Information Technology Flashcards

1
Q

what is the data repository that stores unstructured data?

A

data lake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is Encryption?

A

Encryption is transforming data, called plaintext, into unreadable gibberish, called ciphertext. Both a key and an algorithm are used to encrypt and decrypt text. To encrypt a document, the data is divided into blocks the same length as the key. The length of a key is made of a string of binary digits. The longer the key, the less likely someone can break the encryption code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internally encrypted passwords

A

nternally encrypted passwords are a form of access control designed to prevent unauthorized access by use of a utility program to identify passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Machine learning (ML)

A

Machine learning (ML) is a current application of artificial intelligence based around the idea that we should be able to give machines access to data and let them learn for themselves. The algorithms that have driven successful machine learning depend on an approach called deep learning, which uses neural networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

five core information assurance principles

A
Security
Availability
Processing integrity
Confidentiality
Privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic device

A

Cryptographic devices protect data in transmission over communication lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The “who” in data governance includes:

A

The “who” in data governance includes the data governance committee, the chief data officer (CDO), data stewards, and data owners as well as employees that create data while performing their job (not all of the employees).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

fail-soft protection

A

The capability to continue processing at all sites except a nonfunctioning one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Executive support system

A

An executive information system provides executives with information to make strategic plans, control the company, monitor business conditions, and identify business problems and opportunities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public-switched networks

A

Public-switched networks are open to the general public and offer the lowest level of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attribute of a relational database

A

In a relational database:
a- primary key uniquely identifies a specific row in a table.
b- Other non-key attributes in each table store important information about that entity.
c- A foreign key is an attribute in one table and a primary key in another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Electronic vaulting

A

Electronic vaulting is the process of electronically transmitting and storing backups of programs and data at a remote data storage facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Electronic data interchange, or EDI

A

EDI, is the use of computerized communication to exchange business data electronically in order to process transactions. Encryption is transforming data into unreadable gibberish to be sent electronically. This data is then decrypted and read at its destination.Software applications that encrypt data are more vulnerable to security risks than a hardware device performing the same function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An integrated test facility

A

An integrated test facility allows an auditor to introduce test data (simulated files) into an actual processing run to test the processing of that data. This provides evidence about operating effectiveness of the software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

private key encryption

A

A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cybersecurity VS cyber resilience

A

The main aim of cybersecurity is to protect information technology and systems, whereas cyber resilience focuses more on business delivery to keep business goals intact rather than the IT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

data lake

A

data lake is a large data repository that stores unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

data repository,

A

also known as data library or data archive, can be defined as a place that holds data, makes data available for use, and organizes data in a logical manner to be mined for data reporting, sharing, and analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Value-added network

A

is a private network that adds value to the data communications process by handling the difficult task of interfacing with the multiple types of hardware and software used by different companies.

20
Q

Electronic data interchange, or EDI

A

Is the use of computerized communication to exchange business data electronically in order to process transactions. Encryption is transforming data into unreadable gibberish to be sent electronically. This data is then decrypted and read at its destination.

21
Q

Range checking

A

involves checking a number in a transaction (such as the date) to determine whether that number falls within a specified range. For example, when March transactions were being processed, the date of each transaction would be checked and any transaction date falling outside the range March 1 through March 31 would not be processed.

22
Q

Electronic vaulting

A

is the process of electronically transmitting and storing backups of programs and data at a remote data storage facility.

23
Q

integrated test facility

A

An integrated test facility allows an auditor to introduce test data (simulated files) into an actual processing run to test the processing of that data. This provides evidence about operating effectiveness of the software.

24
Q

What is the primary purpose of a disaster recovery? plan

A

The primary purpose of a disaster recovery plan is to specify the steps required to efficiently and effectively restore/resume data processing operations when there is a disaster.

25
Q

decision table

A

A decision table is a chart used to guide people to make correct and consistent decisions. Decision tables may be especially useful when many alternative inputs and/or results are possible.

26
Q

neural network

A

A neural network is a computer system designed to recognize images and classify them according to the elements they contain, which works on a system of probability—based on data fed to it, it is able to make statements, decisions, or predictions with a degree of certainty. The addition of a feedback loop enables “learning”; by sensing or being told whether its decisions are right or wrong, the computer system modifies the approach it takes in the future.

