P1 SEC E - Internal Controls

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/215

flashcard set

Earn XP

Description and Tags

This section looks at the creation of an effective corporate governance structure and the manner in which that structure provides oversight and monitoring of an organization's actions, policies, and decisions; several interrelated approaches to establishing control; the assessment and management of risk; the process of internal auditing and responsibilities of auditors; and measures taken to ensure the security and reliability of systems and the information they provide.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

216 Terms

1
New cards

Risk

Exposure to circumstances that may increase the likelihood of loss.

2
New cards

Audit risk

The likelihood that a company’s FS are materially misstated and the auditor expresses an inappropriate audit opinion. An inappropriate audit opinion can be extremely costly.

3
New cards

Data flow diagram

A graphical description of the source and destination of data that shows how data flows within an organization.

4
New cards

Rollback backup

This involves undoing changes to a database up to a point where it was known to function correctly.

5
New cards

Checkpoint backup

This is a process where data is backed up at pre-specified checkpoints.

6
New cards

Grandfather-father-son backup

Describes this process of maintaining at least three backups so data can be recreated from any of them.

7
New cards

Tax preparation services

These are not prohibited under the services that the Sarbanes-Oxley Act disallows to be provided to an audit client.

8
New cards

Limitations of an internal control system

  • Employees of a company colluding to commit fraud.

  • Existing controls are being purposefully overridden by management.

  • Rigid company policies and procedures that do not adapt to changes in the business environment.

  • Inappropriate human judgment, leading to faulty decisions.

9
New cards

Cloud storage

Refers to storage on the internet, through a cloud storage service provider. Storage limits depend upon the requirements of the user, hence large amounts of data can be stored. Employees will be able to access data and work from any location, with internet-connected devices.

10
New cards

Local Area Network (LAN)

Refers to a group of interconnected devices within a limited area. It is not used for storage, rather, it allows organizations to process and share information in a secured way.

11
New cards

Bot

An automated software program that performs repetitive, pre-determined tasks.

12
New cards

Whistleblower policy

Adopting a ________ is an effective way to show commitment toward integrity and ethical values, which is a crucial element of an internal control environment.

13
New cards

Internal controls that can be applied for managing funds at the point of sale

  • Customers should be encouraged to report to the store manager in case they are refused an invoice for their purchases.

  • Restricting the access to the cash drawers and emptying the drawers before the start of a new shift.

14
New cards

How COSO Components correlate with one another

Control environment and risk assessment can be considered as essentially strategic in nature, trying to pull together into one big picture the overview of the internal control systems.

While control activities and information and communication fall under operative, since they deal with the details of the internal control system disseminating information that is coming from the top.

Then the monitoring functions are the bridges in between these two, designed to ensure that these two groups are aligned; that the execution (operative) does not deviate from what is envisioned (strategic).

15
New cards

Why some physical assets and information are protected by different types and layers of controls

Although all assets and types of data are important, certain assets or information are more important and should therefore be secured by different types and layers of controls.

16
New cards

Role of Database administrator (DBA)

To manage the information system and provide support services to end users. When the database is small, they can also be responsible for database security by controlling access to the database, managing procedures for backup and recovery, and ensuring data integrity.

17
New cards

Skimming

A fraud scheme that involves an employee receiving cash payments from customers, recording the payment, and then charging an expense account. The employee can then divert the cash charged as an expense for personal gain.

18
New cards

Diversion of payment from slow-paying customers

This fraud scheme occurs when an employee writes off a doubtful account but subsequently receives payment from the same customer. If an employee also has custodial roles over cash receipts, he/she can steal the payment without anyone noticing.

19
New cards

Kiting

A method of fraud in which an employee can write checks and take advantage of clearing days to hide any amount embezzled.

20
New cards

Lapping

A scheme where cash payments from one customer are stolen, then the theft is hidden by offsetting the receivable using the payment of another customer who paid at a later time.

21
New cards

Compatibility check

The most appropriate control to verify that the user is authorized to execute a particular online transaction. It verifies the user information, such as user ID, password and security profile is correct.

