AIS Final Exam

Ace your homework & exams now with Quizwiz!

steps risk response

(1) Reduce risks: implement effective internal control (2) Share risks: buy insurance, outsource, or hedge (3) Avoid risks: do not engage in the activity (4) Accept risks: Do nothing, accept likelihood and impact of risk

Organization Capital

- investment in creating a unique corporate identity and culture -Ensuring that employees know and are aligned with the organization's strategic objectives

Human Capital

- investment in people -Ensuring the right people with the right skills are available

Proof of stake (how blockchain works)

-A set of validators who propose the next block lock up an amount of their cryptocurrency as a deposit to ensure honest behavior. -It reduced computer costs and centralization risks

Database Systems

-Accountants increasingly participate in designing internal control systems and improving business and IT processes in a database environment -shared collection of logically related data which meets the information needs of a firm -the core asset of many companies

Proof of work (how blockchain works)

-All miners compete to create the next block to be committed to the blockchain. This is done by solving a complex mathematical problem. -It requires the miners use computer power so it can prevent attacks as it requires tons of computer powers to overcome

Descriptive Analysis

-Analysis performed that characterizes, summarizes and organizes past performance. -Ex: Did we make a profit last year?How much did we pay in federal taxes last year?How long have the existing accounts receivable been past due?

Prescriptive Analytics

-Analysis performed which identifies the best possible options given constraints or changing conditions - ex: What is the level of sales needed to breakeven? How can revenues to maximized if there is a trade war with China? Should the company lease or buy its headquarters office? Should the company make its own products or outsource production to another company?

Physical Intrusion (threat physical IT environment)

-External parties entering facilities without permission and/or providing access information -Unauthorized hardware changes (vulnerability)

excessive heat or humidity (threat physical IT environment)

-Humidity alarm not in place -Outdated devices not providing information on temperature and humidity levels (vulnerability)

Interruption of a system (threat IT system)

-Improper system configuration and customization -Poor service level agreements (SLAs) monitoring on service providers (vulnerability)

Unintentional disclosure of sensitive information by employee (threat Processes of IT Operations)

-Inappropriate data classification rule -Poor user access management allows some users to retrieve sensitive information not pertaining to their roles and responsibilities

Inappropriate end-user computing (threat Processes of IT Operations)

-Ineffective training as to the proper use of computer -End-user computing policy has not been reviewed -Poor firewall rules allowing users to access illegitimate websites

disruption/blackout (threat physical IT environment)

-Insufficient backup power supply -No voltage stabilizer (vulnerability)

4 perspective BS

-Learning & Growth Perspective (Improve process) -Business Process Perspective (lower costs; enhance customer value) -Customer perspective (grow revenue) -Financial perspective

3 concepts traditional transactions (blockchain)

-Middleman -Delay -Service fee

Natural disasters (threat physical IT environment)

-No regular review of a policy that identifies how IT equipment is protected against environmental threats -Inadequate or outdated measures for environmental threats (vulnerability)

Intentional destruction of information (threat Processes of IT Operations)

-Not requiring approval prior to deleting sensitive data -Poor employee morale -Writable disk drive containing data which shall not be deleted such as transaction logs

Audit Data Standards Benefits

-Reduces the time and effort involved in accessing data by -Works well with standard audit and risk analytic tests often run against datasets in specific accounts or groups of accounts (such as inventory or accounts receivable or sales revenue transactions). -Allows software vendors (such as ACL Inc.) to produce data extraction programs for given enterprise systems to help facilitate fraud detection and prevention and risk management. -Facilitates testing of the full population of transactions, rather than just a small sample. -Connects/interacts well with XBRL GL Standards (to be introduced in Chapter 10).

water in data center (threat physical IT environment)

-Server room located in the basement -Clogged water drain (vulnerability)

system intrusion (threat IT system)

-Software not patched immediately -Open ports on a main server without router access -Outdated intrusion detection/prevention system (vulnerability)

Proof of authority (how blockchain works)

-The administrator identities who creating blocks are known and reputable. -The rest of the network can vote for admin removal in case of malicious behavior found in the network.

blockchain system - differences

-The transactions are done without any middleman involved .-Much faster transaction time (minutes vs days). -Lower service fee.

Logical access control failure (threat IT system)

-Work performed not aligned with business requirements -Poor choice of password -Failure to terminate unused accounts in a timely manner (vulnerability)

Computer Fraud Risk Assessment

-a systematic process that assists management and internal auditors in discovering where and how fraud may occur and whom may commit the specific fraud. -a component of a firm's enterprise risk management (ERM) program. -focuses on fraud schemes and scenarios to determine whether the controls exist and how the controls might be circumvented.

