Palmer AC 389 Exam 1

studied byStudied by 1 person
0.0(0)
get a hint
hint

Internal Audit

1 / 71

72 Terms

1

Internal Audit

Perform formal risk assessments when creating an audit plan

New cards
2

External Audit

Assess audit risks when creating audit plans

New cards
3

Controls

Specific procedures to assess and prevent risk

New cards
4

Risk

The likelihood of an unfavorable event occurring

New cards
5

Formal Risk Assessment

Identify, categorize, and prioritize individual risks so companies can leverage their understanding of risk in strategic planning. Companies want to be right in the middle where optimal risk taking sits. Not too much, not too little.

New cards
6

Business Function Level

A high-level business area or department that performs business processes to achieve company goals

New cards
7

Portfolio View

Examines risk at the entity level

New cards
8

Profile View

Examines risk at a more granular level of the business event, process, or event

New cards
9

Risk Statement

Contains two parts: the issue and the possible outcome. Presented in the format of "cause" and "effect" respectively

New cards
10

Internal Risks

Occur throughout a company's operations and arise during normal operations

New cards
11

External Risks

These risks are outside of the project, but directly affect it—for example, legal issues, labor issues, a shift in project priorities, or weather. "Force majeure" risks call for disaster recovery rather than project management. These are risks caused by earthquakes, tornadoes, floods, civil unrest, and other disasters.

New cards
12

External and Internal Risks can be further categorized by:

Six subcategories: Operational, Financial, Reputational, Compliance, Strategic, and Physical

New cards
13

Operational Risk (Internal)

The most important type of risk for an AIS, which occurs during day-to-day business operations and causes breakdowns in business activities. These risks are a priority for an AIS because they result from inadequate or failed procedures within the company.

New cards
14

Financial Risk (Internal)

Refers to money transitioning from within to outside of the company and the likelihood that a substantial sum may be lost.

New cards
15

Reputational Risk (Internal)

Occurs when the reputation/good name of a company is damaged.

New cards
16

Compliance Risk (External)

Occurs when a company fails to follow regulation and legislation and is subjected to legal penalties, including fines. (EPA)

New cards
17

Strategic Risk (External)

The inevitable risk that a strategy becomes less effective

New cards
18

Physical Risk (External)

Weather, crimes, and physical damage.

New cards
19

Risk Inventory

Once all risks have been categorized, this is basically a list of risks.

New cards
20

Risk Severity

The likelihood of risks occurring and their potential impact on the company

New cards
21

Risk Appetite

The amount of risk a company is willing to accept to achieve its goals and objectives. To avoid undue risk, risk appetite must be in alignment with company strategy.

New cards
22

Inherent Risk

the natural level of risk in a business process or activity if there are no risk responses in place

New cards
23

Residual Risk

The remaining risk after management has implemented risk responses and controls.

New cards
24

Responses to Risks

Accept, Avoid, Mitigate, Transfer/Share

New cards
25

Internal Controls

Processes that specifically mitigate risks to a company's financial information.

New cards
26

Function of a Control

Prevent, Detect, and Correct

New cards
27

Policy and Procedure Documentation

By specifying how employees should execute procedures and clarifying company policies, an organization lowers its risk of error and misconduct

New cards
28

Segregation of Duties

lessens the risk of error and fraud by ensuring that different employees are responsible for the separate parts of a business activity (Authorization, Recording Data, and Custody [of money])

New cards
29

Detective Controls

Controls designed to discover control problems that were not prevented (Cameras, physical invetory counts, reconciling the cash register, etc)

New cards
30

Corrective Controls

Controls designed to correct problems that have arisen (Insurance, police report, virus quarantine, etc)

New cards
31

Managment Override

Occurs when internal control activities don't work because management is not following policy or procedures. The Achilles Heel of fraud prevention (store writeoffs and price discounts).

New cards
32

Collusion

Two or more people acting in coordination to circumvent internal controls

New cards
33

Time-Based Model of Controls

Specific to the time it takes for a technology attack to bypass preventive controls compared to the company's detective and corrective control reaction times that measures the residual risk for technology attacks by comparing the relationship of the three control functions.

New cards
34

Physical Control

A control not in the computer environment (a lock on a door)

New cards
35

IT General Control or a IT Application Control

A control within the computer environment (firewall)

New cards
36

Systems Security

Controls embedded in the company's system specifically target the risk of external, unauthorized users performing malicious activities against company data or systems.

New cards
37

Data Backups

Previous/Alternate sets of the system that can be brought online to continue operations in the event of disaster.

