Chapter 4 Flashcards
apply overall to
the IT accounting system; they are not restricted to any particular accounting
application. An example of a general control is the use of passwords to allow
only authorized users to log in to an IT based accounting system. Without
regard to processing data in any specific application, passwords should be
employed in the IT system.
General controls
are used specifically in accounting applications to control
inputs, processing, and outputs. Application controls are intended to ensure that
inputs and processing are accurate and complete and that outputs are properly
distributed, controlled, and disposed.
An example of an input application control is a validity check.
Application controls
GENERAL CONTROLS FOR IT SYSTEMS divided into five broad categories:
- Authentication of users and limiting unauthorized access
- Hacking and other network break-ins
- Organizational structure
- Physical environment and physical security of the system
- Business continuity
is a process or procedure in an IT system to ensure that
the person accessing the IT system is a valid and authorized user. Unauthorized users trying to access IT systems is a prevalent, difficult, and ongoing problem
that organizations must try to control. Unauthorized users may be hackers or
people outside the organization, or users within the company trying to gain
access to data they are not entitled to. In order to limit unauthorized access,
there are many general controls that should be in place.
Authentication of users
means to make the computer recognize you in order
to create a connection at the beginning of a computer session. To increase the
effectiveness of log-in restriction, user IDs must be unique for each user.
Log in
is a secret set of characters that identifies the user as the authentic owner
of that associated user ID. It should be at least eight characters in
length and contain at least one nonalphanumeric character. Such passwords
would be difficult to guess
password
To increase the
effectiveness of log-in restriction, ___________ must be unique for each user
user IDs
The use of passwords can be strengthened by the use of a _______ that the user carries. The _______ is plugged into the computer’s card reader
and helps authenticate that the user is valid. It is a credit
card–sized device with an integrated circuit that displays a constantly chang-
ing ID code. The user enters her password, and then the smart card displays
an ID that she uses to log in. The smart card typically changes the user ID
every 5 minutes or so.
smart card
A newer technology to authenticate users is a __________, which plugs
into the USB port and thereby eliminates the need for a card reader. Other-
wise, the purpose and use of the security token are the same as those of a smart
card.
security token
The use of smart cards or tokens can reduce unauthorized access, since the
person who logs in must physically possess and use the smart card or token.
The authentication of the user is called ____________ because it is
based on something the user has, the token, and something the user knows, the
password. A hacker located several hundred miles away from the organization
would not have access to the smart card or token
two-factor authentication
can also be used to authenticate users and limit unautho-
rized access. It uses some unique physical characteristic of the
user to identify the user and allow the appropriate level of access to that user.
Biometric devices
is a complete record of all dates, times, and uses for
each user. Any abnormalities in log-in or use can be examined in more detail
to determine any weaknesses in log-in procedures. Also, the log-in procedures
and logs establish nonrepudiation of users.
computer log
means that a user
cannot deny any particular act that he or she did on the IT system. That is, if a
user logged in and changed data fraudulently, the log-in procedures and logs
help establish undeniably which user took the action. Nonrepudiation is
extremely important in verifying sales to customers.
Nonrepudiation
The_________ , which should
be established for every authorized user, determines each user’s access levels
to hardware, software, and data according to the individual’s job responsibilities.
user profile
contains a list of valid, authorized users and the access level
granted to each one. For instance, one user within the payroll area may need
to both read and write data, while another may need only read access. These
user profiles may be defined in authority tables. Authority tables are an inte-
gral part of the computer system, and when a user logs in, the system looks
up the nature and type of access to which that user is entitled.
authority table
The IT system also has________ for hardware, software, and appli-
cation programs that contain the appropriate set-up and security settings. It is
important to limit user access to these configuration tables so that security set-
tings are not changed by unauthorized users. The hardware and operating sys-
tem configuration table contains security and operating settings for hardware
and the operating system. The application software configuration table contains
security and operating settings for the application software.
configuration tables
is hardware,
software, or a combination of both that is designed to block unauthorized access.
All data traveling between the internal network and the Internet should pass
through the firewall first. The firewall examines all data passing through it, and
if the firewall detects unauthorized attempts to pass data, it prevents the flow
of such data. The firewall can prevent the unauthorized flow of data in both
directions, blocking access to data on the network server by preventing unau-
thorized requests to log in or read data.
firewall
is the process of converting data into secret codes referred to as
cipher text. Encrypted data can only be decoded by those who possess the
encryption key or password. It renders the data useless to those who
do not possess the correct encryption key.
Encryption
There are two types of encryption: symmetric encryption and public key
encryption.
uses a single encryption key that must be used
to encrypt data and also to decode the encrypted data. The sender of the data
and the receiver must have the same encryption key. However, it is difficult for
the sender to communicate the encryption key to the receiver without compro-
mising the key.
Symmetric encryption
uses both a public key and a private key.
The public key, which can be known by everyone, is used to encrypt the data, and
a private key is used to decode the encrypted data. Knowing which public encryp-
tion method a receiver uses enables the sender to use that public key to encrypt
the data, and the receiver will use her private key to decode the data.
Public key encryption
A wireless network must have an access point, or a transmitter, that sends the
network signals. The computer connected to the wireless network must have a
wireless network card to receive the signals. Wireless network equipment, such
as access points and wireless network cards, uses an encryption method called
wired equivalency privacy, or WEP.
Because WEP has proven to be susceptible to hacking, the industry
has developed a new wireless network security system called ____________ which has improved encryption and user authentication. With
the improved encryption method, WPA can check to see whether encryption
keys have been tampered with. WEP is based on a computer-specific address,
which is easy for hackers to determine and misuse; A wireless network that uses
WPA, on the other hand, requests connection to the network via an access point.
The access point then requests the user identity and transmits that identity to
wireless protected
access, or WPA,
is a password that is passed between the sending and receiving nodes of a wireless network. Most wireless
network equipment sets a default SSID of “any” so that any wireless equipment
can connect to it.
service set identifier, or SSID.