AIS Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Evaluate, Direct, and Monitor (EDM)

is the only IT governance–focused domain in COBIT 2019. This domain states that the board of directors or governing body of an organization must evaluate stakeholder needs and IT strategic options, create direction by prioritizing and making decisions about these options, and monitor these IT strategies for performance, progress, and compliance. The control objectives in this domain include frameworks, resource optimization, and transparency with stakeholders.

2
New cards

Align, Plan, and Organize (APO)

addresses the way IT is used to meet organizational objectives. Includes some control objectives around risk, security, budgets, and innovation.

3
New cards

Build, Acquire, and Implement (BAI)

is where management assesses IT requirements, acquires technology, and implements the technology. In this objective, IT is integrated with business processes. Control objectives cover topics like defining project requirements, addressing change management, and executing projects.

4
New cards

Deliver, Service, and Support (DSS)

relates to the operational side of IT projects, including IT support. IT projects are delivered to end users. The component includes service requests, business process controls, and IT security support among its control objectives.

5
New cards

Monitor, Evaluate, and Assess (MEA)

focuses on existing IT projects and whether they are meeting the organization’s objectives. IT projects are compared to internal performance targets, control objectives, and external regulatory requirements. Some of the control objectives focus on the internal control system, regulatory compliance, and performance.

6
New cards

Time based model of control

Preventive > [Detective + Corrective] = Effective (P>[D+C])

7
New cards

IT general controls (ITGCs)

A control that applies to the entire operation of a system and its environment. All corporate applications, like emails, web browsers, time-keeping software, benefits management systems, and more, are subject to ITGCs.

8
New cards

application control

A control that only applies to a specific application, including all the business processes and accounts that are linked to it. Application controls in an AIS can be called transaction controls because they relate specifically to accounting transaction processing.

9
New cards

manual control

A control that is executed by people or physical interaction. Manual controls are used when human judgement or physical interaction is required. Manual controls are subject to human error or intentional manipulation and override, which means control might fail. For this reason, auditors- both internal and external-frequently focus on manual controls during their assessments.

10
New cards

automated control

A control that uses technology to implement control activities and requires no human intervention. Automated controls are often more reliable and consistent than manual controls because they are not susceptible to human error, judgment, or override. Automated controls include embedded IT controls and controls that use other automation technologies, such as robotics, to perform what have traditionally been manual tasks.

11
New cards

Continuous monitoring

Data analytics technology that internal auditors use to create detective controls that use rules- based programming to monitor a business’ data for red flags of risk. Continuous monitoring is often programmed to keep tabs on key performance indicators (KPIs) or to look for red flags indicating possible fraud.

12
New cards

What are the stages in the change in management process?

  1. Creating changes in the test environment

  2. Evaluating accuracy of changes in the model environment

  3. Implementing changes in the production environment

13
New cards

What are the steps of enterprise risk management (ERM)?

  1. Identify

  2. Categorize

  3. Prioritize

  4. Respond

14
New cards

business function

A high-level business area or department that performs business processes to achieve company goals. More than one business function may be necessary to complete a single business process.

15
New cards

enterprise risk management (ERM)

The comprehensive process of identifying, categorizing, prioritizing, and responding to a company’s risks.

16
New cards

ERM 1st step

identify

17
New cards

ERM 2nd step

categorize

18
New cards

ERM 3rd step

prioritize

19
New cards

ERM 4th step

respond

20
New cards

risk severity

The likelihood of risk occurring and their potential impact on a company.

21
New cards

likelihood

The estimated probability of risk occurrence.

22
New cards

impact

is the estimation of damage that could be cause if a risk occurs. Earlier in this chapter, we started with an issue and defined a possible outcome to form a risk statement.

23
New cards

risk score

= Likelihood score * Impact Score

24
New cards

risk appetite

The amount of risk a company is willing to take on at a particular time

25
New cards

residual risk

The remaining risk posed by a process or an activity once a plan to respond to the risk is in place. It is the risk after implementing a risk response.

26
New cards

manual control

A control that is executed by people or physical interaction. Manual controls are used when human judgment or physical interaction is required. Manual controls are subject to human error or intentional manipulation and overrride, which means there is an increased risk that a manual control might fail. For this reason, auditors-both internal and external-frequently focus on manual controls during their assessments.

27
New cards

It general control (ITGC)

A control that applies to the entire operation of a system and its environment. All corporate application, like email, web browsers, time-keeping software, benefits management systems, and more, are subject to ITGCs.

28
New cards

What are the control functions?

  • preventive

  • detective

  • corrective

29
New cards

What are the control locations?

  • physical

  • IT General (ITGC)

  • IT Application

30
New cards

How are controls implemented

  • manual

  • automated

31
New cards

corruption

The inappropriate use of influence to obtain a benefit contrary to the perpetrator’s responsibility or the rights of other people.

32
New cards

external fraud

Fraud perpetrated by customers, vendors, or other outside parties against a company.

33
New cards

horizontal analysis

This type of analysis involves investigating the changes in financial statement items by comparing two or more financial statements from different periods.

34
New cards

vertical analysis

This type of analysis involves calculating each line item in the same financial statement as a percentage of another line item in the same financial statement. Vertical analysis becomes more insightful when used in conjunction with horizontal analysis. The combination makes it possible to compare the vertical analysis of one reporting period with others.

35
New cards

expense reimbursement scheme

A fraudulent disbursement in which a business reimburses a perpetrator for expenses they never incurred.

36
New cards

First line of defense

The business operations portion of the Institute of Internal Auditors’ three lines of defense model. In this line of defense, management has the ownership and the responsibility of enforcing mitigating measures to prevent identified risk from occurring. This line of defense reports only to executive management.

37
New cards

Second line of defense

The risk management and compliance portion of the Institute of Internal Auditors’ three lines of defense model. In this line of defense, the ERM team identifies and assesses organizational risks. This line of defense aids the first line of defense in ensuring that controls are designed to adequately address risk and monitors the controls to ensure that the first line of defense is complying with internal control requirements. This line of defense reports only to executive management.

38
New cards

Third line of defense

The internal audit portion of the Institute of Internal Auditors’ three lines of defense model. The primary objective of internal audit is to test internal controls to provide assurance of their effectiveness to executive management and the board of directors. Internal audit is an independent function of the company that reports both to executive management and to the board of directors.

39
New cards

Phase 1

Limited:

  • informal process

  • ad hoc controls

  • localized efforts

  • reactive management

  • reliance on key individuals

40
New cards

Phase 2

Informal:

  • some defined processes

  • some defined controls

  • lack of documentation

  • primarily manual controls

  • inconsistencies

  • reliance on key individuals

41
New cards

Phase 3

Defined:

  • clearly defined processes

  • clearly defined controls

  • formal documentation

  • mix of manual and automated controls

  • no reliance on key individuals

42
New cards

Phase 4

Optimized:

  • enterprise-wide risk management

  • enterprise-wide control environment

  • top-down, proactive approach

  • clearly defined processes

  • clearly defined controls

  • formal documentation

  • clear communication throughout organization

  • more automated controls than manual controls

  • internal audit provides strategic value

43
New cards

channel stuffing

a fraud scheme where the seller encourages the sales of extra inventory to increase the current year’s sales, when it is stated or implied that the customer can return the goods after the year end but not providing a reserve against these expected returns in the current year

44
New cards

Maturity model

A model that shows how far along a company is on its journey to reach the ideal state by comparing the current state to a predetermined set of best practices. Companies use maturity models to judge their current performance and create a roadmap, or plan, for continuous improvement.