Term
(1) certify the internal controls over financial reporting (2) state responsibility for IC design (3) provide reasonable assurance as to the reliabilty of the financial reporting process(4) disclose any recent material changes in IC. |
|
Definition
SOX section 302 says mgmt must: |
|
|
Term
(1) asses IC effectiveness (2) reference the external auditors attestation report on mgmt's IC assesment. (3) provide explicit conclusions on the effectiveness of FR IC (4) identify the framework mgmt used to conduct their IC assesement. |
|
Definition
SOX section 404 says mgmt must: |
|
|
Term
(1) issue new audiot opintion on mgmt's IC assesment (2) required to test IC (3) collect documentation on IC tests and interview mgmt on IC changes |
|
Definition
audit implications include: |
|
|
Term
(1) application controls (2) general controls |
|
Definition
COSO identifies two groups of IR controls |
|
|
Term
ensure data validity, completeness and accuracy |
|
Definition
|
|
Term
apply to all systems and address IT governance and infrustructure, security, and application and program acquisition |
|
Definition
|
|
Term
how IT operates within an organization and how it is concerned with (1) organizations structure (2) computer center security and controls (3) disaster recovery planning |
|
Definition
It governance and infrastructure controls is concerned with: |
|
|
Term
(1) second site back up (2) DR team (3) test DR plan (4) data backup and storage offsite (5) ID of critical applications |
|
Definition
|
|
Term
(1) separate SD (authorization) from computer operations (custody, recording, processing) (2) separate SD from SM (independent verification)(3) separate SA from all other IT functions |
|
Definition
separation of duties in organizational structure of IT |
|
|
Term
(1) ID and password combinations, after specified number of failed attempts, the system should lock out the user |
|
Definition
log on procedure controls: |
|
|
Term
(1) changed periodically (2) include numbers, letters, and symbols (3) not be based on personal information |
|
Definition
|
|
Term
if the log in is valid, the access token contains key info about the user that is matched wtih teh control list to gain access to specific resouces. |
|
Definition
access token and control list |
|
|
Term
document and record all activity at the system, application, and user level |
|
Definition
|
|
Term
access control-defines a user's data domain |
|
Definition
|
|
Term
access control-rules that define the actions a user can take |
|
Definition
database authorization table |
|
|
Term
|
Definition
questions that provide stronger user identification than a password can |
|
|
Term
|
Definition
for both stored data as well as displayed datadata |
|
|
Term
|
Definition
user physical characteristics that are digitized and stored for Identification and authorization |
|
|
Term
(1) backup at least once a day and store at 2nd location (2) maintain transaction logs that correspond to the number of backups, changes to the database are stored inthe database change log (3) checkpoint feature reconciles the backup database copy and the database change log (4) recovery module uses the transaction log and backup files to restart the database after a failure. |
|
Definition
|
|
Term
|
Definition
a system that enforces access control between 2 networkds, must be immune to unauthorized access from both internal and external sources |
|
|
Term
denial of service attacks |
|
Definition
difficult to control against, deep packet inspection searches individual packets of info in a message to id known attack signitures |
|
|
Term
|
Definition
uses keys on both the sender's and receivers side to encrypt and then decode a message |
|
|
Term
|
Definition
electronic authentication that cannot be forged, ensures the message was not tampered with after the signature was applied |
|
|
Term
|
Definition
issued by a third paty to validate a senders identity |
|
|
Term
|
Definition
restricts intrustion by calling back the user after ID has been validated |
|
|
Term
|
Definition
corruption through noice in the communication lines |
|
|
Term
|
Definition
receiver returns message to sender to confirm accuracy and completeness of message |
|
|
Term
|
Definition
incorporates an extra bit into the structure of info when is created. the parity bit is based on the info in the mssage and is recalculated on the receiver's end. it is then compared to the existing parity bit in the mssae to detect transmission errors. |
|
|
Term
read only access to info tis used to control access, transaction authorization, and audit trail |
|
Definition
electronic data interchange controls |
|
|
Term
|
Definition
programmed procedures that perform tests on transaction data to ensure they are free from error |
|
|
Term
|
Definition
control digit added to a data code to check code integrity |
|
|
Term
|
Definition
missing data triggers an error |
|
|
Term
|
Definition
|
|
Term
|
Definition
used to identify field values that exceed an authorized limit |
|
|
Term
|
Definition
used to identify field values that are outside an authroized range |
|
|
Term
|
Definition
uses data from other fields to asses the reaonableness of entered data |
|
|
Term
|
Definition
compares field values against known acceptable values |
|
|
Term
|
Definition
programmed producures in the processing stage |
|
|
Term
|
Definition
used to document and manage the flow of high volumes of transactions through batch processing systems |
|
|
Term
|
Definition
total dollar value of a financial field in the batch |
|
|
Term
|
Definition
the total of a unique non financial field in the batch |
|
|
Term
|
Definition
the use of batch figures to monitor that batch as it moves from one prodeure to another |
|
|
Term
|
Definition
ensure that every transaction can be traced through each stage of processing from its source to its presentation int he financial statements |
|
|
Term
|
Definition
ensure that system output is not lost, misdirected, or corrumpted and that the privacy of output is not compromised |
|
|
Term
|
Definition
be aware of exposures during spooling and ensure that proper access and backup procedures are in place to protect output files |
|
|
Term
|
Definition
should be monitored so that unauthorized copies are not made or sensitive material is not disclosed |
|
|
Term
(1) authorization (2) user specification (3) technical design (4) internal audit participation (5) program testing |
|
Definition
system development conrls |
|
|
Term
(1) authorization (2) technical specifications (3) testing (4) documentation updates |
|
Definition
|
|
Term
|
Definition
application program modules are stored in source code form on magnetic disks called these |
|
|
Term
(1) password control (2) separation of test libraries (3) mgmt reports (4) program version numbers (5) control access to common maintenance commands |
|
Definition
|
|