IT Flashcards

1
Q

Elements of Accounting Systems

A
  1. People
  2. Procedures
  3. Hardware
  4. Software
  5. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risks in Computer-Based Systems

A
Systems, programs and people (FUNI)
•Reliance on FAULTY systems or programs
•UNAUTHORIZED changes in master files, systems, or programs
•Failure to make NEEDED changes
•Inappropriate INTERVENTION (by people)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COBIT purpose

A

Align IT and business goals/strategies

Link business risks, control needs and IT

Common language for users, auditors, management, and business process owners in identifying risks and structuring controls.

Determine how much to invest in IT control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COBIT Framework Defined

A

To provide the information that the organization needs to achieve its objectives, IT resources needed to be managed by a set of naturally grouped processes.

Process orientation to exercise responsibilities, achieve goals and manage risks.

CIRCLE (a) IT processes (b) Business requirements (c) IT resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COBIT Information Attributes

A
  1. Effective
  2. Efficient
  3. Confidential
  4. Integrity
  5. Available
  6. Compliant
  7. Reliable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COBIT and COSO

A

Both concerned with monitoring of organizational processes

FOCUS:
•COSO: organizational control and processes
•COBIT: IT controls and processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to the COBIT model, identify 5 physical resources that, together, comprise an IT system

A
  1. People
  2. Applications
  3. Technology
  4. Facilities
  5. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

According to the COBIT model, what are the four IT domains?

A
  1. Planning and organization
  2. Acquisition and implementation
    •the process of identifying automated solutions.
  3. Delivery and support
    •the process of ensuring security and continuous service.
  4. Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three major components of the COBIT model?

A
  1. Domains and processes
  2. Information criteria
  3. IT resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ERP Goals

A
  • Integration (goal visibility): Integrate all data into 1 data base with user-Defined views
  • Cost Savings: decrease system maintenance costs (only one system to maintain)
  • Employee Empowerment: Improves Communication and decision making by increasing information availability
  • “Best Practices”: include most successful business processes of an industry.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Enterprise Architecture Defined

A

An organizations enterprise architecture is its efforts to understand, manage, and plan for IT assets. An organizations IT security governance plan must articulate with, and be informed by, the organizations enterprise architecture plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Enterprise-Wide or Enterprise Resource Planning (ERP) Systems Defined

A

ERPS provide transaction processing, management support, and decision-making support in a single, integrated, organization-wide package. By integrating all data and processes of an organization into a unified system, ERPs attempt to manage and eliminate the organizational problem of consolidating information across departments, regions, or divisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Online Transaction Processing (OLTP) System

A

The modules comprising the core business functions: sales, production, purchasing, payroll, financial reporting, etc. These functions collect the operational day for the organization and provide the fundamental motivation for the purchase of an ERP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Online analytical Processing (OLAP) System

A

Incorporates data warehouse and data mining capabilities within the ERP.

*provides an integrated view of transactions in all parts of the system.

•primarily concerned with collecting data (not analyzing it) across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PaaS Defined

A

The use of the cloud to CREATE (not access) software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SaaS Defined

A

The use of the cloud to ACCESS software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Three important functions (segregate) of IT department rolls

A
  1. Application Development: SAFEGUARD ASSETS (applications in development)
  2. Systems Administration and Programming: Grant AUTHORIZATION (access)
  3. Computer Operations: EXECUTE events, safeguard archived IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Segregation of Duties: Data Control (Clerk)

A

Control document flows, schedule batches for data entry and editing, reconcile control totals (reconciling + authorizing function)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Segregation of Duties: Computer Operators

A

Operate the (mainframe) computer, load program and data files, run programs (execute transactions)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Segregation of Duties: File Librarian

A

Maintain files and data that are not online in file library, check files in and out to support scheduled jobs. Should not have access to operating equipment or data outside of library.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Inadequate Scope and Agility

A

IT investments in business units, inadequately scaled to meet changing business needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Digitization Defined

A

Moving data to electronic form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Governance Defined

A

The processes and structures, to oversee the activities of the organization in pursuit of organizational objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Oversight Defined

A

Process of managing and monitoring an organizations operations to achieve internal control and effectively manage risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Product Differentiation Defined

A

Setting your product apart from your competitors’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Common Problems with IT Investments

A
  • Lack of IT strategic focus - many IT investments are “bottom up”.
  • Lack of strategic investment - over-investment in existing businesses and inadequate investment in “transformative” technologies.
  • Inadequate scope and agility - IT investments in business units, inadequately scaled to meet changing business needs.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Governance is primarily the responsibility of

A

THE BOARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Operational, Transaction Processing, Systems (TPS)

A

Support large volume, day-to-day activities of business.
•purchasing of goods/svcs, mfg activities, sales to customers, cash collections, payroll.
Transaction types
•Non-financial (placing orders for goods, accepting orders from customers)
•Financial (billing a customer, receiving pmt, paying employees)

GENERATE DEBIT AND CREDIT ENTRIES INTO ACCOUNTS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Knowledge Management Systems (KM)

A

Components:

Knowledge base, knowledge database, provides means to collect, organize, and develop relations among information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Management Information System (MIS)

A

Support routine, lower to mid level management.

  • Primarily synthesize (analyze) data from TPSs (internal data)
  • Tasks: structured problems

Ex: compare planning info (budgets, forecasts) data with outcomes. , AR Aging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Accounting Information System (AIS) is a subset of:

A

Management Information Systems (MIS)

•AIS generated debits and credits (ex: A/R transactions – aging)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Decision Support Systems (DSS)

A

Support mid and upper level management.

Tasks: manage non-routine problems and long-range planning.

Often integrate external (market-level) with TPS data.

Include significant analytical and statistical capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Two types of DSS (decision support systems)

A

DATA DRIVEN: process large amounts of data to find relations and patterns. Ex: data warehousing and data mining.

MODEL DRIVEN: use models to forecast outcomes, model-driven analytics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

DSS Examples Used by Audit Firms

A

Client risk Assessment

Client acceptance and retention

Internal control documentation and testing

Compute audit sample sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Group Support Systems (GSS)

A

Facilitate group collaboration

May include functions such as calendars, meeting scheduling, and document sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Executive Support Systems (ESS) or Strategic Support Systems (SSS)

A
Similar to DSS
•Support forecasting and long-range, strategic decisions
•Greater use of external data
•primarily to support top management.
•DSS for dummies 

•can be for a specific purpose (monitoring competitive price)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Flat File Systems

A

Early IT Systems
Separate programs and data sheets

Each application has separate data and programs (think going into multiple places to change the same thing)
•Data sharing across applications through separate programs
•Select data records from one application and reformat for other application.
•data redundancies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Database Systems

A

Pool data into logically related files (the database).

MIS always implemented into a database environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Data Warehouses and Mining

A

System to collect, organize, integrate, and store entity-wide data.

