Information Technology Flashcards
What is one of the most important compensating controls in a small business?
Engaging the owner in activities - the owner should have direct participation in business activities, including financial record keeping.
What does Automated Transaction Processing result in?
Uniformity of transactions
Which system needs a greater level of controls - manual or automated?
Manual
Computer processing virtually eliminates the occurrence of what?
Computational error normally associated with manual processing.
What are six risks that are still faced despite switching from a manual to an automated system?
- Faulty programs
- Unauthorized access
- Unauthorized changes
- Failure to update the system
- Manual intervention
- Data loss
What are the 3 main areas of the COBIT Framework?
- Domains and Processes
- Information Criteria
- IT Resources
What are the 4 domains that encompass the domains and processes of the COBIT Framework?
- Planning and organization
- Acquisition and implementation
- Delivery and support
- Monitoring
What makes up the information criteria of the COBIT framework?
- Effectiveness
- Efficiency
- Confidentiality
- Integrity
- Availability
- Compliance
- Reliability
What makes up the IT resources of the COBIT framework?
- People
- Applications
- Technology
- Facilities
- Data
What is something that a firm may not be too concerned about when enhancing IT?
Cutting costs
What are important goals of an ERP system?
Improving responsiveness and flexibility and aiding int he decision making process in an organization
Define the ERP system:
Provides transaction process, management support, and decision making support in a single, integrated package.
What do ERP’s attempt to eliminate?
Many of the problems faced by organizations when they attempted to consolidate information from operations into multiple departments, regions and divisions
What is scalability?
Capacity of a system to grow with the information processing needs of an organization.
What is SaaS?
Use of the cloud to use and access software.
What is PaaS?
Use of the cloud to create software.
What is IaaS?
Use of the cloud to access virtual software.
What is an online analytical processing system (OLAP)?
Incorporates data warehouses and data mining capabilities with ERP. It primarily provides an integrated view of transactions in all parts f the system.
What is an online transaction processing system (OLTP)?
Records day to day operation transactions and enhances visibility of these transactions throughout the system. It is primarily concerned with collecting data (and not analyzing it) across the organization.
According to COSO, evaluating the quality and nature of IT department staff trainings demonstrates what?
A commitment to retain competent individuals in alignment with objectives.
What is the problem with a programmer who writes applications for a firm but also has access to the file library (aka the archives?
She has the capability to change both live and archived copies of programs, and the changes may not be detected.
Coding approved changes to a payroll program is an appropriate responsibility for who?
An application programer
A company that sells hand carve statues from rural Indonesia online is using what to sell their product?
Product differentiation - competitors are unlikely able to sell the same product.
How can IT influence product differentiation?
- Use the internet as a distribution channel
- IT can improve quality and can create differentiation through the use of lasers and 3D printers
- Products are increasingly digitized. So quality is better but the costs are lower.
- Info on the internet can be updated faster than catalogues - product cycles are shorter and the evolution of products is faster that allows for differentiation.
How can IT influence cost leadership?
- Reduce costs, improves efficiency of production and delivery systems
- Intense price completion due to the internet being available to almost everyone. So because of this, there could be shifts away from low cost to produce differentiation instead.
What is MIS?
Management information system. Supports routine management problems.
What is AIS?
Accounting Information System and is the subset of MIS. It pulls financial data from transaction processing systems to create financial statements and management control reports (I..e A/R agin). Yardi is an AIS.
What is DSS?
Decision Support Systems - provides info to managers to assist in managing non-routine issues and LT planning
What is an ESS?
Executive Support System - subset of DSS that are especially designed for forecasting and making long range strategic decisions, and they place greater emphasis on external data.
What has the greatest impact on the decisions of an effective management reporting system?
The types of decisions that need to be made
Petco has a system that examines large sets of data to determine patterns in client’s use of facilities. What is this an example of?
