AUD Deck 8-IT (Computer) Auditing Flashcards
Systems Analysts-
Responsible for designing the system
Programmer-
Responsible for writing the code that makes up the programs.
Operator-
Responsible for running the system.
Librarian-
Responsible for keeping track of the programs and files and verifying that access is limited to authorized personnel.
Security-
Responsible for protecting the programs and data files and implementing procedures to safeguard the system.
Parity check-
especially related to transmissions of information between system hardware components. A “bit” added to each character so that the loss of any portion of the data might be detected.
Echo check-
Especially related to transmissions of information over the phone lines. A signal that was “sent” was, in fact, “received.”
Diagnostic routines-
That check internal operations of hardware components.
Boundary protection-
For running multiple jobs concurrently.
File labels-
Internal & external labels that might prevent using a file for an unintended or inappropriate use.
File protection rings-
A processing control related to magnetic tapes that prevents critical data from being overwritten.
File protection plans-
Duplicates or prior generations. “Grandfather” and “father” versions that can be used to recreate a current file by updating earlier files with current transaction data.