Easy access to large quantities of varied data from across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Data Mining

A

Exploration, aggregation, and analysis of data in the data warehouse using analytical tools and exploratory techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Data Warehousing

A

Relational data of archived operational transactions and other data.

Often incorporated in a data-driven DSS

May include external data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Drill Down

A

Move from summary to detailed information.

Associated with data warehouses
Ability to move from summary to granular information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Slicing and Dicing

A

View data in multiple ways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

A specialized version of a data warehouse

A

A data mart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Bit

A

Binary digit

Zero or one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Byte

A

Logical grouping of bits

Must be to the power of 2 (2^n)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Field (attribute)

A
  • logical group of bytes
  • identify a characteristic or attribute of an entity (invoice, customer, product, etc)
  • in databases, fields are also known as “attributes”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Record

A
  • a group of related fields (attributes)

* describe an example of an entirety (a specific invoice, a particular customer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

File (Table)

A

•collection of related records for one specific entity ( an invoice file, a customer file, a product file)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Database

A

A set of logically related files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Systems Software

A

Programs that run computer and support system management (operating system is more important)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Programming Languages

A
  • Used to create applications.
  • Now, most are “third” or “fourth generation” languages, many are object-oriented programming languages (OOPL) (Ex: Java)
  • All must be converted to “first generation” language (Ex: 0s and 1s) (from source to object code)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Application Software

A

End-user programs that you know and love.

Categories:
General (word processors, spreadsheets, databases)
Specific (a marketing IS for a clothing designer)

Runs on a specific operating system and hardware environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Operating System

A
  • Interface between user and hardware.
  • Defined what commands can be issued and how (typing in a command, pointing and clicking) Ex: Microsoft, Mac.
  • Controls all input and output in computer systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Database Management System (DBMS)

A

“Middleware” program (between the Software and hardware, or application software and operating system)

Manages the database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Data Definition Language (DDL)

A
  • User can define tables and fields and relations among the tables
  • Uses meta-data (data about data) to define the database elements
  • Example commands: create, drop, alter (of fields and tables)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Data Manipulation Language (DML)

A
  • User can add, delete or update records

* Example commands: update, insert, delete (of records)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Data Query Language (DQL)

A
  • User can extract information.
  • Most relational databases use structured query language (SQL) to extract fat (text approach)
  • Query-By-Example (QBE): graphic interface with “drag and drop” fields to create query (graphic approach)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Database Controls - DBMS includes:

A
  • No collisions - concurrent access management (only one person in at a time)
  • No hackers or creepers - Access controls
  • Data definition standards, data element standards
  • Backup and recovery procedures
  • Update privileges
  • Data elements and relationship controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Inputs and Output terminology

A

Peripherals = input and output devices = I/O devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Input devices

A

Input devices instruct the CPU and supply data to be processes.

Ex: keyboard, mouse, trackball, touch-screen technology, microphones and voice recognition technology, point of sale (POS) scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Output devices

A

Transfer data from the processing unit to other formats.

  • printers,plotters–paper output
  • monitors, flat panel displays, CRT (cathode ray tube) displays–visual output
  • speakers, voice output communication aids (VOCAs)–auditory output
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Central Processing Unit (CPU)

A

CONTROL UNIT: interprets program instructions

ARITHMETIC LOGIC UNIT (ALU): performs arithmetic calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Primary storage (main memory)

A

Stores programs and data when in use.

  1. Random Access Memory (RAM)– stores data temporarily (information in process in computer system)
  2. Read-Only Memory (ROM)– permanently stores data needed by computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Solid State Drivers (SSDs)

A

Form of secondary storage.

Flash drives, USB, jump, thumb drives

No moving parts. Similar to the RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Server

A

A computer that provides resource on a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Computer hardware

A

Physical equipment of the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

How does system capture data and update master file? Two primary methods.

A
  1. Batch: group transactions for processing (then are sorted into item number sequence)
  2. On-line, real-time (OLRT): Continuous, immediate Processing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Batch Processing

A

Transaction and mater files must be sorted on a common key
•Low volume, periodic transactions. Transactions are independent or unimportant.
•Called “sequential-access files” because the records are in sequence.
•Alternative is “random-access files” (ex: hardware storage devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

On-Line, Real-Time (OLRT) Processing

A

Continuous, immediate transaction processing.

Near simultaneous transaction entry and master files updating.

Requirements: random access storage devices, networked computer system or internet.

•single transaction, random processing technology, immediate update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Point-of-Sale (POS) System Technology

A

Scanners capture data from product bar codes (fast, accurate, cheap)

Computer system connected to, or integrated with, electronic cash register.

POS Systems or terminals networked to central computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Big Data

A

Creation, analysis, storage and dissemination of extremely large data sets.

•Feasible due to advances in computer storage technologies (ex: the cloud), advanced data analytics, and massive computing power.

Gartner definition: “high volume, velocity, and/or variety Information assets that demand new, innovative forms of processing for enhanced decision making, business insights or process optimization.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Dark Data

A

Data from business activities that may be reused in analytics, business relationships, or directly monetized (sold).

Activity, operational or social media data that is unused or underused.

Sometimes a synonym for “meta-data” (data about data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

IaaS

A

Use of the cloud to access HARDWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Role of the systems analyst in an IT environment

A

Designing systems, prepares specifications for programmers, and serves as intermediary between users and programmers.

•should not have access to an entity’s data in a large firm. (Violation of segregation of duties)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Database administrator

A

Responsible for establishing user names and authorizing access to specific data files and fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

IT security principles: 5 trust services principles

A
  1. Security
  2. Availability (is the system operational and useable as specified in commitments and agreements? Do I/Cs support system availability?)
  3. Processing integrity (concerns the completeness, validity, accuracy timeliness and authorization of system processing)
  4. Confidentiality (is the information protected consistent with the orgs commitment in agreements?)
  5. Privacy (does the Systems collection, use, retention, disclosure, etc followed)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

10 GAPP (Generally Accepted Privacy Principles)

A
  1. Management (accountability)
  2. Notice (tell others of policies and procedures)
  3. Choice and consent (US= users can opt out of collection of personal info)
  4. Collection (only for identified purposes)
  5. Use and retention (consistent with statements about use - retain only as long as needed or by law)
  6. Access (people can access, review and update their info)
  7. Disclosure to third parties (according to policy)
  8. Security for privacy (protect against unauthorized access)
  9. Quality (personal info is accurate, complete and relevant)
  10. Monitoring and enforcement (monitors the entities compliance)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

IT security is not just The responsibility of the IT department but also

A

A top management issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Categories of Criteria for assessing achievement of IT security principles

A
  1. Organization and management
  2. Communications
  3. Risk management and design implementation of controls
  4. Monitoring of controls
  5. Logical and physical access controls
  6. System operations
  7. Change management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Time-Based Model of Controls

A

Given enough time and resources, preventive control can be circumvented.

