Chapter 3 - Information Systems Flashcards
End Point Devices?
Any device that connects to the network
What Device is used to collect Environmental Data? Challenges?
Internet of Things Senors, Challenge is Secuity and not easy to upgrade
What is a UML Diagram sometimes called? What is it?
ERD & Visual Representation of a conceptual Data model that shows tables in a database and the Associations between them.
What Do Availability Reports Address?
Uptime and Downtime Durations
What is a CSP always responsible for? Examples?
Infrastructure - Networking, Storage, Servers
Firewall
What does it do?
Isolates what?
Device that controls the flow of data into and out of an information system at network entry points.
o separates or isolates a network segment from the main network while maintaining the connection between networks
Switches
moves data between connected devices in a network.
Servers
3 things they do?
are powerful computers that store, process, and manage data
- Routers
infrastructure components that receive and send data packets to their intended destinations and determine the best path.
Progressive Steps to Test Continuity plan
- Checklists - Help to execute the complete plan
- Tabletop exercise - Walkthrough a potential scenario
- Simulation - Perform all the tasks at the alternate site (except processing)
- Parallel – Process at both the primary and alternate sites to determine if they are the same
- Full interruption – Perform all tasks only at the alternate site.
BCP (business continuity plan). The correct sequence is:
- Consider possible threats
- Assess potential impacts
- Evaluate critical needs
- Establish recovery priorities
- Refers to a company’s ability to keep providing products and services despite.
Recovery Time Objective (RTO)
Established how?
2 things it calculates?
maximum amount of downtime a business can tolerate
* Established by doing a business impact analysis (BIA)
o Calculates the cost of downtime
Tangible – Loss of revenue
Intangible – Harm to reputation
Mean Time to recover (MTTR)
- Tracks the average time it takes to restore a service or system after an outage.
Which Backup is the most efficient for minimizing backup time and storage usage?
Incremental
Which Backup has a longer restoration time than a full backup?
differential
Continuous integrations are validated how?
name order 1-4
automated test
1.unit - test on individual components /functions
2. integration - group testing of components /functions
3 system -all components are integrated and the whole system is tested
4. acceptance - final testing is done by end users
What does Strategy development remediate?
It bridges the gap between the business impact analysis by looking at the risk and seeing how the business continuity plan should address it.
What two steps are after the strategy development phase and what do they do?
- Provisions and process - measures and procedures are created to mitigate risks
- Resource prioritization - prioritizes and allocates resources to different identified tasks.
Internally encrypted passwords
access control designed to prevent unauthorized access by use of a utility program to identify passwords.
What control
1 automatically resubmits correct data
2. Ensures the integrity, accuracy, and completeness of data
Online data entry controls
Who is responsible for networks and security, servers and storage, and infrastructure facility?
IAAS
Who is responsible for infrastructure, networks and security, servers and storage, operating systems, and database and analytic tools?
Platform as a software
Who is responsible for infrastructure, networks and security, servers and storage, operating systems, hosted apps, and databaseand analytic tools?
Software as a service
How do you calculate system availability?
Downtown- agreed service time/ agreed service time
What cloud service model is best suited for rapidly developing an application while minimizing capital expenditures?
Platform as a service
What cloud service model is best suited for rapidly developing an application while minimizing capital expenditures?
Platform as a service
Who is responsible for returning acknowledgments?
Gateways
Snapshots, rootkits, and misconfiguration of the hypervisor are disadvantages of what?
Virtualization
Detecting access from unauthorized components is an advantage of what?
Automated scans
Multifactor authentication is considered what in defense in depth strategies ?
Technical control
Devices that allow wireless
devices to connect to the wired network.
wireless Access points
what model Provides users with virtualized computing
resources over the internet? is like renting space on a
physical server or renting that server itself. Users get the raw
infrastructure and have to manage the OS, applications, and
data.
IaaS
what cloud is Managed by third-party providers, delivering shared computing resources (servers, storage) over the internet.
Benefits: Economies of scale, reduced costs, and easy scalability.
Examples: Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure.
public Cloud
what are the roles and responsibilities of Cloud Service Providers?
