ISC Vocabulary for Brainscape a-i testing Flashcards
Refers to sending a network packet that appears to come from a source other than its actual source.
IP Spoofing
A boundary or connection point between two systems, components, or entities meet and interact with each other that works as per the expectation of the users to help new and seasonal staff learn even the most feature-rich system quickly.
Intuitive Interface
These types of systems are configured to both detect and prevent potential attacks on the IT environment and assets. Some of these are also designed to reconfigure other security mechanisms such as a firewall. These types of systems effectively limit damage to affected systems and must be appropriately configured to accept or deny network traffic correctly.
Intrusion Prevention Systems (IPS)
This is a type of software application that can be implemented on host operating systems or as a network device to monitor for signs of intruder activity and attacks. This software looks for suspicious activity and alerts administrators. A system that detects and identifies unauthorized or unusual activity on the hosts and networks; this is accomplished by the creation of audit records and checking the audit log against the intrusion thresholds. It detects break-ins or break-in attempts either manually or via software expert systems that operate on logs or other information available on the network.
Intrusion Detection System (IDS)
An IEEE Standard, RFC 2411, protocol that provides security capabilities at the Internet Protocol (IP) layer of communications. IPsec’s key management protocol is used to negotiate the secret keys that protect VPN communications, and the level and type of security protections that will characterize the VPN. The most widely used key management protocol is the Internet key exchange (IKE) protocol. IPsec is a standard consisting of IPv6 security features ported over to the current version of IP, IPv4. IPsec security features provide confidentiality, data integrity, and non-repudiation.
Internet Protocol Security (IPsec)
As stated on the IASB website(www.ifrs.org), the International Accounting Standards Board is an independent, not-for-profit, private-sector organization working in the public interest. Its principal objectives are:to develop a single set of high-quality, understandable, enforceable, and globally accepted International Financial Reporting Standards (IFRS) through its standard-setting body,to promote the use and rigorous application of those standards,to take account of the financial reporting needs of emerging economies and small and medium-sized entities (SMEs), andto bring about convergence of national accounting standards and IFRS to high-quality solutions.
International Accounting Standards Board (IASB)
Internal control over financial reporting (ICFR) is a process effected by those charged with governance, management, and other personnel, designed to provide reasonable assurance regarding the preparation of reliable financial statements in accordance with the applicable financial reporting framework and includes those policies and procedures that:pertain to the maintenance of records that, in reasonable detail, accurately and fairly reflect the transactions and dispositions of the assets of the entity;provide reasonable assurance that transactions are recorded as necessary to permit preparation of financial statements in accordance with the applicable financial reporting framework, and that receipts and expenditures of the entity are being made only in accordance with authorizations of management and those charged with governance; andprovide reasonable assurance regarding prevention, or timely detection and correction of unauthorized acquisition, use, or disposition of the entity’s assets that could have a material effect on the financial statements.ICFR has inherent limitations. ICFR is a process that involves human diligence and compliance and is subject to lapses in judgment and breakdowns resulting from human failures. ICFR also can be circumvented by collusion or improper management override. Because of such limitations, there is a risk that material misstatements will not be prevented, or detected and corrected, on a timely basis by ICFR.AU-C 940
Internal Control Over Financial Reporting (ICFR)
Internal controls are the policies and procedures established by management to provide reasonable assurance that its objectives will be achieved. These policies and procedures are categorized several ways:Accounting controlsAdministrative controls (management controls)Formal policies and directives such as board of director’s resolutions, office manuals, and written instructionsInformal policies and procedures such as oral directions from a supervisorImplicit policies and procedures such as unwritten and unspoken operating habits and standardsAccording to COSO (the Committee of Sponsoring Organizations of the Treadway Commission) in the research studyInternal Control—Integrated Framework:”Internal control is a process, effected by an entity’s board of directors, management and other personnel, which is designed to provide reasonable assurance regarding the achievement of objectives in one or more categories:”Effectiveness and efficiency of operations”Reliability of financial information”Compliance with applicable laws and regulations”Internal control consists of five interrelated components. These are derived from the way management runs a business, and are integrated into the management process. The components are:”Control Environment”Risk Assessment”Control Activities”Information and Communication”Monitoring Activities”
Internal Control
An internal audit is an examination of accounting records and other evidence to establish compliance with the entity’s policies and procedures. An internal audit is performed by an employee of the entity. (See “audit” for the definition of an external audit.)
