Podcast
Questions and Answers
What is a characteristic of a centralized system?
What is a characteristic of a centralized system?
- All processing occurs at one location. (correct)
- It is harder to set up.
- Data is stored in diverse locations.
- Processing occurs at multiple locations.
Which of the following is a benefit of a centralized system?
Which of the following is a benefit of a centralized system?
- Difficult security setup
- Lower costs (correct)
- Complex setup
- High risk of disruption
What is a common challenge for growing businesses regarding information systems?
What is a common challenge for growing businesses regarding information systems?
- Overlapping and redundant systems. (correct)
- Simple accounting practices
- Excessive system integration.
- Lack of any information systems.
What is a recommended compensating control for small businesses with limited segregation of duties?
What is a recommended compensating control for small businesses with limited segregation of duties?
What should physical access controls focus on in smaller companies, where employees often share resources?
What should physical access controls focus on in smaller companies, where employees often share resources?
Where do logical access controls operate?
Where do logical access controls operate?
What type of usernames and passwords should companies require employees to use to ensure safety?
What type of usernames and passwords should companies require employees to use to ensure safety?
What is an example of a common inexpensive information system used in early-stage enterprises?
What is an example of a common inexpensive information system used in early-stage enterprises?
What type of system is the Accounting Information System (AIS) primarily considered to be?
What type of system is the Accounting Information System (AIS) primarily considered to be?
Which level of users typically makes strategic decisions?
Which level of users typically makes strategic decisions?
What is the primary focus of an Accounting Information System (AIS)?
What is the primary focus of an Accounting Information System (AIS)?
Which user level is primarily involved in capturing data within an organization's information system?
Which user level is primarily involved in capturing data within an organization's information system?
What is a critical requirement for an effective Transaction Processing System (TPS)?
What is a critical requirement for an effective Transaction Processing System (TPS)?
What is the term for the level of risk before any responses are implemented?
What is the term for the level of risk before any responses are implemented?
Which risk response involves taking action to decrease the likelihood or impact of a risk?
Which risk response involves taking action to decrease the likelihood or impact of a risk?
What does it mean to 'accept' a risk?
What does it mean to 'accept' a risk?
Which risk response strategy involves shifting the burden of a risk to another party?
Which risk response strategy involves shifting the burden of a risk to another party?
What is the term for the level of risk remaining after responses have been implemented?
What is the term for the level of risk remaining after responses have been implemented?
What is a primary benefit of using an Enterprise Resource Planning (ERP) system?
What is a primary benefit of using an Enterprise Resource Planning (ERP) system?
Which of the following is a characteristic of ERP systems?
Which of the following is a characteristic of ERP systems?
What is one disadvantage of information systems for large organizations?
What is one disadvantage of information systems for large organizations?
In a distributed system, where is data processing and storage primarily handled?
In a distributed system, where is data processing and storage primarily handled?
What is a potential drawback of using a distributed system?
What is a potential drawback of using a distributed system?
What is a defining characteristic of a decentralized system?
What is a defining characteristic of a decentralized system?
What is an advantage of a decentralized system?
What is an advantage of a decentralized system?
Which of these represents a potential negative aspect of a decentralized system?
Which of these represents a potential negative aspect of a decentralized system?
What are the three objectives of internal control according to the content?
What are the three objectives of internal control according to the content?
Which of the following is NOT a dimension of the COSO Cube?
Which of the following is NOT a dimension of the COSO Cube?
Which of the following is an example of a manual control?
Which of the following is an example of a manual control?
Which group has the primary responsibility to establish and maintain an adequate system of internal controls?
Which group has the primary responsibility to establish and maintain an adequate system of internal controls?
In the Three Lines of Defense model, who is independent of management and assesses the effectiveness of controls?
In the Three Lines of Defense model, who is independent of management and assesses the effectiveness of controls?
What is the purpose of an internal control framework?
What is the purpose of an internal control framework?
Which law codifies the requirement that companies use an internal control framework?
Which law codifies the requirement that companies use an internal control framework?
Which internal control framework is widely used by large organizations?
Which internal control framework is widely used by large organizations?
Which of the following is an example of application software?
Which of the following is an example of application software?
