Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
Digital Certificate
|
A digital certificate is an electronic document that verifies the identity of the owner of the key.
signed by an independent third party called a certificate authority (CA) and contains a party’s name and public key information (e.g. Thawte or Verisign) |
|
Certificate authority
|
Makes digital certificates
|
|
HTML
|
HTML (HyperText Markup Language): uses a series of predefined tags to display the data on Web pages.
|
|
XML
|
XML (eXtensible Markup Language): similar to HTML, but allows users to define their own tags to describe the data.
|
|
XBRL
|
XBRL (eXtensible Business Reporting Language): a specialized subset of XML that standardizes the tags that describe financial information in documents.
|
|
XBRL instance documents
|
examples (“instances”) of a class of documents defined by a standard or specification
|
|
XBRL taxonomies
|
define the tags that represent accounting and financial terms used in XBRL instance documents.
|
|
XBRL Specification 2.1:
|
defines the rules and syntax for XBRL documents and taxonomies
|
|
IDEA (interactive data and electronic applications
|
SEC database that contains XBRL data for over 10,000 companies.
|
|
Benefits of XBRL
|
standard format for financial info
Easy search with standard tags Self checking with semantic meaning in formulas XBRL has its own software program that you can use cross platform |
|
Audit Trail Controls
|
validating source docs to transaction and activity listings
|
|
Activity listing:
|
an account change report that contains complete and detailed information about all changes to master files
|
|
How do output controls regulate controls to minimize loss or misdirection of printed output
|
only enough copys of the report are printed.
Each user has to pick it up him. Security officers Paper shredders. |
|
information system controls
|
General controls-Organiztional level
Application controls: Prevent detect and correct errors |
|
examples of general controls
|
Personnel Controls (segregation of duties)
Fault-Tolerant Systems, Backup, and Contingency Planning Computer Facility Controls Access to Computer Files |
|
Personnel controls ( 3 seperation of duties)
|
System Analysis function
Programming Function Computer operations function Data control AIS Library Function |
|
Systems Analysis Function:
|
design an information system/application program to meet user needs
|
|
Programming Function:
|
write computer programs to implement the design
|
|
Computer Operations Function:
|
run the software on the computer systems
|
|
Data Control Function:
|
ensure data input have been properly authorized, monitor data processing, and distribute system output
|
|
AIS Library Function
|
maintain custody of corporate databases, files, and program in a separate storage area called the AIS library.
|
|
Fault-Tolerant systems
|
tolerate computer errors and keep functioning.
Based on redundency |
|
Disk Shadowing
|
Disk mirroring.
Makes disks fault tolerant Writing all data in parallel into two disks RAID |
|
RAID Redundency arrays of independent disk
|
example of Disk Shadowing
|
|
Backup
|
files are retained in a remote site and availalbe incase of emergency
|
|
Grandfather-parent-child (GPC) procedure
|
Three generations of data files are retained during the updating process
If the current file is destroyed or corrupted, the data are reconstructed by reprocessing the transaction file against the prior backup copy . |
|
Diaster recovery plan (3types)
|
when something happens and you need to start business over
Cold site hot site Flying start site |
|
Cold site:
|
a location where power and space are available to install processing equipment on short notice
|
|
Hot site:
|
a location that includes a computer system configured similarly to the system used at the main data processing center
|
|
Flying-start site
|
Can be started in mins or secs
|
|
Computer facility controls
|
involves controlling the physical assets(computers)
located in a private safe place guarded by personel Limit employee access. Buy insurance |
|
Access to company computer files
|
Combine a number of security technologies, including, but not limited to firewalls, proxy server, intrusion detection systems, encryption, and VPN.
|
|
Strong password protection
|
min length
required password change in intervals UPper lower and numbers no more than 3 invaled login attempts |
|
Application controls
|
prevent detect errors and irregularities in transactions that are processed
Business process application 3 types Input processing Output |
|
Input controls
|
edit tests to make sure stuff gets put in right
|
|
Examples of edit tests (11)
|
Numeric field -only numbers
Alphabetic field -only letters Alphanumeric field -leters numbers (no characters) Range -upper lower limits of numbrs Length- Cap on digits Valid code- 1=cash sale 2=credit Reasonablenesss- 25/hour not for janitor signs.- hours worked cant be negative Completeness all data has been entered sequence-prescribed order Check digit= appended to original number |