Palmer AC 389 Exam 1

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

72 Terms

1
New cards

Internal Audit

Perform formal risk assessments when creating an audit plan

2
New cards

External Audit

Assess audit risks when creating audit plans

3
New cards

Controls

Specific procedures to assess and prevent risk

4
New cards

Risk

The likelihood of an unfavorable event occurring

5
New cards

Formal Risk Assessment

Identify, categorize, and prioritize individual risks so companies can leverage their understanding of risk in strategic planning. Companies want to be right in the middle where optimal risk taking sits. Not too much, not too little.

6
New cards

Business Function Level

A high-level business area or department that performs business processes to achieve company goals

7
New cards

Portfolio View

Examines risk at the entity level

8
New cards

Profile View

Examines risk at a more granular level of the business event, process, or event

9
New cards

Risk Statement

Contains two parts: the issue and the possible outcome. Presented in the format of "cause" and "effect" respectively

10
New cards

Internal Risks

Occur throughout a company's operations and arise during normal operations

11
New cards

External Risks

These risks are outside of the project, but directly affect it—for example, legal issues, labor issues, a shift in project priorities, or weather. "Force majeure" risks call for disaster recovery rather than project management. These are risks caused by earthquakes, tornadoes, floods, civil unrest, and other disasters.

12
New cards

External and Internal Risks can be further categorized by:

Six subcategories: Operational, Financial, Reputational, Compliance, Strategic, and Physical

13
New cards

Operational Risk (Internal)

The most important type of risk for an AIS, which occurs during day-to-day business operations and causes breakdowns in business activities. These risks are a priority for an AIS because they result from inadequate or failed procedures within the company.

14
New cards

Financial Risk (Internal)

Refers to money transitioning from within to outside of the company and the likelihood that a substantial sum may be lost.

15
New cards

Reputational Risk (Internal)

Occurs when the reputation/good name of a company is damaged.

16
New cards

Compliance Risk (External)

Occurs when a company fails to follow regulation and legislation and is subjected to legal penalties, including fines. (EPA)

17
New cards

Strategic Risk (External)

The inevitable risk that a strategy becomes less effective

18
New cards

Physical Risk (External)

Weather, crimes, and physical damage.

19
New cards

Risk Inventory

Once all risks have been categorized, this is basically a list of risks.

20
New cards

Risk Severity

The likelihood of risks occurring and their potential impact on the company

21
New cards

Risk Appetite

The amount of risk a company is willing to accept to achieve its goals and objectives. To avoid undue risk, risk appetite must be in alignment with company strategy.

22
New cards

Inherent Risk

the natural level of risk in a business process or activity if there are no risk responses in place

23
New cards

Residual Risk

The remaining risk after management has implemented risk responses and controls.

24
New cards

Responses to Risks

Accept, Avoid, Mitigate, Transfer/Share

25
New cards

Internal Controls

Processes that specifically mitigate risks to a company's financial information.

26
New cards

Function of a Control

Prevent, Detect, and Correct

27
New cards

Policy and Procedure Documentation

By specifying how employees should execute procedures and clarifying company policies, an organization lowers its risk of error and misconduct

28
New cards

Segregation of Duties

lessens the risk of error and fraud by ensuring that different employees are responsible for the separate parts of a business activity (Authorization, Recording Data, and Custody [of money])

29
New cards

Detective Controls

Controls designed to discover control problems that were not prevented (Cameras, physical invetory counts, reconciling the cash register, etc)

30
New cards

Corrective Controls

Controls designed to correct problems that have arisen (Insurance, police report, virus quarantine, etc)

31
New cards

Managment Override

Occurs when internal control activities don't work because management is not following policy or procedures. The Achilles Heel of fraud prevention (store writeoffs and price discounts).

32
New cards

Collusion

Two or more people acting in coordination to circumvent internal controls

33
New cards

Time-Based Model of Controls

Specific to the time it takes for a technology attack to bypass preventive controls compared to the company's detective and corrective control reaction times that measures the residual risk for technology attacks by comparing the relationship of the three control functions.

34
New cards

Physical Control

A control not in the computer environment (a lock on a door)

35
New cards

IT General Control or a IT Application Control

A control within the computer environment (firewall)

36
New cards

Systems Security

Controls embedded in the company's system specifically target the risk of external, unauthorized users performing malicious activities against company data or systems.

