BEC-IT Flashcards

1
Q

Web crawlers

A

Search engines (like google) use Web crawlers programs to go on the web, visit web sites and collect information that is used to create entries for the search engine’s index.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Worm

A

A type of malware (similar to virus) whose primary function is to self-replicate and infect other computers while remaining active on infected systems.
Worms generally try to accomplish this by activating the system’s email client and sending multiple emails.
Worms can modify and delete files, and they can even inject additional malicious software onto a computer.
Worms generally exist inside of other files; unlike viruses, they are not stand-alone programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Denial of service (DoS) attack

A

Prevents legitimate users from accessing the system.
Perpetrators conduct these attacks, using one or many computers, to flood a server with access requests that cannot be completed. These include ransom and blackmail DoS attacks in which the criminal threatens to deny service unless the user pays a ransom or engages in a specific act (e.g., grants access to their system).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trojan horse

A

A malicious program hidden inside a seemingly normal file. Frequently used to insert back doors into a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social engineering or spoofing

A

Using deceit or deception to gain logical access to the system. The deception is to persuade employees to provide usernames and passwords to the system. These deceptive requests may be delivered verbally or through email, text messaging, or social networking sites. Fraudsters may spoof by faking an identity (e.g., a company or friend) or an email (e.g., pretending to be your bank or a friend of yours) or by creating a website that mimics a real website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet sniffing

A

Programs called packet sniffers capture packets of data as they move across a computer network. While administrators use packet sniffing to monitor network performance or troubleshoot problems with network communications, hackers also use these tools to capture usernames and passwords, IP addresses, and other information that can help them break into the network. Packet sniffing on a computer network is similar to wiretapping a phone line. This is one form of a man-in-the-middle attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Closed-loop verification

A

Closed-loop verification helps ensure that a valid and correct customer account has been entered; after the code is entered, this system looks up and displays additional information about the selected code. For example, the operator enters a customer code, and the system displays the customer’s name and address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash total

A

Hash total is a control over whether the total quantity of items entered by the clerks matches the total quantity of items in the orders placed. This is a control over only one field on the purchase orders (i.e., over the quantity of items ordered)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Parity check

A

Parity check is designed to detect errors in data transmission.
It does this by adding an extra data bit to each data unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

boundary protection

A

Boundary Protection to prevent and detect malicious and other unauthorized communications, through the use of boundary protection devices (e.g. gateways, routers, firewalls, guards, encrypted tunnels).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Picking ticket

A

Picking Ticket identifies the items to be pulled for a sales order.

P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OLAP

A

Part of an ERP System
Online Analytical Processing (OLAP) system
Incorporates data warehouse and data mining capabilities within the ERP
A server that collects data and can extract and transform them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

XBRL

A

eXtensible Business Reporting Language is a tagging language for financial data.
It tags financial elements like General Ledger accounts and “tags” the data for reporting and regulatory purposes.
XBRL is also used in filings with the Securities and Exchange Commission that are made available on EDGAR, the SEC’s Electronic Data Gathering and Retrieval database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Extranets

A

Private Portals/Platforms network that allows access granted users (company suppliers, customers, business partners, etc.) to access data that is relevant to them ( think of Ariba suppliers) Most secure and private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Intranets

A

Intranet is internal to the business (available only to members of the organization (business, school, association) allowing users access to internal data.
Often used to connect geographically separate LANs within a company.
Private (e.g., limited access) networks built using Internet protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RSS (Really Simple Syndication)/ATOM Feeds

A

An easy way to get news and information. Updates and notifications are gathered on a regular basis real time and put on a dashboard.

XML (extensible Markup Language) application that facilitates the sharing and syndication of website content by subscription.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Internet service providers (ISPs)

A

End-user access to the Internet is provided by Internet service providers (ISPs) that either provide direct connections to the Internet backbone (a collection of extremely high-speed, high-capacity communications lines joined together at network access points) or connect to larger ISPs that ultimately provide that connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP)

A

Protocols for e-mail services. Part of the TCP/IP (Transmission Control Protocol/Internet Protocol) protocol.

A framework that defines how devices should transmit data between eachother and enables communication over networks and large distances.

19
Q

Extensible Markup Language (XML)

A

Protocol that provides rules to define any data for use on the Internet and file format for storing, transmitting, and reconstructing arbitrary data.
It defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.

20
Q

Systems Development Life Cycle (PADDTIM)

A

P-Planning
A-Analysis
D-Design
D-Development
T-Testing
I-Implementation
M-Maintenance

21
Q

Central Processing Unit

A

Part of Hardware
The CPU is the control center of the computer system.
The CPU has three principal components:
Control unit—Interprets program instructions.
Arithmetic logic unit (ALU)—Performs arithmetic calculations.
Primary storage (main memory)—Stores programs and data while they are in use. It is divided into two main parts:
Random access memory (RAM)—Stores data temporarily while it is in process.
Read-only memory (ROM)—A semi-permanent data store for instructions that are closely linked to hardware (e.g., “firmware”). Includes portions of the operating system. Hard to change.

