AIS Test 2 Flashcards
(134 cards)
Sabotage
Intentional act where the intent is to destroy a system or some of its components.
Cookie
Text file created by a website and stored on a visitor’s hard drive. Cookies store information about who the user is and what the user has done on the site.
Fraud
Any and all means a person uses to gain an unfair advantage over another person.
White-Collar Criminals
Typically, business people who commit fraud. White-collar criminals usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence.
Corruption
Dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.
Investment Fraud
Misrepresenting or leaving out facts in order to promote an investment that promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud.
Misappropriation of Assets
Theft of company assets by employees.
Fraudulent Financial Reporting
Intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.
Pressure
Person’s incentive or motivation for committing fraud.
Opportunity
Condition or situation that allows a person or organization to commit and conceal a dishonest act and covert it to personal gain.
Lapping
Concealing the theft of cash by means of a series of delays in posting collections to accounts receivable.
Check Kiting
Creating cash using the lag between the time a check is deposited and the time it clears the bank.
Rationalization
Excuse that fraud perpetrators use to justify their illegal behavior.
Computer Fraud
Any type of fraud that requires computer technology to perpetrate.
Time-Based Model of Security
Implementing a combination of preventive, detective, and corrective controls that protect information assets long enough to enable an organization to recognize that an attack is occurring and take steps to thwart it before any information is lost or compromised.
Defense-In-Depth
Employing multiple layers of controls to avoid a single point-of-failure.
Social Engineering
Using deception to obtain unauthorized access to information resources.
Authentication
Verifying the identity of the person or device attempting to access the system.
Biometric Identifier
A physical or behavioral characteristic that is used as an authentication credential.
Multifactor Authentication
Use of two or more types of authentication credentials in conjunction to achieve a greater level of security.
Multimodal Authentication
Use of multiple authentication credentials of the same type to achieve a greater level of security.
Authorization
Process of restricting access of authenticated users to specific portions of the system and limiting what actions they are permitted to perform.
Access Control Matrix
Table used to implement authorization controls.
Compatibility Test
Matching the user’s authentication credentials against the access control matrix to determine whether that employee should be allowed to access that resource and perform the requested action.