After Midterm (Ch. 9, 10, 11) Flashcards
1992 COSO Report
a committee established to develop a common definition for internal control and to provide guidance for judging the effectiveness, and improving it
Antivirus software
Computer programs that end users typically install in their microcomputers to detect and remove virues’
Applet
A small program stored in a web page and designed to run by web browser software; Good applets- allow users to play games and perform tasks. Bad applets- contain viruses
Application controls
a major category of computer controls that are designed and implemented to prevent, detect and correct errors
Audit Command Language (ACL)
a specialized software tool to help auditors preform auditing tasks that require analysis of financial data
Batch control testing
a manual total that is compared to a computer total to determine whether data were processed correctly
Biometric ID
a form of access control used to eliminate the hassles and security vulnerabilities associated with driven password management (fingerprints, eye scan)
Boot- sector virus
a virus that hides in the boot sector of a disk, where the operating system.
Business Continuity Plan (BCP)
Managements policies and procedures to continue to organization
Cold Backup
a backup that is performed while the database is off-line and unavailable to its users
Cold site
location where power and envrionmentally controlled space are available to install processing equipment on short notice
Computer crime
the manipulation of a computer or computer data by whatever method, to dishonestly obtain money, property, or some other advantage of value
Computer worm
computer virus that does not actually destroy data, but merely replicates itself repeatedly until the user runs out of the internal memory or disk space
Consensus- based protocols
a fault tolerant systems that contain an odd number of processors
Control environment
component of internal control that establishes the tone of a company, which influences the control awareness of the company’s employees
Control Objectives for Information and Related Technology (COBIT)
framework and method undertaken by the IT Governance Institute to develop a standard for internal control evaluation relative to IT
Cookie
a small text file that stores information on your computer about your browsing habits and interests
Corporate governance
managing an organization in a fair transparent and accountable manner to protect the interests of the stakeholders
Corrective controls
control procedures within a company’s internal control system that are designed to remedy problems discovered through detective controls
Data Diddling
changing data before, during or after they are entered into a computer system
Data encryption
scrambling the data in a message in a systematic way in order to prevent competitors from electronically monitoring data transmissions
Demand draft
commonly used to pay monthly bills
Denial-Of-Service (DOS) attack
an attack on an online company when hackers “flood” the company’s website with bogus traffic in order to take the site offline and make it unavailable to users
Detective Controls
control procedures within a company’s internal control system that provide feedback to management regarding whether or not operational efficiency has been achieved
Disaster recovery
part of contingency planning that describes the procedures to be followed in order to reinstate the mission-critical systems for a business to operate
Disk mirroring
also known as disk shadowing; writing all data in parallel to two disks
Disk Shadowing
also known as disk mirroring; writing all data in parallel to two disks
Dumpster Diving
a method of stealing personal identity from garbage cans or from delivered or outgoing mail left in mailboxes.
Edit Programs
also called “input validation routines”; programs or subroutines that check the validity and accuracy of input data after the data have been entered and recorded on a machine-readable file
Edit Tests
tests that examines selected fields of inout data and reject those transactions whose data fields do not meet the pre-established standards of data quality