Exam 1 Flashcards
an intentional act where the intent is to destroy a system or some of its components
sabotage
a text file created by Web site and stored on a visitor’s hard drive. Store information about who the user is and what the user has done on the site.
Cookie
Any and all means a person uses to gain an unfair advantage over another person
fraud
typically business people who commit fraud. Usually resort to trickery or cunning, and their crimes usually involve a violation of trust or confidence
White-collar criminals
dishonest conduct by those in power which often involves actions that are illegitimate, immoral, or incompatible with ethical standards. Examples include bribery and bid rigging.
Corruption
Misrepresenting or leaving out facts in order to promote and investment that promises fantastic profits with little or no risk. Examples include Ponzi schemes and securities fraud
investment fraud
theft of company assets by employees
misappropriation of assets
intentional or reckless conduct, whether by act or omission, that results in materially misleading financial statements.
fraudulent financial reporting
pressure, rationalization, and opportunity
fraud triangle
a person’s incentive or motivation for committing fraud; could be financial, lifestyle, or emotional. Also management characteristics, industry conditions, and financial can lead to financial statement fraud
pressure
the condition or situation that allows a person or organization to commit and conceal a dishonest act and convert it to personal gain. Commit, conceal, and convert
opportunity
concealing the theft of cash by means of a series of delays in posting collection to accounts receivable
lapping
creating cash using the lag between the time a check is deposited and the time it clears the bank.
check kiting
the excuse that fraud perpetrators use to justify their illegal behaviors. Ex. “I’m only borrowing it,” “The company owes me, I am only taking what is rightfully mine.”
rationalization
any type of fraud that requires computer technology to perpetrate
computer fraud
easiest type of computer fraud, involves falsifying or altering computer input
input fraud
includes unauthorized system use, including the theft of computer time and services
processor fraud
includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity
computer instructions fraud
illegally using, copying, browsing, searching, or harming computer data
data fraud
displayed or printed output that is stolen or copied or misused
output fraud
controls that deter problems before they arise.
preventive controls
controls designed to discover control problems that were not prevented
detective controls
controls that identify and correct problems as well as correct and recover from the resulting errors.
corrective controls
controls designed to make sure tan organization’s information system and control environment is stable and well managed.
general controls
controls that prevent, detect, and correct transaction errors and fraud in application programs
application controls
system that describes how a company creates value, helps employees understand management’s vision, communicates company core values, and inspires employees to live by those values
belief system
system that helps employees act ethically by setting boundaries on employee behavior
boundary system
system that measures, monitors, and compares actual company progress to budgets and performance goals.
diagnostic control system
system that helps managers to focus subordinates’ attention on key strategic issues and to be more involved in their decisions
interactive control system
a security and control framework that allows (1) management to benchmark the security and control practices of IT environments, (2) users of IT services to be assured that adequate security and control exist, (3) auditors to substantiate their internal control opinions and advise on it security and control matters.
Control Objectives for information and related technology (COBIT)
includes Control Environment, Risk assessment, control activities, information and communication, and monitoring as guidance for evaluating and enhancing internal control systems
Committee of Sponsoring Organizations (Coso) Internal Control-Integrated framework
Includes Internal environment, objective setting, event identification, risk assessment, risk response, control activities, information and communication, and monitoring as guidance for evaluating and enhancing internal control systems
Enterprise Risk Management framework (ERM)
The company culture that is the foundation for all other ERM components as it influences how organizations establish strategies and objectives; structure business activities and identify, assess, and respond to risk.
internal environment
the amount of risk a company is willing to accept to achieve its goals and objectives, To avoid undue risk, risk appetite must be in alignment with company strategy
Risk appetite
the outside, independent board of director members responsible for financial reporting, regulatory compliance, internal control, and hiring and overseeing internal and external auditors
audit commitee
a document that explains proper business practices, describes needed knowledge and experience, explains document procedures, explains how to handle transactions, and lists the resources provided to carry out specific duties
policy and procedures manual
an investigation of a prospective or current employee that involves verifying their educational and work experience, talking to references, checking for a criminal record or credit problems, and examining other publicly available information
background check
high level goals that are aligned with and support the company’s mission and create shareholder value
strategic objectives
objectives that deal with the effectiveness and efficiency of company operations and determine how to allocate resources
operations objectives
objectives to help ensure the accuracy, completeness, and reliability of company reports; improve decision making; and monitor company activities and performance
reporting objectives
objectives to help the company comply with all applicable laws and regulations
compliance objectives
a positive or negative incident or occurrence from internal or external sources that affects the implementation of strategy or the achievement of objectives.
event
the susceptibility of a set of accounts or transactions to significant control problems in the absence of internal control
inherent risk
the risk that remains after management implements internal controls or some other response to risk
residual risk
Impact x likelihood= . . .
the product of the potential dollar loss that would occur should a threat become a reality and the risk or probability that the threat will occur
Expected loss
policies, procedures and rules that provide reasonable assurance that control objectives are met and risk responses are carried out
control activities
separating the accounting functions of authorization, custody, and recording to minimize an employee’s ability to commit fraud
segregation of duties
cooperation of two or more people in an effort to thwart internal controls
collusion
employing multiple layers of controls to avoid a single point failure
defense-in-depth