Auditing an IT Environment Flashcards

1
Q

What is an IT Environment

A

Consists of IT applications and supporting IT infrastructures as well as the IT processes and personnel involved in those processes that an entity uses to support business operations and achieve business strategies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IT Application

A

Program or set of programs that is used in the initiation processing recording and reporting of transactions or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IT infrastructures

A

Comprises the network, operating system, and databases and their related hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IT Processes

A

Entity’s processes to manage access to the IT environment, manage program changes or changes to the IT environment and manage IT operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Components of IT Infrastructure

A
  1. Database System
  2. Operating System
  3. Networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of Networks

A
  1. LAN- Local Area Network
  2. MAN- Metropolitan Area Network
  3. NAN- National Area Network
  4. WAN- Wide Area Network
  5. Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hardware

A

Physical Devices or equipment used to accomplish data processing functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software

A

Consists of sets of instructions or programs that direct, control, and coordinates the operation of the hardware components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Risk arising from the use of IT (RAIT)

A

Susceptibility of information processing controls to ineffective design or operation or risk to the integrity of information in the information system due to ineffective design or operation of controls in the entity’s IT process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Entity Wide general Controls

A
  1. Strategies and Plans
  2. Segregation of Duties
  3. Policies and procedures
  4. Quality Assurance
  5. Risk Assessment Activities
  6. Training
  7. Internal Audit and Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General IT Controls

A
  1. Controls over IT changes
  2. IT Operations Controls
  3. Access Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Handled by a Chief Information Officer who supervises the operation of the department

A

Information System Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Responsibilities within an Information Systems Department

A
  1. Information Systems Management.
  2. System Analysis
  3. Application Programming
  4. Database Administration
  5. Data Entry
  6. Computer Operation
  7. Program and File Library
  8. Data Control
  9. Telecommunication
  10. Quality Assurance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Types of Computer Systems

A
  1. Management Reporting Systems
  2. Transaction Processing Systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Management Reporting System

A

Designed to help with the decision making process by providing access to computer daa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transaction Processing Systems

A

Involved in the daily processing of transactions

17
Q

Cold Site

A

Similar to a hotsite, but the customer provides and installs the equipment needed to continue operation

18
Q

Hot Site

A

Commercial disaster recovery service that allows a business to continue computer operations in the event of a computer disaster

19
Q

Gateway

A

A hardware and software solution that enables communications between two dissimilar networking systems or protocols.

20
Q

General Controls

A

Control policies and procedures that relate to the overall computer information system

21
Q

Application Controls

A

Control policies and procedures that relate to specific use of the system in order to provide reasonable assurance that all transactions are authorized, recorded, and are processed completely, accurately and on a timely basis

22
Q

Examples of Application Controls

A
  1. Controls over input
  2. Controls over processing and computer data files
  3. Controls over output
23
Q

Check digit

A

Adding an extra number at the end of each account number and subjected the new number to an algorithm

24
Q

Blackbox Approach

A

Involves procedures generally performed in testing manual control structure
Focuses solely on the input documents and the IT output

25
Q

Whitebox Approach

A

A. Auditing with the computer- uses computer of entity as an audit tool
B. Auditing through the computer- enters the client’s system and examines directly the computer and its system and application softwares

26
Q

Categories of Computer-Assisted Auditing Techniques

A
  1. Program Analysis
  2. Program Testing
  3. Continuous testing
  4. Review of Operating Systems
27
Q

Program Analysis

A

Technique which allows auditor to gain an understanding of the client’s program

28
Q

Program Testing

A

Involves the use of auditor-controlled actual or simulated data. Also provides direct evidence about the operation of programs and programmed controls