Identifying Risks Arising from the Use of Information Technology (RAIT)

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

flashcard set

Earn XP

Description and Tags

Vocabulary-style flashcards covering the foundations of RAIT, the auditor's role, IT department functions, application controls, and various CAATs as detailed in the lecture notes.

Last updated 5:27 AM on 5/2/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

44 Terms

1
New cards

Risks Arising from the use of IT (RAIT)

Risks to the integrity of information or control effectiveness caused by ineffective design or operation of an entity's IT processes.

2
New cards

Information-Processing Controls

Low-level, specific controls embedded within individual applications, such as an automated three-way match in a payables system.

3
New cards

General IT Controls (GITCs)

High-level, broad controls supporting the IT environment foundation, including password policies, backup procedures, and change management.

4
New cards

SAS No. 145 Mandate

An auditing standard requiring auditors to understand information flow and identify specific RAITs that could lead to material misstatements.

5
New cards

Interfaced Systems

Systems that communicate with each other via data transfers, increasing the risk assessment for RAIT.

6
New cards

Unauthorized Access (Cybersecurity)

A risk where external or internal parties gain entry to a system, potentially leading to data destruction or recording fictitious transactions.

7
New cards

Privileged Access Issues

A risk where users or IT staff have excessive access, such as an administrator able to both create users and approve transactions, breaking segregation of duties.

8
New cards

Master File Changes

Unauthorized edits to permanent data, such as supplier bank account details or customer credit limits, resulting in fraudulent payments.

9
New cards

Application Changes

Unauthorized or poorly tested software updates that may introduce errors or bypass controls, such as disabling a validation check.

10
New cards

Inappropriate Intervention

Manual overrides that bypass automated controls, such as forcing an invoice through without required approvals.

11
New cards

Data Loss

The inability to access data due to hardware failures or lack of backups, causing incomplete records for audit procedures.

12
New cards

Systems Analysis

The IT function responsible for designing information systems and determining how they meet operational needs.

13
New cards

Application Programming

The IT function that develops and codes computer programs based on system designs.

14
New cards

Database Administration

The IT function that designs, manages, and controls the organization's database to ensure organization and security.

15
New cards

Program and File Library

The IT function that protects system programs, master files, and important records from loss or unauthorized use.

16
New cards

Data Control

The IT function that reviews input procedures, monitors processing, manages exception reports, and distributes system outputs.

17
New cards

Systems Programming

The IT function that maintains and upgrades operating systems and ensures compatibility with application programs.

18
New cards

Quality Assurance (QA)

The IT function that tests systems to ensure they meet user requirements and documentation standards.

19
New cards

Continuous Monitoring

Regular IT assessment using performance measures, defect identification, and security monitoring for threats like cyberattacks.

20
New cards

Grandfather-Father-Son Principle

A backup retention principle using multiple generations of backups (daily,weekly,monthlydaily, weekly, monthly) to allow restoration to different points in time.

21
New cards

Reciprocal Agreement

A disaster recovery option where two entities agree to share backup facilities (also known as a Mutual Aid Pact).

22
New cards

Hot Site

A fully equipped backup facility with real-time data replication, offering minimal downtime at a high cost.

23
New cards

Warm Site

A partially equipped backup facility requiring setup and data restoration before use.

24
New cards

Cold Site

A basic backup facility with power and cooling but no equipment; the slowest and cheapest recovery option.

25
New cards

IT Application Controls

Controls embedded within software or transaction cycles to ensure authorization, completeness, accuracy, and validity of data.

26
New cards

Limit Test

An input control that checks upper or lower reasonableness limits, such as a transaction amount 1,000,000\le ₱1,000,000.

27
New cards

Validity Test

An input control that compares input against a master file or table to check if a code, such as a customer code, exists.

28
New cards

Self-Checking Digit

A redundant check digit embedded in an account number used to validate the number's accuracy.

29
New cards

Completeness Check

A control that verifies all required fields are supplied, triggering an error message if data is missing.

30
New cards

Control Total

The use of batch totals, such as financial totals or record counts, to verify that input amounts match the batch total.

31
New cards

Field Check

A control that checks for proper character types, such as ensuring an age field contains only numeric characters.

32
New cards

Field Size Check

A control ensuring data length is within specific limits, such as a phone number being exactly 1111 digits.

33
New cards

Logic Tests

Processing controls that reject illogical encoded data, such as an invoice date occurring after the payment date.

34
New cards

Auditing Around the Computer

A Black Box approach where the auditor ignores internal system logic and only examines inputs and outputs.

35
New cards

Auditing Through the Computer

A White Box approach where the auditor tests the internal logic and procedures of the IT system directly.

36
New cards

Computer-Assisted Auditing Techniques (CAATs)

Software tools used for detailed analysis of system configurations, vulnerabilities, and logs during an audit.

37
New cards

Code Review

A CAAT for program analysis that examines source code to detect errors, inefficiencies, or control weaknesses.

38
New cards

Parallel Simulation

A program testing CAAT where the auditor reprocesses client data using an independent program to compare results with the client's output.

39
New cards

Integrated Test Facility (ITF)

A CAAT that creating a dummy entity (Minicompany) within the live system to process test transactions alongside real data.

40
New cards

System Control Audit Review File (SCARF)

A log created by an embedded audit module used to collect specific transaction information for subsequent review.

41
New cards

Audit Hooks

Exit points in an application program used to activate audit modules for transaction tagging.

42
New cards

Generalized Audit Software (GAS)

Software that performs various audit tasks including sampling, calculations, and organizing digital audit files.

43
New cards

Automated Working Software

Microcomputer-based software used to generate trial balances, lead sheet schedules, and other digital workpapers.

44
New cards

Text Retrieval Software

Software used to access standard-setting bodies and accounting information databases for research.