Internal Audit - Information Technology, Governance, Risks, and Controls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/91

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

92 Terms

1
New cards

Internet of Things (IoT)

The network connection and transmission of information or data from physical devices, objects, or fixtures

2
New cards

Pace and type of IT change...

increases business risk

3
New cards

Types of IT Changes

- System enhancements

- New technologies

- Patches and system upgrades

- Application code revisions

4
New cards

Cybersecurity

The technologies, processes, and practices designed to protect an organization's information assets - computers, networks, programs, and data from unauthorized access

5
New cards

What is the number one technology risk in an organization?

Cybersecurity

6
New cards

Technology's top 10 risks

7
New cards

1.

Cybersecurity

8
New cards

2.

Information Security

9
New cards

3.

IT Systems Development Projects

10
New cards

4.

IT Governance

11
New cards

5.

Outsourced IT services

12
New cards

6.

Social Media Use

13
New cards

7.

Mobile Computing

14
New cards

8.

IT Skills among internal auditors

15
New cards

9.

Emerging technologies

16
New cards

10.

Board and audit committee technology awareness

17
New cards

Effective controls to address cybersecurity

-strong security frameworks

-identifying and controlling top risks to the organization related to cybersecurity, including external and internal threats

-awareness programs directed to all employees

-strong IT governance and robust protocols in case of a serious breach

18
New cards

IT Auditor

Works extensively in the area of computerized information systems and should have a deep IT risk, control, and audit expertise

19
New cards

Standard 3.1

- The standard of competency

- Includes competency in information technology

20
New cards

What are the top IT skills all internal auditors should possess?

- Data analytics

- Cybersecurity

- Business continuity and disaster recovery

- Change management

- Newer technologies

21
New cards

Data analytics

How to analyze data and use audit software tools

22
New cards

Cybersecurity

Key components of information security, including technology terminology applications, operating systems, network and physical security, and key risks

23
New cards

Business continuity and disaster recovery

Understanding the most significant business areas and practices for recovery

24
New cards

Change management

Knowledge of project management and change processes and the corresponding impact on the organization

25
New cards

Newer technologies

Being tech savvy with current issues on emerging technolgoes and their potential impact on the business

26
New cards

It is virtually impossible in todays business world....

for any internal audit function to provide value-adding services to its organization unless the function is highly proficient with its knowledge of IT risks and controls and has the capability to effectively apply technology-based audit techniques

27
New cards

Certified Information System Auditor

Globally recognized certification for IS audit control, assurance, and cybersecurity officials

28
New cards

Standard 10.3

Technological resources

29
New cards

Information Technology Governance

The leadership, structure, and oversight processes that ensure the organization's IT supports the objectives and strategies of the organization

30
New cards

Standard 9.4

- Internal Audit Plan

- Consider coverage of IT governance, fraud risk

31
New cards

REVIEW IT GOVERNANCE FRAMEWORK

REVIEW IT GOVERNANCE FRAMEWORK

32
New cards

COBIT 2019

Internationally accepted IT governance framework. It is the best-known control and governance framework that addresses information technology

33
New cards

COBIT stands for...

Control Objectives for Information and Related Technology

34
New cards

Risks of computer hardware

Susceptible for power outages that interrup transaction processing. Infected hardware may also be purchased

35
New cards

Risks of networks

They transmit information that may be intercepted, stolen, or misused

36
New cards

Risks of computer software

inaccurately programmed software may produce invalid, incomplete, or inaccurate information. creates inefficient, performance, security, or capacity risks

37
New cards

Risks of databases

They may be infiltrated for the purpose of misappropriation or misusing information

38
New cards

Risks of information

Invalid, incomplete, or inaccurate information may result in poor decision making or inaccurate reporting

39
New cards

Common types of IT risks

- Selection risk

- Development/acquisition and deployment risk

- Availability risk

- Hardware/software risk

- Access Risk

- Confidentiality and privacy risk

- System reliability and information integrity risk

- Fraud and malicious acts risk

40
New cards

Availability Risk

Unavailability of the system when needed may cause delays in decision-making, business interruptions, lost revenue, and customer dissatisfaction

41
New cards

Causes of availability risk

Hardware/software failures, unscheduled maintenance, natural disasters, viruses

42
New cards

Hardware/software risk

Failure of hardware/software to perform properly may cause business interruptions, temporary or permanent damage to or destruction of data, and hardware/software repair or replacement costs

43
New cards

Causes of hardware/software risk

natural wear and tear, environmental damage, disasters, not patching hardware/software, viruses

44
New cards

Access Risk

Unauthorized physical or logical access to the system may result in theft or misuse of hardware, malicious software modifications, and theft, misuse, or destruction of data

45
New cards

Causes of access risk

Use of smartphones to access, modify, and store corporate data and open use of wireless networks for guest access to business data and lack of strong user access of authentication

46
New cards

Confidentiality and privacy risk

Unauthorized disclosure of business partners' proprietary information or individuals' personal information may result in a loss of business, lawsuits, negative press, and reputation impairment.

