Chapter 9 and 10 for Accounting Information Systems

0.0(0)
studied byStudied by 7 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/111

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

112 Terms

1
New cards

Internal controls

 implements internal controls to minimize risks. Internal controls involve implementing procedures and policies so the organization’s objectives can be achieved. (Designed well and operating well.)

2
New cards

Errors

unintentional mistakes

3
New cards

Irregularities

 Intentional and deliberate problems.

4
New cards

The quality of an organization’s internal control affects not only the reliability of its financial information but also the ability of the organization to make good decisions and remain in business.

Why internal control is important.

5
New cards

COSO

Committee of Sponsoring Organizations of the Treadway Commission. Sponsored by 5 organizations: AAA (American Accounting Association), AICPA (American Institute of Certified Public Accountants), FEI (Financial Executives International), the Institute of Internal Auditors (IIA), and the IMA (Institute of Management Accountants).

6
New cards

1.Control environment, 2. Risk assessment, 3. Existing control activities, 4. Information and communication, 5. Monitoring activities

5 Components of Internal Control:

7
New cards

Control Environment

The organization’s attitude toward internal control.

8
New cards

Risk Assessment

The process of thinking about what can go wrong.

9
New cards

Existing Control Activities

Help reduce the risks.

10
New cards

Information and communication

Ensure that everyone understands the policies and procedures relating to internal controls.

11
New cards

Monitoring activities

The continuing assessment of internal controls.

12
New cards

 entity-level controls

The control environment, risk assessment, information and communication, and monitoring are referred to as… because they apply to the entire organization.

13
New cards

control activities

Transaction cycle controls are known as … since they apply to the specific cycle.

14
New cards

1.Governance and Culture; 2.Strategy and Objective-Setting; 3.Performance; 4.Review and Revision; 5.Information, Communication, and Reporting.

5 Components of COSO frameworks

15
New cards

tone at the top

An organization requires proper governance oversight by the board as well as an adequate control environment to be established by management. Together the board and management establish attitudes and create standards of conducting business.

16
New cards

ethical values, the board of directors, management’s style and philosophy, the organizational structure, the assignment of authority, and the commitment to ensuring employee competence.

What is the control environment influence by

17
New cards

Managerial integrity requires a commitment to doing the right thing. When people in the organization know that ethical standards will be enforced, the likelihood that employees will engage in improper or illegal activities is lower.

What is management’s responsibility?

18
New cards

1.Estimating the potential loss or exposure from the problem.” 2.“The probability or likelihood of occurrence.”

2 parts to the assessment of risk

19
New cards

Expected Loss

Expected loss= Exposure * Probability of Occurrence.

20
New cards

Risk

The possibility that an event will occur and negatively affect the organization from achieving its goals

21
New cards

Consequences of inadequately controlled risks

 critical information is unavailable; bad decisions made on faulty data; resources are lost, wasted, or abused; management spends unnecessary time dealing with problems; public credibility is tarnished; employee and management turnover increases; litigation against the company occurs; investors and creditors become unwilling to provide financing; the company files for bankruptcy.”

22
New cards

1.Avoid the risk,2.Accept the risk,3.Mitigate the risk, 4.Share the risk

4 ways of responding to risk

23
New cards

Sharing the risk

requires the organization to use different options that reduce its exposure to a risk that results from engaging in a business activity. This can be done by buying insurance, hedging, or outsourcing.

24
New cards

Inherent Risk

“Risk that is faced prior to taking action.”

25
New cards

Residual Risk

Risk that remains after management takes action to respond to the risks, threats, and counteractions.

26
New cards

Control activities

used in addition to the control environment to achieve objectives at the accounting application level.  “Reconciling the bank account”, “Comparing the physical inventory to the system inventory records”, “Completeness check in a web form to ensure that all required fields are completed before a customer clicks the submit button”, “Credit checking a new customer before approving a sales order”, “Approving a journal voucher”.

27
New cards

Management must document control activities + findings of its review

The documentation should include both entity-level and activity-level controls. Entity-level control is important because it is intended to reduce risk across the entire organization.” Affects the entire accounting system.“In addition, management must document the findings of its review, whether any control deficiencies were noted, and if so, what corrective action was taken.” It should include “a policy and procedure manuals, flowcharts, job descriptions, and internal control questionnaires.

28
New cards

Collusion

A company could assign one person to oversee another or to maintain records on someone else’s activities only to find out later that the two employees worked together to defeat the system.

29
New cards

Management Override

A ‘perfectly’ good system can be ignored by someone in authority by simply telling an employee to suspend or disregard a procedure for some supposedly ‘good’ reason or by just deciding to override the control themselves.