Data analytics

-defined as the science of examining raw data, removing excess noise and organizing the data with the purpose of drawing conclusions for decision making. -often involves the technologies, systems, practices, methodologies, databases, and applications used to analyze diverse business data to help organizations make sound and timely business decisions.

Local Networks

-group of computers, printers, and other devices connected to the same network that covers a limited geographic range. -Includes hubs and switches

Information Capital

-investment in information -Ensuring required access to information and the ability to communicate

Criteria 1 ( Cybersecurity Risk Management)

-nature of business and operations, -nature of information at risk, -cybersecurity objectives, -factors significantly affecting inherent cybersecurity risks, -cybersecurity risk governance structure, -cybersecurity risk assessment process, -cybersecurity communications and quality of cybersecurity information, -monitoring of the cybersecurity risk management program, and -cybersecurity control processes.

3 objective internal control (COSO 2013)

-operations: effectiveness and efficiency of a firm's operations -reliability: reliability of reporting -compliance: adherence to applicable laws and regulations

switches

-provides a path for each pair of connections -provide a significant improvement over hubs: each device connected via the network only sees traffic that has been directed to it via its designated MAC (Media Access Controls) address and cannot eavesdrop on network traffic intended for other recipients

Vulnerability

-the characteristics of IT resources that can be exploited by a threat to cause harm. -as weaknesses or exposures in IT assets or processes that may lead to a business risk, compliance risk, or security risk.

Operating System

-the most important system software - Ensure the integrity of the system. -Control the flow of multiprogramming and tasks of scheduling in the computer. -Allocate computer resources to users and applications. -Manage the interfaces with the computer. -Part of IT governance

A - AMPS

1. Ask the Question •"Your Data Won't Speak Unless You Ask It the Right Questions." •The AMPS model starts with asking questions that can be addressed with data and that lead to a better decision making.

5 components COSO 2013

1. Control environment 2. risk assessment 3. control activities 4. Information and communication 5. Monitoring activities

Steps in preparing data

1. Get data 2. Set relationships among tables 3. Select attributes for the visualization 4. Select and modify the visualization

Steps to establish ISMS (ISO 27000)

1. Scope 2. Security Policy 3. Risk Assessment 4. Connotes 5. Risk Treatment ; statement applicability 6. ISMS 7. Internal Audits, Monitoring Reviews, Surveillance Audits

Cybersecurity Risk Management Criteria (by AICPA)

1. description of the company's cybersecurity risk management system. 2. an evaluation of the company's cybersecurity controls

AMPS Model

1.Ask the Question2.Master the data3.Perform the analysis4.Share the story

Vulnerability management prerequisites (2)

1.Determine the main objectives of its vulnerability management, as the firm's resource for managing vulnerabilities is limited (in some cases, it could be to comply with applicable laws, regulations, and standards) 2.Assign roles and responsibility for vulnerability management.

steps computer fraud (risk assessment)

1.Identifying relevant IT fraud risk factors. 2.Identifying potential IT fraud schemes and prioritizing them based on likelihood and impact. 3.Mapping existing controls to potential fraud schemes and identifying gaps. 4.Testing operating effectiveness of fraud prevention and detection controls. 5.Assessing the likelihood and business impact of a control failure and/or a fraud incident

OS control objectives

1.Protect itself from users 2.Protect users from each other 3.Protect users from themselves 4.Be protected from itself 5.Be protected from its environment

Data Visualization Process

1.Understand the data 2.Select the data visualization tool •Excel •Tableau •Power BI •Others 3.Develop and present the visualization •Create or reinforce knowledge •Choose the right chart

AMPS Model: Perform the Analysis

1.What Happened? - Descriptive Analysis 2.Why Did it Happen? - Diagnostic Analysis 3.Will it Happen in the Future? - Predictive Analysis 4.What Should We Do, Based on What We Expect Will Happen? - Prescriptive Analysis

Key length

128-bit and longer key length are sufficient to secure data

M - AMPS

2. Master the data

P - AMPS

3. Perform the analysis

S - AMPS

4. Share the story

botnet (bot)

A collection of software robots that overruns computers to act automatically in response to the bot-herder's control through Internet.

Digital certificate (asymm key factor)

A digital document issued and digitally signed by the private key of a Certificate Authority that binds the name of a subscriber to a public key.

System Availability

A key component of IT service delivery and support is making sure the data is available at all times or, at a minimum, in the moment it is needed.

trojan horse

A non-self-replicating program that has a useful purpose in appearance, but in fact has a different, malicious purpose.

Virus

A self-replicating program that runs and spreads by modifying other programs/files

Worm

A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.

Public Key Infrastructure (asymm key factor)

A set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs to issue, maintain, and revoke public key certificates.

