• Accuracy (Assertion): A management declaration that amounts, dates, and other data related to recorded activities have been recorded appropriately without computational error. Example: The auditor verifies that the financial totals transferred from the payroll module to the general ledger match down to the exact decimal point.

  • Advocacy Threat: A threat to objectivity occurring when a practitioner promotes an auditee's position to the point that their professional impartiality is compromised. Example: An internal auditor defending a department's non-compliant data practices during a meeting with external federal regulators.

  • Agile Auditing: An iterative audit project management methodology that prioritises human interactions, flexible scopes, and real-time customer collaboration over rigid, long-term planning structures. Example: The audit team runs two-week execution "sprints" to review cloud security, allowing them to pivot their focus if a severe zero-day vulnerability is announced.

  • Analytical Procedures: Evidence-gathering techniques involving the evaluation of data by examining plausible relationships, fluctuations, trends, and inconsistencies. Example: Comparing the ratio of failed login attempts to total logins over six months to identify sudden spikes indicative of automated attacks.

  • Attribute Sampling: A statistical, fixed sample-size methodology utilised primarily in compliance testing to estimate the rate of occurrence of a specific, binary quality within a population. Example: Selecting a sample of 50 new user creation tickets specifically to check if the attribute of a "Manager Approval Signature" is present or absent.

  • Audit Charter: A formal, overarching governance document approved by the board of directors that establishes the audit function's absolute purpose, responsibility, authority, and accountability. Example: A signed charter explicitly granting the audit team the unrestricted legal right to access all corporate servers, physical locations, and personnel records without requiring IT's prior consent.

  • Audit Risk (Overall): The overarching probability that information or financial reports contain material errors, and that the auditor's procedures will completely fail to detect that an error has occurred. Example: The risk that an auditor issues an unqualified "clean" opinion on the financial systems, despite a massive, unrecorded embezzlement scheme existing in the database.

  • Availability (Assertion): A management declaration that information, evidence, and other critical data required for business continuity or audit engagements exist and are readily accessible. Example: An auditor requesting change management logs from a decade-old legacy system to ensure the records can still be retrieved and read by modern software.

  • CAATs (Computer-Assisted Audit Techniques): Specialised software tools (such as generalised audit software, scripts, and debugging tools) used by auditors to extract, gather, and analyse vast datasets electronically. Example: Running an automated Python script to cross-reference a database of 50,000 vendor bank accounts against 50,000 employee direct deposit accounts to detect fraudulent matches.

  • Compensating Control: A strategically implemented internal control designed specifically to offset a known, unavoidable weakness within the enterprise's primary control architecture. Example: Segregating a legacy manufacturing application that cannot support complex passwords onto a highly restrictive, air-gapped network segment.

  • Completeness (Assertion): A management declaration ensuring that all activities, transactions, and data that should have been recorded within a system actually have been recorded without omission. Example: The auditor cross-referenced HR termination emails with IT deprovisioning logs to ensure that every fired employee had their access revoked.

  • Compliance Testing: An audit execution procedure designed strictly to evaluate the operating effectiveness of internal controls in preventing, detecting, or correcting weaknesses. Example: The auditor observes a security guard's workflow to verify that they actually check physical ID badges before allowing personnel into the server room.

  • Continuous Auditing: An automated technique utilised by auditors to perform tests and assessments in real-time or near-real-time environments to gather evidence instantaneously. Example: The audit department is configuring an automated tool that instantly alerts the Chief Audit Executive if a transaction exceeds $5 million outside of normal business hours.

  • Continuous Monitoring: An operational management process utilised to observe the day-to-day performance of processes, systems, or data networks. Example: The Security Operations Centre (SOC) utilises a SIEM platform to watch live network traffic for malware signatures 24/7.

  • Control Risk: The probability that a material error exists and will not be prevented or detected on a timely basis by the organisation's existing internal controls. Example: A high control risk exists if an organisation relies entirely on an annual manual review of firewall rule changes rather than on automated daily configuration alerts.

  • Corrective Control: A reactive mechanism designed to remediate errors, omissions, unauthorised uses, and malicious intrusions only after they have been detected. Example: The automated execution of a disaster-recovery failover to a secondary data centre immediately after the primary data centre experiences a catastrophic power failure.

  • Criteria: The objective, complete, reliable, and measurable benchmarks against which an auditor evaluates the specific subject matter. Example: Utilising the heavily documented ISO 27001 standard as the authoritative benchmark to evaluate an organisation's Information Security Management System.

