Lecture 7 - Control, Fraud & ERM Flashcards

1
Q

(!) Describe the importance of a code of ethics

A

Benefits:
- Kind of internal control
- Employee values differ: Eg. Culture
- Promote ethical behavior
- Help decide right & wrong
- Eg. AICPA, ISACA, IIA, IMA

International Ethics Standards Board for Accountants / IESBA:
- Integrity
- Objectivity
- Prof. competence & due care
- Confidentiality
- Professional Behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe Eurosox

A

General
- Control regulatory parameters in firm

Key revisions:
- ​Board members collectively responsible for financial statements & key non-financial info
​- Make transactions w. parties more transparent
​- Full info on off-balance-sheet arrangements
​- Issue annual corporate governance statement

​Synopsis of responsibilities & requirements of directives:
​1. Assure effective corporate governance, internal controls & risk management
​2. Measures safeguarding shareholders’ investments
​3. Increased financial disclosure req.
​4. Establish audit committees
​5. Improved corporate governance standards & codex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(!) Describe corporate governance, what it promotes & its principles

A

General:
- Processes & policies to manage firm ethically
- In- & external control to safeguard stakeholders interests
- Comply & explain approach: Soft law

Promotes:
- Accountability
- Fairness
- Transparency

Principles:
1. Interact w. shareholders, investors & other stakeholders
2. Duties & responsibilities of board of directors
3. Composition, organization & evaluation of board of directors
4. Remuneration of management
5. Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(!) Describe internal control & the internal control shield

A

General:
- Process of ongoing tasks & activities: Means to end
- Affected by people: All lvls
- Reasonable > Absolute assurance
- Seek one or more objectives: Separate yet categories overlap
- Adapt to entity structure

____________

Internal control shield:

General:
- Prevent, detect & correct fraud & unintentional errors
- Implement by management & board of directors

Objectives:
- Safeguard assets
- Encourage following policies
- Promote operational efficiency
- Ensure accurate, reliable records
- Comply w. legal req.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(!) Describe the three lines of defense

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(!) Describe the different control concepts

A

General:

Preventive control:
- Before problem occur
- Stop desirable events
- Authorization
- Ref. Encryption
- Eg. Sign document

Detective control:
- Discover problem
- When not prevented
- Eg. Monthly trial balance

Corrective control:
- Recover identified problem
- Eg. Back-up file

___________

Computerized environment:

General control:
- Firm-wide problems
- Eg. Control over accessing network
- Eg. Develop & maintain application
- Eg. Document program changes

Application controls:
- Subsystem or application specific
- Eg. Customer account nr.

Ensure transaction:
- Validity
- Completeness
- Accuracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(!) Describe COSO in general

A

General
- COSO = Committee of sponsoring orgs.
- Autority on internal cont.
- Improve financial reporting
- Evaluate, report & improve internal cont.
- Address environment changes
- Address stakeholder expectations
- Widely accepted

Elements:
- Accountability
- Effective controls
- Risk management
- Corporate governance
- Fraud detection

Achievement of objectives:
- Effective & efficient operations
- Reliability of reporting
- Compliance w. laws & regulations

COSO ERM:
- Expand internal cont. framework
- Risk-based approach
- Align mission & risk appetite
- Max. firm value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe elements of the old COSO Internal control framework

A

Objectives for effective internal cont. system:

Operations:
- Effective
- Efficient

Reporting:
- In- & external reliability

Compliance:
- W. laws & regulations

_____________

Components to support achieving objectives:

Control environment:

General:
- Management philosophy
- Operating style
- Organize structure
- Methods of assigning authority & responsibility
- HR standards

Steps:
- Commitment to integrity & ethical values
- Board has independent overview over dev. & perf. of internal cont.
- Management establish structure, authority & responsibility
- Firm demonstrate commitment to attract, dev. & retain competence
- Firm enhance accountability to objectives

__________

Risk assessment:

General:
- Likelihood & impact
- Understand extend poss. event affect objectives

Steps:
- Specify suitable objectives to identify risk
- Identify & analyze risk: How to manage?
- Assess fraud in risk to achieve objectives
- Identify & analyze changes w. significant impact on internal cont.

