IDSC 3001 - IT Compliance and Computing Concepts (Fall 2023 - Professor Kuhn) - Topics 7 & 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/97

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

98 Terms

1
New cards

Computing Hardware

Physical components of information technology, which induce the computer and the following peripherals; storage, input, and output devices

2
New cards

Software

Collection of programs that tell hardware what to do

3
New cards

Hardware/Software Layer Cake

User, Application, Operating System, Hardware

4
New cards

Operating System

Provides controls for managing hardware and simplifies user interaction

5
New cards

User Interface

Items like scroll bars and menus displayed on a computer's hardware

6
New cards

Firmware

Software stored on nonvolatile memory chips

7
New cards

Embedded Systems

Special purpose software included inside physical products

8
New cards

Distributed Computing

Systems in different locations collaborating to complete a task

9
New cards

Server

Program that fulfills client requests

10
New cards

Hardware Context

Computer configured to support requests from other computers such as sending or receiving data

11
New cards

Software Context

Program that fulfills requests

12
New cards

Client

Software program that makes requests of a server program

13
New cards

Architecture

Development of technology specifications, models, and guidelines

14
New cards

Platform

Common computing environment, standards, and marketplaces

15
New cards

Technology Platforms

AWS, Azure, Twillio

16
New cards

Computing Platforms

iOS, Android, Windows, macOS, Alexa

17
New cards

Utility Platforms

Google, Kayak, Google Maps

18
New cards

Interaction Networks

Facebook, Snapchat, LinkedIn

19
New cards

Marketplaces

eBay, Amazon marketplace, Airbnb

20
New cards

On-Demand Platforms

Uber, Amazon Home, Doordash

21
New cards

Crowdsourcing Platforms

YouTube, Yelp

22
New cards

Data Harvesting Platforms

Waze, Maavit

23
New cards

Application Server

Software that houses business logic for multiple applications

24
New cards

Web Services

Code accessed via application server for machine-to-machine interaction

25
New cards

API (Application Programming Interface)

Guidelines that tell programs how to perform tasks

26
New cards

SOA (Service Oriented Architecture)

Web services built around an organization's processes

27
New cards

Enterprise Architecture

Framework of technology, application, data, and business architecture

28
New cards

Architecture Methodology

Process of mobilization from current state to target to roadmap

29
New cards

Goals of Enterprise Architecture

Align processes, select/manage tools, manage costs, enhance flexibility

30
New cards

LAMP Stack

Linux-based web servers consisting of Linux, Apache, MySQL, PHP

31
New cards

ISP (Internet Services Provider)

Organization that provides internet access

32
New cards

Internet

Fault-tolerant network of networks

33
New cards

URL (Uniform Resource Locator)

Identifies resources on the internet with application protocol

34
New cards

Protocol

Enables communication by defining data format and exchange rules

35
New cards

HTTP (Hypertext Transfer Protocol)

Application transfer protocol for web browsers and servers

36
New cards

FTP (File Transfer Protocol)

Application transfer protocol for copying files between computers

37
New cards

Web Address

Application transfer protocol in a URL

38
New cards

Host Name

Prefix 'www.' in a web address

39
New cards

Domain Name

Name in a web address

40
New cards

SSL (Secure Sockets Layer)

Security standard for encrypted communication between browsers

41
New cards

Domain Name

Name of the network being connected to

42
New cards

Host

Computer being searched for on a network

43
New cards

Case-Sensitive Aspects of Web Browsers

Host and domains are not, path and files are

44
New cards

Load Balancing

Distributing workload across multiple systems to avoid congestion

45
New cards

Fault Tolerance

Systems capable of continuing operation even if a component fails

46
New cards

Subdomain

Smaller network or subgroup within a larger organization

47
New cards

Web Hosting Services

Firm providing hardware and servers for running websites

48
New cards

ICANN (Internet Corporation for Assigning Names and Numbers)

Nonprofit governance body accrediting registrars worldwide

49
New cards

HTML (Hypertext Markup Language)

Language used to compose web pages

50
New cards

IP Address

Value used to identify a device connected to the internet

51
New cards

Uses of IP Address

Identify physical location, tailor search results, customize advertising

52
New cards

NAT (Network Address Translation)

