ISACA Terminology Glossary Flashcards

1
Q

Checksum

A

A checksum value is generated by algorithm and associated with an input value and/or whole input file.

The checksum value can be used to assess its corresponding input data or file at a later date and verify that the input has not been maliciously altered.

This verifies the INTEGRITY of the number/amount/file - it ensures that the number in the output file reflects the number in the input file and therefore the number was not altered/no unauthorized modifications occurred following input.

It is highly improbable that an unauthorized party could alter the input without also altering the corresponding checksum output. If a subsequent checksum value no longer matches the initial value, the input may have been altered or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Acknowledgement (ACK)

A

A flag set in a packet to indicate to the sender that the previous packet sent was accepted correctly by the receiver without errors, or that the receiver is now ready to accept a transmission.

Example: Functional Acknowledgements used in EDI transactions - these serve as the audit trail for EDI transactions and are one of the main controls used in data mapping (what was received vs. what was sent - how do the data fields in the sender’s file map to the data fields configured in the receiver’s file/program).

USED FOR DATA MAPPING, NOT FOR AUTHENTICITY OF EDI TRANSACTIONS - AUTHORIZATION IS ACHIEVED BY VERIFYING THE SENDER AGAINST CONTRACTS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Public Key Verification:

(1) Public Key
(2) Asymmetric Key (Public Key)
(3) Public Key Encryption
(4) Public Key Infrastructure (PKI)
(5) Public Key Cryptosystem
(6) Asymmetric Cipher

A

KEY VERIFICATION: USED FOR THE PROTECTION OF DATA (CONFIDENTIALITY OF DATA)

(1) Public Key: In an asymmetric cryptographic scheme, the key that may be widely published to enable the operation of the scheme.
(2) Asymmetric Key (Public Key): Cipher technique in which different cryptographic keys are used to encrypt and decrypt a message.
(3) Public Key Encryption: A cryptographic system that uses two keys: one is a public key, which is known to everyone, and the second is a private or secret key, which is only known to the recipient of the message.
(4) Public Key Infrastructure (PKI): A series of processes and technologies for the association of cryptographic keys with the entity to whom those keys were issued.
(5) Public Key Cryptosystem: Public key cryptosystems combine a widely distributed public key and a closely held, protected private key. A message that is encrypted by the public key can only be decrypted by the mathematically related, counterpart private key. Conversely, only the public key can decrypt data that was encrypted by its corresponding private key.
(6) Asymmetric Cipher: Most implementations of asymmetric ciphers combine a widely distributed public key and a closely held, protected private key. A message that is encrypted by the public key can only be decrypted by the mathematically related, counterpart.

Note: “Cipher” is an algorithm for performing encryption or decryption (converts the original message [called “plain text”] into “ciphertext” using a key to determine how it is done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Private Key Verification:

(1) Private Key
(2) Symmetric Key Encryption
(3) Private Key Cryptosystems
(4) Symmetric Cipher

A

KEY VERIFICATION: USED FOR THE PROTECTION OF DATA (CONFIDENTIALITY OF DATA)

(1) Private Key: A mathematical key (kept secret by the holder) used to create digital signatures and, depending on the algorithm, to decrypt messages or files encrypted (for confidentiality) with the corresponding public key.
(2) Symmetric Key Encryption: System in which a different key (or set of keys) is used by each pair of trading partners to ensure that no one else can read their messages. The same key is used for encryption and decryption.
(3) Private Key Cryptosystems: Private key cryptosystems involve secret, private keys. The keys are also known as symmetric ciphers because the same key both encrypts message plaintext from the sender and decrypts resulting ciphertext for a recipient.
(4) Symmetric Cipher: A symmetric cipher is an algorithm that encrypts data using a single key. In symmetric cryptographic algorithms, a single key is used for encipherment (encrypting) and decipherment (decrypting).

Note: “Cipher” is an algorithm for performing encryption or decryption (converts the original message [called “plain text”] into “ciphertext” using a key to determine how it is done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public/Private Key Verification:

(1) Encryption
(2) Encryption Key
(3) Decryption Key
(4) Key Length
(5) Cryptosystem

A

(1) Encryption: The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm with a key) and producing an encrypted message (ciphertext).

