Module 12: Computer Fraud and Cybersecurity Risks

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/42

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:33 PM on 4/26/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

43 Terms

1
New cards

Cybersecurity

Protecting systems, networks, and data from unauthorized access, attack, or damage, particularly in environments where sensitive information is stored and processed

2
New cards

How does cybersecurity relate to fraud prevention and internal control within Accounting Information Systems?

It protects Accounting Information Systems (AIS) from threats such as data theft, system manipulation, and unauthorized access, ensuring data integrity, confidentiality, and availability

3
New cards

Role-Based Access Control (RBAC)

Assigns system permissions based on an individual’s job role rather than user-by-user access, simplifying management and supporting segregation of duties

4
New cards

Least-Privilege

Users should be granted the minimum level of access necessary to perform their duties—no more, no less

5
New cards

Discretionary Authorization Model

Access is controlled by the data owner

6
New cards

Role-Based Authorization Model

Access is based on job roles

7
New cards

Mandatory Authorization Model

Access is based on classification levels and enforced by the system

8
New cards

When are controls appropriate?

They:

  • Limit Access

  • Enforce Segregation of Duties

  • Reduce the risk of unauthorized actions or data exposure

9
New cards

Malware

Software designed to infiltrate or damage systems

10
New cards

Types of Malware

  • Viruses

  • Worms

  • Trojans

11
New cards

Viruses

Malware that attach to legitimate files and spread through user interaction

12
New cards

Worms

Malware that replicate autonomously across networks

13
New cards

Trojans

Malware that disguise themselves as legitimate programs but perform harmful actions in the background

14
New cards

Keyloggers

Spyware that records keystrokes to capture sensitive information such as login credentials

15
New cards

Distributed Denial of Services (DDos)

An attack that overwhelms a system with excessive traffic using multiple compromised systems, rendering it unavailable

16
New cards

Social Engineering

Uses deception or psychological manipulation to influence individuals into revealing confidential information or performing actions.

17
New cards

SQL Injection

A code injection technique that manipulates input fields to execute unauthorized database commands

18
New cards

Replay Attacks

Intercepting and retransmitting valid data to gain unauthorized access or repeat a transaction

19
New cards

Zero-Day Exploits

Targets an undisclosed vulnerability for which no patch or fix is available

20
New cards

Spoofing

Disguising identity to gain unauthorized access or deceive users, such as email or IP spoofing

21
New cards

Pump-and-Dump Schemes

Artificially inflates asset prices using false information, followed by a sell-off by manipulators

22
New cards

Layered-Security/Defense-in-Depth

A security strategy that implements multiple, overlapping controls so that if one control fails, others still protect the system

23
New cards

Zero-Trust

Based on “never trust, always verify,” requiring continuous verification of users and systems

24
New cards

How does redundancy and diversity in controls reduce the likelihood of successful cybersecurity?

By ensuring multiple independent layers of protection, preventing a single point of failure

25
New cards

Google Data Centers — Examples of Physical Controls

  • Perimeter fencing and secure boundaries

  • Vehicle crash barriers

  • Surveillance cameras (including thermal monitoring)

  • Biometric authentication (e.g., iris scanning)

  • RFID access badges / access control checkpoints

  • Secure hardware destruction (e.g., hard drive shredding)

26
New cards

Encryption

The process of converting plaintext into ciphertext using an algorithm and a key

27
New cards

Symmetric Encryption

Uses the same key for encryption and decryption

28
New cards

Asymmetric Encryption

Uses a public key for encryption and a private key for decryption

29
New cards

Quantum Computing

Can solve complex mathematical problems much faster, potentially breaking current encryption methods

30
New cards

SNDL (Store Now, Decrypt Later)

When attackers store encrypted data now and decrypt it later when quantum capabilities improve

31
New cards

NIST

Developing post-quantum encryption standards to address future cybersecurity risks

32
New cards

Blockchain Technology — Definition

A digital ledger that records transactions in a secure, transparent, and unalterable way across multiple nodes

33
New cards

Blockchain Technology — How does it operate in a distributed ledger system?

  • Transactions are broadcast to a network

  • Grouped into blocks

  • Verified through consensus mechanisms

  • Added to the chain as a permanent record

34
New cards

Blockchain Technology — Key Security Features

  • Immutability

  • Consensus

  • Transparency

35
New cards

Blockchain Technology — Immutability

Transactions cannot be altered once recorded

36
New cards

Blockchain Technology — Consensus

Network agreement validates transactions

37
New cards

Blockchain Technology — Transparency

Transaction history is visible across the network

38
New cards

Blockchain Technology — Proof of Work

Requires solving complex mathematical problems

39
New cards

Blockchain Technology — Proof of Stake

Validates transactions based on ownership/stake in the network

40
New cards

Blockchain Technology — Double-Spend Problem

The risk that a digital asset could be duplicated and spent more than once (which blockchain prevents through consensus and immutable records)

41
New cards

What are the risks associated with blockchain and cryptocurrency?

  • Fraud schemes (e.g., pump-and-dump)

  • Lack of regulation in cryptocurrency markets

  • Potential manipulation of transactions or asset values

42
New cards

What can a 51% attack accomplish?

  • Double-spend transactions

  • Delay or censor transactions

  • Force chain reorganization

43
New cards

What can a 51% NOT accomplish?

  • Creation of new coins

  • Alteration of past transactions

  • Access other users’ funds directly