22
Q

Primary storage (main memory)

A

Stores programs and data while they are in use. It is divided into two main parts:
Random access memory (RAM)—Stores data temporarily while it is in process.
Read-only memory (ROM)—A semi-permanent data store for instructions that are closely linked to hardware (e.g., “firmware”). Includes portions of the operating system. Hard to change.

23
Q

Cybersecurity Framework

A

The framework consists of three parts:
1. the core
2. the profile
3. the implementation tiers
The core includes cybersecurity activities, outcomes, and references (i.e., standards and guidelines).
The profiles help align organizational cybersecurity activities with business requirements, risk tolerances, and resources.
The implementation tiers are a way to view and understand alternative approaches to managing cybersecurity risk.

24
Q

Cybersecurity Framework:
Core

A

The framework core is a matrix of 4 by 5 of elements and functions that lists activities (with examples) to achieve specific cybersecurity outcomes.
The 4 core elements:
1. functions
2. categories
3. subcategories
4. references
The 5 functions or activities:
1. identify
2. protect
3. detect
4. respond
5. recover

25
Q

Cybersecurity Framework: Implementation Tiers

A

Tier 1: Partial - Informal, ad hoc & reactive. Ltmd awareness
Tier 2: Risk Informed- not part of a org wide policy.
Tier 3: Repeatable- formal and policy. regularly updated
Tier 4: Adaptive- adapts based on experience & predictive indicatord

26
Q

Data Elements By Size

A

Files are composed of
Records composed of
Fields composed of
Data composed of
Bytes composed of
Bits

27
Q

Cybersecurity Framework: Profile

A

The framework profile aligns and integrates the functions, categories, and subcategories with the organization’s requirements, risk tolerance, and resources.
It considers legal and regulatory requirements, industry best practices, and risk appetite.

28
Q

Control Objectives for Information and Related Technology
(COBIT)
Framework

A

COBIT is a widely used international standard for identifying best practices in IT security and control.
The Framework is made of 3 major components-
1. Domains and processes
2. Information Criteria
3. IT Resources

29
Q

Cloud Service Delivery Models:

Infrastructure as a service (IaaS)

A

Use of the cloud to access a virtual data center of resources, including a network, computers, and storage.
Example: Amazon Web Services and Carbonite.

30
Q

Cloud Service Delivery Models:

Platform as a service (PaaS)

A

A development environment for creating cloud-based software and programs using cloud-based services.
Example: Salesforce.com’s

31
Q

Cloud Service Delivery Models:

Software as a service (SaaS)

A

Remote access to software.
Example: Office 365, a suite of office productivity programs, is an example of SaaS.

32
Q

Role of:
Supervisor of Computer Operations

A

Supervisor of computer operations has responsibility for the overall operation of the information systems department and should not provide an internal audit function.

33
Q

Role of:
Systems analyst

A

Systems analyst is responsible for designing the system

34
Q

Role of:
The Control Group

A

The control group is responsible for providing a continuous review function by supervising and monitoring input, operations, and the distribution of output (i.e., a continuous internal audit function).

35
Q

Role of:
Computer Programmer

A

The computer programmer is charged with designing program flowcharts and writing computer programs based on the work of the systems analyst

36
Q

Bill of Materials

A

A bill of materials lists the components used in making a product.

37
Q

Operations list

A

This document lists the steps (or operations) needed to make a product.

38
Q

Service Organization Controls (SOC) Report Types

A

The AICPA has issued 3 service organizations’ control reports:
SOC 1: RESTRICTED use reports on controls at a service organization relevant to a user entity’s internal control over financial reporting.
SOC 2: RESTRICTED use reports on controls at a service organization related to security, availability, processing integrity, confidentiality, and/or privacy.
SOC 3: General use SysTrust reports related to security, availability, processing integrity, confidentiality, and/or privacy.

39
Q

Online transaction processing (OLTP) system

A

Part of an ERP System
Online transaction processing (OLTP) system—
These are modules that contain the core business functions:
- sales
- production
- purchasing
- payroll
- financial reporting, etc.
These functions collect the operational data for the organization and provide the fundamental motivation for the purchase of an ERP.

40
Q

Value-Added Network (VAN)

A

A private, hosted service that provides companies with a secure way to send and share data with its counterparties.
Ex: Route data transactions btw trading partners

41
Q

Batch Processing Method

A

Batch processing is a periodic transaction processing method in which transactions are processed in groups:
Input documents are collected and grouped by type of transaction. These groups are called “batches.”
Batches are processed periodically (i.e., daily, weekly, monthly, etc.).
Batch processing is accomplished in four steps:
Step 1: Data entry: The transactions data is manually keyed (usually) and recorded in a transactions file.
Step 2: Preliminary edits: The transaction file data is run through an edit program that checks the data for completeness and accuracy; invalid transactions are corrected and re-entered.
Step 3: Sorting: The edited transaction file records are sorted into the same order as the master file.
Step 4: Master file update: The individual debits and credits are used to update the related account balance in the general ledger master file and, if appropriate, in the subsidiary ledger master file.

42
Q

Online, Real-Time (OLRT) Processing

A

OLRT is a continuous, immediate transaction processing method in which transactions are processed individually as they occur.
Under OLRT processing:
- The accounting records are always current.
- Detection of transaction errors is immediate.

43
Q
A