Comp 3 Prelims
Comp 3 Prelims
Advisory services
External (Financial) Audit
are professional services offered by public
-Independent attestation performed by an accounting firms to improve their client
expert (i.e., CPA) who expresses an opinion organizations’ operational efficiency and
regarding the fair presentation of financial effectiveness.
statements.
advisory services include:
-attest service,
actuarial advice, business advice, fraud
investigation services, information system
design and implementation, and internal
audit objective: assuring the fair presentation
control assessments for compliance with SOX.
of financial statements.
• judge who collects and evaluates Internal auditors perform a wide variety of
evidence activities including financial, operational,
• independent compliance and fraud audits.
• cannot be an advocate of either party Auditors may work for the organization or
• renders an opinion based on the task may be outsourced
evidence
. Independence is self-imposed, but auditors
Attest Service versus Advisory Services represent the interests of the organization.
attest service
Subcommittee of the board of directors 3. The auditor must exercise due professional
care in the performance of the audit and the
• Usually three members who are preparation of the report
outsiders.
Standards of Field Work
• SOX requires at least one member must
be a “financial expert”. 1. Audit work must be adequately planned
-authoritative pronouncements
Obtaining Evidence
The evidence-gathering techniques used in this Some substantive tests are labor-intensive
phase may include both manual techniques and activities, such as counting cash, counting
specialized computer audit techniques. inventories in the warehouse
tests-of-controls phase, the auditor must assess In an IT environment, the data needed to
the quality of the internal controls by assigning perform substantive tests (such as account
a level for control risk balances and names and addresses of individual
customers) are contained in data files that often
must be extracted using Computer-Assisted
Audit Tools and Techniques (CAATTs) software.
Substantive Testing
INTERNAL CONTROL The AICPA adopted the model into auditing
standards and published SAS No. 78—
SEC:
Consideration of Internal Control in a Financial
The establishment and maintenance of a system Statement Audit
of internal control is management obligation.
Brief History of Internal Control Legislation Under Section 302: Managers must certify
organization’s internal controls quarterly and
SEC Acts of 1933 and 1934 annually.
Securities Act of 1933, which had two main External auditors must perform certain
objectives: procedures quarterly to identify any material
(1) require that investors receive financial and control modifications that may impact financial
other significant information concerning reporting
securities being offered for public sale; Section 404 requires the management of public
(2) prohibit deceit, misrepresentations, and companies to assess the effectiveness of their
other fraud in the sale of securities. organization’s internal controls
FCPA requires companies registered with the 4. To measure compliance with management’s
SEC to do the following: prescribed policies and procedures
(1) the possibility of error—no system is perfect, -first line of defense in the control structure.
-foundation for the other four control 4. The board of directors should adopt, as a
components. minimum, the provisions of SOX.
-sets the tone for the organization and The following guidelines represent established
influences the control awareness of its best practices:
management and employees.
• Separate CEO and chairman -
• The implementation of new technology into Monitoring is the process by which the quality
the production process or information system of internal control design and operation can be
assessed.
• The introduction of new product lines or
activities which the organization has little An organization’s internal auditors may monitor
experience. the entity’s activities in separate procedures.
They gather evidence of control adequacy by
• Organizational restructuring resulting in the testing controls then communicate control
reduction and/or reallocation of personnel strengths and weaknesses to management.
• Entering into foreign markets that may impact Ongoing monitoring - may be achieved by
operations (that is, the risks associate with integrating special computer modules into the
foreign currency transactions). information system that capture key data
and/or permit tests of controls.
• Adoption of a new accounting principle that
impacts the preparation of financial statements. Another technique for achieving ongoing
monitoring is the judicious use of management
reports. By summarizing activities, highlighting
C. Information and Communication trends, and identifying exceptions from normal
performance, well-designed management
- accounting information system consists of the
reports provide evidence of internal control
records and methods used to initiate, identify,
function or malfunction.
analyze, classify, and record the organization’s
transactions and to account for the related
E. CONTROL ACTIVITIES - purpose of transaction authorization is to
ensure that all material transactions processed
are the policies and procedures used to ensure
by the information system are valid and in
that appropriate actions are taken to deal with
accordance with management’s objectives
the organization’s identified risks.
-may be general or specific
- data files, applications, documentation, and supplies needed (i. e., the number of lost records); (3) an estimate of financial
to perform critical functions should be automatically backed loss due to lost records or facilities; and (4) the effectiveness
up and stored at a secure off-site location. of program, data, and documentation backup and recovery
procedures.