DSS
BOD of manufacturing Co. is considering whether to expand manufacturing facilities to include a produce line Board is using both internal and external information concerning economic conditions, market projects for new product, cost of L/T financing alternatives and info about potential new competitors. What is this an example of?
ESS
For CPA purposes, flat file systems are?
Bad/antiquated.
For CPA purposes, database systems are?
Good
What is a data warehouse?
Archive of an organizations operational transactions (sales, purchases, production, payroll) over a period of years
Can external data be included in data warehouses?
Yes, external data that might be correlated with these transactions, such as economic indicators, stock prices, and exchange rates, is included.
What is data mining?
process of performing statistical analysis and automatically searching for patterns in large volumes of data
What is a data mart?
specialized version of a data warehouse that contains data that is pre-configured to meet the needs of specific departments.
RJ is reading an online summary production cost report and wants to known why the use of hammers used in construction of buildings is so high. What does he need to do?
Drill down. Which means he needs to move from summary to detailed information to determine its cause.
Database management software is considered both software and?
Midaleware
Customer #, Customer Name, Customer Phone, Customer Contract, Customer Credit Limit are all examples of:
Fields - also known as attributes
Order data elements:
Files are composed of:
Records: are composed of:
Fields: are composed of
Data Values: are composed of
Bytes (characters) are composted of:
Bits: smallest element of storage in computer system
Why are microcomputers more cost effective than mainframes for data entry and presentation?
Microcomputers are better suited to frequent screen updating and graphical user interfaces.
What does a optical disc recorder use to burn data?
A laser
What are a few characteristics of solid state storage?
Not a ton of storage, but has great security
What is RAM?
Random access memory - temporary data store
What are magnetic discs?
efficient way to store and retrieve individual records (secondary storage)
What is ROM?
Read only memory - permanently store data needed to power on computer
What is a CPU?
central processing uint - control center of the computer system and had 2 d principal components.
What is OLRT?
online real time system - example would be what is use for airline reservations.
What are master files?
Computerized counter part of ledgers found in manual systems.
What do master files do?
They maintain balances by accounts (financial statement accounts, customer accounts, vendor accounts, etc) they perform the same function as ledgers (and subsidiary ledgers) do in manual systems.
What will speed up the adoption of automated authentication?
Adoption of loT.
What is a reason for a retailer in particular to want to adopt a new payment system?
Reduce abandonment rates. Abandonment is the rate at which customers abandon purchases at check out.
When a firm uses data on the strength of a user’s touch on a keyboard to partially authenticate users, it is using what type of authentication?
Multifactor authentication. The key word here is partially. Although this is a biometric authentication.. this is only a portion of the authentication.
What are HMDs?
Attach sensors to glasses or helmets and are therefore a type of loT device.
Automating security system changes internal controls control over access to systems is part of what?
Accounting controls
What are a few examples of what you can use HMDs for?
- Real time system monitoring
- Visualizing
- Video conferencing
What is Big Data?
Creation, analysis, storage, and dissemination of extremely large data sets. It is possible now because of technologies like cloud data. It also changes a company’s risk profile.
What is dark data?
Underused data.
What is loT?
“Internet f Things” and is also an example of big data.
What are some examples of Big Data?
Dark data, multifactor identification data, video conferencing data.
Is sales data big data?
It’s a traditional data source.
What are some benefits of big data?
- Target marketing
- Improved system monitoring
- Better compliance
Are IT Cost Savings a benefit of big data?
No, big data projects are expensive and therefore IT cost savings from big data are unlikely.
What are some roles for accountants in big data?
- Assessing quality and integrity of big data
- Integrating big data into evolutions of internal control
- Data scientists
*They do not hold the responsibility for building them
What relationship does big data have with existing data warehouses?
Big Data uses existing data warehouses, but data warehousing is not a direct enabler of big data.
What are some enablers of big data?
Analytics, dark data, loT
Describe what a bitcoin is.