Accordingly, detection and correction must be timely.

P=time it takes an intruder to break through the organizations preventive controls
D=time it takes to detect that Ana track is in progress
C=time to respond to the attack

If P > (D+C), then security procedures are effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Defense-in-depth Strategy

A

The strategy of implementing multiple layers of controls to avoid having System break down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Cyber-Risk Assessment: COSO Principle 6

A

Organization specifies objectives with sufficient clarity to enable identification and assessment of risks relating to objectives.

Assessing cyber risks begins with understanding the value of information systems to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Risk identification and Fraud: COSO Principles 7 & 8

A

Principle 7: Organization identifies, analyzes and manages risks.

Principle 8: Organization considers fraud risks.

Assess likelihood and severity of cyber risk impact.

Consider industry-specific attack.

*initiative should be lead by senior management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

COSO principle 9

A

Organization identifies and assesses changes that could impact internal control.

Risks; Rapidly changing technologies and amber criminals’ quick adaption to changes yield new methods of exploiting vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Control Activities to address cyber risks: COSO principles 10, 11, 12

A

10: Organization selects and develops control activities that contribute to mitigate risks.
11: Organization selects and develops general control activities over technology to support the achievement of objectives.
12: Organization deploys control activities through policies that establish expectations and procedures that implement policies.
* control activities related to cyber risks should relate to the organizations’ objectives and cyber risk profile. (Ex: defense-in-depth Approach. Manage cyber risks through careful design and implementation of controls)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Communicating about cyber risks and controls: principle 13

A

Organization obtains, generated and uses relevant, quality information to support internal control.
•Information needs follow from cyber risk Assessment and control design processes.
•Formally document information requirements to support processes and controls.
•Availability of “big data” can create information overload problems.
•Transform control system data into actionable, high-quality information to support cyber-related controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Communicating about cyber risks and controls: principle 14

A

Organization internally communicates information, including objectives and responsibilities for internal control, necessary to support internal control functioning.

•Communication about cyber risks should include all personnel, personnel responsible for managing and monitoring cyber risks and controls, and the Board of Directors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Communicating about cyber risks and controls: principle 15

A

Organization communicates with external parties regarding internal control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Define Cybercrime

A

Illegal activity that used a computer as its means of communication, or in which a computer is the target of the crime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Define cyber risk

A

The likelihood of a financial loss, a disruption or damage to an organization form failure of, or an attack on, it’s IT Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

All policies, including IT policies, should….

A

Link to entity’s strategy and objectives.

Need a process for evolving with change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

IT Policies: according to COSO

A
  • Policies central to internal control
  • Reflect managements intentions regarding actions
  • Procedures are actions to implement policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Important IT Policies

A
  1. Values and Service Culture: what is expected of IT function personnel in interactions with clients and others?
  2. Contractors, Employees and Sourcing: why, when and how entity selects IT Human Resources from employees vs. outside contractors.
  3. Electronic Communications Use: policy related to employee use of the internal, intranet, email, blogs, chat rooms and telephones.
  4. Use and Connection Policy: Entity’s position on the use of personal devices and applications in workplace and connection to the entity’s systems.
  5. Procurement: policy on procurement processes for obtaining IT services.
  6. Quality: statement of IT performance standards
  7. Regulatory Compliance: statement of regulatory requirements for IT systems.
  8. Security: policy related to guarding against physical or electronic threats to IT. May include disaster recovery preparation policies.
  9. Service management and operational service problem solving: policies for ensuring quality of live IT services.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

E-Commerce

A

Marketing, buying, and selling of products and services via the internet

  • Narrower -> Transactions between organization and trading partners.
  • Business-to-business (B2B) ecommerce: the electronic processing of transactions between businesses. (ex: Processing of business transactions, electronic data interchange (EDI), supply chain management (SCM) and EFT

•Business-to-consumer (B2C) ecommerce: selling goods and services to consumers, usually on Internet and web-based technology.
•Relies on intermediaries or brothers to
facilitate the sales transaction (eBay)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

E-Business

A

Used internet to improve business performance through connectivity.

  • Business process that relies on electronic dissemination of information or automated transaction processing.
  • can be within or between organizations.
  • Most via the Internet using web-based technology’s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

E-commerce example (B2E)

A

Business-to-employee e-commerce: sharing information and interacting with employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

E-commerce example: B2G

A

Business-to-government e-commerce: contract bidding, property disposal, audit procurement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

E-Commerce Risks

A
  • availability/downtime
  • privacy, security and confidentiality
  • authentication and nonrepudiation (after the fact, can’t claim that transaction never occurred)
  • integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Risks of Failing to Implement EC

A
  1. Customers go elsewhere
  2. Limited growth
  3. Limited markets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

E-Commerce Business Models

A
  1. E-marketplaces and exchanges
  2. Viral marketing
  3. Online direct marketing
  4. E-rendering Systems (putting out bids for products we need?)
  5. Social networking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

E-Commerce depends on trust in two parties.

A
  1. Trading partner

2. The trading site or service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Identify five risks of e-commerce

A
  1. Risk of System unavailability
    •availability/downtime
  2. Privacy, security and confidentiality risks
  3. Authentication risks
  4. Nonrepudiation risks
  5. System integrity risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

E-Procurement

A

Where a company seeks bids to provide a product or service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Customer Relationship Management (CRM)

A

Technologies for managing client e-relationships.

Ex: customer data, profitability, personalized marketing

Database of customer data
•sales force automation: tracking contacts and follow-ups

Marketing automation: “triggered” marketing (ex: Kroger promoting grocery products only to interested customers)

Customer service automation
•customer service automation: automating common customer interactions

Analytics
•sales history and projections, marketing campaign success, trends, and performance indicators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Electronic Data interchange (EDI)

A
  • computer-to-computer exchange of business data.
  • structured data and processing protocols to reduce costs and speed processing (purchase orders, confirmations, invoices, etc.)
  • facilitates JIT (just-in-time) inventory
  • ex: Walmart and suppliers (direct EDI connections)
  • often, direct links between trading partners through intermediaries (called “service bureaus” or VANs)
    • Most EDI transactions on Value Added Networks (VANs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Value Added Networks (VANs) provide…

A

Audit trails, controls, and security

Often used in conjunction with EDIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

EDI alternatives

A

Translation software converts between standardized EDI format and internal company format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

EDI Benefits

A
  • paperless (saves storage, filing, process costs
  • zero data entry
  • reduce errors in information exchange
  • required by customers (ex: Walmart can force supplies to adopt a system comparable to theirs)
  • real time data, no delays (faster invoicing and payments)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

E-Banking

A

•demanded by customers

•management of e-banking requires:
    Senior management of BoD oversight
    Technology under Senior IT leadership
    Operational management
       monitoring and measuring risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Electronic Funds Transfer (EFT)

A

Technology for electronically transferring money.