Operating System Backup. If the company uses a cold site or Audit Objective (For DRP)
other method of site backup that does not include a
The auditor should verify that management’s disaster recovery
compatible operating system (O/S), procedures for obtaining a
plan is adequate and feasible for dealing with a catastrophe
current version of the operating system need to be clearly
that could deprive the organization of its computing resources.
specified. The data librarian, if one exists, would be a key
person to involve in performing this task in addition to the
applications and data backups procedures.
Audit Procedures (For DRP)
Application Backup. The DRP should include procedures to
create copies of current versions of critical applications. In the In verifying that management’s DRP is a realistic solution for
case of commercial software, this involves purchasing backup dealing with a catastrophe, the following tests may be
copies of the latest software upgrades used by the performed:
organization. For in-house developed applications, backup • Site Backup - evaluate the adequacy of the backup site
procedures should be an integral step in the systems arrangement.
development and program change process.
(a) Mutual aid pact - system incompatibility and human nature
Backup Data Files. The state-of-the-art in database backup is reduces its effectiveness. Auditors should be skeptical: First,
the remote mirrored site, which provides complete data the sophistication of the computer system may make it difficult
currency. Databases should be copied daily to high-capacity, to find a potential partner with a compatible configuration.
high-speed media, such as tape or CDs/DVDs and secured Second, most firms do not have the necessary excess capacity
offsite. In the event of a disruption, reconstruction of the to support a disaster-stricken partner while also processing
database is achieved by updating the most current backed-up their own work.
version with subsequent transaction data. Likewise, master More viable but expensive options are:
files and transaction files should be protected.
(b) Empty shell - verify the existence of valid contracts with
Backup Documentation. The system documentation for hardware vendors that guarantee delivery of needed
critical applications should be backed up and stored off-site computer hardware with minimum delay after the disaster.
(c) Recovery operation center - be concerned about the
along with the applications. Documentation backup may be
number of ROC members and their geographic dispersion.
simplified and made more efficient through the use of
• Critical Application List - review the list of critical
Computer Aided Software Engineering (CASE) documentation
applications to ensure that it is complete. To include
tools.
applications on the critical list that are not needed to achieve
short-term survival can misdirect resources and distract
attention from the primary objective during the recovery Transaction Cost Economics (TCE) theory is in conflict with the
period. core competency school by suggesting that firms should retain
certain specific non–core IT assets inhouse. Specific assets
• Software Backup - verify that copies of critical applications
cannot be easily replaced once they are given up in an
and operating systems are stored off-site. Also verify that the outsourcing arrangement. But TCE theory supports the
applications stored off-site are current by comparing their outsourcing of commodity assets, which are easily replaced or
version numbers with those of the actual applications in use.
obtained from alternative vendors.
• Data Backup - verify that critical data files are backed up in
accordance with the DRP.
Risks Inherent to IT Outsourcing
• Backup Supplies, Documents, and Documentation - verify
that the types and quantities of items specified in the DRP such
as check stock, invoices, purchase orders, and any special
Failure to Perform. Once a client firm has outsourced specific
purpose forms exist in a secure location.
IT assets, its performance becomes linked to the vendor’s
• Disaster Recovery Team - verify that members of the team performance.
are current employees and are aware of their assigned
responsibilities. Vendor Exploitation. Large-scale IT outsourcing involves
transferring to a vendor “specific assets,” such as the design,
development, and maintenance of unique business
applications that are critical to an organization’s survival.
OUTSOURCING THE IT FUNCTION
Because the vendor assumes risk by acquiring the assets and
Often cited benefits of IT outsourcing include improved core can achieve no economies of scale by employing them
business performance, improved IT performance (because of elsewhere, the client organization will pay a premium to
the vendor’s expertise), and reduced IT costs. By moving IT transfer such functions to a third party.
facilities offshore to low labor-cost areas and/or through
Outsourcing Costs Exceed Benefits. IT outsourcing has been
economies of scale (by combining the work of several clients), criticized on the grounds that unexpected costs arise and the
the vendor can perform the outsourced function more cheaply
full extent of expected benefits are not realized. One survey
than the client firm could have otherwise. The resulting cost
revealed that 47 percent of 66 firms surveyed reported that
savings are then passed to the client organization.
the costs of IT outsourcing exceeded outsourcing benefits. One
reason for this is that outsourcing clients often fail to
anticipate the costs of vendor selection, contracting, and the
The logic underlying IT outsourcing follows from core transitioning of IT operations to the vendors.
competency theory, which argues that an organization should
focus exclusively on its core business competencies, while Reduced Security. Information outsourced to offshore IT
allowing outsourcing vendors to efficiently manage the non– vendors raises unique and serious questions regarding internal
core areas such as the IT functions. control and the protection of sensitive personal data.
