Auditing in a CIS (IT) Environment

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/48

flashcard set

Earn XP

Description and Tags

Flashcards on Auditing in a CIS (IT) Environment, Risk Assessments, and Internal Control.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

49 Terms

1
New cards

Characteristics of a CIS organizational structure

Concentration of functions and knowledge, and concentration of programs and data.

2
New cards

Absence of input documents in CIS processing

Data may be entered directly into the computer system without supporting documents.

3
New cards

Lack of visible audit trail in CIS processing

The transaction trail may be partly in machine-readable form and may exist only for a limited period.

4
New cards

Lack of visible output in CIS processing

Certain transactions or results of processing may not be printed, or only summary data may be printed.

5
New cards

Ease of access to data and computer programs in CIS

Data and computer programs may be assessed and altered at the computer or through computer equipment at remote locations.

6
New cards

General CIS Controls

Establish a framework of overall control over CIS activities to provide reasonable assurance that internal control objectives are achieved.

7
New cards

Organization and management controls in CIS

Designed to define strategic direction and establish an organizational framework over CIS activities.

8
New cards

Development and maintenance controls in CIS

Designed to provide reasonable assurance that systems are developed, acquired, implemented, and maintained in an authorized and efficient manner.

9
New cards

Delivery and support controls in CIS

Designed to control the delivery of CIS services.

10
New cards

Monitoring controls in CIS

Designed to ensure that CIS controls are working effectively as planned.

11
New cards

CIS Application Controls

Establish specific control procedures over application systems to provide reasonable assurance that all transactions are authorized, recorded, and processed completely, accurately, and on a timely basis.

12
New cards

Controls over Input in CIS

Ensure transactions are authorized, accurately converted, and not lost, added, or duplicated.

13
New cards

Controls over processing and computer data files in CIS

Ensure transactions are properly processed and that processing errors are identified and corrected.

14
New cards

Controls over output in CIS

Ensure results of processing are accurate, access is restricted, and output is provided to authorized personnel.

15
New cards

Various configurations of a personal computer (PC)

Stand-alone workstation, workstation part of a LAN, workstation connected to a server.

16
New cards

On-line computer systems

Enable users to access data and programs directly through terminal devices.

17
New cards

Functions users can directly initiate in on-line systems

Entering transactions, making inquiries, requesting reports, updating master files, electronic commerce activities.

18
New cards

On-line/real time processing

Individual transactions are entered at terminal devices, validated, and used to update related computer files immediately.

19
New cards

On-line/batch processing

Individual transactions are entered at a terminal device, subjected to validation checks, and added to a transaction file. Later, the transaction file updates the master file.

20
New cards

Network environment

Communication system that enables computer users to share computer equipment, application software, data, and voice and video transmissions.

21
New cards

File server

Computer with an operating system that allows multiple users in a network to access software applications and data files.

22
New cards

Basic types of networks

Local area network (LAN), Wide area network (WAN), Metropolitan area network (MAN).

23
New cards

Database

Collection of data that is shared and used by many different users for different purposes.

24
New cards

Database management system (DBMS)

Software that creates, maintains, and operates the database

25
New cards

Characteristics of database systems

Data sharing and Data independence.

26
New cards

Software

Computer programs which instruct the computer hardware to perform the desired processing.

27
New cards

Operating System

Controls the functioning of the CPU and its peripheral equipment.

28
New cards

Multiprogramming

Processes a program until an input/output operation is required.

29
New cards

Multiprocessing

Multiple CPUs process data while sharing peripheral devices, allowing two or more programs to be process simultaneously.

30
New cards

Virtual Storage

The operating system separates user programs into segment pages automatically.

31
New cards

Database Management System (DBMS)

Software package for the purpose of creating, accessing, and maintaining a database.

32
New cards

Electronic Data Interchange (EDI)

Electronic exchange of transactions, from one entity’s computer to another entity’s computer through an electronic communications network.

33
New cards

Authentication in EDI

Controls must exist over the origin, proper submission, and proper delivery of EDI communications to ensure that the EDI messages are accurately sent and received to and from authorized customers and suppliers.

34
New cards

Encryption in EDI

Involves conversion of plain text data to cipher text data to make EDI messages unreadable to unauthorized persons.

35
New cards

Auditing around the computer

The auditor ignores or bypasses the computer processing function of an entity’s EDP system.

36
New cards

Auditing with the computer

The computer is used as an audit tool.

37
New cards

Auditing through the computer

The auditor enters the client’s system and examines directly the computer and its system and application software.

38
New cards

Program analysis

Techniques that allow the auditor to gain an understanding of the client’s program.

39
New cards

Code review

Involves actual analysis of the logic of the program’s processing routines.

40
New cards

Comparison programs

Programs that allow the auditor to compare computerized files.

41
New cards

Flowcharting software

Used to produce a flowchart of a program’s logic and may be used both in mainframe and microcomputer environments.

42
New cards

Program tracing

Technique in which instruction executed is listed along with control information affecting that instruction.

43
New cards

Program mapping

Identifies sections of code which may be potential source of abuse.

44
New cards

Snapshot

Technique that “takes a picture” of the status of program execution, intermediate results, or transaction data at specified processing points I the program processing.

45
New cards

Program testing

Involves the use of auditor-controlled actual or simulated data.

46
New cards

Historical audit techniques

Test the audit computer controls at a point in time.

47
New cards

Test data

Set of dummy transactions specifically designed to test the control activities that management claims to have incorporated into the processing programs.

48
New cards

Integrated test facility (ITF)

Variation of test of data whereby simulated data and actual data are run simultaneously with the client’s program and computer results are compared with auditor’s predetermined results.

49
New cards

Parallel simulation

Involves of processing client’s live (actual) data utilizing an auditor’s generalized audit software.