New cards
38

Duplicate Environments

Changes to systems are not released to the software before they have been reviewed and approved. Instead changes are created in a duplicated environment - a copy - of the software.

New cards
39

Field Check

Characters in a field are of the proper type

New cards
40

Sign Check

Data in a field is appropriate sign (positive/negative)

New cards
41

Limit Check

Tests numerical amount against a fixed value

New cards
42

Range Check

Tests numerical amount against lower and upper limits

New cards
43

Redundant Check

Requires the inclusion of two identifiers in each input record

New cards
44

Size Check

Input data fits into the field

New cards
45

Completeness Check

Verifies that all required data is entered

New cards
46

Validity Check

Compares data from transaction file to that of master file to verify existence

New cards
47

Reasonableness Check

Correctness of logical relationship between two data items

New cards
48

Manual Controls

Requires human judgement or physical interaction is required.

New cards
49

Automatic Controls

Use technology to implement control activities

New cards
50

Continuous Monitoring

  1. Internal auditors, who are data analysts, use continuous monitoring technology to create detective controls that use rules-based programming to monitor a business's data for red flags or risks.

New cards
51

Business Operations

The 1st line of defense in the internal controls category. Management has the ownership and the responsibility of enforcing mitigating measures to prevent identified risk from occurring. This is where financial accountants, tax accountants, system analysists, and other accounting professionals who are not auditors or compliance officers work.

New cards
52

Risk Management and Compliance

The 2nd line of defence in the internal controls category. In many companies, ERM and compliance operation are combined, while in teams they might be separated departments. Accountants who specialize in compliance - such as designing and monitoring internal controls, performing risk assessments and responses, or assisting the legal team, work here.

New cards
53

Internal Audit (IA)

The 3rd line of defense in the internal controls category. IA is an independent function of the company that has a unique reporting relationship in an organization. IA is removed from the business process and has no stake in or influence over the outcome of the business processes that they are auditing. IA reports directly to both executive management and to the board of directors. Internal audit provides assurance, insight, and objectivity to a company.

New cards
54

Purchasing Process

also known as procurement process, is focused on acquiring the necessary resources for a business to operate

New cards
55

Inventory

Is a balance sheet line item that includes all items used in the creation of products. These can be classified as: Raw materials (RM),Work in process (WIP), and Finished Goods (FG).

New cards
56

Source Documents

Provide documenting of a transaction, such as a receipt, bill, or invoice, and may be electronic or paper documents, depending on the sophistication of the system

New cards
57

Purchase Requisition

An internal company document created when an employee formally requests to obtain goods and services from authorized sources

New cards
58

Purchase Order

A document created from the purchase requisition evolves into a legally enforceable purchase order.

New cards
59

Packing Slip

A document supplier delivers along with an order which shows quantities and descriptions of items delivered, to the receiving department at the specified warehouse location

New cards
60

Receiving Report

A document that shows the descriptions and quantities of goods received from vendors

New cards
61

Discrepancy Report

Identifying variances between the receiving report and the purchase order

New cards
62

Vendor Invoice

Bill from the vendor that includes the related purchase order number, billing date, description and quantities of goods, the amount due, and payment terms

New cards
63

Three-Way Match

The matching of a purchase order to the related receiving report and vendor invoice

New cards
64

Payment Voucher

An internal document that includes the vendor, amount due, and payment terms.

New cards
65

Remmitance Advice

Shows the invoices included in the payment to the vendor

New cards
66

Business-to-Consumer (B2C) Sales

Selling finished goods directly to customers

New cards
67

Business-to-Business (B2B) Sales

Selling finished goods to other businesses, like distributors and retail companies.

New cards
68

Marketing Deparments

Are generally responsible for marketing research, advertising, branding, promotional programs, and search engine optimization

New cards
69

Sales Orders

Are source documents that contain order details and are sent as order confirmations to customers.

New cards
70

Billl of Lading

A legal contract that defines responsibility for the goods in transit.

New cards
71

COSO

Control Environment, Risk Assessment, Control Activities, and Information & Communication

New cards
72

Risk Score

Impact * Likelihood

New cards

Explore top notes

note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 16 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 176422 people
Updated ... ago
4.8 Stars(728)

Explore top flashcards

flashcards Flashcard70 terms
studied byStudied by 43 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard51 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard74 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard72 terms
studied byStudied by 34 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard50 terms
studied byStudied by 73 people
Updated ... ago
4.2 Stars(5)
flashcards Flashcard30 terms
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard39 terms
studied byStudied by 90 people
Updated ... ago
5.0 Stars(9)
flashcards Flashcard85 terms
studied byStudied by 74 people
Updated ... ago
5.0 Stars(1)