It Reviewer
It Reviewer
IT – CHAPTER 1
SUPPLY CHAIN - is the entities, processes,
BUSINESS PROCESS - is a prescribed and information flows that involve the
sequence of work steps performed in order to movement of materials, funds, and related
produce a desired result for the organization. information through the full logistics process,
A business process is initiated by a particular from the acquisition of raw materials to the
kind of event, has a well-defined beginning delivery of finished products to the end user.
and end, and is usually completed in a The supply chain includes all vendors, service
relatively short period. providers, customers, and intermediaries.
FRAUD TRIANGLE:
▪ Incentive to commit the fraud. Some
kind of incentive or pressure typically
leads fraudsters to their deceptive acts.
Financial pressures, market
pressures, job-related failures, or
addictive behaviors may create the
incentive to commit fraud.
▪ Opportunity to commit the fraud.
Circumstances may provide access to
them assets or records that are the
objects of fraudulent activity. Only
those persons having access can pull
off the fraud. Ineffective oversight is
IT – CHAPTER 3 often a contributing factor.
▪ Rationalization of the fraudulent
STEWARDSHIP - is the careful and action. Fraudsters typically justify
responsible oversight and use of the assets their actions because of their lack of
entrusted to management. moral character. They may intend to
repay or make up for their dishonest
actions in the future, or they may
CODE OF ETHICS – To fulfill these believe that the company owes them as
obligations, management must maintain a result of unfair expectations or an
internal controls and enforce a code of ethics. inadequate pay raise.
HACKING - is the term commonly used for 4. Ensure compliance with management
directives.
computer network break-ins. A particular
kind of hacking: denial of service attack
(DoS) is intended to overwhelm an intended
target computer system with so much bogus PREVENTIVE CONTROLS - are designed to
network traffic that the system is unable to avoid errors, fraud, or events not authorized
respond to valid network traffic. by management.