Test 2 Flashcards

1
Q

What are some threats to AIS?

A

Natural and Political Disasters
Software errors and equipment malfunctions
Unintentional acts - human errors and omissions
Intentional acts - computer crimes/sabotage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the greatest risk to information systems and causes the greatest cumulative dollar losses?

A

Unintentional acts - human errors and omissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Fraud?

A

Any and all means a person uses to gain an unfair advantage over another person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two most common types of fraud?

A

Misappropriation of assets (e.g. theft of company assets by employees)

Fraudulent financial reporting (e.g. intentional or reckless conduct)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the Three Keys parts of the Fraud Triangle?

A

Pressure: person’s incentive or motivation for committing fraud
Rationalization: excuse that person uses to justify their illegal behavior
Opportunity: condition or situation that allows a person or organization to commit and conceal fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is a high percentage of fraud not recorded?

A

Don’t want adverse publicity resulting from copycat fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the simplest and most common way to commit computer fraud?

A

Input

E.g. alter source documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is unauthorized system use?

A

Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is tampering with computer software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity?

A

Computer instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is illegally using, copying, browsing, searching, or harming company data (“data breach”)?

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is displayed or printed output that can be stolen, copied, or misused unless properly safeguarded?

A

Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is control needed?

A

Threat/event - potential adverse occurrence
Exposure/impact - potential dollar loss
Likelihood/risk - probability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Internal Controls?

A

Ongoing processes/procedures implemented to provide reasonable assurance that control objectives are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the control objectives?

A

Safeguard assets
Maintain records
Provide accurate and reliable information
Prepare financial reports in accordance with established criteria
Promote and improve operational efficiency
Encourage adherence to prescribed managerial policies
Comply with applicable laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 categories of Internal Controls?

A

General - make sure control environment is stable and well managed

Application - preventative, detective, and corrective with problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What did the Foreign Corrupt Practices Act (1977) do?

A

Prevent companies from bribing foreign officials to obtain business

Requires all public companies to maintain a system of internal accounting controls

17
Q

What did SOX (2002) do?

A

Created Public Company Accounting Oversight Board (PCAOB)
New rules for auditors (cannot perform certain non-audit services for clients, e.g. audit and consulting)
CEO and CFO have to sign off on financial statements and footnotes are fairly presented
Members of audit committees must also be members of the Co’s Board of Directors

18
Q

What does “CRIME” stand for?

A

Control Activities
Risk Assessment
Information and Communcation
Monitoring
Control/Internal Environment

19
Q

What is the difference in approach from COSO-IC and COSO-ERM?

A

COSO-IC = “control based”

COSO-ERM = “risk based” (CRIME + objective setting, event identification, and risk response)

20
Q

What are Control Activities?

A

Policies and procedures are established and implemented to help ensure the risk responses are effectively carried out

21
Q

What is Risk Assessment?

A

Includes an assessment of all threats (natural & political, software error/equipment failures, unintentional acts, intentional acts)

22
Q

What is Information and Communication?

A

Relevant information is identified, captured, and communicated in a form and time frame that enable people to carry out their responsibilities

23
Q

What is Monitoring?

A

The entirety of enterprise risk management is monitored and modifications made as necessary

24
Q

What is Control/Internal Environment?

A

“Tone at the Top;” control consciousness; encompassses the tone of an organization and sets the basis for how risk is viewed and addressed by an entity’s people