Internal Audit
Interactive visualization tools allow the user to interact with data by drilling down into charts and graphics, changing the data, and observing the revised output.
Interactive Visualization
Integrity is the protection of data from unauthorized tampering. The system accomplishes its objectives in an unimpaired manner: processing is complete, accurate, timely, and free from unauthorized or inadvertent system manipulation.
Integrity (IT)
Inherent risk is the likelihood there are material misstatements before considering internal controls.
Integrity
Inherent risk is the likelihood there are material misstatements before considering internal controls.
Inherent Risk
Infrastructure as a service (IaaS) is a virtualized computer environment delivered as a service over the internet by a provider. Infrastructure can include servers, network equipment, and software. It is also called hardware as a service (HaaS).
Infrastructure as a Service (IaaS)
Information technology (IT) is any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency. For the purpose of the preceding sentence, equipment is used by an executive agency if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency which (1) requires the use of such equipment or (2) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The terminformation technologyincludes computers, ancillary equipment, software, firmware, and similar procedures, services (including support services), and related resources.
Information Technology (IT)
An information system is a collection of methods, practices, algorithms, and methodologies that transform data into information and knowledge desired and useful for individual and group users in organizations and other entities. It can involve a combination of work practices, information, people, and technologies organized to accomplish goals in an organization.
Information System
Aggregate of directives, regulations, rules, and practices that prescribes how an organization manages, protects, and distributes information.
Information Security Policy
The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.
Information Security
The ability to associate positively the identity of a user with the method and degree of accesses to a system.
Information and Communication
Information is necessary for the entity to carry out internal control responsibilities to support the achievement of its objectives. Management obtains or generates and uses relevant and quality information from both internal and external sources to support the functioning of internal control.Communication is the continual, iterative process of providing, sharing, and obtaining necessary information. Internal communication is the means by which information is disseminated throughout the organization, flowing up, down, and across the entity. It enables personnel to receive a clear message from senior management that control responsibilities must be taken seriously. External communication is twofold: It enables inbound communication of relevant external information and provides information to external parties in response to requirements and expectations.
Individual Accountability
To be independent is to be free from conflicts of interest and bias, self-governing, impartial, not subject to control by others, not requiring or relying on something else, not contingent, and acting with integrity and objectivity (i.e., with judgment that is unimpaired and without bias or prejudice).Independence Rule(ET 1.200.001): “A member in public practice shall be independent in the performance of professional services as required by standards promulgated by bodies designated by Council.” (ET 1.200.001.01)Independence is the cornerstone on which the audit, or attest, function of the accounting profession is based. It is the independence of the auditor that assures the public of the fair presentation of the audited financial statements. The audit opinion is the “Independent Auditor’s Report” (AU-C 600.A98 requires that the word “independent” appear in the title of the report).The auditor’s independence recognizes the need for fairness—fairness to the owners and managers of the company and also to creditors and those who may rely wholly or in part on the auditor’s report.Independence is the ability to act with integrity and objectivity andnotto compromise one’s judgment or conceal or modify an honest opinion. Auditors (both external and internal) must be capable of acting in an honest, unbiased fashion, maintaining the ability to use judgment free from influence by or subordination to the will, opinion, and judgment of others.The CPA must be independent not only infactbut also inappearance.This means both that a true conflict must not exist (the fact of independence) and that the appearance, or impression, of conflict must not exist (the appearance of independence). Hence, there must not be a compromise to the perception of the independence of the CPA in the mind of a reasonable observer, no matter how innocent the questionable circumstances may truly be. Any appearance of the lack of independence would erode the public’s confidence in the profession as quickly as the fact of a lack of independence.The “reasonable person” concept is applicable, i.e., whether or not a reasonable person, having all the facts and the normal strength of character, concludes that a specific relationship is lacking in independence, represents a conflict of interest, or is a threat to a CPA’s integrity or objectivity.
