M3 The Role of IT in Business Flashcards
Connects an organization’s network to the internet
Modem
Manage network traffic by connecting devices to form a network
Routers
connect and divide devices within a computer network
Switches
Computer or device that acts as an intermediary between different networks; transforms data from one protocol into another so that information can flow between networks
Gateway
Physical or virtual machines that coordinate the computers, programs and data that are part of the network
Servers
Software applications or hardware devices that protect a person’s or company’s network traffic by filtering it through security protocols with predefined rules
Firewall
Applications, procedures or programs that provide instructions for a computer to execute
Software
Group of computers and other machines that are interconnected electronically using a series of networking devices
Networks
Encrypted private networks that run on a public network namely the internet; user activity and device IP addresses are hidden
Virtual private networks (VPNs)
Encrypted private networks that run on a public network namely the internet; user activity and device IP addresses are hidden
Virtual private networks (VPNs)
Soc 1 Report that focuses on the fairness of the presentation of management’s description of the service org’s system and the suitability of the design of the controls to achieve the related control objectives included in the description as of a specified date
Soc 1 - Type 1
Specified date
Soc 1 Report that focuses on the fairness of the presentation of management’s description of the service org’s system and the suitability of the design and operating EFFECTIVENESS of the control to achieve related control objectives included in the description throughout a specified period
Soc 1 - Type 2
Operating effectiveness
Specified period
Soc 2 reports vs Soc 3
Soc 3 doesn’t have expertise
Which network devices assign IP Addresses?
Routers
Protective hardware/software that allows users to access the internet without exposing the organization’s IT assets to unauthorized users
Firewall