USED FOR THE PROTECTION OF DATA (CONFIDENTIALITY OF DATA)

(2) Encryption Key: A piece of information, in a digitized form, used by an encryption algorithm to convert the plaintext to the ciphertext.
(3) Decryption Key: A digital piece of information used to recover plaintext from the corresponding ciphertext by decryption.
(4) Key Length: The size of the encryption key measured in bits.
(5) Cryptosystem: A pair of algorithms that take a key and convert plaintext to ciphertext and back.

Note: “Cipher” is an algorithm for performing encryption or decryption (converts the original message [called “plain text”] into “ciphertext” using a key to determine how it is done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Signature

A

A piece of information, a digitized form of signature, that provides sender authenticity, message integrity and non-repudiation.

A digital signature is generated using the sender’s private key or applying a one-way hash function.

Can ensure nonrepudiation (someone cannot deny something - i.e. the ability to ensure that a party to a contract/communication cannot deny authenticity of their signature on a document or sending of a message that they originated).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Gateway

A

A device (router, firewall) on a network that serves as an entrance to another network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(1) Boundary
(2) Boundary Control
(3) Firewall

A

(1) Boundary: Logical and physical controls to define a perimeter between the organization and the outside world.
(2) Boundary Control: Establishes the interface between the would-be user of a computer system and the computer system itself; are individual-based, not role-based, controls.
(3) Firewall: A system or combination of systems that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(1) Criticality Analysis
(2) Criticality
(3) Data Classification Scheme

A

(1) Criticality Analysis: An analysis to evaluate resources or business functions to identify their importance to the enterprise, and the impact if a function cannot be completed or a resource is not available.
(2) Criticality: The importance of a particular asset or function to the enterprise, and the impact if that asset or function is not available

Criticality of data is used in the identification and ranking of information assets during the RISK ASSESSMENT process.

(3) Data Classification Scheme: An enterprise scheme for classifying data by factors such as (1) data criticality, (2) sensitivity and (3) ownership (location of assets).

This will set the tone or scope of how to assess risk in relation to the organizational value of an asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Impact Analysis

A

A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events.

In an impact analysis, threats to assets are identified and potential business losses determined for different time periods. This assessment is used to justify the extent of safeguards that are required and recovery time frames. This analysis is the basis for establishing the recovery strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Intrusion Detection System (IDS)

A

Inspects network and host security activity to identify suspicious patterns that may indicate a network or system attack.

IDS is a DETECTIVE control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dry-Pipe Fire Extinguisher System (Fire Suppression System)

A

Refers to a sprinkler system that does not have water in the pipes during idle usage, unlike a fully charged fire extinguisher system that has water in the pipes at all times.

The dry-pipe system is activated at the time of the fire alarm and water is emitted to the pipes from a water reservoir for discharge to the location of the fire.

Fire Suppression System is a CORRECTIVE control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(1) Application Software Tracing & Mapping
(2) Mapping
(3) Tracing

A

(1) Application Software Tracing & Mapping: Specialized tools that can be used to analyze the flow of data through the processing logic of the application software and document the logic, paths, control conditions and processing sequences.

Both the command language or job control statements and programming language can be analyzed.

This technique includes program/system: mapping, tracing, snapshots, parallel simulations and code comparisons.

(2) Mapping: Diagramming data that are to be exchanged electronically, including how they are to be used and what business management systems need them.
(3) Tracing: Transaction reconciliation effort that involves following the transaction from the original source to its final destination.

IMPORTANT: In Electronic Funds Transfer (EFT) transactions, the direction of tracing may start from the Customer-printed copy of the receipt, proceed to checking the system audit trails and logs, and end with checking the master file records for daily transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Service-Oriented Architecture (SOA)

A

A cloud-based library of proven, functional software applets that are able to be connected together to become a useful online application.

Relies on the principles of a distributed environment in which services encapsulate business logic as a “black box” and might be deliberately combined to depict real-world business processes.

Before reviewing services in detail, it is essential for the IS auditor to comprehend the mapping of business processes to services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Table Look-Up

A

Used to ensure that input data agree with predetermined criteria stored in a table.

Input data is checked against predefined tables, which PREVENT any undefined data from being entered.

This is a PREVENTATIVE control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transaction Log

A

A manual or automated log of all updates to data files and databases.

This is a DETECTIVE control and provides an AUDIT TRAIL.

