Information Technology Flashcards
Data Security Controls
Objective is to protect data
Parallel Simulation
The auditor runs the clients data under the auditors program
What is cryptocurrency
-A way to pay for Goods and Services while maintaining financial privacy
What is EDI
Electronic Data Interchange -A way for supplier and buyers to communicate -Encrypted -Secure
What is cloud computing
-A way for organizations to use the internet to access services through a 3rd party company
What is an edit program?
A way for the computer to check inputs.
What is a ring network
- Ring networks do not have central computers
- Each site is connected to only two other sites
- Data is passed through each site until arriving (Printer)
What are contingency planning strategies
- System backup analysis
- Vendor supply agreement analysis
- Contingent facility contract analysis
What is risk analysis
Used to determined an organizations definition of a disaster
What are the downsides of using a LAN vs a Mainframe
-There’s more user responsibility on the PC side to document procedures -It is less secure on a PC / LAN as opposed to a main frame -Data may be incomplete because communications do not happen automatically
Intranet
Riskier than WANs and LANs Cheaper than WANs and LANs
What are data elements
Essential parts of a systems specification document.
Applications development unit
Responsible for developing systems
Systems programmer
Implements and maintains a system: O/S, Access Control Software, database systems
User departments
interact with application systems, do not have expertise
Computer operations unit
Help desks Assist users with system problems
What does a system administrator monitor
Access to operational data, the person needs to verify that its being used by the right users and its appropriate authorization.
What is an integrated test facility
Auditor can run fictitious data and client’s real data to ensure it’s receiving the same treatment.
What is a Transmission Control Protocol and internet protocol?
- TCP/IP Networks can be used with all computers that have access to the internet.
- Each also have a unique address.
What is a mirrored web server
A complete duplicate of a computer system
An advantage of distributed systems such as fail-soft
Capability to continue processing at all sites
What is a validity check
Ensures that data input is correct
What reviewing system-access log do?
This is a monitoring control that can detect fraud.
Distributed Data Processing
Network of computers located in DIFFERENT facilities and linked to a centralized computer for info purposes.
What is the central theme behind Management Information Systems
Use of decision models to organize data