Independence
The income statement is a financial statement that shows an organization’s revenues and expenses for a defined period of time. The income statement is the financial statement used most often by investors as it provides information concerning the firm’s ability to sustain ongoing operations profitably. The income statement is also the statement that is most readily understood. The single-step income statement displays the net income from ordinary operations without intermediate calculations. The multi-step income statement uses intermediate steps such as gross profit in displaying the net income from ordinary operations.
Income Statement
The mitigation of violations of security policies and recommended practices.
Incident Handling
Implementation is the process of installing a computer. It includes selecting and installing the equipment, training personnel, establishing operating policies, and getting the software onto the system and functioning properly.
Implementation
Information that is unique within a security domain and that is recognized as denoting a particular entity within that domain.
Identity
Identification is the process that enables recognition of an entity by a system, generally by the use of unique machine-readable user names.
Identification
The native protocol of the web, used to transfer hypertext documents.
Hypertext Transfer Protocol (HTTP)
A hot site is a completely operational data processing facility configured to meet the user’s requirements that can be made available to a disaster-stricken organization on short notice.
Hot Site
The term “host” can refer to almost any kind of computer, from a centralized mainframe that is a host to its terminals, to a server that is host to its clients, to a desktop personal computer that is host to its peripherals. In network architectures, a client station (user’s machine) is also considered a host because it is a source of information to the network in contrast to a device such as a router or switch that directs traffic.
Host
Honeypots are computers that security administrators place as a trap for intruders. A honeynet is a combination of two or more networked honeypots. Honeypots are hosts that have no authorized users other than the honeypot administrators because they serve no business function; all activity directed at them is considered suspicious.
Honeypots
A computationally efficient algorithm that maps a variable-sized amount of text (input) into a fixed-sized output (hash value of 128-bit string). This type of algorithm produces a secure checksum for each message, making it almost impossible to change the message if the checksum is unknown. Hash functions are used in creating digital signatures.A function that maps a bit string or arbitrary length to a fixed length bit string. Approved hash functions satisfy the following properties:One-way—It is computationally infeasible to find any input that maps to any pre-specified output.Collision resistant—It is computationally infeasible to find any two distinct inputs that map to the same output.
Hash Function
Algorithm that creates a hash based on a message.
Hash Algorithm
A condensed representation of the message, called a message digest.
Hash
Hadoop is a free, open-source software framework that stores large amounts of data and rapidly runs applications on clusters of commodity hardware.
Hadoop
Generally accepted auditing standards (GAAS) are the Statements on Auditing Standards issued by the Auditing Standards Board (ASB), the senior committee of the AICPA designated to issue pronouncements on auditing matter for nonissuers. The Compliance with Standards Rule (ET 1.310.001) of the AICPA Code of Professional Conduct requires any AICPA member who performs an audit of a nonissuer to comply with the standards promulgated by the ASB.
