Chapter 3 Flashcards

1
Q

stewardship

A

the careful and responsible oversite and use of the assets entrusted to management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

code of ethics

A

following ethical business practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

internal controls

A

a process affected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories:
effectiveness and efficiency of operations
reliability of financial reporting
compliance with applicable laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

fraud

A

the theft, concealment, and conversion to personal gain of another’s money, physical assets, or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

misappropriation of assets

A

theft of any item of value, also referred to as defalcation, or internal theft, most common are cash or inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

misstatement of financial records

A

the falsification of accounting reports, referred to as earnings management, fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

fraud triangle

A
Incentive
Opportunity                 Rationalization(attitude)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

incentive

A

things that motivate people to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

opportunity

A

if there is a lack of internal controls it is possible to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

rationalization

A

justifying fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

management fraud

A

conducted by one or more top level managers within the company, usually in reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

management override

A

where the management tells a lower level employee to do it despite the controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

employee fraud

A

conducted by employees examples:

inventory theft, cash receipts theft, A?P theft, payroll fraud, expense account fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

skimming

A

taking money before it is entered into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

larceny

A

where money is taken after it is entered into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

collusion

A

when two or more people work together to commit a fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

customer fraud

A

when a customer improperly obtains cash or property from a company, or avoids a liability through deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

credit card fraud or check fraud

A

customer use of stolen cc or checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

refund fraud

A

when a customer tries to return stolen goods to collect a cash refund

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

vendor fraud

A

when vendors obtain payments to which they are not entitled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

vendor audits

A

the examination of vendor records in support of amounts charged to the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

industrial espeonage

A

the theft of proprietary company info by digging through the trash of the intended target company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

software piracy

A

the unlawful copying of software programs

24
Q

internal computer fraud

A

input manipulation, program manipulation, output manipulation

25
Q

salami technique

A

altering a program to slice a small amount from several accounts and then credit those small amounts to the perpetrator’s benefit

26
Q

trojan horse program

A

a small unauthorized program within a larger legitimate program, used to manipulate the computer system to conduct a fraud

27
Q

trap door alteration

A

a valid programming tool that is misused to commit fraud

28
Q

hacking

A

term commonly used for computer network break ins

29
Q

denial of service attack

A

intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic.

30
Q

spoofing

A

when a person, through a computer system, pretend to be someone else

31
Q

prevent fraud

A

1 maintain code of ethics

  1. maintain a system of accounting internal controls
  2. maintaining a system of information technology controls
32
Q

Sarbanes Oxley Act (SOX)

A

passed to reform accounting, financial reporting, and auditing functions of public companies.

33
Q

SOX requirement code of ethics

A

SOX requires that public companies adopt and disclose a code of ethics

34
Q

preventive controls

A

designed to avoid errors, fraud, or events not authorized by management

35
Q

detective controls

A

help employees to uncover or discover errors, fraud, or unauthorized events

36
Q

corrective controls

A

steps to correct an error or problem uncovered via detective controls

37
Q

committee of sponsoring organization (COSO)

A

made the COSO report

38
Q

COSO report

A

five components of internal control:

control environment, risk assessment, control activities, information and communication, and monitoring

39
Q

control environment

A

the tone of the organization, a tone of ethics and integrity will make fraud less likely, as well as the assignment of authority, and responsibility

40
Q

risk assessment

A

considering existing threats and the potential for additional risks and stands ready to respond should these events occur, steps,
1 identify the sources of risk, both internal and external
2. determine the impact of such risks in terms of finances and reputation
3. estimate the chances of such risks occurring
4. develop an action plan to reduce the impact and probability of these risks
5. execute the action plan and continue the cycle, beginning again with the first step

41
Q

control activities

A

the policies and procedures that help ensure that management directives are carried out and that management objectives are achieved, examples:

  1. authorization of transactions
  2. segregation of duties
  3. adequate records and documents
  4. security of assets and documents
  5. independent checks and reconciliation
42
Q

authorization

A

an approval or endorsement, from a responsible person in the department or organization that has been sanctioned by management

43
Q

general authorization

A

set of guidelines that allows transactions to be completed as long as they fall within established parameters

44
Q

specific authorization

A

that explicit authorization is needed for that single transaction to be completed

45
Q

segregation of duties

A

three parts should be separate, authorization, recording, and custody

46
Q

compensating control

A

lessens the risk of negative effects when other controls are lacking

47
Q

audit

A

presents verifiable information about the accuracy of accounting records

48
Q

independent checks

A

method to confirm the accuracy and completeness of data in the accounting system, examples,
reconciliation
comparison of physical assets with records
recalculation of amounts
analysis of reports
review of batch totals

49
Q

reconciliation

A

procedure that compares records from different sources

50
Q

batch total

A

summation of key items in the batch

51
Q

monitoring

A

ongoing review and evaluation of a system

52
Q

reasonable assurance

A

controls achieve a sensible balance of reducing risk when compared with the cost of the control

53
Q

Control objectives for IT(COBIT)

A

framework developed by the ISACA(information systems audit and control association)

54
Q

trust services principles

A

designed to be the written guidance for CPA’s who provide assurance services for organizations

55
Q

risk and controls in IT 5 categories

A
Security
Availability
Processing Integrity
Online Privacy
Confidentiallity