22
New cards

Encryption techniques

  • Public & Private key

  • Authentication key

23
New cards

Operating system

When attempting to restore computing facilities at an alternate site following a disaster, this system should be restored first.

24
New cards

Develop unique account numbers for each user

The most appropriate technique to restrict access to computer programs and databases to authorized personnel.

25
New cards

Advantages & Disadvantages of Single Sign-on password

  • Convenient to users as it does not need to remember multiple passwords and user-IDs and can assess all IT resources using single sign-on data.

  • May become a single-point of failure if the sign-on does not work and the user is not able to access any of the IT resources.

26
New cards

Examples of processing, input, output controls

  • Transaction logs : processing control

  • Check digit and validity check : input controls

  • Spooling : output control

27
New cards

Document flowchart

An effective way to visualize how the document (a copy of a shipping order) flows through various departments.

28
New cards

COSO not required

FCPA does not specify the particular set of controls a company must implement. Other frameworks are permissible as long as they encompass the components of a control environment, risk assessment, information and communication procedures, monitoring activities and control procedures.

29
New cards

Replicate itself

A computer virus is different from a “Trojan Horse” because the virus can:

30
New cards

Key verification

In situations where it is crucial that data be entered correctly into an accounting information system, the best method of data control would be to use:

31
New cards

Internal control audit with FS audit

The U.S. Public Company Accounting Oversight Board (PCAOB) seeks to protect investors by requiring public companies to integrate:

32
New cards

Data control group

Responsible for reprocessing the errors detected during the processing of data within the computer department.

33
New cards

Reasonable assurance

The benefits of internal control must always exceed the costs of implementing them. Implementing a system of absolute assurance is costly; thus only ______ can be obtained.

34
New cards

Facility and hardware controls

Control access to the building, locate data center away from public areas, give access to only authorized personnel, use key codes or biometrics for entrance, etc.

35
New cards

Outside attorneys and consultants

All committees of the board should have access to _______ other than the corporation’s normal counsel and consultants.

36
New cards

Network controls

Use private network or use virtual private networks to secure connection to Internet, add password protection and require periodic password change, encrypt data before data transmission, ensure correct destination address by routing verification, verify message delivery via message acknowledgement, detect and defend attacks through virus protection software and firewall, alert intrusion by intrusion detection system, etc.

37
New cards

Backup controls

Include identification of vital systems to be backup regularly, development of disaster recovery plan, testing of backup communications and resources

38
New cards

Sound disaster recovery plan components

  • Establish priorities for recovery process

  • Identification of software and hardware needed for critical processes

  • Identify all data files and program files required for recovery

  • Store files in off-site storage Identify who has responsibility for various activities, which activities are needed first

  • Set up and check arrangements for backup facilities

  • Test and review recovery plan

39
New cards

Bank deposits not always correspond with cash receipts.

Cause: cash received after bank deposits.

Action: have a separate individual reconcile incoming cash receipts to bank deposits.

40
New cards

Physical inventory counts sometimes differ from perpetual inventory record, and sometimes there have been alterations to physical counts and perpetual records.

Cause: timing differences.

Actions: limit access to physical inventory, require and document specific approvals for adjustments to records,

41
New cards

Unexpected and unexplained decrease in gross profit percentage.

Causes: unauthorized discounts or credits provided to customers.

Actions: establish policies for discounts credits, document approvals.

42
New cards

Transaction processing controls

Include: passwords to limit access to input or change data, segregation of duties to safeguard assets, and control totals to ensure data accuracy.

43
New cards

Virus protection controls

Include: ensuring that latest edition of anti-virus software is installed and updated, firewalls set up to deter incoming risks, and limit internet access to business-related purposes to reduce chances of viruses.

44
New cards

Social engineering

Outside personnel posing as employees of the organization attempt to solicit confidential information from actual employees of the firm.  

45
New cards

Engagement letter

Outlines the scope, work, and processes to be undertaken by external auditors during the audit and should be signed by all involved parties.

46
New cards

Inherent and residual risks

These are elements that are relevant to assess the risk of an entity.

