Chapter 13: Processing Integrity and Availability controls

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Crypto accounting treatment under IAS 38

Companies are to use the revaluation model as most companies hold crypto that is actively traded and fair value can be reliably measure.

2
New cards

How should Crypto gains be treated.

Recognize any FV movements above the cost in OCI through a revaluation surplus account.

3
New cards

How should Crypto losses be treated.

Fair value movements below the cost are recognized in profit or loss.

4
New cards

Processing integrity

Data are processed accurately, completely, timely, and only with proper authorization.

5
New cards

Availability

System and information are available to meet obligations.

6
New cards

Field Check

If characters in a field are of the proper type

7
New cards

Sign Check

If data in a field have appropriate sign (positive/negative)

8
New cards

Limit (Range) check

Tests numerical amount against lower and upper limits

9
New cards

Reasonableness test

Check correctness of logical relationship between multiple data items

10
New cards

Completeness check

Verifies that all required data are entered

11
New cards

Size check

Input data must fit into the assigned field

Prevent buffer overflow vulnerability

12
New cards

Validity check

Compares data in transactions with similar data in master files to verify the existence

13
New cards

Check digit verification

Recalculating “check digit” (e.g., the 10th digit) to identify data entry error

14
New cards

Closed-loop verification

Checks the accuracy of input data (e.g., account number) by using it to retrieve and display other related information (e.g., account name).

15
New cards

What are input controls used for?

Data entery Controls

16
New cards

What are the types of input controls

Field check, Sign check, Limit (Range) check, Reasonableness test, Completeness check, Size check, Validity check, Check digit verification and Closed-loop verification.

17
New cards

What are processing controls used for?

Ensure Processing Integrity

18
New cards

Data matching

Two or more items must be matched (e.g., invoice matches with purchase order and receiving report) before an action (e.g., payment) takes place

19
New cards

File labels

Programs should read the file header prior to processing, to ensure the correct file is used

20
New cards

batch totals

to ensure that ALL records in a batch are processed correctly:

  • Financial total

  • Hash total (for non-financial numerical field)

  • Record count

21
New cards

Cross-footing test

Verifies accuracy by comparing two alternative ways of calculating the same total

22
New cards

Write-protection mechanisms

Protect against overwriting or erasing data

23
New cards

Concurrent update controls

Prevent two or more users updating the same record at the same time

24
New cards

what are outputs controls used fro

detect processing errors

25
New cards

What do output controls detect?

User review of output;

Reconciliation within the system (e.g., general ledger reconciled to subsidiary ledgers);

External data reconciliation with data maintained outside the system (e.g., inventory physical count reconciled to quantities recorded in the database);

26
New cards

Data transmission controls

minimize errors during data transmission (e.g., checksums, blockchain).

27
New cards

Availability objectives

To minimize risk of system downtime

Quick and complete recovery and resumption of normal operations.

28
New cards

Availability Key Controls

Preventive maintenance, Fault tolerance, Data center location and design, Training, Patch management, antivirus software, Backup procedures, Disaster recovery plan (DRP), Business continuity plan (BCP)

29
New cards

Two objectives of recovery

recovery point objective (RPO) and Recovery time objective (RTO)

30
New cards

RPO

Determines how much data is potential lost and how much data can be lost

31
New cards

RTO

determines how long system is down for and how long they can be down for

32
New cards

What are the two main requriments when designing a plan

backup procedures (e.g., daily, hourly; incremental or differential)

disaster recovery plan (cold site, hot site, real-time mirroring)

33
New cards

How does clout computing help system availability

disaster recovery is set up in a different region. All data and apps are updated in real-time on both sites

34
New cards

Fault tolerance

system remain up despite failures of some components;

35
New cards

Scalability

during peak demand, cloud vendor can (automatically) add more resources, preventing crashes from overload

36
New cards

Disaster recovery

quickly recover from serious system disruptions