WEEK 4: CONTROL & ACCOUNTING IS Flashcards

1
Q

Business exposure to risks ( in terms of technology/it development ) leading to control failure

A
  • more IS means info available to more people
  • decentralized / distributed networks - makes it difficult to implement central controls
  • wide area networks compromising confidentiality
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

inherent idiosyncratic material risks of the currency ( crypto )

A
  • business risk:
    ( value is strictly determined by the value that market participants place on them through their transactions, which means that loss of confidence may bring about a collapse of trading activities and an abrupt drop in value)
  • not backed:
  • cyber/fraud risk :
    ( cryptocurrency is highly reliant upon unregulated companies, including some that may lack appropriate internal controls & , If the keys are stolen to a user’s wallet, the thief can fully impersonate the original owner of the account and has the same access to the monies in the wallet that the original owner has)

> associated risks also include

  • operational risks
  • regulatory/ compliance risk
  • market risks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

challenges in accounting for cryptocurrencies

A
  • not backed & not cash
  • volatile
  • not financial instrument - no right to something
  • how do we classify then?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

why do we need controls - this links to “what is internal control”

A
  • assurance in terms of business processes
  • mitigate risk
  • assurance in terms of laws
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

4 Internal control objectives ( similar to GAA )

A
  • to safeguard assets
  • to check the accuracy and reliability of accounting data
  • to promote operational efficiency
  • to encourage adherence to prescribed managerial policies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Primary objective of AIS

A
  • control the organization so it can achieve objectives
  • includes people - people who use frequently should be able to detect and correct/ minimize system threats, systems can be complex so this is essential
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of internal controls

A
  • Preventive controls
  • Detective controls
  • Corrective controls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

General and application controls

A

important general:
1. Information systems management controls

  1. Security management controls
  2. Information technology infrastructure controls
  3. Software acquisition, development, and maintenance controls

Application controls - IOI of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five interrelated components of internal control

A
  1. control environment
  2. risk assessment
  3. control activities
  4. information &communication
  5. monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The Sarbanes-Oxley and Foreign Corrupt Practices Acts 1977

A
  • The primary purpose of this Act was to prevent the bribery of foreign officials in order to obtain business
  • Applies to publicly held companies and their auditors and was intended to prevent financial statement fraud, make financial reports more transparent, provide protection to investors, strengthen the internal controls at public companies, and punish executives who perpetrate fraud.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

New rules for auditors CPA

A

COMMITEE
Audit committee members must be on the company’s board of directors and be independent of the company ( committee )

MANAGEMENT:
Requires the CEO and CFO to certify that financial statements and disclosures are fairly presented, were reviewed by management, and are not misleading.

Management can be imprisoned up to 20 years and fined up to $5,000,000.

INTERNAL CONTROL REQUIREMENTS:
Requires publicly held companies to issue a report accompanying the financial statements that states management is responsible for establishing and maintaining an adequate internal control structure and appropriate control procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

aftermath Barbanes-Oxley Act

A
  • evaluations must be based on recognized control frameworks ( COSO)
  • disclose any and all material internal control weaknesses
  • conclude that a company does not have effective internal controls over financial reporting is there are any material weaknesses.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IT governance involves

A
  • Value delivery :
  • strategic IT alignment
  • Risk management
  • Resource management
  • performance management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Risk IT

A

providing a framework for enterprises to identify, govern and manage IT risk

Allows an enterprise to make appropriate risk-aware decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VAL IT

A

Enables the creation of business value from IT-enabled investments

Integrates governance principles, processes, practices and supporting guidelines that help boards, the executive and other enterprise leaders to optimise the realisation of value from IT investments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how COBIT addresses the issue of control from five key principles
MC SEA

A
  1. meeting stakeholder needs
  2. covering the enterprise end-to-end
  3. applying a single integrated framework
  4. enabling holistic approach
  5. separating governance from management
17
Q

COSO 5 components

basically components of internal control

A
  • control ( internal) environment
  • risk assessment
  • control activities
  • information and communication
  • monitoring
18
Q

COSO-ERM, ERM basic principles

A

Companies are formed to create value for their owners

Management must decide how much uncertainty it will accept as it creates value

Uncertainty results in risk, which is the possibility that something negatively affects the company’s ability to create or preserve value

Uncertainty results in opportunity, which is the possibility that something positively affects the company’s ability to create or preserve value

The ERM framework can manage uncertainty as well as create and preserve value

19
Q

COSO ERM objectives

scor

A

Strategic
operations
reporting
compliance

20
Q

COSO ERM : internal environment

A
  • management philosophy, operating and risk appetite
  • commitment to integrity, ethical values and competence
  • internal control oversight by board of directors
  • organizational structure
  • methods of assigning authority and responsibility
21
Q

COSO: objective setting

A

strategic objectives
operational objectives
reporting objectives
compliance objectives

> this is the cube in the slides

22
Q

types of risk

A

inherent

residual

23
Q

Risk response

A
  • reduce
  • accept
  • share
  • avoid
24
Q

COSO: Control activities

A

Proper authorization of transactions and activities

Segregation of duties

Project development and acquisition controls]

Change management controls

Design and use of documents and records

Safeguarding assets, records, and data

Independent checks on performance

25
Q

Updates COSO ERM Framework - 2017

A
  • governance and culture
  • strategy and objective setting
  • performance
  • review and revision
  • information, communication and reporting

(NB, this is all in relation to the risk based approach)

26
Q

risk governance components

A
  • risk appetite & tolerance
  • responsibility and accountability for IT risk management
  • awareness and communication
  • risk culture
27
Q

risk capacity

A

amount of risk an organization is able to support in pursuit of its objectives

28
Q

risk appetite

A

amount of risk an organization is willing to accept

29
Q

risk tolerance

A

“cushion”

30
Q

Trust services framework: foundation principles

A

security, confidentiality,
privacy,
processing integrity,
availability

31
Q

security life cycle

A
  1. asses the threats&select risk response
  2. development and communicate policy
  3. Aquire& implement solutions
  4. monitor performance

repeat.

32
Q

security approacches

A
  1. defense in depth
  2. time-based model
    ( P > D+C), where

P: is time it takes an attacker to break through preventive controls

D: is time it takes to detect an attack is in progress

C: is time it takes to respond to the attack and take corrective action