___________

Control activities:

General:
- Ensure objectives achieved & risk mitigation strategies carried out
- In all levels & functions

Steps:
- Firm select & dev. cont. activities: Mitigate risk
- Select & dev. general cont. over tech
- Deploy cont. activities by policies: By procedures

___________

Info & communication:

General:
- Support other functions
- Ensure info flow: Up, down & across firm

Steps:
- Use quality info
- Comm. internally: Objectives & responsibility
- Comm. externally: Customers, suppliers, regulators & shareholders

Monitoring activities:

General:
- By management
- Ongoing basis
- Evaluate findings
- Deficiencies must be communicated timely
- Needed modifications should be made: Improve processes & internal cont. system

Steps:
- Ongoing evaluation of internal cont. are present & functions
- Evaluate & communicate what misses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(!) Describe the new COSO ERM framework

A

General:
- Enterprise risk management
- Approach to objectives: Risk > Control
- Broader view on risk management
- Process affected by board, management & other personnel
- Try max. firm value
- Identify affecting event
- Act within risk appetite
- Reasonable ensure achieving objectives

___________

New to this model:
- Strategic
- Objective setting

___________

Categories:

Strategic:
- High lvl goals
- Align to & support mission & vision

Operations:
- Also in old
- Effective
- Efficient

Reporting:
- Also in old
- In- & external reliability

Compliance:
- Also in old
- W. Laws & regulations

___________

Components:

Internal environment:
- Tone in firm
- Risk conciousness
- Risk view
- Risk handling
- Risk appetite
- HR policies
- Competence commitment
- Training
- Responsibility

Objective setting:
- Set at strategic lvl.
- Basis for operations, reporting & compliance
- Support & align w. mission
- Should align w. risk appetite

Event identification:
- In-& external threats & opportunities

Risk assessment:
- See other card

Risk response:
- Actions align w. risk appetite & tolerance
- 1. Reducing
- 2. Sharing
- 3. Avoiding
- 4. Accepting

Control activities:
- See other card

Info & communication:
- See other card

Monitoring:
- Evaluate quality of internal cont.
- Lacks reported to TM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(!) Describe risk appetite

A
  • Accepted risk amount to pursuit mission & vision
  • Boundary for strategy to achieve goals
  • Multiple risk appetite statements
  • Eg. Green, yellow & red
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(!) Describe event identification & key management questions

A

General:
- In- or external events poss. affect achieving obj.
- Distinguish btw. risk & opportunity
- Opportunity = Strategy & obj.
- Risk = Future

Key management questions:
- What could go wrong?
- How can it go wrong?
- What is the potential harm?
- What can be done about it?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(!) Describe risk assessment & risk types

A

General:
- Systematic identify & analyze risk
- Determine risk response & cont. activities
- Understand effect on objectives

____________

Types of risk:

Inherent risk:
- From firm activity
- Exist before plan to address it
- Eg. Competitors

Control risk:
- Errors not prevented, detected or corrected by internal cont. system

Residual risk:
- Inherent * Control risk
- Remaining risk
- Handled at last

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(!) Describe risk response & cost benefit analysis

A

General:
- Must align w. risk tolerance: Risk appetite & cost vs. benefit

  1. Reduce risk:
    - Design effective process
    - Internal cont. system
  2. Share risk:
    - Outsource process
    - Buy insurance
    - Enter hedge transaction
  3. Avoid risk:
    - Dont do risky activity
  4. Accept risk:
    - Allow likelihood & impact

___________

Process:
- 1. Identify risk
- 2. Estimate likelihood
- 3. Estimate impact: Eg. Lost kr.
- 4. Controls to lower risk
- 5. Estimate cost & benefits
- 6. Cost & benefit analysis
- 7. Choose risk response

__________

Cost-benefit analysis:
- Help determine if implement internal cont.
- Cost = Quantitative
- Benefit = Often qualitative
- Internal cont. benefit > Implementation cost
- CALC: Benefit = Impact * Decreased likelihood
- CALC: Benefit = Estimated risk impact * Decreased likelihood implement cont.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(!) Describe control activities

A

General:
- Based on risk assessment & response
- Actions to address risk

___________

Physical Controls:

General:
- Mainly manual: Could incl. physical computing tech

Examples:
- Authorize if valid transaction & activity
- Segregate duties to prevent fraud & mistakes
- Supervise to compensate imperfect duty segregation
- Accounting docs. & records to maintain audit trails
- Project dev. & acquisition controls
- Change management controls
- Design & use of documents & records
- Safeguard assets, records & data
- Independent performance checks

___________

IT controls:

___________

General:
- Assure info
- Help lower tech use risk

___________

IT general controls / ITGC:

General:
- Enterprise-lvl cont. over IT

IT control environment:
- Tone at top
- Form IT culture

Access controls:
- Restrict IT, programs & data access
- Authorize & segregate duty

Change management cont.:
- Authorized & document changes in programs
- Test before so no effect on system available & reliable

