Unit 4 - Module 9 Flashcards

1
Q

Caesar cipher

A

Earliest encryption method; Julius Caesar is said to have used it to send coded messages to his generals in the field.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

key

A

Mathematical value that the sender selects for the purpose of encrypting or decoding data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

algorithm

A

Procedure of shifting each letter in the cleartext message by the number of positions that the key value indicates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advanced encryption standard (AES)

A

Also known as Rijndael, a private key (or symmetric key) encryption technique.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

private key

A

Both the sender and the receiver use the same encryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

symmetric key

A

Single key used in an encryption algorithm to both code and decode a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

public key encryption

A

Technique that uses two encryption keys: one for encoding the message, the other for decoding it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Public Key Encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rivest-Shamir-Adleman (RSA)

A

One of the most trusted public key encryption methods. This method, however, is computationally intensive and much slower than private key encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

digital envelope

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

digital signature

A

Electronic authentication technique that ensures the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

digital certificate

A

Sender’s public key that has been digitally signed by trusted third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

certification authorities (CAs)

A

A trusted third party that issues a digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public key infrastructure (PKI)

A

Constitutes the policies and procedures for administering this activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

firewall

A

Software and hardware that provide a focal point for security by channeling all network connections through a control gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

network-level firewall

A

System that provides basic screening of low-security messages (e.g., e-mail) and routes them to their destinations based on the source and destination addresses attached.

17
Q

application-level firewall

A

Provide high-level network security.

18
Q

To qualify for the TRUSTe seal, an organization must:

A
  • Agree to follow TRUSTe privacy policies and disclosure standards.
  • Post a privacy statement on the website disclosing the type of information being collected, the purpose for collecting information, and with whom it is shared.
  • Promptly respond to customer complaints.
  • Agree to site compliance reviews by TRUSTe or an independent third party.
19
Q

Verisign, Inc.

A

It provides assurance regarding the security of transmitted data. The organization does not verify security of stored data or address concerns related to business policies, business processes, or privacy.

20
Q

International Computer Security Association

A

ICSA certification addresses data security and privacy concerns.

21
Q

AICPA/CICA WebTrust

A

To display the AICPA/CICA WebTrust seal, the organization undergoes an examination according to the AICPA’s Standards for Attestation Engagements, No. 1, by a specially web-certified CPA or CA. The examination focuses on the areas of business practices (policies), transaction integrity (business process), and information protection (data security). The seal must be renewed every 90 days.

22
Q

Safe Harbor Agreement

A

Two-way agreement between the United States and the European Union establishing standards for information transmittal.

23
Q

intelligent control agents

A

Computer programs that embody auditor-defined heuristics that search electronic transactions for anomalies.

24
Q

value-added network (VAN)

A

Hosted service offering that acts as an intermediary between business partners sharing standards-based or proprietary data via shared business processes.

25
Q

Verisign is

  • a for-profit organization that provides assurance regarding the security of transmitted data.
  • a nonprofit organization dedicated to improving consumer privacy practices among Internet businesses and websites.
  • an organization that established the Web Trust program.
  • a way to verify the security of stored data.
A

a for-profit organization that provides assurance regarding the security of transmitted data.

The correct answer is “a for-profit organization that provides assurance regarding the security of transmitted data.” Verisign is a for-profit organization that provides assurance regarding the security of transmitted data. Its mission is to provide digital certificate solutions that enable trusted commerce and communications. Its products allow customers to transmit encrypted data and verify the source and destination of transmissions.

26
Q

A VAN is

the same as a VPN.
the same as a WAN.
the same as a LAN.
a network that is used for EDI.
A

a network that is used for EDI.

The correct answer is “a network that is used for EDI.” In an EDI environment, a client’s trading partner’s computer automatically generates electronic transactions, which are relayed across a value-added network (VAN), and the client’s computer processes the transactions without human intervention.

