Term
|
Definition
Committee of Sponsoring Organizations of the Treadway Commission |
|
|
Term
|
Definition
control concepts are crucially important to entities subject to the '34 Act. |
|
|
Term
|
Definition
with $75 million in market equity must include in its annual report an assessment by management of whether ICFR is effective. Auditor is required to also cover ICFR, but not management's assessment of IC in an integrated audit. |
|
|
Term
second standard of fieldwork under GAAS |
|
Definition
The auditor must obtain a sufficient understanding of the entity and its environment, including IC, to assess the RMM of the F/S whether due to error or fraud, and to design the nature, timing, and extent of further audit procedures. |
|
|
Term
goal of internal control (IC) |
|
Definition
provide reasonable assurance regarding the achievement of objectives related to the following: Reliability of financial reporting Effectiveness and efficiency of operations Compliance w/applicable laws and regulations |
|
|
Term
|
Definition
control environment- tone at the top risk assessment- identification and analysis of relevant risks as a basis for risk management control activities- policies and procedures information and communication- identification, capture, and exchange of information to help people carry out their responsibilities monitoring- assess IC quality over time |
|
|
Term
relationship between entity's objectives and components- direct? indirect? or none? |
|
Definition
|
|
Term
Is IC relevant to the entire entity? |
|
Definition
Yes, controls relating to objectives that are not related to an audit and need not be considered. Furthermore, understanding IC relevant to each operating unit or business function may not be needed to perform an audit. |
|
|
Term
Why reasonable, not absolute assurance? |
|
Definition
Scope and time limitations, faulty judgment, management override, collusion. |
|
|
Term
|
Definition
The foundation or other components, providing discipline and structure. |
|
|
Term
How does the auditor understand the CE? |
|
Definition
auditor considers programs and controls addressing fraud risk that have been implemented by management and those charged w/governance. Their absence or inadequacy may be a material weakness. |
|
|
Term
evaluating the design of the CE includes: |
|
Definition
Communication and enforcement of integrity and ethical values. Also, give incentives for doing good acts and remove incentives to do what is wrong. Commitment to competence. Participation of those charged w/governance (BOD, audit committee, etc). Management's philosophy and operating style. Attitudes towards taking and managing business risks, financial reporting, information processing, accounting functions, and personnel. Organizational structure. Assignment of authority and responsibility. HR policies and practices. |
|
|
Term
|
Definition
include events and circumstances that may adversely affect an entity's ability to initiate, authorize, record, process, and report financial data consistent w/F/S assertions. |
|
|
Term
|
Definition
Changes in operating environment. New personnel. New or revamped information systems. Rapid growth. New technology. New business models, products, or activities. Corporate restructurings. Expanded foreign operations. New accounting pronouncements. |
|
|
Term
|
Definition
performance reviews information processing physical controls segregation of duties |
|
|
Term
|
Definition
|
|
Term
|
Definition
checks of accuracy, completeness, and authorization of transactions. Includes general and application controls. |
|
|
Term
|
Definition
safeguarding of assets, records, periodic counts, and reconciliations that create asset accountability. |
|
|
Term
|
Definition
physical and hardware elements, software, data, manual and automated procedures, and people that interrelate to achieve a business goal. |
|
|
Term
IS and financial reporting |
|
Definition
For financial reporting, the information system encompasses automated and manual procedures and records used to initiate, authorize, record, process, and report transactions, events, and conditions and to maintain accountability for assets, liabilities, and equity. |
|
|
Term
|
Definition
automatic through programmed methods |
|
|
Term
|
Definition
management's approval process |
|
|
Term
|
Definition
identification and capture of relevant information |
|
|
Term
|
Definition
edit and valuation, calculation, measurement, valuation, summarization, and reconciliation by manual or automated means |
|
|
Term
|
Definition
financial and other information for control (and decision-making) functions |
|
|
Term
|
Definition
Identifies and records all valid transactions Describes transactions sufficiently for proper classification Measures transactions Determines the proper reporting period for transactions Presents transactions and related disclosures properly |
|
|
Term
|
Definition
providing an understanding to employees about their roles and responsibilities |
|
|
Term
|
Definition
management's timely assessment of IC and the taking of corrective action so that controls operate as intended and are modified for changes in conditions. |
|
|
Term
Establishing and maintaining IC is the responsibility of... |
|
Definition
|
|
Term
components of monitoring process |
|
Definition
Ongoing activities built into normal recurring actions such as supervision, possibly combined w/separate evaluations Actions of internal auditors Consideration of communications from external parties |
|
|
Term
|
Definition
Hence, the auditor should obtain sufficient knowledge about major monitoring activities, including the sources of related information and the basis for considering it to be reliable. |
|
|
Term
