| A | B |
| User Errors | The greatest threat to info systems |
| theft or destruction of information | computer crime |
| security | the purpose is to prevent computer crime |
| hacker | a person who gains illegal access to an information system |
| computer viruses | rogue software programs |
| corporate espionage | taking information to gain a competitive edge |
| data control programs | used to deal with inaccurate or outdated information |
| controls | procedures, policies and technology |
| general controls | organization wide |
| system documentation | flow charts & layouts of the information system |
| user documentation | written description of the system with input instructions |
| operational documentation | instructions on back ups & recovery procedures |
| application controls | controls that govern a specific information system |
| input controls | ensures accuracy of data during input |
| processing controls | ensures accuracy of data during processing and updating |
| output controls | ensures that results are complete & accurate |
| programmed edit checks | technique for checking input data |
| control totals | used at all points of processing to ensure accuracy--a type of processing control |
| Problem Analysis | The first step in problem solving |
| Implementation | The final step in problem solving |
| data security | prevents unauthorized use/destruction of data |
| encryption | scrambling data before transmission |
| redundant server | a security measure for protecting a network |
| disaster recovery plan | plan for resuming operations after a disruptionq |
| development methodology | to establish an organization-wide approach for specifications, design, programming & testing of a new system |