Study unit 8.5 Flashcards

1
Q

What is the different types of networks

A

Within one organisation - LAN and WAN

Between different organisations - VAN and internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the risks in terms of a network environment

A

Unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the controls in a network environment to ensure validity/occurrence of data communication

A

physical and logical access controls
restricting access to dial-up lines
call back facility
automatic lockout after 3 unsuccessful log-in attempts
sophisticated user authentication techniques
encryption methods
use of firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the definition of an EDI

A

A computer to computer exchange of business documents in a standard electronic format between business partners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Via what does it take place

A

It takes place via a private network and a public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does EDI translator mean

A

Translates data from EDI format to a readable format by an internal application. It can be an in-house software or via service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an EDI document

A

Data being transmitted in a standard electronic format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is EDI envelopes

A

Message envelopes is the different purchase orders
Group envelopes is the purchase order group
Interchange envelope is the purchase order group from one sender to one receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the advantages of using EDI’s

A

Survival - pre-requisite for doing business
Improved client services - speed of sending/receiving messages and processing of transactions
cost benefits - less human preparation and capturing time
reduced risk of errors - transaction only captured once
cost savings relating to storage documents
improve accuracy and timeliness of information for decision making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What will the audit approach be in a computer environment

A

Combined:
*transactions are performed and accounted for electronically - lack of visible audit trail
*large number of transactions
*transactions are stored in electronic format for short period of time
*reliance have to be placed on automated controls
test of controls
*test general controls
*test automated application controls
*test controls relating to transmission of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the business continuity risks

A

dependence on technology
dependence on service provider/trading partners
increased reliance on networks and data communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the business continuity controls

A
Data interchange agreement 
*method of data interchange
*accountability for creation transmission and receipt of messages
*standard format of messages
*responsibilities and duties
*security audits
*format of acknowledgement of messages
*legal implications of unauthorised transactions
Disaster recovery plan
Back-up procedures
Contractual agreements
*format of messages
*acknowledgement of messages
*security considerations
*independent review of controls
*log of transactions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the security risks

A

Unauthorised access to confidential data
Unauthorised processing of data
Unauthorised use of facilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the security controls

A

Logical access controls

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the implementation risks

A

Implementation risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the implementation controls

A
Implementation consideration and risk analysis
*commercial consideration
*identification of EDI trading partners
*negotiate data interchange agreements
*EDI coordinate champion
System development controls
17
Q

What is the processing risks

A

Reliance on automated controls - loss of user controls

Lack of visible audit trail

18
Q

What is the processing controls

A

Relevant edit checks
Exception reports on these edit checks
Review of these exception reports by management
Unique and sequential numbering of transactions
Logging all transactions
Run-to-run/control totals and reconciliation thereof
Data to be written on a pending file, to be reviewed and approved by senior management

19
Q

What is the transmission/transfer risks

A

Manipulation of transactions during transmission
Loss of transactions during transmission
Delivery of transactions to wrong party

20
Q

What is the transmission/transfer controls

A

Encryption of data transmitted
Run-to-run/control totals should be maintained
Reconciliation of control totals
Automatic error identification of error that occurred during transmission
Exception report listing error which occurred during transmission
Exception report followed up by management on a regular basis
System should maintain logs of all transactions
Sequential numbering of transactions
Each transaction - internal header and tailer
Field presence test on data missing from required fields
Acknowledgement of receipt of transactions that exceed a certain value
Echo check - data transmitted is echoed back and agreed to data captured
Call back facility - incoming messages
Digital signature - outgoing messages
Standard document headers on all messages

21
Q

What is the legal risks

A

Risk of non-compliance with regulations of SARS, DTI and reserve bank

22
Q

What is the legal controls

A

Ensure compliance

23
Q

What is cloud computing

A

Delivery of computing services
Companies offering these computing services, are called cloud providers and typically charge for cloud computing services based on usage

24
Q

What is the different types of cloud services

A

Infrastructure-as-a-service - most basic category of cloud computing service from a cloud provided on a pay as you go basis
Platform-as-a-service - cloud computing that supply an on demand environment for developing, testing, delivering and managing software applications
Software-as-a-service - method for delivering software applications over the internet, on demand and typically on a subscription basis

25
Q

What is the types of cloud deployments

A

Public cloud
*public clouds are owned and operated by a third party cloud service provider, which deliver their computing resources like servers and storage over the internet. all hardware, software and other supporting infrastructure is owned and managed by the cloud provider
*publicly shared virtualized resources
*supports multiple customers
*supports internet connectivity
*suited for less confidential information
Private cloud
*private cloud refers to cloud computing resources used exclusively by a single business or organisation. private cloud can be physically located on the company’s on site data centre
*privately shared virtualized resources
*cluster of dedicated customers
*connectivity over internet, fiver and private network
*suited for secured confidential information and core systems
Hybrid cloud
*hybrid cloud combine public and private clouds, bound together by technology that allows data and applications to be shared between them

26
Q

What is the risks of cloud computing

A

Physical access - private and public cloud
Physical location of cloud server - susceptible to natural disasters
Abuse and nefarious use of cloud computing - lack of control in registration permits anonymity in the cloud
Malicious insiders at cloud service providers
Shared technology vulnerabilities - IAAS renders their services, often sharing infrastructure. Not designed to offer isolation properties for multi-tenant architectures
Loss of leakage of data
Hardware failure at service provider - prolonged outages
Legal ownership of data
Account, service and traffic hijacking
Bankruptcy of cloud provider
Internet disruption - customer’s own internet connection fails or is disrupted
Transfer of data - corrupt/lost/intercepted

27
Q

What is the controls of cloud computing

A

Good IT governance, including security policy addressing security standards
Staff to be trained regularly on IT risk management and controls
Select service provider based on security needs
Service level agreement with SP that address
*Each party’s responsibilities
*assurance needed from SP’s auditors over security controls
*security controls should include
-physical control at premises hosting the cloud
-encryption of data that is processed or stored within the cloud
-use of firewalls/SSL
-anti-virus software to prevent loss of information
-backups
-emergency disaster and recovery plans
*ownership of data
Legal access controls, including amending masterfile
Data communication controls

28
Q

What is the advantages of cloud computing

A
Disaster recovery
Accessibility
cost-effective
scalability
automated backups
29
Q

What is the disadvantages of cloud computing

A
Lack of control
Migration challenges
Internet-dependent
Privacy concerns
Fixed contracts
30
Q

What is the different cloud service models

A

SAAS - end users; users access services via a web browser or app (bought on per user basis)
PAAS - application developers; includes the tools and software that developers need to build applications on (operating systems and development tools)
IAAS - infrastructure and network architects; building blocks of computing that can be rented (physical or virtual servers, storage or networking)

31
Q

What is the controls to ensure accuracy and completeness of data communication is to install software to carry out the following tasks

A
access control
network management
data and file transmission
error detection and control
data security