47
New cards

Elements relevant to assess the control activities of an entity

  • Independence checks on performance and adequacy of documents and records  

  • Physical control over assets, segregation of duties, and authorization of transactions

48
New cards

Elements relevant to assess the control environment of an entity

Ethical values, organizational structure, management philosophy, and operating style

49
New cards

Manual methods of input controls

  • Dual observation

  • Approval mechanism

  • Supervisory procedure

50
New cards

Detection & audit risk

By conducting the substantive test at the year end, the risk of non-detection of a material misstatement is largely reduced, thus, reducing the:

51
New cards

AS issued by the PCAOB apply only to issuers.

The most important distinction between auditing standards (AS) issued by the PCAOB and statements on auditing standards (SAS) issued by the ASB is:

52
New cards

Example of network control

An organization implementing a standardized password update policy for employees with access to sensitive information. Because passwords, whether there is a single or double factor authentication, provide a gateway for individuals to gain access to potentially sensitive information.

53
New cards

Similarities & difference between firewalls and antivirus software

Firewalls and antivirus software both play important roles in protecting computer networks. However, they perform different tasks. Firewalls prevent malicious information from entering a computer network while antivirus software isolates and removes corrupt files from a computer network. Both are needed to protect an organization’s computer network.

54
New cards

Audit subcommittee of the Board

The internal audit function should report to the _______ to create a business environment that is ethical in nature, and supportive of employees reporting possible unethical behavior, a control system is necessary.

55
New cards

Authorization, recording, custody and reconciliation

The principle of segregation of duties calls for the separation of which of these sets of responsibilities.

56
New cards

Validity check

A test which ascertains whether data adheres to specified rules or standards. The company could create a list of existing job numbers and disallow data entry if new jobs use a previously used job number.

57
New cards

Hash totals

A sum of numbers in a specified field of a record or batch of records that is used for control purposes. Distinguishable from other totals because it does not have any financial significance.

58
New cards

Negative implication of having a system with single sign-on functionality

If an employee password is hacked or stolen, an unauthorized person can gain access to multiple systems or datasets within the organization.

59
New cards

Circle

Represents a connector to a different element on the flowchart.

60
New cards

Diamond

Denotes a point of decision on the flowchart. For example, the customer will be approved or declined in a credit check.

61
New cards

Rectangle

Denotes a process on the flowchart.

62
New cards

Cylinder

Refers to a database or magnetic disk storage on the flowchart.

63
New cards

Limit check

Ensures that only data which falls within a pre-defined limit is entered into the system.

64
New cards

Completeness

The use of prenumbered sales invoices support ________. A company uses prenumbered sales invoices to ensure that all sales are accounted for. If sales invoices are prenumbered, it is easier to check and trace which sales were skipped or missed.

65
New cards

Check digit

A form of redundancy check to establish if a number is entered correctly. This check is used to find out typo errors when numbers are entered into a system.

66
New cards

Controls related to safeguarding of assets

  • Physical stock-taking will help in keeping track of all assets and will help in the reconciliation of recorded inventory and actual physical inventory.

  • Labeling, numbering, and tagging of assets help in keeping track of all assets.

  • Perform background checks on all employees, as such checks help in establishing the honesty and integrity of employees. The chances of misappropriation of assets are reduced if employees are honest with high moral values.

67
New cards

Limitation of firewalls

Firewalls primarily help protect against malicious traffic, but not against malicious programs. Hence, if the user accidentally installs malware, the firewall cannot stop it from making changes to the system.

68
New cards

FCPA Requirement concerning internal controls

An issuer should maintain a system of internal controls that provide reasonable assurance that financial objectives are met.

69
New cards

Balancing

A processing control that refers to validating the accuracy of values that refer to the same set of transactions by comparing their totals.

70
New cards

Standardization

A processing control that refers to procedures developed to improve consistency in transaction processing.

71
New cards

Redundant processing

A processing control where transactions are processed twice, and results are compared to check the correctness of the procedure.

72
New cards

Matching

A processing control thar refers to the process of comparing items from independent sources to ensure the accuracy of the amounts indicated.