Project dev. & acquisition cont.:
- Ref. SDLC: System dev. LC
- Analysis, design, test, implement, evaluate project
- Formal method established

Computer operations controls:
- Antivirus
- Back-up
- Recovery
- Less downtime

_____________

IT application controls:

General:
- Specific for subsystem

Input controls:
- Authorize & verify data
- Eg. control matrix specify users access
- Eg. Field checks size, range, validity, completeness, reasonableness, digit verifications & closed- loop verifications

Processing controls:
- Ensure accurate process of transactions
- 1. Pre-numbered docs generated internal for no duplicates or missing
- 2. Sequence checks,
- 3. Batch totals
- Cross-footing balance tests
- Concurrent update controls

Output controls:
- Eg. Only required number of copies printed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe the COCO updated ERM framework from 2017

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(!) Describe the COBIT framework

A

General:
- COBIT = Control Obj. for Info & related tech
- Governance & management of firm IT
- Bridge gap btw. tech issues, cont. req. & firm risk
- Align IT & business
- Increase firm value
- Reduce firm risk
- Ensure ress. used responsible
- Define scope & ownership of IT process & control
- Provide common language
- Meet requirements
- Ensure objectives are met
- Align w. good practices & accepted standards
- Popular for IT governance & management

(??) Principles:
- 1. Meet stakeholder needs
- 2. Cover firm end-2-end
- 3. Apply single integrated framework
- 4. Enable holistic approach
- 5. Separate governance from management

__________

Business requirements:

Effectiveness:
- Relevant & timely info

Efficiency:
- Prod. economically

Confidentiality:
- Protect sensitive info

Integrity:
- Valid, accurate & complete info

Availability:
- Info when needed

Compliance:
- Comply w. laws & regulations

Reliability:
- Reliable for daily DM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

? Describe the governance system

A
18
Q

Describe performance management by COBIT 2019

A
19
Q

(!) Describe information technology infrastructure library / ITIL

A

General:
- Concepts & practices for IT service management
- IT service understanding business objectives
- Provide details to COBIT
- Lifecycle approach to IT services
- Standard in Europe
- Best practice
- Understand priorities

Categories:

Service Strategy / SS:
- Here we start
- Align IT-service & firm strategy
- Strategic planning of IT service management cap.
- Identify user & expectation

Service Design / SD:
- Design & dev. IT services & service management processes
- New & changed IT services
- Meet expectations cost-effective

Service Transition / ST:
- Ensure desired value
- Build, test & operate
- Realize req. of strategy design
- Maintain cap. for ongoing delivery of service
- Manage changes

Service Operation / SO:
- Effective & efficient delivery & support of services
- Benchmark: Event, incident, requests, problems & access
- Ongoing basis: Manage disruption fast
- Detect trends & problems

Continual Service Impr. / CSI:
- Ongoing impr. of service
- Measure process performance req. for service
- Efficiency & effectiveness

20
Q

(!) Describe the ISO 27000 series

A

General:
- Series of popular standard
- Address info security issues
- Model to establish, implement, operate, monitor, maintain & improve Info Security Management System (ISMS)
- Process approach

Major areas:
- Info security policies
- Organization of info security
- HR security
- Asset management
- Access control
- Cryptography
- Physical & environmental security
- Operations security
- Communications security
- System acquisition & maintenance
- Supplier relationships
- Security incident management
- Business continuity management
- Compliance

Steps to establish ISMS following ISO 27001/27002:
- See insert picture

21
Q

Compare ISO 27001 to ITIL

A

ISO 27001:
- International standard
- Requirements to establish, implement, maintain & continual improve ISMS
- Apply to any type or size firm
- Implementation & certificate is optional

ITIL:
- Best practice IT framework
- Practices for IT service management guide quality IT services & processes functions needs to support
- Apply to all IT environments
- Implementation don’t need certification

22
Q

(!) Give an overview of the control frameworks

A

COSO Internal control framework:
- More strategic than COBIT
- To evaluate, report & improve internal cont.
- Widely accepted
- Provide method

COSO Enterprise Risk Management Framework:
- Expands COSO IC framework taking risk-based approach

COBIT:
- More operational than COSO
- More strategic than ITIL
- Focus: Governance & IT
- As COSO but for IT perspective
- Control objectives for info & related technology
- For governance & management of enterprise IT

ITIL:
- Provide details to COBIT
- More operational than COBIT
- Focus: Service man. & delivery
- Information technology infrastructure library
- For IT service management

ISO:
- Focus: Info security
- Ref. ISMS
- Don’t provide method

23
Q

(!) Describe information security management & the terms confidentiality, integrity, availability & algoritm

