Chapter 7 Flashcards

1
Q

More than 60% of businesses each year experience a failure in controlling security and integrity of their computer systems. What are some reasons why organizations have not adequately protected data?

A
  • Some companies mistakenly view loss of crucial information as a DISTANT, UNLIKELY THREAT
  • Not all of the control implications of moving from centralized computer systems to internet-based systems are fully understood
  • Many companies do not realize information is a strategic resource, it must be a strategic REQUIREMENT
  • Productivity and cost pressures - these may be both timely and costly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Any potential adverse occurence (to the AIS) is considered a

A

threat, or event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Likelihood of a threat is the:

A

probability that it will happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Potential dollar loss from a threat is called

A

impact, or exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What control objectives are achieved (with reasonable assurance) when Internal controls are put in place?

A
  • SAFEGUARDING OF ASSETS, including preventing or detecting unauthorized acquisition, use, or disposition
  • MAINTAIN RECORDS, which provides sufficient detail for accuracy and fairness
  • Provides ACCURATE AND RELIABLE information
  • Encourages preparation of financial statements with ACCORDANCE to ESTABLISHED CRITERIA
  • Promotes and improves OPERATIONAL EFFICIENCY
  • Encourages ADHERENCE to policies of management
  • encourages COMPLIANCE with applicable laws and regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Control permeates an organization’s operating activities and is an integral part of management activities. Does it provide complete assurance?

A

No. It provides REASONABLE assurance. Complete assurance is difficult, expensive, and there are inherent limitations such as:

  • simple errors and mistakes
  • faulty judgement and decision-making
  • collusion
  • management overrides
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are detective controls?

A

Deisnged to DISCOVER control problems that were NOT PREVENTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The processes
and procedures implemented to
provide reasonable assurance
that control objectives are known as ____ ____

A

Internal Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When do preventive controls deter problems?

A

Preventive controls deters problems BEFORE THEY ARISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Controls that identify and correct problems as well as correct and recover from the resulting errors are known as

A

Corrective Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal controls are usually segregated into which two broad categories?

A
  1. General Controls

2. Application Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Harvard Business Professor Robert Simons has espoused four levels of control that helps management reconcile conflict between creativity and controls. What are they?

A
  1. Belief system
  2. Boundary system
  3. Diagnostic control system
  4. Interactive control system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internal controls are performing three important functions. What are they?

A
  • Preventive Controls
  • Detective Controls
  • Corrective Controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security, IT infrastructure, maintenance controls, and software acquisition are an example of which type of broad category of Internal Controls?

A

General Controls - Make sure the organization’s information system and control environment is stable and well-managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the Boundary system

A

This helps employees act ethically by setting BOUNDARIES ON EMPLOYEE BEHAVIOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One wants to implement control but not tell employees exactly what they have to do. What should they do?

A

Create a Boundary System that implements a minimum performance standard. This encourages creativity to solve problems while meeting customer needs. It could also shun off-limit activities, a preventive control avoiding actions that may damage company reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define the belief system component of control

A

A Belief System is how a company:

  • Creates Value
  • Helps employees understand management’s vision
  • Communicates company core values
  • Inspires employees to live by expressed values
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Controls that prevent, detect, and correct transactional errors and fraud in application programs are which type of category of internal control?

A

Application control. These are concerned with:

  • Validity
  • Accuracy
  • Completeness
  • Authorization of all data entered/processed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which system (from Robert Simon) measures, monitors, and compares actual company progress to budgets and performance goals?

A

Diagnostic control system. an example is feedback, which may help management adjust and fine-tune inputs and processes so future outputs more closely match goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which act requires all publicly owned corporations to maintain a system of internal accounting controls?

A

FCPA - Foreign Corrupt Practices Act. The main purpose of the FCPA was to prevent companies from bribing foreign officials to obtain business. Unfortunately, this wasnt sufficient enough to cover all the problems related to internal control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data of which system (from Robert Simon) is often interpreted and discussed in face-to-face meetings of superiors, subordinates, and peers?

A

Interactive Control System. These help managers to focus employee attention on key strategic issues and to be more involved in decision-making

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe Sarbanes Oxley

A

An act passed in 2002 in response to large accounting frauds. Its intended to make financial reports more transparent, provide investor protection, strengthen internal controls at public companies, and punish executives who carry out fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of the PCAOB?

A

5 people appointed by the SEC. Controls the auditing profession

Sets and Enforces:

  • Auditing and other auditing standards
  • Quality Control
  • Indepencence
  • Ethics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

According to SOX,where must auditors report specific information, such as critical accounting policies and practices?