What type of processing involves collecting data and processing it later at a scheduled time?
What type of processing involves collecting data and processing it later at a scheduled time?
Which of the following is a potential risk associated with purchasing third-party software?
Which of the following is a potential risk associated with purchasing third-party software?
Which of the following is a type of system software?
Which of the following is a type of system software?
Which programming language is commonly used for database management?
Which programming language is commonly used for database management?
What is a characteristic of real-time processing?
What is a characteristic of real-time processing?
If a third-party vendor closes down, what is a potential risk for businesses using their software?
If a third-party vendor closes down, what is a potential risk for businesses using their software?
What is a key difference between batch processing and real-time processing?
What is a key difference between batch processing and real-time processing?
Which type of risk originates from within a company's operations?
Which type of risk originates from within a company's operations?
What is the definition of operational risk?
What is the definition of operational risk?
Which of the following is an example of financial risk?
Which of the following is an example of financial risk?
Damage to a company's reputation is known as what type of risk?
Damage to a company's reputation is known as what type of risk?
Which of these risks is most likely to be significantly amplified via social media?
Which of these risks is most likely to be significantly amplified via social media?
What is compliance risk?
What is compliance risk?
What is strategic risk?
What is strategic risk?
Which of the is an example of physical risk
Which of the is an example of physical risk
What are the two factors that combine to make risk severity?
What are the two factors that combine to make risk severity?
In risk prioritization, what does 'risk impact' refer to?
In risk prioritization, what does 'risk impact' refer to?
What is the initial step in the risk management process?
What is the initial step in the risk management process?
What is the main goal of data security?
What is the main goal of data security?
Which of the following is a fundamental concept in information systems?
Which of the following is a fundamental concept in information systems?
Which of these is a key characteristic of effective information?
Which of these is a key characteristic of effective information?
What is the purpose of a disaster recovery plan?
What is the purpose of a disaster recovery plan?
What does risk refer to in the context of business?
What does risk refer to in the context of business?
What happens to the expected enterprise value when there is insufficient risk-taking?
What happens to the expected enterprise value when there is insufficient risk-taking?
What is the sweet spot on the Risk Level vs. Expected Enterprise Value curve?
What is the sweet spot on the Risk Level vs. Expected Enterprise Value curve?
What does a portfolio view of risk examine?
What does a portfolio view of risk examine?
What is the focus of the risk categorization step in Enterprise Risk Management (ERM)?
What is the focus of the risk categorization step in Enterprise Risk Management (ERM)?
Which of the following is the correct order of steps in Enterprise Risk Management (ERM)?
Which of the following is the correct order of steps in Enterprise Risk Management (ERM)?
What are the two parts of a risk statement?
What are the two parts of a risk statement?
Which of the following phrases correctly represents the format of a risk statement?
Which of the following phrases correctly represents the format of a risk statement?
What is a primary advantage of using a cloud system?
What is a primary advantage of using a cloud system?
Which of the following is a risk associated with in-house developed software related to budgeting?
Which of the following is a risk associated with in-house developed software related to budgeting?
What is a potential scheduling risk associated with developing software in-house?
What is a potential scheduling risk associated with developing software in-house?
Which of the following represents a 'Technical Specifications' risk associated with in-house software development?
Which of the following represents a 'Technical Specifications' risk associated with in-house software development?
What external market risk is associated with in-house developed software?
What external market risk is associated with in-house developed software?
From a fraud perspective, what risk is associated with in-house software development?
From a fraud perspective, what risk is associated with in-house software development?
Which of the following is a reliability risk associated with using cloud systems?
Which of the following is a reliability risk associated with using cloud systems?
What is a key privacy risk when using a cloud service provider?
What is a key privacy risk when using a cloud service provider?
What security risk is associated with using a cloud service?
What security risk is associated with using a cloud service?
What does SaaS stand for regarding cloud computing?
What does SaaS stand for regarding cloud computing?
Flashcards
Centralized System
Centralized System
A setup where all data processing and storage happens in a single place.
Centralized System - Positives
Centralized System - Positives
Easier setup, better security, and lower costs are benefits of this system.
