ISC Vocabulary for Brainscape a-i testing Flashcards
Refers to sending a network packet that appears to come from a source other than its actual source.
IP Spoofing
A boundary or connection point between two systems, components, or entities meet and interact with each other that works as per the expectation of the users to help new and seasonal staff learn even the most feature-rich system quickly.
Intuitive Interface
These types of systems are configured to both detect and prevent potential attacks on the IT environment and assets. Some of these are also designed to reconfigure other security mechanisms such as a firewall. These types of systems effectively limit damage to affected systems and must be appropriately configured to accept or deny network traffic correctly.
Intrusion Prevention Systems (IPS)
This is a type of software application that can be implemented on host operating systems or as a network device to monitor for signs of intruder activity and attacks. This software looks for suspicious activity and alerts administrators. A system that detects and identifies unauthorized or unusual activity on the hosts and networks; this is accomplished by the creation of audit records and checking the audit log against the intrusion thresholds. It detects break-ins or break-in attempts either manually or via software expert systems that operate on logs or other information available on the network.
Intrusion Detection System (IDS)
An IEEE Standard, RFC 2411, protocol that provides security capabilities at the Internet Protocol (IP) layer of communications. IPsec’s key management protocol is used to negotiate the secret keys that protect VPN communications, and the level and type of security protections that will characterize the VPN. The most widely used key management protocol is the Internet key exchange (IKE) protocol. IPsec is a standard consisting of IPv6 security features ported over to the current version of IP, IPv4. IPsec security features provide confidentiality, data integrity, and non-repudiation.
Internet Protocol Security (IPsec)
As stated on the IASB website(www.ifrs.org), the International Accounting Standards Board is an independent, not-for-profit, private-sector organization working in the public interest. Its principal objectives are:to develop a single set of high-quality, understandable, enforceable, and globally accepted International Financial Reporting Standards (IFRS) through its standard-setting body,to promote the use and rigorous application of those standards,to take account of the financial reporting needs of emerging economies and small and medium-sized entities (SMEs), andto bring about convergence of national accounting standards and IFRS to high-quality solutions.
International Accounting Standards Board (IASB)
Internal control over financial reporting (ICFR) is a process effected by those charged with governance, management, and other personnel, designed to provide reasonable assurance regarding the preparation of reliable financial statements in accordance with the applicable financial reporting framework and includes those policies and procedures that:pertain to the maintenance of records that, in reasonable detail, accurately and fairly reflect the transactions and dispositions of the assets of the entity;provide reasonable assurance that transactions are recorded as necessary to permit preparation of financial statements in accordance with the applicable financial reporting framework, and that receipts and expenditures of the entity are being made only in accordance with authorizations of management and those charged with governance; andprovide reasonable assurance regarding prevention, or timely detection and correction of unauthorized acquisition, use, or disposition of the entity’s assets that could have a material effect on the financial statements.ICFR has inherent limitations. ICFR is a process that involves human diligence and compliance and is subject to lapses in judgment and breakdowns resulting from human failures. ICFR also can be circumvented by collusion or improper management override. Because of such limitations, there is a risk that material misstatements will not be prevented, or detected and corrected, on a timely basis by ICFR.AU-C 940
Internal Control Over Financial Reporting (ICFR)
Internal controls are the policies and procedures established by management to provide reasonable assurance that its objectives will be achieved. These policies and procedures are categorized several ways:Accounting controlsAdministrative controls (management controls)Formal policies and directives such as board of director’s resolutions, office manuals, and written instructionsInformal policies and procedures such as oral directions from a supervisorImplicit policies and procedures such as unwritten and unspoken operating habits and standardsAccording to COSO (the Committee of Sponsoring Organizations of the Treadway Commission) in the research studyInternal Control—Integrated Framework:”Internal control is a process, effected by an entity’s board of directors, management and other personnel, which is designed to provide reasonable assurance regarding the achievement of objectives in one or more categories:”Effectiveness and efficiency of operations”Reliability of financial information”Compliance with applicable laws and regulations”Internal control consists of five interrelated components. These are derived from the way management runs a business, and are integrated into the management process. The components are:”Control Environment”Risk Assessment”Control Activities”Information and Communication”Monitoring Activities”
Internal Control
An internal audit is an examination of accounting records and other evidence to establish compliance with the entity’s policies and procedures. An internal audit is performed by an employee of the entity. (See “audit” for the definition of an external audit.)
