P1 SEC F - Technology and Analytics

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/218

flashcard set

Earn XP

Description and Tags

Topics covered in this section include information systems, data governance, technology-enabled finance transformation, data analytics, business intelligence, data mining, analytical tools, and visualization.

Last updated 5:59 PM on 10/28/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

219 Terms

1
New cards

Primary role of AIS in the value chain

To provide reliable and timely information to decision makers both inside and outside of the organization—in the form of official financial statements or as performance reports for internal users. AIS could connect an organization with the value chains of its customers, suppliers, and distributors.

2
New cards

Ownership status and reverse tracking

Supply chain applications are generally considered a good fit for blockchain technology due to:

3
New cards

Focused IT costs

Main advantage of an ERP (Enterprise Resource Planning) system. With a single source of accurate contextual information an ERP system reduces administrative and operational costs. Instead of spending resources on multiple systems that require dedicated staff, you can focus the cost on just one ERP system.

4
New cards

Internal Use Only

Most appropriate Data Classification tag to apply to a document that contains nonpublic information but is not considered sensitive, a trade secret, or personally identifiable information.

5
New cards

Preventive and Deterrent control

Fences and locks are both a _______. They deter and prevent unwanted activity as well as access to unauthorized areas.

6
New cards

Correlation

A term frequently used in conjunction with regression analysis, and is measured by the value of the coefficient of correlation, r. The best explanation of the value r is that it is a measure of the relative relationship between 2 variables.

7
New cards

transactional ; management

ERP systems focus on automating _______ processes, while EPM systems focus on automating _______ processes.

8
New cards

Ability to examine the contents of a packet

The characteristic that makes a firewall "advanced"

9
New cards

Permission

One single characteristic that separates a pen test from a real cyber attack. Attacks and pen tests should look the same. The only difference is that pen tests should be formally permitted by the target's owner.

10
New cards

Outliers

Histograms can help detect _____ in a data set. They show the number of observations in ranges of the variable. If relatively few observations are at either the upper or lower range, this could indicate the presence of this.

11
New cards

Dynamic cloud computing provisioning

Allows organizations to pay only for the IT capacity they need at a particular point in time.

12
New cards

Distributed denial-of-service (DDoS)

Occurs when multiple machines or a botnet—a group of internet-connected devices—send an attack to the target. Unfortunately, Internet of Things devices often do not have robust security features, so hackers can access them without owners noticing. It also increases the difficulty of attribution, as the real source of the attack is harder to identify.

13
New cards

Smurf attack

Occurs when the attacker sends Internet Control Message Protocol broadcast packets to several hosts with a spoofed source Internet Protocol (IP) address that belongs to the target machine.

14
New cards

SYN flood

Occurs when an attacker keeps sending requests but maliciously leaves a connected port open by failing to complete a three-way handshake in a Transmission Control Protocol (TCP)/IP network. This makes the port unavailable for further requests so that legitimate users cannot connect.

15
New cards

Virtualization

Rapid advances in what technology made cloud computing an affordable reality for nearly all organizations.

16
New cards

Rapid answers to ad hoc questions based on queries using basic keywords

What database query tools such as Structured Query Language can provide but generic reports from a database cannot.

17
New cards

Reversed ; re-entered

Blockchain cannot be change, but they can be _____ and ______.

18
New cards

Unreadable

To address concerns about privacy of its data being transmitted over the internet, a company may implement data encryption because transforming plain text into ciphertext makes data ______ to unauthorized users.

19
New cards

Secure gateways

Another term for firewalls.

20
New cards

Pen test

A collection of activities in which security professionals carry out attacks against information systems to simulate attackers' actions.

Ex. Healthy Life, Inc. (HLI), is a health services company that specializes in managing health services scheduling. To ensure HIPAA compliance, HLI has engaged White Hat Security Group (WHSG) to evaluate the strength of its security controls. HLI wants WHSG to attempt to "break in" to its information systems to see how resilient it is to attacks.

21
New cards

Prescriptive vs. Diagnostic Analytics

  • Prescriptive analytics focuses on what should happen.

    • Examples include optimization and simulation models.

  • Diagnostic analytics focuses on why things happen.

    • Examples include correlation analysis and the size and strength of statistical relationships.

22
New cards

Descriptive vs. Predictive Analytics

  • Descriptive analytics focuses on what has already taken place.

    • Examples include statistical figures such as mean, median, and standard deviation.