Centralized System - Negatives
Centralized System - Negatives
Greater risk of disruption, bottlenecks, lag time, and remote access issues.
Segregation of Duties (Small Business)
Segregation of Duties (Small Business)
Signup and view all the flashcards
Physical Access Controls
Physical Access Controls
Signup and view all the flashcards
Physical Access (Small Business)
Physical Access (Small Business)
Signup and view all the flashcards
Logical Access Controls
Logical Access Controls
Signup and view all the flashcards
Logical Access (Small Business)
Logical Access (Small Business)
Signup and view all the flashcards
Inherent Risk
Inherent Risk
Signup and view all the flashcards
Residual Risk
Residual Risk
Signup and view all the flashcards
Accepting Risk
Accepting Risk
Signup and view all the flashcards
Mitigating Risk
Mitigating Risk
Signup and view all the flashcards
Transferring Risk
Transferring Risk
Signup and view all the flashcards
Three Objectives of Internal Control
Three Objectives of Internal Control
Signup and view all the flashcards
COSO Cube
COSO Cube
Signup and view all the flashcards
Three Dimensions of the COSO Cube
Three Dimensions of the COSO Cube
Signup and view all the flashcards
Manual Controls
Manual Controls
Signup and view all the flashcards
Automated Controls
Automated Controls
Signup and view all the flashcards
First Line of Defense
First Line of Defense
Signup and view all the flashcards
Second Line of Defense
Second Line of Defense
Signup and view all the flashcards
Third Line of Defense
Third Line of Defense
Signup and view all the flashcards
ERP System
ERP System
Signup and view all the flashcards
Benefits of ERP
Benefits of ERP
Signup and view all the flashcards
Large Org. IS
Large Org. IS
Signup and view all the flashcards
Distributed System
Distributed System
Signup and view all the flashcards
Advantages of Distributed Systems
Advantages of Distributed Systems
Signup and view all the flashcards
Disadvantages of Distributed Systems
Disadvantages of Distributed Systems
Signup and view all the flashcards
Advantages of Decentralized Systems
Advantages of Decentralized Systems
Signup and view all the flashcards
Accounting Information System (AIS)
Accounting Information System (AIS)
Signup and view all the flashcards
Transaction Processing System (TPS)
Transaction Processing System (TPS)
Signup and view all the flashcards
Effective TPS
Effective TPS
Signup and view all the flashcards
Levels of Users
Levels of Users
Signup and view all the flashcards
Information Systems Types
Information Systems Types
Signup and view all the flashcards
Copyright Infringement Risk
Copyright Infringement Risk
Signup and view all the flashcards
Data Breach Risk (Third-Party)
Data Breach Risk (Third-Party)
Signup and view all the flashcards
Third-Party Vendor Disruption
Third-Party Vendor Disruption
Signup and view all the flashcards
Software Update Risk
Software Update Risk
Signup and view all the flashcards
Software Sourcing
Software Sourcing
Signup and view all the flashcards
Application Software
Application Software
Signup and view all the flashcards
System Software
System Software
Signup and view all the flashcards
Batch Processing
Batch Processing
Signup and view all the flashcards
Decentralized Systems
Decentralized Systems
Signup and view all the flashcards
Disadvantages of Decentralized Systems
Disadvantages of Decentralized Systems
Signup and view all the flashcards
Decentralized Systems - Security Concerns
Decentralized Systems - Security Concerns
Signup and view all the flashcards
Definition of Preventative Controls
Definition of Preventative Controls
Signup and view all the flashcards
Detective Controls
Detective Controls
Signup and view all the flashcards
Internal Risks
Internal Risks
Signup and view all the flashcards
External Risks
External Risks
Signup and view all the flashcards
Operational Risk
Operational Risk
Signup and view all the flashcards
Financial Risk
Financial Risk
Signup and view all the flashcards
Reputational Risk
Reputational Risk
Signup and view all the flashcards
Compliance Risk
Compliance Risk
Signup and view all the flashcards
Strategic Risk
Strategic Risk
Signup and view all the flashcards
Physical Risk
Physical Risk
Signup and view all the flashcards
Risk Severity
Risk Severity
Signup and view all the flashcards
Risk Likelihood
Risk Likelihood
Signup and view all the flashcards
What is Risk?