Internal Audit
Interactive visualization tools allow the user to interact with data by drilling down into charts and graphics, changing the data, and observing the revised output.
Interactive Visualization
Integrity is the protection of data from unauthorized tampering. The system accomplishes its objectives in an unimpaired manner: processing is complete, accurate, timely, and free from unauthorized or inadvertent system manipulation.
Integrity (IT)
Inherent risk is the likelihood there are material misstatements before considering internal controls.
Integrity
Inherent risk is the likelihood there are material misstatements before considering internal controls.
Inherent Risk
Infrastructure as a service (IaaS) is a virtualized computer environment delivered as a service over the internet by a provider. Infrastructure can include servers, network equipment, and software. It is also called hardware as a service (HaaS).
Infrastructure as a Service (IaaS)
Information technology (IT) is any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency. For the purpose of the preceding sentence, equipment is used by an executive agency if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency which (1) requires the use of such equipment or (2) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The terminformation technologyincludes computers, ancillary equipment, software, firmware, and similar procedures, services (including support services), and related resources.
Information Technology (IT)
An information system is a collection of methods, practices, algorithms, and methodologies that transform data into information and knowledge desired and useful for individual and group users in organizations and other entities. It can involve a combination of work practices, information, people, and technologies organized to accomplish goals in an organization.
Information System
Aggregate of directives, regulations, rules, and practices that prescribes how an organization manages, protects, and distributes information.
Information Security Policy
The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.
Information Security
The ability to associate positively the identity of a user with the method and degree of accesses to a system.
Information and Communication
Information is necessary for the entity to carry out internal control responsibilities to support the achievement of its objectives. Management obtains or generates and uses relevant and quality information from both internal and external sources to support the functioning of internal control.Communication is the continual, iterative process of providing, sharing, and obtaining necessary information. Internal communication is the means by which information is disseminated throughout the organization, flowing up, down, and across the entity. It enables personnel to receive a clear message from senior management that control responsibilities must be taken seriously. External communication is twofold: It enables inbound communication of relevant external information and provides information to external parties in response to requirements and expectations.
Individual Accountability
To be independent is to be free from conflicts of interest and bias, self-governing, impartial, not subject to control by others, not requiring or relying on something else, not contingent, and acting with integrity and objectivity (i.e., with judgment that is unimpaired and without bias or prejudice).Independence Rule(ET 1.200.001): “A member in public practice shall be independent in the performance of professional services as required by standards promulgated by bodies designated by Council.” (ET 1.200.001.01)Independence is the cornerstone on which the audit, or attest, function of the accounting profession is based. It is the independence of the auditor that assures the public of the fair presentation of the audited financial statements. The audit opinion is the “Independent Auditor’s Report” (AU-C 600.A98 requires that the word “independent” appear in the title of the report).The auditor’s independence recognizes the need for fairness—fairness to the owners and managers of the company and also to creditors and those who may rely wholly or in part on the auditor’s report.Independence is the ability to act with integrity and objectivity andnotto compromise one’s judgment or conceal or modify an honest opinion. Auditors (both external and internal) must be capable of acting in an honest, unbiased fashion, maintaining the ability to use judgment free from influence by or subordination to the will, opinion, and judgment of others.The CPA must be independent not only infactbut also inappearance.This means both that a true conflict must not exist (the fact of independence) and that the appearance, or impression, of conflict must not exist (the appearance of independence). Hence, there must not be a compromise to the perception of the independence of the CPA in the mind of a reasonable observer, no matter how innocent the questionable circumstances may truly be. Any appearance of the lack of independence would erode the public’s confidence in the profession as quickly as the fact of a lack of independence.The “reasonable person” concept is applicable, i.e., whether or not a reasonable person, having all the facts and the normal strength of character, concludes that a specific relationship is lacking in independence, represents a conflict of interest, or is a threat to a CPA’s integrity or objectivity.
Independence
The income statement is a financial statement that shows an organization’s revenues and expenses for a defined period of time. The income statement is the financial statement used most often by investors as it provides information concerning the firm’s ability to sustain ongoing operations profitably. The income statement is also the statement that is most readily understood. The single-step income statement displays the net income from ordinary operations without intermediate calculations. The multi-step income statement uses intermediate steps such as gross profit in displaying the net income from ordinary operations.
Income Statement
The mitigation of violations of security policies and recommended practices.
Incident Handling
Implementation is the process of installing a computer. It includes selecting and installing the equipment, training personnel, establishing operating policies, and getting the software onto the system and functioning properly.
Implementation