Test 1 Vocab Flashcards
source documents
documents to capture transaction data at its source - when the transaction takes place
turnaround document
records of company data sent to an external party and then returned to the system as input
block code
blocks of numbers reserved for specific categories of data. i.e. - 1000-1999 is reserved for electronic devices
fraud
gaining an unfair advantage over another person - false statements, intent to deceive, injury or loss suffered by victim
investment fraud
misrepresenting or leaving out facts in order to promote investment that promises fantastic profits with little risk
misappropriation of assets
theft of company assets by employees
Fraud Triangle: Pressure
a person’s incentive or motivation for committing fraud
Fraud Triangle: Opportunity
the condition or situation that allows the perpetrator to COMMIT, CONCEAL, AND CONVERT
lapping
concealing the theft of cash by means of a series of delays in posting collections to AR
check kiting
creating cash using the lag between the time a check is deposited and the time it clears the bank
Fraud Triangle: Rationalization
the excuse that fraud perpetrators use to justify their illegal behavior
COBIT 5 Framework
- Meet stakeholder needs 2. Covering the enterprise end-to-end 3. Applying a single, integrated framework 4. Enabling a holistic approach 5. Separating governance from mgt
COSO’s ERM Model
- Internal Environment 2. Objective Setting 3. Event Identification 4. Risk Assessment 5. Risk Response 6. Control Activities 7. Info & Communication 8. Monitoring
risk appetite
amt of risk a company is willing to accept to achieve its goals and objectives
Possible Responses to Risk
- Reduce - IC 2. Accept 3. Share - buy insurance, outsource an activity or enter into hedging transactions 4. Avoid - Don’t get involved in those risky activities.
Excpected Loss
impact x likelihood
Specific Authorization
special approval an employee needs in order to be allowed to handle a transaction
Trust Services Framework (Systems Reliability)
- Security 2. Confidentiality 3. Privacy 4. Processing Integrity 5. Availability
Confidentiality
sensitive organizational information is protected from unauthorized disclosure
Privacy
personal information is protect from unauthorized disclosure
Availability
system and its info are available to meet operation and contractual obligations
Security Life Cylce
- Assess threats and select risk response 2. Develop and communicate policy 3. Acquire and implement solutions 4. Monitor performance
defense-in-depth
employing multiple layers of controls to avoid a single point-of-failure
Time-based Model of Security
P > D + C