Module 3: System Interfaces and End-user Computing, Data Governance Flashcards

1
Q

What is the difference between a system and system interface?

A
  • A system is a set of elements (software and hardware) that work together to run one or more computers
  • A systems interface is a way through which data is transferred from one application to another with little to no human interference.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do you call interfaces that have human interaction?

A

User interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the main characteristics of System Interfaces?

A
  1. It shares data
  2. It disregards programming language dependency
  3. It offers flexibility in application selection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Categories of System Interfaces: occur when data is transferred between two systems,

A

System to system interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Categories of System Interfaces: system to system interfaces are made internally only (T or F)

A

False. It can be internally or externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Categories of System Interfaces: Which category of system interfaces is closely related to data mining?

A

System to System interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Categories of System Interfaces: two
partners are continuously transferring data back and forth across agreed-upon systems

A

Partner to Partner Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Categories of System Interfaces: What is the defining characteristic of partner to partner interface?

A

The transfer of data between individuals are done on a regular basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Categories of System Interfaces: What is the most unnoticed and unmanaged?

A

Person to person transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Risk associated with system interfaces: What is the current solution of organizations to the growth of system interfaces?

A
  1. Centralized methodology for tracking and managing
  2. Proper documentation and audit trail
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Risk associated with system interfaces: What are the risks with unmanaged system interfaces?

A
  1. Data Privacy
  2. Data Security
  3. Error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Risk associated with system interfaces: What is the most critical consideration with regard to system interfaces and why?

A

Data Integrity. This is because the data is used to generate management reports and for decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk associated with system interfaces: Beyond an effect on business value, even a small error can invoke ___ ____ ___ ___

A

Potential legal compliance liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Issues with System Interfaces: What are system interfaces’ primary and secondary objectives?

A

Primary: Maintain security of data being transferred through system interfaces
Secondary: To prevent unauthorized access to the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security Issues with System Interfaces: Unavailability of system interfaces can also affect the?

A

Reliability of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Controls associated with System Interfaces: What should the IS auditor ensure with regards to System Interfaces?

A

That there is a program that tracks all system interfaces and transfers of data, both internal and external.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Controls associated with System Interfaces: What do you call programs that organizations use to track SIs

A

Managed File Transfer System

18
Q

Controls associated with System Interfaces: What function should MFT have whether it is commercial or custom?

A

The ability to see all the transfers made, including ad hoc

19
Q

Controls associated with System Interfaces:
* ___ ___ ___ transfer mechanisms.
* Use ___ ___.
* Automatically __ __ ___ __ __ __ data files.
* ___ ____ data files.
* Connect to __ __ __
* Send and retrieve files __ __ __ __ __ __

A
  1. Manage multiple files
  2. multiple protocols
  3. encrypt, decrypt and electronically sign
  4. Compress/decompress
  5. common database servers.
  6. via email and secure email
20
Q

Controls associated with System Interfaces:
* Automatically schedule __ ___ __
* Analyze, track and report any ___ of the data being transferred.
* Ensure compliance with __ __ __ __ __.
* Offer a ___ __ __capability for interruptions.
* Integrate with ___ __ __ to automate data transfers as much
as feasible.

A
  1. regular data transfers.
  2. attributes
  3. appropriate regulatory laws and mandates
  4. checkpoint or restart
  5. back-office applications
21
Q

Controls associated with System Interfaces: Example of manual controls for system interfaces?

A

Manual reconciliation done by a qualified person

22
Q

Controls associated with System Interfaces: What should be used when industrial espionage, identity theft, etc. are likely to happen?

A

Encryption should be used when unauthorized access is relatively high

23
Q

Controls associated with System Interfaces: What might be required in the transfer process and data files

A

Process: High access and authentication controls
Files: Password protected

24
Q

Controls associated with System Interfaces: What information must be captured to ensure an audit trail?

A

( 2 Whos 2 Whens 1 What)
1. Who sent and received
2. When sent and received
3. What is the data structure

25
Q

Controls associated with System Interfaces: automated logs must be especially assessed if?

A

It has gone to an external system

26
Q

End-user computing: What are the characteristics of end user computing?

A
  1. From end users
  2. Created own application
  3. Made by non programmers
27
Q

End-user computing: Who is the liaison between the IT department and end users?

A

End-user support manager

28
Q

End-user computing: What are the advantages of end user computing?

A
  1. Lessens the stress on IT department
  2. rapidly addressing shifting marketplaces, regulations and consumer interests
29
Q

End-user computing: What are the main disadvantages of end user computing?

A
  1. It does not go through an independent review
  2. It did not follow a formal development methodology
30
Q

End-user computing: In what aspects does EUC lead to security risk?

A
  1. Authorization
  2. Authentication
  3. Audit Logging
  4. Encryption
31
Q

End-user computing: management should define __ ___to determine the criticality of the application. These
applications should also be subject to ___ ___,

A

Risk Criteria; Data classification

32
Q

End-user computing: More often than not, EUC applications post risks to organization (T or F)

A

False because they dont usually pose a great risk to the org

33
Q

End-user computing: What should the organization do to EUC applications that are critical

A

Be subjected to the same controls as any other application

34
Q

Data Governance: Data governance reflects the practice of ___ ___ and ___ ___ ___ ___ over data and information so that users have access to that data and can trust and rely on it.

A

evaluating requirements; bringing direction and control

35
Q

Data governance: Data governance also involves __ __ __ __ __ __, specifically those areas that relate to data and its availability, integrity and confidentiality

A

monitoring the performance of IT operations

36
Q

Data Management: What is the meaning of DMBOK

A

Data Management Body of Knowledge

37
Q

Data Management: What is the key to data management?

A

Data Quality

38
Q

Data Management: What are the three subdimensions of data quality?

A
  1. Intrinsic
  2. Contextual
  3. Security/Accessibility
39
Q

Data Management: What should the IS auditor ensure?

A
  1. quality of data is able to meet the strategic objectives of the organization
  2. The applications is in line with organizational objectives
40
Q
A