Term
|
Definition
| deter problems before they arise |
|
|
Term
|
Definition
| discover problems that aren't prevented |
|
|
Term
|
Definition
| identify and correct problems as well as correct and recover from the resulting errors |
|
|
Term
|
Definition
| make sure an organization's control environment is stable and well managed |
|
|
Term
|
Definition
| make sure transactions are processed correctly |
|
|
Term
|
Definition
| how a company creates value, helps employees understand management's vision, and inspires employees to live by those values |
|
|
Term
|
Definition
| helps employees act ethically by setting boundaries on employee behavior |
|
|
Term
| Diagnostic Control System |
|
Definition
| measures, monitors, and compares actual company progress and performance goals |
|
|
Term
| Interactive Control System |
|
Definition
| helps managers to focus subordinates attention on key strategic issues and to be more involved in their decisions |
|
|
Term
| Foreign Corrupt Practices Act |
|
Definition
| passed to prevent companies from bribing foreign officials to obtain business |
|
|
Term
|
Definition
| 1. PCAOB 2. CEO and CFO responsible for signing off section 404 3. Audit committee 4. Enhanced Disclosures 5. Protection for whistleblowers 6. Enhanced Penalties |
|
|
Term
|
Definition
| self interest seeking with guile (intent to deceive) |
|
|
Term
| What do the four top columns represent on ERM and what do 8 horizontal rows represent? |
|
Definition
1. Company Goals 2. risk and control components |
|
|
Term
| What is the problem with IC framework? |
|
Definition
| Doesn't look at risks or business process. Doesn't show how to evaluate results. Primarily control base approach |
|
|
Term
|
Definition
| amount of risk management is willing to accept to achieve the goals |
|
|
Term
|
Definition
| provides a framework for operations. needs to me clear and organized or problems will occur. new trend flat level mgmt |
|
|
Term
|
Definition
| high level goals that are aligned with the company's mission |
|
|
Term
|
Definition
| deal with effectiveness and efficiency of company operations, determine how to allocate results |
|
|
Term
| What are the four components of ERM? |
|
Definition
| strategic, operational, reporting, and compliance |
|
|
Term
|
Definition
| exists before management tasks any steps to control the likelihood or impact of an event |
|
|
Term
|
Definition
| what remains after management implements internal controls or some other response to risk |
|
|
Term
| What are 4 ways to respond to risk? |
|
Definition
| Reduce, Accept, Share, and Avoid |
|
|
Term
|
Definition
| Authorization, Recording, Custodial |
|
|
Term
| How can someone commit fraud if segregation of duties aren't in place? |
|
Definition
| Person authorizes transactions, forged invocies for authorizig payments , then another department gave hime checks to deliver to fake property owners, He forged signatures and deposited checks in own account. WHY? BC HE HAD CUSTODY OF CHEKCS AND AUTHORIZED FAKE TRANSACTIONS |
|
|
Term
| What is the accepted authority or internal controls? |
|
Definition
| COSO internal control integrated framework |
|
|
Term
| What 3 things help a control environment? |
|
Definition
| Clear Organizational structure, written policy and procedures manual for assigning authority, and supervision |
|
|
Term
| What are 3 independent checks? |
|
Definition
| Bank Reconciliation, Periodic comparison of subsidiary ledger totals to control accounts, and trial balance |
|
|
Term
| What is the correct order of the risk assessment steps? |
|
Definition
Identify threats Estimate risk and exposure Identify Threats Estimate Costs and Benefits |
|
|
Term
|
Definition
| natural disaster, software error, unintentional acts, intentional acts |
|
|
Term
|
Definition
false statement material fact intent to deceive justifiable reliance injury or loss |
|
|
Term
|
Definition
auditor's responsibility to detect fraud 1. Understand Fraud 2. Discuss the risks of fraud 3. Obtain Information 4. Identify, assess, and respond to risks 5. Evaluate results of audit test 6. Document and communicate findings 7. Incorporate a technology focus |
|
|
Term
| 3 Components of Fraud Triangle |
|
Definition
| Opportunity, rationalization, and pressure |
|
|
Term
| Opportunity Triangle consists of 3 parts |
|
Definition
| Commit, Conceal, and Convert |
|
|
Term
| 3 Parts of Rationalization Triangle |
|
Definition
| Attitude, Justification, and Lack of Personal Integrity |
|
|
Term
|
Definition
| cash is created using the lag between the time a check is deposited and the time it clears the bank |
|
|
Term
| 4 Computer Fraud Classifications |
|
Definition
| Data, Input, Output, and Computer Instructions Fraud |
|
|
Term
|
Definition
| later payments on account are used to pay off earlier payments that were stolen |
|
|
Term
| What cause the majority of computer security problems? |
|
Definition
|
|
Term
| What control procedure can deter lapping? |
|
Definition
| Periodic Rotation of Duties |
|
|
Term
| Once fraud has occurred which will reduce fraud losses |
|
Definition
| Insurance, Regular backup of data and programs, contingency plan |
|
|
Term
|
Definition
| information about a student (name, GPA, major) |
|
|
Term
| What is a general ledger control account? |
|
Definition
|
|
Term
| Used in expenditure Cycle? |
|
Definition
|
|
Term
|
Definition
| better access control, standardization of procedures and reports, and improved monitoring capabilities |
|
|
Term
| What are 4 types of coding techniques? |
|
Definition
| sequence, block, group, and mnemonic |
|
|
Term
|
Definition
| Create, Read, Update, and Delete |
|
|
Term
|
Definition
| Batch, online-batch, and online |
|
|
Term
|
Definition
| how you apply explicit knowledge; hard to capture |
|
|
Term
|
Definition
| People, Process, and technology can't use in isolation |
|
|
Term
|
Definition
| data that can be written down |
|
|
Term
|
Definition
|
|
Term
| 3 computer fraud and abuse techniques from 6.1 |
|
Definition
data leakage (unauthorized copying of company data) eavesdropping (listening to private information) hacking (unauthorized theft) |
|
|
Term
|
Definition
1. Homogenous buy whole package 2. Heterogenous can buy one part 3. Best of Breed- can buy best from each individual department
SAP and Oracle |
|
|
Term
|
Definition
CEO is risk adverse and can't figure out who to blame, no accountability Solution: hire consultants |
|
|
Term
| Problem with Fraud Example |
|
Definition
| only know what we know dept of conservatism in cali |
|
|
Term
|
Definition
| lack of internal controls, failure to enforce internal controls, excessive trust or insufficient distrust, vacations, unenforced segregation of duties, and background checks |
|
|
Term
| Process for 3 stages of COSO IC framework |
|
Definition
identify events, estimate probability, and estimate impact
Ex: Data center failing bc of power failure or snow storm One person should mitigate risks and another for services to keep everyone honest |
|
|