Increase speed and reduce cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Electronic Wallets

A

Not payment systems

Programs for managing credit cards, user names, passwords and address information in easy-to-use, centralized location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Supply Chain Management (SCM)

A

Process of transforming raw materials into finished product and delivering goods.

Process of planning, implementing, and controlling supply chain operations

SCM OFTEN INCLUDES EDI (ex: Walmart)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Risk: Unauthorized Cloud Activity

Response = ?

A

Preventive and detective controls to prevent unauthorized procurement of cloud services.
•a cloud use policy that articulates how, when, and for what uses, cloud computing is allowed.
•a list of approved cloud vendors

Policy: who can contract for cloud services and under what conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Risk: Lack of Cloud Service Provider (CSP) Transparency

Response = ?

A

Vendor selection & assessment of CSP controls

  • approved list of cloud vendors includes only vendors who provide sufficient info to enable informed risk assessments of the integrity of CSP operations.
    * list of required info from CSP may depend on type of service provided (IAAS, SAAS, PAAS)
116
Q

Risk: CSP Reliability and Performance

Response = ?

A

Effective incident management plan and procedure.

Contract with backup CSPs in case of system failure with primary CSP.

Implement CSP availability monitoring.

117
Q

Risk: Cyber-Attack

Response = ?

A

Incident management plan that considers increased likelihood of attack on CSP.

118
Q

Define Cloud Computing

A

Using a network of remote servers hosted on the Internet to store, manageC and process data, rather than a local server or in-house network.

119
Q

What is a CSP?

A

Cloud service providers offer network services, infrastructure, or business applications in the cloud.

Hosted in a data center than can be accessed by companies or individuals using network connectivity.

120
Q

End-User Systems Development Risks

A
  • No knowledge or application of SDLC (systems development life cycle).
  • Not integrated with existing systems
  • Inadequate system testing and documentation.
  • Poor data controls, system design
  • Poor integration with existing systems.
  • Management may rely on these systems without knowing their risks.
121
Q

Small Business Environment (SBE) Characteristics

A
  • Exclusively microcomputers
  • No centralized IT department (outsourced IT?)
  • Poor segregation of Duties (incompatible functions often combined)
122
Q

Controlling SBE Computing Risks

A

Physical access: unprotected Computing site(s)?
•Give > attention to locked doors & secure storage

Logical (electronic) access: require UNs and strong PWs, automatic log outs

Data Backup: outsource, or, establish

123
Q

How to consolidate data from multiple locations? (3 approaches)

A
  1. Centralized system
    •data and processing at central location.
  2. Decentralized system
    •individual location processing and data
  3. Distributed (hybrid) database system
    •distribute to locations according to need
124
Q

Centralized System

A

All data processing at one location. Users access via telecommunications channel

ADVANTAGES: enables better data security, consistency in processing.

DISADVANTAGES: high transmission costs, input/output bottlenecks at high traffic times (end of period), slow response to info requests.

125
Q

Decentralized System

A

Each location maintains separate system and data. Summarized data sent to central office.
Use of this system is declining. Can be customized Systems.

ADVANTAGES: low transmission cost, low processing power and storage needs at central site, lower input/output bottlenecks, higher response to local needs.

DISADVANTAGES: higher data redundancy and poor information integration, higher security issues and hardware costs.

126
Q

Distributed Database System Characteristics

A

Compromise: Seek the best of centralized and decentralized.
Database distributed across locations according to needs.
Increasingly common

ADVANTAGES: better communications between locations (all connected to distributed database), more current and complete information, reduce or eliminate need for expensive central processing center.

DISADVANTAGES: similar to centralize systems cost of communications among locations, access and update conflicts among locations.

127
Q

Define computer network

A

Two or more computing devices connected by a communications channel.

128
Q

Define Node

A

Network access point.
•controlling is critical to security. (Who is on the network and why?)

A connected device (computers, printers, headphones, etc.) identified by type (linked to device protocols)

Measure of network complicity.

Each Node is assigned a DNS and IP address

Network monitor displays nodes.

129
Q

Define DNS

A

Domain Name System: translates network Node into IP address (internet protocol)

130
Q

Computer Network Components: Switch (0,1) and/or router

A

Route traffic and may include security features (identifying nodes engaged in activity you don’t want on your network).

Routers are smarter, more complex and cost more than switches.

131
Q

Computer Network Components: Network Interface Card (NIC) or Network Adapter Card (NAC)

A

•Circuit board and software on each Node.
•Matched to transmission media.
Ex: in each computer (to translate between the network language and the computer language)

132
Q

Computer Network Components: transmission media

A
  • Communication link between nodes (here a cable).

* May be wired or wireless.

133
Q

Types of Nodes

A

CLIENT: usually an end user’s microcomputer, uses but does not provide network resources

SERVER: provides services or resources to network, end-users access server resources but generally don’t use directly.

LOCAL AREA NETWORK (LANs): use dedicated communication lines, cover limited area.

WIDE AREA NETWORK (WANs): uses public or shared communication lines.

STORAGE AREA NETWORK (SANs): type of LAN, dedicated to connecting storage devices to serves and other devices, centralized data storage, increased use in cloud computing.

PERSONAL AREA NETWORK (PANs): created by individual person, wireless or wired.

134
Q

Wired/wireless communication media (from slowest, cheapest and least secure to fastest, most expensive and most secure)

A

WIRED
Twisted pair
Coaxial cable
Fiber optic cable

WIRELESS
Microwave transmission (primarily used in WANS)
Wi-Fi or spread/spectrum radio transmission
Bluetooth (used in PANs)

135
Q

Wired and wireless advantages

A

WIRELESS: Scalable, flexible, often lower cost, mobility.

WIRED: reliable, security, speed, occasionally lower cost.

large LANs and WANs often include both.

136
Q

Network Management Tools (Controls)

A
A. Response time reports
B. Downtime reports
C. Online monitors
D. Network monitors
E. Protocol analyzers
F. Simple network management protocol (SNMP): way of monitoring network traffic
G. Help desk reports
137
Q

Internet Defined

A

A “network of networks”
•worlds largest client/server network.

Common protocol = 2 parts:
TCP (Transmission Control Protocol)
•breaks up sent messages into IP packets
IP (Internet Protocol)
 •all nodes assigned an IP address for delivery of information.
138
Q

Protocol Defined

A

Rules by which a network operates and controls flow and priority of messages.

139
Q

Packet (or block) Defined

A

A means by which information is transmitted.

Sent files are broken down into packets which contains:
Header: routing information (address), length protocol (maybe), originating info.
Data: main message
Trailer: used in some Systems, error detection bits, end of message identifier

140
Q

Email - two components

A
  1. Mail servers – hosts that deliver, forward and store mail
  2. Clients – link users to servers. Allow you to read, compose, send, and store email.
141
Q

Uniform resource locator (URL)

A

Web address of a resource

142
Q

Browser Defined

A

Translates the URL to an IP address

Sends a request for URL via HTTP (hypertext transfer protocol)

143
Q

Simple Mail Transfer Protocol (SMTP)

A

For email services.