How does the auditor gain a sufficient understanding of the 5 IC components to assess the RMM and to design further audit procedures? |
|
Definition
by performing risk assessment procedures to evaluate the design of controls relevant to the audit and determine whether they have been implemented. |
|
|
Term
Is the auditor obligated to search for control deficiencies? |
|
Definition
No obligation to search for deficiencies, but any significant deficiencies must be communicated. |
|
|
Term
How should the auditor use his/her understanding of IC? |
|
Definition
Identify types of potential misstatements Consider factors that affect the RMMs Design tests of controls if appropriate Design substantive procedures |
|
|
Term
auditor & accounting policies |
|
Definition
Auditor should understand the selection, application, and appropriateness of accounting policies, including: Significant and unusual transactions Significant policies applied when there is a lack of guidance or consensus in controversial or emerging areas Changes in policies Adoption of new standards and regulations |
|
|
Term
|
Definition
controls that ordinarily address objectives related to the preparation of fairly presented F/S, including management of RMMs. |
|
|
Term
How are relevant controls assessed? |
|
Definition
professional judgment of the auditor |
|
|
Term
What should the auditor do in case of significant risks? |
|
Definition
the auditor should evaluate the design of the related controls and determine whether they have been implemented. For this purpose, the auditor considers the control component, the circumstances, materiality, entity size, nature of business and ownership, diversity and complexity of operations, nature and complexity of control systems, and legal and regulatory concerns. |
|
|
Term
How are relevant controls identified? |
|
Definition
Identified through Previous experience w/the entity Understanding of entity and its environment Information gathered during the audit. |
|
|
Term
Which controls are relevant (not just asking for professional judgment here)? |
|
Definition
Controls related to financial reporting, including controls over completeness, accuracy, operations and compliance and safeguarding of assets.
Controls over the completeness and accuracy of information used by the auditor. Controls over operations and compliance may be relevant if they relate to information or data involved in performance of audit procedures. Controls over safeguarding of assets against unauthorized acquisition, use, or disposition may include those relating to financial reporting and operations objectives. |
|
|
Term
control design and implementation |
|
Definition
Considers whether a control can effectively prevent or detect and correct material misstatements. |
|
|
Term
When has a control been implemented? |
|
Definition
it exists and the entity is using it. |
|
|
Term
Should implementation always be considered? |
|
Definition
Not if the design is improper. Improper design may be a material weakness. |
|
|
Term
risk assessment procedures include... |
|
Definition
If design is improper. Improper design may be a material weakness. |
|
|
Term
|
Definition
Concerned w/how and by whom the control was applied and the consistency of application.
Obtaining the understanding is insufficient to test the operating effectiveness of controls, unless they are automated and subject to effective IT general controls. |
|
|
Term
understanding IT-based systems |
|
Definition
IT skills may be required to determined the effect of IT on the audit, understand IT controls, and design and perform tests of IT controls and substantive procedures. |
|
|
Term
required IT expertise for auditors |
|
Definition
The auditor must have sufficient IT expertise to communicate audit objectives, evaluate whether the IT professional's procedures will meet those objectives, and evaluate the results. |
|
|
Term
required IS expertise for auditors |
|
Definition
Auditor should understand the information system relevant to financial reporting- classes of significant transactions, automated and manual procedures to initiate, authorize, record, process, and report transactions; the related accounting records, supporting information and specific accounts; how the system captures other significant events and conditions; and the financial reporting process. |
|
|
Term
|
Definition
required by GAAS; more extensive if controls are more complex and audit procedures are more extensive |
|
|
Term
systems (document) flowcharts |
|
Definition
diagrams of the client's system that track the flow of documents and processing. Provide a visual representation of the system and are flexible in construction. |
|
|
Term
|
Definition
consist of a series of interrelated questions about IC policies and procedures. Helps identify control concerns and prevents the auditor from overlooking important control considerations. |
|
|
Term
Yes and No questionnaires |
|
Definition
“Yes”- control strength. “No”- control weakness. |
|
|
Term
|
Definition
written description of the process and flow of documents and of the control points. Flexibility is the advantage. |
|
|
Term
|
Definition
identifies the contingencies considered in the description of a problem and the appropriate actions to be taken in each case. Decision tables are logic diagrams presented in matrix form. Do not present sequence as do flowcharts. |
|
|
Term
|
Definition
series of procedures to be performed |
|
|
Term
|
Definition
useful tool for systems development as well as for understanding IC |
|
|
Term
|
Definition
pictorial diagram of the definition, analysis, or solution of a problem in which symbols are used to represent operations, data flow, documents, records, etc.
