Term
|
Definition
Controls that ensure that only authorized personnel have access to the firm's assets. |
|
|
Term
|
Definition
Professional services offered by public accounting firms to improve their client organizations' operational efficiency and effectiveness. |
|
|
Term
|
Definition
Controls that ensure the integrity of specific systems. |
|
|
Term
|
Definition
An external audit is an independent attestation performed by an expert-the auditor-who expresses an opinion regarding the presentation of financial statements.The audit objective is always associated with assuring the fair presentation of financial statements. |
|
|
Term
|
Definition
Task of creating meaningful test data. |
|
|
Term
|
Definition
The first step in the IT audit is audit planning in which the auditor gains a thorough understanding of the client's business. A major part of this phase of the audit is the analysis of audit risk. |
|
|
Term
|
Definition
Probability that the auditor will render unqualified opinions on financial statements that are, in fact, materially misstated. |
|
|
Term
|
Definition
Assets not unique to an organization and easily acquired in the marketplace (e.g., network management, systems operations, server maintenance, help-desk functions.) |
|
|
Term
|
Definition
For reports, state in which all necessary calculations are provided and the message is presented clearly and unambiguously. |
|
|
Term
|
Definition
Theft, misuse, or misappropriation of assets by altering computer-readable records and files, or by altering the logic of computer software; the illegal use of computer-readable information; or the intentional destruction of computer software or hardware. |
|
|
Term
Computer-Aided Audit Tools and Techniques (CAATTs) |
|
Definition
A set of computer programs used by an auditor to enhance the effectiveness of an audit while testing application controls. There are five features of CAATTs used: the test data method, base case system evaluation, racing, integrated test facility, and parallel simulation. |
|
|
Term
|
Definition
The likelihood that the control structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts. |
|
|
Term
|
Definition
Theory underlying outsourcing the posits an organization should focus exclusively on its core business competencies while allowing outsourcing vendors to manage non-core areas such as IT functions efficiently. |
|
|
Term
|
Definition
Coordinating IT unit that attempts to establish corporatewide standards among distributed IT units. |
|
|
Term
Database Management Fraud |
|
Definition
Altering, deleting, corrupting, destroying, or stealing an organization's data. |
|
|
Term
|
Definition
The risk that auditors are willing to take that errors not detected or prevented by the control structure will also not be detected by the auditor. |
|
|
Term
Disaster Recovery Plan (DRP) |
|
Definition
Comprehensive statement of all actions to be taken before, during, and after a disaster, along with documented, tested procedures to ensure the continuity of operations. |
|
|
Term
Distributed Data Processing (DDP) |
|
Definition
Reorganizing the IT function into small information processing units (IPUs) that are distributed to end users and placed under their control. |
|
|
Term
|
Definition
Listening to output transmissions over telecommunications lines. |
|
|
Term
|
Definition
Arrangement that involves two or more user organizations that buy or lease a building and remodel it into a computer site, but without the computer and peripheral equipment. |
|
|
Term
|
Definition
Management assertion that all assets and equities contained in the balance sheet exist and that all transactions in the income statement actually occurred. |
|
|
Term
|
Definition
Ability of the system to continue operation when part of the system fails due to hardware failure, application program error, or operator error. |
|
|
Term
General Computer Controls |
|
Definition
Specific activities performed by persons or systems designed to ensure that business objectives are met. |
|
|
Term
|
Definition
Controls that pertain to entity-wide concerns such as controls over the data center, organization databases, systems development, and program maintenance. |
|
|
Term
Information Technology Controls |
|
Definition
Include controls over IT governance, IT infrastructure, security, and access to operating systems and databases, application acquisition and development, and program changes. |
|
|
Term
|
Definition
The risk associated with the unique characteristics of the business or industry of the client. |
|
|
Term
|
Definition
Appraisal function housed within the organization. |
|
|
Term
|
Definition
Contracting with a third-party vendor to take over the costs, risks, and responsibilities associated with maintaining an effective corporate IT function, including management of IT assets and staff and delivery of IT services such as data entry, data center operations, applications development, applications maintenance, and network management. |
|
|
Term
|
Definition
Combination of tests of application controls and substantive tests of transaction details and account balances. |
|
|
Term
|
Definition
Data center that reflects current economic events of the firm. |
|
|
Term
|
Definition
Storage procedure used to safeguard the critical resources. |
|
|
Term
|
Definition
Misuse or theft of the firm's computer resources. |
|
|
Term
Presentation and Disclosure |
|
Definition
Management assertion that contingencies not reported in financial accounts are properly disclosed in footnotes. |
|
|
Term
|
Definition
A set of audit procedures developed by the auditors based on management assertions. |
|
|
Term
|
Definition
Techniques such as creating illegal programs that can access data files to alter, delete, or insert values into accounting records; destroying or corrupting a program's logic using a computer virus; or altering program logic to cause the application to process data incorrectly. |
|
|
Term
Recovery Operations Center (ROC) |
|
Definition
Arrangement involving two or more user organizations that buy or lease a building and remodel it into a completely equipped computer site. |
|
|
Term
Redundant Arrays of Independent Disk (RAID) |
|
Definition
Use of parallel disks that contain redundant elements of data and applications. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Searching through the trash of the computer center for discarded output. |
|
|
Term
|
Definition
Assets unique to an organization that support its strategic objectives. Specific IT assets have little value outside their current use. May be tangible (computer equipment), intellectual (computer programs), or human. |
|
|
Term
Statement on Auditing Standard No. 70 (SAS 70) |
|
Definition
Definitive standard by which client organizations' auditors can gain knowledge that controls at the third-party vendor are adequate to prevent or detect material errors that could impact the client's financial statements. |
|
|
Term
|
Definition
Tests that determine whether database contents fairly reflect the organization's transactions. |
|
|
Term
|
Definition
Tests that establish whether internal controls are functioning properly. |
|
|
Term
Transaction Cost Economics (TCE) Thoery |
|
Definition
Belief that organizations should retain certain specific non-core IT assets in-house; due to their esoteric nature, such assets cannot be easily replaced once they are given up in an outsourcing arrangement. Supports outsourcing of commodity assets, which are easily replaced. |
|
|
Term
Uninterruptible Power Supplies |
|
Definition
Technologies that prevent data loss and system corruption due to power failure. |
|
|
Term
|
Definition
Set of data that a particular user needs to achieve his or her assigned tasks. |
|
|
Term
|
Definition
Process of stating accounts receivable at net realizable value. |
|
|