a-3 Flashcards
What is the primary objective of data security controls?
to ensure that storage media are only accessed, changed, or deleted after appropriate authorization. The objective is to protect information.
As part of risk assessment procedures for an audit of a nonissuer, an auditor would most likely perform which of the following procedures concerning related party transactions?
Evaluate the entity’s procedures for identifying related party transactions.
General IT Controls
Addresses the risks arising from the use of IT and an be categorized as:
Applications
Database
Operating system
Network
Information Processing Controls
Controls over input, processing, and output include:
1. Controls over interfaces, integrations
2. Checking the mathematical accuracy
3. Automated edit checks of input data
4. Manual follow ups of exception reports
Financial Statement Level Risks
Risks that relate pervasively to the financial statements as a whole and potentially impact many individual assertions.
Assertion Level Risks
Risks of material misstatement that do not relate pervasively to the financial statement but rather relate to specific transactions, account balances, or disclosures.
Nature
The nature of the audit procedures includes both its purpose (test of control vs. substantive procedure) and its type (inspection, observation, inquiry). The auditor varies the nature of audit procedures in order to achieve the desired level of reliability
Extent
Refers to the quantity to be performed, such as the number of observations to be made or the sample size to be used. The higher assessed RMM the greater the extent
Timing
Audit tests may be performed at an interim date or at period end. The higher RMM the closer to period end substantive procedures should be performed.
Test of details
Applied to transaction classes, account balances and disclosures.
Substantive analytical procedures
evaluations of financial information made by a study of plausible relationships among both financial and nonfinancial data
Hierachy of audit evidence
- Auditors direct personal knowledge
- External evidence
- Internal evidence
- Oral evidence
C the FIVE CARROT WARS
Procedures used in audits risk assessment procedures
Confirmation
Footing
Inquiry
Vouching
Examination/Inspection
Cutoff Review
Analytical Procedures
Reperformance
Reconciliation
Observation
Tracing
Walkthroughs
Auditing related accounts simultaneously
Representation letter
Subsequent Events review
Procedures related to Completeness
Tracing, Analytical review, observation
Procedures related to Cutoff
Cutoff procedures