  • Predictive analytics focuses on what will happen in the future.

    • Examples include what-if? analysis and expected values.

23
New cards

Critical analysis and pattern recognition

AI works best with functions requiring ________, not with routine activities.

24
New cards

Dependent data mart

Created using a subset of data from an existing data warehouse. It is constructed using a top-down approach wherein all data is stored in one, single central location. A definite part of the data is drawn out when needed for analysis.

25
New cards

Defining business objectives

The most important step when developing a predictive analytics model to ensure that the model provides actionable results.

26
New cards

Difference between on-premises and SaaS applications

SaaS applications are web-based applications delivered over the Internet and on-premises applications require access to an enterprise network.

27
New cards

Detect-and-respond

Regarding cyberattacks, this is a fundamental tenet of the defense-in-depth strategy.

28
New cards

Independent data mart

Constructed using a bottom-up approach. It is a stand-alone system and data is drawn from internal/external sources, instead of a data warehouse.

29
New cards

Binary

Logistic regression is used to predict this type of dependent variable, which can take two possible values (e.g. 0 or 1, True or False, Yes or No). It estimates the probability that a given input point belongs to a certain class.

30
New cards

Logistic regression

A statistical method used for predicting one of two outcomes for an event. Can help show the relationship bet. categorical and quantitative input/output.

Ex.

  • Predicting whether a customer will renew their subscription.

  • Classifying prospective customers as likely to respond favorably or unfavorably to a promotional campaign based on their demographic info.

31
New cards

Challenge to leverage insight from Big Data

To determine the veracity of a set of high-volume, high-variety data.

32
New cards

Benefits of cloud computing

Generally less expensive and provides greater agility. Allows multiple employees to use a browser to remotely access and use application software.

33
New cards

Large and structured

The systems development life cycle approach is best suited for projects that are:

34
New cards

Access log

The most effective technique for monitoring the security of access in an order-entry system. Helps identify unsuccessful access attempts.

35
New cards

Data management vs. Data governance

Data management handles technical aspects, whereas data governance sets policies.

36
New cards

Oversight of data from creation to disposal

The primary objective of data management within an organization. 

37
New cards

Multiple module software package

Best describes an ERP system as it designed to manage all aspects of an enterprise.

38
New cards

Financing cycle

Encompasses all transactions involving the investment of capital, borrowing money, payment of interest, and loan repayments.

39
New cards

Advanced firewall

Also known as a next-generation firewall (NGFW) can do far more than stateful inspection, including being able to determine what kind of application is accessing the firewall (application filtering) and based on certain rules allow or deny the access.

40
New cards

Smart contract

A computer code used to automate the issuance of virtual tokens or virtual coins.

41
New cards

“Break-the-glass procedure” scenario within the SDLC

A developer needs access to the production environment to fix a query that is causing performance issues; all his or her changes are approved subsequent to resolving the problem.

42
New cards

Decision tree

Visually depicts what steps are taken within the process flow of elements that would be automated by instructions or by bots.

43
New cards

Activity logging

A control under defenses against cyberattacks, when implemented, would best assist in meeting control objective that a system have the capability to hold users accountable for functions performed.

44
New cards

Compensating control

It is deployed to augment or enhance existing controls.

Ex. The addition of encrypting data in transit (i.e. HTTPS) that was previously encrypted at rest.

45
New cards

5 Key Principles of ISACA's COBIT

  1. Meeting Stakeholder Needs

  2. Covering the Enterprise End-to-End

  3. Applying a Single-Integrated Framework

  4. Enabling a Holistic Approach

  5. Separating Governance from Management

46
New cards

Functions of a database management system (DBMS)

  • Backup and recovery

  • Encryption

  • Data integrity

47
New cards

Information technology (IT) governance

Consists of the leadership, organizational structures, and processes that ensure that the enterprise's IT supports the organization's strategies and objectives.

48
New cards

Information security governance

Can be defined as the process of establishing and maintaining a framework and supporting management structure and processes to provide assurance that information security strategies are aligned with and support business objectives, are consistent with applicable laws and regulations through adherence to policies and internal controls, and provide assignment of responsibility, all in an effort to manage risk.

49
New cards

Corporate governance

Represents the highest level of governance in terms of oversight function; controls all the other governance sub-functions such as data governance, information security governance, and information technology governance. Refers to the combination of processes and structures implemented by the board of directors to inform, direct, manage, and monitor the activities of an organization toward the achievement of its objectives.

