Cia Review: Part 1 Study Unit 3: Control Frameworks and Fraud
Cia Review: Part 1 Study Unit 3: Control Frameworks and Fraud
and Fraud
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 1 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 2
CIA 1 SU 3 CIA 1 SU 3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 3 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 4
CIA 1 SU 3 CIA 1 SU 3
COSO Components
COSO Control Objectives of Internal Control
Internal control is broadly defined as a process, effected by Supporting the organization in its efforts to achieve objectives are
the following five components of internal control:
personnel, designed to provide reasonable assurance o Control environment
relating to operations, reporting, and compliance. o Risk assessment
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 5 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 6
CIA 1 SU 3 CIA 1 SU 3
Memory aid:
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 7 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 8
CIA 1 SU 3 CIA 1 SU 3
COBIT 5: Five Key Principles COBIT 5 Goals Cascade
Principle 1 : Meeting Stakeholder Needs
Principle 2: Covering the Enterprise End-to-End
Principle 3: Applying a Single, Integrated Framework
Principle 4: Enabling a Holistic Approach
Principle 5: Separating Governance from Managemenet
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 9 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 10
CIA 1 SU 3 CIA 1 SU 3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 11 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 12
CIA 1 SU 3 CIA 1 SU 3
Guides to the
Assurance Objectives Assessment of IT Risks (GAIT)
Availability. The entity must ensure that information, processes, and GAIT methodology gives management and auditors guidance for
services are available at all times. assessing the scope of IT general controls using a top-down and risk-
Capability. The entity must ensure reliable and timely completion of based approach.
transactions. Principles
Functionality. The entity must ensure that systems are designed to user o The identification of risks and related controls in IT general control
specifications to fulfill business requirements. processes should be a continuation of the top-down and risk-based
Protectability. The entity must ensure that a combination of physical and approach used to identify significant accounts, risks to those
logical controls prevents unauthorized access to system data. accounts, and key controls in the business processes.
o The IT general control process risks that need to be identified are
Accountability. The entity must ensure that transactions are processed those that affect critical IT functionality in financially significant
under firm principles of data ownership, identification, and authentication. applications and related data.
o The IT general control process risks that need to be identified exist,
Memory aid: for example, in application program code, networks, and operating
systems.
o Risks in IT general control processes are mitigated by the
achievement of IT control objectives, not individual controls.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 13 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 14
CIA 1 SU 3 CIA 1 SU 3
Hard and soft controls can be associated with particular B. Designing and operating a control system that provides reasonable assurance
that established objectives and goals will be achieved.
risks and measured. The vulnerability addressed can be
C. Ensuring that external and internal auditors adequately monitor the control
stated as the product of the probability of occurrence and environment.
the significance of the occurrence (V = P × S).
D. Implementing and monitoring controls designed by the board of directors.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 15 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 16
CIA 1 SU 3 CIA 1 SU 3
Multiple-Choice Answer
all play important roles in creating a proper control environment. Senior
management is primarily responsible for
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 17 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 18
CIA 1 SU 3 CIA 1 SU 3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 19 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 20
CIA 1 SU 3 CIA 1 SU 3
ERM Components ERM Components
Risk responses are actions taken to reduce the impact or
management philosophy, risk appetite, integrity, ethical likelihood of adverse events.
values, and overall environment. Control activities are policies and procedures to ensure the
Objective setting precedes event identification. effectiveness of risk responses.
Event identification relates to internal and external events The information and communication component identifies,
affecting the organization. captures, and communicates relevant and timely
Risk assessment considers likelihood and impact as a basis information.
for risk management. Monitoring involves ongoing management activities or
separate evaluations.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 21 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 22
CIA 1 SU 3 CIA 1 SU 3
Four Strategies
for Risk Response
1. Risk avoidance ends the activity associated with the risk. The board of directors has an oversight role. It should
2. Risk acceptance acknowledges the risks of an activity. determine that risk management processes are in place,
adequate, and effective.
3. Risk reduction (mitigation) lowers the level of risk
associated with an activity.
environment. They must possess certain qualities for them
4. Risk sharing transfers some loss potential to another party. to be effective.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 23 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 24
CIA 1 SU 3 CIA 1 SU 3
Risk Committee and
Responsibilities CRO Responsibilities
The CEO sets the tone at the top of the entity and has Larger entities may wish to establish a risk committee
ultimate responsibility for ERM. composed of directors that also includes managers, the
Senior management should ensure that sound risk individuals most familiar with entity processes.
management processes are in place and functioning. A chief risk officer (CRO) may be appointed to coordinate
management philosophy.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 25 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 26
CIA 1 SU 3 CIA 1 SU 3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 27 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 28
CIA 1 SU 3 CIA 1 SU 3
ERM Limitations
Limitations of ERM arise from the possibility of
o Faulty human judgment
o Cost-benefit considerations
o Simple errors or mistakes
o Collusion
o Management override of ERM decisions
Risk Management
3.3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 29 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 30
CIA 1 SU 3 CIA 1 SU 3
Definition
Performance Standard 2120: Risk Management
o The internal audit activity must evaluate the effectiveness and contribute to the
and control potential events or situations to provide improvement of risk management processes.
