Shared Flashcard Set

Details

AIS
last test
50
Accounting
Undergraduate 3
05/03/2009

Additional Accounting Flashcards

 


 

Cards

Term
(1) certify the internal controls over financial reporting (2) state responsibility for IC design (3) provide reasonable assurance as to the reliabilty of the financial reporting process(4) disclose any recent material changes in IC.
Definition
SOX section 302 says mgmt must:
Term
(1) asses IC effectiveness (2) reference the external auditors attestation report on mgmt's IC assesment. (3) provide explicit conclusions on the effectiveness of FR IC (4) identify the framework mgmt used to conduct their IC assesement.
Definition
SOX section 404 says mgmt must:
Term
(1) issue new audiot opintion on mgmt's IC assesment (2) required to test IC (3) collect documentation on IC tests and interview mgmt on IC changes
Definition
audit implications include:
Term
(1) application controls (2) general controls
Definition
COSO identifies two groups of IR controls
Term
ensure data validity, completeness and accuracy
Definition
application controls
Term
apply to all systems and address IT governance and infrustructure, security, and application and program acquisition
Definition
general controls
Term
how IT operates within an organization and how it is concerned with (1) organizations structure (2) computer center security and controls (3) disaster recovery planning
Definition
It governance and infrastructure controls is concerned with:
Term
(1) second site back up (2) DR team (3) test DR plan (4) data backup and storage offsite (5) ID of critical applications
Definition
elements of a DRP
Term
(1) separate SD (authorization) from computer operations (custody, recording, processing) (2) separate SD from SM (independent verification)(3) separate SA from all other IT functions
Definition
separation of duties in organizational structure of IT
Term
(1) ID and password combinations, after specified number of failed attempts, the system should lock out the user
Definition
log on procedure controls:
Term
(1) changed periodically (2) include numbers, letters, and symbols (3) not be based on personal information
Definition
password control
Term
if the log in is valid, the access token contains key info about the user that is matched wtih teh control list to gain access to specific resouces.
Definition
access token and control list
Term
document and record all activity at the system, application, and user level
Definition
system audit trail
Term
access control-defines a user's data domain
Definition
user views
Term
access control-rules that define the actions a user can take
Definition
database authorization table
Term
user defined procesdures
Definition
questions that provide stronger user identification than a password can
Term
encryption
Definition
for both stored data as well as displayed datadata
Term
biometric devices
Definition
user physical characteristics that are digitized and stored for Identification and authorization
Term
(1) backup at least once a day and store at 2nd location (2) maintain transaction logs that correspond to the number of backups, changes to the database are stored inthe database change log (3) checkpoint feature reconciles the backup database copy and the database change log (4) recovery module uses the transaction log and backup files to restart the database after a failure.
Definition
backup controls
Term
firewalls
Definition
a system that enforces access control between 2 networkds, must be immune to unauthorized access from both internal and external sources
Term
denial of service attacks
Definition
difficult to control against, deep packet inspection searches individual packets of info in a message to id known attack signitures
Term
encryption
Definition
uses keys on both the sender's and receivers side to encrypt and then decode a message
Term
digital signatures
Definition
electronic authentication that cannot be forged, ensures the message was not tampered with after the signature was applied
Term
digital certificate
Definition
issued by a third paty to validate a senders identity
Term
call back devices
Definition
restricts intrustion by calling back the user after ID has been validated
Term
line errors
Definition
corruption through noice in the communication lines
Term
echo check
Definition
receiver returns message to sender to confirm accuracy and completeness of message
Term
parity check
Definition
incorporates an extra bit into the structure of info when is created. the parity bit is based on the info in the mssage and is recalculated on the receiver's end. it is then compared to the existing parity bit in the mssae to detect transmission errors.
Term
read only access to info tis used to control access, transaction authorization, and audit trail
Definition
electronic data interchange controls
Term
input controls
Definition
programmed procedures that perform tests on transaction data to ensure they are free from error
Term
check digit
Definition
control digit added to a data code to check code integrity
Term
missing data check
Definition
missing data triggers an error
Term
numeric alphabetic check
Definition
input control
Term
limit check
Definition
used to identify field values that exceed an authorized limit
Term
range check
Definition
used to identify field values that are outside an authroized range
Term
reasonableness check
Definition
uses data from other fields to asses the reaonableness of entered data
Term
validity check
Definition
compares field values against known acceptable values
Term
processing controls
Definition
programmed producures in the processing stage
Term
batch control record
Definition
used to document and manage the flow of high volumes of transactions through batch processing systems
Term
batch control total
Definition
total dollar value of a financial field in the batch
Term
hash total
Definition
the total of a unique non financial field in the batch
Term
run to run controls
Definition
the use of batch figures to monitor that batch as it moves from one prodeure to another
Term
audit trail controls
Definition
ensure that every transaction can be traced through each stage of processing from its source to its presentation int he financial statements
Term
output controls
Definition
ensure that system output is not lost, misdirected, or corrumpted and that the privacy of output is not compromised
Term
printer queue
Definition
be aware of exposures during spooling and ensure that proper access and backup procedures are in place to protect output files
Term
hard copy output
Definition
should be monitored so that unauthorized copies are not made or sensitive material is not disclosed
Term
(1) authorization (2) user specification (3) technical design (4) internal audit participation (5) program testing
Definition
system development conrls
Term
(1) authorization (2) technical specifications (3) testing (4) documentation updates
Definition
program change controls
Term
Source program library
Definition
application program modules are stored in source code form on magnetic disks called these
Term
(1) password control (2) separation of test libraries (3) mgmt reports (4) program version numbers (5) control access to common maintenance commands
Definition
Supporting users have an ad free experience!