27
Q

record count

A

A record count is the total number of input documents for a process or the number of records processed in a run. these records are reconciled to the number of output records. The total number of invoices processed is an example of a record count.

28
Q

security software

A

the primary functions of security software is to Authenticates user identification and control access to computer rsources like data files, Program laibraries and software.

29
Q

Edit Checks

A

Edit checks are a type of input (application or procedural) control. These checks are run by the computer (from programmed edit routines) to check the validity, accuracy, and reasonableness of the data which has been input from source documents.

30
Q

Data mining

A

Data mining technology helps examine large amounts of data to discover patterns. This data analytics technique can be deployed to discover potential fraud by identifying anomalies and extracting other useful information within a data warehouse. Since millions of transactions need to be scanned, this would be the most efficient technique for examining potential fraudulent charges within the dataset. Data mining software enables companies to pinpoint what is relevant, use that information to assess likely outcomes, and then accelerate the pace of making informed decisions.

31
Q

Direct changeover “ Big Bang”

A

Conversion by direct changeover (also known as “big bang” conversion) means that, on a specified date, users stop using the old system and the new system is put into use.

32
Q

The five classifications of controls used to make systems more secure?

A

1- segregation of duties
2- physical access controls
3- logical access controls,
4- personal computers and client/server network protection
5-internet and telecommunications controls.

33
Q

Data Extraction

A

Data extraction is the process of gathering and retrieving data captured within unstructured sources, such as email, social media, images, and barcodes.

34
Q

Unstructured data

A

Unstructured data is qualitative data stored in its native form and processed only when required. Examples are pictures, email text, audio and video files, social media sites, blogs, survey responses, and online reviews.

35
Q

Semi-Structured Data

A

emi-structured data is qualitative data loosely organized by categories. For example, an email application can search categories such as Inbox, Sent, and Drafts. However, the email content is unstructured data.

36
Q

Structured data

A

Structured data is data organized neatly in a tabular format with clearly defined relationships between different rows and columns. It is stored in a relational database. Examples are spreadsheets (e.g., Microsoft Excel), point-of-sales data, and credit card numbers.

37
Q

Database protection mechanisms

A

1- data dictionary to make sure that data is defined and used consistently
2- procedures for assessing and updating the database
3- concurrent update controls to prevent multiple-user issues.

38
Q

Hardening a host devise means…

A

Hardening is the process of modifying the configuration of hosts and application software and deleting, or turning off, unused and unnecessary programs that represent potential security threats.

39
Q

Histograms

A

summarize continuous data and display a large amount of data as well as the frequency of data values. This is done by showing the number of data points that fall within a specified range of values called “bins.” These bins are consecutive, non-overlapping intervals of a variable. The adjacent bins do not have any gaps; the rectangles of a histogram touch each other to indicate that the original value is continuous.

40
Q

system and organization controls (SOC®) 1

A

A SOC® 1 report is based on Statement on Standards for Attestation Engagements and generated by auditors for other auditors. Use of these reports is restricted to the management of the service organization, user entities, and user auditors.

41
Q

SOC® 2 and SOC® 3

A

SOC® 2 and SOC® 3 are reports on the controls at a service organization relevant to security, availability, processing integrity, confidentiality, or privacy.

42
Q

classifications of controls

A

1- segregation of duties
2- physical access controls
3- Logical access controls
4- Personal computers and client/server network protection
5- internet and telecommunications controls

43
Q

Examples of input validation or edit controls?

A
  • Preprinted forms,
  • check digits,
  • control totals.,
  • batch and proof totals,
  • hash totals,
  • record counts
  • limit or reasonable tests
44
Q

example of a user control activity?

A
  • Checks of computer output against source documents, control totals, or other input
  • Reviewing computer logs
  • Policies and procedures that document authorized users and recipients of data
45
Q

What are the risks associated with supply chain management internationally?

A
  • failure of member firms to meet obligations
  • cultural and communication challenges among member firms in different nations
  • failure of member firms to timely share information.