ch 15 Flashcards

1
Q

Operating System (OS)

A

Enable computer to operate; windows and MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Five fundamental control objectives:

A
  1. Protect itself from users
  2. Protect users from each other
  3. Protect users from themselves
  4. Be protected from itself
  5. Be protected from its environment

Protect —

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data warehouse

A

centralized collection of firm-wide data stored

from past fiscal years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operational databases

A

daily operations

transactions/ operations -> current year only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data mining

A

searching for patterns in the data

analyzing for decision making

online analytical processing (OLAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data governance

A

data
1. quality
2. management
3. policies

business process managment and risk manangment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Local Area Networks (LANs)

A

devices that are connected to the same network with limited geo range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the subpoints to LANS

A

Hubs and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hubs do what

A

broadcast through multiple
ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

switches do what

A
  • provide a path
  • each device connected via the network only sees traffic that has been directed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wide Area Networks (WANs)

A
  • link diffrent sites together
  • across geogrpahically dispersed LANS
  • broad geographic area
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what protection systems are included in WAN

A

routers and firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define/ purpose of a router

A
  • Connects different LANS
  • Examines IP adress
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define/ purpose of a Firewalls

A
  • secutiry system for hard/soft ware
  • send/ receive data packet from the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Virtual Private Network

VPN

A
  • secure connection of WANS, send/recieve encrypted packets (info)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless Network is comprised of two

A
  1. Access point
  2. station
17
Q

Access point

A

logically connects stations to a firm’s network.

18
Q

station

A

a wireless endpoint device equipped with a wireless
Network Interface Card (NIC)

19
Q

what are the three benefits of wireless technology ?

A
  1. Mobility
  2. Rapid deployment
  3. flexibility and scalability
20
Q

Mobility

A

acess online without physical cables

21
Q

Rapid deployment

A

time saving on implementing networks bc of no cables

22
Q

Flexibility
and
Scalability

A

setting up or removing wireless networks

23
Q

what does CAAT’s do

CAAT: Computer-assisted Audit Techniques

A

use of information technology to assist auditors with their work

24
Q

under CAAT what are the two approches

A
  1. black box
  2. white box
25
Q

What is white box

A

We get into the system

26
Q

four subcomponets of white box

A
  1. test data: insert data
  2. parallel simulation: dont get in; create a simulation with actual data
  3. integrated: continually use test data (not using their data)
  4. embedded audit module: instert auidt moduel
27
Q

What is black box

A
  • not looking at detail
  • everything is a secret
  • quick/ less risk/ low tech knowledge
28
Q

Generalized Audit Software

A
  • ACL/ IDEA
  • tool that auditors use to audit the accounting information of a company
29
Q

SOC 1

A

financial audit report

30
Q

SOC 2

A

security and controls report

31
Q

SOC 3

A

same as two, but public can view this information

32
Q

SOC for Cybersecurity

A

enterprise-wide cybersecurity risk management program

33
Q

SOC for supply chain

A

Entity system and controls for producing, manufacturing, or distributing goods