Midterm Flashcards

1
Q

4 actions to preserve confidentiality

A

Identify and classify information
Encryption
Control access- authentication and authorization
Train employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data loss prevention

A

Software that blocks outgoing messages that contain key words of sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital watermark

A

Code embedded in documents that identifies confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

10 best practices for protecting customers’ privacy

A

Management- set of policies
Notice- about its policies
Choice and consent- customers must agree to terms
Collection- only collect what is needed
Use, retention, disposal- for a business purpose
Access- customers should have access to info about themselves
Disclosure to third parties
Security
Quality
Monitoring and enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Asymmetric encryption systems

A

Use two different keys (public and private) to encrypt and decrypt
Secure exchange of keys via email, digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key escrow

A

Storing copies of encryption keys in a secure location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hashing

A

Produces a code of a fixed short length regardless of size. Cannot be decrypted back to original text.
Creates a digital signature with hash creator’s private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital certificate

A

Certifies the identity of the owner of a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Public key infrastructure

A

System that issues pairs of public and private keys and digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual private network

A

A network of information securely transferred using encryption and authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data entry controls

A
Field check- numeric or string
Sign check
Limit check
Range check
Size check- number of digits/characters
Completeness check
Validity check
Reasonableness test
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Processing controls

A
Data matching
File labels- correct and most current files are being updated
Recalculation of batch totals
Cross-footing and zero balance tests
Write-protection mechanisms
Concurrent update controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Batch totals

A

Calculate numeric values for a batch of input records

Financial total, hash total, record count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fault tolerance

A

The capability of a system to continue functioning when a component fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Redundant arrays of independent drives (RAID)

A

Records data on multiple disk drives to reduce risk of data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uninterruptible power supply

A

Protects in event of power outage, uses battery power to enable system to operate to back up critical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Recovery point objective

A

The maximum amount of data an organization is willing to lose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disaster recovery plan three options

A

Cold site
Hot site
Real time mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

General controls

A

Make sure an organization’s control environment is stable, IT

20
Q

Application controls

A

Prevent, detect, and correct transaction errors

Concerned with accuracy, completeness, and authorization

21
Q

5 components of the internal environment

A
Management philosophy/operating style
Commitment to integrity and competence
Independent Board of directors
Organizational structure
Human resource standards
22
Q

Policy and procedures manual

A

A document that explains proper business practices, needed knowledge and experience, procedures

23
Q

Custody functions

A

Handling cash
Handling inventories
Writing checks
Receiving checks

24
Q

Recording functions

A

Preparing source documents or entering data online
Maintaining journals, files, databases
Preparing reconciliations and performance reports

25
Q

COBIT 5 framework for best practices

A
Meeting stakeholder needs
Covering the enterprise end to end
Applying a single integrated framework
Enabling an holistic approach
Separating governance from management
26
Q

COSO 5 Risk management model

A
Internal environment
Objective Setting- operations, reporting, compliance
Event Identification
Risk assessment
Control activities
27
Q

Control activities

A

Policies, procedures, and rules that provide reasonable assurance that control objectives are met and risk responses are carried out

28
Q

Trust Services framework- Systems reliability

A
Security-foundation
Confidentiality
Privacy
Processing Integrity
Availability
29
Q

Security life cycle

A

Assess threats and select risk response
Communicate policy. We want people to be cautious but not scared.
Acquire and implement solutions- outsource
Monitor performance- best practices. Balance scorecard, benchmarking, database of breaches

30
Q

Defense in depth

A

Employing multiple layers of controls to avoid a single point of failure

31
Q

Protection controls

A
Training
User access controls
Change controls and change management
Access controls
Hardening, encryption, firewalls
32
Q

Detection controls

A

Log analysis

Continuous Monitoring

33
Q

Response controls

A

Computer incident response teams

Chief information security officer

34
Q

Incident response process

A

Recognition
Containment
Recovery
Follow up

35
Q

Virtualization

A

Running multiple systems simultaneously on one physical computer

36
Q

Cloud computing

A

Using a browser to remotely access software, data storage, hardware

37
Q

Intrusion detection system

A

A system that creates all logs of all network traffic that was permitted to pass the firewall

38
Q

Log analysis

A

Examining logs to identify evidence of possible attacks

39
Q

Hardening

A

Modifying the configuration of endpoints to eliminate unnecessary services

40
Q

Patch

A

Code released by software developers that fixes a particular vulnerability

41
Q

Endpoints

A

Workstations, servers, printers on an organizations network

42
Q

Intrusion prevention systems

A

Software or hardware that monitors patterns in the traffic flow to identify and automatically block attacks

43
Q

Demilitarized zone

A

A separate network located outside the organization’s internal information system that permits controlled access from the internet

44
Q

Financial statement fraud

A

An intentional or reckless act by act or omission that is materially misleading

45
Q

Conversion

A

An unauthorized assumption and exercise of the right to ownership over goods or personal chattels belonging to another

46
Q

3 elements of fiduciary action

A

A fiduciary relationship existed between the plaintiff and defendant
The defendant breached his or her duty to the plaintiff
The breach resulted in harm to the plaintiff OR benefit to fiduciary

47
Q

3 attributes of fraud

A

Scheme
Concealment
Conversion or benefit