Week 5 - System Work Flashcards

1
Q

Walkthrough tests

Cradle to grave

A

Walkthroughs arw audits of accounting systems that gauge reliability
Cradle to grave - start to finish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Controls are designed to

A

Prevent
Detect or
Correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Prevention

A

Locks, access controls, training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Detection

A

Incorrect debtor number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Correction

A

Back ups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal controls

A

Financial reporting
Effectiveness and efficiency of operations
Compliance with laws and regs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 components of Internal controls (IC)

A
Control environment 
Risk assessment process 
Information system 
Control activities 
Monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Control environment

A
Enforcement to integrity and ethical values 
Commitment to competence = right skils 
Active governors/NEDs 
Management approach to risks/style
HR policies and practices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Risk assessment process

A
All about reducing risks to acceptable level 
Health of employees 
Privacy of personal info 
Losses from computer abuse - hacking 
Management of change
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Info system

A

Relevant and timely info
Financial and non-financial
Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Control activities

A

Authorisation
General and application controls
Segregation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Monitoring

A

Assess current perfromance of controls
Relevance over time
Who is responsible?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Accounting control systems

A

Major classes of transactions
How transactions are initiated
Significant accounting records
The accounting and financial reporting process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2 broad control classifications

A

General controls over the environment in which the company operates
Application controls - ensure an individual application runs smoothly and accurately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

General controls

A

Systems development/maintenance controls
Organisational controls
Security
Quality assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Systems development

A

If systems develop/maintenance controls are strong, it is easier to control individual applications
The info should be maintained, allowing transactions to be traced forward&backward through the system

17
Q

Organisational control

A

Organisation charts
Segregation of duties
Authorisation and approval
Supervision controls

18
Q

Segregation of duties

A

Authorisation of transactions
Execution of transactions
Custody of assets
Recording of transactions and assets

19
Q

Security - physical

A

Fire damage/water damage
Power failure
Pollution
Intrusion by unathorised personnel

20
Q

Security - info/data

A

Restriction of access to data
Information/audit trails
File and program libraries
Holding data and program in secure places outside of the computer complex
Use if three generations of backups or file dumping systems

21
Q

Quality assurance

A

Independent of other functions
Existence provides some reassurance
E.g. internal audit department
More and more towards software

22
Q

Application controls

A

Data collected is genuine, accurate and complete
Data accepted is processed so it remains ^
Data stored temp/permanently is ^
Ouput data/info is ^

23
Q

Data controls incl:

A
Data capture/input contros 
Processing controls 
Output controls 
Database controls 
E-commerce controls
24
Q

Data capture controls - boundary

A
Cryptographic control 
Plastic cards 
Personal identificatiin numbers - pins 
Digital signatures - encrypted 
Firewalls
25
Cryptographic controls
The study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents
26
Data capture controls - audit trails
First records of the info/audit trail are st the boundary where identify and authenticity of the user is first recorded
27
Data capture controls - audit trail | Records include
``` Data to which access is requested Actions users wish to take Terminal at which access is sought Records of access decision No. Of sign-on attempts and Time of start/finish ```
28
Input controls
``` Design of source documentation Design of product Use if check-digits Sequence checking Limit/reasonableness tests One-for-one checking for criticsl data items Batch control ```
29
Processing controls
``` Run-to-run controls to ensure continuity Labels - internal&external Madter file data must be genuine Programs tested regularly Continual sequence and accuracy checks Back ups ```
30
Output controls
Outputs distributed to the correct users - confidential information Needs to be genuine, accurate and complete - depends on access and processing controls Exception reporting Review for errors
31
Database
Collection of data thst is shared&used by a number of diff applications for diff purposes Issues: loss of control over data by data preparaton personnel After-the-event authorisation Power of database administrator Audit trial is particularly important
32
Auditor approach systems & controls | 6 stages
1 Receipt of order 2 Authorisation of order 3 Despatch of gds and entry in stock records 4 Invoicing of goods despatched and entry in sales record 5 entry in debtors ledger/bank revords 6 entry in genersl or nominal records
33
Adv of flowcharts
Enable understanding of systems by auditors and client staff Force the auditor to understand how the company controls operations Pinpoint unnecessary procedures/docs
34
Disadv of flowcharts
Time-consuming & difficult to alter Narrative descriptions may be more appropriate Considerable use of symbols - hard to understand