Flowcharts are used to understand, evaluate, and document client IC. |
|
|
Term
processing (in flowcharts) |
|
Definition
presented sequentially from the point of origin to the distribution of final output. Flows from top to bottom and from left to right. |
|
|
Term
|
Definition
provides an overall view of the inputs, processes, and outputs of a system |
|
|
Term
|
Definition
represents the specific steps in a computer program and the order in which they will be carried out. Macro- and micro-flowcharts describe a program in less or greater detail, respectively. |
|
|
Term
|
Definition
depicts flow of documents through an entity
Areas of responsibility are usually depicted in vertical columns or areas. |
|
|
Term
system availability is dependent on... |
|
Definition
Uninterrupted flow of electricity Protection of computer hardware from environmental hazards Protection of software and data files from unauthorized alteration Preservation of functioning communications channels between devices |
|
|
Term
volatile transaction trails |
|
Definition
In online, real-time systems, data are entered directly into the computer, eliminating portions of the audit trail provided by source documents. |
|
|
Term
decreased human involvement |
|
Definition
Because employees who enter transactions may never see the final results, the potential for detecting errors is reduced. Computers also carry a mystique of infallibility. |
|
|
Term
uniform processing of transactions |
|
Definition
Computer processing uniformly subjects like transactions to the same processing instructions, therefore virtually eliminating clerical error. Thus, it permits consistent application of predefined business rules and the performance of complex calculations in high volume. On the other hand, with programming errors, all like transaction will be processed incorrectly. |
|
|
Term
|
Definition
Firewalls and user-id-and-password combinations are vital because access can be carried out through multiple terminals in the organization or through hackers. |
|
|
Term
|
Definition
Duplicate organization's computer files and store them offsite periodically to protect against the effects of the destruction of hardware devices or units. |
|
|
Term
reduced separation of duties |
|
Definition
Tasks combined in an automated environment. |
|
|
Term
reduced individual authorization of transactions |
|
Definition
This reduced level of oversight for individual transactions requires careful coding to ensure that computer programs accurately reflect management's goals for business processes. |
|
|
Term
|
Definition
transactions are accumulated and submitted to the computer as a single batch. Still widely used; can't be changed unless aborted completely. |
|
|
Term
online, real-time systems |
|
Definition
database is updated immediately upon entry of the transaction by the operator.
These include online transaction processing (OLTP) systems. |
|
|
Term
|
Definition
umbrella under which the IT function operates. Auditors should be satisfied that these work before relying on application controls. |
|
|
Term
controls over data center and network operations |
|
Definition
ensure efficient and effective operations of the computer activity. |
|
|
Term
controls over software acquisition, change, and maintenance |
|
Definition
ensure that proper software is available for use. |
|
|
Term
|
Definition
encompasses access to both computer hardware devices themselves (physical access) and to data and programs through the system (logical access). |
|
|
Term
|
Definition
particular to each of the organization's applications. Some features come built-in when applications are acquired from vendors. Software developed by the organization's own programmers must have appropriate controls incorporated in the design |
|
|
Term
|
Definition
provide reasonable assurance that data received for processing have been identified, properly authorized, and converted into machine-sensible form, and that data have not been lost, added to, suppressed, duplicated, or otherwise improperly changed. Input controls may also related to rejection, correction, and resubumission of data initially incorrect. |
|
|
Term
|
Definition
provide reasonable assurance that processing has been performed as intended for the particular application. |
|
|
Term
|
Definition
ensure the accuracy of the processing result and the receipt of output by authorized personnel only. |
|
|
Term
From an audit perspective, what is the most significant general control? |
|
Definition
The assignment of authority and responsibility. |
|
|
Term
database administrators (DBAs) |
|
Definition
responsible for developing and maintaining the organization's databases and for establishing controls to protect their integrity. |
|
|
Term
|
Definition
maintain the bridges, hubs, routers, switches, cabling, and other devices that interconnect the organization's computers, as well as maintaining the organization's connection to other network. |
|
|
Term
|
Definition
responsible for the content of the organization's website. S/he works closely w/programmers and network technicians to ensure that the appropriate content is displayed and that the site is reliably available to users. |
|
|
Term
computer (console) operators |
|
Definition
