ISC Vocabulary for Brainscape a-i Flashcards
Access
A specific type of interaction between a subject and an object that results in the flow of information from one to the other. A subject’s right to use an object.
Access Control
- The process of limiting access to the resources of a system only to authorized programs, processes or other systems (in a network). Synonymous with controlled access and limited access.
- It enables authorized use of a resource while preventing unauthorized use or use in an unauthorized manner.
Access Control List
A list of the subjects that are permitted to access an object and the access rights of each subject.
Access Control Mechanism
Hardware or software features, operating procedures, management procedures, and various combinations of these designed to prevent and detect unauthorized access and to permit authorized access in an automated system.
Accountability
Accountability is the obligation to explain one’s actions or to justify what one does. Accountability is one of the primary objectives of financial reporting. It is information about how management discharged its stewardship responsibility to owners or to the citizenry regarding the use of resources entrusted to it. “Accountability requires governments to answer to the citizenry—to justify the raising of public resources and the purposes for which they are used.”(GASBCS 1.56)
Accounting System
An accounting system is a set of processes, procedures, and software tools designed to capture, process, store, and analyze financial data. Accounting systems are crucial for maintaining accurate financial records, ensuring compliance with financial regulations, and producing financial statements and reports.
Accreditation
- A management’s formal acceptance of the adequacy of a computer system’s security.
- The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed-upon set of security controls.
Accuracy
Accurate information is information that correctly and precisely represents a recorded event. Accurate calculations are prepared without errors and reprinted and copied as originally derived. Accuracy is an audit internal control objective. Accuracy controls are designed to ensure that dollar amounts are computed correctly. Examples of accuracy controls include use of a current approved price list, verification of multiplication and addition, matching of quantities ordered, received, and invoiced
Active Attack
An attack on the authentication protocol where the attacker transmits data to the claimant or verifier. Examples of active attacks include a man-in-the-middle, impersonation, and session hijacking.
Administrator
An administrator is a person appointed by the court to handle the affairs of a person who has died intestate (without a will) or a deceased person whose will did not establish a valid executor. The administrator is empowered by the court to administer an estate, to act for the estate, and to carry out the terms of the will. The administrator is empowered to marshal the assets and pay the debts of the estate, and distribute the remaining assets as specified in the will or, if intestate, to distribute the assets according to the laws of descent and distribution in that state. Administrators are empowered to sell assets to pay debts. It is a fiduciary relationship and has certain duties and liabilities; powers, duties, and liabilities are identical to those of executors.
Advanced Encryption Standard (AES)
The AES specifies a U.S. government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. Encryption converts data to an unintelligible form called cipher text; decrypting the cipher text converts the data back into its original form, called plain text. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits to encrypt and decrypt data in blocks of 128 bits. AES is an encryption algorithm for securing sensitive but unclassified material.
Adverse Opinion
An adverse opinion is an “overall” audit opinion which states that the financial statements donotpresent fairly the financial position or the results of operations or cash flows in conformity with an applicable financial reporting framework (AU-C 705.09). Auditors must have as much sufficient appropriate audit evidence to support an adverse opinion as for an unmodified opinion.An adverse opinion is warranted when the departure from an applicable financial reporting framework or the inconsistency is sufficiently material or sufficiently pervasive as to misrepresent the financial position or results of operations or cash flows or when the auditor believes the entity is not a going concern.An adverse opinion requires the disclosure of all the substantive reasons for the adverse opinion and the principal effects of the inconsistency on the financial statements, if known, or a statement in a separate emphasis-of-matter or other-matter paragraph preceding the opinion paragraph that the effects are not reasonably determinable.
Anomaly
Any condition which departs from the expected. This expectation can come from documentation (e.g., requirements specifications, design documents, user documents) or from perceptions or experiences. An anomaly is not necessarily a problem in the software, but a deviation from the expected, so that errors, defects, faults, and failures are considered anomalies.
Antivirus Software
Because of the danger of computer viruses and their effects, many reliable companies have created antivirus programs. These programs usually have most or all of the following functions:Virus protection—monitors computer activities in order to detect unauthorized or suspicious functions which may indicate a virus in operation.Virus identification—matches the specific virus with known types to ascertain its effects and the best course of recovery. This may also lend a clue as to the origin of the virus and includes scanning disks to locate viruses.Vaccination—utilities used to remove detected viruses from your system. Note: different utilities will be required to recover damaged files if a virus has been activated.
Application
An application is a computer program for performing a specific function, such as a payroll program.
Application Controls
“Application controls” refers to the transactions and data relating to each computer-based application system and are, therefore, specific to each such application. The objectives of application controls, which may be manual or programmed, are to ensure the completeness and accuracy of the records and the validity of the entries made therein. Application controls consist of input controls, processing controls, and output controls.
Application Program
Application programs are computer programs designed to perform a specific function directly for the user or for another application. Examples of application programs include word processors, database programs, and financial programs. The program processes specific files or performs specific functions such as receivables or payroll.
Application Software
Programs that perform specific tasks, such as word processing, database management, or payroll. Software that interacts directly with some non-software system (e.g., human, robot, etc.).
Asset
Assets are information resources that support an organization’s mission.
Asymmetric Keys
Two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.
Attack
The act of trying to bypass security controls on a system. An attack may be active, resulting in the alteration of data, or passive, resulting in the release of data.Note:The fact that an attack is made does not necessarily mean that it will succeed. The degree of success depends on the vulnerability of the system or activity and the effectiveness of existing countermeasures.An attempt to obtain a subscriber’s token or to fool a verifier into believing that an unauthorized individual possesses a claimant’s token.
Attacker
A party who is not the claimant or verifier but wishes to successfully execute the authentication protocol as a claimant.
Audit Trail (Audit Log)
The audit trail (audit log) is the path left by a transaction when it is processed. The trail begins with the original source document or documents, proceeds through the transactions, entries, and posting of records, and is completed with the financial statements.Source document → Journal → Ledger → Financial statementsThe traditional audit trail is characterized by accessible records, observable activities, source documents, detailed chronological journals, and ledger summaries. For entities with highly complex information technology systems, the audit trail is partially or completely electronic.Information technology (IT) has impacted the audit trail in the following ways:Source documents may no longer be produced—access to documents is more difficult.Ledger summaries may be replaced by electronic master files.Printed data may not be available.Processing activities are difficult to observe—much of the processing is automated within the system.
Authenticate
- To verify the identity of a user, device, or other entity in a computer system, often as prerequisite to allowing access to resources in a system.
- To verify the integrity of data that have been stored, transmitted or otherwise exposed to possible unauthorized modification.