AIS Exam 3 study guide

Subdecks (1)

Cards (66)

  • Data
    Raw facts or statistics that, absent a context, may have little meaning
  • Information
    Data organized in a meaningful way to the user
  • Accounting Information Systems
    System that records, processes and reports on transactions to provide financial and non-financial information to make decisions and have appropriate levels of internal controls for those transactions
  • Information Overload
    The difficulty a person faces in understanding a problem and making a decision as a consequence of too much information
  • Attributes of Useful Information
    • Relevance
    • Faithful Representation
  • Relevance
    Confirmatory value, Predictive value, Materiality
  • Faithful Representation
    Complete, Neutral, Free from Error
  • Internal Control
    The processes, policies, and procedures implemented by an organization to safeguard its assets, ensure the accuracy of its financial records, and promote operational efficiency and adherence to laws and regulations
  • Why are internal controls used?
    • To minimize the risk of fraud, errors, and inefficiencies in an organization's operations, as well as to ensure compliance with laws and regulations
  • The three main functions of internal controls
    • Prevent errors and fraud
    • Detect them if they occur
    • Correct them to mitigate their impact and prevent recurrence
  • Preventive Controls

    Deter problems from occurring (Authorization)
  • Detective Controls
    Discover problems that are not prevented (Bank Reconciliations and monthly trial balances)
  • Corrective Controls

    Correct and recover from the problems that have recover corrupted data (backup files to recover corrupted data)
  • Internal controls in a computerized environment can be characterized by automated processes and systems that ensure the integrity, security, and reliability of data and information, as well as compliance with relevant laws and regulations
  • General controls
    The overall control environment, including the IT infrastructure and security measures
  • Application controls
    Specific to individual applications and are designed to ensure the completeness, accuracy, and validity of transactions processed by those applications
  • COSO
    The Committee of Sponsoring Organizations of the Treadway Commission, a joint initiative of five private sector organizations focused on improving organizational performance and governance through effective internal control, enterprise risk management, and fraud deterrence
  • The five nonprofit organizations that comprise COSO
    • American Accounting Association (AAA)
    • American Institute of Certified Public Accountants (AICPA)
    • Financial Executives International (FEI)
    • Institute of Management Accountants (IMA)
    • Institute of Internal Auditors (IIA)
  • COSO used two frameworks, the Internal Control-Integrated Framework and the Enterprise Risk Management-Integrated Framework, to improve the quality of financial reporting through enhanced accountability, effective internal controls, risk management practices, and corporate governance
  • Control activities
    • Physical controls
    • IT general controls
    • IT application controls
    • Input controls
    • Processing controls
    • Output controls
  • Cost/benefit analysis
    A process used to evaluate whether the benefits of a proposed project or action outweigh the costs involved
  • COBIT Framework
    A widely used framework for the governance and management of enterprise IT, providing a comprehensive set of controls and best practices
  • Business requirements for information
    Confidentiality, integrity, availability, compliance, reliability, and usability
  • Information security
    The goal is to protect the confidentiality, integrity, and availability of information assets from unauthorized access, use, disclosure, disruption, modification, or destruction
  • Common information security risks
    • Virus
    • Worm
    • Trojan Horse
    • Spam
    • Botnet
    • Denial-of-service attacks
    • Spyware
    • Spoofing
    • Social engineering
  • Encryption
    A preventive control providing confidentiality and privacy for data transmission and storage. Main factors are key length, key management, and encryption algorithm
  • Authentication
    A process that establishes the origin of information or determines the identity of a user, process, or device
  • Digital signature
    A cryptographic technique used to verify the authenticity and integrity of a digital message, document, or software
  • Fraud
    The intentional deception or misrepresentation for personal or financial gain, encompassing activities like financial fraud, identity theft, and insurance fraud
  • Fraud triangle

    Consists of three elements: Incentive, Opportunity, Rationalization
  • According to the fraud triangle, all three elements must be present for fraud to occur. Removing any one of these elements can help prevent or deter fraudulent behavior
  • Elements of a fraud detection program
    • Risk assessment
    • Clear policies and procedures
    • Internal controls
    • Training
    • Monitoring
    • Reporting mechanisms
    • Investigation procedures
    • Compliance oversight
    • Continuous improvement
  • Disaster Recovery Planning (DRP)
    Involves preparing for IT system recovery after a disaster
  • Business Continuity Management (BCM)
    Focuses on maintaining critical business functions during and after a disaster
  • Fault Tolerance
    The ability of a system to continue operating properly in the event of the failure of some of its components
  • Virtualization
    The process of creating a virtual (rather than actual) version of something, such as a server, operating system, storage device, or network resource
  • Cloud Computing
    The delivery of computing services, including servers, storage, databases, networking, software, and more, over the internet (the cloud)
  • Operating System (OS)

    Software that manages a computer's resources and provides a user interface for interacting with the computer
  • Database
    An organized collection of data, typically stored and accessed electronically from a computer system
  • Data warehouse
    A large, centralized repository of integrated data from one or more disparate sources, used for reporting, analysis, and business intelligence purposes