(2) from various batch-job queues, and Access Control List - is assigned to each IT
resource (computer directory, data file,
(3) through telecommunications links from program, or printer), which controls access to
remote workstations. the resources. These lists contain information
To achieve efficient and effective use of finite that defines the access privileges for all valid
computer resources, the operating system must users of the resource.
schedule job processing according to established
Discretionary Access Privileges it may be incompatible functions and is in accordance with
granted by resource owners, which allow to the organization’s policy.
grant access privileges to other users.
Audit Procedures Relating to Access Privileges
Threats to Operating System Integrity To achieve their objectives auditors may perform
the following tests of controls:
Accidental threats include hardware failures
that cause the operating system to crash. Errors • Review the organization’s policies for
in user application programs, which the separating incompatible functions and ensure
operating system cannot interpret, also cause that they promote reasonable security.
operating system failures.
• Review the privileges of a selection of user
Accidental system failures may cause whole groups and individuals to determine if their
segments of memory to be dumped to disks and access rights are appropriate for their job
printers, resulting in the unintentional disclosure descriptions and positions. The auditor should
of confidential information. verify that individuals are granted access to data
and programs based on their need to know.
Intentional threats to the operating system are
most commonly attempts to illegally access data • Review personnel records to determine
or violate user privacy for financial gain. whether privileged employees undergo an
adequately intensive security clearance check in
The exposures come from three sources: compliance with company policy.
(1) Privileged personnel who abuse their • Review employee records to determine
authority.
whether users have formally acknowledged their
(2) Individuals, both internal and external to the responsibility to maintain the confidentiality of
organization, who browse the operating system company data.
to identify and exploit security flaws. • Review the users’ permitted log-on times.
(3) Individuals who intentionally (or accidentally) Permission should be commensurate with the
insert computer viruses or other forms of tasks being performed.
destructive programs into the operating system. Password Control
Operating System Controls and Audit Tests
Password- is a secret code the user enters to
If operating system integrity is compromised, gain access to systems, applications, data files, or
controls within individual accounting a network server.
applications that impact financial reporting may The most common forms of contra-security
also be compromised. behavior include:
For this reason, the design and assessment of • Forgetting passwords and being locked out of
operating system security controls are SOX the system.
compliance issues.
• Failing to change passwords on a frequent
Controlling Access Privileges - determine which basis.
directories, files, applications, and other
resources an individual or group may access. • The Post-it syndrome, whereby passwords are
written down and displayed for others to see.
Audit Objectives Relating to Access Privileges
The auditor’s objective is to verify that access • Simplistic passwords
privileges are granted in a manner that is
consistent with the need to separate a computer criminal easily anticipates.
Reusable Password/s – is the most common the account is locked. The duration of the
method of password control. lockout also needs to be determined. This could
range from a few minutes to a permanent
To improve access control, management should lockout that requires formal reactivation of the
require that passwords be changed regularly and
account.
disallow weak passwords.
Malicious and destructive programs are
An alternative to the standard reusable responsible for millions of dollars of corporate
password is the one-time password. losses annually. The losses are measured in
One-time password- was designed to overcome terms of data corruption and destruction,
the aforementioned problems. It can be used degraded computer performance, hardware
one time only. Under this approach, the user’s destruction, violations of privacy, and the
password changes continuously. This technology personnel time devoted to repairing the
employs a credit card–sized smart card. Another damage.
one-time password technique uses a This class of programs includes viruses, worms,
challenge/response approach to achieve the logic bombs, back doors, and Trojan horses.
same end.
Audit Objective Relating to Viruses and Other
Audit Objectives Relating to Passwords Destructive Programs
The auditor’s objective here is to ensure that the The key to computer virus control is prevention
organization has an adequate and effective through strict adherence to organizational
password policy for controlling access to the
policies and procedures that guard against virus
operating system. infection.
The auditor may achieve this objective by The auditor’s objective is to verify that effective
performing the following tests: management policies and procedures are in
• Verify that all users are required to have place to prevent the introduction and spread of
passwords. destructive programs, including viruses, worms,
back doors, logic bombs, and Trojan horses.
