IS 414 CH. 16 (System and Threats) Flashcards
G/L and Reporting System
Update G/L
Post Adjusting entries
prepare financial statements
produce managerial reports
Update G/L
updating consists of posting journal entries that originate from two sources:
accounting subsystem
treasurer (non routine transactions: issuance of retirement of debt, etc)
Update G/L threats
- Inaccurate updating of general ledger
- 1 Data entry processing integrity controls
- 2 Reconciliation and control reports
- 3 Audit trails creation and review
- Unauthorized journal entries
- 1 Access controls
- 2 Reconciliations and control reports
- 3 Audit trail creation and review
Posting Adjusting entries
originate from controllers office and fall into 5 categories: accruals deferrals estimates revaluations corrections
accruals
entries made at the end of the accounting period to reflect events that have OCCURRED but for which cash HAS NOT YET BEEN RECEIVED
ex: interest revenue and wages payable
deferrals
entries made at the end of the accounting period to reflect the exchange of cash prior to performance of the related event
ex: prepaid rent, insurance, interest
estimates
entries that reflect a portion of expenses expected to occur over a number of accounting periods
ex: depreciation, bad debt
revaluations
entries made to reflect either differences between the actual and recorded value of an asset or a change in accounting principle
ex: change in method in counting inventory, reducing value of inventory to reflect obsollescence, or adjusting inventory records to reflect the results noted during a physical count of inventory
corrections
entries made to counteract the effects of error found in the general ledger.
post adjusting entries threats
- Inaccurate adjusting entries
- 1 Data entry processing integrity controls
- 2 spreadsheet error protection controls
- 3 standard adjusting entries
- 4 reconcilations and control reports
- 5 audit trail creation and review
- Unauthorized adjusting entries
- 1 Access controls
- 2 reconcilations and control reports
- 3 audit trail creation and review
prepare financial statement threats
- Inaccurate financial statements
- 1 Processing integrity controls
- 2 Use of packaged software
- 3 training and experience in applying IFRS and XBRL
- 4 audits
- Fraudulent financial reporting
- 1 audits
Product managerial report threats
- Poorly designed reports and graphs
- 1 Responsibility accounting
- 2 Balanced scorecard
- 3 Training on proper graph design