144
Q

Internet Message Access Protocol (IMAP)

A

Permits access to remote mailboxes (e.g. On a server) as if they were locks (e.g. On a client system)

145
Q

File transfer protocol (FTP)

A

For uploading and downloading files.

146
Q

Instant messaging (IM)

A

Common for informal, internal corporate communications.

147
Q

Voice over IP (VoIP)

A

For internet-based phone communications.

148
Q

Markup (or tagging) languages

A

Codes that indicate how parts of a file are to be processed or displayed.

149
Q

HTML (Hypertext markup language)

A

Core markup language (Way of tagging text for display) for web pages.

150
Q

XML (extensible markup language)

A

For encoding (tagging) documents in machine-readable form.

151
Q

XBRL (extensive business reporting language)

A

XML-based. For encoding and tagging financing information.

*This is the future.
•used in filing with SEC on EDGAR
•some companies now report their F/S in both paper and XBRL formats.

152
Q

Monitoring Employee Internet Use

A

Detect and/or prevent unauthorized uses.
•non-work tasks, legal issues

National security/political control

Packet sniffers (view and capture sent information)

Desktop surveillance (keystroke + website logging)

153
Q

Internet Service Providers (ISPs)

A

Provide access through: direct connections to Internet backbone (high speed, high capacity communication lines)

154
Q

Intranets and Extranets

A

Private (limited access) networks built using Internet protocols.
•allows access to network resources through web browsers rather proprietary interface.
•reduces training and system development time.
•rapidly replacing traditional proprietary LANs and WANs.
•easier to use, greater security.
•intranet portal–the entry site (URL) for an intranet.

155
Q

Intranets

A

Available only within and organization (school, business, association)
•intranets are often used to connect geographically separate LANs within a company.

156
Q

Extranets

A

Extent intranet to associates

•extend to suppliers, customers, business partners.

Could have security issues that are not found wth intranet.

157
Q

VPN (Virtual private network)

A

Technology to secure communications.

•extending an intranet to an extranet.

158
Q

Web 2.0

A

Web based, collaboration and community-generated content using tools such as blogs and wiki.

159
Q

RDS (really simple syndication)/ATOM feeds

A

Need and information source by (free) subscription.

160
Q

Security Token

A

One-time password (device displays; user inputs devise password, user ID, and account password)

New password ~30-60 seconds

161
Q

Biometric

A

Physical characteristic for access (thumbprint, Regina patterns)

162
Q

Firewalls

A

All firewalls are hardware and/or software to review and filter network traffic (e.g. Block no compliant data packets based on set parameters)

TYPES/LEVELS
Network, application and personal.

163
Q

Network firewall

A

On a network (e.g. Server)

Filters data packets based on header information (source and destination IP addresses and Communication port)

Blocks non compliant transmissions based on rules in access control list.

Very fast (examine headers only)

164
Q

Application firewall

A

Inspect data packet content

Can perform deep packet inspection (detailed packet examination)

165
Q

Personal firewalls

A

Software enabling end-users to block unwanted network traffic.

Usually on a home network or computer.

166
Q

Intrusion Detection Systems

A

IDS: monitors network for anomalies.

What is unusual–3 identification methods

  1. Signature-based (site patterns/sources)
  2. Statistical-based (unusual activity-modeling)
  3. Neural Networks (learns from created database)
167
Q

Intrusion Prevention System

A

IPS e.g. Honeypot/honeynet – allow hackers access to a decoy system.

168
Q

Piggybacking Defined

A

Unauthorized user follows and uses authorized user credentials

169
Q

Electrical System Risks

A
  • Failure (outage)
  • Reduced voltage (brownout)
  • Sags, spikes, and surges
  • electromagnetic interference (EMI)
170
Q

What purpose does setting file Attributes serve

A

This logically restricts the ability of the user to read, write, Update, and/or delete records in a file.

171
Q

Define social engineering

A

A zest of techniques used by attackers to fool employees into giving them access to information resources.

172
Q

Encryption Defined

A

Process of converting a plaintext message into a secure-coded form (ciphertext).

Decryption - reverse encryption (to read a message).

173
Q

Encryption key(s)

A

device or code that makes the message unique. Needed to encrypt or decrypt.
•an input or parameter
•device encryption e.g. On s laptop, smart phone

Key length – longer keys are slower but harder to crack

174
Q

Single-key or private key encryption

A

One algorithm to encrypt and decrypt

Sender creates and sends ciphertext, tells which algorithm (key)

Receiver reverses process

Old=data encryption standard
New and better = Advanced Encryption Standard

175
Q

Public/private-key encryption

A

Paired algorithms
•one to encrypt, one to decrypt
•if public encrypts, private decrypts
•if private encrypts, public decrypts

Safer but more complicated (slower)
Common in sending of message (data in transit)

176
Q

“Honey” encryption

A

Wrong guesses about encrypting key yield falsified data that looks correct but isn’t.

177
Q

Quantum encryption

A

Quantum encryption where data are encrypted using the Alice-in-Wonderland-like qualities of quantum computers.

178
Q

Digital certificate

A

Electronic document that contains information

Purpose: provide identity and crest secure communication.

179
Q

Certificate or certification authority (CA)

A

Created by Microsoft to acquire key pair, user applied for CA.

CA registers public key on server and sends private key to user. (Ie. additional layer of approval to get key)

180
Q

Digital certificates

A

Legally recognized identification.

Uses public/private key technology.

181
Q

Digital Signatures

A

Facilitate secure exchanges (e.g. E-commerce)

  • uses public/private key paid to authenticate sender.
  • provides authentication and nonrepudiation.
  • weakness: public/private key pair can be acquired without verification. (Does not provide confidentiality)
182
Q

Forms of asymmetric encryption

A
  • SSL (secure socket layer)
  • S-HTTP (secure hypertext transport protocol)
  • SET (secure electronic transactions protocol) - used for consumer purchases
183
Q

Types of Disasters

A
  1. Natural: i.e. Earthquakes, floods
  2. Unintentional Human: i.e. Loss of power, gas leak
  3. Intentional Human: i.e. Terrorist attacks, hackers, vengeful employees
184
Q

Recovery Point Objective

A

Acceptable data loss recovery time Objective (acceptable downtime).

Determining: criticality of application, cost, time to recovery, security.

185
Q

Backup Facility Types

A
Cold site: no computers $
Warm site: computers no data \$\$
Hot site: everything \$\$$
Mirrored site: fully redundant \$\$\$\$
Reciprocal Agreement: $?$
186
Q

Disaster Recovery: Cold Site

A

Off-site location with electrical and other physical requirements for processing.

