The Federal government Fiscal Year end on this date.
What is September 30?
Activities to analyzing, identifying and correcting messy, raw data.
What is data cleansing / cleanup?
This is the formal name of the group whose initials are C.O.S.O.
What is the Committee of Sponsoring Organizations?
This handbook is within DHS series of information security policies for managing and protecting sensitive systems.
What is DHS 4300A Handbook?
This opinion on the auditor's report indicates the auditor's belief that the entity's financial statements fairly present its financial results, financial position, and cash flows.
What is unqualified / clean opinion?
These are the 2 types of accounts in the Federal accounting system.
What is Budgetary and Proprietary accounts?
This is a process to convert and migrate data from one database to another.
What is Extract Transform and Load (ETL)?
The three functions of controls are Correction, Detection, and this.
What is Prevention?
This is the third Information Security pillar, along with Data Confidentiality and Data Integrity.
What is Data Availability?
This GAO manual presents a methodology for auditing information system controls in federal and other governmental entities.
What is Federal Information System Controls Audit Manual (FISCAM)?
This is a uniform Chart of Accounts to be used in standardizing federal agency accounting that supports the preparation of standard external reports required by the Office of Management and Budget (OMB) and the Department of Treasury (Treasury).
What is the United States Government Standard General Ledger (USSGL)?
A formal declaration by a Designated Approving Authority that authorizes operation of a Business Product and explicitly accepts the risk to agency operations.
What is Authority/Approval to Operate (ATO)?
This principle is based on shared responsibilities of a key process that disperses the critical functions of that process to more than one person or department.
What is Segregation/Separation of Duties (SOD)?
A smoke alarm is an example of this kind of countermeasure.
What are Detective Countermeasures?
This GAO guidance provides a framework for conducting high-quality audits with competence, integrity, objectivity, and independence (aka Yellow Book).
What is Generally Accepted Government Auditing Standards (GAGAS)?
This Act prescribes the requirements for the administrative control of funds.
What is the Antideficiency Act (ADA)?
This systematic, disciplined improvement approach critically examines, rethinks, and redesigns mission-delivery processes in order to achieve dramatic improvements in performance in areas important to customers and stakeholders.
What is Business Process Reengineering (BPR)?
This AICPA Statement on Standards governs the way organizations report on their various compliance controls related to third-party vendors.
What is SSAE18?
This is the key documentation in the security authorization package to track IT risk mitigation activities.
What is Plan of Actions & Milestones (POA&M)?
This Act enhances the President Administration’s efforts to combat improper payments.
What is Improper Payments Elimination and Recovery Improvement Act of 2012 (IPERIA)?
This activity sets aside an estimate amount from the budget (e.g. Purchase Requisition).
What is a commitment?
This formal document specifies functional capabilities that the developer agrees to provide and the client agrees to find the product satisfactory if it provides the capabilities.
What is Function Requirements Document (FRD)?
Under the COSO 1992 framework, this is the fifth component of Internal Control, the other four being Control Environment, Risk Analysis, Control Activities, and Information/ Communication.
What is Monitoring?
When these two match up and get together, an incident occurs, not necessarily a loss.
What are a "Threat and Vulnerability"?
These are 3 components in the Fraud Triangle that contribute to increasing the risk of fraud.
What is 1) opportunity, (2) incentive, and (3) rationalization?