A

Audit commitee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does SOX do?
- Created PCAOB - New rules for Auditors - New roles for audit committees - New rules for management - New internal control requirements
26
What must management do according to mandates by the SEC?
- Base its evaluation on a RECOGNIZED CONTROL FRAMEWORK - DISCLOSE all MATERIAL Internal Control WEAKNESSES - Conclude that a company does NOT have effective financial reporting internal control if there are MATERIAL WEAKNESSES
27
Provide an example of top management conflict with regards to performing audit services according to SOX
Acc to p 191 of text, "Audit firms cannot provide services to companies if top management was employed by the auditing firm and worked on the company’s audit in the preceding 12 months"
28
According to SOX, would a firm that performs information systems design and implementation for a company be able to also perform an audit of the same company?
No. Sox prohibits auditors from doing certain nonaudit services.
29
A weak or deficient internal environment could result in
breakdonws in risk management and control. The Internal Environemnt is essentially the same thing as the "control environment" in the IC framework.
30
An internal environment consists of what?
1. Management's philosophy 2. Commitment to integrity, ethical values, and competence 3. Internal control oversight by BOD 4. Organizational structure 5. Methods of assigning authority and responsibility 6. Human resource standards that attract, develop, and retain competent individuals 7. external influences
31
One seeking guidance for Internal Control can refer to the ?
"Internal Control - Integrated Framework" of COSO. Widely accepted as the authority on internal controls. The framework is usually incorporated into policies, rules, and regulations used to control business activities
32
The more responsible the philosophy and strategy of management, along with the operating style and risk appetite, the more likely employees will behave responsibly. What questions may be asked to assess this?
●Does management take undue business risks to achieve its objectives, or does it assess potential risks and rewards prior to acting? ●Does management manipulate performance measures, such as net income, so they are seen in a more favorable light? ●Does management pressure employees to achieve results regardless of the methods, or does it demand ethical behavior? In other words, do the ends justify the means?
33
The second framework made by COSO to improve risk management is called
Enterrise Risk Management (ERM). Process the BOD and management would use to set strategy, identify events that affect the entity, assess risk, and provide reasonable assurance that company is achieving goals.
34
Amount of risk willing to be accepted by a company to achieve their goals is the
risk appetite
35
Five basic principles of ERM
1. Companies are formed to create value for their owners 2. Management must decide how much uncertainty would be accepted as it creates value 3. Uncertainty results in risk, possibility something negatively affects ability to create or preserve revenue 4. Uncertainty also results in opportunity, possibility something positively affects ability to create or preserve value 5. Thus, ERM framework can manage uncertainty as well as create and preserve value.
36
What is the internal environment?
Company culture. influences how strategies and objectives are established, structures business activities, and identifes/responds to risk.
37
SEE p. 196 for ERM figure
p. 196
38
According to SOX, public companies must have an audit committee of outside, independent directors. These are responsible for what?
- Financial reporting - Regulatory compliance - internal control - and hiring and overseeing internal and external auditors.
39
Commitment to integrity, ethical values, and competence begins at the top. Companies can endorse integirty by (2 of 2)
- Developing a written code of conduct. Companies should document that employees ahve rad and understand the code of conduct so employees know right-from-wrong, rather than relying on expediency which may lead them to dishonesty - Requiring employees to report dishonest or nillegal acts. Employees should be dismissed and prosecuted to show that such behavior is not allowed
40
the organizational structure provides a framework for planning, executing, controlling, and monitoring operations. Important aspects of the organizational structure are:
- Centralization or decentralization of authority - Direct or matrix reporting relationship - Organization by industry, product line, location, or marketing networjk - Allocation of responsibility affects information requirements - Organization and lines of authoirty for accounting, auditing,and IS functions - sizen and nature of company activities.
41
Commitment to integrity, ethical values, and competence begins at the top. Companies can also endorse integirty by (1 of 2)
- Actively teaching and requiring it (making clear honest reports are more important than favorable ones, for example) - Avoiding unrealistic expectations or incentives that motivate dishonest or illegal acts (overly aggressive sales practices, unfair or unethica negotitaton tactics, or bonuses excessively based on reported financial results) - Consistently rewarding honesty and giving verbal labels to certain types of behaviors
42
Give an example of how a complex, unclear oeganizationa structure can indicate serious problems
it can hide fraud. For example, ESM used a multi-layered organizational structure to hide b300 million in fraud.
43
What could be used as a guide for authority and responsibility for employees?
Job descriptions, employee training, operating schedules, budgets, code of conduct, but especially the written policies and procedures
44
Who should be responsible for assignting authority and responsibily, as well as holding those individuals accountable for achieving or not achieving goals?