30
New cards

Fraud

“when there is intent to deceive for personal gain. Accountants must be aware of two potential types of fraud: 1. Misappropriation of assets and 2. Financial statement fraud.

31
New cards

Misappropriation of assets

are related to theft of an organization’s assets, such as cash or inventory.” Ex: Theft of inventory.

32
New cards

Embezzlement

which is where bookkeepers write checks to themselves for fictitious business expenses, is also a misappropriation of assets.

33
New cards

Financial Statement Fraud

is where management misrepresents the financial statements.

34
New cards

1.Pressure ( the motive to commit the fraud), 2. Opportunity (the availability to commit the fraud), 3. Rationalization (reasoning to commit the fraud.)

3 components for fraud to occur:

35
New cards

Fraud Triangle

Requires all three elements, pressure, opportunity, and rationalization, to commit fraud.

36
New cards

Segregation of Accounting Duties

Used to minimize errors and fraud; different individuals should be responsible for each of the three major activities of a transaction: approval, recordkeeping, and custody.

37
New cards

Approval function (Revenue Cycle)

 receiving orders for sales and granting credit

38
New cards

Recordkeeping function (Revenue Cycle)

 Billing customers and recording sales, maintaining inventory records, maintaining general ledger accounting records, and maintaining detailed accounts receivable records

39
New cards

Custody function (Revenue Cycle)

Shipping goods and processing cash receipts

40
New cards

Approval function (Expenditure Cycle)

 purchase orders and vendor payments.

41
New cards

Recordkeeping function (Expenditure Cycle)

record vendor invoice, maintain inventory records, maintain general ledger accounting records, and maintain detailed accounts payable records.

42
New cards

Custody function (Expenditure Cycle)

receiving goods and processing cash payments.

43
New cards

1.Ongoing evaluations, 2. separate evaluation, 3. Combination

3 ways that monitoring can be done:

44
New cards

Unintentional threat

Malicious link that downloads files or deletes them by mistake. Power outages as well.

45
New cards

Intentional threat

security threats to the IT system, such as outsiders (or inside employees) hacking into the system and gaining access to unauthorized files.

46
New cards

SEC

 is concerned about keeping investors informed about cybersecurity and providing guidance for publicly held companies by discussing threats and disclosing material events impacted by cybersecurity. Has the right to issue an enforcement action against a company for failure to protect customer data.

47
New cards

8-K report

These disclosures are important because investors need to be aware of the risk and probability of a cybersecurity risk affecting costs.”

48
New cards

PCAOB

Regulates auditors and has given guidance that auditors need to consider cybersecurity risks as it relates to the financial reporting risk of the companies they audit.

49
New cards

COBIT

created by the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute (ITGI). Has governance objectives and management objectives.

50
New cards

Evaluate, Direct, and Monitor

This government objective is focused on evaluating strategy with executive management and monitoring strategy performance.

51
New cards

Align, Plan, and Organize

This management objective addresses the need for a technology strategic plan and organization of the IT function.

52
New cards

Build, Acquire, and Implement

This management objective deals with the need for sound practices in acquiring and implementing new hardware and software

53
New cards

Deliver, Service, and Support

This management objective addresses the need for a clear definition of the IT services provided and the availability of training and help

54
New cards

Monitor, Evaluate, and Access

This management objective is the process for making sure that the IT governance and control practices established are working properly.

55
New cards

National Institute of Standards and Technology (NIST)

a specific cybersecurity framework for organizations. The framework is organized around five functions: identify, protect, detect, respond, and recover.

56
New cards

Identify

addresses understanding and assessing cybersecurity risk

57
New cards

Protect

 involves implementing controls to  mitigate the risks

58
New cards

Detect

the ability to discover events on a timely basis.

59
New cards

Respond

centered around actions to take once an event is detected.

60
New cards

Recover

addresses getting back to normal operating capabilities after an event occurs.

61
New cards

Application Controls

Controls concerned with processing transactions that are specific to the software application. Ex: Processing, cash receipts, and cash disbursements.

62
New cards

General IT controls

Entity-wide IT risks that affect the entire computer system.” Ex: Input, processing, and output.

63
New cards

Input Controls

Application control that relates to data input to ensure accuracy, validity, and completeness of the data. Ex: Validity Check, Consistency Check, Check Digit, Limit Digit, Completeness Check, and a field check.

64
New cards

Validity Check

Input control that ensures an account number exists.

