11/18 Class IT Control Flashcards

1
Q

IT controls

A

IT controls prevent problems,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT GCC’s

A

information tech general computer controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

application controls

A

controls that the programmers must follow and document every part of the system and that will stop bad things from happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Good general computer controls start

A

at the top,
good lines of authority will stop any fraud or error
segregation of duties -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

segregation of duties IT

A
keeping the programmers separate from the live environment and the development sphere, this makes so that they can't change live data, four people that should be separated in IT
developers 
users
security people
computer operators
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Logical/access/authentication control

A

what you know - user name and password
who you are - fingerprint, retinal scanner
what you have - token based controls, magnetic cards etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RSA Card

A

randomly makes a user name and constantly changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

authentication

A

anything related to ecommerce, you need to see what is working behind the browser, look at how the browser is working and how it is secured. public key and private key keeps people accountable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the administrators

A

you must monitor these people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

project

A

if you are doing ecommerce you need to see what the controls are. we don’t care so much about what they do but how they do it and if they have good controls in place,
appendix must include references and screen shots of you testing the controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Change management

A

programs are out there that have version control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Backup/Recovery/Continuity

A

making so that we have our data backed up and getting data when you lose it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

disaster recovery

A

how do we recover data? have data somewhere else that is easily setup to get going

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

business continuity

A

making so that my data pops up somewhere else in the event of a disaster
cold side - all we have is the data offsite
hot side - a site is already running with the other one to work when one fails(business continuity)
warm side - data offsite, arrangement with someone who has a lease on standby ready for a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network

A

firewall, IDS, etc.

completeness and accuracy,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

intrusion detection software (IDS)

A

lets you know that someone is trying to break into the system, works with the firewall

17
Q

Encryption

A

encrypting your software so that people can’t modify it
external source - internet
internal - onsite
database level - fields and tables of data

18
Q

VPN virtual private network

A

an encrypted network where only you and the other side use it, it makes its own key
mainly for private networks

19
Q

SSL secure socket layer

A

when there is a closed secure connection with another site, uses a certificate authority to authenticate the communication
example: your site and american express
public networks

20
Q

Vulnerability

A

when we hire people to see where we are vulnerable

21
Q

Penetration

A

when we allow people to get all the way into your system and show you where you can fraud the company

22
Q

Physical Security

A

data center - offsite location to hold data
co location facility (secure location) - separate location that holds the data as a fail safe
lots of locks and verifications

23
Q

elemental security

A

air conditioner is running(temperature control), humidity control, above ground against floods, spring to foundation, fire suppression
3 backup generators

24
Q

network operation center

A

monitor your network

25
Q

application control

A

input- what can go wrong with the input?
programmed edit checks,
field check - checking the format of input/words/numbers
validity check-testing if it is a valid input
limit check-tests if the quantity is reasonable nothing over this
range check-gives it a range, it can be below or above this
reasonableness check - credit check, checking if someone is ordering too much or an abnormal amount
completeness check - making sure data is in a field
sign check - positive or negative number
sequence check - the next invoice has the be the one that is entered
self-checking digit - checks if the credit card is one of the ones we use

26
Q

control totals and reconciliations

A

record counts - counts to see if there were more or less than there are supposed to be
batch total - adds the amounts in a batch to see if the main total is right
hash total - random total of the numbers

27
Q

Other

A

automated authorization - when they send an authorization to someone to authorize it
auto forced SOD - only sends that authorization to someone who can’t commit fraud

28
Q

processing controls

A

run to run totals(internal reconciliation) - tests the transaction table vs the output
checks for duplicate transactions - checking for gaps
Logs - records who is getting in
Exception Reporting - see if something is abnormal and send it to someone to review
Checklists - operator follows a process to insure accuracy

29
Q

output

A

testing for completeness and accuracy - test the data and its output, run transactions through
security overviewing - making sure only the right people can see it