Certificate Authority (asymm key factor)

A trusted entity that issues and revokes digital certificates.

WANs 2 compnents

Access point, station

Consensus (how blockchain works)

All parties will be aware of transactions that take place on the network and agree to the transactions being written to the blockchain.

Predictive Analytics

Analysis performed to provide foresight by identifying patterns in historical data. -ex: What is the chance the company will go bankrupt?What is our expected sales and income next year?Can we predict if the financial statements will be misstated?Will the borrower pay us back the loan we've granted her?

Fraud

Any illegal act characterized by deceit, concealment, or violation of trust. These acts are not dependent upon the threat of violence or physical force.

Asymmetric-key Encryption Key Factors

Certificate Authority (CA), Digital Certificate, Public Key Infrastructure (PKI)

SAS (Statement of Auditing Standards) fraud

Consideration of Fraud in a Financial Statement Audit states that an entity's management has primary responsibility for establishing and monitoring all aspects of the entity's fraud risk-assessment and prevention activities, and has both the responsibility and the means to implement measures to reduce the incidence of fraud.

Learning & Growth Perspective (BS)

Describes the firm's objectives for improvements in tangible and intangible infrastructure

Social engineering (threat Processes of IT Operations)

Employee training not providing information about social engineering attempts

COSO ERM Framework

Expands COSO framework taking a risk-based approach •Internal environment •Objective setting •Event identification •Risk assessment •Risk response •Control activities •Information and communication •Monitoring

COSO Internal Control Framework

For evaluating, reporting, and improving internal control, widely accepted. 1.Internal control is a process consisting of ongoing tasks and activities. It is a means to an end, not an end in itself. 2.Internal control is affected by people. It is not merely about policy manuals, systems and forms. Rather, it is about people at every level of a firm that impact internal control. 3.Internal control can provide reasonable assurance, not absolute assurance, to an entity's management and board. 4.Internal control is geared toward the achievement of objectives in one or more separate but overlapping categories. 5.Internal control is adaptable to the entity structure.

Univariate Data

Histograms show the distribution of a single variable across a range of values, grouped into bins that show the frequency or percentage of values in that bin.

systems integrity

If users can perform the intended functions of a system without being degraded or impaired by unauthorized manipulation

Top tech issues CPAs

Information security management issue

Main factors of encryption

Key length, key management, encryption algorithm

Time Trends

Line charts are used to show values over time for one or more categories.

Framework Vulnerability Assessment and management

Maintenance, Identification, Assessment, Remediation

Risk Response

Management selects risk responses and develops a set of actions to align risks with the entity's risk tolerances, its risk appetite and cost versus benefit of potential risk responses

social engineering

Manipulating someone to take certain action that may not be in that person's best interest such as revealing confidential information or granting access to physical assets, networks, or information.

storage

Many companies choose to use a cloud platform to lower the cost of data storage.

Benefits WANs

Mobility, Rapid deployment, flexibility and scalability

2009 - History of block chain

Nakamoto used a distributed ledger system through resource intensive mining to eliminate the need for intermediaries in trustless, online, peer-to-peer digital currency transactions.

COSO Enterprise Risk Management—Integrated Framework

Objectives: -Strategic—high-level goals, aligned with and supporting the firm's mission and vision -Operations—effectiveness and efficiency of operations -Reporting—reliability of internal and external reporting -Compliance—compliance with applicable laws and regulations

Immutability (how blockchain works)

Once transactions are confirmed on the blockchain, they are tamperproof and cannot be altered.

3 main functions internal controls

Preventive controls, Detective controls, Corrective controls

Proportional

Proportion charts, such as pie or doughnut charts, show shares of a total at a single point in time. These charts should be limited to a few slices with clear differences in size.

scatter plot

Scatter plots show correlations between two continuous variables, such as height and weight, or GPA and SAT scores. Scatter plots present detailed data for the two variables; each dot represents a single data point.

Spoofing

Sending a network packet that appears to come from a source other than its actual source.

Spam

Sending unsolicited bulk information

Spyware

Software secretly installed into an information system to gather information on individuals or organizations without their knowledge of; a type of malicious code.

key management

Strong policy on key management are essential for info security

Encryption algorithm

Symmetric-key encryption methods;Asymmetric-key encryption methods

Distributed and decentralized (how blockchain works)

The data are distributed and synchronized among all the participants in the network.

Popularization - History of Blockchain

The internal data structure of transactions in the system is packaged in blocks and chained together, thus, this technology eventually became blockchain.

Denial-of-Servie (DoS)

The prevention of authorized access to resources (such as servers) or the delaying of time-critical operations.

Virtual Private Networks

VPNs

Categorical Charts

Vertical or horizontal bar charts present categorical information.

