Information Technology (15-25%) Flashcards

1
Q

What is the COBIT Model?

A

Control OBjectives for related and Information Technologies (COBIT)

provides framework for implementation of IT into control system & understand risks of doing so - guide to managers and users to adopt best IT practices

aimed at figuring out 3 main things (PRO):
1 - OBJECTIVES - what are our business requirements of IT system?
2 - RESOURCES - what IT resources would be necessary to implement such system?
3 - PROCESSES - what IT processes do we need to figure out how to implement such system?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 main domains of the COBIT Model?

A

DAMP
1 - PLANNING & ORGANIZATION - how IT system helps accomplish objectives
2 - ACQUISITION & IMPLEMENTATION - how acquires and develops IT solutions and automated solutions that address objectives
3 - DELIVERY & SUPPORT - how can best deliver required IT services including operations, security, continuous service, and training
4 - MONITORING - how can periodically assess IT processed for quality and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 7 attributes of desired information from COBIT Model?

A
ICCAREE
1 - effective
2 - efficient
3 - confidential
4 - integrity
5 - available
6 - compliant
7 - reliable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an IT Risk Assessment?

A

3 main risk management components:
1 - EVALUATION - to identify and evaluate properties and characteristics
2 - ASSESSMENT - to discover threats and vulnerabilities that pose risk to assets
3 - MITIGATION - to address risk by transferring, eliminating, or accepting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Change Management?

A

policies and procedures governing change within organization

follows basic logical steps of implementing change:

  • identify need for change
  • create plan outlining objectives of change
  • obtain approval from management, create budget, map out general timeline
  • identify risks of implementing change
  • test change
  • implement change
  • review and monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 Risks associated with Change Management?

A

1 - ACQUSITION RISKS:
inability to consider all effects of implementing new system/software - could be incompatibilities with existing systems or with organizational objectives
2 - INTEGRATION RISKS:
EEs resisting adoption of new system/software, lack of adequate resources to correctly implement change, possibility of unforeseen incompatibility
3 - OUTSOURCING RISKS:
outside organization does not have same understanding/knowledge of objectives, security of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 7 stages of Systems Development Lifecycle (SDLC)?

A

PADDTIM
1 - PLANNING & FEASABILITY
- technical feasibility - possible with current IT system?
- economic feasibility - do benefits outweigh costs?
- operational feasibility - will system work?
2 - ANALYSIS - identifies what system must accomplish
3 - DESIGN - interactions among systems/users-flowcharted
4 - DEVELOPMENT
5 - TESTING
6 - IMPLEMENTATION
- parallel implementation - old system and new system run side by side, until clear new system works
- cold turkey - old system dropped, new system implemented all at once
- phased implementation - new system implemented in phases
- pilot implementation - users divided into small groups and one group at a time implements new system
7 - MAINTENANCE - user groups/help desks used to monitor issues as time goes on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is involved in the documentation of an IT system? What are the 4 levels of documentation?

A

documentation required in order to:

  • evaluate system
  • train EEs on using system
  • re-create or re-deploy system after crisis
  • for auditors to use during audits
  • can be in many different forms - questionnaires, narrative description, flow charts, diagrams, decision tables, etc.

SOUP
1 - SYSTEM documentation - gives overview of programs/data and how system works together
2 - PROGRAM documentation - is record of programming logic - mainly used for programmers
3 - OPERATOR documentation - run manual is necessary information to run programs - used by computer operators
4 - USER documentation - helps untrained user to understand and use system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the IT System Access types of Controls?

A

2 types of control:
1 - LOGICAL controls:
within computer systems - prevent authorization access - user authentication, ability to read/write, firewalls, etc.
2 - PHYSICAL ACCESS controls:
physical measures taken to protest information of organization - keycards to open certain doors, fingerprint scanners, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the IT Segregation of Duties and Roles?

A

segregation of: PADDO

  • planning
  • design
  • development
  • administration
  • operating of IT system

SAAP-SASP-O

  • SYSTEMS ANALYST - designs and analyzes - usually lead a team of programmers
  • APPLICATION PROGRAMMER - write the programs
  • SYSTEM ADMINSTRATOR - grants access to system resources and manages activities within
  • SYSTEM PROGRAMMER - maintain and update systems and hardware
  • OPERATOR - actual users of system/software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 3 main areas regarding sensitive information risk in IT?

A

1 - critical information
2 - confidentiality
3 - privacy

*numerous ways this information can be stolen, exposed, misused, accessed without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 6 categories of General IT Controls?

A

1 - PREVENTIVE controls - prevent error before occurs
2 - DETECTIVE controls - detect error after occurs
3 - CORRECTIVE controls - reverse effects of error
4 - FEEDBACK controls - results evaluated/adjusted
5 - GENERAL controls - apply all parts
6 - APPLICATION controls - apply to specific parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 types of Application IT Controls?

A

1 - INPUT controls - ensure transactions are Valid, Complete, and Accurate (ACV)
2 - PROCESSING controls - ensure updates and processes work accurately, completely, and detect unauthorized transactions
3 - OUTPUT controls - ensure reports generated are accurate and only distributed to authorized individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are a few examples of Input Controls under the Application IT Controls?