No equipment or files (added when needed)

1-3 day start-up typically

Cheaper

187
Q

Disaster Recovery: Warm Site

A

Off-site location with similar computer hardware.

Does not include backed-up data (delivered when needed)

More expensive than cold-site

188
Q

Disaster Recovery: Hot Site

A

Completely equipped including data

Near-immediate (within hours) operation

Big money (e.g. Medical, credit card systems)

189
Q

Disaster Recovery: Mirrored Site

A

Fully redundant, fully staffed, fully equipped.

Real-time replication of mission critical systems

E.g. Credit card processing

190
Q

Reciprocal Agreement (aka mutual aid pact)

A

Agreement between toe it more organizations to aid each other with data processing if disaster strikes.

May be cold, warm, or hot

191
Q

Organizational Continuity Planning

A
  • identify and plan for disruptions
  • integrate into business culture
  • recall risk management lesson / risk appetite and management.
192
Q

BRM stands for

A

Business risk management or organizational risk management.

193
Q

BCP stands for

A

Business continuity planning

194
Q

OCP stands for

A

Organizational continuity plan

•process of risk Assessment, contingency planning, and long-term continuity maintenance.

195
Q

BIA stands for

A

Business impact analysis
•risk analysis portion of BCP (business continuity planning)

Identifies maximum tolerable interruption periods of an organization by function and activity to assess risk importance and consequences.

196
Q

OCP and BCP steps

A
  1. Create a OCP policy and program
  2. Determine critical functions / business risks
  3. Determine continuity strategies
  4. Develop and implement BCM response
  5. Exercise, maintain, and update plan
  6. Embed BCM plan into the culture
197
Q

Incident Management

A

Map level of incidents to events to responses

E.g. 0=negligible event (e.g. Power strike)
7= crisis (pandemic virus or terrorist)

•responses mapped to level of incidents.

198
Q

Plan for data back-up

A
  • recover from equipment failures, power failures and errors
  • maintain at least one remote archive off-site
  • use redundant (multiple) backups.
199
Q

Types of data backup procedures

A
  • full: all data
  • increment: data changed from a certain time
  • differential: data changed since the last full backup
200
Q

Backup & Recovery Control Principles

A
  1. At least one off-site archive
  2. Controls over storage libraries mirror those for data processing sites
  3. Many organizations outsource - choosing a vendor, consider availability, standardization, capacity, speed, and price
  4. Backup procedures may be full, increment, or differential
  5. Maintain inventory of backups that identifies data set name, volume serial number, data created, accounting period, and storage location
  6. Consider privacy, security and confidentiality of data (e.g. HIPPA)
  7. Restoration procedures integrated into organizations continuity plan (OCP)
  8. Backup and restoration procedures regularly tested and reviewed.
201
Q

“Grandfather, father, son” system

A

Used when all systems were batch processing and is mostly associated with batch processing.

Son = newest
Grandfather = 2 generations
202
Q

Checkpoint and restart backup procedure

A

Common in batch processing.

Checkpoint
•point where processing accuracy is verified
•periodic backups
•if problem, return to most recent checkpoint and restart

203
Q

Rollback and recovery backup procure

A

Common to online, real-time processing

Record processing transactions log

Periodically record master file contents

If problem, return to good master file and reprocess subsequent transactions

204
Q

Fault tolerant systems

A

Operate despite component failure (include redundancy and corrections for component failure)

E.g. Space flight, ecommerce, bank credit card processing

*dont want outages or downtime

Network-enabled backup procedure.

205
Q

High-availability clusters (HACs)

A

Computer clusters designed to improve service availability: common in e-commerce.

If a part of the system goes down, the other components will pickup the slack.

Network-enabled backup procedure.

206
Q

Remote (online) backup by managed provider

A

Advantages: automated, outsource to experts, off-site, can be continuous.

Network-enabled backup procedure.

207
Q

Storage Area Networks (SANs)

A

Replicate data from multiple sites

Data immediately available

Efficient storage for servers

Network-enabled backup procedure.

208
Q

Mirroring

A

Maintain EXACT COPY of data set

Files are stored in same format as System (e.g. Not zipped)

Advantage: very fast
Disadvantage: storage, expensive

Used for mission critical systems

Network-enabled backup procedure.

209
Q

No responsible financial services organization can operate without ______ and _____

A

Backup and recovery

210
Q

Who commits cyber-crimes?

A

Nation-states and spies: foreign nations

Industrial spies: seek intellectual property and trade secrets for competitive advantage

Organized crime: e.g. Blackmails that threaten to harm data resources

Hacktivists: social or political statements e.g. Anonymous

Hackers/crackers: for fun and challenge

211
Q

Categories of Computer Crime

A

Computer or system as target–e.g. Denial of service (DoS) attacks and hacking

Computer as subject–unlawful access to attack others. e.g. DoS infections.

Computer as tool–access data or resources. E.g. Unauthorized access breaches, phishing, key loggers

Computer as symbol/user as target–variation in computer as tool. Deceive user to obtain access e.g. Social engineering

212
Q

Preventing and Detecting Computer Crimes

A
  1. Make crime harder (less likely)
  2. Increase the costs (difficulty) of crime
  3. Improve detection methods
  4. Reduce losses
213
Q

Computer Attack Methods: back door

A
  • software allowing unauthorized entry to System by omitting login
  • once common among programmers to facilitate development
214
Q

Computer Attack Methods: denial of service (DoS)

A

Prevent legitimate users accessing system.

Flood server with incomplete access requests

Often use botnets (zombie computers)

215
Q

Computer Attack Methods: eavesdropping

A

Unauthorized interception of private communication.

216
Q

Computer Attack Methods: email bombing or spamming

A

Sending thousands or millions of emails to an address.

217
Q

Computer Attack Methods: logic bomb

A

Program planted in System dormant until event or time (e.g. Date, employer deleted from active status)

218
Q

Computer Attack Methods: Malicious Software (Malware)

A

Exploit system and user vulnerabilities to gain or damage computer.

Examples:
VIRUS: unauthorized program that copies itself; may damage data.

WORM: virus that replicates across Systems; e.g. By sending email floods

TROJAN HORSE: Program hidden inside benign file; can insert back door into system

219
Q

Packet Sniffing

A

Packet analyzers, network analyzers, and sniffers.
•have network control (legitimate) and data capture (nefarious) uses.

Packet=formatted block of data carried by a computer network

Packet sniffing=capture packets of data as they move across a network

220
Q

Password Crackers

A

Software used to generate potential passwords and test to gain access.

Finds weak passwords easily.

221
Q

Session Hijacking and Masquerading

A

Internet Protocol (IP) address–unique identifying number for each device on a networked system.

Hacker can identify IP address (e.g. Packet sniffing) and use to access network

Masquerade=hacker mimics legitimate user.