Generally Accepted Auditing Standards (GAAS)
Generally accepted accounting principles (GAAP) are basic accounting principles and standards and specific conventions, rules, and regulations that define accepted accounting practice at a particular time by incorporation of consensus and substantial authoritative support.The Financial Accounting Standards Board (FASB)Accounting Standards Codification(Codification) is the source of authoritative generally accepted accounting principles (GAAP) recognized by the FASB to be applied by nongovernmental entities. Rules and interpretive releases of the Securities and Exchange Commission (SEC) under authority of federal securities laws are also sources of authoritative GAAP for SEC registrants. In addition to the SEC’s rules and interpretive releases, the SEC staff issues Staff Accounting Bulletins that represent practices followed by the staff in administering SEC disclosure requirements, and it utilizes SEC Staff Announcements and Observer comments made at Emerging Issues Task Force (EITF) meetings to publicly announce its views on certain accounting issues for SEC registrants. (FASB ASC 105-10-05-1)Accounting and financial reporting practices not included in the Codification are nonauthoritative. Sources of nonauthoritative accounting guidance and literature include, for example, the following:Practices that are widely recognized and prevalent either generally or in the industryFASB Concepts StatementsAmerican Institute of Certified Public Accountants (AICPA) Issues PapersInternational Financial Reporting Standards (IFRS) of the International Accounting Standards BoardPronouncements of professional associations or regulatory agenciesTechnical Information Service Inquiries and Replies included in AICPA Technical Practice AidsAccounting textbooks, handbooks, and articlesThe appropriateness of other sources of accounting guidance depends on its relevance to particular circumstances, the specificity of the guidance, the general recognition of the issuer or author as an authority, and the extent of its use in practice. (FASB ASC 105-10-05-3)
Generally Accepted Accounting Principles (GAAP)
The means of communicating between networks. It is designed to reduce the problems of interfacing different networks or devices. The networks involved may be any combination of local networks which employ different level protocols or local and long-haul networks.
Gateway
A functional item is one that performs the tasks or actions that it was created for. It is designed either to perform some task or action or to have a specific purpose. Functional is useful, practical, utilitarian, operative, serviceable, or working.
Functional
A flowchart is a graphic depiction, using uniform symbols to show the control flow, primary actions, and interrelationships of a task or a set of tasks. A flowchart can be created by a computer program, a computer system, the systems staff, or accountants and auditors.
Flowchart
Fixed assets are tangible (i.e., having physical substance), long-lived (more than one accounting period) assets held for and used in the operations of the enterprise which provide measurable future benefits. They represent a bundle of benefits acquired by the entity to be used over the life of the asset (which covers several accounting periods) and are recorded initially at acquisition cost, which is then allocated to the periods benefited through depreciation (except for land). There is a periodic charge to expense of that portion of the cost which was “consumed” in the form of benefits received from the use of the asset. Fixed assets areneverwritten up to reflect appraisal, market, or current values but are written down to reflect a permanent decline in usefulness to the net realizable value at that date (e.g., obsolete equipment). Fixed assets are also known as “capital assets,” and that term is customary for governmental accounting.The three general categories of capital assets are as follows:Nondepreciable (e.g., land)Depreciable (e.g., office buildings, factories, warehouses, equipment, machinery, tools, furniture, and fixtures)Depletable (e.g., timber, mineral, oil, and gas rights)For state and local governments, fixed assets are termed “general capital assets” and infrastructure assets such as sidewalks are also reportable as general capital assets. Capital assets are reported in government-wide financial statements but they are not reported in governmental funds.
Fixed Asset
A mechanism to protect IS computing sites against Internet-borne threats. It can be thought of as a pair of mechanisms: one that exists to block traffic and the other to permit traffic. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic.A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
Firewall
A financial statement is a structured representation of historical financial information, including related notes, intended to communicate an entity’s economic resources and obligations at a point in time or the changes therein for a period of time in accordance with a financial reporting framework.Financial statements ordinarily refer to a complete set of financial statements as determined by the requirements of the applicable financial reporting framework.
Financial Statements
A means to exchange files across a network.
File Transfer Protocol (FTP)
The aggregate of all processes and procedures in a system designed to inhibit unauthorized access, contamination, or elimination of a file.
File Protection
A field check is an edit check in which the characters in a field are examined to ensure they are of the correct field type (e.g., numeric data in numeric fields).
Field Check
Fault tolerant control is the ability of a processor to maintain effectiveness after some subsystems have failed. These are hardware devices or software products such as disk mirroring or server mirroring aimed at reducing loss of data due to system failures or human errors. This is a technical and preventive control and ensures availability control.
