AIS Exam 2

0.0(0)
studied byStudied by 16 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/153

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

154 Terms

1
New cards

AIS Threats

  • natural and political disasters

  • software errors and equipment malfunctions

  • unintentional acts

  • intentional acts

2
New cards

types of fraud

  • misappropriation of assets

  • fraudulent financial reporting

3
New cards

misappropriation of assets

Theft of company assets which can include physical assets (e.g., cash, inventory) and digital assets (e.g., intellectual property such as protected trade secrets, customer data)

4
New cards

fraudulent financial reporting

“Cooking the books” (e.g., booking fictitious revenue, overstating assets, etc.)

5
New cards

auditors’ responsibilities

  • understand fraud

  • discuss the risks of material fraudulent misstatements

  • obtain information

  • identify, assess, and respond to risks

  • evaluate the results of their audit tests

  • document and communicate findings

  • incorporate a technology focus

6
New cards

Fraud Triangle

knowt flashcard image
7
New cards

computer fraud classifications

  • input

  • processor

  • computer instruction

  • data

  • output

8
New cards

bluebugging

taking control of a phone to make calls, send text messages, listen to calls, or read text messages

9
New cards

bluesnarfing

stealing contract lists, images, and other data using bluetooth

10
New cards

botnet, bot herders

a network of hijacked computers; use the hijacked computers, called zombies, in a variety of attacks

11
New cards

buffer overflow attack

inputting so much data that the input buffer overflows. the overflow contains code that takes control of the computer

12
New cards

brute force attack

trial-and-error method that uses software to guess information, such as the user ID and the password needed to gain access to a system

13
New cards

caller id spoofing

displaying an incorrect number on the recipient’s caller ID display to hide the identity if the callerv

14
New cards

carding

verifying credit card validity; buying and selling stolen credit cards

15
New cards

chipping

planting a chip that records transaction data in a legitimate credit card reader

16
New cards

click fraud

manipulating the number of times an ad is clicked on to inflate advertising bills

17
New cards

cross-site scripting (XSS) attack

exploits web page security vulnerabilities to bypass browser security mechanisms and create a malicious link that injects unwanted code into a website

18
New cards

cyber-bullying

using computer technology to harm another person

19
New cards

cyber-extortion

requiring a company to pay money to keep an extortionist from harming a computer or a person

20
New cards

cryptocurrency fraud

defrauding investors in a variety of cryptocurerrency-related fraud schemes, such as fake initial coin offerings and fake exchanges and wallets

21
New cards

denial-of-service attack

an attack designed to make computer resources unavailable to its users

22
New cards

dictionary attack

software that guesses user IDs and passwords using a dictionary of user IDs and passwords to reduce the number of guesses required

23
New cards

eavesdropping

listening to private voice or data transmissions

24
New cards

economic espionage

the theft of information, trade secrets, and intellectual property

25
New cards

email spoofing

making a sender address and other parts of an e-mail header appear as though the e-mail originated from a different source

26
New cards

email threats

sending a threatening message asking recipients to do something that makes it possible to defraud them

27
New cards

evil twin

a wireless network with the same name as another wireless access point. Users unknowingly connect to the evil twin; hackers monitor the traffic looking for useful information

28
New cards

hacking

unauthroized access, modification, or use of an electronic device or some element of a computer system

29
New cards

hijacking

gaining control of someone else’s computer for illicit activities

30
New cards

identity theft

assuming someone’s identify by illegally obtaining confidential information such as a social security number

31
New cards

internet auction fraud

using an internet auction site to commit fraud

32
New cards

internet misinformation

using the internet to spread false or misleading information

33
New cards

internet pump-and-dump fraud

using the internet to pump up the price of a stock and then sell it

34
New cards

IP address spoofing

creating IP packets with a forged IP address to hide the sender’s identity or to impersonate another computer system

35
New cards

keylogger

using spyware to record a user’s keystrokes

36
New cards

Lebanese looping

inserting a sleeve into an ATM so that it will not eject the victim’s card, pretending to help the victim as a means of obtaining his PIN, and using the card and PIN to drain the account

37
New cards

malware

software that is used to do harm

38
New cards

man-in-the-middle (MITM) attack

a hacker placing himself between a client and a host to intercept network traffic; also called session hijacking

39
New cards

masquerading/impersonation

gaining access to a system by pretending to be an authorized user. the impersonator enjoys the same privileges as the legitimate user

40
New cards

packet sniffers

inspecting information packets as they travel across computer networks

41
New cards

password cracking

recovering passwords by trying every possible combination of upper and lower case letters, numbers and special characters and comparing them to a cryptographic hash of the password

42
New cards

pharming

redirecting traffic to a spoofed website to obtain confidential information

43
New cards

phising or web-page spoofing

communications that request recipients to disclose confidential information by responding to an email or visiting a website

44
New cards

phreaking

attacking phone systems to get free phone access using phone lines to transmit viruses and to access steal, and destroy data

45
New cards

piggybacking

  1. clandestine use of someone’s Wi-Fi network

  2. tapping into a communications line and entering a system by latching onto a legitimate user

  3. bypassing physical security controls by entering a secure door when an authorized person opens it

46
New cards

podslurping

using a small device with storage capacity to download unauthorized data from a computer

47
New cards

posing

creating a seemingly legitimate business, collecting personal data while making a sale, and never delivering items sold

