Chapter 3 Flashcards

(55 cards)

1
Q

stewardship

A

the careful and responsible oversite and use of the assets entrusted to management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

code of ethics

A

following ethical business practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

internal controls

A

a process affected by an entity’s board of directors, management, and other personnel, designed to provide reasonable assurance regarding the achievement of objectives in the following categories:
effectiveness and efficiency of operations
reliability of financial reporting
compliance with applicable laws and regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

fraud

A

the theft, concealment, and conversion to personal gain of another’s money, physical assets, or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

misappropriation of assets

A

theft of any item of value, also referred to as defalcation, or internal theft, most common are cash or inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

misstatement of financial records

A

the falsification of accounting reports, referred to as earnings management, fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

fraud triangle

A
Incentive
Opportunity                 Rationalization(attitude)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

incentive

A

things that motivate people to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

opportunity

A

if there is a lack of internal controls it is possible to commit fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

rationalization

A

justifying fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

management fraud

A

conducted by one or more top level managers within the company, usually in reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

management override

A

where the management tells a lower level employee to do it despite the controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

employee fraud

A

conducted by employees examples:

inventory theft, cash receipts theft, A?P theft, payroll fraud, expense account fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

skimming

A

taking money before it is entered into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

larceny

A

where money is taken after it is entered into the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

collusion

A

when two or more people work together to commit a fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

customer fraud

A

when a customer improperly obtains cash or property from a company, or avoids a liability through deception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

credit card fraud or check fraud

A

customer use of stolen cc or checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

refund fraud

A

when a customer tries to return stolen goods to collect a cash refund

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

vendor fraud

A

when vendors obtain payments to which they are not entitled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

vendor audits

A

the examination of vendor records in support of amounts charged to the company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

industrial espeonage

A

the theft of proprietary company info by digging through the trash of the intended target company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

software piracy

A

the unlawful copying of software programs

24
Q

internal computer fraud

A

input manipulation, program manipulation, output manipulation

25
salami technique
altering a program to slice a small amount from several accounts and then credit those small amounts to the perpetrator's benefit
26
trojan horse program
a small unauthorized program within a larger legitimate program, used to manipulate the computer system to conduct a fraud
27
trap door alteration
a valid programming tool that is misused to commit fraud
28
hacking
term commonly used for computer network break ins
29
denial of service attack
intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic.
30
spoofing
when a person, through a computer system, pretend to be someone else
31
prevent fraud
1 maintain code of ethics 2. maintain a system of accounting internal controls 3. maintaining a system of information technology controls
32
Sarbanes Oxley Act (SOX)
passed to reform accounting, financial reporting, and auditing functions of public companies.
33
SOX requirement code of ethics
SOX requires that public companies adopt and disclose a code of ethics
34
preventive controls
designed to avoid errors, fraud, or events not authorized by management
35
detective controls
help employees to uncover or discover errors, fraud, or unauthorized events
36
corrective controls
steps to correct an error or problem uncovered via detective controls
37
committee of sponsoring organization (COSO)
made the COSO report
38
COSO report
five components of internal control: | control environment, risk assessment, control activities, information and communication, and monitoring
39
control environment
the tone of the organization, a tone of ethics and integrity will make fraud less likely, as well as the assignment of authority, and responsibility
40
risk assessment
considering existing threats and the potential for additional risks and stands ready to respond should these events occur, steps, 1 identify the sources of risk, both internal and external 2. determine the impact of such risks in terms of finances and reputation 3. estimate the chances of such risks occurring 4. develop an action plan to reduce the impact and probability of these risks 5. execute the action plan and continue the cycle, beginning again with the first step
41
control activities
the policies and procedures that help ensure that management directives are carried out and that management objectives are achieved, examples: 1. authorization of transactions 2. segregation of duties 3. adequate records and documents 4. security of assets and documents 5. independent checks and reconciliation
42
authorization
an approval or endorsement, from a responsible person in the department or organization that has been sanctioned by management
43
general authorization
set of guidelines that allows transactions to be completed as long as they fall within established parameters
44
specific authorization
that explicit authorization is needed for that single transaction to be completed
45
segregation of duties
three parts should be separate, authorization, recording, and custody
46
compensating control
lessens the risk of negative effects when other controls are lacking
47
audit
presents verifiable information about the accuracy of accounting records
48
independent checks
method to confirm the accuracy and completeness of data in the accounting system, examples, reconciliation comparison of physical assets with records recalculation of amounts analysis of reports review of batch totals
49
reconciliation
procedure that compares records from different sources
50
batch total
summation of key items in the batch
51
monitoring
ongoing review and evaluation of a system
52
reasonable assurance
controls achieve a sensible balance of reducing risk when compared with the cost of the control
53
Control objectives for IT(COBIT)
framework developed by the ISACA(information systems audit and control association)
54
trust services principles
designed to be the written guidance for CPA's who provide assurance services for organizations
55
risk and controls in IT 5 categories
``` Security Availability Processing Integrity Online Privacy Confidentiallity ```