reasonable assurance regarding the achievement of the Interpretation of Standard 2120
o Determining whether risk management processes are effective is a judgment
(The IIA Glossary).
mission;
Significant risks are identified and assessed;
Appropriate risk responses are selected that align risks with the
Relevant risk information is captured and communicated in a timely
manner across the organization, enabling staff, management, and the
board to carry out their responsibilities.
o The internal audit activity may gather the information to support this
assessment during multiple engagements. The results of these engagements,
management processes and their effectiveness.
o Risk management processes are monitored through ongoing management
activities, separate evaluations, or both.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 31 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 32
CIA 1 SU 3 CIA 1 SU 3
Internal Audit of
Implementation Risk Management
Implementation Standard 2120.A1
o The internal audit activity must evaluate risk exposures Risk appetite
o
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 33 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 34
CIA 1 SU 3 CIA 1 SU 3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 35 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 36
CIA 1 SU 3 CIA 1 SU 3
Fraud
concealment, or violation of trust. These acts are not
dependent upon the threat of violence or physical force.
Frauds are perpetrated by parties and organizations to
Fraud -- Nature, obtain money, property, or services; to avoid payment or
loss of services; or to secure personal or business
Prevention, and Detection
3.4
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 37 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 38
CIA 1 SU 3 CIA 1 SU 3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 39 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 40
CIA 1 SU 3 CIA 1 SU 3
Examples of Fraud Division of Responsibilities
Asset misappropriation Bribery Control is the principal means of preventing fraud.
Skimming Conflict of interest o Management is primarily responsible for establishing
and maintaining control.
Disbursement fraud Diversion
o Internal auditors are primarily responsible for preventing
Expense reimbursement Wrongful use of information fraud by examining and evaluating the adequacy and
Payroll fraud Related party fraud effectiveness of control.
Financial statement Tax evasion Internal auditors are not expected to detect all fraud.
misrepresentation
Information
misrepresentation
Corruption
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 41 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 42
CIA 1 SU 3 CIA 1 SU 3
Components of Components of
Fraud Prevention Fraud Prevention
Fraud prevention involves actions to discourage fraud and The control environment includes such elements as a code
limit the exposure when it occurs. of conduct, ethics policy, or fraud policy.
A strong ethical culture and setting the correct tone at the A fraud risk assessment generally includes the following:
top are essential to prevention. o Identifying and prioritizing fraud risk factors and fraud
Overlapping control elements of a fraud prevention program schemes
are based on the COSO control framework. o Mapping existing controls to potential fraud schemes
and identifying gaps
o Testing operating effectiveness of fraud prevention and
detection controls
o Documenting and reporting the fraud risk assessment
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 43 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 44
CIA 1 SU 3 CIA 1 SU 3
Components of
Fraud Prevention Responsibility for Detection
Control activities are policies and procedures for business Internal auditors are not responsible for the detection of all
processes that include authority limits and segregation of fraud, but they always must be alert to the possibility of
duties. fraud.
Fraud-related information and communication practices
promote the fraud risk management program and the include evaluating fraud indicators and deciding whether
any additional action is necessary or whether an
Monitoring evaluates antifraud controls through investigation should be recommended.
independent evaluations of the fraud risk management
program and use of it.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 45 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 46
CIA 1 SU 3 CIA 1 SU 3
A. Reassign the clerk to another department. A. Reassign the clerk to another department.
B. Institute stricter controls over mailroom operations. B. Institute stricter controls over mailroom operations.
C. Evaluate fraud indicators and decide whether further action is necessary. C. Evaluate fraud indicators and decide whether further action is necessary.
D. D.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 47 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 48
CIA 1 SU 3 CIA 1 SU 3
Low-Level vs. Executive Fraud
Low-Level Fraud
o Fraud committed by staff or line employees most often
consists of theft of property or embezzlement of cash.
o The incentive might be relief of economic hardship, the
desire for material gain, or a drug or gambling habit.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 49 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 50
CIA 1 SU 3 CIA 1 SU 3
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 53 Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 54
CIA 1 SU 3 CIA 1 SU 3
Multiple-Choice Answer
Which of the following is most likely to be considered an indication of possible
fraud?
Even the most effective internal control can sometimes be circumvented, perhaps by
collusion of two or more employees. Thus, an auditor must be sensitive to certain
conditions that might indicate the existence of fraud, including high personnel turnover. In
the case of financial executives, high turnover may suggest a pattern of inflation of profits
to obtain bonuses or other benefits, to secure advantages in the marketplace, or to
conceal incompetence or rash actions.
Copyright © 2017 Gleim Publications, Inc. All rights reserved. Duplication prohibited. Reward for information exposing violators. Contact [email protected]. 55
CIA 1 SU 3