Accounting Information Systems Flashcards - Exam 2

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

Threats to AIS

- Natural Disasters

- Unintentional Acts

- Software/Hardware issue

- Intentional Acts

2
New cards

Fraud

is any intentional deception made for personal gain or to damage another individual

3
New cards

Fraudulent acts must have:

  •   False statement

  • Intent to lie

  • Victim lost something

  • Made a person act

4
New cards

Most common forms of fraud

Most common: Financial Reporting Fraud

2nd most common: Asset Misappropriation

5
New cards

Fraud Opportunity

  1. Can steal in the moment

  2. Hide the fraud

  3. Benefit from it

6
New cards

Fraud Triangle

  1. Rationalize

  2. Pressure

  3. Opportunity

7
New cards

Rationalization Triangle

  1. Justification

  2. Lack of morals

  3. Attitude

8
New cards

Pressure for Fraud

  1. Lifestyle

  2. Money

  3. Emotional state

9
New cards

Pressure for financial statement fraud

  1. State of the economy

  2. Meet Quota

  3. Management Pressure

10
New cards

Computer fraud

Any illegal act that involves the use of computers to misappropriate funds or data.

11
New cards

Data Processing Fraud

  • Fraud Input

  • Fraud process

  • Storing Fraudulent Data

  • Output Fraud

12
New cards

Security

access to data/system is controlled and restricted to legit users

13
New cards

Confidentiality

sensitive org data is protected

14
New cards

Privacy

Personal info on company is protected

15
New cards

Processing integrity

data is processed accurately, timely, and with proper authorization

16
New cards

Available

system and info is available

17
New cards

Ways to minimize risk of system downtime

  • Preventative Maintenance

  • Training

  • Patching software

  • Fault Tolerance: System ability to function when a part fails.

  • Data center designs

18
New cards

Full backup

a full copy of the database

19
New cards

Partial backup

a copy of the changes made daily

20
New cards

Incremental backup

copies only items that have changed since partial backup

21
New cards

Differential back up

copies all changes from full backup.

22
New cards

Archive backup

a full backup used for historical preservation

23
New cards

Recover Point Object (RPO)

Max amount of data an org is willing to reenter or lose.

24
New cards

Recover time objective (RTO)

Max tolerable time to restore info system.

25
New cards

Disaster recovery plan (DRP)

Procedure to restore IT function

26
New cards

Business continuity plan (BCP)

how to resume all operations.

27
New cards

Reciprocal agreement

agreements with another org that use their equip and IT system resources

28
New cards

Cold site

prewired building for telephone/internet to one or more vendors to provide all equip

29
New cards

Hot site

cold site but it has all the needed equipment there

30
New cards

Real-time mirroring

maintain 2 copies of database at separate data centers

31
New cards

IT security fundamental concepts

P > D + R

  • P = time to break through controls

  • D = time to detect an attack

  • R = time to respond and correct the damage

32
New cards

Prevention layers

Policy → Physical Location → Network → Database → Data

33
New cards

Authentication

verify person trying to access system

34
New cards

Authorization

restrict access to authenticated users to parts of a system + limit their actions

35
New cards

Access control matrix

table used to implement authorization controls

36
New cards

Compatibility test

matches user authentication against the ACM

37
New cards

IT solutions to protecting data

  • Antimalware

  • Encryption

  • Device and software

  • Network security

38
New cards

Router

info system to internet

39
New cards

Firewall

device/software that controls in/outbound communication

40
New cards

DMZ

separate network that limits functions to the internet

41
New cards

Intrusion Prevention System

monitor traffic flow for attacks

42
New cards

Transmission Control Protocol (TCP)

procedures for dividing files into packets to be sent over internet and reassembled at destination.

43
New cards

Internet Protocol (IP)

specified structure of packets and how to route them.

44
New cards

Packet Filtering

Reads packet headers to allow or deny traffic based on predefined rules.

45
New cards

Deep Packet Filtering

process in which firewalls examine data in a packet.

46
New cards

Log Analysis

Examine logs to find evidence of attacks.

47
New cards

Intrusion Detection System

System that creates logs of network traffic permitted to pass and analyzes those logs.

48
New cards

Honey Pots

decoy sys to trap and defer hacks, early decoy system

49
New cards

Incident Response

  • Recognition, Contain, Recovery, Follow-up

50
New cards

Computer Incident Response Team

responsible for responding to and managing computer security incidents

51
New cards

Penetration Test

Authorized attempt to break into the organizations info system

52
New cards

Confidentiality

Protection of information that is designated as confidential

53
New cards

Privacy

Pertains to personal information collected, how its collected, destroyed, used, stored.

