Chapter 4 Flashcards
General Controls
apply overall to the IT accounting system
application controls
used specifically in accounting applications to control inputs, processing, and outputs
example: validity check
authentication of users
a process or procedure in an IT system to ensure that the person accessing the IT system is a valid and authorized user
login
to make the computer recognize you in order to create a connection at the beginning of a computer session,
user id is used along with the password
smart card
plugged into the computer’s card reader and helps authenticate that the user is valid displays a constantly changing token
security token
plug into the usb port and thereby eliminates the need for a card reader
two factor authentication
authentication of the user, based on something they have and something they know
biometric devices
use some uniqe physical characteristic of the user to identify the user and allow the appropriate level o access to that user
computer log
a complete record of all dates, times , and uses for each user
nonrepudiation
the user cannot deny any particular act that he or she did on the IT system
user profile
determines each user’s access level to the system, on a need to know basis
authority table
contains a list of valid authorized users and the access level granted to each one
configuration tables
contain the appropriate set-up and security settings
firewall
a hardware or software designed to block unauthorized access
encryption
the process of converting data into secret codes referred to as cipher text
symmetric encryption
uses a single encryption key that must be used to encrypt data and also to decode the encrypted data
public key encryption
uses both a public key and a private key. The public key, which can be known by everyone, is used to encrypt the data and a private key is used to decode the encrypted data
wired equivalency privacy(WEP)
used by wireless network equipment such as access points and wireless network cards
wireless protected access(WPA)
improved encryption that requires access to an access point first
service set identifier(SSID)
a password that is passed between the sending and receiving nodes of a wireless network
virtual private network
utilizes tunnels, authentication, and encryption within the Internet network to isolate Internet communications so that unauthorized users cannot access or use certain data
secure socket layer
a communication protocol built into web server and browser software that encrypts data transferred on that website, ex: https
virus
self replicating piece of program code that can attach itself to other programs and data and perform malicious actions such as deleting files or shutting down the computer
antivirus software
continually scans the system for viruses and worms and either deletes or quarantines them
vulnerability assessment
the process of proactively examining the IT system for weaknesses that can be exploited by hackers, viruses, or malicious employees
intrusion detection
specific software tools that monitor data flow within a network and alert the IT staff to hacking attempts or other unauthorized access attempts
penetration testing
the process of legitimately attempting to hack into an IT system to find whether weaknesses can be exploited by unauthorized users