Save
Week 3
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Lucy McDowell
Visit profile
Cards (66)
What are the main topics covered in Lecture 3 of ACC3043?
Control concepts
,
COSO
framework,
information security
View source
What is the purpose of control concepts in technology security?
To
prevent
,
detect
, and correct issues
View source
What does COSO stand for in the context of internal control?
Committee of Sponsoring Organizations
View source
What are the three types of internal controls mentioned?
Preventative
,
detective
,
corrective
View source
What are some threats faced by an AIS?
Natural
disasters
,
software
errors, unintentional acts
View source
What is an example of an unintentional act that can threaten an AIS?
Accidental
data loss
due to human error
View source
What is the principle of least privilege in access control?
Grant
minimum
access necessary for tasks
View source
What is the role of detective controls?
To detect
problems
when they arise
View source
What is the purpose of corrective controls?
To identify and correct
problems
as they occur
View source
What does the COSO Internal Control Framework consist of?
Five
components
and
17
principles
View source
What is included in the control environment component of COSO?
Management
philosophy and organizational structure
View source
How is risk assessed according to COSO?
By
likelihood
and
impact
of events
View source
What is the purpose of segregation of duties?
To prevent
fraud
and errors in processes
View source
What are project development/acquisition controls?
Controls for managing
system development projects
View source
What is the significance of change management controls?
To manage
resistance
and ensure smooth transitions
View source
What is the role of independent checks on performance?
To verify
accuracy
and
reliability
of operations
View source
Why is information security considered a management issue?
Because
senior management
support is essential
View source
What does the time-based model of information security emphasize?
Balancing
preventive
,
detective
, and
corrective
controls
View source
How does the equation P > D + C relate to information security?
It measures effectiveness of security controls
View source
What are the key components of the COSO Internal Control Framework?
Control environment
Risk assessment
Control activities
Information and communication
Monitoring
View source
What are the types of internal controls and their functions?
Types of internal controls:
General controls
IT security
Software acquisition/development
Application controls
Prevent
,
detect
, and
correct
errors and
fraud
View source
What are the key AIS control activities?
Authorisation
of transactions
Segregation
of duties
Project development and acquisition controls
Change management controls
Safeguarding assets and records
Independent
checks on performance
View source
What are the main types of risks according to COSO?
Inherent risk
Residual risk
View source
What are the principles of the information and communication process in COSO?
Obtain relevant, high-quality information
Internally communicate
objectives
and
responsibilities
Communicate
internal control matters
to external parties
View source
What are the types of monitoring in COSO?
Internal control evaluations
Effective supervision
Responsibility accounting systems
Periodic audits
Fraud detection measures
View source
What are the key aspects of safeguarding assets, records, and data?
Appropriate policies and procedures
Maintain records of
IT assets
Restrict access to sensitive data
Protect data through
off-site
storage
View source
What is the importance of continuous data auditing?
Verifies
systems operate as expected
Detects
anomalies
in real-time
View source
What is the role of threat intelligence in information security?
Enhances awareness of
potential threats
Facilitates information sharing among organizations
View source
What are the benefits of effective information security management?
Protects
sensitive data
Reduces risk of
data breaches
Enhances
organizational reputation
View source
What should be done with sensitive data?
It should be
encrypted
View source
What must be maintained regarding computer/IT assets?
Records
of all computer/IT assets
View source
Why is access to assets restricted?
To protect
data
and maintain
security
View source
What are some methods to protect data?
Off-site storage
and
fireproofing
View source
What is the purpose of independent checks on performance?
To ensure
accuracy
and
reliability
View source
What is a useful tool to check for oddities in accounts?
The
trial balance
View source
What is a critical factor in information security?
People can be the
weakest link
View source
What does the time-based model of information security involve?
A combination of
preventive
,
detective
, and
corrective
controls
View source
How is security considered effective in the time-based model?
If
P
>
D
+
C
View source
What does log analysis help detect?
Possible attacks on an
AIS
View source
What is the function of Intrusion Detection Systems (IDS)?
To analyze
network traffic
for intrusions
View source
See all 66 cards
See similar decks
4.2.5 Strong and weak acids
AQA GCSE Chemistry > 4. Chemical changes > 4.2 Reactions of acids
28 cards
3.1.12.3 Weak Acids and Bases
AQA A-Level Chemistry > 3.1 Physical Chemistry > 3.1.12 Acids and Bases (A-level only)
159 cards
4.2.5 Strong and weak acids
GCSE Chemistry > 4. Chemical changes > 4.2 Reactions of acids
37 cards
12.3 Strong and Weak Acids and Bases
Edexcel A-Level Chemistry > Topic 12: Acid-Base Equilibria
29 cards
12.3.1 Degree of Ionization
Edexcel A-Level Chemistry > Topic 12: Acid-Base Equilibria > 12.3 Strong and Weak Acids and Bases
29 cards
Week 7
72 cards
Week 1
44 cards
Week 2
81 cards
Week 1
58 cards
Week 7
48 cards
Week 8
60 cards
Week 9
88 cards
Week 5
91 cards
Week 6
106 cards
Week 6
36 cards
Week 5
28 cards
Week 1
38 cards
week 1
55 cards
Week 8
32 cards
Week 2
32 cards
Week 9
61 cards