Ex. In settling accounts payable, an accounting clerk compares the purchase order, receiving report, and supplier's invoice to make sure the amounts align and avoid events of fraud and overpayments.

73
New cards

Bugging

An act of planting a microphone or a camera with an intention of spying on individuals or companies.

74
New cards

Denial of Service

A form of cyber-attack in which a network or a website is disabled or disrupted, making them unavailable for legitimate users.

75
New cards

Spamming

Refers to the act by an individual or a company sending emails in bulk to other individuals, thus, creating “digital junk”.

76
New cards

Cost-benefit relationship

A primary criterion that should be considered in designing an internal control.

77
New cards

Firewall vulnerability

Can be minimized by requiring all employees accessing the information systems to use passwords.

78
New cards

External audit function

Should conduct risk assessment procedures, and then conduct appropriate levels of analytical procedures and substantive tests of both financial and nonfinancial information.

79
New cards

Risk to internal controls that can occur during the merger and acquisition process

Due to the many changes in the reporting process that occur during a merger or acquisition, there is a serious risk that controls may be ignored or overwritten.

80
New cards

Purpose of disaster planning

To minimize potential losses and disruption of business activities.

81
New cards

Why the roles of the Chairman and CEO should be separated

To avoid conflict of interest and ensure that too much power is not vested with one individual.

82
New cards

Management is dominated by one individual.

Management philosophy and operating style would most likely have a significant influence on the entity's control environment when:

83
New cards

Risk associated with automation over the accounting process

Automation may, either by accident or through collusion, lead to violations of internal control policies and procedures.

84
New cards

Factors can lead to violation of the FCPA

  • Failure to authorize and trace payments made by employees to outsiders.

  • Failure to inventorize company assets and reconcile them on a regular basis.

  • Failure to record transactions in accordance with relevant accounting standards.

85
New cards

Bonding employees

Helps protect the organization in the case of unethical or fraudulent activity by employees tasked with handling cash.

86
New cards

Nature of internal controls over financial reporting and safeguarding of assets

As the entity grows, management becomes more reliant on the efficacy of its internal controls to help ensure accurate and reliable financial reports are generated, and risks of misstatement are held to tolerable levels even with an increasing volume of transactions and compliance requirements.

87
New cards

Authorize transactions and record cash disbursements.

Proper segregation of duties reduces the opportunities to allow individuals to be in positions to both:

88
New cards

How technology controls and procedures should be updated

Technology, including technology controls, should be updated at a continuous rate to reflect and align with changes in the technology landscape.

89
New cards

Component

The control environment is a _______ of an organization’s internal control system.

90
New cards

Cross-training

Enables different employees to review different types of work performed by other employees to prevent unethical activity.

91
New cards

How agency problems can be mitigated

By compensating trustees with financial and nonfinancial incentives to influence their behavior and mindset.

92
New cards

Anonymous employee hotline/portal

Helps improve culture and governance since employees can report possible unethical activity without the fear of negative repercussions.

93
New cards

Tone at the top

The philosophy of management toward internal controls and how the organization operates, and it is embodied both via training and specific policies.

94
New cards

Top-down, risk-based approach

A required approach for external auditors to attest to and report on public firms’ internal controls over financial reporting.

95
New cards

Audit risk model

Inherent risk x Control risk x Detection risk

96
New cards

Personnel Controls

  • Hiring

  • Training

  • Job Rotation & Mandatory vacations

97
New cards

Sarbanes-Oxley Act of 2002 (SOX)

Corporate governance today is heavily influenced by this, which improved corporate governance standards.

  • 201 → No side jobs

  • 203 → Rotate every 5 years

  • 301 → Committee independence

  • 302 → CEO signs

  • 404 → Controls established

  • 407 → Expert present

98
New cards

Audit committee

Responsible for the oversight of the financial reporting process. For the companies that have an internal audit function, the internal auditors should report directly to them. Also responsible for hiring independent external auditors.

99
New cards

CSR

In addition to generating a profit for shareholders, BOD often encourage good ______ activities that address the needs of other corporate stakeholders.

100
New cards

Top management

Has a strong influence on the culture and philosophy of a company, which impacts the effectiveness of internal controls.