Fault Tolerant Control
The fair value of an investment is the amount that the asset could reasonably expect to receive for it in a current sale between a willing buyer and a willing seller, that is, other than in a forced or liquidation sale. Fair value shall be measured by the market price if there is an active market for the investment. If there is no active market for the investment but there is a market for similar investments, selling prices in that market may be helpful in estimating fair value. If a market price is not available, a forecast of expected cash flows, discounted at a rate commensurate with the risk involved, may be used to estimate fair value. The fair value of an investment shall be reported net of the brokerage commissions and other costs normally incurred in a sale.For tax purposes, the fair market value is usually referred to as the sale price between a willing seller and a willing buyer when neither is compelled to buy or sell.
Fair Market Value (FMV)
A fact table is a primary table in a dimensional model and contains measurements/facts and a foreign key to the dimension table.
Fact Table
Any observable occurrence in a network or system.
Event
The error log is the record of data input and data processing errors.
Error Log
Any participant in an authentication exchange, such a participant may be human or nonhuman, and may take the role of a claimant and/or verifier. It can be either a subject (an active element that operates on information or the system state) or an object (a passive element that contains or receives information).A collection of information items that can conceptually be grouped together and distinguished from their surroundings. An entity is described by its attributes. Entities can be linked, or have relationships to other entities.Either a subject (an active element that operates on information or the system state) or an object (a passive element that contains or receives information).
Entity
An enterprise resource planning (ERP) system integrates all aspects of an organization’s activities into one accounting information system.
Enterprise Resource Planning (ERP) System
In encryption, data is processed through a formula that substitutes other characters for the original characters, such as a = m, p = z, or e = k; thus, the word “ape” would be changed to “mzk.” Whenever data is encrypted, it must be decrypted to be used. Data may be encrypted so that it can be transmitted between computers to prevent interception of the data. Encryption is also used to store data so that others cannot read it.
Encryption
An emphasis-of-matter or other-matter paragraph is an additional paragraph(s) added to the standard auditor’s report to fulfill the need to add explanatory language to the report. The need for an emphasis-of-matter or other-matter paragraph may or may not affect the unmodified opinion.An “emphasis of matter” paragraph is included in the auditor’s report that is required by GAAS, or is included at the auditor’s discretion, and refers to a matter appropriately presented or disclosed in the financial statements that, in the auditor’s professional judgment, is of such importance that it is fundamental to the users’ understanding of the financial statements.An “other matter” paragraph is included in the auditor’s report that is required by GAAS, or is included at the auditor’s discretion, and refers to a matter other than those presented or disclosed in the financial statements that, in the auditor’s professional judgment, is relevant to the users’ understanding of the audit, the auditor’s responsibilities, or the auditor’s report.
Emphasis-of-Matter (and Other-Matter) Paragraph
Electronic data processing (EDP) is the use of automated methods to process data. EDP uses simple, repetitive activities to process large volumes of similar information.
Electronic Data Processing (EDP)
Efficiency is the relationship of inputs to outputs. It is performing in the least wasteful manner and is not necessarily accompanied by effectiveness. Efficient performance uses the appropriate (expected, standard, budgeted) quantity and cost of inputs (e.g., man-hours) to produce the output.
Efficiency
Effectiveness is the degree to which objectives are achieved; producing the desired effect or result. Effectiveness is not necessarily accompanied by efficiency.
Effectiveness
The unauthorized interception of information-bearing emanations through the use of methods other than wiretapping.
Eavesdropping
Each entity in a network, such as a computer, requires a uniquely identifiable network address for proper delivery of message information. DNS is a protocol used to manage name lookups for converting between decimal and domain name versions of an address. It uses a name-server (DNS server), which contains a universe of names called name-space. Each name-server is identified by one or more IP addresses. One can intercept and forge traffic for arbitrary name-nodes, thus impersonating IP addresses. Secure DNS can be accomplished with cryptographic protocols for message exchanges between name-servers.
Domain Name System (DNS)
In computing, documentation is the instructions for operators, descriptions of procedures, and other descriptive material about a program or a system. These instructions can be classified as administrative, systems, or operating.In systems analysis, documentation is the preparation and production of documents for system analysis, programming, and system operation. Good documentation is essential to system In auditing, documentation is the use of documentary evidence to support or substantiate a claim or opinion. Documentary evidence (in an accounting sense) includes checks, invoices, contracts, and minutes of meetings. Documentary evidence may also include third-party documents such as bank statements or escrow account balances held by banks. maintenance and modification.