What is Risk?
Signup and view all the flashcards
ERM (Enterprise Risk Management)
ERM (Enterprise Risk Management)
Signup and view all the flashcards
What is a Risk Statement?
What is a Risk Statement?
Signup and view all the flashcards
Portfolio View of Risk
Portfolio View of Risk
Signup and view all the flashcards
Profile View of Risk
Profile View of Risk
Signup and view all the flashcards
What is Risk Identification?
What is Risk Identification?
Signup and view all the flashcards
What is Risk Categorization?
What is Risk Categorization?
Signup and view all the flashcards
What is Risk Prioritization?
What is Risk Prioritization?
Signup and view all the flashcards
Software as a Service (SaaS)
Software as a Service (SaaS)
Signup and view all the flashcards
Cloud Computing
Cloud Computing
Signup and view all the flashcards
Cloud System Flexibility
Cloud System Flexibility
Signup and view all the flashcards
Cloud Cost Savings
Cloud Cost Savings
Signup and view all the flashcards
Reduced Maintenance in Cloud
Reduced Maintenance in Cloud
Signup and view all the flashcards
In-House Software Budgeting Risk
In-House Software Budgeting Risk
Signup and view all the flashcards
In-House Software Scheduling Risk
In-House Software Scheduling Risk
Signup and view all the flashcards
In-House Software Technical Risk
In-House Software Technical Risk
Signup and view all the flashcards
In-House Software External Market Risk
In-House Software External Market Risk
Signup and view all the flashcards
Cloud Reliability Risks
Cloud Reliability Risks
Signup and view all the flashcards
Study Notes
Internal Controls
-
Internal control is a process, effected by an entity's board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories: reliability of financial reporting, effectiveness and efficiency of operations, and compliance with applicable laws and regulations per PCAOB AU Section 319.06
-
Internal controls are essential for dealing with risks and understanding controls, and will be reviewed in the chapter.
Categorization of Internal Controls
- Preventative controls are designed to prevent an event from occurring.
- Detective controls are designed to provide notice to the company that an event has occurred.
- Corrective controls are designed minimize or eliminate undesired outcomes when an event occurs.
Quick Class Exercise:
- A fire insurance policy for a company warehouse is a transfer, so the code is "T".
- Before any new employee is hired, a company runs a criminal background check this is preventative (P).
- Every month the company reconciles the cash account balance in the general ledger to the cash balance shown on their bank statement. This is detective (D).
Preventative Control
- Segregation of duties involves separating and assigning the three components of a transaction to separate employees.
- One component of a transaction is custody of assets.
- Another component of a transaction is authorization.
- The third component of a transaction is record keeping.
- An employee, such as the Inventory Manager or Clerk, is the only one authorized to have access to the inventory (custody).
- Another employee, such as the Purchasing Manager or Purchasing Agents, is the only person authorized to order inventory (authorization).
- A third employee, such as the Accounts Payable Manager or Clerk, is the person authorized to record increases to the inventory and accounts payable accounts for ordered and received inventory (record keeping).
Threats that can defeat internal control
- One threat is management override; when someone in a supervisory role directs one of the people that report up to them to not follow policy/ well designed control can be defeated.
- Another threat is collusion; when two or more employees work together (especially across segregated duties) a well designed control can be defeated.
Classification of Controls
- Physical controls are outside of the IT environment and govern human activities and the ability to work from home if an office is closed.
- IT General controls apply to the full set of systems used by the company requiring a password needed to access your office computer.
- IT application controls apply to a specific application; accounts payable clerk is allowed to enter AP transaction, but a payroll clerk is not allowed to enter AP transaction.
What is Risk
- Risk is the likelihood of an unfavorable event occurring and is essential in business.
- Risk is not always a bad thing.
- Focus is on unfavorable outcomes.
- The key is choosing the right level of risk.
Identifying Risks
- Risks can be related to a single business event, a business process, a business function, or the entire organization including the business model and strategy. Be as specific as possible to identify all risks
- Enterprise Risk Management (ERM) is a thorough process to identify, categorize, prioritize, and respond to an entity’s risks.
