MGAD10H3 Study Guide - Final Guide: Electronic Data Interchange, Intrusion Detection System, Ssae 16

144 views11 pages

Document Summary

Open systems interconnect (osi) model a standard architecture for networking that allows different computers to communicate across networks. Network and telecommuncations software network os, networks management software, middleware, web browsers, e-mail software. Physical infrastructure threats the elements, natural disasters, power supply, intentional human attacks. Programmed threats viruses, worms, trojan horses, hoaxes, blended threats. Encryption secret key and public key. Firewalls packet filtering and stateful inspection. Penetration testing war dialing, port scanning, sniffers, password crackers. Edi (electronic data exchange) inventory level. General network and telecommunications risks and controls. The integrity of transactions complete, accurate, timely, authorized. Electronic data interchange (edi) van vs web-based. E-mail security and privacy spamming, spoofing, and e-mail policies and controls. Third-party services isp"s, asp"s, certificate authorities, and electronic payment providers. Using computer assisted audit tools and techniques (caats) Widely used for data extraction and analysis. Allows for virtual 100% testing of client data. Use caats to verify the data import process.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers

Related Documents

Related Questions