Term
Trust Services Framework was developed by: |
|
Definition
|
|
Term
Trust Services Framework is a subset of what Control Framework? |
|
Definition
|
|
Term
Trust services framework consists of five principles that contribute to systems reliability. Name them: |
|
Definition
Security
Confidentiality
Privacy
Processing integrity
Availability |
|
|
Term
The definition of Security in the Trust Services Framework is: |
|
Definition
Access to the system and its data is controlled and restricted to legitmate users. |
|
|
Term
The definition of Confidentiality in the Trust Service Framework is:
|
|
Definition
Sensitive organizational information is protected from unauthorized disclosure. |
|
|
Term
The Definition of Privacy in the Trust Services Framework is: |
|
Definition
Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal and external regulatory requirements and is protected from unauthorized disclosure. |
|
|
Term
The definition of Processing Integrity in the Trust Service Framework is: |
|
Definition
Data are processed accurately, completely, in a timely manner, and only with proper authorization. |
|
|
Term
The definition of Accountability in the Trust Service Framework is: |
|
Definition
The system and its information are available to meet operational and contractual obligations. |
|
|
Term
Name four criteria for successfully implementing the five Trust Service Framework principles: |
|
Definition
1) Developing and documenting policies
2) Effectively communicating policies to authorized users
3) Designing and employing appropriate control procedures to implement policies
4) Monitoring the system and taking corrective action to
maintain compliance with policies.
|
|
|
Term
______________is responsible for the internal control structure, including security. |
|
Definition
|
|
Term
Understanding when a proper level of security and monitoring security has been reached is made more difficult by today's ____________ __________, leading to specialized management roles such as _____, CSO, and __________ _________. |
|
Definition
Information Technology
CIO, Compliance Officers |
|
|
Term
Management Obligations to the Internal Control System include: |
|
Definition
Developing and documenting policies
Communicating the Policies developed
Designing the control procedures
Monitoring the system
|
|
|
Term
The ________ an error/irregularity is found, the less ____ it takes to correct and less _____ occurs. |
|
Definition
|
|
Term
The Training Control is used: |
|
Definition
To facilitate employee understanding and adherance to the organization's security policies including:
Safe computing practices
Social engineering
Piggybacking |
|
|
Term
|
Definition
The process of verifying the identity of the person or device attempting to access the system with the objective to ensure that only legitimate users can access the system. |
|
|
Term
Three types of credentials used by Authentication Controls to verify a person's identity are: |
|
Definition
Something they know (Password)
Something they have (Badge/Smart Card)
Something they are (Biometric Identifier) |
|
|
Term
|
Definition
the process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform. |
|
|
Term
A capability test is performed to match users authentication credentials against authorized actions when an employee attempts to access a particular information resource system and access is granted or denied based upon the privileges authorized to that user. What source lists user access privileges used for the capatibility test? |
|
Definition
|
|
Term
The Access Control Matrix must be updated for what events?: |
|
Definition
Firings
Promotions
Demotions
Transfers
Job rotation |
|
|
Term
In addition to people, ________ are also set up with authorization controls. |
|
Definition
|
|
Term
Card readers at entry ways, man traps, electronic eavesdroping countermeasures and screen guards are all examples of what type of controls? |
|
Definition
|
|
Term
Firewalls, Routers, war dialing and defense in depth are examples of what type of controls? |
|
Definition
|
|
Term
Use of an Intrusion Detection System to perform log analysis in efforts to detect unauthorized access to the system is an example of what type of controls? |
|
Definition
|
|
Term
Use of vulnerability scanners and penetration tests used to attempt unauthorized access to the system are examples of what type of control? |
|
Definition
|
|
Term
Key component to prompt and effective response to security incidents is the standing up of a: |
|
Definition
Computer Incident Reponse Team |
|
|
Term
The Computer Incident Response Team should have as its membership: |
|
Definition
Senior Operations Management
Technical Specialists |
|
|
Term
The most important document for the effectiveness of the Computer Incident Respons team is: |
|
Definition
Incident reponse plan including alert process. |
|
|
Term
The Computer Incident Response Team (CIRT) leads the response to an incident through what 4 steps? |
|
Definition
Recognition that a problem exists.
Containment of the problem.
Recovery. Damage must be repaired.
Follow up. Analysis of what happened, how to prevent it from happening again, and what to do to exact capture and punishment of the perpetrator. |
|
|
Term
Operating independently of other information systems functions and reporting to the COO, this officer is an impartial assessor and evalutator of the IT environment who is responsibile for insuring that vulnerability and risk assessments are performed regularly and that security audits are carried out periodically. The title of this role is: |
|
Definition
Chief Information Security Officer (CISO) |
|
|
Term
When a vulnerabilility is discovered in software a hacker writes an exploit, which instructs how to attack using the vulnerability. What name is given a control that to software updates that eliminate such vulnerabilities? |
|
Definition
|
|
Term
Virtualization of software and hardware eliminates opportunities for physical access issues but opens up vulnerabilities where information is housed and controlled by another entity that is not under the control of the owner of that information. This type of environment is generally referred to as: |
|
Definition
|
|
Term
What leads to effective confidentiality for an organization's intellectual property? |
|
Definition
Identify sensitive information (data) that needs to be protected then protect it when is captured, while it is stored, when it is reported/accessed, and when it is disposed of.
|
|
|
Term
Information in storage should be ______________ to prevent theft by unauthorized access. |
|
Definition
|
|
Term
In the event of a breach in security at a firm, law requires notification of all customers unless that customer's data was ___________ at the time of the breach. |
|
Definition
|
|
Term
Spreadsheets require special controls because of the high likelyhood of _________ _____. |
|
Definition
|
|
Term
Trust Services Framework Principle that states states that a reliable system is one that produces information that is accurate, complete, timely and valid. |
|
Definition
|
|
Term
|
Definition
Determines whether the characters in a field are the proper type. |
|
|
Term
|
Definition
Determines whether the data in a field have the appropriate arithmetic sign. |
|
|
Term
|
Definition
Tests a numerical amount against a fixed value. |
|
|
Term
|
Definition
Tests whether a numerical amount falls between predetermined lower and upper limits. |
|
|
Term
|
Definition
Ensures that the input data will fit into the assigned field. |
|
|
Term
|
Definition
On each input record determines whether all required data items have been entered. |
|
|
Term
|
Definition
Compares the ID code or account number in transaction data with similar data in the master file to verify that the account exists. |
|
|
Term
|
Definition
Determines the correctness of the logical relationship between two data items. |
|
|
Term
|
Definition
Authorized ID numbers can contain a check digit thta is computed from the other digits. Data entry devices can be programmed to perform check digit verification by using all but one first or final digit to calculate the final digit each time the number is entered. |
|
|
Term
|
Definition
Checks whether a batch of input data is in the proper numerical or alphabetical sequence. |
|
|
Term
|
Definition
A batch total that sums a field that contains monetary values. |
|
|
Term
|
Definition
Sums a non-financial numericdal field. |
|
|
Term
|
Definition
Number of records in a batch. |
|
|
Term
|
Definition
Systems requests each input data item and waits for an acceptable response, ensures that all necessary data are entered. |
|
|
Term
|
Definition
Checks the accuracy of input data by using it to retrieve and display other related information. |
|
|
Term
|
Definition
Detailed record of all transactions, including a unique transaction identifier, the date and time of entry, and who entered the transaction. |
|
|
Term
|
Definition
In certain cases, two or more items of data must be matched before an action can take place. |
|
|
Term
|
Definition
File Labels need to be checked to ensure the correct and most current files are being updated. |
|
|
Term
|
Definition
Located at the beginning of each file, contains the file name, expiration date, and other identification data |
|
|
Term
|
Definition
Located at the end of the file, contains batch totals calculated during input. |
|
|
Term
Recalculation of Batch Totals |
|
Definition
Batch totals should be recalculated as each transaction record is processed, and the total for the batch should then be compared to the values in the trailer record. |
|
|
Term
|
Definition
Two adjacent digits are inadvertently reversed. |
|
|
Term
|
Definition
Compare the sum of the sum of rows and the sum of the sum of columns. They should be equal. |
|
|
Term
|
Definition
Control accounts should zero out after all costs are allocated to expense categories. |
|
|
Term
Write-Protection Mechanism |
|
Definition
Protect against overwriting or erasing of data files stored on magnetic media. |
|
|
Term
|
Definition
Users should carefully examine system output to verify that it is reasonable, that it is complete, and that they are the intended receipients. |
|
|
Term
External Data Reconciliation |
|
Definition
Database totals should be periodically reconciled with data maintained outside the system. |
|
|
Term
|
Definition
|
|
Term
Reconciliation Procedures |
|
Definition
Periodically, all transactions and other system updates should be reconciled to control reports, file status/update reports, or other control mechanisms. General Ledger accounts should be reconciled to subsidiary account totals on a regular basis. |
|
|
Term
Data Transmission Controls |
|
Definition
Controls designed to minimize risk of data transmission errors. |
|
|
Term
|
Definition
When data are transmitted, the sending device can calculate a hash of the file, called a checksum. The receiving device performs the same calculation and sends the results to the sending device. If the two hashes agree, the transmission is presumed to be acurate. |
|
|
Term
|
Definition
Extra digit added to the beginning of every character that can be used to check transmission accuracy. |
|
|