17
Q

“Check” Controls:

(1) Range Check
(2) Limit Check
(3) Validity Check
(4) Duplicate Check
(5) Reasonableness Check
(6) Redundancy Check
(7) Sequence Check
(8) Completeness Check
(9) Check Digit
(10) Check Digit Verification (Self-Checking Digit)
(11) Numeric Check
(12) Parity Check

A

(1) Range Check: Range checks ensure that data fall within a predetermined range.
(2) Limit Check: Tests specified amount fields against stipulated high or low limits of acceptability. When both high and low values are used, the test may be called a Range Check.
(3) Validity Check: Programmed checking of data validity in accordance with predetermined criteria.
(4) Duplicate Check: Duplicate check analysis is used to test defined or selected primary keys for duplicate primary key values.
(5) Reasonableness Check: Compares data to predefined reasonability limits or occurrence rates established for the data.
(6) Redundancy Check: Detects transmission errors by appending calculated bits onto the end of each segment of data.
(7) Sequence Check: Verification that the control number follows sequentially and any control numbers out of sequence are rejected or noted on an exception report for further research. Can be alpha or numeric and usually utilizes a key field.
(8) Completeness Check: A procedure designed to ensure that no fields are missing from a record.
(9) Check Digit: A numeric value, which has been calculated mathematically, is added to data to ensure that original data have not been altered or that an incorrect, but valid match has occurred. Check digit control is effective in detecting transposition and transcription errors.
(10) Check Digit Verification (Self-Checking Digit): A programmed edit or routine that detects transposition and transcription errors by calculating and checking the check digit.
(11) Numeric Check: An edit check designed to ensure that the data element in a particular field is numeric.
(12) Parity Check: A general hardware control that helps to detect data errors when data are read from memory or communicated from one computer to another. A 1-bit digit (either 0 or 1) is added to a data item to indicate whether the sum of that data item’s bit is odd or even. When the parity bit disagrees with the sum of the other bits, the computer reports an error. The probability of a parity check detecting an error is 50 percent.

18
Q

Source Code Compare Program

A

Provides assurance that the software being audited is the correct version of the software, by providing a meaningful listing of any discrepancies between the two versions of the program.

Allows the auditor to EXAMINE SOURCE PROGRAM CHANGES without information from IS PERSONNEL - Here, the auditor has an OBJECTIVE, INDEPENDENT, AND RELATIVELY COMPLETE ASSURANCE OF PROGRAM CHANGES, because the source code comparison identified the changes.

Detects all changes between an ORIGINAL and CHANGED Program.

Helps detect whether there have been any unauthorized changes since the last authorized program update (Pre-update and post-update).

19
Q

Penetration Testing

A

A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers.

20
Q

(1) Integrated Test Facilities (TFT)

(2) Test Data

A

(1) Integrated Test Facilities (TFT): A testing methodology in which test data are processed in production systems.

The data usually represent a set of fictitious entities such as departments, customers or products. Output reports are verified to confirm the correctness of the processing.

Ultimately, tests the PROCESSING of data (does not monitor data/real-time transactions).

(2) Test Data: Simulated transactions that can be used to test processing logic, computations and controls actually programmed in computer applications. Individual programs or an entire system can be tested.

This technique includes INTEGRATED TEST FACILITIES (ITFs) and Base Case System Evaluations (BCSEs).

21
Q

Embedded Audit Module (EAM)

A

Integral part of an application system that is designed to identify and report specific transactions or other information based on pre-determined criteria.

Identification of reportable items occurs as part of real-time processing.

Reporting may be real-time online or may use store and forward methods.

Also known as integrated test facility (ITF) or continuous auditing (CA) module.

22
Q

Regression Testing

A

A testing technique used to retest earlier program abends or logical errors that occurred during the initial testing phase.

Used to test new versions of software to ensure that previous changes and functionality are not inadvertently overwritten or disabled by the new changes.

23
Q

Dual Control

A

A procedure that uses two or more entities (usually persons) operating in concert to protect a system resource so that no single entity acting alone can access that resource.

Requires that TWO PEOPLE carry out an operation. Observation would be best to ascertain the existence of a Dual Control as you can observe whether 2 people are involved in the process (i.e. vs. 1 person filling the role of the 2nd person).

24
Q

Structured Query Language (SQL)

A

The primary language used by both application programmers and end users in accessing relational databases.

Provides options for auditors to query specific tables of a database according to audit objectives.

Downside: extensive skills/understanding of SQL is required/record structure may be difficult to understand in order to access the data.