Week 3

    Cards (66)

    • What are the main topics covered in Lecture 3 of ACC3043?
      Control concepts, COSO framework, information security
    • What is the purpose of control concepts in technology security?
      To prevent, detect, and correct issues
    • What does COSO stand for in the context of internal control?
      Committee of Sponsoring Organizations
    • What are the three types of internal controls mentioned?
      Preventative, detective, corrective
    • What are some threats faced by an AIS?
      Natural disasters, software errors, unintentional acts
    • What is an example of an unintentional act that can threaten an AIS?
      Accidental data loss due to human error
    • What is the principle of least privilege in access control?
      Grant minimum access necessary for tasks
    • What is the role of detective controls?
      To detect problems when they arise
    • What is the purpose of corrective controls?
      To identify and correct problems as they occur
    • What does the COSO Internal Control Framework consist of?
      Five components and 17 principles
    • What is included in the control environment component of COSO?
      Management philosophy and organizational structure
    • How is risk assessed according to COSO?
      By likelihood and impact of events
    • What is the purpose of segregation of duties?
      To prevent fraud and errors in processes
    • What are project development/acquisition controls?
      Controls for managing system development projects
    • What is the significance of change management controls?
      To manage resistance and ensure smooth transitions
    • What is the role of independent checks on performance?
      To verify accuracy and reliability of operations
    • Why is information security considered a management issue?
      Because senior management support is essential
    • What does the time-based model of information security emphasize?
      Balancing preventive, detective, and corrective controls
    • How does the equation P > D + C relate to information security?
      It measures effectiveness of security controls
    • What are the key components of the COSO Internal Control Framework?
      • Control environment
      • Risk assessment
      • Control activities
      • Information and communication
      • Monitoring
    • What are the types of internal controls and their functions?
      Types of internal controls:
      1. General controls
      • IT security
      • Software acquisition/development
      1. Application controls
      • Prevent, detect, and correct errors and fraud
    • What are the key AIS control activities?
      • Authorisation of transactions
      • Segregation of duties
      • Project development and acquisition controls
      • Change management controls
      • Safeguarding assets and records
      • Independent checks on performance
    • What are the main types of risks according to COSO?
      • Inherent risk
      • Residual risk
    • What are the principles of the information and communication process in COSO?
      1. Obtain relevant, high-quality information
      2. Internally communicate objectives and responsibilities
      3. Communicate internal control matters to external parties
    • What are the types of monitoring in COSO?
      • Internal control evaluations
      • Effective supervision
      • Responsibility accounting systems
      • Periodic audits
      • Fraud detection measures
    • What are the key aspects of safeguarding assets, records, and data?
      • Appropriate policies and procedures
      • Maintain records of IT assets
      • Restrict access to sensitive data
      • Protect data through off-site storage
    • What is the importance of continuous data auditing?
      • Verifies systems operate as expected
      • Detects anomalies in real-time
    • What is the role of threat intelligence in information security?
      • Enhances awareness of potential threats
      • Facilitates information sharing among organizations
    • What are the benefits of effective information security management?
      • Protects sensitive data
      • Reduces risk of data breaches
      • Enhances organizational reputation
    • What should be done with sensitive data?
      It should be encrypted
    • What must be maintained regarding computer/IT assets?
      Records of all computer/IT assets
    • Why is access to assets restricted?
      To protect data and maintain security
    • What are some methods to protect data?
      Off-site storage and fireproofing
    • What is the purpose of independent checks on performance?
      To ensure accuracy and reliability
    • What is a useful tool to check for oddities in accounts?
      The trial balance
    • What is a critical factor in information security?
      People can be the weakest link
    • What does the time-based model of information security involve?
      A combination of preventive, detective, and corrective controls
    • How is security considered effective in the time-based model?
      If P > D + C
    • What does log analysis help detect?
      Possible attacks on an AIS
    • What is the function of Intrusion Detection Systems (IDS)?
      To analyze network traffic for intrusions
    See similar decks