50
New cards

Performance

An organization's ability to attain its goals by using resources in an efficient and effective manner.

51
New cards

Effectiveness

It is the degree to which an organization achieves a stated goal or objective.

52
New cards

Efficiency

It is the use of minimal resources—raw materials, money, and people—to provide a desired volume of output.

53
New cards

Performance measures of corporate performance management (CPM)

Productivity, effectiveness, efficiency, cycle times, and business velocities.

54
New cards

Productivity

A major common element between a corporate performance management (CPM) program and a country's gross domestic product (GDP) is best reflected in:

55
New cards

PDCA Process

When implementing strategy, most companies use this:

  • Plan: Management designs or revises business strategies.

  • Do: The company implements these strategies.

  • Check: The company assesses and reports performance.

  • Act: Determine how strategies can be changed or maintained in the future.

56
New cards

Foresight

Means future showing compliance awareness, strategic planning, and operations planning. This is the ultimate goal of EPM.

57
New cards

Reduced human intervention

The major benefit of implementing corporate performance management (CPM) software.

58
New cards

3 Key sub-processes of EPM

  1. Planning, Budgeting, and Forecasting

  2. Performance Reporting

  3. Profitability and Cost Analysis

59
New cards

Strategic implementation

EPM facilitates what?

60
New cards

Characteristics of an Enterprise Resource Planning (ERP)

  • Modular

  • A common or central database to support the entire system

  • Integrated and a consistent look and feel

61
New cards

Accounting Information System (AIS)

Adds value by providing necessary information that is used for analysis, evaluation, regulation, and strategic decision making.

62
New cards

Rapid elasticity

A key characteristic of cloud computing as systems can be configured to automatically increase their resources such as storage, RAM, or CPU based on the current utilization of the system.

63
New cards

On-demand self-service

A key characteristic of cloud computing as organizations can deploy new systems without direct interaction with the cloud service provider.

64
New cards

Resource pooling

A key characteristic of cloud computing as resources such as CPU cycles or RAM can be utilized based on the system needs.

65
New cards

Key characteristics of cloud computing

  • Rapid elasticity

  • On-demand self-service

  • Resource pooling

66
New cards

Intrusive scanning

Refers to automated testing that may cause target service disruptions or even service or device crashes.

67
New cards

Security audit

Evaluates whether controls exist that enforce compliance with security policy.

68
New cards

Vulnerability vs. Penetration assessment

  • A vulnerability assessment just identifies vulnerabilities that exist in assessed environments, but doesn't attempt to carry out any exploits against identified vulnerabilities.

  • A penetration test attempts to identify vulnerabilities and then carry out exploits against vulnerabilities to attempt to compromise a computing system.

69
New cards

Cyclical analysis

A type of time series analysis that exists when data exhibits rises and falls that are not of fixed period. The duration of these fluctuations is usually at least 2 years. Think of business cycles which usually last several years, but where the length of the current cycle is unknown beforehand.

70
New cards

Trend analysis

A type of time series analysis that provides quantified patterns in plotted data points over time. Often refers to techniques for extracting an underlying pattern of behavior in a time series which would otherwise be partly or nearly completely hidden by noise.

71
New cards

Seasonal analysis

A type of time series analysis that exists when a series is influenced by seasonal factors (e.g., the quarter of the year, the month, or day of the week). Seasonality is always of a fixed and known period. Hence, it is sometimes called periodic time series.

72
New cards

Irregular patterns

A type of time series analysis that results from short-term fluctuations in a series which are not systematic and, in some instances, not predictable (e.g., uncharacteristic weather patterns). Some irregular effects can, however, be expected in advance.

73
New cards

Steps needed when a data analyst is applying data mining tools and methods

Raw data→ Normalized data→ Data extraction→ Data insights

Before data mining software tools are applied, the target raw datasets must be cleaned and normalized to remove missing, erroneous, or inappropriate data. Then, the normalized data is extracted or analyzed using several methods such as data analytics, statistical analysis, data mining methods, simulation technique, or forecasting methods to yield new insights.

74
New cards

Data Hierarchy

Data→Information→Knowledge→Insights→ Results

Shows the progression of data from its origination to destination (i.e., data evolution). Raw data is edited and processed to give knowledge-embedded information that is subjected to analysis to yield actionable insights that lead to making decisions to produce expected results.

