AICPA Top Technology Issues for CPAs

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/23

flashcard set

Earn XP

Description and Tags

These flashcards cover key terms and concepts related to the top technology issues for CPAs, focusing on information security, fraud, and operational resilience.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

24 Terms

1
New cards

Information Security Management

Top technology issue impacting CPAs, focused on protecting data confidentiality, integrity, and availability.

2
New cards

CIA Triad

Framework that includes Confidentiality, Integrity, and Availability in information security.

3
New cards

Virus

A self-replicating program that modifies other files or programs.

4
New cards

Worm

A self-contained program that propagates through networks.

5
New cards

Trojan Horse

A malicious program that appears to be legitimate.

6
New cards

Spam

Unsolicited bulk messages sent over the internet.

7
New cards

Botnet

A network of hijacked systems controlled remotely.

8
New cards

Denial-of-Service (DoS)

An attack that disrupts access to resources or delays operations.

9
New cards

Spyware

Software that secretly gathers information from a user.

10
New cards

Spoofing

The act of falsifying the source of network packets.

11
New cards

Social Engineering

A tactic used to trick individuals into giving up confidential information.

12
New cards

Encryption

The process of converting plaintext into unreadable ciphertext using algorithms and keys.

13
New cards

Symmetric-Key Encryption

Encryption using the same key for both encryption and decryption.

14
New cards

Asymmetric-Key Encryption

Encryption using a pair of keys: a public key and a private key.

15
New cards

Digital Signatures

Tools used to ensure data integrity and authenticate the document creator.

16
New cards

Certificate Authority (CA)

A trusted entity that issues and revokes digital certificates.

17
New cards

Public Key Infrastructure (PKI)

System administering public/private key pairs and digital certificates.

18
New cards

Fraud

An intentional illegal act characterized by deceit and violation of trust.

19
New cards

Fraud Triangle

A model that includes Incentive/Pressure, Opportunity, and Rationalization, identifying factors that lead to fraud.

20
New cards

Computer Fraud and Abuse Act (CFAA)

A law making it a federal crime to access protected computers without authorization.

21
New cards

Vulnerability

A characteristic of IT resources that can be exploited to cause harm.

22
New cards

Disaster Recovery Planning (DRP)

A documented plan to restore operations and infrastructure after a disaster.

23
New cards

Business Continuity Management (BCM)

A broader strategy ensuring continuous business operation during disruptions.

24
New cards

ISO 22301

An international standard providing a framework for Business Continuity Management Systems (BCMS).