47
New cards

Causes of confidentiality and privacy risk

Unimpeded access to system networks, software, and databases

48
New cards

System reliability and information integrity risk

Systematic errors or inconsistencies in processing may produce irrelevant, incomplete, inaccurate, and/or untimely information

49
New cards

Causes of system reliability and integrity risk

programming errors, wreak edit or data verification controls, and unauthorized changes to software

50
New cards

Fraud and Malicious Acts Risk

Theft of IT resources, intentional misuse of IT resources, or intentional distortion or destruction of information may result in financial losses and/or misstated information that decision makers rely upon

51
New cards

Causes of fraud and malicious acts risk

Disgruntled employees and hackers intent on harming the organization for personal gain

52
New cards

Information technology controls

Categorized as a top-down hierarchy of IT governance, management, and technical controls

53
New cards

The top 6 layers of IT controls represent ...

IT general controls

54
New cards

The bottom layer of IT controls represent...

application controls

55
New cards

General controls

Apply to all computerized systems or applications. They include a mixture of software, hardware, and manual procedures that shape an overall control environment

56
New cards

Application Controls

Specific controls that differ with each computerized application

57
New cards

What are the general controls within governance?

Policies

58
New cards

What are the general controls within management?

- Standards

- Organization and management

- Physical and environmental controls

59
New cards

What are the general controls within technical?

- Systems software controls

- Systems development controls

60
New cards

What are commonly included in general controls? Controls over...

- Data center and network operations

- Systems software acquisition, change, and maintenance

- Access security

- Application system acquisition, development, and maintenance

61
New cards

The objectives of IT general controls...

to ensure the appropriate development and implementation of applications, as well as the integrity of program and data files and of computer operations

62
New cards

The most common IT general controls

- Logical access controls

- Systems development life cycle (SDLC) controls

- Program change management controls

- Physical security controls

- System and data backup and recovery controls

63
New cards

Logical Access Controls

limit access in accordance with the principle that all persons should have access only to the elements of the organization's information system that are necessary to perform their job duties

64
New cards

The dual focus of logical controls

- Authentication

- Authorization

65
New cards

Systems development life cycle controls and program change management controls

Ensure that operating systems, utilities, and database management systems are acquired and changed only under close supervision and that vendor updates are routinely installed

66
New cards

Physical Security controls

controls over the data center that limit physical access and environmental damage to computer equipment, data, and important documents

67
New cards

System and data backup and recovery controls

ensure access to data communications, work areas, and other business processes can be restored

68
New cards

Application Controls are designed to...

ensure that only correct, authorized data enter the systems and that data are processed and reported property

69
New cards

Application controls include...

input, processing, and output controls

70
New cards

The most common types of application controls

- Source document controls

- Batch input controls

- Online (real time) input controls

- Processing Controls

- Output controls

- Management trail controls

71
New cards

Batch Input Controls

- Financial totals

- Record counts

- Hash totals

72
New cards

Financial Totals

summarize monetary amounts in an information field in a group of records. The total produced by the system after the batch has been processed is compared to the total produced manually beforehand.

73
New cards

Record counts

track the number of records processed by the system for comparison to the number that the user expected to be processed

74
New cards

Hash Totals

an otherwise meaningless total that are used to verify the completeness of data

75
New cards

Batch Total

total of an amount included in each record batched for processing

76
New cards

Online (real time) input controls

- Completeness check

- Field/format checks

- Sign check

- Preformating

-Validity checks

- Check digits

- Limit (reasonableness) checks

- Range Check

- Sequence Checks

- Zero balance checks

- Input error correction

77
New cards

Processing Controls

Designed to prevent or detect and correct errors that occur during processing

78
New cards

Types of processing controls

- Run-to-run control totals

- Error listings

- Concurrency controls

79
New cards

Run-to-run control totals

Control totals are calculated and checked at designated points as transactions are processed

80
New cards

Error listings

automatically generated by the computer and errors identified are remediated expeditiously

81
New cards

Concurrency Controls

manage situations where two or more users attempt to access or update a file or database simultaneously. These controls ensure the correct results are generated while getting those results as quickly as possible.

82
New cards

Output controls

designed to ensure that application system outputs are valid, complete, and accurate and that security over outputs is properly maintained

83
New cards

Types of output controls

- Output review controls

- Distribution Controls

- End user controls

84
New cards

Output review controls

application system outputs are reviewed for validity, completeness, and accuracy before being distributed to users

85
New cards

distribution controls

Distribution of application system outputs is restricted to authorized recipients

86
New cards

end-user controls

end users review the application system outputs they receive for validity, completeness, and accuracy

87
New cards

Management trail controls

designed to provide a permanent record of input, processing, and output activity

88
New cards

Types of management trail controls

- Transaction Logging

- Programmed control logging

- Error listing retention

89
New cards

Transaction logging

the application system automatically logs the transactions processed

90
New cards

Programmed control logging

The application system automatically logs the imbedded controls executed during input, processing, and output

91
New cards

Error listing retention

The error listings generated and remediated during processing are retained

92
New cards

How many Global Technology Audit guides?

17