Chapter 3-Fraud, Ethics & Internal Control Flashcards

(46 cards)

1
Q

Audit Trail

A

presents verifiable information about the accuracy of accounting records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availibility

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Check Fraud

A

involve the customer’s use of stolen or fraudulent checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control Objectives for Information Technology (COBIT)

A

extremely important guidance for those who design or audit IT systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collusion

A

occurs when two or more people work together to commit fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Compensating Control

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control Activities

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Control Environment

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Committee of Sponsoring Organizations (COSO)

A

issuer of the Internal Controls Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credit Card Fraud

A

involve the customer’s use of stolen or fraudulent credit cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Customer Fraud

A

Occurs when a customer improperly obtains cash or property from a company, or avoids a liability through deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Defalcation

A

Misappropriation of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Denial of Service Attack

A

intended to overwhelm an intended target computer system with so much bogus network traffic that the system is unable to respond to valid network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Employee Fraud

A

Conducted by non-management employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Foreign Corrupt Practices Act

A

asdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fraud

A

the theft, concealment, and conversion to personal gain of another’s money, physical assets, or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fraud Triangle

A
  1. Opportunity 2. Incentive 3. Rationalization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

General Authorization

20
Q

Hacking

A

the term commonly used for computer network break-ins.

21
Q

Independent Checks

A

Serve as a method to confirm the accuracy and completeness of data in the accounting system

22
Q

Industrial Espionage

A

The theft of proprietary company information, by digging through the trash of the intended target company or hacking into the target’s computer systems.

23
Q

Information & Communication

24
Q

Information Criteria

25
Internal Theft
Misappropriation of assets
26
IT Resources
asdf
27
Kickbacks
a cash payment that the vendor gives the employee in exchange for the sale, it is like a business bribe
28
Larceny
Theft of company cash after it's been recorded in the accounting records
29
Management Fraud
conducted by one or more upper-level managers within the company. (Usually in the form of financial reporting)
30
Management Override
circumvention of the systems of internal controls that are in place
31
Misappropriation of Assets
theft of any item of value
32
Monitoring
asdf
33
Preventative Controls
designed to avoid errors, fraud, or events not authorized by management.
34
Reasonable Assurance
the controls achieve a sensible balance of reducing risk when compared with the cost of the control
35
Refund Fraud
occurs when a customer tries to return stolen goods to collect a cash refund
36
Salami Technique
alters a program to slice a small amount from several accounts and then credit those small amounts to the perpetrator's benefit. Think about the movie "Office Space"
37
Skimming
The organization's cash is stolen before it is entered into the accounting records.
38
Software Piracy
the unlawful copying of software programs
39
Specific Authorization
asdf
40
Spoofing
occurs when a person, through a computer system, pretends to be someone else.
41
Stewardship
The careful and responsible oversight and use of the assets entrusted to management.
42
Trap Door Alteration
a valid programming tool that is misused to commit fraud.
43
Trojan Horse Program
a small, unauthorized program within a larger, legitimate program, used to manipulate the computer system to conduct a fraud.
44
Trust Services Principles
set forth guidance for CPAs who provide assurance services for organizations
45
Vendor Audit
involved the examination of vendor records in support of amounts charged to the company
46
Vendor Fraud
Occurs when vendors obtain payments to which they are not entitled.