Uploaded by Yuno Nanase

Information Technology Auditing Ch 01 - 05 Flashcards Quizlet

advertisement
Math
Information Technology Auditing Ch 01 - 05
10 studiers recently
Leave the first rating
Terms in this set (93)
Access controls
Accounting records
Audit objectives
Audit opinion
Controls that ensure that only authorized personnel
have access to the firm's assets.
"The documents, journals, and ledgers used in
transaction cycles. "
Audit goals derived from management assertions
that lead to the development of audit procedures.
Opinion of auditor regarding the presentation of
financial statements.
Stage at which the auditor identifies the financially
Audit planning
significant applications and attempts to understand the controls over the primary transactions that
are processed by these applications.
Audit procedure
Tasks performed by auditors to gather evidence
that supports or refutes management assertions.
"Probability that the auditor will render unqualified
Audit risk
opinions on financial statements that are, in fact,
materially misstated. "
Information Technology Auditing Ch 01 - 05
Form of independent attestation performed by an
Auditing
expert who expresses an opinion about the fairness
of a company's financial statements.
Policies and procedures used to ensure that
Control activities
appropriate actions are taken to deal with the
organization's risks.
Control environment
The foundation of internal control.
Likelihood that the control structure is flawed
Control risk
because controls are either absent or inadequate to
prevent or detect errors in the account.
Corrective controls
Actions taken to reverse the effects of errors
detected in the previous step.
Risk that auditors are willing to take that errors not
Detection risk
detected or prevented by the control structure will
also not be detected by the auditor.
"Devices, techniques, and procedures designed to
Detective controls
identify and expose undesirable events that elude
preventive controls. "
Risk that is associated with the unique
Inherent risk
characteristics of the business or industry of the
client.
"Policies a firm employs to safeguard the firm's
Internal control system
assets, ensure accurate and reliable accounting
records and information, promote efficiency, and
measure compliance with established policies. "
Information Technology Auditing Ch 01 - 05
Explicit or implicit statements made by management
Management assertions
within the financial statements pertaining to the
financial health of the organization.
Monitoring
Preventive controls
Risk assessment
Segregation of duties
Substantive tests
Supervision
Tests of controls
Transaction authorization
The process by which the quality of internal control
design and operation can be assessed.
Passive techniques designed to reduce the
frequency of occurrence of undesirable events.
"The identification, analysis, and management of
risks relevant to financial reporting. "
Separation of employee duties to minimize
incompatible functions.
Tests that determine whether database contents
fairly reflect the organization's transactions.
A control activity involving the critical over- sight of
employees.
Tests that establish whether internal controls are
functioning properly.
Procedure to ensure that employees process only
valid transactions within the scope of their authority.
"Comprehensive statement of all actions to be taken
Disaster recovery plan (DRP)
before, during, and after a disaster, along with
documented, tested procedures that will ensure the
continuity of operations. "
Information Technology Auditing Ch 01 - 05
"Arrangement that involves two or more user
Empty shell
organizations that buy or lease a building and
remodel it into a computer site, but without the
computer and peripheral equipment. "
Agreement between two or more organizations
Mutual aid pact
(with comparable computer facilities) to aid each
other with their data processing needs in the event
of a disaster.
Arrangement involving two or more user
Recovery operations center
organizations that buy or lease a building and
(ROC)
remodel it into a completely equipped computer
site.
Hardware component that asks the caller to enter a
Call-back device
password and then breaks the connection to
perform a security check.
Compilers
Echo check
Language translation modules of the operation
system.
Technique that involves the receiver of the message
returning the message to the sender.
Electronic data interchange
The inter company exchange of computer-
(EDI)
processible business information in standard format.
Technique that uses a computer program to
Encryption
transform a standard message being transmitted
into a coded (cipher text) form.
Information Technology Auditing Ch 01 - 05
Software and hardware that provide a focal point
Firewall
for security by channelling all network connections
through a control gateway.
Topology where a host computer is connected to
Hierarchical topology
several levels of subordinate smaller computers in a
master-slave relationship.
Interpreters
Network topology
Language translation modules of the operating
system that convert one line of logic at a time.
Physical arrangement of the components.
Technique that incorporates an extra bit into the
Parity check
structure of a bit string when it is created or
transmitted.
Password
Polling
Public key encryption
Secret code entered by the user to gain access to
the data files.