• Verify that new users are instructed in the use
of passwords and the importance of password System Audit Trails are logs that record activity
control. at the system, application, and user level.
Operating systems allow management to select
• Review password control procedures to ensure the level of auditing to be recorded in the log.
that passwords are changed regularly.
Audit trails typically consist of two types of audit
• Review the password file to determine that logs:
weak passwords are identified and disallowed.
This may involve using software to scan (1) detailed logs of individual keystrokes and
password files for known weak passwords.
(2) event-oriented logs.
• Verify that the password file is encrypted and Keystroke monitoring involves recording both
that the encryption key is properly secured. the user’s keystrokes and the system’s
• Assess the adequacy of password standards responses. It is the computer equivalent of a
such as length and expiration interval. telephone wiretap. It may also be regarded as a
violation of privacy.
• Review the account lockout policy and
procedures. The auditor should determine how Event monitoring summarizes key activities
many failed log-on attempts are allowed before related to system resources. Event logs typically
record the IDs of all users accessing the system; AUDITING NETWORKS
the time and duration of a user’s session;
programs that were executed during a session; Reliance on networks for business
and the files, databases, printers, and other communications poses concern about
unauthorized access to confidential information.
resources accessed.
Audit trails can be used to support security intranet risks posed by dishonest employees
objectives in three ways: who have the technical knowledge and position
to perpetrate frauds, and Internet risks that
(1) detecting unauthorized access to the system, threaten both consumers and business entities.
(2) facilitating the reconstruction of events, and
(3) promoting personal accountability. Intranets consist of small LANs and large WANs
that may contain thousands of individual nodes.
Detecting unauthorized access can occur in real These are used to connect employees within a
time or after the fact. single building, between buildings on the same
physical campus, and between geographically
The primary objective of real-time detection is to dispersed locations.
protect the system from outsiders attempting to
breach system controls. Interception of Network Messages
A real-time audit trail can also be used to report The individual nodes on most intranets are
changes in system performance that may connected to a shared channel across which
indicate infestation by a virus or worm. travel user IDs, passwords, confidential e-mails,
and financial data files.
After-the-fact detection logs can be stored
electronically and reviewed periodically or as The unauthorized interception of this
needed. information by a node on the network is called
sniffing.
Audit trail analysis can be used to reconstruct
the steps that led to events such as system This section looks at three of the more
failures, or security violations by individuals. significant business risks associated with
Internet commerce.
Audit trails can be used to monitor user activity
at the lowest level of detail. IP spoofing is a form of masquerading to gain
unauthorized access to a Web server and/ or to
Personal Accountability (capability) is a perpetrate an unlawful act without revealing
preventive control that can influence behavior. one’s identity. This technique could be used to
A system audit log can also serve as a detective crack into corporate networks to perpetrate
control to assign personal accountability for frauds, conduct acts of espionage, or destroy
actions taken such as abuse of authority. data.
Today, nothing less than 128-bit algorithms are 1. A certification authority that issues and
considered truly secure. Two commonly used revokes digital certificates.
methods of encryption are private key and 2. A registration authority that verifies the
public key encryption. identity of certificate applicants. The process
Private Key Encryption. Advance encryption varies depending on the level of certification
standard (AES) is a 128-bit encryption technique desired. It involves establishing one’s identity
that has become a U.S. government standard for with formal documents, such as a driver’s
private key encryption. Triple-DES encryption is license, notarization, fingerprints, and proving
an enhancement to an older encryption one’s ownership of the public key.
technique called the data encryption standard 3. A certification repository, which is a publicly
(DES). accessible database that contains current
Public key encryption uses two different keys: information about current certificates and a
one for encoding messages and the other for certification revocation list of certificates that
decoding them. Each recipient has a private key have been revoked and the reasons for
that is kept secret and a public key that is revocation.
published. The sender of a message uses the
receiver’s public key to encrypt the message. The
Through message sequence numbering, a • Proxy services. Adequate proxy applications
sequence number is inserted in each message, should be in place to provide explicit user
and any such attempt will become apparent at authentication to sensitive services,
the receiving end. applications, and data.
Using request-response technique, a control • Filtering. Strong filtering techniques should be
message from the sender and a response from designed to deny all services that are not
the receiver are sent at periodic, synchronized explicitly permitted. In other words, the firewall
intervals. The timing of the messages should should specify only those services the user is
follow a random pattern that will be difficult for permitted to access, rather than specifying the
the intruder to determine and circumvent. services that are denied.