Documentation
Distributed data processing is a network of interdependent computers where certain functions are centralized, other functions are decentralized, and processing is shared among two or more computers. It is an alternative to both centralization and decentralization. Distributed data processing provides infrastructure services that facilitate the rapid development, deployment, and management of distributed applications in the telecommunications arena and integrate all telecommunications management and control functions into a unified logical software architecture supported by a single distributed control platform.
Distributed Data Processing
The ongoing process of assessing the risk to mission/business as part of a risk-based approach used to determine adequate security for a system by analyzing the threats and vulnerabilities and selecting appropriate, cost-effective controls to achieve and maintain an acceptable level of risk.
Disk Management
A disk drive is a device equipped with one or more heads that read and write data.
Disk Drive
A means of restricting access to objects based on the identity and need-to-know of the user, process and/or groups to which they belong. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject. Compare to mandatory access control.
Discretionary Access Control (DAC)
A disclaimer of opinion is an expression ofnoopinion. (AU-C 700.03)A disclaimer of opinion is warranted when restrictions on the scope of the audit are so severe, whether client imposed or due to other reasons, that the auditors are unable to obtain sufficient appropriate audit evidence to enable them to form an opinion.Example:Instances of limitations on scope include the client’s refusal to allow the confirmation of receivables or the lack of a beginning inventory physical count (i.e., when the auditor is hired after the beginning of the fiscal year).It is only when the auditors are unable to overcome these limitations by other audit procedures that a disclaimer of opinion is warranted.A disclaimer of opinion because of a scope limitation requires modification of the standard auditor’s responsibility paragraph and, in all cases, the substantive reasons for the disclaimer should be explained in a separate emphasis-of-matter or other-matter paragraph.
Disclaimer of Opinion
A disaster recovery plan (or business continuity plan) is the process, policies, and procedures of restoring operations critical to the resumption of business, including gaining access to data (records, hardware, software, etc.), communications, workspace, and other business processes.
Disaster Recovery Plan
The dimension table contains the descriptive information about the numerical values in the fact table; in other words, the table contains the dimensions of a fact. They are joined to the fact table through a foreign key. For example, dimension tables for a customer application might include attributes such as customer_name, customer_address, customer_contact, and customer_preference.
Dimension Table
A cryptographic method, provided by public-key cryptography and used by a message’s recipient or any third party to verify the identity of the message’s sender and the integrity of the message. A sender creates a digital signature or a message by transforming the message with his private key. A recipient, using the sender’s public key, verifies the digital signature by applying a corresponding transformation to the message and the signature. Same as the electronic signature.The result of a cryptographic transformation of data that, when properly implemented, provides the services of origin authentication, data integrity, and signer nonrepudiation.A nonforgeable transformation of data that allows the proof of the source (with nonrepudiation) and the verification of the integrity of that data. Data that can be generated only by an agent that knows some secret key, and hence is evidence that such an agent must have generated it.An asymmetric key operation where the private key is used to digitally sign an electronic document and the public key is used to verify the signature. Digital signatures provide authentication and integrity protection.
Digital Signature
A detective control is a control that provides an alert after an unwanted event. A detective control is designed to catch an error and provide the feedback necessary so corrective action may be taken.Examples:Detective controls in a manual system would include independent account reconciliations or independent transaction authorization.Detective controls in an automated system would include batch total or hash total.
Detective Control
Detection risk is the risk that auditors fail to detect a material misstatement in financial statements.
Detection Risk
A denial-of-service attack bombards the receiving server with so much information that it shuts down, preventing legitimate users from accessing the service or resources they need.
Denial of Service (DOS)
In the decision-making process, a policy or course of action is selected from a set of possible or available alternatives. This process is the principal activity of management.
Decision-Making Process