48
New cards

pretexting

acting under false pretenses to gain confidential information

49
New cards

ransomware

software that encrypts programs and data until a ransom is paid to remove it

50
New cards

rootkit

software that conceals processes, files, network connections, and system data from the operating system and other programs; can also change the operating system

51
New cards

round-down fraud

truncating interest calculations at two decimal places and placing truncated amounts in the perpetrator’s account

52
New cards

salami technique

stealing tiny slices of money over time

53
New cards

scareware

malicious software of no benefit that is sold using scare tactics

54
New cards

scavenging/dumpster diving

searching for documents and records in garbage cans, communal trash bins, and city dumps to obtain confidential information

55
New cards

sexting

exchanging sexually explicit text messages and pictures, usually by phone

56
New cards

shoulder surfing

watching or listening to people enter or disclose confidential data

57
New cards

skimming

double-swiping a credit card or covertly swiping it in a card reader to record the data for later use

58
New cards

SMS spoofing

using short message service (SMS) to change the name or number a text message appears to come from

59
New cards

social engineering

techniques that trick a person into disclosing confidential information

60
New cards

software piracy

unauthorized copying or distribution of copyrighted software

61
New cards

spamming

sending an unsolicited message to many people at the same times

62
New cards

spoofing

making an electronic communication look like someone else sent it

63
New cards

spyware

software that monitors computing habits and sends that data to someone else, often without the user’s permission

64
New cards

SQL injection attack

inserting a malicious SQL query in input such that it is passed to and executed by an application program

65
New cards

steganography

hiding data inside a host file, such as a large image or sound file

66
New cards

time bomb/logid bomb

software that sits idle until a specified circumstance or time triggers it, destroying programs, data, or both

67
New cards

torpedo software

software that destroys competing malware

68
New cards

trap door/back door

a back door into a system that bypasses normal system controls

69
New cards

trojan horse

unauthorized code in an authorized and properly functioning program

70
New cards

typosquatting/URLhijacking

websites with names similar to real websites; users making typographical errors are sent to a site filled with malware

71
New cards

virus

executable code that attaches itself to software, replicates itself, and spreads to other systems or files. When triggered, it makes unauthorized alterations to the way a system operates

72
New cards

vishing

voice phishing, in which email recipients are asked to call a phone number that asks them to divulge confidential data

73
New cards

war dialing

dialing phone lines to find idle modems to use to enter a system, capture the attached computer, and gain access to its network(s)

74
New cards

war driving

looking for unprotected wireless networks using a car

75
New cards

worm

a program rather than a code segment hidden in a host program. actively transmits itself to other systems. it usually does not live long but is quite destructive while alive

76
New cards

zero-day attack

attack between the time a software vulnerability is discovered and a patch to fix the problem is released

77
New cards

zombie

a hijacked computer, typically part of a botnet, that is used to launch a variety of Internet attacks

78
New cards

functions of internal controls

preventive controls, detective controls, corrective controls

79
New cards

preventive controls

deter problems from occuring

80
New cards

detective controls

discover problems that are not prevented

81
New cards

corrective controls

identify and correct problems; correct and recover from the problems

82
New cards

levers of control

belief system, boundary system, diagnostic control system, interactive control system

83
New cards

belief system

Help employees understand mission and vision

84
New cards

boundary system

Establishing the boundaries of ethical employee behavior

85
New cards

diagnostic control system

Measure, monitors, and compares actual performance to goals

86
New cards

interactive control system

Focus attention on strategic issues

87
New cards

regulatory background

  • Foreign Corrupt Practices (FCPA)

  • Sarbanes-Oxley (SOX)

88
New cards

Foreign Corrupt Practices (FCPA)

  • Prevent companies from bribing foreign officials to obtain business

  • Requires all publicly owned corporations to maintain a system of internal accounting controls.

89
New cards

Sarbanes-Oxley (SOX)

  • Prevent financial statement fraud.

  • SOX 404: requires public corporations to get an audit of Internal Control over Financial Reporting (ICFR)

90
New cards

COSCO-IC

  • control environment

  • risk assessment

  • control activities

  • information and communication

  • monitoring

91
New cards

COSO-ERM

  • internal environment

  • objective setting

  • event identification

  • risk assessment

  • risk response

  • control activities

  • information and communication

  • monitoring

92
New cards

COSO-ERM Internal Environment

  • Management’s philosophy, operating style, and risk appetite

  • Commitment to integrity, ethical values, and competence

  • Internal control oversight by Board of Directors

  • Organizing structure

  • Methods of assigning authority and responsibility

  • Human resource standards

93
New cards

Cost Benefit Analysis

  • Risk is assessed from two perspectives:

    • Likelihood

      • Probability that the event will occur

    • Impact

      • Estimate potential loss if event occurs

  • Expected Loss = Impact x Likelihood

94
New cards

Risk Response

  • reduce

  • accept

  • share

  • avoid

95
New cards

reduce

implement effective internal control

96
New cards

accept

do nothing, accept likelihood, and impact of risk

97
New cards

share

buy insurance, outsource, or hedge

98
New cards

avoid

do not engage in the activity

99
New cards

control activities

  • Proper authorization of transactions and activities

  • Segregation of duties

  • Project development and acquisition controls

  • Change management controls

  • Design and use of documents and records

  • Safeguarding assets, records, and data

  • Independent checks on performance

100
New cards

trust services framework

knowt flashcard image