37
New cards

Data Backups

Previous/Alternate sets of the system that can be brought online to continue operations in the event of disaster.

38
New cards

Duplicate Environments

Changes to systems are not released to the software before they have been reviewed and approved. Instead changes are created in a duplicated environment - a copy - of the software.

39
New cards

Field Check

Characters in a field are of the proper type

40
New cards

Sign Check

Data in a field is appropriate sign (positive/negative)

41
New cards

Limit Check

Tests numerical amount against a fixed value

42
New cards

Range Check

Tests numerical amount against lower and upper limits

43
New cards

Redundant Check

Requires the inclusion of two identifiers in each input record

44
New cards

Size Check

Input data fits into the field

45
New cards

Completeness Check

Verifies that all required data is entered

46
New cards

Validity Check

Compares data from transaction file to that of master file to verify existence

47
New cards

Reasonableness Check

Correctness of logical relationship between two data items

48
New cards

Manual Controls

Requires human judgement or physical interaction is required.

49
New cards

Automatic Controls

Use technology to implement control activities

50
New cards

Continuous Monitoring

  1. Internal auditors, who are data analysts, use continuous monitoring technology to create detective controls that use rules-based programming to monitor a business's data for red flags or risks.

51
New cards

Business Operations

The 1st line of defense in the internal controls category. Management has the ownership and the responsibility of enforcing mitigating measures to prevent identified risk from occurring. This is where financial accountants, tax accountants, system analysists, and other accounting professionals who are not auditors or compliance officers work.

52
New cards

Risk Management and Compliance

The 2nd line of defence in the internal controls category. In many companies, ERM and compliance operation are combined, while in teams they might be separated departments. Accountants who specialize in compliance - such as designing and monitoring internal controls, performing risk assessments and responses, or assisting the legal team, work here.

53
New cards

Internal Audit (IA)

The 3rd line of defense in the internal controls category. IA is an independent function of the company that has a unique reporting relationship in an organization. IA is removed from the business process and has no stake in or influence over the outcome of the business processes that they are auditing. IA reports directly to both executive management and to the board of directors. Internal audit provides assurance, insight, and objectivity to a company.

54
New cards

Purchasing Process

also known as procurement process, is focused on acquiring the necessary resources for a business to operate

55
New cards

Inventory

Is a balance sheet line item that includes all items used in the creation of products. These can be classified as: Raw materials (RM),Work in process (WIP), and Finished Goods (FG).

56
New cards

Source Documents

Provide documenting of a transaction, such as a receipt, bill, or invoice, and may be electronic or paper documents, depending on the sophistication of the system

57
New cards

Purchase Requisition

An internal company document created when an employee formally requests to obtain goods and services from authorized sources

58
New cards

Purchase Order

A document created from the purchase requisition evolves into a legally enforceable purchase order.

59
New cards

Packing Slip

A document supplier delivers along with an order which shows quantities and descriptions of items delivered, to the receiving department at the specified warehouse location

60
New cards

Receiving Report

A document that shows the descriptions and quantities of goods received from vendors

61
New cards

Discrepancy Report

Identifying variances between the receiving report and the purchase order

62
New cards

Vendor Invoice

Bill from the vendor that includes the related purchase order number, billing date, description and quantities of goods, the amount due, and payment terms

63
New cards

Three-Way Match

The matching of a purchase order to the related receiving report and vendor invoice

64
New cards

Payment Voucher

An internal document that includes the vendor, amount due, and payment terms.

65
New cards

Remmitance Advice

Shows the invoices included in the payment to the vendor

66
New cards

Business-to-Consumer (B2C) Sales

Selling finished goods directly to customers

67
New cards

Business-to-Business (B2B) Sales

Selling finished goods to other businesses, like distributors and retail companies.

68
New cards

Marketing Deparments

Are generally responsible for marketing research, advertising, branding, promotional programs, and search engine optimization

69
New cards

Sales Orders

Are source documents that contain order details and are sent as order confirmations to customers.

70
New cards

Billl of Lading

A legal contract that defines responsibility for the goods in transit.

71
New cards

COSO

Control Environment, Risk Assessment, Control Activities, and Information & Communication

72
New cards

Risk Score

Impact * Likelihood