AIS CHAPTER 10

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/21

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:53 PM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

22 Terms

1
New cards

IT Security Controls

Measures used to protect systems, ensure accuracy, and prevent unauthorized access.

2
New cards

Unintentional Threats

Risks caused by human error or natural events.

3
New cards

Intentional Threats

Risks caused by deliberate actions such as hacking or fraud.

4
New cards

Application Controls

Controls that ensure accuracy and completeness of transactions.

5
New cards

IT General Controls

Controls that apply to the overall system to ensure security and reliability.

6
New cards

Validity Check

A test ensuring entered data exists and is acceptable.

7
New cards

Consistency Check

A test ensuring entered data aligns logically with related data.

8
New cards

Limit Check

A test ensuring values fall within predefined boundaries.

9
New cards

Completeness Check

A test ensuring all required fields are filled.

10
New cards

Field Check

A test ensuring data is entered in the correct format.

11
New cards

Prenumbering Documents

A control assigning sequential numbers to detect missing transactions.

12
New cards

Record Count

A control comparing number of processed records to expected totals.

13
New cards

Control Total

A control comparing total dollar amounts processed to expected totals.

14
New cards

Hash Total

A control summing nonfinancial values to detect errors.

15
New cards

Distribution Check

A control ensuring outputs go only to authorized users.

16
New cards

Reasonableness Test

A review ensuring outputs appear logical.

17
New cards

Access Control Lists (ACLs)

Lists defining user permissions for system access.

18
New cards

Authentication Controls

Mechanisms used to verify identity such as passwords or biometrics.

19
New cards

Encryption

A method of converting data into unreadable form without a key.

20
New cards

Intrusion Detection Systems (IDS)

Systems that monitor for suspicious activity.

21
New cards

Change Controls

Procedures ensuring system changes are authorized and properly implemented.

22
New cards

Operational Controls

Procedures ensuring systems remain functional and reliable.