Chapter 8-10 Flashcards

1
Q

COSO

A

Used for general business process controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COBIT

A

Used for general IT Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operational v Financial controls

A

Control is the same, the impacted system is different

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operational systems

A

Systems used to support business objectives: Project Management system, CRM, email, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Financial systems

A

Systems that produce financial data: AIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IT v Business process controls

A

-IT controls are broad, over many cycles
-Business process controls are over specific cycle risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Management of the AIS: IT v Acct dept.

A

-IT: records
-Acct: Authorizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Specific IT control categories

A

-Information security
-Change Management
-Computer Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Controls to inappropriate users gaining access to AIS

A

-Unique User ID’s
-2FA
-delete fired EE’s ID’s
-update/review EE access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AIS user access structure

A

-Tasks: tasks a user is allowed to perform
-Roles: role determines priviledges
-User ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reviewing AIS access

A

-Acct dept member should review financial related tasks
-Reviewer only reviews people in their dept
-reviewers don’t review themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical access controls

A

-Key cards for access
-Security guards/cameras
-lock computer when afk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security awareness training

A

remind employees of reporting procedures for compromised appliances and train them to identify viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Controls to unauthorized disclosure of financial/private data

A

-Encryption
-shred important documents
-Network security/VPN
-Virus detection software
-penetration tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption process

A
  1. Public key is automatically used to encrypt document
  2. Private key used by the company is used to decrypt the encryption algorithm.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption types

A
  1. Digital certificates: built into E-docs to certify owners
  2. E-signatures
17
Q

Encryption regulations

A

-PCI: Credit cards
-HIPAA
-Gramm Leach Bliley Act: bank customers
-EEOC: company employee information

18
Q

Intrusion detection system

A

Looks for attempted intrusions into the network

19
Q

Controls to changing AIS code risk

A

-Don’t work on the live version
-test changes
-restrict who can make changes

20
Q

IT SOD

A

-Dev writes code
-Operations implements
-security does security stuff

21
Q

IT methodologies

A

-Waterfall
-Agile

22
Q

Waterfall methodolgy

A
  1. request
  2. coding
  3. dev test
  4. vat test
  5. approve/implement
23
Q

Agile methodology

A

1.request
2.code part of it
3. test that part
4. repeat 2/3
5. approval/implementation

24
Q

Controls to AIS data not available

A
  1. Save critical data in more than one place
  2. Backups/data center controls
    *3. Disaster recovery plans and Business continuity plans
25
Q

Data center controls

A
  1. natural disaster proof
  2. AC
  3. *Uninterrupted power supply
26
Q

Incremental v Differential backup

A

-Differential: Backup everything each day since the last full backup
-Incremental: Backup that days activity only

27
Q

Which backup is best if?
-Need to recover info ASAP
-Want faster backups
-Want low IT costs
-Paranoid about losing info

A

-Diff
-Incremental
-Incremental
-Diff

28
Q

Disaster recovery plan

A

How company will restore IT functions when the data center fails

29
Q

Business recovery plan

A

how a company restores business process functions when the company operations are affected by the disaster.

30
Q

Disaster recovery location types

A

-Cold site: cheap, empty, takes longest to set up
-Hot site: expensive, a duplicate data center, backed up 24/7
-Warm site: in between

31
Q

ISACA

A

Information systems audit and control association

32
Q

Who wrote the COBIT framework?

A

ISACA

33
Q

Who’s responsible for implementing changes in the AIS?

A

Operations