Term
|
Definition
| ensures that account numbers or customers exist |
|
|
Term
|
Definition
| ensures that items make sense in relation to one another |
|
|
Term
|
Definition
| extra digit added to account number to make sure no errors were made |
|
|
Term
|
Definition
| makes sure pre established limits are not exceeded |
|
|
Term
|
Definition
| ensures that all required fields are filled in |
|
|
Term
|
Definition
| determines whether the characters in a field are of the proper type |
|
|
Term
|
Definition
| ensures that all transactions are processes once and only once |
|
|
Term
|
Definition
| counts total number of transactions processed and compares to the number that should be processed |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the total of all the dollars input |
|
|
Term
|
Definition
| checks that there are no obvious problems or errors |
|
|
Term
|
Definition
| ensures that computer output is distributed to only authorized users |
|
|
Term
|
Definition
| technological road map that lays out projects the company needs to keep things running properly |
|
|
Term
|
Definition
| X tries at password, then system shuts off |
|
|
Term
|
Definition
| allows log in, then shuts off and calls back at authorized location |
|
|
Term
|
Definition
| scrambles data to anyone gaining access to information cannot read it |
|
|
Term
|
Definition
| filters incoming data packets from internet |
|
|
Term
|
Definition
| having people hack your system to show you whats wrong with it |
|
|
Term
|
Definition
| computer program that can copy itself and attach to another computer program |
|
|
Term
|
Definition
| hides in a computer system, waiting to delete certain files |
|
|
Term
|
Definition
| aids unauthorized personnel to access knowledge of computer's owner without owner knowing about it. monitors activity |
|
|
Term
|
Definition
| attempts to steal credit card information through social engineering. ex. email |
|
|
Term
|
Definition
comprehensive outlines of actions a company should take before, during and after a disaster. includes: 1) alternate facility 2) list of critical applications 3) backup and recovery procedures 4) disaster recovery team 5) tests to endure plan works |
|
|
Term
|
Definition
| insurance that keeps dishonest people from applying for jobs |
|
|
Term
|
Definition
| specific things you do to achieve objectives |
|
|
Term
|
Definition
| cheapest with most net benefit |
|
|
Term
|
Definition
| more expensive that preventative, but cheaper than corrective |
|
|
Term
|
Definition
| most expensive form of control |
|
|
Term
|
Definition
| data, programs, docs, and facilities are separated from protection |
|
|
Term
|
Definition
| making backup copies of key data/apps |
|
|
Term
|
Definition
| providing help and training for employees to obtain understanding and gain cooperation |
|
|
Term
|
Definition
| tracing details to totals |
|
|
Term
|
Definition
| manager supervision used to encourage good work and fewer errors |
|
|
Term
|
Definition
| making people responsible for their actions |
|
|
Term
|
Definition
| system whose purpose is to efficiently and effectively exchange cash with suppliers for needed goods and services |
|
|
Term
|
Definition
| ensure that needed goods are requested given available resources |
|
|
Term
|
Definition
| formal or source document filled out on intranet |
|
|
Term
|
Definition
| ensure that needed goods are ordered and received on a timely basis |
|
|
Term
|
Definition
| keeps track of purchasing activities, gets best goods at lowest prices, only have one if it makes sense cost-wise |
|
|
Term
|
Definition
| goods are properly identified and safeguarded |
|
|
Term
| accounts payable function |
|
Definition
| keeps track of who to pay, when to pay, and how much to pay vendors |
|
|
Term
|
Definition
| prenumbered document that assigns numeric control to vendors invoice |
|
|
Term
| cash disbursements function |
|
Definition
| pays the suppliers the correct amount at the proper time |
|
|
Term
|
Definition
| no one person should be able to authorize, account for, and handle the assets relating to a single transaction |
|
|
Term
|
Definition
| system whose purpose is to efficiently and effectively receive cash from customers for requested goods and services |
|
|
Term
|
Definition
| accurately enters approved orders on a timely basis |
|
|
Term
|
Definition
| formal authorization to ship goods to an approved customer |
|
|
Term
|
Definition
| ensures the collectibility of customer accounts |
|
|
Term
|
Definition
| ensures that requested goods are properly identified and shipped |
|
|
Term
| billing/accounts receivable function |
|
Definition
| determines who owes the company money, how much is owed, and when the amounts are due |
|
|
Term
|
Definition
| based on shipping report and an approved sales price list |
|
|
Term
|
Definition
| accurately and safely determine what funds have been received from customers |
|
|
Term
|
Definition
| having customers send checks directly to the bank |
|
|
Term
|
Definition
| customer service department handles to make sure that they are properly authorized and tracked |
|
|
Term
|
Definition
| a process to ensure that objectives will be met |
|
|
Term
|
Definition
1)control environment 2) risk assessment 3) information and communication 4) control activities 5) monitoring |
|
|
Term
|
Definition
| weaknesses in internal control that will have no effect on financial statements |
|
|
Term
|
Definition
| small impact on financial statements |
|
|
Term
|
Definition
| a single weakness or number of significant deficiencies that could have a material effect on financial statements |
|
|
Term
|
Definition
| significant enough to affect the decisions of an informed user |
|
|
Term
|
Definition
| the attitude managers have about internal control |
|
|
Term
|
Definition
| identifies potential events that may affect the entity. responding to what might go wrong. involves potential exposure to the problem and the probability of occurrence |
|
|
Term
| information and communication |
|
Definition
| lets people know whats going on |
|
|
Term
|
Definition
| something specific you might do to minimize the likelihood of an error or irregularity |
|
|
Term
|
Definition
| a process that assesses the internal controls over time including internal auditors, budgeting, customers, and regulators |
|
|
Term
|
Definition
| cost of internal controls should not exceed the benefits |
|
|
Term
| limitations of internal control |
|
Definition
| fatigue, collusion, management override |
|
|
Term
|
Definition
| framework of interacting parts that work together to achieve an objective |
|
|
Term
|
Definition
| exists when the system objectives are not being met |
|
|
Term
|
Definition
| a thought process that analyzes and evaluates evidence from questioned sources to reach an informed judgement |
|
|
Term
| accounting information system |
|
Definition
| framework of people, technology and controls that work together to provide information needed to operate, make decisions, and file necessary reports |
|
|
Term
| usefulness of information |
|
Definition
| relevant, reliable, timely, complete, and understandable |
|
|
Term
| control systems maturity model |
|
Definition
5) optimized 4) integrated 3) formal and systemic 2) informal 1) initial 0) nonexistant |
|
|
Term
|
Definition
| automated and sophisticated techniques |
|
|
Term
|
Definition
|
|
Term
| formal and systemic controls |
|
Definition
| documentation implemented |
|
|
Term
|
Definition
| management is aware for need for controls, but is not key to business operation |
|
|
Term
|
Definition
|
|
Term
|
Definition
| incompetent, out of control |
|
|