A

ACV - accurate, complete, valid

  • DEFAULT VALUES - help reduce mistakes, such as date on order page being auto filled in with current days date
  • AUTOMATED DATA CAPTURE - barcode allows fast data entry and reduces mistakes
  • REASONABLENESS CHECK - compares 2 fields, such as hours worked with paycheck total, makes sure values reasonable
  • CLOSED LOOP VERIFICIATION - reduces data entry errors - retrieves related information, if comes up wrong, user knows typed wrong
  • SEQUENCE CHECK - verifies all numbers in sequence accounted for, such as check numbers
  • HASH TOTAL - total for field with no actual meaning, can prevent errors, such as adding up numbers of customer account
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are a few examples of Processing Controls under the Application IT Controls?

A

REI

  • ELECTRONIC AUDIT TRAIL - list of transactions written to a log, provides trail
  • RUN TO RUN - counts that monitor number of units in batch as move from one procedure to another
  • INTERNAL LABELS - tells program using correct files for update process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are a few examples of Output Controls under the Application IT Controls?

A

SAD

  • SPOOLING CONTROLS - jobs sent to printer, held in queue, access to queue is restricted
  • ABORTED PRINT JOBS - control to dispose of partial printouts or aborted print jobs - can contain sensitive data
  • DISTRIBUTION LOGS - record of who receives what reports, make sure only those authorized receive
17
Q

What is Encryption? and what are the 2 types?

A

process of converting regular text to code, can only be deciphered by intended recipient (ideally) - usually a type of system/software is converting message

  • SYMMETRIC encryption - simple, easy to use - less secure - single algorithm
  • ASYMMETRIC encryption - more complicated to use - more secure - 2 algorithms used
18
Q

What is a peer-to-peer network (P2P)?

A

when different nodes all share communications management - no central controlling server (2 of more PCs share files & access to devices) - how Bitcoin (BTC) operates

19
Q

What is a local area network (LAN)? What is a wide area network (WAN)?

A

LAN - confined to small geographic area such as one office or even just one floor

WAN - cover large geographic areas, such as national network

20
Q

What is a node?

A

electronic device that is attached to a network, and is capable of creating, receiving, or transmitting information over a communication channel

21
Q

What is an extensive markup language (XML)?
What is hypertext markup language (HTML)?
What is extensible business reporting language (XBRL)?

A

XML - protocol for encoding documents in a machine readable form

HTML - language for web pages

XBRL - protocol for encoding and tagging business and accounting/financial specific information in electronic form

22
Q

What is transmission control protocol (TCP)/internet protocol (IP)?
What is file transfer protocol (FTP)?

A

TCP/IP - transmission protocol of internet

FTP - protocol used to transfer files from client to server

23
Q

What is social engineering?

A

set of techniques used by fraudster to get sensitive information from EEs - getting information from people instead of actually hacking computer systems

24
Q

What are the 4 electrical systems risks?

A

1 - failure/outage
2 - reduced voltage (brownout)
3 - spike/surges
4 - electromagnet interference

25
Q

What are the 2 main security protocols that make secure internet transactions possible?

A

1 - SSL - secure sockets layer

2 - S-HTTP - secure hypertext transport protocol

26
Q

What is a denial of service attack?

A

prevents legitimate users from accessing system by flooding system with requests - attack is meant to only disable system, not gain access to it

27
Q

What is a backdoor?

A

program that lets hacker bypass regular security process, such as a password

28
Q

What are the 3 main categories of planning, identifying and prioritizing a business continuity management (BCM)?

A

MBT
1 - MISSION CRITICAL (highest level) - serving customers and manufacturing products
2 - BUSINESS CRITICAL - IT systems and processes necessary for business to run
3 - TASK CRITICAL (lowest level) - services required to carryout individual tasks

29
Q

What is a Disaster Recovery Plan (DRP)?

What are the different types of sites for a DRP?

A

allows organization to make plan for disasters and recover from them

  • COLD SITE - offsite location has all physical requirements for data processing, does not have actual equipment/data
  • WARM SITE - place business can relocate to after disaster, contains hardware but no copies of backed up data
  • HOT SITE - offsite location completely ready to take over data processing
  • MIRRORED SITE - fully redundant facility - has highest cost
30
Q

What is an IT steering committee?

A

members selected from different areas across organization - oversees development of system being built or resources being acquired for data processing needs

31
Q

What is Enterprise-wide Resource Planning system (ERPs)?

A

software system that processes transactions, supports management, aids decision making throughout entire organization in one single package - integrates all data maintained by organization into one database - improves flexibility and decision-making process by having all information in one place

advantage - increased efficiency
disadvantage - very expensive

32
Q

What is the online analytical processing system (OLAP) within an ERP system?
What is the online transaction processing system (OLTP) within an ERP system?

A

OLAP - provides data warehouse and data mining capabilities - EEs can go into system and run queries/generate reports from firms data (OLAP refers to analyzing data)

OLTP - records day-to-day transactions, such as sales, production, purchasing (OLTP refers to collecting data)

33
Q

What are 3 main advantages of a cloud-based system?

What are 3 main risks associated with using a cloud-based system?

A

advantages:
1 - enhanced access as long as someone has internet
2 - lower maintenance costs
3 - scalability

risks:
1 - risk of data loss
2 - increased risk of data being breached by hackers
3 - overall risk relying on service provider instead of housing data internally

34
Q

What is the Extract, Transform, Load (ETL) load data process?

A

using data to perform analytics of some kind

EXTRACT - extracting from its source (database)
TRANSFORM - cleaning and normalizing data before its analyzed
LOAD - loading transformed data into software where analytics will be performed