ACCT 333- Quiz 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

71 Terms

1
New cards

code of ethics

A formal expectation on what is considered to be ethical within an organization to promote ethical behavior; considered a form of internal control

2
New cards

What requires companies and their auditors to assess and report on the design and effectiveness of internal controls AND what did it establish?

SOX, PCAOB

3
New cards

Public Company Accounting Oversight Board

provides oversight of public company auditors, sets auditing standards oversees quality controls of public accounting firms

4
New cards

corporate governance

a set of processes and policies in managing an organization with sound ethics to safeguard the interests of stakeholders

5
New cards

Internal controls are…

processes that an organization implements to safeguard assets, provide accurate and reliable information, promote operational efficiency, enforce prescribed managerial policies and comply with applicable laws and regulations

6
New cards

Establishing and maintaining internal controls are ___________'s responsibilities.

management

7
New cards

preventive, detective, corrective

3 types of control

8
New cards

preventive

deter problems before they arise

9
New cards

detective

find problems when they arrive

10
New cards

corrective controls

Fix problems that have been identified, such as using backup files to recover corrupted data.

11
New cards

________ pertain to enterprise wide issues such as controls over accessing the network, developing and maintaining applications, and documenting changes of programs.

general controls

12
New cards

application controls

Controls specific to a subsystem or an application to ensure the validity, completeness, and accuracy of the transaction.

13
New cards

This internal control is a process, affected by the organization, to provide reasonable assurance regarding the achievement of: effectiveness/efficiency of operations, reliability of reporting, compliance with applicable laws and regulations

COSO Internal control framework

14
New cards

COSO internal control framework objectives?

operations, reporting, compliance

15
New cards

control environment, risk assessment, control activities, information and communication, monitoring

COSO Internal Control Framework components?

16
New cards

control environment

sets the tone for the organization, influences the control consciousness of employees, and is the foundation for all other components

17
New cards

Control environment factors?

management's philosophy and operating style, integrity and ethical values of employees

18
New cards

risk assessment

management should take steps to identify, properly assess and manage internal and external risks; focuses on likelihood and impact of risks

19
New cards

control activities

specific actions taken to help ensure that management directives are carried out; prevent, detect and correct errors and frauds

20
New cards

information and communication

managers must have access to timely, reliable and relevant information; communication includes report production and distribution

21
New cards

monitoring

mgmt must assess the quality of its internal controls on a continuous bases; ongoing and separate evaluations, reporting any deficiencies

22
New cards

enterprise risk mgmt

a process designed to identify potential events that may affect the entity and to manage those risks

23
New cards

internal environment, objective setting, event id, risk assessment, risk response, control activities, info and comm, monitoring

Components of COSO ERM Framework

24
New cards

likelihood and impact

Risk should be assessed from two perspectives:

25
New cards

reduce risks by applying effective controls, share by outsourcing, avoid by not engaging, accept risk

Options for Risk response

26
New cards

inherent risk

risk related to the nature of the business activity

27
New cards

control risk

threat that errors or irregularities in the transactions will not be prevented, detected, and corrected by the control system

28
New cards

residual risk

risk that remains after management's response to the risk or after control are put in place to address the risk

29
New cards

separation of duties

division of responsibilities/tasks the purpose of which is to limit the ability of one person to control a transaction from start to finish

30
New cards

authorization, recording, custody

Separation of duties components ?

31
New cards

IT general controls

apply to all applications and ensure they operate properly- enterprise level

32
New cards

IT application controls

steps within the software and related procedures to control processing

33
New cards

input

ensure that data received for processing have been authorized and converted to machine-readable form properly

34
New cards

processing

ensure that data has been processed as intended

35
New cards

output

ensure that only authorized persons receive reports or have access to output files

36
New cards

field, size, range, validity, completeness, reasonableness check

examples of input controls

37
New cards

prenumbered documents, sequence checks, batch totals, concurrent update controls

examples of processing controls

38
New cards

output controls

ensures output is provided only to authorized employees and is used and disposed of properly

39
New cards

COSO ERM

A process, affected by the entity's board of directors, management, and other personnel, applied in strategy setting and across the enterprise, designed to identify potential events that may affect the entity, and manage risk to be within the risk appetite, to provide reasonable assurance regarding the achievement of objectives.

40
New cards

governance, culture, strategy, objective setting, performance, review, info, communication

What are the components of COSO ERM?

41
New cards

Control Objectives for Info. Tech (COBIT)

provides a supporting toolset that bridges the gap among IT control requirements, technical issues and business risks

42
New cards

to protect confidentiality, integrity, availability

What are the main goals of information security and systems integrity?

43
New cards

virus, worm, trojan horse, span, spoofing, etc

What are some examples of information security risks and attacks?

44
New cards

encryption

provides confidentiality and privacy for data transmission and storage

45
New cards

key length, encryption algorithm, key management

What are the main factors for encryption?

46
New cards

symmetric encryption

sender and receiver use the same key; fast and good for large data sets

47
New cards

asymmetric encryption

sender uses a public key but receiver uses a private key; slow so not good for large data sets, but more secure

48
New cards

authentication

process that establishes the origin of information or determines the identity of a user, process or device

49
New cards

digital signature

a message digest of a document or data file that is encrypted using the creator's private key

50
New cards

data integrity

Maintaining and assuring the accuracy and consistency of data during transmission and at storage.

51
New cards

message digest

A short code, such as one 256 bits long, resulting from hashing a plaintext message using an algorithm

52
New cards

description of system and evaluation of controls

What are the 2 criteria of cybersecurity risk management framework?

53
New cards

fraud

any intended illegal act characterized by deceit, concealment or violation of trust

54
New cards

incentive, opportunity, rationalization

What is in the fraud triangle ?

55
New cards

physical intrusion, natural disasters, excessive heat, flooding, etc.

Types of vulnerabilities within the physical IT environment?

56
New cards

system intrusion, logical access failure, interruption of a system

Types of vulnerabilities within an information system?

57
New cards

social engineering, unintentional disclosure, intentional destruction

Types of vulnerabilities within the IT processes ?

58
New cards

vulnerability identification assessment

IT asset inventory, threat identification

59
New cards

vulnerability assessment and prioritization

What are the 2 parts of vulnerability risk assessment?

60
New cards

risk response plan, policy and requirements, control implementation

What are examples of vulnerability management remediation?

61
New cards

monitoring, ongoing assessment, continuous improvement

What are vulnerability management maintenance examples?

62
New cards

availability

making sure data is available at all times or at least when needed

63
New cards

System and Organization Controls (SOC)

reports are prepared after an accounting firm/auditor examines an organization's control ; gives assurance that controls are designed and functioning adequately

64
New cards

SOC 1

examines a service organization's internal controls relevant to the user organization's financial reporting; considered an auditor-to-auditor report

65
New cards

SOC 1 Type 1

(1) fairness of the presentation of management's description of the organization's systems and (2) suitability of the design of the controls at a specified date

66
New cards

SOC 1 Type 2

same as Type 1 but for a specified period

67
New cards

SOC 2

examines service organization's controls relevant to confidentiality or privacy; considered a report for institutional users, not public

68
New cards

SOC 3

Examines service organizations based on Trust Services criteria; intended for the general public

69
New cards

Disaster Recovery Planning

identifies significant events that may threaten an organization's operations; outlines procedures to ensure that the org will be able to resume operations

70
New cards

key personnel, resources, actions to be carried out

DRP must have a clearly defined and documented plan that covers:

71
New cards

business continuity management

activities required to keep an organization running during a period of interruption of normal operations