responsible for the moment-to-moment running of the organization's servers and mainframes (medium- and large-scale computers) These require 24-hour monitoring. |
|
|
Term
|
Definition
maintain control over and accountability for documentation, programs, and data storage media |
|
|
Term
|
Definition
maintain and fine-tune the operating systems on the organization's medium- and large-scale computers). |
|
|
Term
|
Definition
uses his/her detailed knowledge of the organization's databases and applications programs to determine how an application should be designed to best serve the user's needs. Their duties are often combined with those of programmers. |
|
|
Term
|
Definition
design, write, test, and document computer programs according to specifications provided by the end users. |
|
|
Term
|
Definition
log problems reported by users, resolve minor difficulties, and forward more difficult problems to the appropriate person. |
|
|
Term
Most important part of any disaster recovery plan. |
|
Definition
periodic backup and offsite recovery |
|
|
Term
|
Definition
duplicating all data files and application programs at least once a month. Incremental changes are then added about once a week. |
|
|
Term
|
Definition
must be temperature- and humidity-controlled and guarded against physical intrusion. Must also be geographically remote enough from the site of the organization's main operations that it would not be affected by the same natural disaster. |
|
|
Term
|
Definition
have generator or battery backup to prevent data destruction and downtime from electrical power disturbances. |
|
|
Term
fault-tolerant computer systems |
|
Definition
have additional hardware and software as well as a backup supply |
|
|
Term
hot-site backup facilities |
|
Definition
fully operational processing facility immediately available |
|
|
Term
cold-site backup facilities |
|
Definition
shell facility where the user an quickly install equipment |
|
|
Term
|
Definition
software program that infects another program or a system's primary storage (main memory) by altering its logic.
Infection can destroy data, then spread the virus to other software programs. |
|
|
Term
common sources of viruses |
|
Definition
obtaining software through a shareware network downloading from untrustworthy sources propagating viruses through email attachments |
|
|
Term
preventive controls (for viruses) |
|
Definition
include establishing a formal security policy, using only clean and certified copies of software, not using shareware software, checking new software with antivirus software, restricting access and educating users. |
|
|
Term
detective controls (for viruses) |
|
Definition
include making file size and date/time stamp comparisons. |
|
|
Term
corrective controls (for viruses) |
|
Definition
include ensuring that clean backup is maintained and having a documented plan for virus recovery. |
|
|
Term
|
Definition
viruses that make copies of themselves with either benign or malignant intent. Are independent and use operating system services as their means of replication. |
|
|
Term
|
Definition
software that appears to have a legitimate function but performs some destructive or illicit function after it begins to run |
|
|
Term
|
Definition
network based on the same technology as the internet, but access is limited to an organization or those w/specific authorization. |
|
|
Term
|
Definition
provides web access for existing customers or specific users rather than the general public |
|
|
Term
most important network control |
|
Definition
install an entity-wide network security system |
|
|
Term
user account management involves installing a system to ensure that... |
|
Definition
New accounts are added correctly and assigned only to authorized users. Old and unused accounts are removed promptly. Passwords are changed periodically, and employees are taught to create passwords that are not easily guessed. |
|
|
Term
|
Definition
separates an internal from an external network and prevents passage of specific types of traffic. It identifies names, IP addresses, applications, etc. and compares them with programmed access rules. |
|
|
Term
What do firewall systems do? |
|
Definition
Firewall systems ordinarily produce reports on entity-wide Internet use, exception reports for unusual activity patterns, and system penetration-attempt reports. These reports are helpful to the auditor, but firewalls do not protect adequately against viruses. |
|
|
Term
Do firewalls protect adequately against viruses? |
|
Definition
No, but firewall reports are useful to auditors. |
|
|
Term
|
Definition
form of encryption technology used by businesses to authenticate documents. |
|
|
Term
control over systems software |
|
Definition
ensure that operating systems, utilities, and DBMS are acquired and changed only under close supervision and that vendor updates are routinely installed. |
|
|
Term
control over application software |
|
Definition
ensure that programs used for transaction processing are cost-effective and stable |
|
|
Term
|
Definition
collective term for systems software and application software controls; such controls require authorization, testing, and acceptance. All changes should be properly documented. |
|
|
Term
|
Definition
prevent improper use or manipulation of data files and programs. They ensure that only those persons with a bona fide purpose and authorization have access. Physical security controls protect against unauthorized access to equipment and information. |