A call-back device requires the dial-in user to • Segregation of systems. Systems that do not
enter a password and be identified. The system require public access should be segregated from
then breaks the connection to perform user the Internet.
authentication. If the caller is authorized, the
call-back device dials the caller’s number to • Audit tools. The firewall should provide a
establish a new connection. This restricts access thorough set of audit and logging tools that
to authorized terminals or telephone numbers identify and record suspicious activity.
and prevents an intruder masquerading as a • Probe for weaknesses. To validate security,
legitimate user. the auditor (or a professional security analyst)
should periodically probe the firewall for
Audit Objectives Relating to Subversive Threats
The auditor’s objective is to verify the security weaknesses just as a computer Internet hacker
and integrity of financial transactions by would do.
determining that network controls (1) can 2. Verify that an intrusion prevention system
prevent and detect illegal access both internally (IPS) with deep packet inspection (DPI) is in place
and from the Internet, (2) will render useless any for organizations that are vulnerable to DDos
data that a perpetrator successfully captures, attacks, such as financial institutions.
and (3) are sufficient to preserve the integrity
and physical security of data connected to the 3. Review security procedures governing the
network. administration of data encryption keys.
EDI Controls
EDI Controls - The absence of human intervention in the EDI process presents a unique twist to
traditional control problems, including ensuring that transactions are authorized and valid,
preventing unauthorized access to data files, and maintaining an audit trail of transactions. The
following techniques are used in dealing with these issues.
Access Control - EDI trading partners must permit a degree of access to private data files that
would be forbidden in a traditional environment. The trading partner agreement will determine the
degree of access control in place. Also, trading partners may agree that the prices on the purchase
order will be binding on both parties. The customer must, therefore, periodically access the
vendor’s price list file to keep pricing information current. Alternatively, the vendor may need
access to the customer’s price list to update prices.
To guard against unauthorized access, each company must establish valid vendor and customer
files. User authority tables can also be established, which specify the degree of access a trading
partner is allowed.
Risk of Theft
Because of their size, PCs are objects of theft and the portability of laptops places them at the
highest risk. Formal policies should be in place to restrict financial and other sensitive data to
desktop PCs only. In addition, the organization should provide employee training about
appropriate computer usage.
Appendix
Section A: Internet Technologies
Packet Switching
The Internet employs communications technologies based on packet switching whereby
messages are divided into small packets for transmission. Each packet contains address and
sequencing codes so they can be reassembled into the original complete message at the
receiving end.
Extranets
This is a password-controlled network for private users rather than the general public.
Extranets are used to provide access between trading partner internal databases.
Internet Addresses
The Internet uses three types of addresses for communications: (1) e-mail addresses, (2) Web
site URL addresses, and (3) Internet protocol (IP) addresses of individual computers attached
to a network.
E-mail Address. The format for an e-mail address is USER NAME@DOMAIN NAME. A
domain name is an organization’s unique name combined with a top-level domain (TLD)
name.
.com - commercial
.net - network provider
.org - nonprofit organization
.edu - education and research
.gov - government
.mil - military agency
.int - international intergovernmental
generic top-level domain (gTLD)
.firm - a business
.store - goods for sale
.web - WWW activities
.arts - culture/entertainment
.rec - recreation/entertainment
.info - information service
.nom - individual/personal
URL Address. The URL is the address that defines the path to a facility or file on the Web.
URLs are typed into the browser to access Web site home pages and individual Web pages and
can be embedded in Web pages to provide hypertext links to other pages. Subdirectories can
be several levels deep. To reference them, each must be separated with a slash.
http://www.flyfish.com/equipment/rods/brand_name.html
http:// protocol prefix (most browsers default to HTTP if a prefix is not typed)
www.flyfish.com/ - domain name
equipment/ - subdirectory name
rods/ - subdirectory name
brand_name.html - document name (webWeb page)
IP Address. Every computer node and host attached to the Internet must have a unique Internet
protocol (IP) address. For a message to be sent, the IP addresses of both the sending and the
recipient nodes must be provided. . To illustrate the coding technique, the IP address
128.180.94.109 translates into:
128.180 - Lehigh University
94 - Business Department faculty server
109 - A faculty member’s office computer (node)
Protocols
Protocols are the rules and standards governing the design of hardware and software that permit
users of networks, which different vendors have manufactured, to communicate and share data.
The general acceptance of protocols within the network community provides both standards
and economic incentives for the manufacturers of hardware and software. Products that do not
comply with prevailing protocols will have little value to prospective customers.
