Fraud Risk Management Quiz Notes Flashcards
List the five fraud risk management principles in order (1-5)?
- Establishing fraud risk management program (Control Environment)
- Perform a comprehensive fraud risk assessment (risk assessment)
- Select, developing, and deploying fraud controls (Control Activities)
- Establish a communication program to obtain information about potential frauds (information & communication)
- Select, developing, and deploying evaluation and monitoring processes (monitoring)
What are some things that mitigates management override of controls?
- Effective internal auditor function
- Corporate culture with integrity & ethical values
- Effective & anonymous whistleblower program
What are some things that constitute corruption & illegal acts?
Bribes & kickbacks
What are the four categories of fraud risk and provide an explanation for each?
- Reporting fraud: financial - Intentional misstatement of accounting information
- Reporting fraud: non-financial - Manipulating and falsifying non-financial reports
- Misappropriation of assets - Theft or misuse of tangible/intangible assets
- Illegal acts & corruption - Bribes, kickbacks, gratuities, etc.
When company discourages employees from sharing computer passwords, what fraud management principle is impacted?
Principle #3 (Control Activities). This relates to a specific fraud risk control.
When a company uses a fraud risk heat map for fraud risk assessment, which principle is impacted?
Principle #2 (Risk Assessment)
When employees report suspected improprieties, which principle is impacted?
Principle #4 (Information & Communication)
When present with a question where you need to determine the appropriate fraud risk principle, what is the best thing to think of when solving these?
Think of five COSO internal control principles because each of these is related to one of the fraud management principles.
What are the five steps in a data analytics plan in order & provide an brief explanation for each?
- Analytics Design - Assess fraud risk, map risks to data sources, create work plan (determining the risk)
- Data Collection - Map data to planned analytics test (screen & validate data)
- Data organization & calculation - Execute work plan, adapt analytics to available data. Text mining & statistical analysis.
- Data Analysis - Evaluate analytics results. Implement scoring models to prioritize risks. Adapt & tune model to improve relevance of results
- Findings, observations, and remediation - Request supporting documentation, determining triage/escalation procedures.