IT Chapter 3 Flashcards
Where is the greatest information security risk?
Accidental employee error.
What are the three control environment sub componenets?
Managerial philosophy
Org Structure
Steering committee
What is logical security concerned with?
Safeguarding software to protect software and data.
What is org security concerned with?
Segregating the functions of the IS department and the end user
Restricting documentation, hardware and data follows into what control?
Access control
What are output controls there for?
Procedures ensure the accuracy of output including reports, data updates.
What is SOX? What is the policy in Canada?
Requirement to have external auditors examine the internal controls. In Canada, does not have to be external auditors.
What is COBIT a governance model of?
IT Governance.
What is a disaster recovery plan?
Set of policies and procedures to protect and recover IT infrastructure in the even of disaster.
What is Infrastrcture-as-a-service?
Cloud-computing categary where an org oursoucres hardware, storage, servers and networking to a service prodiver.
What is the most common computer crime?
Input manipulation
What is program manipulation?
Involves changing or altering existing programs in the computer system or inserting new programs.
What is the salami technique?
Nearly unnoticeable thin slices of financial transactions are repeatedly removed and transferred to another account.
What is the focus of a financial audit?
Focused on providing reasonable assurance over financial records and documentattion of financial information.
What is an IT audit?
Evaluates if information systems are safeguarding assets, and maintaining data integrity.