A

Information security management:
- Top tech issue for CPAs
- Integrated, systematic approach
- Coordinate people, policies, standards, processes & controls
- Safeguard critical systems & info from in- & external threats
- Critical to maintain system integrity: No manipulation or degrading when user

__________

Terms:

Confidentiality:
- Info only for authorized individual & process

Integrity:
- Accurate & complete info
- Content remain constant: No manipulation

Availability of data:
- Info & system access on demand

Algorithm:
- Series of steps

24
Q

(!) Describe encryption

A

General:
- Preventive control
- For confidential & privat data
- Both transmission & storage
- Key to decrypt message
- More bits if sensitive data
- Key management: Strong policy required
- Encourage sharing

25
Q

(!) Compare the symmetric & assymmetric key encryption methods

A

Symmetric key encryption:
- Fast
- Suit large data sets
- Distribution difficult in secure way
- One key: Cost ineffective & problematic

__________

Assymmetric key encryption:
- Slow
- Don’t suit large data sets
- More secure
- Two keys: Less problematic
- Public key: Wide use + Decryption
- Private key: Secret + Encryption
- Transmit conf. info
- Process must be repeated in reverse

26
Q

(!) Describe authentication

A

General:
- Establish origin of info
- Identify user, process or device
- Prevent rejections online
- Critical in e-business

27
Q

(?) Describe how secure shell works (SSH)

A
28
Q

Describe the key factors of encrypting assymmetric keys

A

Certificate authority (CA):
- Trusted entity
- Issue & recall digital certificate

Digital certificate:
- Digital document issued
- Digital signed by private key of CA: Bind subscriber name to public key
- Subscriber sole control & access to private key

Public key infrastructure (PKI):
- Policies, processes, server platforms, software & workstations used to administering certificates & public-private key pairs to issue, maintain & revoke public key certificates

29
Q

(!) Describe hashing process, message digest & digital signature

A

Message digest / MD:
- Short code
- Generated through hashing

Hashing process:
- Original docs pass through algorithm
- Generate MD
- Irreversible: Differ from encryption

Digital signatures:
- MD of doc/data encrypt w. creator’s private key
- Need both hashing & encryption process to create
- Ensure data integrity & prevent repudiation of transactions
- Need creators own private key to encrypt MD so the digital signature also authenticates the document creator for creation of digital signature
- Ensure one held responsible

30
Q

(?) Describe the process to ensure data integrity in digital signatures

A

General:
- Sender: A
- Receiver: B

  1. Asymmetric-key encryption method to authenticate each other
  2. Copy doc & use SHA-256 to hash copy & get MD
  3. A encrypts MD by A’s private key & to get A’s digital signature
  4. A uses B’s public key to encrypt original doc & A’s digital signature: For confidentiality
  5. A send encrypted package to B

__________

  1. B receive package & decrypts it using B’s private key. B now has the original doc & A’s digital signature
  2. B decrypt A’s DS by A’s public key to get A’s original MD. B also authenticate that A is creator: Assure nonrepudiation
  3. B make copy of received doc and uses SHA- 256 to hash copy & get a calc. MD: Must be same algorithm used by sender
  4. If original MD same as the calc. MD, B ensure data integrity: No changes in original doc
31
Q

Describe the criteria for cybersecurity risk management framework / AICPA

A

General:
- Reporting framework
- Important for risk management

Criteria:

Describe firms cybersecurity risk management system:
- Nature of business & operations
- Nature of info at risk
- Cybersecurity objectives
- Factors significantly affecting inherent cybersecurity risks
- Cybersecurity risk governance structure
- Cybersecurity risk assessment process,
- Cybersecurity communications & quality of cybersecurity info
- Monitoring cybersecurity risk management program
- Cybersecurity control processes

Evaluate firms cybersecurity controls:
- Trust services criteria
- Principles for security, availability, processing integrity, confidentiality & privacy

32
Q

(!) Describe fraud & the fraud triangle

A

General:
- Intended illegal act
- Deceit, conceal or violate trust
- To obtain money, property, service, avoid payment or secure own firm
- Acts not dependent upon threat of violence or physical force
- Risk employees sell confidential info

Fraud triangle:

Incentive:
- Reason for fraud

Opportunity:
- Absence or ineffective cont.
- Poss. to override cont.