Maps devices on a private network to single internet-connected devices

53
New cards

DNS (Domain Name Service)

Internet directory service for naming and discovering devices and services

54
New cards

Nameserver

Phonebook-like service for finding web and email servers

55
New cards

EDI (Electronic Data Interchange)

Standards for exchanging formatted data between computer applications

56
New cards

Technologies Replacing EDI

XML (Extensible Markup Language) and JSON (JavaScript Object Notation)

57
New cards

XML (Extensible Markup Language)

Tagging language for identifying data fields used by other applications

58
New cards

JSON (JavaScript Object Notation)

Data interchange format often used for APIs

59
New cards

Client-Server Computing

When one program makes a request to be fulfilled by another program

60
New cards

Cybersquatting

Acquiring a domain name for financial gain

61
New cards

Data Control and Oversight

Governments, partnership-imposed standards, and industry standards

62
New cards

Goals of GRC Programs

Regulatory compliance and risk management

63
New cards

Common GRC Regulations

Data retention, protecting confidential information, financial accountability, disaster recovery

64
New cards

Horizontal Perspective

Laws cutting across all industries

65
New cards

Contractual Obligations Perspective

Laws related to business partners, supply chain, outsourcing, service providers

66
New cards

Vertical Obligations Perspective

Laws specific to specialized areas of business

67
New cards

Strategic Objectives Perspective

Following own rules and maintaining visibility and control

68
New cards

Corporate Governance

Processes, policies, and rules for directing and managing a corporation

69
New cards

Board of Directors

Oversees and monitors a company

70
New cards

Delegation of Authority

Accountability through information systems in an organization

71
New cards

IT Governance

Aligning IT strategy with business strategy

72
New cards

IT Systems

Increasing visibility into the effectiveness of compliance efforts

73
New cards

Principles

Outcome-focused direction for decision-making

74
New cards

Policies

Formal guidelines

75
New cards

Standards

Methods and resources supporting policies

76
New cards

Procedures

Detailed directions on following policies

77
New cards

Guidelines

Informal suggested practices

78
New cards

Audits

Internal, external, tax, operational, compliance, payroll

79
New cards

Controls

Log-in credentials, approvals, legal review, spending limits, account reconciliation

80
New cards

Sarbanes-Oxley Act (SOX)

mandates a strong internal control environment, including the electronic data needed to prove it, internal checks and balances, enhanced corporate governance & and corporate accountability

81
New cards

IT Compliance Challenges

Employees, mobile devices, third parties, cloud service providers

82
New cards

GDPR (General Data Protection Regulation)

European Union's privacy law

83
New cards

Governance

Monitoring and controlling an organization's IT and systems

84
New cards

True/False

The point of governance and compliance is to ensure transparency

85
New cards

Segregation of Duties

Different individuals should be responsible for related activities.

The responsibility for record-keeping for an asset should be separate from the physical custody of that asset.

86
New cards

Why do organizations need a framework?

to identify, track, and mitigate risk

87
New cards

What are the three risk management phases (Gartner)?

Executive, Operational, & Compliance

88
New cards

Health Insurance Portability and Accountability Act (HIPAA)

imposed tough data privacy and protection for any businesses related to health care

89
New cards

Basel IV

introduces changes that limit the reduction in capital, a standardized floor for capital requirements, requiring banks to meet higher maximum leverage ratios

90
New cards

PCI Security Standards

Council offers comprehensive standards to enhance payment card data security

91
New cards

Employees

play a key role in protecting a company's sensitive data

92
New cards

Mobile Devices

serious security and compliance risks, most organizations have weak controls in place to protect regulated data on these

93
New cards

Third Parties

a threat caused by the use of unseen third-party solutions including, services, devices, and apps

94
New cards

Cloud Service Providers

ensure that sensitive data is being properly protected in the cloud

95
New cards

PCI (Security Standards)

Council offers comprehensive standards to enhance payment card data security

96
New cards

Top Down

Corporate governance is the set of process, policies, laws, customs, and rules affecting the way a corporation is directed, managed and controlled

97
New cards

Cache

a temporary storage space used to speed up computing tasks

98
New cards

why are organizations implementing grc programs?

regulatory requirements & awareness of monetary and reputational risks