ISC Vocabulary for Brainscape j Flashcards
Just-in-Time Manufacturing
Just in time (JIT) is a manufacturing philosophy intended to promote the simplest, least costly means of production. Under ideal conditions, the company would receive raw materials just in time to go into production, manufacture parts just in time to be assembled into products, and complete products just in time to be shipped to customers. JIT shifts the production philosophy from a “push” approach to a “pull” approach. It eliminates the storage of inventories at all stages of the production process.
Key
A long stream of seemingly random bits used with cryptographic algorithms. The keys must be known or guessed to forge a digital signature or decrypt an encrypted message.1. An input that controls the transformation of data by an encryption algorithm. It is a sequence of symbols that controls the operations of encryption and decryption.
Least Privilege
The principle that requires that each subject be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error, or unauthorized use.
Local Area Network (LAN)
A local area network (LAN) is a series of microcomputers linked together by cable and sometimes using a common storage device. This linkage allows the sharing of information and common processing. Two of the more common LAN configurations (structures) are ring and star. A star LAN structure has remote computers with direct access to a central computer. It looks like spokes connected to the hub. A ring LAN structure does not have a common hub, but it still can have a server. The LAN looks like a ring with each computer (node) connected to only two other computers.
Log
A log is a record of the operations of data processing equipment that lists each job run, the time it required, operator actions, and other pertinent data.
Logic Bomb
A logic bomb is a Trojan horse set to trigger at a particular condition, event, or command.
Logical Access
Logical access describes how security software works to restrict access to a computer’s data. This type of restricted access is called “logical access” because the computer’s software interprets information, such as user ID and password, to determine who can have access to the computer’s records.
Machine Learning
Machine learning (ML) is one application of artificial intelligence (AI), based around the idea that we should be able to give machines access to data and let them learn for themselves. For example, ML applications can read text and work out whether the person who wrote it is making a complaint or offering congratulations.
Malicious Code
Malicious code refers to programs that are written intentionally to carry out annoying or harmful actions. They often masquerade as useful programs or are embedded into useful programs so that users are induced into activating them. Types of malicious code include Trojan horses, computer viruses, and worms.1. A virus, worm, Trojan horse, or other code-based entity that infects a host.
Malware
Malware is a type of software designed to gain unauthorized access or to cause damage to a computer.
Management Information System (MIS)
A management information system (MIS) provides managers with the information they need for planning, organizing, decision making, and controlling the activities of the entity. The system may include the formal financial accounting records and can include many other information items needed by management.
Man-in-the-Middle Attack (MitM)
An attack on the authentication protocol run in which the attacker positions himself in between the claimant and verifier so that he can intercept and alter data traveling between them.
Mantrap
A mantrap is a physical security access control system comprised of a small space with two sets of interlocking doors.
Masquerading
An attempt to gain access to a computer system by posing as an authorized user. Synonymous with impersonation and mimicking.
Master File
A master file is used in electronic data processing and contains relatively permanent information used for reference and updated periodically.
Materiality
Information is material if omitting it or misstating it could influence decisions that users make on the basis of the financial information of a specific reporting entity. In other words, materiality is an entity-specific aspect of relevance based on the nature or magnitude or both of the items to which the information relates in the context of an individual entity’s financial report. Consequently, the FASB cannot specify a uniform quantitative threshold for materiality or predetermine what could be material in a particular situation.SFAC 8.3, QC11Materiality judgments are concerned with thresholds.Example:You would ask the following questions:Is an item of information, an omission, misstatement, or errorlargeenough, considering its nature and the attendant circumstances, that it is probable that the judgment of a reasonable person relying on the information would have been changed or influenced?Is the item important enough to matter?The relative, rather than absolute, size of the item determines whether or not it is material in a given situation. The auditor’s consideration of materiality is affected by the interaction of quantitative and qualitative factors.The concept of materiality is pervasive. It is related to the relevance and faithful representation of information and is critical to audit judgments regarding audit risk and disclosure.
Materially Misstated
A material misstatement is an untrue statement that misrepresents the facts and which, by its magnitude or nature, influences the decision making of the user. A misstatement or misrepresentation is “material” if it relates to a matter upon which a party could be expected to rely in determining to engage in the conduct in question. The party who relies could be the plaintiff in a lawsuit of an investor or other user of financial data.
Message Digest
The fixed size result of hashing a message.A cryptographic checksum, typically generated for a file that can be used to detect changes to the file; Secure Hash Algorithm-1 (SHA-1) is an example of a message digest algorithm.
Metadata
Metadata repositories store data about data and databases. The metadata describes the data source, how it was captured, and what it represents.
Middleware
Middleware is software that lies between an operating system and the applications running on it. It enables communication and data management for distributed applications, like cloud-based applications (e.g., web servers, application servers, and content management systems).
Mission-Critical System
A mission-critical system is a system supporting a core business activity or process.
Misstatement
A misstatement is a difference between the measurement or evaluation of the underlying subject matter and the appropriate measurement or evaluation of the underlying subject matter in accordance with (or based on) the criteria—for instance, a difference in amount, classification, presentation, or disclosure of a reported financial statement item and the amount, classification, presentation, or disclosure that is required for the item to be presented fairly in accordance with an applicable financial reporting framework. Misstatements can arise from fraud or error. Misstatements can be intentional or unintentional, qualitative or quantitative, and include omissions. (AU-C 200).In certain engagements, a misstatement may be referred to as adeviation, exception,orinstance of noncompliance.(AT-C 105.10)
Modem
A modem is an electronic device that allows a computer terminal to send its electronic signals via an audio signal over a telephone line. Using a modem, one computer can communicate with another by phone.The word “modem” is derived from the contraction of “modulator” and “demodulator.” In the modem, the modulator converts digital pulses, characteristic of a computer’s output, to audio tones capable of being transmitted over a common telephone line. A demodulator in the modem reverses the process at the receiving end.
Monitoring Activities
Monitoring is one of the key components of the COSOInternal Control – Integrated Framework.Ongoing evaluations, separate evaluations, or some combination of the two are used to ascertain whether each of the five components of internal control, including controls to effect the principles within each component, is present and functioning. Ongoing evaluations, built into business processes at different levels of the entity, provide timely information. Separate evaluations, conducted periodically, will vary in scope and frequency depending on assessment of risks, effectiveness of ongoing evaluations, and other management considerations. Findings are evaluated against criteria established by regulators, standard-setting bodies, or management and the board of directors, and deficiencies are communicated to management and the board of directors as appropriate.