27
Q

Encryption is

  • a modern invention, exclusive to the 21st century.
  • the conversion of data into a secret code for storage in databases and transmission over networks.
  • a social engineering approach which involves manipulation and deceptive practices.
  • another name for malware and ransomware.
A

the conversion of data into a secret code for storage in databases and transmission over networks.

The correct answer is “the conversion of data into a secret code for storage in databases and transmission over networks.” Encryption is the conversion of data into a secret code for storage in databases and transmission over networks. The sender uses an encryption algorithm to convert the original message (called cleartext) into a coded equivalent (called ciphertext). At the receiving end, the ciphertext is decoded (decrypted) back into cleartext.

28
Q

A firewall is

  • a system used to insulate an organization’s intranet from the Internet.
  • turns the target victims’ computers into zombies that are unable to access the Internet.
  • unnecessary in today’s technological environment.
  • so named because its effects keep the hardware cool.
A
  • a system used to insulate an organization’s intranet from the Internet.

The correct answer is “a system used to insulate an organization’s intranet from the Internet.” A firewall is a system used to insulate an organization’s intranet from the Internet. It can be used to authenticate an outside user of the network, verify his or her level of access authority, and then direct the user to the program, data, or service requested. In addition to insulating the organization’s network from external networks, firewalls can also be used to protect LANs from unauthorized internal access

29
Q

Seals of assurance

  • are evidence that a web-based business is trustworthy.
  • are assigned by the ISP to internet users so they can transact business over the internet.
  • is software used by malicious websites to sniff data from cookies stored on the user’s hard drive.
  • have no requirements for an internet-based business.
A

are evidence that a web-based business is trustworthy.

The correct answer is “are evidence that a web-based business is trustworthy.” In response to consumer demand for evidence that a web-based business is trustworthy, a number of trusted third-party organizations are offering seals of assurance that businesses can display on their website home pages. To legitimately bear the seal, the company must show that it complies with certain business practices, capabilities, and controls. This best known six seal-granting organizations are - Better Business Bureau (BBB), TRUSTe, Verisign, Inc., International Computer Security Association (ICSA), AICPA/CICA WebTrust, and AICPA/CICA SysTrust.

30
Q

A digital signature is

  • a tool that allows digital messages to be sent over analog telephone lines.
  • the computed digest of the sender’s digital certificate.
  • derived from the digest of a document that has been encrypted with the sender’s private key.
  • the encrypted mathematical value of the message sender’s name.
A

derived from the digest of a document that has been encrypted with the sender’s private key.

The correct answer is “derived from the digest of a document that has been encrypted with the sender’s private key.” A digital signature is derived from the digest of a document that has been encrypted with the sender’s private key. A digital signature is an electronic authentication technique that ensures the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied.

31
Q

Which of the following statements about continuous auditing is true?

  • Continuous auditing does not involve electronic audit trails.
  • Continuous auditing is usually considered less effective than traditional auditing.
  • Continuous auditing only pertains to access controls.
  • Continuous auditing enables the auditor to review transactions at frequent intervals or as they occur.
A

Continuous auditing enables the auditor to review transactions at frequent intervals or as they occur.

The correct answer is “Continuous auditing enables the auditor to review transactions at frequent intervals or as they occur.” Continuous auditing enables the auditor to review transactions at frequent intervals or as they occur. The growth of electronic commerce requires the auditors to rethink their traditional practices. Using intelligent electronic agents, transactions can be continuously monitored, and alarms can sound when an anomaly occurs.

32
Q

Authentication

  • requires accountants to develop a new skill set in the electronic environment.
  • is simpler in the electronic environment than the old paper-based environment.
  • is paper intensive process.
  • not subject to audit rules and processes.
A

requires accountants to develop a new skill set in the electronic environment.

The correct answer is “requires accountants to develop a new skill set in the electronic environment.” Authentication requires accountants to develop a new skill set in the electronic environment. In traditional systems, the business paper on which it was written determines the authenticity of a sales order from a trading partner or customer.