Info Security risks and attacks

Virus, worm, trojan horse, spam, botnet (bot), denial-of-service (DoS), Spyware, spoofing, social engineering

opportunity

_____ for fraud to be perpetrated

Uninterruptible power supply

a device using battery power to enable a system to operate long enough to back up critical data and shut down properly during the loss of power.

Encryption

a preventive control providing confidentiality and privacy for data transmission and storage. Main factors of encryption are key length, key management, and encryption algorithm.

Embedded audit module (white-box approach)

a programmed audit module that is added to the system under review.

Station

a wireless endpoint device equipped with a wireless Network Interface Card (NIC)

rationalize

an attitude that enables the individuals committing the fraud to rationalize

Criteria 2 ( Cybersecurity Risk Management)

an evaluation of the company's cybersecurity controls. It provides the trust services criteria and principles for security, availability, processing integrity, confidentiality, and privacy.

information security management

an integrated, systematic approach that coordinates people, policies, standards, processes, and controls used to safeguard critical systems and information from internal and external security threats.

Types of Learning

applications are designed to perform either: -Classification -regression

integrated test facility (white-box approach)

approach is an automated technique that enables test data to be continually evaluated during the normal operation of a system.

Application controls (Computerized environment)

are specific to a subsystem or an application to ensure the validity, completeness and accuracy of the transactions.

Parallel simulation (white-box approach)

attempts to simulate the firm's key features or processes.

2009 - History of block chain

blockchain 2.0 emerged as a more robust and sophisticated technology to pull together logic and business rules into contracts represented in code called "smart contracts" through Ethereum.

Generally Accepted Auditing Standards (GAAS; CAATs)

broad guidelines regarding an auditor's professional responsibilities

Hubs

broadcasts through multiple ports

M - Data Accessibility

can we get the needed data to answer the question posed?

Security WANs and LANs

confidentiality, integrity, availability, access control

Corrective controls

correct and recover from the problems that have been identified (Backup files to recover corrupted data)

Big Data

datasets that are too large and complex for businesses' existing systems to handle using their traditional capabilities to capture, store, manage and analyze these data sets.

preventive controls

deter problems from occurring (Authorization)

hashing process

different from encryption. Hashing result is irreversible. Encrypted messages can be decrypted and become readable again.

detective controls

discover problems that are not prevented (Bank reconciliations and monthly trial balances)

IT general controls (ITGC)

enterprise-level controls over IT + IT control environment + Access controls + Change management controls + Project development and acquisition controls + Computer operations controls

Inherent risk

exists already before plans are made to address it

Input controls:

field checks, size checks, range checks, validity checks, completeness checks, reasonableness checks, check digit verifications, closed-loop verifications

Virtualization (Cloud computing)

good alternatives to backup data and applications.

Disaster recovery planning (DRP)

identifies significant events that may threaten a firm's operations, outlining the procedures that ensure the firm's smooth resuming of operations in the case this event occurs. -most critical corrective controls

Computer-assisted Audit Techniques (CAATs)

imperative tools for auditors to conduct an audit in accordance with heightened auditing standards.

3 conditions for fraud

incentive, opportunity, reationalize

Feed-forward neural networks

information moves in one direction.

IIA standard section (1220.A2)

internal auditors must consider the use of computer-assisted, technology-based audit tools and other data analysis techniques when conducting internal audits.

Message Digest (MD)

is a short code (256 bits or 32 characters) generated through a process called hashing, where the original document passes through an algorithm such as SHA-256 or MD-5.

M - Data Integrity

is the data accurate, valid and consistent over time?

M - Data Reliability

is the data clean?

M - Data Type

is the data structured? is the data internal? are there privacy concerns with the data?

access point

logically connects stations to a firm's network.

physical controls (control activities)

mainly manual but could involve the physical use of computing technology. + proper authorization of transactions and activities + segregation of duties + project development and acquisition controls + change management controls + design and use of documents and records + safeguarding assets, records, and data + independent checks on performance

risk management

more complex and strategic process, mostly conducted using a top-down, risk-based approach

Continual Service Improvement (ITIL 5 categories)

ongoing improvement of the service and the measurement of process performance required for the service.

General controls (Computerized environment)

pertain to enterprise-wide issues (controls over accessing the network, developing and maintaining applications, etc.)

Processing controls

pre-numbered documents, sequence checks, batch totals, cross-footing balance tests, concurrent update controls

Smart contracts - History of block chain

programmable in Ethereum. This flexibility drew the attention of corporations and government agencies.