54
New cards

Private Data

Info about business (customers, business partners, etc

55
New cards

Confidential Data

Organizational data that needs proper access

56
New cards

Data loss prevention software

control over outbound communication to prevent unauthorized data exfiltration.

57
New cards

Info Rights Management Software

Specify action that a user can do with specific documents or data.

58
New cards

Digital Watermark

detective control that identifies the source of a data breach

59
New cards

Digital Masking

replace personal info with fake values

60
New cards

Encryption

way to protect data during transmission

61
New cards

Symmetric Encryption

one key to encrypt and decrypt

62
New cards

Asymmetric Encryption

  • public to encrypt

  • private to decrypt

  • digital signatures

63
New cards

VPN

routes ip address through a proxy server

64
New cards

Hashing

plaintext → short code

65
New cards

Purposes of Digital Signatures

  • Authentication

  • Integrity

  • Non-repudiation

66
New cards

Blockchain

distributed ledger of hashed documents with copies on multiple computers

67
New cards

Management

Management assigns accountability for its privacy policies and procedures.

68
New cards

Notice

notice users of policy to collecting data

69
New cards

Choice and consent

opt in vs opt out

70
New cards

Collection

collect needed info for analysis and decision-making purposes.

71
New cards

Use, retention, and disposal

use info for stated business purpose

72
New cards

Access

users can review, correct, and delete their info

73
New cards

Disclosure to third parties

3rd party contracts and protections

74
New cards

Security

protect from data loss or unauthorized access

75
New cards

Quality

accuracy and completeness

76
New cards

Monitoring and enforcement

compliance with policies and regulations regarding accounting information systems.

77
New cards

General Internal Controls

Make sure an org’s environment is stable

78
New cards

IT Internal Controls

Ensures accuracy of data captured, entered, processed, etc.

79
New cards

FCPA

  1. No bribery ro foreign officials

  2. Requires all public corporations to maintain internal controls

80
New cards

SOX

  • prevent fraud

  • make financial reports transparent

  • protect investors

  • internal controls

  • punish those to perpetrate fraud

81
New cards

COSO - Internal Control Integrated Framework

CRIME

  • C: Control Environment

  • R: Risk Assessment

  • I: Information and Communication

  • M: Monitoring Activities

  • E: Existing Control Activities

82
New cards

Inherent Risk

Risk that exists before plans are made to control it

83
New cards

Residual Risk

Risk that is left after you control it

84
New cards

Risk Responses

  • Reduce: implement controls

  • Accept: do nothing, accept likelihood

  • Share: buy insurance, outsource

  • Do not engage in activity

85
New cards

Control Activities

Develop controls for risk and ensure policies are followed to mitigate risks.

86
New cards

Information and Communication

Communication and information systems that support the risk management process.

87
New cards

Monitoring

Evaluate ongoing controls and ensure they are effective in managing risks.

88
New cards

COSO - Enterprise Risk Framework

  • Governance & Culture

  • Strat/Objective Setting

  • Performance

  • Review/Revision

  • Info, Communication, reporting

89
New cards

COBIT - Framework for IT controls

  • Control Objectives

  • Enterprise Governance of IT

  • Business and IT Alignment

  • Value Creation

  • Service Organization Controls

90
New cards

Control Activities Categories

  1. Safeguarding assets, records, and data

  2. Independent check on performance

  3. Segregation of Duties

91
New cards

Segregation of Duties

Custodial: Inventory, Cash, and Checks

Recording: Prepare source documents, maintain journals, and prep reconciliations and reports

Authorization: Authorization of decisions/transactions

92
New cards

Specific Authorization

Permission needed for non-routine actions

93
New cards

General Authorization

Routine activities that don’t need specific approval or permission (within normal limits)

94
New cards

Strategic Master Plan

A long-term roadmap aligning IT projects with the organization’s goals.

95
New cards

Project Milestones and Evaluation

Key checkpoints to track progress and performance of a project over time.

96
New cards

Data Processing Schedule

A timeline that outlines when data tasks should be run to keep systems on track.

97
New cards

Steering Committee

A group of senior stakeholders who oversee major IT projects and make strategic decisions.

98
New cards

System Performance Measurements

Metrics (like uptime, speed, error rate) used to evaluate how well a system is working.

99
New cards

Post-Implementation Reviews

An assessment done after a project goes live to evaluate what went well and what needs improvement.