Auditing IT Governance Controls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

30 Terms

1
New cards

It is a subset of corporate governance that focuses on the management and assessment of strategic IT resources.

IT Governance

2
New cards

Key objectives of IT Governance

reduce risk and ensure investment in IT resources add value to the corporation

3
New cards

They must be active participants in key IT decisions

All corporate stakeholders

4
New cards

Components of IT Governance Controls

  • Policies and procedures

  • Risk Management

  • Compliance

  • Decision-making Processes

  • Performance Monitoring and Measurement

  • Resource Management

  • Security Controls

  • Change Management

  • Communication and Collaboration

5
New cards

Three IT governance issues addressed by SOX and the COSO internal control framewok:

  1. Organizational structure of the IT function

  2. Computer center operations

  3. Disaster recovery planning

6
New cards

It is a US Federal Law enacted to protect investors by improving the accuracy and reliability of corporate disclosures.

Sarbanes-Oxley Act of 2002

7
New cards

Components of Sarbanes-Oxley Act of 2002

  1. Control Environment

  2. Risk Assessment

  3. Control Activities

  4. Information and Communication

  5. Monitoring Activities

8
New cards

They are responsible for establishing and maintaining adequate internal control over financial reporting

Management

9
New cards

They must attest to and report on management’s assessment of internal control effectiveness

Auditors

10
New cards

It helps organizations achieve their objectives by providing a comprehensive structure for designing and evaluating internal controls, enhancing the effectiveness and efficiency of operations, ensuring the reliability of financial reporting, safeguarding assets from loss and misuse, and ensuring compliance with laws and regulations

COSO

11
New cards

Under this model, all data processing performed at a central site

centralized data processing model

12
New cards

They compete for resources based on need

End users

13
New cards

In this model, two control problems with segregating systems analysis from applications programming

Alternative Organization of Systems Development

14
New cards

Relationship between groups should be formal and responsibilities should not be comingled (T/F)

True

15
New cards

He is responsible for many critical tasks and needs to be organizationally independent of operations, systems development and maintenance

Database Administration

16
New cards

This model involves reorganizing central IT function into small IT units that are placed under the control of end users.

Distributed Data Processing (DDP)

17
New cards

Variant of centralized model with terminals or microcomputers distributed to end users for handling input and output

Alternative A

18
New cards

It distributes all computer services to the end users where they operate as stand alone units.

Alternative B

19
New cards

Inventories listed on the balance sheet exist

Existence or occurence

20
New cards

Accounts payable include all obligations to vendors for the period

Completeness

21
New cards

Plant and equipment listed in the balance sheet are owned by the entity

Rights and obligations

22
New cards

Accounts receivable are stated at net realizable value

Valuation or Allocation

23
New cards

Contingencies not reported in financial accounts are properly disclosed in footnotes

Presentation and disclosure

24
New cards

Directly affects risk of destruction from a disaster.

Physical location

25
New cards

It is a statement of all actions to be taken before, during and after any type of disaster

Disaster Recovery Planning

26
New cards

It is an agreement between organizations to aid each other with data processing in a disaster

Mutual aid

27
New cards

It involves obtaining a building to serve as a data center in a disaster

Empty shell or cold site

28
New cards

It is fully equipped site that many companies share

Recovery Operations Center or Hot Site Plan

29
New cards

It suggests firms should retain specific non-core IT assets in house

Transaction cost economics (TCE)

30
New cards

Risk inherent to IT Outsourcing

  • Failure to perform

  • Vendor exploitation

  • Outsourcing costs exceed benefits

  • Reduced security

  • Loss of strategic advantage