15 IT Security and Controls Flashcards
Why is the audit trail in a computer-based environment volatile?
In any computer-based environment, a complete trail useful for audit purposes might exist for only a short time or in only computer-readable form. In online and real-time systems, data are entered directly into the computer, eliminating portions of the audit trail traditionally provided by source documents.
What does a firewall do?
A firewall limits access to a private network connected to the internet rather than completely blocking information to and from the private network. Information with granted authorization (satisfying predefined security rules) is still accessible.
What is malware (malicious software)?
Malware is a term describing any program code that enters a computer system that has the potential to degrade that system.
What are some common forms of malware?
- Trojan horse
- virus
- worm
- denial-of-service
- phishing
- back door
What is a Trojan horse malware?
A Trojan horse is an apparently innocent program (ex- spreadsheet) that includes a hidden function that may do damage when activated.
What is a virus malware?
A virus is a program that copies itself from file to file. The virus may destroy data or programs. A common way of spreading a virus is by email attachments and downloads.
What is a logic bomb virus?
Logic bombs are a type of virus triggered by a predetermined event (such as Friday the 13th, April Fool’s day, etc.)
What is a worm malware?
A worm copies itself not from file to file but from computer to computer, often very rapidly. Repeated replication overloads a system by depleting memory or overwhelming network traffic capacity.
What is a denial-of-service (DoS) malware attack?
A denial-of-service (DoS) attack is an attempt to overload a system (ex- network or web server) with messages so that it cannot function (a system crash).
What is a distributed denial-of-service (DDoS) malware attack?
A distributed denial-of-service (DDoS) attack comes from multiple sources, for example, the machines of innocent parties infected by Trojan horses. When activated, these programs send messages to the target and leave the connection open.
What is phishing malware?
Phishing is a method of electronically obtaining confidential information, such as a password or credit card number, through deceit. The perpetrator may set up a website that appears to be legitimate but actually serves no other purpose than to obtain the victim’s information.
How are phishing scams often initiated?
Through email spoofing, in which the perpetrator sends out emails that appear to be from a real financial institution. When the victim clicks on the link to what (s)he thinks is the institution’s website, the victim is unknowingly redirected to the perpetrator’s website.
What is a back door malware?
A back door is a program that allows unauthorized access to a system and bypasses the normal login procedures (front door). Trojan horses and viruses can create a back door that allows unauthorized access to the system or data.
What is COBIT?
Control Objectives for Information and Related Technology - the best-known control and governance framework that addresses IT-related governance and management.
What are the COBIT information criteria?
- Effectiveness (doing the right things)
- Efficiency (doing things right)
- Confidentiality
- Integrity
- Availability
- Compliance
- Reliability
What does the COBIT information criteria effectiveness mean?
Effectiveness (doing right things) deals with information’s relevance to the business process and receipt in a timely, correct, consistent, and usable manner.
What does the COBIT information criteria efficiency mean?
Efficiency (doing things right) concerns the provision of information through the optimal (most productive and economical) use of resources.
What does the COBIT information criteria confidentiality mean?
Confidentiality concerns the protection of sensitive information from unauthorized disclosure.
What does the COBIT information criteria integrity mean?
Integrity relates to the accuracy and completeness of information, as well as to its validity in accordance with the business values and expectations.
What does the COBIT information criteria availability mean?
Availability relates to information being available when required by the business process now and in the future. It also concerns the safeguarding of necessary resources and associated capabilities.
What does the COBIT information criteria compliance mean?
Compliance deals with complying with the laws, regulations, and contractual arrangements to which the business process is subject, i.e., externally imposed business criteria as well as internal policies.
What does the COBIT information criteria reliability mean?
Reliability relates to the provision of appropriate information for management to operate the entity and exercise its fiduciary and governance responsibilities.
What are the IT governance focus areas?
- strategic alignment
- value delivery
- resource management
- IT risk
- Risk management
- Performance measurement
What is the IT governance focus area strategic alignment?
Strategic alignment focuses on ensuring the linkage of business and IT plans; defining, maintaining, and validating the IT value proposition; and aligning IT operations with enterprise operations.
What is the IT governance focus area value delivery?
Value delivery is about executing the value proposition throughout the delivery cycle, ensuring that IT delivers the promised benefits against the strategy, concentrating on optimizing costs, and proving the intrinsic value of IT.
What is the IT governance focus area resource management?
Resource management is about the optimal investment in, and the proper management of, critical IT resources.
What is the IT governance focus area IT risk?
IT risk is the business risk associated with the use, ownership, operation, involvement, influence, and adaption of IT within an enterprise or organization.