Risk Identification and Statements
- Identify existing risks and their outcomes.
- Categorize the risks based on their types; this helps fine-tune risks from entity-level to business-process-related risks.
- Prioritize risks that are most likely to occur or will have the largest impact on the organization and prioritize responding to those.
- Risk statements have two parts: the issue and the possible outcome, and are in the form of, "This issue may result in this outcome.”
Risk Categories
- Internal risks occur within the normal operations of a company and are preventable.
- External risks come from outside of a company. Some appear to be both internal and external.
- Internal risks include operational, technology and financial.
- External risks includes compliance, reputational, and strategic.
Risk Prioritization
- Risk severity is combination of risk likelihood and risk impact.
- Risk likelihood estimates the probability of occurrence.
- Risk impact estimates the damage.
- Risks are prioritized based on both factors.
Responding to Risk
-
Before responding to risk, respond to the level of risk the entity faces is inherent risk.
-
After a response, the remaining level of risk the entity faces is residual risk..
-
There are four general types of responses to deal with each risk:
- Accept the risk, no risk response is chosen, and the entity accepts the inherent risk.
- Mitigate the risk by adjusting to reduce the likelihood of risk event occurring.
- Transfer the risk transferring the risk to another entity (often in exchange for a payment).
- Avoid the risk by avoiding events that cause the risk, and is not be possible in many cases
Example of Risk Response with Car
- You buy a new car that has a leather interior and sometimes your friends eat inside.
- Accept: Don't worry about. If someone spills, clear it and hope the stain isn't noticeable.
- Mitigate: Treat your seats with a chemical that makes the likelihood of a food stain much less.
- Transfer: Buy a specific insurance policy that covers damage to your seats.
- Avoid: Do not allow anyone to eat in your car
Types of Software
-
Batch processing is when data is collected and processed later at the same scheduled time
-
Real-time processing is when transactions are processed as they occur, requiring more processing capacity and complex systems and controls, order entry and shipping systems.
-
Programming languages includes the coded instructions that create the software: -Structured Query Language SQL
-
Application software are end-user programs that perform specific functions facilitated by apps.
-
System Software includes operating systems, communications software, and utility programs.
Software Sourcing
- Software can be purchased from a third-party vendor or developed in-house, each with its own benefits and risks.
- If the business isn't adhering to software licensing policies of the software, could face legal allegations and reputational loss.
- If third-party software is not properly secure, it is vulnerable to hackers.
- Vendor may require unnecessary updates to bill additional hours to its customers that cannot be refused.
Cloud Computing
- Cloud computing is the newer model for software deployment, connecting you to software via the internet; the advantages of Software as a Service(SaaS) include increased flexibility and scalability to meet changing conditions.
- There are various budgeting, scheduling, technical specification, external market, fraud, reliability, privacy, and security risk areas of cloud computing.
Organizational Information Systems
- Alternative system configurations are available for locations common is a centralized system which connects all users to one central location.
- As businesses grow, they acquire businesses, and their systems can be integrated into a single system.
- For small businesses, use proper segregation of duties, physical and logical access.
- Business need to use policies and procedures for bring-your-own-device.
- The most important thing is to tie functions to employees with usernames and passwords.
Benefits of ERP System
- Future cost savings
- Improved data transparency and quality
- Increased business efficiencies
- Quality improvement
- Automating routine business processes
- SAP is one of the most popular ERP systems.
Manual vs. Automated Controls
- Manual controls are useful when human judgment and interaction are present, and employee travel expenses are reimbursed. Before being reviewed and initialed by manager.
- Automated controls are often more reliable and consistent, like when a transaction is entered into an accounting system. Debits do not equal credits.
Establishment and Assessment of Internal Controls
- Management has the primary responsibility to establish and maintain an adequate system of internal controls.
- Internal auditors are independent of management and are tasked with assessing the effectiveness and efficiency of controls.
- Internal control frameworks are essential as internal control framework is a set of concepts and questions that can be used by management to establish and maintain the internal control system.
- The COSO framework is one of the most widely adopted.
- The COSO Cube displays the three dimensions of the framework: control objectives, control components, and organizational structure.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.