Erstellt von Mackenzie Burch
vor etwa 2 Jahre
|
||
Frage | Antworten |
application controls | Specific to a subsystem or an application to ensure the validity, completeness, and accuracy of the transaction. |
code of ethics | A formal expectation on what is considered to be ethical within an organization to promote ethical behavior. |
Committee of Sponsoring Organizations (COSO) | Composed of AAA, AICPA, FEI, IIA, and IMA, this committee studies the casual factors that lead to fraudulent financial reporting and develops recommendations for public companies, independent auditors, the SEC, and education institutions to improve the quality of financial reporting through internal controls and corporate governance. |
control objectives for information and related technology (COBIT) | An internationally accepted set of best IT security and control practices for IT management released by the IT Governance Institute. |
control risk | The threat that errors or irregularities in the underlying transactions will not be prevented, detected and corrected by the internal control system. |
corporate governance | A set of processes and policies in managing an organization with sound ethics to safeguard the interests of its stakeholders. |
corrective controls | Fix problems that have been identified. |
cost/benefit analysis | Important in determining whether to implement an internal control. |
detective controls | Find problems when they arise. |
enterprise risk management (ERM) | A process applied in strategy setting and across the enterprise designed to identify potential events that may affect the entity, and manage risk to be within the risk appetite, to provide reasonable assurance regarding the achievement of objectives. |
general controls | Pertain to enterprisewide issues such as controls over accessing the network, developing and maintaining applications, and documenting changes of programs. |
Information Technology Infrastructure Library (ITIL) | A set of concepts and practices for IT service management. |
inherent risk | Risk related to the nature of the business activity itself. |
input controls | Ensure the authorization, entry, and verification of data entering the system. |
International Organization for Standardization (ISO) 27000 series | Series that contains a range of individual standards and documents specifically reserved by ISO for information security. |
IT application controls | Activities that are specific to a subsystem's or an application's input, processing, and output. |
IT controls | Involve processes that provide assurance for information and help to mitigate risks associated with the use of technology. |
IT general controls (ITGC) | Enterprise-level controls over IT. |
output controls | Provide output to authorized people and ensure the output is used properly. |
physical controls | Mainly manual but could involve the physical use of computing technology. |
preventive controls | Deter problems before they arise. |
processing controls | Ensure that data and transactions are processed accurately. |
Public Company Accounting Oversight Board (PCAOB) | Established by SOX to provide independent oversight of public accounting firms. |
residual risk | The product of inherent risk and control risk. |
risk assessment | The process of identifying and analyzing risks systematically to determine the firm's risk response and control activities. |
Sarbanes-Oxley Act of 2002 (SOX) | Response to business scandals; required public companies registered with the SEC and their auditors to annually assess and report on the design and effectiveness of internal control over financial reporting. |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.