Chapter 1 - Information System Auditing Process, Part A: Planning Flashcards

(67 cards)

1
Q

IS audit is the formal examination and/or testing of information systems to determine whether:

A

In compliance; IS data & information have appropriate levels of CIA; IS operations are accomplished efficiently & effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Typical audit process consists of three major phases:

A

Planning, Fieldwork/Documentation, Reporting/Follow-Up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The framework for the ISACA IS Audit & Assurance Standards provides of multiple levels of doucments:

A

Standards; Guidelines, Tools & Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define mandatory requirements for IS audit & assurance & reporting

A

Standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provide guidance in applying IS audit and assurance standards

A

Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provide examples of processes an IS auditor might follow in an audit engagement

A

Tools & techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ISACA IS Audit & Assurance Standards - three categories

A

General, Performance, Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Provide the guiding principles under which the IS assurance profession operates

A

General

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deal with the conduct of the assignment

A

Performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Address the types of reports, means of communication and information communicated

A

Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An interrelated set of cross-functional activities or events in the delivery of a specific product or service to a customer.

A

Business Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Controlled by policies, procedures, practices, and organizational structures designed to provide reasonable assurance hta ta business process will achieve its objectives.

A

Business Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The individual responsible for identifying process requirements, approving process design, and managing process performance

A

Business Process Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The role of the IS internal audit function should be established by an ___

A

Audit charter (approved by board of directors & audit committee)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Should clearly state management’s responsibility and objectives for, and delegation of authority, to the IS audit function

A

Audit Charter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Conducted at the beginning of the audit process to establish the overall audit strategy & detail the specific procedures to be carried out to implement the strategy & complete the audit

A

Audit Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Ideally lists all of the processes that may be considered for audit; all of the relevant processes that represent the blueprint of the enterprise’s business

A

Audit Universe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Based on which inputs can be solicited from the business

A

Reputation Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A

Steps to Perform Audit Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The content of legal regulations pertains to:

A

Establishment of Regulatory Requirements; Responsibilities assigned to Corresponding Entities; Financial, operational, and IS audit functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Legal requirements placed on audit or IS audit

A

Audit scope & audit objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Legal requirements placed on the auditee & its systems, data management, reporting

A

Internal & External audit & assurance profesionals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Buying & selling goods online

A

Ecommerce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Business conducted between orgs

A

Business to Business (B to B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Business conducted between an org & its customers
Business to Consumer
26
Business conducted between customers, primarily using a third-party platform
Consumer to Consumer
27
Business conducted between a consumer & business
Consumer to Business
28
Business conducted between an org & a public administration
Business to Government
29
Business conducted between a consumer & public administration or government
Consumer to government
30
Software transferred between systems & executed on a local system using cross-platform code without explicit installation by the recipient computer
Mobile code
31
XML associated standards:
Extensible Stylesheet Language (XSL), XML Query (XQuery), XML encryption
32
Ecommerce Risk elements:
Confidentiality, Integrity, Availability, Authentication & Nonrepudiation, Power shift to consumers
33
Requires communication software, translation software, and access to standards
Electronic Data Interchange (EDI)
34
Moves data from one point to another, flags the start and end of an EDI transmission, and determines how acknowledgements are transmitted and reconciled
Communications software
35
Helps build a map and shows how the data fields from the application correspond to elements of an EDI standard
Translation Software
36
Uses map to convert data back and forth between the application and EDI formats
EDI systems/access to standards
37
In reviewing EDI, the audit should be aware of two approaches related to EDI:
Traditional proprietary version, the development of EDI
38
Traditional EDI functions:
Communications handler, EDI interface, Application system
39
Biggest risk to EDI
Transaction authorization
40
EDI audits may involve:
Audit monitors, expert systems
41
Devices installed at EDI workstations to capture transaction as they are received
Audit monitors
42
Without the context of using computer system for internal control checks, consideration be given to having audit monitors evaluate the transactions received
Expert systems
43
Two principal components of Email
Mail servers, clients
44
Enable the capture of data at the time and place that sales transactions occur
Point of sale (POS) systems
45
Effective risk management controls for ebanking:
Board & management oversight; security controls; legal & reputational risk management
46
The electronic transfer of funds between a buyer, seller, and their respective financial institutions
EFT
47
Specialized form of a POS terminal that is designed for the unattended use by a customer of a financial institution
ATM
48
An integral element of the financial services industry & enables providers to emerge within & across countries
Electronic Finance (efinance)
49
Phone technology that allows a computer to detect voice and touch tones using a normal phone call
Integrated Voice Response (IVR)
50
Purchase account functions:
Accounts payable processing, goods received processing, order processing
51
Contains specific information or fact patterns associated with particular subject mater and the rules for interpreting these facts
Knowledge Base (KB)
52
KB can be expressed in several ways:
Decision trees, rules, semantic nets,
53
Use of questionnaires to lead the user through a series of choices, until a conclusion is reached
Decision Trees
54
Expression of declarative knowledge through the use of if-then relationships
Rules
55
Use of a graph in which nodes represent or conceptual objects and the arcs describe the relationship between nodes
Semantic nets
56
Inclusion of knowledge from an expert into the system without the traditional mediation of a software engineer
Knowledge interface
57
Collection of data from nonhuman sources through an expert system
Data interface
58
Linking the business processes between the related entities such as the buyer and the seller
Supply Chain Management (SCM)
59
Prevents, detects, and/or contains an incident and enables recovery from a risk event
Effective Control
60
An objective of one or more operational area(s) or role(s) to be achieved in order to contribute to the fulfillment of strategic goal(s) of the company
Control Objective
61
___ Controls apply to all areas of an organization
General controls
62
Each general control can be translated into an ___ specific control
IS
63
Deployment of audit resources to areas within an organization that represent the greatest risk
Risk-based audit planning
64
The risk that information collected may contain a material error that may go undetected during the course of the audit
Audit risk
65
Audit risk is influenced by:
Inherent risk, Control Risk, Detection Risk, Overall Audit Risk
66
A subset of risk assessment and is used during audit planning to help identity risk and vulnerabilities so an IS auditor can determine the controls needed to mitigate risk
Risk analysis
67
Types of audits and assessments:
IS, Compliance, Financial, Operational, Integrated, Administrative, Specialized (Third Party, Fraud, Forensic), Computer forensic, Functional