Main objective ISO (27000)

provide a model for establishing, implementing, operating, monitoring, maintaining, and improving an Information Security Management System (ISMS) using a "process approach"

IT controls (control activities)

provide assurance for information and help to mitigate risks associated with the use of technology.

incentive

provides a reason to commit fraud

Information Systems Auditing Standards (ISASs)

provides guidelines for conducting an IS/IT audit (issued by ISACA)

Service Transition (ITIL 5 categories)

realizing the requirements of strategy and design, and maintaining capabilities for the ongoing delivery of a service

Business continuity management (BCM)

refers to the activities required to keep a firm running during a period of interruption of normal operations. **DRP is is a component of BCM -most critical corrective controls

Velocity

refers to the fact that the data comes in at quick speeds or in real time, such as streaming videos and news feeds.

Volume

refers to the massive amount of data involved.

Veracity

refers to the quality of the data including extent of cleanliness (without errors or data integrity issues), reliability and representationally faithful

Variety

refers to unstructured and unprocessed data, such as comments in social media, emails, global positioning system (GPS) measurements, etc.

Output controls

required number of copies printed

Classification

seeks to assign labels, dividing the input into output groups, such as: -Yes or No -Spam or Not Spam

Regression

seeks to predict real numbers, such as: -The price of a house -The revenue in next quarter

limiting factors Big Data

storage and processing

Regulatory and social processes (process perspective)

such as financial reporting, accounting, and those that manage environmental, safety and health, employment, and community issues.

Innovation processes (process perspective)

such as identifying opportunities, research and development, product design and development, and product launch.

Operations management processes (process perspective)

such as supply, production, distribution, and risk management.

customer management processes (process perspective)

such as those involved with the selection, acquisition, and retention of customers, and growth of the firm's market.

Vulnerability Management

tactical and short-term effort, frequently conducted using an IT asset-based approach.

processing power

the ________ required to obtain information valuable to the company could be enormous or even impossible.

Recurrent neural networks

the connections between neurons include loops.

Service Design (ITIL 5 categories)

the design and development of IT services and service management processes

Service Operation (ITIL 5 categories)

the effective and efficient delivery and support of services, with a benchmarked approach for event, incident, request fulfillment, problem, and access management.

Bitcoin

the first cryptocurrency

residual risk

the product of inherent risk and control risk (risks that is left over after controlling it)

Service Strategy (ITIL 5 categories)

the strategic planning of IT service management capabilities and the alignment of IT service and business strategies

control risk

the threat that errors or irregularities in the underlying transactions will not be prevented, detected and corrected by the internal control system.

test data technique (white-box approach)

uses a set of input data to validate system integrity.

fault tolerance

using redundant units to provide a system the ability to continue functioning when part of the system fails.

the four Vs

volume, velocity, veracity and variety—are often used to represent the defining features of Big Data.

TechnicalChallenges (Continuous Auditing)

• Access to all relevant data in a timely manner • Accumulating and quantifying the risks and the exposures that have been identified • Defining the appropriate analytic that will effectively identify exceptions to controls • Developing a suitable scoring/weighting mechanism to prioritize exceptions • Balancing the costs and efforts of reviewing large volumes of exceptions against the exposures of the exceptions themselves

Non-technicalBarriers (Continuous Auditing)

• Perceived negative impact of continuous auditing on the firm. • Priority of implementation in determined key areas. • Readiness of the internal audit group to develop and adopt continuous auditing • Unrealistic expectations of the benefits of continuous auditing

Continuous Audit Benefits (most firms)

• can reduce errors and frauds • increase operational effectiveness • better comply with laws and regulations • increase management confidence in control effectiveness and financial information

Wide Area Networks

• link different sites together, transmit information across geographically and cover a broad geographic area. -to provide remote access to employees or customers -to link two or more sites within the firm -to provide corporate access to the Internet routers and firewalls

Continuous Audit Benefits (Allows internal and external auditors)

• monitor transaction data in a timely manner • better understand critical control points, rules, and exceptions • perform control and risk assessments in real time or near real time • notify management of control deficiencies in a timely manner • reduce efforts on routine testing while focus on more valuable investigation activities

Balanced Scorecard Problem

•40% of financial executives say their company's IT investments are proving little or no ROI •A formal, structured approach that links IT investments to business performance can avoid problems •The balanced scorecard is a widely-used tool that can help companies link their IT investments to strategic performance

Continuous Audit

•A continuous audit is performing audit-related activities on a continuous basis. •Testing in continuous audits often consists of continuous controls monitoring and continuous data assurance. •Technology plays a key role in analyzing trends and patterns of transactions, identifying exceptions and anomalies, and testing controls.

Cryptocurrency Applications

•A cryptocurrency that eliminates the ability to double spend. •Anonymous peer-to-peer transactions, no middleman involved. •Public blockchain -anyone can join or leave at any time. •Validation through proof of work and rewards as an economic incentive via a resource intensive computation called mining. •Immutable history of transactions. •Distributed ledger. •One block is added to the blockchain approximately every 10 minutes. •The First-Mover - the first blockchain application in production.

