itsac - finals Flashcards

(55 cards)

1
Q

is an audit of an organization’s IT systems, management, operations and related processes.

A

Information Technology (IT) audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

may be carried out in connection with a financial regularity audit or selective audit. As the records, services and operations of many organizations are often highly computerized, there is a need to evaluate the IT controls in the course of an audit of these organizations.

A

IT audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • This is an examination of the policies and procedures of an entity or department, to see if it is in compliance with internal or regulatory standards. This audit is most commonly used in regulated industries or educational institutions.
A

Compliance audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • This is an analysis of the fairness of the information contained within an entity’s financial statement. It is conducted by a CPA firm, which is independent of the entity under review. This is the most commonly conducted type of audit.
A

Financial audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • This involves a review of the controls over software development, data processing, and access to computer systems. The intent is to spot any issues that could impair the ability of IT system to provide accurate information to users, as well as to ensure that unauthorized parties do not have access to the data.
A

Information systems audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • This is a detailed analysis of the goals, planning processes, procedures, and results of the operations of a business. The audit may be conducted internally or by an external entity. The intended result is an evaluation of the operations, likely with recommendations for improvement.
A

Operational audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– fake products, job offers, romance scams

A

Online Scams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

– hacking into accounts or systems

A

Illegal Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

– stealing personal info for fraud

A

Computer-Related Identity Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– cloning cards, phishing banking details

A

ATM/Credit Card Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– sending harmful or intimidating messages online

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– deleting or altering data without permission

A

Data Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

– sharing intimate content without consent

A

Anti-Photo and Video Voyeurism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

– tricking people using digital means

A

Computer-Related Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

– repeated online harassment

A

Unjust Vexation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a federal law that sweeping auditing and financial regulations for public companies. Lawmakers created the legislation to help protect shareholders, employees, and the public from accounting errors and fraudulent financial practices.

A

Sarbanes-Oxley Act of 2002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

refers to laws made by a country’s national (federal) government that apply to all states, provinces, or territories within that country. This is common in countries with a federal system, like the United States, Canada, Australia, etc.

A

Federal legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The purpose of this is to establish consistent legal standards across the entire country, especially for issues like cybersecurity, privacy, and IT infrastructure.

A

Federal legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These are laws, treaties, or frameworks agreed upon by multiple countries to address IT issues that cross borders—like data transfer, cybersecurity threats, or online piracy.

A

International Legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The purpose of this is to create consistent standards and cooperation among countries in dealing with global IT challenges.

A

International Legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

These are laws enacted by a country’s state or regional government.

A

State Legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The purpose is to regulate the use, development, and security of information technology within its borders.

A

State Legislation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

– criminalizes unauthorized access to computers.

A

Computer Fraud and Abuse Act (CFAA)

24
Q

– protects children’s privacy under 13 online.

A

Children’s Online Privacy Protection Act (COPPA)

25
– protects copyrighted digital content.
**Digital Millennium Copyright Act (DMCA)**
26
– EU law on data privacy.
**General Data Protection Regulation (GDPR)**
27
– the first international treaty to address internet and computer crime.
**Budapest Convention on Cybercrime**
28
– protects creators of software and digital content globally.
**WIPO Copyright Treaty**
29
– protects personal information (Philippines).
**Data Privacy Act of 2012 (RA 10173)**
30
– addresses online crimes.
**Cybercrime Prevention Act of 2012 (RA 10175)**
31
– recognizes electronic documents and signatures.
**E-Commerce Act of 2000 (RA 8792)**
32
**Future Financial Fiascos**
* Enron(2001) * WorldCom (2002)
33
* is an inventory of all the potential audit areas within an organization * documents the key business processes and risks of an organization.
**audit universe**
34
includes the basic functional audit area, organization objectives, key business processes that support those organization objectives, specific audit objectives, risks of not achieving those objectives, and controls that mitigate the risks.
**audit universe**
35
is also an essential building block to a properly risk-based internal audit process.
**audit universe**
36
provides a comprehensive list of critical IT processes, which can be used as a starting point.
**Control Objectives for Information and Related Technology (COBIT)**
37
COBIT
**Control Objectives for Information and Related Technology**
38
is an authoritative, international set of generally accepted IT practices or control objectives that help employees, managers, executives, and auditors
**COBIT**
39
supports the need to research, develop, publicize, and promote up-to-date internationally accepted IT control objectives.
**COBIT**
40
Where to download COBIT 5
**www.isaca.org**
41
—optimizes the use of organizational resources to effectively address risks.
**Governance**
42
—plan, build, run, and monitor the activities and processes used by the organization to pursue the objectives established by the board.
**management**
43
are considered the foundation of the audit function as they assist in developing the process for planning individual audits.
**Risk assessments**
44
assist auditors in automating the necessary audit functions and integrating information gathered as part of the audit process.
**Audit productivity tools**
45
Examples of Audit productivity tools
* Audit planning and tracking * Documentation and presentations Communication * Data management, electronic working papers, and groupware * Resource management
46
Shows the structure of the database by illustrating the different data elements (like customers or transactions) and how they are related.
**ENTITY RELATIONSHIP DIAGRAM (ERD)**
47
Shows how data moves through the system—from the point it enters, how it is processed, where it is stored, and where it goes next.
**DATA FLOW DIAGRAM (DFD)**
48
Provides a step-by-step visual of the system's operations, including decisions and actions taken.
**FLOWCHART**
49
use symbols to describe transaction processing and the flow of data through a system by specifically showing: inputs and outputs; information activities (processing data); data storage; data flows; and decision steps.
**Flowcharts**
50
is a method of gathering and reviewing electronic records.
**Computer assisted audit techniques (CAAT)**
51
is used to simplify or automate the data analysis and audit process, and it involves using computer software to analyze large volumes of electronic data for anomalies.
**CAAT**
52
**Benefits of a CAAT audit are:**
* Makes the audit less disruptive for the taxpayer. Auditor spends less time at the taxpayer’s business premises and can focus on managing audit risks and quantifying compliance issues * Reduces the time to complete the audit. CAAT are efficient in testing for completeness, accumulation, and calculation errors * Increases accuracy of the audit results when a larger population and stratified samples are used * Improves compliance and lessens chance of making errors. Auditors can review more segments of the taxpayer’s business activities systematically using analytic tools
53
When performing _ the auditor obtains source documents that are associated with particular input transactions and reconciles them against output results. Hence, audit supporting documentation is drawn and conclusions are reached without considering how inputs are being processed to provide outputs. The major weakness of the auditing around the computer approach is that it does not verify or validate whether the program logic of the application being tested is correct.
**auditing around the computer**
54
The _ approach includes a variety of techniques to evaluate how the application and their embedded controls respond to various types of transactions (anomalies) that can contain errors. When audits involve the use of advanced technologies or complex applications, the IT auditor must draw upon techniques combined with tools to successfully test and evaluate the application. This audit approach is relevant given technology’s significant increase and its impact on the audit process.
**auditing through the computer**
55
is the examination, analysis, testing, and `evaluation of computer-based material` conducted to provide relevant and valid information to a court of law. Its tools are increasingly used to support law enforcement, computer security, and computer audit investigations.
**Computer forensics**