Ch. 4 Flashcards
Which areas should be included in cybersecurity risk assessment?
- identity management
- end-user education
- disaster recovery/business continuity planning
Malware protection, along with next-generation firewalls, DNS (domain name system) filtering, antivirus software, and email security solutions, is an example of technology used to protect against the risk of cyber attacks.
What are examples of technology used to protect against the risk of cyber attacks?
- malware protection
- firewalls
- domain name system (DNS) filtering
- antivirus software
- email security solutions
Users should have update access for production ____.
data
Application programmers and users should not be able to change production _____?
programs
Application programmers should NEVER have update access to production ______.
data
Who submits change to the change control unit to update programs?
Application programmers submit change to the change control unit
What is one-for-one checking?
involves retaining copies of all unnumbered documents submitted for processing and checking them off individually against a report of transactions processed.
What type of control do batch totals require?
numerical control
Computer sequence checks require that transactions be _______.
numbered
Computer matching is performed by the program or user?
program
What is a smart card?
A smart card continuously generates new and unique passwords, helping to minimize the risk of unauthorized access.
Who are the intended users of SOC 1 reports?
management of the service organization, user entities, and user auditors
Who are the intended users of SOC 2 reports?
Parties that are knowledgeable about the nature of the service provided by the service organization. Restricted.
Who are the intended users of SOC 3 reports?
no restrictions and can be distributed to anyone
Who is responsible to plan and provide oversight to the information systems function?
information systems steering committee
What is fail-soft protection?
The capability to continue processing at all sites except a nonfunctioning one
What is an example of strategic information system?
computer system that converts the inputs into data that allows management to make unstructured decisions concerning the company’s future
What is Customer relationship management (CRM)?
- cloud-based system
- stores customer and prospect contact information, accounts, leads and sales opportunities
- stored in one central database
- CRM refers to practices, strategies, and technologies that businesses use to interact, analyze, forecast, and manage customer relationships, trends, and behaviors.
What system assists with nonroutine decisions, serves strategic levels of the organization, and helps answer questions regarding what a company’s competitors are doing, as well as identifies new acquisitions that would protect the company from cyclical business swings?
Executive support system
The word “strategic” tells you this system provides information at a high level, the executive level.
In a microcomputer system, the place where parts of the operating system program and language translator program are permanently stored is _____?
read-only memory (ROM)
ROM may only be read from to prevent these important programs from being accidentally altered or deleted.
What is the central element of a Management Information System (MIS)?
The use of what?
The use of decision models to organize data
What are the 5 Trust Services criteria? (aka principles)
Security Availability Processing Integrity Privacy Confidentiality
What are disk and magnetic tapes?
What is a bar coding device?
What is magnetic ink character recognition?
Storage devices
Data entry device used with an optical character reader
Most often used by banks to read the magnetic ink on checks and deposit slips
To minimize the likelihood of computer viruses infecting any of its systems, the company should also do what when installing software?
test all new software on a stand-alone PC before installing it on networked computers in the system.
What is a digital signature primarily used to determine?
that a message is unaltered in transmission.
allows the creator of a message to digitally “sign” the data and provides proof of authorization
What position performs following: Developing, coding, and testing computer programs
systems analysts
An advantage of decentralizing data processing facilities is:
that system failure is of lesser significance.
What are all of the components of the data processing cycle?
Collection, refinement, processing, maintenance, output
The usual definition of the data processing cycle (DPC) is “input-processing-output.” The correct answer substitutes the term “collection” for “input.” Refinement refers to classifying and/or batching. Maintenance refers to processing-related operations such as calculation and storage.
The concept of a management information system (MIS) continues to evolve over time. Which of the following is generally understood to be a central element of an MIS?
Processing of data items is based on decision models.
An information system should fulfill all of the following functions
- safeguard an organization’s assets and data.
- insure that the information produced was reliable and accurate.
- collect and store data.
Text-mining technology
(not data mining) enables entities to analyze text data from the web, comment fields, books, and other text-based sources to uncover insights not previously identified. Text mining uses machine learning or natural language processing technology to comb through documents such as emails, blogs, and Twitter feeds to analyze large amounts of information and discover new topics and term relationships. Data mining technology helps examine large amounts of data to discover patterns.
Hadoop:
a free, open-source software framework that stores large amounts of data