ITSAC - Module 5 & 6 Flashcards

(31 cards)

1
Q

is an audit of an organization’s IT systems, management, operations and related processes.

A

Information Technology (IT) audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

may be carried out in connection with a financial regularity audit or selective audit. As the records, services and operations of many organizations are often highly computerized, there is a need to evaluate the IT controls in the course of an audit of these organizations.

A

IT audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • This is an examination of the policies and procedures of an entity or department, to see if it is in compliance with internal or regulatory standards. This audit is most commonly used in regulated industries or educational institutions.
A

Compliance audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • This is an analysis of the fairness of the information contained within an entity’s financial statement. It is conducted by a CPA firm, which is independent of the entity under review. This is the most commonly conducted type of audit.
A

Financial audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • This involves a review of the controls over software development, data processing, and access to computer systems. The intent is to spot any issues that could impair the ability of IT system to provide accurate information to users, as well as to ensure that unauthorized parties do not have access to the data.
A

Information systems audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • This is a detailed analysis of the goals, planning processes, procedures, and results of the operations of a business. The audit may be conducted internally or by an external entity. The intended result is an evaluation of the operations, likely with recommendations for improvement.
A

Operational audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– fake products, job offers, romance scams

A

Online Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

– hacking into accounts or systems

A

Illegal Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

– stealing personal info for fraud

A

Computer-Related Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– cloning cards, phishing banking details

A

ATM/Credit Card Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– sending harmful or intimidating messages online

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– deleting or altering data without permission

A

Data Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– sharing intimate content without consent

A

Anti-Photo and Video Voyeurism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

– tricking people using digital means

A

Computer-Related Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– repeated online harassment

A

Unjust Vexation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a federal law that sweeping auditing and financial regulations for public companies. Lawmakers created the legislation to help protect shareholders, employees, and the public from accounting errors and fraudulent financial practices.

A

Sarbanes-Oxley Act of 2002

17
Q

refers to laws made by a country’s national (federal) government that apply to all states, provinces, or territories within that country. This is common in countries with a federal system, like the United States, Canada, Australia, etc.

A

Federal legislation

18
Q

The purpose of this is to establish consistent legal standards across the entire country, especially for issues like cybersecurity, privacy, and IT infrastructure.

A

Federal legislation

19
Q

These are laws, treaties, or frameworks agreed upon by multiple countries to address IT issues that cross borders—like data transfer, cybersecurity threats, or online piracy.

A

International Legislation

20
Q

The purpose of this is to create consistent standards and cooperation among countries in dealing with global IT challenges.

A

International Legislation

21
Q

These are laws enacted by a country’s state or regional government.

A

State Legislation

22
Q

The purpose is to regulate the use, development, and security of information technology within its borders.

A

State Legislation

23
Q

– criminalizes unauthorized access to computers.

A

Computer Fraud and Abuse Act (CFAA)

24
Q

– protects children’s privacy under 13 online.

A

Children’s Online Privacy Protection Act (COPPA)

25
– protects copyrighted digital content.
**Digital Millennium Copyright Act (DMCA)**
26
– EU law on data privacy.
**General Data Protection Regulation (GDPR)**
27
– the first international treaty to address internet and computer crime.
**Budapest Convention on Cybercrime**
28
– protects creators of software and digital content globally.
**WIPO Copyright Treaty**
29
– protects personal information (Philippines).
**Data Privacy Act of 2012 (RA 10173)**
30
– addresses online crimes.
**Cybercrime Prevention Act of 2012 (RA 10175)**
31
– recognizes electronic documents and signatures.
**E-Commerce Act of 2000 (RA 8792)**