Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ACC330 Exam3 Comprehensive Mid Term & End Term Exam

Beoordeling
-
Verkocht
-
Pagina's
18
Cijfer
A+
Geüpload op
14-03-2025
Geschreven in
2024/2025

A description of what will be covered on both the midterm and end-term exams. The document would likely outline the format, types of questions (e.g., multiple choice, short answer, problem-solving), and the weight of each section in the final grade

Meer zien Lees minder
Instelling
ACC330
Vak
ACC330

Voorbeeld van de inhoud

ACC330 Exam3 : Comprehensive Mid
Term & End Term Exam
Bluesnarfing - Stealing (snarfing) contact lists, images, and other data using flaws in
Bluetooth applications.

Buffer overflow attack - Inputting so much data that the input buffer overflows. The
overflow contains code that takes control of the computer.

Chipping - Planting a chip that records transaction data in a legitimate credit card
reader.

Denial-of-service attack - An attack designed to make computer resources
unavailable to its users. For example, sending so many e-mail messages that the
Internet service provider's e-mail server is overloaded and shuts down.

Evil twin - A wireless network with the same name as another wireless access point.
Users unknowingly connect to the evil twin; hackers monitor the traffic looking for
useful information.

Keylogger - Using spyware to record a user's keystrokes.

Lebanese Looping - Inserting a sleeve into an ATM that prevents it from ejecting the
card. The perpetrator pretends to help the victim, tricking the person into entering the
PIN again. Once the victim gives up and leaves, the thief removes the card and uses
it and the PIN to withdraw money.

Man-in-the-middle (MITM) attack- - A hacker placing himself between a client and a
host to intercept network traffic; also called session hijacking.

Packet sniffers - Inspecting information packets as they travel across computer
networks.

Phishing - Communications that request recipients to disclose confidential
information by responding to an e-mail or visiting a website

Piggybacking - 1. Clandestine use of someone's Wi-Fi network.2. Tapping into a
communications line and entering a system by latching onto a legitimate user.3.
Bypassing physical security controls by entering a secure door when an authorized
person opens it.

Ransomware - Software that encrypts programs and data until a ransom is paid to
remove it.

Rootkit - A means of concealing system components and malware from the
operating system and other programs; can also modify the operating system.

Round-down fraud - Truncating interest calculations at two decimal places and
placing truncated amounts in the perpetrator's account.

,salami technique - Stealing tiny slices of money over time.

Shoulder surfing - When perpetrators look over a person's shoulders in a public
place to get information such as ATM PIN numbers or user IDs and passwords.

Skimming- - Double-swiping a credit card in a legitimate terminal or covertly swiping
a credit card in a small, hidden, handheld card reader that records credit card data
for later use.

Social engineering - Techniques that trick a person into disclosing confidential
information.

Spoofing - Altering some part of an electronic communication to make it look as if
someone else sent the communication to gain the trust of the recipient. Many things
are spoofed, such as email addresses, caller IDs, IP addresses, address resolution
protocols, SMS messages, web pages, and domain name systems.

Steganoghrapy - Concealing data within a large MP3 or other file (often image files).

SQL insertion (injection) - Inserting a malicious SQL query such that it is passed to
and executed by an application program.

Trojan horse - Unauthorized code in an authorized and properly functioning program.

Typosquatting/URL hijacking - Websites with names similar to real websites; users
making typographical errors are sent to a site filled with malware.

Virus - Executable code that attaches itself to software, replicates itself, and spreads
to other systems or files. When triggered, it makes unauthorized alterations to the
way a system operates.

Worm - Similar to a virus; a program rather than a code segment hidden in a host
program. Actively transmits itself to other systems. It usually does not live long but is
quite destructive while alive.

XSS Attack - Cross -site scripting) A vulnerability in dynamic web pages that allows
an attacker to bypass a browser's security mechanisms and instruct the victim's
browser to execute code, thinking it came from the desired website. (Malicious code
embedded in a Web link.)

internal controls - the processes and procedures implemented to provide reasonable
assurance that control objectives are met efficiently and in an error free manner

SCALP - segregation of duties, comparisons, adequate records, limited access,
proper approvals

adequate records (A in SCALP) - "garbage in garbage out" encourage data entry
controls ex) require a last name for a flight

, SOX - Sarbanes-Oxley Act (biggest part is establishing board)

SOX section 404 - about internal controls, govern what is good and what internal
controls looks like, mgt takes ownership in controls. In FS there must be a statement
about I/C including the risks

SOX section 302 - personal certification of financial statements by corporate
executives, about limited liability now CEO has to personally sign FS and if it's wrong
the CEO is liable)

COBIT - Control Objectives for Information and Related Technology, another
framework controlling management of IT (IT does not mean error free)

COSO - Committee of Sponsoring Organizations, professionals everywhere monitor
this, mindset of how you implement controls in a framework

control environment (1 in COSO) - company culture (foundation for all other internal
control components)

risk appetite (2 in COSO) - amount of risk company is willing to make

control activities (3 in COSO) - rules that provide assurance control objectives are
met/ risk response carried out (when the auditor actually comes in)

info and communication (4 in COSO) - communication from management to
employees so internal controls informs

monitoring activities (5 in COSO) - enforce those controls

S in SCALP - segregation of accounting duties, your people are tyour best control
(risk versys salaries), not too much responsibility for one person

CAR - custody, authorization, records

C in car - custody- handling cash, tools, inv, fixed assets

A in car - authorization0 authorize transactions and decisions

R in car - records- prepare resource docs, maintain journals etc

C in SCALP - comparison, documents from appropriate sources (controls are
mistakes, customer satisfaction, limits improper behavior)

L in SCALP - limited access (safeguard cash, inventory, supplies, records) and helps
segregation of duties

P in SCALP - proper approvals, specific part of segregation of duties, set materiality
levels, and risk versus empowerment (boss cannot be around you all the time and
approve everything)

Geschreven voor

Instelling
ACC330
Vak
ACC330

Documentinformatie

Geüpload op
14 maart 2025
Aantal pagina's
18
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$7.39
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
InsightPapers

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
InsightPapers Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4
Lid sinds
1 jaar
Aantal volgers
0
Documenten
489
Laatst verkocht
5 maanden geleden
edutech papers shop selling study exams elaborations :

High-quality exams and answers, summaries, exam guides, and practice questions created for top-performing students. Perfect for boosting your grades and preparing efficiently—organized by course and institution.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen