ITSAC - Module 7 & 8 Flashcards

IT Audit Process & Tools and Techniques Used in IT Auditing (38 cards)

1
Q

Future Financial Fiascos

A
  • Enron(2001)
  • WorldCom (2002)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • is an inventory of all the potential audit areas within an organization
  • documents the key business processes and risks of an organization.
A

audit universe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

includes the basic functional audit area, organization objectives, key business processes that support those organization objectives, specific audit objectives, risks of not achieving those objectives, and controls that mitigate the risks.

A

audit universe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is also an essential building block to a properly risk-based internal audit process.

A

audit universe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

provides a comprehensive list of critical IT processes, which can be used as a starting point.

A

Control Objectives for Information and Related Technology (COBIT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COBIT

A

Control Objectives for Information and Related Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is an authoritative, international set of generally accepted IT practices or control objectives that help employees, managers, executives, and auditors

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

supports the need to research, develop, publicize, and promote up-to-date internationally accepted IT control objectives.

A

COBIT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where to download COBIT 5

A

www.isaca.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

—optimizes the use of organizational resources to effectively address risks.

A

Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

—plan, build, run, and monitor the activities and processes used by the organization to pursue the objectives established by the board.

A

management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are considered the foundation of the audit function as they assist in developing the process for planning individual audits.

A

Risk assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

assist auditors in automating the necessary audit functions and integrating information gathered as part of the audit process.

A

Audit productivity tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Examples of Audit productivity tools

A
  • Audit planning and tracking
  • Documentation and presentations Communication
  • Data management, electronic working papers, and groupware
  • Resource management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shows the structure of the database by illustrating the different data elements (like customers or transactions) and how they are related.

A

ENTITY RELATIONSHIP DIAGRAM (ERD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shows how data moves through the system—from the point it enters, how it is processed, where it is stored, and where it goes next.

A

DATA FLOW DIAGRAM (DFD)

17
Q

Provides a step-by-step visual of the system’s operations, including decisions and actions taken.

18
Q

use symbols to describe transaction processing and the flow of data through a system by specifically showing: inputs and outputs; information activities (processing data); data storage; data flows; and decision steps.

19
Q

Manual or electronic document

A

|’’’’’’’|
|__/’’’

20
Q

Multiple copies of manual or electronic documents

A

|_
|’’’’’’’||
|__/’’’

21
Q

Electronic data entry device (e.g., laptop, mobile device)

A

|
…………
|……….|

22
Q

Electronic operation or processing of data by the computer

A

……
[…..]

23
Q

Manual operation

24
Q

Data stored electronically in a database

25
Indicates how paper documents are being filed: N: by number D: by date A: alphabetically
........... \\____ /
26
Data stored electronically in magnetic tape (backup purposes)
Q
27
Indicates a type of manual journal or ledger
..... /.../
28
Indicates the direction of a document or processing flow
---------->
29
On-page connector: links processing flows within the same page
O
30
Off-page connector: indicates entry/exit to another page
|''| \/
31
beginning, end, or interruption point in a process
........... (..........)
32
decision being made
/\ \/
33
is a method of gathering and reviewing electronic records.
**Computer assisted audit techniques (CAAT)**
34
is used to simplify or automate the data analysis and audit process, and it involves using computer software to analyze large volumes of electronic data for anomalies.
**CAAT**
35
**Benefits of a CAAT audit are:**
* Makes the audit less disruptive for the taxpayer. Auditor spends less time at the taxpayer’s business premises and can focus on managing audit risks and quantifying compliance issues * Reduces the time to complete the audit. CAAT are efficient in testing for completeness, accumulation, and calculation errors * Increases accuracy of the audit results when a larger population and stratified samples are used * Improves compliance and lessens chance of making errors. Auditors can review more segments of the taxpayer’s business activities systematically using analytic tools
36
When performing _ the auditor obtains source documents that are associated with particular input transactions and reconciles them against output results. Hence, audit supporting documentation is drawn and conclusions are reached without considering how inputs are being processed to provide outputs. The major weakness of the auditing around the computer approach is that it does not verify or validate whether the program logic of the application being tested is correct.
**auditing around the computer**
37
The _ approach includes a variety of techniques to evaluate how the application and their embedded controls respond to various types of transactions (anomalies) that can contain errors. When audits involve the use of advanced technologies or complex applications, the IT auditor must draw upon techniques combined with tools to successfully test and evaluate the application. This audit approach is relevant given technology’s significant increase and its impact on the audit process.
**auditing through the computer**
38
is the examination, analysis, testing, and evaluation of computer-based material conducted to provide relevant and valid information to a court of law. Its tools are increasingly used to support law enforcement, computer security, and computer audit investigations.
**Computer forensics**