Computer Controls Jeopardy - PowerPoint PPT Presentation

1 / 44
About This Presentation
Title:

Computer Controls Jeopardy

Description:

... (CICA) that independently tests and verifies a system's ... Compatibility ... An edit test in which an identification number or transaction ... – PowerPoint PPT presentation

Number of Views:68
Avg rating:3.0/5.0
Slides: 45
Provided by: shannon1
Category:

less

Transcript and Presenter's Notes

Title: Computer Controls Jeopardy


1
Computer ControlsJeopardy
2
Jeopardy
3
Double Jeopardy
4
  • Insuring authorized access to the System and its
    resources
  • What is Security?

5
  • Monitoring, planning, and implementing
    appropriate system changes.
  • What is Maintainability?

6
  • System processing is timely, accurate, complete
    and authorized.
  • What is Integrity?

7
  • When I need the systems services, the system is
    operating.
  • What is Availability?

8
  • This reliability principle incorporates Disaster
    Recovery Plans.
  • What is Availability?

9
  • An information systems assurance service
    introduced by the AICPA and the Canadian
    Institute of Chartered Accountants (CICA) that
    independently tests and verifies a systems
    reliability
  • What is Systrust?

10
  • Documentation of overall standards and procedures
    for data processing. Includes policies relating
    to justification and authorization of new systems
    or systems changes, standards for systems
    analysis, design, and programming and procedures
    for file handling and file library activities.
  • What is Administrative Documentation ?

11
  • Documents all information required by a computer
    operator to run a program, including the
    equipment configuration used, variable data to be
    entered on the computer console, and descriptions
    of conditions leading to program halts and
    related corrective actions.
  • What is Operating Documentation ?

12
  • Documents each application and its key processing
    functions. It includes narrative material,
    flowcharts and program listing. It show
    application inputs, processing steps, outputs and
    error handling procedures.
  • What is Systems Documentation?

13
  • This control facilitates communication and
    regular progress reviews during systems
    development and be used as a reference and
    training tool for newly hired systems employees.
    It also simplifies program maintenance and eases
    problems related to job turnover.
  • What is Quality Documentation?

14
  • A program of regularly examining the hardware
    components of a computer and replacing any that
    are found to be weak.
  • What is Preventative Maintenance?

15
  • The capability of a system to continue performing
    its functions in the presence of a hardware
    failure.
  • What is Fault Tolerance?

16
  • Plan that prepares a company to recover its data
    processing capacity as smoothly and quickly as
    possible in response to any emergency that could
    disable the computer system.
  • What is a Disaster Recovery Plan?

17
  • Completion step of a Disaster Recovery Plan.
  • What is Periodic Testing and Revision?

18
  • Proper Disaster Recovery Plans include the
    establishment of backup data and program files at
    this location.
  • What is a Offsite Location?

19
  • Access ability to physically use computer
    equipment.
  • What is a Physical Access ?

20
  • Access ability to use computer equipment to
    access company data.
  • What is a Logical Access?

21
  • Using unique physical characteristics such as
    fingerprints, voice patterns, retina prints,
    signature dynamics, and the way people type
    certain groups of characteristics to identify
    people.
  • What is Biometric Identification?

22
  • A procedure for checking a password to determine
    if its user is authorized to initiate the type of
    transaction or inquiry he or she is attempting to
    initiate.
  • What are Compatibility Tests?

23
  • An internally maintained list that the computer
    uses to verify that the person attempting to
    access system resources is authorized to do so.
    The list usually consists of user codes, all
    files and programs maintained on the system, and
    a list of the accesses each user is authorized to
    make.
  • What is an Access Control Matrix?

24
  • Controls that relate to data input, files,
    programs, and output of a specific computer
    application, rather than the computer system in
    general.
  • What are Application Controls?

25
  • Controls that relate to all or many computerized
    accounting activities. They generally relate to
    the overall health of a particular system.
  • What are General Controls?

26
  • Controls that deter problems before they arise.
  • What are Preventive Controls?

27
  • Controls that discover problems as soon as they
    arise.
  • What are Detective Controls?

28
  • Application Controls are most effective in the
    presence of these.
  • What are General Controls?

29
  • An on-line data entry control in which the
    computer checks if all data required for a
    particular transaction have been entered by the
    user.
  • What is a Completeness Check?

30
  • An input validation method in which the data that
    have just been entered into the system are sent
    back to the sending device so that the user can
    verify that the correct data have been entered.
  • What is Closed-Loop Verification?

31
  • A detailed record of every transaction entered
    into a system through data entry.
  • What are Transaction Logs?

32
  • A control that helps preserve the integrity of
    data processing and stored data by leaving a
    field blank if a standard value is to be used.
  • What are Default Values?

33
  • An edit check that determines if a batch of input
    data is in the proper numerical or alphabetical
    sequence.
  • What are Sequence Checks?

34
  • An edit check in which the characters in a field
    are examined to ensure they are of the correct
    field type (eg numeric data in numeric fields)
  • What are Field Checks?

35
  • An edit check that verifies that the data in a
    field have the appropriate arithmetic sign.
  • What are Sign Checks?

36
  • An edit test in which an identification number or
    transaction code is compared with a table of
    valid identification numbers or codes maintained
    in computer memory.
  • What are Validity Checks?

37
  • An edit check to ensure that a numerical amount
    in a record does not exceed some predetermined
    limit.
  • What are Limit Checks?

38
  • Computer programs or routines designed to check
    the validity or accuracy of input data.
  • What are Input Validation Routines?

39
  • Accuracy checks performed by an edit program.
  • What are Edit Checks?

40
  • A redundant digit in a data field that provides
    information about the other digits in the data
    field. It is used to check for errors or loss of
    characters in the data fields as a result of data
    transfer operations.
  • What are Check Digits?

41
  • Controls that lock out one user to protect
    individual records from potential errors that
    could occur if two users attempted to update the
    same record simultaneously.
  • What are Concurrent Update Controls?

42
  • Controls to ensure that messages are not routed
    to the wrong system address. Examples include
    header labels, mutual authentication schemes, and
    dial-back.
  • What are Routing Verification Procedures?

43
  • Routing verification procedures that require both
    computers to exchange their passwords before
    communication takes place.
  • What are Mutual Authentication Schemes?

44
  • An edit check designed to verify that a data item
    falls within a certain predetermined range of
    acceptable values.
  • What are Range Checks?
Write a Comment
User Comments (0)
About PowerShow.com