TBS - 1 - 7 - 35% Flashcards
Biometrics
Authenticate identity using an individual’s unique body features such as voice, retina, fingerprint, or signature.
Multi-factor identification
Requiring multiple types of ID such as knowledge (password), device (keycard), and body (voiceprint or finger print)
Piggybacking
An unauthorized user gains entry into a restricted area by following an authorized user, using the authorized user’s entry credentials to gain access.
Phishing
Requests for information delivered via email or text messages (aka smashing).
Packet sniffing
Programs that capture packets of data as they move across a computer network.
Segregation of Duties
Authorization
Approval
Custody
Record Keeping
Example of fraud when duties aren’t segregated
Process fictitious purchase transactions to his own shell companies and cause payments to be made for goods or services that were not received by the company.
Primary advantage of online, real-time processing over batch processing
it provides more timely (and therefore more accurate) information for decisions
Batch System
Inventory data are only accurate when the records are updated (i.e. each month)
Therefore, decisions about ordering inventory, inventory value, and company profitability are not based on timely info.
Online, real-time system information advantages
Information about inventory levels, inventory investment, and cost of goods sold would be available on a continuous basis.
Encryption
The process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge.
Encryption Technology
Uses a mathematical algorithm to translate cleartext into cipertext (text that has been mathematically scrambled so it’s meaning cannot be determined.
Encryption guards against
Risks to privacy, i.e. the protection of data-in-transit against unauthorized access and authentication, i.e. user ID.
Symmetric encryption
aka Single-Key encryption or private-key encryption uses a single algorithm to encrypt and decrypt text. The sender uses the encryption algorithm to create a ciphertext and sends the encrypted text to the recipient
Asymmetric encryption
aka Public/Private-key encryption and private-key encryption.
Uses two paired encryption algorithms to encrypt and decrypt the text.