Management. It is especially omportant to identify who is responsible for company's information security policy.
45
Policy and Procedures manual is what?
Explains proper business activities, descirbes needed knwoelege and experience, explaines document procuderes, how to handle transactions, and lists out resources prvided to carry out specific duties. Helpful on-the-job reference
46
One of the greatest control strengths is employee ____. Reciprocally, one of the greatest control weaknesses is ___ of employees. Hint: think HR
Honesty / Dishonesty
47
What must HR think about when hiring employees?
Hiring employees based on factors like educational background, experience, achievements, honesty, integrity, and whether job requirements are met. This also goes for people like cleaning crews and temps (fraudsters can pose of these to gain physical access to things like computers)
48
Applicant qualifications can be evaluated using resumes, reference letters, interviews, and background checks. What are background checks?
Talking to references, checking criminal records, and verifying work or education experience. People who fail to do this could employ someone who actually may be a criminal and embezzle funds. Background check specialists can be use to validate bogus education sites or to detect applicants who used hackers to enter fake data into university databases
49
What should HR consider when thinking about compensating, evaluating, and promoting employees?
Poorly compensated employees are more likely to feel resentment. Financial pressures from things like this can motivate fraud. Fair pay and appropriate bonuses can hep motivate performance, and promotions should be based on performance and qualifitication. Periodic performance appraisals should be given so employees know weaknesses and strengths
50
HR considerations in regards to training employees?
programs shpuld be taught to teach responsibilites, expected levels of performance, as well as culture and norms.
51
examples of hr training programs
Informal or formal discussions and meeting, issuing periodic memos, distributing written guidelines and codes of conduct/ethics, circulations reports of unethical behavior and its consequences, and promoting security and fraud trainign programs
52
What can HR do to make fraud less likely to occur?
Fraud is less liekly to occur when employees recognize the need to report it. Such a culture of employees believing security is everyone's business must be taught and practiced. In addition, the conseuquences of unwanted behavior should be taught and reinforced.
53
Who are disgruntled employees and how may they be managed?
Some disgruntled employees that may be seeking reeinge for a perceived wrong. Thus, they perpetrate fraud or sabotage systems. HR needs procedures to identify these employees, help them resolve their feelings, or remove them from sensitive jobs. Not easy as employees may fear that admitting these feelings may have bad consequences
54
Why is most fraud not reported or prosecuted?
1. PR disaster (could also attract more hackers) 2. Law Enforcement (LE)/ courts are busy with violent crimes 3. difficult, costly, and time-consuming 4. Many LE/Judges do not ahve computer skills needed to instigate and prosecute cybercrimes 5. Fraud sentences light.
55
Why is it important to especially have increased control activities around holiday time the end of the year?
(1) extended employee vacations mean that there are fewer people to “mind the store”; (2) students are out of school and have more time on their hands; and (3) lonely counterculture hackers increase their attacks.
56
What is fidelity bond insurance?
protects companies from acts of deliberate frauds
57
Differences between Risk Assessment and Risk Response?
basis. Inherent risk is the susceptibility of a set of accounts or transactions to significant control problems in the absence of internal control. Residual risk is the risk that remains after management implements internal controls or some other response to risk. Companies should assess inherent risk, develop a response, and then assess residual risk.
58
What are the one of four ways management can respond to risk?
●Reduce. Reduce the likelihood and impact of risk by implementing an effective system of internal controls. ●Accept. Accept the likelihood and impact of the risk. ●Share. Share risk or transfer it to someone else by buying insurance, outsourcing an activity, or entering into hedging transactions. ●Avoid. Avoid risk by not engaging in the activity that produces the risk. This may require the company to sell a division, exit a product line, or not expand as anticipated.
59
Differences between preventive, detective, and corrective controls?
Preventive controls are usually superior to detective controls. When preventive controls fail, detective controls are essential for discovering the problem. Corrective controls help recover from any problems. A good internal control system should employ all three.
60
Difference between specific and general authorization.
``` Specific "- Special approval an employee needs in order to be allowed to handle a transaction. eg - anything +500k must be approved. The authorization given employees to handle routine transactions without special approval. ```
61
Segregation of accounting duties is achiev when which of the following functions are seperated?
Authorization/recording/and custdy (handiling of cash and assets/writing checks)
62
See figure 7-5 p 206
p 206
63
Three types of accounts that are most manipulative
1. Revenue 2. Inventory 3. A/R
64
Substantive testing is used to
test internal controls
65
inherent risk is
risk in place before any internal controls are implemented
66
5000 is transaction amount where things tend to get valuable (in this example). Anything under 5000 has ___ authorization. Anything over 5000 has ____ authorization
general / specific