Revision Flashcards
Strategic] risk
is the potential volatility of profits as a result of the type of business operations.
Operational] risk
is the risk of loss from the failure of internal processes of a company.
Strategic risk –
These arise from the overall strategic positioning of the company in its
environment e.g. financial risk. This arises partly as a result of the way it chooses to be financed
(debt or equity) but also where financial conditions are different to those expected (e.g. interest
rate risk, foreign exchange risk).
Operational risk –
Operational risks refer to potential losses arising from the normal business
operations. Accordingly, they affect the day-to-day running of operations and business systems
in contrast to strategic risks that arise from the organisation’s strategic positioning.
Risk mapping
Involves the evaluation, managing and reporting of risks 
CGMA’s Risk Management Cycle
1 Establish a risk management group and set goals.
2 Identify risk areas.
3 Understand and assess the scale of risk.
4 Develop a risk response strategy.
5 Implement the strategy and allocate responsibilities.
6 Implement and monitor the suggested controls.
7 Review and refine the process and do it again.
The Framework that COSO published has eight Components
The cube
Components:
Internal Environment
Objective Setting
Event Identification
Risk Assessment
Risk Response
Control Activities
Information and Communication
Monitoring
ISO 31000 three main clauses
the principles of creating and protecting value within the
organisation (clause 4),
the organisational framework that governs risk (clause 5)
the risk management process itself (clause 6).
The Framework that COSO published has four Objectives categories.
The cube
Strategy – high-level goals, aligned with and supporting the organisation’s mission
Operations – effective and efficient use of resources
Financial Reporting – reliability of operational and financial reporting
Compliance – compliance with applicable laws and regulations
policy on nominating the Chairman of the Board:
The Chairman should be re-elected annually
The Chairman should be selected by a majority Board vote.
A person should not serve more than six years in succession as Chairman to XY plc.
roles of the nomination committee
Considers whether an individual is appropriate to serve on the board of directors,
Prepares a job specification for the Chairmanship of the company,
Evaluates the balance of skills, experience, independence and knowledge on the board
professional competence.
A professional accountant has a [continuing] duty to maintain professional [knowledge] and [skill] at the level to ensure that the employer receives competent professional service.
Stress testing
involves scrutinising and critically appraising an existing strategy. It is designed to challenge the status quo and is therefore particularly appropriate where there is stagnation or complacency.
benefits of an internal control system
Improves quality of internal reporting,
Improves quality of external reporting,
Helps a company to comply with laws and regulations
three primary objectives in designing an effective internal control system
(1) Reliability of Financial Reporting (
2) Efficiency and effectiveness of operations (
3) Compliance with laws and regulations
internal control system is deemed to comprise two key elements:
Control environment” – the management’s attitude and philosophy regarding controls. This can be ascertained to a degree by the number of control procedures the company has
“Control procedures”/activities -the actual policies and procedures in place which ensure that risks and errors are minimised, e.g. performing a monthly inventory count provides evidence of a strong control environment surrounding inventory management.
General controls
Password controls
Physical controls such as swipe cards restricting entry to computers.
Fire alarms and smoke detectors would also be included in this heading
Personnel controls – Ensuring that staff are aware of the importance of good computer security by recruiting motivated, intelligent staff and giving them sufficient training and supervision
Environmental controls – such as fire detectors
Contingency (or “disaster recovery”) plan – a document detailing the plan of action should a disaster such as a fire or flood occur.
Regular backups of key data
Virus protection
Firewalls
Spyware software
Application Controls
Data verification controls e.g. having mandatory fields on an application form
Data validation e.g. credit card number validity
Exception reports – where any values over a certain value are highlighted in a separate report.
Systems Development Lifecycle
Planning/Feasibility study – Initially, there will be recognition that “things can be done better”.
Systems analysis – This process ranks the available systems and will ultimately determine whether the company produces the new system in-house or outsources its design.
Systems design – Describes desired features and operations in detail, including screen layouts, business rules, process diagrams and other documentation (e.g. flowcharts).
Systems development – The system can then be built, with changes to the new system documented carefully so that future updates and developments can be carried out.
Implementation – The new system can be introduced, according to application or location, and the old system gradually replaced
Maintenance – The correction or enhancement of systems once they are in operation. A postimplementation review offers the opportunity to check that the system:
problems with a value for money audit
The objectives of the activities being measured may not be clear.,
Effectiveness may be difficult to measure.
There may be a contradiction between focusing on efficiency and economy and focusing on effectiveness.
Pursuit of economy may lead to quality falling.
The four objectives of cybersecurity
availability,
confidentiality,
integrity of data
integrity of processing.
Place the steps in the system monitoring process in the correct order:
1st. → Establish a monitoring strategy based on business need and assessment of risk,
2nd. → Monitor all systems across the network, including network traffic and user activity,
3rd. → Establish a centralised capability to collect and analyse information,
4th. → Ensure that policies and processes are in place to manage and respond to incidents,
5th. → Conduct a ‘lessons learned’ review after any security incident