ITIL (control framework)

•A de facto standard in Europe for the best practices in IT infrastructure management and service delivery. •value proposition centers on providing IT service with an understanding the business objectives and priorities, and the role that IT services has in achieving the objectives. •adopts a lifecycle approach to IT services, and organizes IT service management into five high-level categories. •Information Technology Infrastructure Library

(3) Control Activities

•A firm must establish control policies, procedures, and practices that ensure the firm's objectives are achieved and risk mitigation strategies are carried out. •Occur throughout a firm at all levels and in all functions.

Strategy Maps

•A one-page representation of the firm's strategic priorities •Shows the cause-and-effect linkages among strategic priorities •Allows organizations to assess and prioritize gaps between current and desired performance levels

Corporate governance

•A set of processes and policies in managing an organization with sound ethics, internal and external control mechanisms to safeguard the interests of its stakeholders. •Promotes accountability, fairness, and transparency in the organization's relationship with its stakeholders.

Balanced Scorecard

•A strategic planning and management system •Used extensively in business and industry, government, and nonprofit organizations worldwide •Aligns business activities to the vision and strategy of the organization •Improves internal and external communications •Monitors organization performance against strategic goals

Impact of Data Analytics -Business

•A study from McKinsey Global Institute estimates that Big Data could generate up to $3 trillion in value per year in just a subset of industries impacted. •In addition to producing more value externally, studies show that data analytics affects internal processes, improving productivity, utilization, and growth.

Management responsibility

•According to SOX, the establishment and maintenance of internal controls who's responsibility?

black-box approach

•Auditing around the computer •First calculating expected results from the transactions entered into the system •Then comparing these calculations to the processing or output results •The advantage of this approach is that the systems will not be interrupted for auditing purposes. could be adequate when automated systems applications are relatively simple.

white-box approach

•Auditing through the Computer •The white-box approach requires auditors to understand the internal logic of the system/application being tested. •The auditing through the computer approach embraces a variety of techniques: test data technique, parallel simulation, integrated test facility (ITF), and embedded audit module.

Extract, Transform, and Load

•Before data can be analyzed and be useful, it must be scrubbed from extraneous data and noise. •Reformatting, cleansing, and consolidating large volumes of data from multiple sources and platforms can be especially time consuming. Data analytics professionals estimate that they spend between 50 percent and 90 percent of their time cleaning data for analysis. •The cost to scrub the data includes the salaries of the data analytics scientists and the cost of the technology to prepare and analyze the data. As with other information, there is a cost to produce these data.

Encryption and Authentication

•Both the sender and receiver use asymmetric-key encryption method to authenticate each other. •Either the sender (or the receiver) generates a symmetric key (called session key because it is valid for a certain timeframe only) to be used by both parties. •Use asymmetric-key encryption method to distribute the session key. (For example, the sender uses the receiver's public key to encrypt the session key and sends it to the receiver. The receiver uses his/her own private key to decrypt to get the session key.) •After both parties have the session key, use the session key to transmit confidential data/information. This is because using symmetric key for encryption is faster in data transmission.

Cognitive Technologies

•Cognitive technologies employ self-learning algorithms that allow computers to examine connections and notice patterns without human intervention •Examples: -Machine learning -Neural networks -Robotic process automation (RPA) -Bots-Natural language processing

Financial Perspective

•Confirms the success of the firm's investments and its ability to deliver value to customers •Overall objective is shareholder value (for-profit companies) •Other objectives usually related to: -Long-term growth -Productivity

Using TABLEAU for data analysis

•Connect to the data •Review the data and join the tables •Prepare visualizations in worksheets •Use Show Me to find appropriate options •Use tools to modify the visualization •Combine multiple visualizations in a Dashboard

COBIT (control framework)

•Control Objectives for Information & related Technology •For the governance and management of enterprise IT •generally accepted framework for IT governance and management •Defines the scope and ownership of IT process and control •Is consistent with accepted IT good practices and standards •Provides a common language with a set of terms and definitions that are generally understandable by all stakeholders •Meets regulatory requirements by being consistent with generally accepted corporate governance standards (e.g., COSO) and IT controls expected by regulators and auditors.

key criteria business requirements for info

•Effectiveness - relevant and timely •Efficiency -produced economically •Confidentiality -protection of sensitive information •Integrity -valid, accurate and complete •Availability -available when needed• Compliance -complying with the laws and regulations •Reliability -reliable for daily decision making

Usefulness Blockchain

•Enable multiple parties that do not fully trust each other to collaborate with a shared source of truth. •Accelerate transaction settlement and verification by eliminating intermediaries. •Help cut costs and resources that would be spent on manual verification (help auditors collecting and evaluating evidence to support transactions).

