer record
-if a financial or hash total discrpancy is evenly divisible by 9, the likely cause is a transposition error, in which two adjacent digits were inadvertly reversed
Write-protection mechanisms- protect against the accidental writing over or erasing of data files stored on magnetic media
Database processing integrity procedures - database administrators, data dictionaries, and concurrent update controls to ensure processing inteigrity.
-The administrator establishes and enforces procedures for accessing and updating the database.
-The data dictionary ensures that data items are defined and used consistently.
-Concurrent update controls protect records from eerors that occur when two or more users atempt to update the same record simultaneously. |
|
|
Term
|
Definition
User review of output – Users should carefully examine system output for reasonableness, completeness, and that they are the intended recipient.
Reconciliation Procedures – Periodically, all transactions and other system updates should be reconciled to control reports, file status/ update reports, or other control mechanisms. In addition, general ledger accounts hsould be reconciled to subsidiary account totals on a regular basis.
External Data Reconciliation – Database totals should be periodically be reconciled with data maintained outside the system. Ex: The number of employee records in the payroll file can be compared with the total from human resources to detect attempts to add fictitious employees to payroll database.
|
|
|
Term
|
Definition
Computers represent characters as a set of binary digits (bits). When data are transmitted, some bits mayb e lost or received incorrectly due to media disruptions or failures.
To detect them, an extra digit, called a parity bit, is added to every character |
|
|
Term
Message Acknowledgment Techniques |
|
Definition
1. Echo Check - when data are transmitted, the system calculates a summary statistic as the number of bits in the message, the recieving unit performs the same calculation, and sends the results ot the sending unit, if the counts agree, the transmission was accurate
2. Trailer Record- the sending unit stores control totals in a trailer record. The receiving unit uses that info to verify that the entire message was recieved.
3. Numbered Batches- if a large message is transmitted in segments, each can be numbered sequentially so that the receiving unit can properly assemble the segments |
|
|
Term
Threats to System Availibility Sources |
|
Definition
<!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:Tahoma; panose-1:2 11 6 4 3 5 4 4 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:1627421319 -2147483648 8 0 66047 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.NoSpacing, li.NoSpacing, div.NoSpacing {mso-style-name:"No Spacing"; mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:Calibri; mso-fareast-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} p.BalloonText, li.BalloonText, div.BalloonText {mso-style-name:"Balloon Text"; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:8.0pt; font-family:Tahoma; mso-fareast-font-family:"Times New Roman";} span.BalloonTextChar {mso-style-name:"Balloon Text Char"; mso-ansi-font-size:8.0pt; mso-bidi-font-size:8.0pt; mso-ascii-font-family:Tahoma; mso-hansi-font-family:Tahoma; mso-bidi-font-family:Tahoma;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:54283976; mso-list-type:hybrid; mso-list-template-ids:63474920 -2100392014 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l0:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman";} @list l0:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l0:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l0:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l0:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l0:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l0:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l0:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l0:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l1 {mso-list-id:579024884; mso-list-type:hybrid; mso-list-template-ids:-1367286048 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l1:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol; mso-bidi-font-family:"Times New Roman";} @list l1:level2 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:"Courier New";} @list l1:level3 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Wingdings; mso-bidi-font-family:"Times New Roman";} @list l1:level4 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol; mso-bidi-font-family:"Times New Roman";} @list l1:level5 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:"Courier New";} @list l1:level6 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Wingdings; mso-bidi-font-family:"Times New Roman";} @list l1:level7 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol; mso-bidi-font-family:"Times New Roman";} @list l1:level8 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:"Courier New";} @list l1:level9 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Wingdings; mso-bidi-font-family:"Times New Roman";} @list l2 {mso-list-id:614215761; mso-list-type:hybrid; mso-list-template-ids:-306543040 -1350785542 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l2:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman"; mso-ansi-font-weight:bold;} @list l2:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l2:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l2:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l2:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l2:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l2:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l2:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l2:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3 {mso-list-id:620956346; mso-list-type:hybrid; mso-list-template-ids:1481438028 -1167151872 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l3:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman"; mso-ansi-font-weight:bold;} @list l3:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l3:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4 {mso-list-id:691104138; mso-list-type:hybrid; mso-list-template-ids:-232521098 -1536258726 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l4:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman"; mso-ansi-font-weight:bold;} @list l4:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l4:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5 {mso-list-id:1141581473; mso-list-type:hybrid; mso-list-template-ids:-1749796394 300043722 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l5:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman";} @list l5:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l5:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6 {mso-list-id:1310475226; mso-list-type:hybrid; mso-list-template-ids:-856016296 -1214333166 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l6:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman"; mso-ansi-font-weight:bold;} @list l6:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l6:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7 {mso-list-id:1571767757; mso-list-type:hybrid; mso-list-template-ids:1714461740 -615118722 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l7:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman"; mso-ansi-font-weight:bold;} @list l7:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l7:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8 {mso-list-id:1654410809; mso-list-type:hybrid; mso-list-template-ids:-1570099864 -2118494154 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l8:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman"; mso-ansi-font-weight:bold;} @list l8:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l8:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9 {mso-list-id:1707026192; mso-list-type:hybrid; mso-list-template-ids:-346621816 1868489724 67698713 67698715 67698703 67698713 67698715 67698703 67698713 67698715;} @list l9:level1 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Times New Roman";} @list l9:level2 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:1.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9:level3 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:2.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9:level4 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:2.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9:level5 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:3.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9:level6 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:3.75in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9:level7 {mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.25in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9:level8 {mso-level-number-format:alpha-lower; mso-level-tab-stop:none; mso-level-number-position:left; margin-left:4.75in; text-indent:-.25in; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l9:level9 {mso-level-number-format:roman-lower; mso-level-tab-stop:none; mso-level-number-position:right; margin-left:5.25in; text-indent:-9.0pt; mso-ascii-font-family:"Times New Roman"; mso-hansi-font-family:"Times New Roman"; mso-bidi-font-family:"Times New Roman";} @list l10 {mso-list-id:1950627722; mso-list-type:hybrid; mso-list-template-ids:-261352344 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l10:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol; mso-bidi-font-family:"Times New Roman";} @list l10:level2 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:"Courier New";} @list l10:level3 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Wingdings; mso-bidi-font-family:"Times New Roman";} @list l10:level4 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol; mso-bidi-font-family:"Times New Roman";} @list l10:level5 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:"Courier New";} @list l10:level6 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Wingdings; mso-bidi-font-family:"Times New Roman";} @list l10:level7 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol; mso-bidi-font-family:"Times New Roman";} @list l10:level8 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:"Courier New";} @list l10:level9 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:none; mso-level-number-position:left; text-indent:-.25in; font-family:Wingdings; mso-bidi-font-family:"Times New Roman";} ol {margin-bottom:0in;} ul {margin-bottom:0in;} -->
· Minimizing risk of system downtime
· Disaster recovery and business continuity planning
· Infrastructure Replacement
· Documentation
· Testing
|
|
|
Term
|
Definition
enabling a system to continue functioning in the event that a particular component fails |
|
|
Term
Key Controls to Ensure System Availablility |
|
Definition
Minimizing Downtime
Recovery |
|
|
Term
Uninterruptible Power Supply (UPS) |
|
Definition
system provides protection in the event of a prolonged power outage, using battery power to enable the system to operate long enough to back up critical data and safely shut down. |
|
|
Term
|
Definition
an exact copy of the most current version of a database, file, or software program
process of installing the backup copy for use |
|
|
Term
full backup
incremental backup
differential backup |
|
Definition
exact copy of the entire database
involves copying only the data items that hae changed since the last backup (makes individual files for each one)
copies all changes made since the last full backup, each new differential backup file contains the cumulative effects of all activity since the last full backup |
|
|
Term
Recovery Point Objective (RPO) |
|
Definition
represents the max length of time for which it is willing to risk the possible loss of transaction data |
|
|
Term
Real-time Mirroring
Check Point |
|
Definition
involves maintaining two copies of the dataase at two separate data centers at all times and updating oth copies in real-time as each transaction occurs
making a copy of the dataase at a point in time during the day |
|
|
Term
Recovery time ojective (RTO) |
|
Definition
represents the time following a disaster y which the organization's info system must be availale again |
|
|
Term
|
Definition
facility that is not only prewired for telephone and Internet access but also contains all the computing and office equipment the organization needs to perform its essential business activities
empty building that is prewired for necessary telephone and internet access, plus a contract with one or more vendors to provide all necessary computer and other office equipemtn within a specified period of time-leaves the org wihtout the use of its information system for a period of time |
|
|
Term
Organizational Management Controls |
|
Definition
organizations constantly modify their info systems to reflect new business practices and to take advantage of advances in info technology, controls are needed to ensure that such changes do not negatively affect systems reliaility. It also necessary to modify existing controles related to the principes of security, confidentiality, privacy, processing integrity, and availability to maintain their effectiveness after implementing the changes to tech and operating procedures.
Include: change requests should be documented and follow a standardized format that clearly identifies the nature of the change, the reason, and the date of it, should be approved by management, should be thoroughly tested prior to implementation, documentation should be updated, emergency changes documented, backout plans should be developed, user rights and privileges need to be carefully monitored during the change process to ensure segregation of duties |
|
|