222
Q

Social Engineering

A

Seek access by tricking employees

FISHING: fooling recipients into divulging personal financial data

223
Q

Spam

A

Irrelevant or inappropriate email (or text or whatever messaging system comes next) messages sent to either:
•a large number of recipients.
•the same recipient many times (email bombing)

224
Q

War Chalking, Driving and Walking

A

War Chalking: draw symbols in public places to indicate available Wi-Fi network access.

War Driving: seeking access to Wi-Fi while diving

War Walking: seeking access to Wi-Fi while walking, may lead to war Chalking.

225
Q

Cyber Incident Response Process

A
  1. Planning for and testing protocol
  2. Event detection procedures
  3. Ever logging procedures
  4. Triage and incident analysis
  5. Containment and removal of threats
  6. Decision and action regarding event announcement or secrecy
  7. Incident recovery
  8. Closure
  9. Event reporting
  10. Monitoring and system revisions
226
Q

Source Program Library Management System (SPLMS)

A
  • an essential change control (COSO - importance in managing changes within a system of I/C)
  • software and instructions for people
  • for new or changed programs, SPLMS manages migration from application development test environment to production library (live status)
  • SPLMS controls and validates program changes by comparing new to old code
227
Q

Four Functions of SPLMS

A
  1. Store programs in the SPL (source program library)
  2. Retrieve programs for updating and maintenance
  3. Delete obsolete programs
  4. Audit trail; document program changes

*may be part of database system, operating system or purchased separately

228
Q

What is the value (the why) of document accounting systems

A
  1. Required by law (e.g. The foreign corrupt practices act, and SOX, SEC regulations, HIPPA)
  2. The build and evaluate complex systems
  3. For training (for new employees)
  4. For creating sustainable/surviving systems
  5. For auditing (internal and external)
  6. For Process (re)engineering
229
Q

System documentation

A

Overview of program, data files, processing logic, interactions with other programs and systems

  • big picture of entire system
  • may include requirements, architecture and design of the system
230
Q

Program Documentation

A

Detailed description of inputs, logic, and outputs for software

•includes program flow charts, source code listings, record layouts

231
Q

Operator Documentation

A

Also called “run manual”

How to load and execute programs and data.

Includes needed equipment, files, supplies, commands, error messages

232
Q

What type of control is Documentation

A

General and primarily preventive

233
Q

Input and origination controls

A

Ensure reliability of application program data and processes.

Understanding enables auditor to assess risks if absent or weak.

Some may function as input or processing controls (eg. control totals)

Best “input” control is often to automate data entry i.e. To not have manual (human) input

234
Q

Origination: scanning instead of human entry

A

Goals: accuracy, completeness, efficiency

235
Q

OLRT Systems Control: Closed Loop Verification

A

Use entered data to display additional (confirming data)

Helps ensure valid and correct entry

E.g. After customers account code entered, the system displays additional information about the selected customer.

Goals: C (all data entered), A (entered data accurate), E

236
Q

Batch control total methods

A
  1. Financial total - add invoice amounts
  2. Hash total - add invoice #s
  3. Record count-count # of invoices

Record count goal = A & C

237
Q

Sequence check Defined

A

Confirm numerical sequence (of check or invoice numbers
•usually automated but may be manual

Goal: C (all valid are included), V (no invalid are included)

238
Q

Key Verification

A

Re-key (re-enter) and compare critical data
•ex: require password entry twice

Goal: Validity

239
Q

Completeness or missing data check

A

Can’t continue until data is entered

Goal: completeness

240
Q

Field check (data type/data format check)

A

Is data of correct type? Ex: alphabetic, numeric, characters
E.g. A zip code can only have numbers.

Goal: Accuracy

241
Q

Limit tests

A

Numeric field with specified value(s). E.g. Need to enter a number for age that can’t be past 120

Goals: validity and accuracy

242
Q

Range test

A

Validate upper and lower limit.

Ex: price per gallon of gas $2 < x < $10

243
Q

Sign test

A

has correct sign (+ or -)

Ex: # purchased > 0

244
Q

Valid code test (validity test)

A

Does entered account # exist?
In database, called referential integrity

Goals: validity and accuracy

245
Q

Reasonableness check (logic test)

A

Do two or more fields agree?

Ex: don’t allow pay rate = “$3,500” and pay period = “hourly”

Goals: validity and accuracy

246
Q

Preprinted forms and pre formatted screens

A

Decrease data entry errors, speed data entry

Goals: accuracy, completeness and efficiency

247
Q

Default values

A

Pre-supplied data valued for fields

Ex: sales order date = current date

Goals: accuracy and efficiency

248
Q

Automated data capture

A
  • automated equipment to reduce manual data entry
  • ex: bar code scanners
  • reducing human involvement reduces errors
249
Q

4 types of application controls

A
  1. Processing
  2. File
  3. Output
  4. Input
250
Q

Application Controls: Processing

A

Efficiency
•accurate and complete master file update
•detect unauthorized transactions
•maintain data integrity

251
Q

Application Controls: Processing (and Input)

A

Run-to-run Controls: use batch totals (input controls) to agree the batch from one procedure (run) to another.

*used in batch processing.

252
Q

Application Controls: Processing

A

Audit trail control
•used mostly in OLRT processing
•transaction log = electronic audit trail

253
Q

Transaction Logs (processing and output)

A

May include data values, time, terminal number, IP address, user name

Importance:
•GOALS: accuracy, completeness and validity
•BACKUP AND RECOVERY: essential to checkpoint and restart, and rollback and recovery systems

254
Q

File Types

A

Master files (ex: payables, receivables, updated regularly with transactions)

Standing files (rarely changed master files)

Transaction files (events that are used to update master files)

System control parameter files

255
Q

Examples of Hardware Controls

A
  1. Check digit (parity bit)
    •0 or 1 included in byte to indicate if sum bits = odd or even
  2. Read after write check
    •verifies that data was correctly written to disk
    •mostly used in local file operations
  3. Echo check
    •verify transmission by “echo back” received transmission to sender
    •primary use = telecommunications systems
  4. Boundary protection
    •with multiple programs and/or simultaneous users
    •prevents one program from overwriting data and instructions of another program
256
Q

Additional file controls

A

Internal labels–Read by system (or removable storage)

External labels–Read by humans

Version controls–Protocols for ensuring use of the correct file version

File access and updating controls–procedure to restrict file updates and access to authorized users

257
Q

Application Controls: Output

A

Transaction logs of printed output (built into most systems)

Access to sensitive reports through permissions and access controls (e.g. Authorization matrix)

258
Q

Access Control (Outputs): Spooling printed files

A

Send files to queue for printing, in order sent

Control issue: sensitive output

Ex: sensitive product sales data, require printer password entry before file is printed, printed files are held by data control clerk for pickup

259
Q

Hardware controls

A

Controls built into the computer equipment to ensure that data are transmitted and processed accurately.

