Module 3 Flashcards

1
Q

Components of internal control

A
There are five - CRIME.
Control activities
Risk assessment systems 
Information systems 
Monitoring of controls
Control environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are control activities

A

policies and procedures management put in place to ensure their directives are carried out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Risk assessment systems

A

Process by which business risks are identified and managed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Information systems

A

Record financial and non-financial data to maintain accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Monitoring of controls

A

Ongoing assessment by management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control environment

A

Overall attitude - tone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Business processes

A

series of activities that enable a company to meet one or more of its objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Business risk

A

the threat an action or event will adversely affect the orgs ability to achieve its objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Accounting information systems

A

structures used by organisations to collect, store and process financial and accounting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Preventative controls

A

stop errors happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Detective controls

A

pick up errors after they’ve happened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Control activities categories

A
APIPS
Authorisation controls
Performance reviews 
Information processing controls 
Physical controls 
Segregation of duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authorisation controls

A

transactions authorised by personnel wihtin their scope of authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Performance Review

A

Management can review information highlighting any exceptions or controls not working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Physical controls

A

Limit access to assets or important records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Segregation of duties

A

Mitigates risk that someone could commit fraud or error and then conceal it

17
Q

Sub categories of Information processing controls

A
  1. IT General Controls
  2. Application controls 2.1 IT Application Controls
    2. 2.Manual Application Controls
18
Q

(ITGCs) IT general controls

A
bubble around the IT systems and controls 
don't operate at the transaction level 
APOC
Access to programs and data
program changes and development 
computer operations
continuity of operations 
e.g.
use of passwords and id 
hardware and software are adequate 
maintaining IT systems
backup and recovery procedures
19
Q

What are Application controls

A

Operate at the transaction level and apply to processing of specific types of transactions to ensure they are genuine, accurate and complete.
Both manual and automated

20
Q

Specific examples of IT Application controls

A

Audit log, Batch controls, programmed editing, calculation, Check digits and exception reports

21
Q

What are entity-level controls

A

controls that help establish the tone and culture. May be known as soft controls.
e.g.
Code of Ethics, handbook, values

22
Q

Limitations of Internal Control Systems

A
RC CHUM
Relevancy
Cost
Collusion
Human Error
Unusual/ infrequent transactions
Managerial override
23
Q

IT Risks

A

Related to APOC

24
Q

Access to programs and data

A

All staff should know the policies.
Access should be restricted via
-physical access e.g. access cards, separate computer room
- user access by user ID and passwords
-administrator access- only to appropriate staff

25
Q

Program Changes and Development

A

Must consider DATA

Authorisation, development, testing, approval

26
Q

What is the Systems Development Life Cycle

A

process to introduce, develop, maintain and enhance software

27
Q

Computer Operations

A

Need to make sure they run efficiently to achieve business objectives. Should consider job processing, backup and recovery and incident and problem management procedures.

28
Q

Continuity of Operations

A

Most organisations will have disaster recovery plan