It is an intangible asset. It has value but no physical form. It is a form of electronic cash. The IRS taxes it as property. It is decentralized and not under the control of the government.
What type of network does bitcoin have?
Peer-to-peer network
Is bitcoin susceptible to fraud?
Yes - particularly the Ponzi scheme.
Describe what a block chain is.
It is a decentralized, distributed ledger. It is a non-modifiable audit trail of transactions. Everyone in the peer to peer “network” can always log, view and confirm. It is an electronic file that consists of blocks.
Which component of the COSO framework is Blockchain a powerful example of?
Continuous monitoring. Blockchain is an excellent example of new technology that enables continuous monitoring of the accounting system.
What is an important outmode of the use of blockchain?
Reduced auditing and compliance costs are an important outcome of the use of blockchain. Since the accounting transaction are stored on an automated, secured network, then auditing and compliance costs should go down.
Provide a short description of AI technologies.
Include reasoning and judgement abilities that do not exist in most applications. It can be biased.
What is an example of AI technology?
IBM’s Watson system. It is used by KPMG to generate predictive analytics that help clients identify and manage F/S risk.
What does AI depend heavily on?
Fast computers and big data.
What is a goal of AI?
Machine learning.
What are some risks of AI?
Confirmation bias, privacy issues, prediction bias.
Is AI used when preparing F/S?
Preparing F/S is a standardized task that is least likely to be mostly automated into the AI system.
What are some examples of Accounting work with AI?
- Working w/ an AI to harvest and clean data for use in predicting fraud risk.
- Working on a legacy system with AI assistance, that is uneconomical to replace with AI technology
- Develop and AI system to analyze the risk of investing in the extraction industry.
How should management assess cyber risk?
Management must know and understand which systems are critical to organizational objectives an understand which systems are most valuable to the organization.
When it comes to assessing cyber risk, who should lead the initiative?
SR management should lead the initiative and collage with business and IT stakeholders.
Why must you understand the industry when assessing cyber risk?
Because cyber criminals often engineer industry specific attacks.
Who should be notified first about cyber breaches?
The entity’s external auditors.
What types of controls can an entity manage cyber risks?
Should attempt to prevent cyber breaching with preventative controls but also address those that occur through detect and corrective controls.
What are the 5 functions of the framework for cyber security?
- Identify
- Protect
- Detect
- Respond
- Recover
What are the subcategories of the framework for cyber security?
- Identify and catalog external information systems
- Protect data at rest
- Investigate notifications from detection systems.
What are the 4 implementation tiers?
Tier 1 - Partial
Tier 2 - Risk informed
Tier 3 - Repeatable
Tier 4 - Adaptive
Firm is reviewing its cyber security to explore its current state and related risks as part of establishing a high level objectives for cybersecurity. In the framework of cyber security, this is an example of?
The element categories and the function identify. The organization is exploring how is it doing? at a higher level related to cyber security. Function “identify” because the focus is on high level objectives and element is categories.
Are IT policies particularly important in decentralized or centralized companies?
Decentralized since IT services are likely to be less under the control of management.
What are the five IT security principals specified by the AICPA?
- Security
- Availability
- Processing Integrity
- Confidentiality
- Privacy
Which on of the five IT security principals specified by the AICPA is the foundation of systems reliability?
Security
Which one of the five IT security principals specified by the AICPA supports system availability for operations and monitoring?
Availability
Which one of the five IT security principals specified by AICPA is the completeness, validity, accuracy,y timeliness, and authorization of system processing?
Processing integrity
Which one of the five IT security principals is related to the collection, use, retention, disclosure, and disposal of personal info?
Privacy
What is defense in depth and provide an example?
Includes the implementation of multiple control layers. An example would be if an organization implements an integrated package of authentication controls related to critical systems.
Which one of the five IT security principals concerned when confidential information is protected consistently with the organization’s commitments and agreements?
Confidentiality