260
Q

The Accounting Cycle as a Set of Accounting Procedures

A

Competent, timely execution of the following:

  1. Analyze transactions and business documents.
  2. Journalist transactions.
  3. Post journal entries to accounts.
  4. Determine account balances and prepare a trial balance.
  5. Journalize and post adjusting entries.
  6. Prepare financial statements and reports.
  7. Journalize and post-closing entires.
  8. Balance the accounts and prepare a post-closing trial balance.
  9. Repeat.
261
Q

Accounting Cycles as Categories of Activity // basic exchanges typically grouped into five major transaction cycles:

A

Revenue cycle–interactions with customers (give goods; get cash)

Expenditure cycle–interactions with suppliers (give cash; get goods)

Production cycle–give labor and raw materials; get finished product

Human Resources/Payroll Cycle–hire,utilize, and develop labor; give cash and benefits

General ledge, reporting, financing cycle–give cash; get cash; report financial outcomes

262
Q

Common Risks Across Cycles

A

Loss, alteration, or unauthorized disclosure of data.

Accounting system is not functioning as required by law, regulation, or organizational policy.

263
Q

Control Goals Across Cycles

A

Completeness - All:

  • transactions are properly authorized.
  • record transactions are valid.
  • valid and authorized transactions are recorded.
  • transactions are recorded accurately.
  • safeguarding - assets are safeguarded from loss or theft.
  • efficiency - business activities are performed efficiently and effectively.
  • compliance - the organization complies with all applicable laws and regulations.
  • reporting - all financial disclosures are full/fair
  • data integrity - accurate data is available when needed.
264
Q

Accounting Cycle Defined

A

Systematic process of recording and processing financial transactions and events.

A way of categorizing similar business and accounting activities.

265
Q

Define The Human Resources/payroll cycle

A
  • records activity related to employees and payroll.
  • gets funds from the financing cycle, provides labor to the production cycle, and provides data to the GL and reporting system.
266
Q

Define The Financing Cycle

A

•gets funds from the revenue cycle, provides funds to the expenditure and HR/payroll Cycles, and provides data to the GL and reporting system.

267
Q

Define The Production Cycle

A

•gets labor from HR/Payroll, gets money from financing, gets raw materials from expenditure, provides data to GL and reporting, provides finished goods to revenue.

268
Q

Define The Revenue Cycle

A
  • Gets finished goods from production
  • provides data to GL and reporting
  • provides funds to the financing.

Core Activities:
Sales: receive customer orders, approve customer credit/sales authorization.
Physical (or virtual) custody of products/svcs: fill the order and prepare for shipping, ship
AR: bill as needed, management receivables
Cash: collection and receipt of payments, reconciliation/control activities

269
Q

Define The Expenditure Cycle

A

Gets money from financing, provides data to the GL and reporting, provides raw materials to production.

Core activities:
Request and authorize purchase, acquiring goods, taking custody and paying for goods.

270
Q

Remittance Advice

A

Purpose: helps match payments to invoices.

Comments and Controls: Sent by customers to selling company to indicate payment.

271
Q

Risks of Systems Development

A
  1. It doesn’t work the way it was designed to.
  2. Cost over-runs: cost more than it should have.
  3. Time: it falls behind schedule.
272
Q

Reasons for Systems Development Failure

A
  • Lack of senior management knowledge of, and support and involvement in, major IT projects.
  • Difficulty in specifying requirements.
  • Emerging technologies (hardware and software) may not work.
  • Lack of standardization project management and methods.
  • Resistance to change; lack of proper “change management”.
  • Scope and Project creep. (Ex. Going over budget)
  • Lack of user participation and support.
  • Inadequate testing and training.
  • Poor project management–underestimating of time, resources, and scope.
273
Q

Who is involved with Systems Development Life Cycle (SDLC)

A
  1. IT Steering Committee
    •Concerned with the strategic plan for IT within the organization.
    •Review, approve and prioritize Systems Development proposals.
    •include IT department and functional user areas
  2. Lead Systems Analyst
    •manages development team and project.
    •direct contact with end users. Usually responsible for developing overall programming logic and functionality.
  3. Systems Analysts and Application Programmers
    •design, create and test system, programs, and controls in partnership with users
  4. End users
    •Identify problems and often suggest first-pass solutions.
274
Q

Stages in the SDLC

*need to know the order of steps

A
SYSTEM PLANNING AND BUILDING
1. Planning and feasibility
2. Analysis / Requirements
3. Design
4. Development
IMPLEMENTING, TESTING AND MAINTENANCE
5. Testing
6. Implementation 
7. Maintenance
275
Q

SDLC: Planning and Feasibility

A

3 dimensions of feasibility:

  1. Technical: Can it be built?
  2. Economic: Is it cost effective?
  3. Operational: Will it meet user needs?

If feasible, crest a project plan:
•Critical success factors: What just happen to succeed?
•Scope: Project purpose and most important goals.
•Major risks: $?, delivery date? Technology?
•Milestones and responsibilities: Who will do what, when?

276
Q

SDLC: Analysis / Requirements

A

Systems analysts partner with end users to:
•Understand business processes and purposes.
•Document system requirements
Requirements Defined: Document that identifies system functionality Framework for system design and development Parties sign to signify agreement on requirements. (Contract).

277
Q

Joint Application Development (JAD)

A

Collaboration of IT personnel and end users to define system.

Part of analysis/requirements in SDLC

278
Q

Accountants/internal auditors role in Analysis/Requirements (SDLC)

A
  • Prepare or evaluate RFPs (request for proposals) for hardware or software.
  • Vendor evaluations: Reliability (financial and product), service commitment, training, tech support + documentation.
279
Q

SLDC: Design

A

Design: Define systems’ technical specifications. Two components:

  1. Technical architecture specification: Define hardware, systems software and networking technology of systems.
  2. Systems model specifications: (a) Graphical models (flowcharts, etc.) describing system components and processes. (b) Create system menus and screen formats.
280
Q

SDLC: Development

A
  • Programmer sues design specifications to develop the program and data files.
  • Purchases hardware and IT infrastructure specified in design.
281
Q

SDLC: Testing

A

Does system meet the design specifications in the requirements definition?
TEST:
•With both correct and erroneous data
•At expected operational loads
TYPES OF TESTING:
•Individual processing unit: Each component works
•System testing: Modules work together
•Inter-system testing: System works with other systems
•User acceptance: System meets business needs

282
Q

SDLC: Implementation

A

Includes:
•Data conversion (old data into new format)
•User training

283
Q

SDLC: Maintenance

A

Monitor and update programs and/or procedures
•Remember Y2K?

System updates return to start of SDLC process. (Size will determine if you go through the whole process or just Components)

284
Q

What is the pilot implementation method for new systems?

A

Similar to phased implementation, except divide users into smaller groups and train by groups (vs. by modules)

285
Q

What is the “cold turkey” (AKA the “plunge” or “Big Bang” implementation method for new systems?

A

Old system is dropped and the new system is put in place all at once. RISKY!