Public Company Accounting Oversight Board (PCAOB)

•Established under SOX to provide independent oversight of public accounting firms. •PCAOB Auditing Standard No. 5 (AS 5) encourages auditors to use a risk-based, top-down approach to identify the key controls •analyzing control at financial statement level and focus on entity-level control

Why code of Ethics?

•Ethical behavior prompted by a code of ethics can be considered a form of INTERNAL CONTROL .•Employees with different culture backgrounds are likely to have different values → to promote ethical behavior within a group -Ex: AICPA, ISACA, IIA, IMA,

Using excel for data analysis

•Examine the data and determine how the tables connect •Insert tables for data in each worksheet -Rename the tables -Adjust the format as desired •Set the relationships between tables -Data > Relationships -Link the table with the foreign key to the table with the primary key •Summarize with a PivotTable -Format fields appropriately -Change names were desired -Add slicers as filters -Chart the results in a PivotChart

Implementation of Continuous Auditing

•Extensible Markup Language (XML) •Extensible Business Reporting Language (XBRL) •Database management systems •Transaction logging and query tools •Data warehouses •Data mining or computer-assisted audit techniques (CAATs)

Symmetric-key encryption

•Fast •Suitable for large data set •Key distribution and key management are problematic + difficult to distribute key in secure way +managing one key is not cost effective

Generalized Audit Software (GAS)

•Frequently used to perform substantive tests and is used for testing of controls through transactional-data analysis. •Directly read and access data from various database platforms •Provides auditors an independent means to gain access to data for analysis and the ability to use high-level, problem-solving software to invoke functions to be performed on data files. -Audit Control Language (ACL) -Interactive Data Extraction and Analysis (IDEA)

Risk Assessment

•Given AS 5, is also a first step in developing an audit plan to meet the mandate of SOX Section 404. •Types of risk: Inherent risk, control risk, residual risk

exposures

•Given an identified possible fraud, management's estimates of the potential loss from the fraud

(2) Risk Assessment

•Identifying and analyzing a firm's risks from external and internal environments. •Allows a firm to understand the extent to which potential events might affect corporate objectives. •Risk is assessed from two perspectives: -+ Likelihood -Probability that the event will occur -+ Impact -Estimate potential loss if event occurs

Event Identification

•Identifying incidents both external and internal to the organization that could affect the achievement of the organizations objectives •Must distinguish between risks and opportunities •Opportunities are channeled back to strategy or objective-setting processes and identified risks should be forwarded to the next stage

Impact of Data Analytics -Accounting

•In financial accounting, data analytics may be used to scan the environment—that is, by scanning social media to identify potential risks and opportunities to the firm. •Data analytics plays a very critical role in the future of audit. •Data analytics also expands auditors' capabilities in services such as testing for fraudulent transactions and automating compliance-monitoring activities (e.g., filing financial reports with the SEC or IRS).

IT application controls (control activities)

•Input controls: field checks, size checks, range checks, validity checks, completeness checks, reasonableness checks, check digit verifications, closed-loop verifications •Processing controls: pre-numbered documents, sequence checks, batch totals, cross-footing balance tests, concurrent update controls •Output controls: required number of copies printed

Artificial Intelligence

•Intelligence exhibited by machines rather than humans. •The ability of computers to perform tasks that associated with human intelligence, such as: -thinking logically, acting rationally, visual perception, speech recognition, language translation • also called cognitive technologies. •AI can create up to $5.8 trillion annual value across all business sectors.

(1) Control Environment

•Management's philosophy, operating style •Commitment to integrity, ethical values, and competence •Internal control oversight by Board of Directors •Organizing structure •Methods of assigning authority and responsibility •Human resource standards

Control Concepts

•Processes implemented to provide assurance that the following objectives are achieved: -Safeguard assets-Maintain sufficient records -Provide accurate and reliable information -Prepare financial reports according to established criteria -Promote and improve operational efficiency -Encourage adherence with management policies -Comply with laws and regulations

Asymmetric-key Encryption

•Slow •Not suitable for large data set •Key distribution and key management are solved + public key is widely used while private key is kept secret + transmit confidential information

(4) Information and Communication

•Supports all other control components by communicating effectively -+ to ensure information flows within the firm •Down •Across •Up -+ to interact with external parties and inform them about related policy positions •customers •suppliers •regulators •shareholders

Blockchain Traditional system

•System is centralized. •Requires a middleman to approve and record transactions. •Only one copy of the ledger

Blockchain system

•System is decentralized, distributed ledger •No middleman needed, multiple copies •When a new transaction occurs, all nodes are in sync. •Information cannot be added or deleted without the knowledge of the entire network. •A write-once, read-many system.