|
|
Term
|
Definition
The use of passwords and ID numbers is an effective control in an online system to prevent unauthorized access to files. Lists of authorized persons are maintained online. To avoid unauthorized access, the entity may combine the entry of passwords or ID numbers, a prearranged sets of personal questions, and the use of badges, magnetic cards, or optically scanned cards. |
|
|
Term
device authorization table |
|
Definition
This control grants access only to those physical devices that should logically needs access. |
|
|
Term
|
Definition
This log records all uses and attempted uses of the system. The date and time, codes used, mode of access, data involved, and interventions by operators are recorded. |
|
|
Term
|
Definition
Encoding data before transmission over communication lines makes it more difficult for someone with access to the transmission to understand or modify its contents. Encryption technology converts data into a code. |
|
|
Term
|
Definition
Requires remote user to call, give identification, hang up, and wait for a call to an authorized number. Ensures acceptance of data only from authorized modems. |
|
|
Term
controlled disposal of documents |
|
Definition
One method of enforcing access restrictions is to destroy data when they are no longer in use. Thus, paper documents may be shredded, and magnetic media may be erased. |
|
|
Term
|
Definition
Automated methods of establishing an individual's identity using physiological or behavioral traits. |
|
|
Term
|
Definition
may prevent the viewing of sensitive data on an unattended data terminal. |
|
|
Term
|
Definition
An entity may hire security specialists. For example, developing an IS policy for the entity, commenting on security controls in new applications, and monitoring and investigating unsuccessful access attempts are appropriate duties of the IS officer. |
|
|
Term
|
Definition
provide reasonable assurance that data submitted for processing are authorized, complete, and accurate. These controls vary depending on whether input is entered online or in batch mode. |
|
|
Term
online input controls (OIC) |
|
Definition
can be used when data are keyed into an input screen. |
|
|
Term
|
Definition
|
|
Term
edit (field) checks (OIC) |
|
Definition
error message for inputting invalid data; drop-down menus |
|
|
Term
limit (reasonableness) checks (OIC) |
|
Definition
certain amounts can be restricted to appropriate ranges |
|
|
Term
|
Definition
algorithm is applied to any kind of serial identifier to derive a check digit. During data entry, the check digit is recomputed by the system to ensure proper entry. |
|
|
Term
closed-loop verification (OIC) |
|
Definition
inputs by a user are transmitted to the computer, processed, and displayed back to the user for verification. |
|
|
Term
batch input controls (BIC) |
|
Definition
can be used when data are grouped for processing in batches |
|
|
Term
|
Definition
number of records in batch matches number of records calculated by the user |
|
|
Term
|
Definition
sum of dollar amounts of the individual items as reported by the system matches the amount calculated by the user |
|
|
Term
|
Definition
arithmetic sum of a numeric field, that has no meaning by itself, can serve as a check that the same records that should have been processed were processed. An example is the sum of all Soc. Sec. numbers. |
|
|
Term
|
Definition
provide reasonable assurance that all data submitted for processing were processed and only approved data are processed. These controls are built into the application code by programmers during the systems development process.
Some processing controls repeat the steps performed by the input controls, such as limit checks and batch controls. |
|
|
Term
|
Definition
Identifiers are matched against master files to determine existence. |
|
|
Term
|
Definition
any record with missing data is rejected |
|
|
Term
|
Definition
cross-footing and zero-balance checking |
|
|
Term
|
Definition
Computer effort is expended most efficiently when data are processed in a logical order. This check ensures that the batch is sorted in this order before processing begins. |
|
|
Term
run-to-run control totals (PC) |
|
Definition
The controls associated with a given batch are checked after each stage of processing to ensure all transactions have been processed. |
|
|
Term
|
Definition
A record's key is the group of values in designated fields that uniquely identify the record. No application process should be able to alter the data in these key fields. |
|
|
Term
|
Definition
compares an amount to the sum of its components. |
|
|
Term
|
Definition
adds the debits and credits in a transaction or batch to assure they sum to zero. |
|
|
Term
|
Definition
provide assurance that processing was complete and accurate. |
|
|
Term
audit trail & output controls |
|
Definition
A complete audit trail should be generated by each process. The audit trail is immediately submitted to a reasonableness check by the user who is most qualified to judge the adequacy of processing and the proper treatment of erroneous transactions. |
|
|
Term
|
Definition
report all transactions rejected by the system. These should be corrected and resubmitted by the user. |
|
|