75
New cards

Ideal candidate (process) for the utilization of blockchain

A process to automatically create a record of who has accessed information or records.

76
New cards

Systems design

Divided into conceptual design (logical design) and physical design.

  • Logical design: defining data elements, database structures, and data dictionaries; mapping computer screen flows; defining computer program flows with interfaces to other programs; and defining input, processing, and output requirements.

  • Physical design: developing computer program specifications; developing data file layout specifications; defining computer job flows; and defining computer hardware, software, and mobile devices needed to operate and use the new system.

77
New cards

Advantages of DBMS

  • Data security

  • Robust data integrity capabilities

  • Logging and auditing of activity

78
New cards

Non-normalized

A characteristic of a data warehouse. Quite often, the data contained in a data warehouse is redundant.

79
New cards

Component in both COSO + ERM

Control activities exist in both of COSO's Internal Control and Enterprise Risk Management frameworks.

80
New cards

Major challenges in maintaining separate financial systems and nonfinancial systems

I. Two sets of books

II. Unsynchronized data

III. Inconsistent results

IV. Conflicting decisions

81
New cards

Closest to zero

To identify the weakest correlation, we need to determine the coefficient of correlation that is:

82
New cards

Revenue to Cash Cycle

Refers to the process of taking orders, shipping products or delivering services, billing customers, and collecting cash from sales.

83
New cards

Relevant records—Revenue to Cash Cycle

Customer purchase orders, sales orders, picking tickets, shipping documents, invoices, and cash receipts.

84
New cards

Expenditure Cycle

The process of placing orders, receiving shipment of products or delivery of services, approving invoices, and making cash payments.

85
New cards

Relevant records—Expenditure Cycle

Purchase requisitions, purchase orders, receiving reports, and invoices.

86
New cards

Production Cycle

The process by which materials are converted into finished goods.

87
New cards

Relevant records—Production Cycle

Cost accounting reports, bills of materials, customer orders, production schedules, production orders, material requisitions, move tickets, operations reports, job-time tickets, and cost of goods manufactured reports.

88
New cards

Human Resources and Payroll Cycle

The process of recruiting, interviewing, and hiring personnel, paying employees for their work, promoting employees, and finalizing employees’ status from retirements, firings, or voluntary terminations.

89
New cards

Relevant records—Human Resources and Payroll Cycle

Master payroll files, time reports, hiring, promotion, transfer, and firing records, tax and insurance rate records, and individual employment records with data such as withholdings and deductions.

90
New cards

Financing Cycle

The process of obtaining funding, through debt or equity, to run an organizations’ activities and to purchase PPE, servicing the financing, and ultimate repayment of financial obligations.

91
New cards

Relevant records—Financing Cycle

Cash budgets, debt instrument records, equity holding records, and repayment schedules.

92
New cards

Property, Plant, and Equipment Cycle

The process of acquiring resources (e.g., land, buildings, and machinery) needed to enable an organizations’ business activities.

93
New cards

Relevant records—Property, Plant, and Equipment Cycle

Acquisition records, depreciation schedules, and disposal reports.

94
New cards

General Ledger and Reporting System

The process of recording, classifying, and categorizing an organization's economic transactions and producing summary financial reports.

95
New cards

Relevant records—General Ledger and Reporting System

General and subsidiary ledgers, financial statements, and managerial reports.

96
New cards

Challenges of having separate financial and nonfinancial systems.

Primary challenge: data maintenance—that is, making sure the data is accurately linked in both systems.

  • When the two systems are separate, the data must be reconciled to make sure they are measuring the same thing.

  • If the data the systems draw upon is not located in the same place or database, extensive controls must be created and maintained in order to avoid costly errors and inconsistencies.

97
New cards

Enterprise Resource Planning (ERP)

The integrated management of core business processes. Brings together business functions such as inventory management, operations, accounting, finance, human resources, and supply chain management.

98
New cards

Advantages of ERP

Include the availability of real-time data, wide distribution of information, single system learning, and lower operational costs.

  • Data security

  • Customization

  • Transparency

  • Centralization of data

99
New cards

Disadvantages of ERP

Include high initial monetary, implementation, and training costs.

100
New cards

How ERP helps overcome the challenges of separate financial & nonfinancial systems

ERP enables a single information system to provide both financial and nonfinancial information to users. This reduces the errors that can arise when different systems draw on different information sources.

Ex. An ERP can link the CRM system to AIS to reduce errors and increase information usefulness.