Created by Regan Deckinger
almost 2 years ago
|
||
Question | Answer |
Application Controls | Specific to a subsystem or an application to ensure the validity, completeness, and accuracy of the transaction. |
Code of Ethics | A formal expectation on what is considered to be ethical within an organization to promote ethical behavior. |
Committee of Sponsoring Organizations | Composed of several organizations (AAA, AICPA, FEI, IIA, and IMA); studies the causal factors that lead to fraudulent financial reporting and develops recommendations for public companies, independent auditors, the SEC and other regulators, and educational institutions to improve the quality of financial reporting through internal controls and corporate governance. |
Control Objectives for Information and Related Technology | An internationally accepted set of best IT security and control practices for IT management released by the IT Governance Institute (ITGI). |
Control Risk | The threat that errors or irregularities in the underlying transactions will not be prevented, detected, and corrected by the internal control system. |
Corporate Governance | A set of processes and policies in managing an organization with sound ethics to safeguard the interests of its stakeholders. |
Corrective Controls | Fix problems that have been identified, such as using backup files to recover corrupted data. |
Cost/Benefit Analysis | Fix problems that have been identified, such as using backup files to recover corrupted data. |
Detective Controls | Find problems when they arise. |
Enterprise Risk Management | A process, affected by the entity’s board of directors, management, and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within the risk appetite, to provide reasonable assurance regarding the achievement of objectives. |
General Controls | Pertain to enterprisewide issues such as controls over accessing the network, developing and maintaining applications, and documenting changes of programs. |
Information Technology Infrastructure Library | A set of concepts and practices for IT service management |
Inherent Risk | The risk related to the nature of the business activity itself. |
Input Controls | Ensure the authorization, entry, and verification of data entering the system. |
Internation Organization for Standardization | This series contains a range of individual standards and documents specifically reserved by ISO for information security. |
IT Application Controls | Activities specific to a subsystem’s or an application’s input, processing, and output. |
IT Controls | Involve processes that provide assurance for information and help to mitigate risks associated with the use of technology. |
IT General Controls | Enterprise-level controls over IT. |
Output Controls | Provide output to authorized people and ensure the output is used properly. |
Physical Controls | Mainly manual but could involve the physical use of computing technology. |
Preventive Controls | Deter problems before they arise. |
Processing Controls | Ensure that data and transactions are processed accurately. |
Public Company Accounting Oversight Board | Established by SOX to provide independent oversight of public accounting firms. |
Residual Risk | The product of inherent risk and control risk (i.e., Residual risk = Inherent risk × Control risk). |
Risk Assessment | The process of identifying and analyzing risks systematically to determine the firm’s risk response and control activities. |
Sarbanes-Oxley Act of 2002 | A response to business scandals such as Enron, WorldCom, and Tyco International; requires public companies registered with the SEC and their auditors to annually assess and report on the design and effectiveness of internal control over financial reporting. |
Want to create your own Flashcards for free with GoConqr? Learn more.