Lesson 3 Flashcards

1
Q

is the careful and responsible oversight and use of the asset entrusted to management.

A

Stewardship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a set of documented guidlines for moral and ethicL behavior within the organization

A

code of ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

defines as the theft, concealment, and conversation to personal gain of another’s money, physical assets or information

A

Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

involved theft of any item of value

A

Misappropriation of Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Misappropriation of assets reffered to as a ______/_______

A

defalcation or internal theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

involves for falsification of accouting reports

A

Misstatement of financial asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Misstatement of financial asset often reffered as

A

earnings management, or fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(3) Fraud Triangle

A

Incentive (pressure)
Opportunity
Rationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

conducted by one or more top level manager within the company

A

Management Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Involves top level management circumvention of the system pr internal controls that are in place, known as?

A

management override

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

conducted by nonmanagement employees, means that an employee steal cash or assets for personal gain

A

Employee Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inventory can be stolen or misdirect

A

Inventory theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this occured when an employee steal cash from company

A

Cash Receipt Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

employee may submit false invoice

A

Account Payable Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is a cash payment that the vendor gives the employee in exchnage for the sale

A

Kickback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This occur when an employee submit a false or inflated time card

A

Payroll Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

this occur when an employee submit false travel or entertainment expence

A

expence account fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

technique where the organization’s cash is stolen before it entered into the accouting record

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fraudster may also steal the company’s cash after in has been record in accoutning records

A

larceny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

when two or more people word together to commit fraud

A

Collusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

occur when a costumer improperly obtains cash or property from a company

A

Costumer Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

involves the costumer use of stolen or fraudulent credit card or checks

A

Credit card fraud and Check Fraud

23
Q

occurs when a costumer tries to return stopen goods to collect a cash refund

A

Refund Fraud

24
Q

occurs when vendors obtain payment to which they are not entitled

A

Vendor Fraud

25
Involve the examination of vendors record in support of amount charged to the company
Vendor audits
26
the theft of proprietory company information, by digging to the trash of the intended target company
industrial espionage
27
the umlawful copying of software programs
software piracy
28
to alter a program to slice a small amount from several accounts and then credit those small amounts to the perpetra‑ tor’s benefit.
salami technique
29
is a small, unauthorized program within a larger, legiti‑ mate program, used to manipulate the computer system to conduct a fraud.
trojan Horse program
30
is a valid programming tool that is misused to commit fraud.
trapdoor alterations
31
the term commonly used for computer network break‐ins. Hacking may be undertaken for various reasons, including industrial espionage, credit card theft from online databases, destruction or alteration of data, or merely thrill‐seeking.
Hacking
32
is intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic.
a denial of service attack
33
occurs when a person, through a computer system, pretends to be someone else
spoofing
34
The Act was intended to reform accounting, financial reporting, and auditing functions of companies that are publicly traded in stock exchanges.
Sarbanes Oxley Act
35
are designed to avoid errors, fraud, or events not authorized by management.
preventive control
36
help employees to uncover or discover errors, fraud, or unauthorized events.
detective control
37
are those steps undertaken to correct an error or problem uncovered via detective controls
corrective control
38
has provided the standard definition and description of internal control accepted by the accounting industry
Coso report
39
sets the tone of an organization and influences the control consciousness of its employees
control environment
40
as the policies and procedures that help ensure that management directives are carried out and that management objectives are achieved.
control activities
41
refers to an approval, or endorsement, from a responsible person or department in the organization that has been sanctioned by top management.
authorization
42
s a set of guidelines that allows transactions to be completed as long as they fall within established parameter
general authorization
43
means that explicit approval is needed for a transaction to be completed.
specific authorization
44
When management delegates authority and develops guide‑ lines as to the use of that authority, it must assure that the authorization is separated from other duties. This separation of related duties is called
segregation duties
45
which presents verifiable information about the accuracy of accounting records.
audit trail
46
Organizations should establish control activities to safeguard their assets, documents, and records.
Security of Assets and Documents
47
a procedure that compares records from different sources.
reconciliation
48
involves the ongoing review and evaluation of the systems
monitoring
49
The risk related to security is unauthorized access, which may be both physical access and logical access.
Security
50
The risk related to availability is system or subsystem failure due to hardware or software problems.
Availability
51
The risk related to processing integrity could be inaccu‑ rate, incomplete, or improperly authorized information.
processing integrity
52
The risk in this area is that personal information about cus‑ tomers may be used inappropriately or accessed by those either inside or outside the company.
online privacy
53
The risk related to confidentiality is that confidential infor‑ mation about the company or its business partners may be subject to unau‑ thorized access during its transmission or storage in the IT system. Examples of confidential information are banking information and price lists.
confidentiality
54