Internet Protocols
Transfer control protocol/Internet protocol (TCP/IP) is the basic protocol that permits
communication between Internet sites. It was invented by Vinton Cerf and Bob Kahn under
contract from the U.S. Department of Defense to network dissimilar systems. This protocol
controls how individual packets of data are formatted, transmitted, and received. This is known
as a reliable protocol because delivery of all the packets to a destination is guaranteed. The
TCP portion of the protocol ensures that the total number of data bytes transmitted was
received. The IP component provides the routing mechanism.
Mail Protocols
Simple network mail protocol (SNMP) is the most popular protocol for transmitting e-mail
messages. Other e-mail protocols are post office protocol (POP) and Internet message access
protocol (IMAP).
Security Protocols
Secure sockets layer (SSL) is a low-level encryption scheme used to secure transmissions in
higher-level HTTP format.
HTML
Hypertext markup language (HTML) is the document format used to produce Web pages.
HTML defines the page layout, fonts, and graphic elements as well as hypertext links to other
documents on the Web.
NETWORK TOPOLOGIES
A network topology is the physical arrangement of the components (for example, nodes,
servers, communications links, and so on) of the network.
Servers
LAN nodes often share common resources such as programs, data, and printers, which are
managed through special-purpose computers called servers
Star Topology
describes a network of computers with a large central computer (the host) at the hub that has
direct connections to a periphery of smaller computers. Communications between the nodes in
the star are managed and controlled from the host site.
Hierarchical Topology
Is one in which a host computer is connected to several levels of subordinate, smaller
computers in a master–slave relationship. This structure is applicable to firms with many
organizational levels that must be controlled from a central location.
Ring Topology
1 eliminates the central site. This is a peer-to-peer arrangement in which all nodes are of equal
status; thus, responsibility for managing communications is distributed among the nodes.
Every node on the ring has a unique electronic address, which is attached to messages such as
an address on an envelope.
Bus Topology
is the most popular LAN topology. It is so named because the nodes are all connected to a
common cable—the bus. One or more servers centrally control communications and file
transfers between workstations.
Client-Server Topology
The client-server model distributes the processing between User A’s (client) computer and the
central file server. Both computers are part of the network, but each is assigned functions that
it performs best.
NETWORK CONTROL
Network control exists at several points in the network architecture. The majority of network
control resides with software in the host computer, but control also resides in servers and
terminals at the nodes and in switches located throughout the network. The purpose of network
control is to perform the following tasks:
1. Establish a communications session between the sender and the receiver.
2. Manage the flow of data across the network.
3. Detect and resolve data collisions between competing nodes.
4. Detect errors in data that line failure or signal degeneration cause.
Data Collision
Only one node at a time can transmit a message on a single line. Two or more signals
transmitted simultaneously will result in a data collision, which destroys both messages.
Polling
Polling is the most popular technique for establishing a communication session in WANs. One
site, designated the master, polls the other slave sites to determine if they have data to transmit.
If a slave responds in the affirmative, the master site locks the network while the data are
transmitted.
Token Passing
Token passing involves transmitting a special signal—the token—around the network from
node to node in a specific sequence. Each node on the network receives the token, regenerates
it, and passes it to the next node. Only the node possessing the token is allowed to transmit
data. Token passing can be used with either ring or bus topologies.
Carrier Sensing
Carrier sensing is a random access technique that detects collisions when they occur. This
technique, which is formally labeled carrier-sensed multiple access with collision detection
(CSMA/CD), is used with the bus topology.
WORM
The term worm is used interchangeably with virus. A worm is a software program that virtually
burrows into the computer’s memory and replicates itself into areas of idle memory. The worm
systematically occupies idle memory until the memory is exhausted and the system fails.
LOGIC BOMB
A logic bomb is a destructive program, such as a virus, that some predetermined event triggers.
Often a date (such as Friday the 13th, April Fool’s Day, or the 4th of July) will be the logic
bomb’s trigger.
BACK DOOR
A back door (also called a trap door) is a software program that allows unauthorized access to
a system without going through the normal (front door) log-on procedure. Programmers who
want to provide themselves with unrestricted access to a system that they are developing for
users may create a log-on procedure that will accept either the user’s private password or their
own secret password, thus creating a back door to the system.
TROJAN HORSE
A Trojan horse is a program whose purpose is to capture IDs and passwords from unsuspecting
users. These programs are designed to mimic the normal log-on procedures of the operating
system. When the user enters his or her ID and password, the Trojan horse stores a copy of
them in a secret file.