Popular technique for establishing communication
sessions in WANs.
Technique that uses two keys one for encoding the
message and the other for decoding it.
Technique in which a control message from the
Request-response technique
sender and a response from the sender are sent at
periodic synchronized intervals.
Reusable password
A network password that can be used more than
one time.
Information Technology Auditing Ch 01 - 05
Ring topology
Topology that eliminates the central site. All nodes
in this configuration are of equal status.
"Special-purpose computers that manage common
Servers
resources, such as programs, data, and printers of
the LAN. "
Token passing
Trojan horse
Virus
Transmission of a special signal (token) around the
network from node to node in a specific sequence.
Program that attaches to another legitimate
program but does not replicate itself like a virus.
Program that attaches itself to a legitimate program
to penetrate the operating system.
Software program that burrows into the computer's
Worm
memory and replicates itself into areas of idle
memory.
Access method
Attributes
The technique used to locate records and to
navigate through the database.
Equivalents to adjectives in the English language
that serve to describe the objects.
"Devices that measure various personal
Biometric devices
characteristics, such as fingerprints, voice prints,
retina prints, or signature characteristics. "
Data definition language (DDL)
Programming language used to define the database
to the database management system.
Information Technology Auditing Ch 01 - 05
Data dictionary
Data manipulation language
(DML)
Description of every data element in the database.
Language used to insert special database
commands into application programs written in
conventional languages.
Data structures
Database administrator (DBA)
Database authorization table
Database lockout
Techniques for physically arranging records in the
database.
The individual responsible for managing the
database resource.
Table containing rules that limit the actions a user
can take.
Software control that prevents multiple
simultaneous access to data.
Database management system
Software system that controls access to the data
(DBMS)
resource.
Entity
Grandparent-parent-child
"A resource, event, or agent. "
Backup technique used in sequential batch systems.
(GPC)
A database model that represents data in a
Hierarchical data model
hierarchical structure and permits only a single
parent record for each child.
Inference controls
Controls that prevent users from inferring specific
data values through normal query features.
Information Technology Auditing Ch 01 - 05
Internal view
Navigational model
Network model
The physical arrangement of records in the
database.
Model that possesses explicit links or paths among
data elements.
Variation of the hierarchical model.
Database approach that splits the central database
Partitioned database approach
into segments or partitions that are distributed to
their primary users.
Replicated databases
Schema (conceptual view)
Sub-schema (user view)
User views
Backbone systems
Conceptual design
Database approach in which the central database is
replicated at each IPU site.
Description of the entire data- base.
User view of the database.
The set of data that a particular user needs to
achieve his or her assigned tasks.
Basic system structure on which to build.
The production of several alternative designs for the
new system.
Information Technology Auditing Ch 01 - 05
"Design of screen outputs, reports, and operational
documents; entity relationship diagrams; normal
form designs for database tables; updated data
Detailed design
dictionary; designs for all screen inputs and source
documents; context diagrams for overall system;
low-level data flow diagrams; and structure
diagrams for program modules. "
Documentation
End users
Written description of how the system works.
Users for whom the system is built.
"Process that involves five steps identifying the
New systems development
problem, understanding what needs to be done,
considering alternative solutions, selecting the best
solution, and implementing the solution. "
Object-oriented design
Objects
Project planning
Project schedule
Stakeholders
Steering committee
Building information systems from reusable
standard components or modules.
Equivalent to nouns in the English language.
Allocation of resources to individual applications
within the framework of the strategic plan.
Document that formally presents management's
commitment to the project.
Entities either inside or outside an organization that
have direct or indirect interest in the firm.
An organizational committee consisting of seniorlevel management responsible for systems planning.
Information Technology Auditing Ch 01 - 05
Structured design
Disciplined way of designing systems from the top
down.
"Determination of what elements, if any, of the
System survey
current system should be preserved as part of the
new system. "
Two-step process that involves a survey of the
Systems analysis
current system and then an analysis of the user's
needs.
Systems development life
Formal process consisting of two major phases new
cycle (SDLC)
systems development and maintenance.
Systems planning
Turnkey systems
Vendor-supported systems
Linking of individual system projects or applications
to the strategic objectives of the firm.
Completely finished and tested systems that are
ready for implementation.
Custom systems that organizations purchase from
commercial vendors.
Analysis of system design to ensure the design is
Walk-through
free from conceptual errors that could become
programmed into the final system.
Download