65
New cards

Consistency Check

“Input control that ensures that data entered into a field makes sense in relation to other data or in a situational context.” Ex: Someone manipulating a due date that has passed.

66
New cards

Check Digit

Input control that adds an extra digit to the end of an account number to ensure no transpositions or errors were made.

67
New cards

Limit Check

Input control that ensures pre-established limits are not exceeded. Ex: Total hours to be worked in a week, total accumulated depreciation, etc.

68
New cards

Completeness Check

“Input control that ensures that all required fields are filled in.”

69
New cards

Field Check

“Input control that ensures the characters entered in a field are of the proper type.” Ex: Wanted ten but wrote “1o”.

70
New cards

Processing Controls

Application controls used to ensure that all legitimate transactions have been accurately processed.

71
New cards

Prenumbered documents

Processing control relating to source documents used in transaction processing (e.g., purchase order) are sequentially prenumbered.” Ex: Receiving reports and shipping notices

72
New cards

Batch Totals

“Processing control that is a record count of a group of similar transactions.” Ex: A record count

73
New cards

Control Total

Batch total processing control where the total dollar amount of individual transactions processed equals the total on the report. If the total on the sheet is $56,090, then the processed control total generated by the computer should be $56,090.”

74
New cards

Hash Total

Batch total processing control where a nonfinancial attribute is added up to ensure all transactions are processed accurately.” Ex: General Ledger

75
New cards

Output Controls

Application control that ensures output is not lost, misdirected, or seen by unauthorized individuals.” Ex: Variety of distribution checks and reasonableness tests.

76
New cards

Distribution Checks

“Output control to ensure that output is distributed only to authorized users.” Ex: Confidential data.

77
New cards

Reasonableness Tests

“Output control that ensures output has no obvious errors and is reasonable.” Ex: Payroll and expense reimbursements.

78
New cards

access security, change, and operational controls.

3 types of general IT controls

79
New cards

Access Controls

“Data access and protection security measures include domains and access control lists, passwords, lockout procedures, callback procedures, firewalls, virtual private networks, encryption, virus and other malware protection, phishing protection, and intrusion detection.”

80
New cards

Network Domain

Collection of network resources of the organization.

81
New cards

Access Control Lists (ACL)

A list of user accounts who have access to an organization’s network domain resources.

82
New cards

Domain

essentially a collection of network resources that certain users are allowed to access. To allow access to the domain, the system administrator creates a list of user accounts.

83
New cards

Contra Security Behavior

Behavior that defeats the purpose of a good security practice (e.g., posting password on the computer monitor.

84
New cards

Lockout Procedure

Access control security measure that locks you out of the system after a certain number of failed attempts at a password.

85
New cards

Callback Procedure

Access control security measure that allows you to log in, but then shuts off the connection and calls you back at the authorized location. Useful in transferring large sums of money.

86
New cards

Firewalls

Used to filter data packets from the internet and drop data packets coming from unauthorized network servers.

87
New cards

Data Packets

Small amount of data sent over the network that includes the data itself, source, and destination.

88
New cards

Virtual Private Networks (VPNs)

Access control that provides a secure connection over the internet to access the organization’s files.

89
New cards

Encryption

Process of encoding information by using an algorithm to scramble the data so unauthorized individuals cannot read it.

90
New cards

Symmetric and Asymmetric

2 kinds of Encryption

91
New cards

Symmetric Encryption

Type of encryption that uses one encryption key to encrypt and decrypt the data.

92
New cards

Asymmetric Encryption

“Type of encryption that uses one public key to encrypt the data and one private key to decrypt the data.”

93
New cards

Malware

 “Software that prevents malicious code from infecting your computer.”

94
New cards

Phishing Attacks

“Fraudulent act to obtain data through disguise (e.g., clicking on a link in an email that appears trustworthy, but it is not.”

95
New cards

Ransomware

“Malware that locks you out of the system and requires you to pay a ransom in order for your data to be unlocked.”

96
New cards

IDS (Intrusion Detection Software)

Software that monitors and analyzes the data on the network for suspicious activity. An IDS can monitor and analyze the data on the network and send alerts of suspicious activity to the information security professionals.

97
New cards

Controls to minimize physical damage

a secure area, biometric identification, smoke detectors and fire retardants, file libraries, disaster recovery plans, and alternate processing facilities.

98
New cards

Biometric Controls

Security measure that can identify your unique physical characteristics e.g., fingerprint.

99
New cards

Change Controls

General IT control relating to management control focused on preventing breaks of a system from program codes or data conversions.

100
New cards

Patch Management

Update to fix software bugs.