Using CAATs

•Test of details of transactions and balances •Analytical review procedures •Compliance tests of IT general and application controls •Operating system and network vulnerability assessments •Application security testing and source code security scans•Penetration Testing

(5) Monitoring Activities

•The design and effectiveness of internal controls should be monitored by management in an ongoing basis. •Findings should be evaluated and deficiencies must be communicated in a timely manner. •Necessary modifications should be made to improve the business process and the internal control system.

Data Visualization

•The process of presenting information graphically •One way of sharing the story and turning data into information •Presenting relevant information to decision makers

common computer fraud (GTAG)

•The theft, misuse, or misappropriation of assets by altering computer-readable records and files. •The theft, misuse, or misappropriation of assets by altering the logic of computer software. •The theft or illegal use of computer-readable information. •The theft, corruption, illegal copying, or intentional destruction of computer software. •The theft, misuse, or misappropriation of computer hardware.

Customer Perspective

•The value proposition differentiates from the competition -Product attributes -Service attributes -Brand image •Creates customer satisfaction, retention, and new customer acquisition

creating digital signiture

•To create the document creator must use his/her own private key to encrypt the MD, so it also authenticates the document creator.

digital signature

•a message digest(MD) of a document (or data file) that is encrypted using the document creator's private key. •To create we need to use both hashing and encryption process. •can ensure data integrity and Prevent repudiation of Transactions •To create the document creator must use his/her own private key to encrypt the MD, so it also authenticates the document creator.

Audit Data Standards (ADS)

•a set of standards for data files and fields typically needed to support an external audit in a given financial business process area. •If both the provider and the user (e.g., a company and its external auditor) of the data had the same, this cost of cleaning and formatting the data could be alleviated

ISO (control framework)

•designed to address information security issues. •I particularly ISO 27001 and ISO 27002, have become the most recognized and generally accepted sets of information security framework and guidelines.

2 types os schemes

•encode plain text into non-readable form or cyphertext 1. Symmetric-key encryption methods 2. Asymmetric-key encryption methods

Cost and benefit analysis (risk assessment)

•important in determining whether to implement an internal control. -Internal control benefits > costs: IMPLEMENT

Authentication

•process that establishes the origin of information or determines the identity of a user, process, or device.•It is critical in e-business because it can prevent repudiation while conducting transactions online.

fraud detection

•program should include an evaluation by internal auditors on the effectiveness of business processes, along with an analysis of transaction-level data to obtain evidence on the effectiveness of internal controls and to identify indicators of fraud risk or actual fraudulent activities.•An effective approach is to have a continuous monitoring system with embedded modules to create detailed logs for transaction-level testing.

fraud prevention

•program starts with a fraud risk assessment across the entire firm, taking into consideration the firm's critical business divisions, processes, and accounts, performed by the management. •The audit committee typically has an oversight role in this process, often works with the internal audit group and external auditors. •Making employees aware of their obligations concerning fraud and misconduct begins with practical communication and training.

Sarbanes Oxley Act of 2002

•requires public companies registered with the SEC and their auditors to annually assess and report on the design and effectiveness of internal control over financial reporting.

Objective Setting

•set at the strategic level, establishing a basis for operations, reporting and compliance -support and align with the firm's mission and are consistent with its risk appetite.

IT governance

•subset of corporate governance and includes issues regarding IT management and security. •responsibility of management, to ensure that the firm's IT sustains and extends its business objectives •COBIT supports and management by providing a framework to ensure that IT is aligned with the business, IT enables the business and maximizes firm value, IT resources are used responsibly, and IT risks are managed appropriately.

Artificial neural networks

•the engines of machine learning. -are mathematical models that convert inputs to outputs/predictions, can be nested together -A cleaned and well-defined training data set is used to optimize predictions. -The trained model is applied to more test data or real-world data.

focus of information security (AICPA)

•the primary focus is the balanced protection of the confidentiality, integrity, and availability of data while maintaining efficient policy implementation and without disrupting organizational productivity. -confidentiality -integrity -availability

Machine Learning

•type of AI; Deep Learning is a type of Machine Learning. •involves the computer's ability to learn from experience rather than specific instructions. AI --> ML --> deep learning


Related study sets

CH13: Viruses, Viroids, and Prions

View Set

Chapter 12, Monopolistic Competition and Oligopoly

View Set

Neuronal Cell Membrane and Membrane Potential

View Set

Computer Science Principles Unit 1,2,4 Code.org

View Set

Physical Science 1417 Chp 4 Heat & Temperature

View Set

Nutrition: Chapter 5 Practice Test

View Set