Rationalization:
- Attitude

33
Q

Describe computer fraud schemes

A
34
Q

Describe computer fraud prevention & detection

A

Fraud prevention program:

Risk assessment across entire firm:
- Consider critical areas
Auditor has oversight role:
- Ensure program ongoing
Auditor work w. in- & external people:
Make employees aware of fraud obligations & misconduct:
- Begin w. practical communication & training

___________

Fraud detection program:
- Internal auditor evaluate effectiveness of business processes
- Analyze transaction data: Evidence on effectiveness of internal cont. & identify indicators of fraud risk or actual fraudulent activities
- Continuous monitoring system is effective: W. detailed logs for transaction-lvl test

35
Q

(!) Describe GDPR

A
  • GDPR = General data protection regulation
  • Protect EU citizens from privacy & data breaches
  • Control personal data
  • Fine up to 4% of turnover
36
Q

(!) Describe vulnerability assessment & compare vulnerability management to risk management. Give some examples

A

Vulnerability:
- Characteristics of IT ress. poss. exploited by threat to cause harm. Dansk: Udnyttet
- Weakness or exposure in IT assets or processes poss. leading to business-, compliance- or security risks

__________

Vulnerability management & risk management:

General:
- Seek reducing probability occurred harming events

Risk management:
- More complex
- Strategic
- Mostly top-down
- Risk-based approach

Vulnerability management:
- Tactical
- Short-term effort
- Often IT asset-based approach

__________

Threats & vulnerability:

Physical IT environment examples:
- Natural disaster + Outdated measures for environmental threats
- Electric black-out + Insufficient back-up power supply

Information system examples:
- Interruption of system + Poor service level agreement
- System intrusion + Open ports on main server w/o router access

Processes of IT operations examples:
- Social engineering + No training in this
- Disclosing sensitive employee info + Inappropriate data classification rule

37
Q

(!) Describe the framework for vulnerability assessment & management

A

Prerequisites (Forudsætninger):

Determine main objectives:
- Since limited ress.
- Eg. Comply w. law

Assign roles & responsibility:
- Eg. Internal audit group

38
Q

(!) Describe system availability & back ups

A

General:
- Key component
- Ensure data available all time or when needed
- DRP & BCM the most critical corrective controls

Back-ups:

Uninterruptible power supply:
- Battery power
- System operate until back up
- Shut down properly if no power

Fault tolerance:
- Ability to still function when system part fail
- By redundant array: RAID

Virtualization or cloud computing:
- Good alternatives to backup
- Redundant servers at multiple locations
- Cost-effective
- Credibility, control & security must be considered

39
Q

Describe computer fraud

A

Common computer fraud:
- Theft, misuse or misappropriation of assets, info or hardware
- Corruption, illegal copying, or intentional destruct computer software
- Eg. Change computer-readable records & files
- Eg. Change logic of computer software

___________

Computer fraud risk assessment:

General:
- Systematic discover where & how fraud may occur & whom may commit it
- Component of firms enterprise risk management program: ERM
- Fraud schemes & scenarios to determine whether controls exist & how controls might be circumvented
- Assist management & internal auditors

Steps:
1. Identify relevant IT fraud risk factors
2. Identify potential IT fraud schemes & prioritize them based on likelihood & impact
3. Map existing controls to potential fraud schemes & identify gaps
4. Test operating effectiveness of fraud prevention & detection controls
5. Assess likelihood & impact of control failure

40
Q

(!) Describe Business continuity management / BCM & Disaster recovery planning / DRP

A

Business continuity management / BCM:
- Activities to keep firm running in time of interruption of normal operations
- Broader than DRP: Entire business

Disaster recovery planning / DRP:
- Part of BCM
- Identify significant events w. poss. threat
- Outline procedure to smooth resume operations if event occur
- Req. Regular test
- Eg. Natural disaster

41
Q

(!) Describe different risk & attacks

A

General:
- In- or external: Employees or competitors & hackers

Virus:
- Self-replicating program
- Run & spread by modifying other programs/files

Worm:
- A self-replicating, self-propagating, self-contained program
- Spread by network mechanisms

Trojan horse:
- Non-self-replicating program
- Look useful but oth. purpose

Spam:
- Send bulk info not asked for

Botnet / Bot:
- Software robot overrun computer to act in bot-herder’s control
- Through Internet.

Denial-of-service /DoS:
- Prevent authority res. access
- Delay time-critical operations
- Eg. Server

Spyware:
- Software secretly installed into IS
- Gather info on individuals or firm w/o their knowledge
- A type of malicious code

Spoofing
- Network pack coming from other source than proclaimed

Social engineering:
- Manipulate to take action not in person’s best interest
- Eg. Reveal confidential info
- Eg. Grant access to assets, networks, or info.

42
Q

Describe segregation of duty

A
  • Splitting process to more than one
  • To hinder fraud
  • Min. 2 persons