AIS Chapter 14 - Auditing IT Controls Part I: Sarbanes-Oxley and IT Governance

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

access controls

controls that ensure that only authorized personnel have access to the firm's assets

2
New cards

application controls

controls that ensure the integrity of specific systems (input, processing and output controls)

3
New cards

audit planning

the first step in the IT audit; the auditor gains a thorough understanding of the client's business. a major part of this phase is the analysis of audit risk

4
New cards

audit risk

probability that the auditor will render unqualified opinions on financial statements that are, in fact, materially mistated

5
New cards

computer fraud

theft, misuse, or misappropriation of assets by altering computer-readable records and files, or by altering the logic of computer software; the illegal use of computer-readable information; or the intentional destruction of computer software or hardware

6
New cards

control risk

the likelihood that the control structure is flawed because controls are either absent or inadequate to prevent or detect errors in the accounts

7
New cards

core competency

theory underlying outsourcing that posits an organization should focus exclusively on its core business competencies while allowing outsourcing vendors to manage non-core areas such as IT functions efficiently

8
New cards

corporate IT function

coordinating IT unit that attempts to establish corporatewide standards among distributed IT units

9
New cards

database management fraud

altering, deleting, corrupting, destroying, or stealing an organization's data

10
New cards

detection risk

the risk the auditors are willing to take that errors not detected or prevented by the control structure will also not be detected by the auditor

11
New cards

disaster recovery plan (DRP)

comprehensive statement of all actions to be take before, during, and after a disaster, along with documented, tested procedures to ensure the continuity of operations

12
New cards

empty shell or cold site

arrangement that involves two or more user organizations that but or lease a building and remodel it into a computer site, but without the computer and peripheral equipment

13
New cards

fault tolerance

ability of the system to continue operation when part of the system fails due to hardware failures, application program error, or operator error

14
New cards

general computer controls

specific activities performed by persons or systems designed to ensure that business objectives are met.

15
New cards

general controls

controls that pertain to entity-wide concerns such as controls over the data center, organization databases, systems development, and program maintenance

16
New cards

information technology controls

include controls over IT governance, IT infrastructure, security, and access to operating systems and databases, application acquisition and development and program changes

17
New cards

inherent risk

the risk associated with the unique characteristics of the business or industry of the client

18
New cards

IT outsourcing

contracting with a third-party vendor to take over costs, risks, and responsibilities associated with maintaining an effective corporate IT function, including management of IT assets and staff and delivery of IT services such as data entry, data center operations, applications development, applications maintenance, and network management

19
New cards

management assertions

combination of tests of application controls and substantive tests of transaction details and account balances

20
New cards

off-site storage

storage procedure used to safeguard the critical resources

21
New cards

program fraud

techniques such as creating illegal programs that can access data files to alter, delete, or insert values into accounting records; destroying or corrupting a program's logic using a computer virus; or altering program logic to cause the application to process data incorrectly

22
New cards

recovery operations center (ROC)

arrangement involving two or more user organizations that buy or lease a building or remodel it into a completely equipped computer site

23
New cards

redundant arrays of independent disks (RAID)

use of parallel disks that contain redundant elements of data and applications

24
New cards

scavenging

searching through the trash of a computer center for discarded output

25
New cards

specific IT assets

assets unique to an organization that support its strategic objectives; have little value outside of their current use; may be tangible, intellectual, or human

26
New cards

statement on standards for attestation engagements no. 16 (SSAE 16)

definitive standard by which client organizations' auditors can determine whether processes and controls at the third-party vendor are adequate to prevent or detect material errors that could impact the client's financial statements.

27
New cards

substantive tests

tests that determine whether database contents fairly reflect the organization's transactions

28
New cards

tests of controls

tests that establish whether internal controls are functioning properly

29
New cards

uninterruptible power supplies

technologies that prevent data loss and system corruption due to power failure

30
New cards

lower, less

The stronger the internal control structure, as determined through tests of controls, the ________ the control risk, and the ________ substantive testing the auditor must do.

31
New cards

System Administrator

Responsible for the administration of the system they control (database admin, network admin etc.

32
New cards

System programmers

people who maintain operating programs and related hardware

33
New cards

System Analyst

analyzing and designing new programs; work with end users on needs and lead programming team

34
New cards

Application Programmer

write the actual programs that process data and produce reports

35
New cards

Data control

A job in computer operations - controls flow of all documents into and out of computer operations; schedule batches through data entry, monitor batch and ensures that batch total reconcile.

36
New cards

Computer operators

A job in computer operations - responsible for the computer; load program and data files, run the programs and produce output

37
New cards

File librarian

A job in computer operations - responsible for control of the file library (where all program files are stored)

38
New cards

Internally provided backup or hot site

companies with multiple data processing centers may create internal excess capacity and allow or recovery and backup