- Infrastructure Maintenance:
● Ensure the physical hardware, data centers, and networking
components are up-to-date, secure, and operational.
● Perform regular backups, hardware refreshes, and disaster
recovery operations. - Platform & Software Updates:
● Continually update and patch the underlying software and
platforms to ensure they are secure and free of known
vulnerabilities.
● This includes updates for IaaS, PaaS, and SaaS offerings. - Security & Compliance:
● Implement and maintain security measures to protect the
infrastructure and the data stored within.
● Ensure compliance with various industry regulations and
standards (like GDPR, HIPAA, etc.).
● Provide tools and features that allow customers to enhance
their security, such as encryption, multi-factor authentication,
and intrusion detection systems. - Service Availability & Reliability:
● Ensure services are available and reliable, meeting the
Service Level Agreements (SLAs) promised to customers.
● Implement redundancies to minimize downtime and
maximize uptime. - Scalability & Performance Optimization:
● Offer scalable solutions that can adjust to the changing
demands of the customer.
● Monitor and manage the performance of services, optimizing
where necessary. - Support & Customer Service:
● Provide technical support to customers, assisting with any
issues, questions, or challenges they face.
● Offer training, resources, and documentation to help
customers maximize the value of their cloud services. - Transparent Billing & Cost Management:
● Clearly outline costs and pricing models for the services
offered.
● Provide tools for customers to monitor and manage their
resource usage and associated costs. - Integration & Compatibility:
● Ensure cloud services can integrate smoothly with popular
enterprise software and other cloud offerings.
● Maintain APIs and SDKs for developers to integrate with and
build upon the cloud platform. - Innovation & Feature Development:
Continually innovate and introduce new features, tools, and
services based on evolving technological trends and customer
needs.
how do the COSO frameworks address cloud computing governance? 5 Ways
Control Environment: Organizations must prioritize governance, security, compliance, and risk management during cloud transitions.
Risk Assessment: Regular assessment of new risks, such as data breaches and data loss, is essential.
Control Activities: Key activities include:
Ensuring proper configuration of cloud services.
Restricting access to sensitive data.
Monitoring for unauthorized activities.
Information & Communication: Effective communication is crucial; stakeholders should be aware of data storage, access rights, and protection measures.
Monitoring: Continuous monitoring and regular audits are necessary to ensure compliance with internal controls.
what ways does the COSO Enterprise Risk Management (ERM) Framework govern cloud computing?
Governance and Culture: Organizations should understand
their cloud computing strategy within the larger business
context, ensuring that there’s a culture of awareness and
understanding about the cloud.
● Strategy and Objective-Setting: When setting objectives for
cloud adoption, the risks and opportunities should align with
the organization’s broader strategy.
● Performance: By comparing risk tolerance to risk exposure,
organizations can understand how cloud-related risks might
imact performance objectives.
● Review and Revision: Cloud strategies should be regularly
reviewed and revised based on changing business needs
and emerging risks.
● Information, Communication, and Reporting: Organizations
should have a clear communication strategy to report on
cloud risks and performance to both internal and external
stakeholders.
what is a subset of an organization’s information system
specifically designed to manage and report on the financial data
of the enterprise. It ensures that all financial transactions are
processed and recorded accurately and timely
Accounting Information System
4 ways to test if control is operating correctly?
1.sample transactions
2. review logs
3. interview personnel
4. Simulation
What type of mirroring?
data is written to both the primary and
mirrored disks at the same time
synchronous
mirroring
What type of mirroring?
there’s a slight delay between writing data to
the primary and mirrored disk,
asynchronous
mirroring
What does the SOC for Cybersecurity examination describe?
An entity’s cybersecurity risk management program and related controls
List the five trust services categories.
- Security
- Availability
- Processing integrity
- Confidentiality
- Privacy
Which trust services category does not have additional criteria?
Security
Who developed the trust services criteria?
AICPA
What framework do the trust services criteria align with?
COSO Internal Control-Integrated Framework
How do management and CPAs use the trust services criteria?
To measure or evaluate controls related to the trust services categories
What do the supplemental trust services criteria relate to? 4 things
- Logical and physical access controls
- System operations
- Change management
- Risk mitigation