  • Detection Risk: The probability that the IS auditor's applied substantive testing procedures will completely fail to identify a material error or misstatement. Example: An auditor failing to uncover a massive database corruption issue because they arbitrarily chose a sample size of only 5 records out of 5 million.

  • Detective Control: A monitoring mechanism that provides warnings of violations or attempted violations of security policies without inherently inhibiting the action. Example: A network Intrusion Detection System (IDS) that sends an email alert to administrators indicating a brute-force password attack is currently underway against a server.

  • Deterrent Control: A psychological or physical mechanism providing warnings intended to dissuade intentional or unintentional attempts to compromise a system. Example: A prominently displayed login banner on a corporate workstation stating that unauthorised access is monitored and constitutes a federal crime.

  • Discovery Sampling: A highly specialised sampling approach designed mathematically to uncover at least one single instance of an anomaly, deviation, or fraud. Example: An auditor reviewing executive expense reports explicitly searching for a singular instance of an executive expensing an unauthorised personal vacation.

  • Due Professional Care: The ethical standard requiring auditors to act with diligence, integrity, professional scepticism, and the skill expected of a reasonably prudent professional. Example: An auditor refusing to accept a department head's verbal assurance that backups are successful, demanding to see the hard cryptographic hashes as proof.

  • Familiarity Threat: A threat to objectivity that occurs when an auditor becomes overly sympathetic to the auditee's interests due to a long, close relationship, leading to undue acceptance of the auditee's work. Example: An auditor failing to rigorously test the network access controls because the network administrator is a former colleague and a close personal friend.

  • Inherent Risk: The baseline risk level or exposure of a process or entity to material error, assuming absolutely no internal controls have been implemented. Example: The naturally massive risk of data theft associated with allowing employees to download highly classified corporate intellectual property onto unencrypted personal USB drives.

  • Inspection: An evidence-gathering technique involving the meticulous physical or electronic examination of internal or external documents, records, and assets. Example: An auditor physically reviewing the maintenance logs signed by technicians attached to the Uninterruptible Power Supply (UPS) units in the data centre.

  • Integrated Auditing: A holistic audit approach that evaluates both the IT systems and the supporting business processes simultaneously to generate a combined opinion on control risk. Example: Auditing the automated tax calculation logic within an ERP system while simultaneously auditing the human accounting department's manual tax filing procedures.

  • Integrated Test Facility (ITF): A continuous auditing CAAT where fictitious entities are created within a production system to process test transactions alongside live data, verifying application logic safely. Example: Creating a "dummy" employee in the live payroll system and running a test paycheck to verify that the system correctly calculates federal tax withholdings.

  • Intimidation Threat: A threat to objectivity occurring when an auditor is deterred from acting with integrity because of actual or perceived pressures, including attempts to exercise undue influence. Example: A Chief Financial Officer threatening to drastically cut the internal audit department's budget if the upcoming IS audit report contains negative findings.

  • Management Participation Threat: A severe threat to independence resulting from auditors taking on the role of management, or performing operational functions on behalf of the audited entity. Example: An auditor personally configuring the rule sets on the corporate firewall to help the IT department meet a tight deadline.

  • Objectivity: The required mental state allowing an auditor to perform engagements impartially, free from bias, self-interest, or any undue internal or external influence. Example: An auditor documenting critical security failures in a system managed by their direct supervisor, without altering the findings to protect the supervisor's reputation.

  • Organisational Independence: The structural placement of the audit function within an enterprise, ensuring it is completely free from operational management's interference or conflicts of interest. Example: Structuring the organisational chart so that the Chief Audit Executive reports directly to the Board of Directors, rather than to the Chief Information Officer.

  • Pervasive IT Controls: High-level, overarching general controls that focus on the comprehensive management, governance, and monitoring of the entire IT environment. Example: The enterprise-wide IT strategic plan, the corporate security policy framework, and the overarching risk management methodology.

  • Preventive Control: A proactive mechanism designed structurally to inhibit or impede attempts to violate established security policies and practices. Example: Implementing full-disk encryption and strict physical vault doors to mathematically and physically guarantee that stolen hardware cannot be accessed.

  • Re-performance: An evidence-gathering technique where the auditor independently executes procedures or controls that were originally executed by the information system or personnel. Example: An auditor takes a sample of raw transaction data and runs it through their own independent calculation script to see if their output matches the system's output.

  • Risk Assessment: The formalised process of identifying, quantifying, and prioritising risks against enterprise objectives to guide the effective allocation of audit resources. Example: Rating a legacy operating system vulnerability as "High Risk" because its exploitation would cause an enterprise-wide outage, taking more than six months to recover from.

  • Sampling Risk: The mathematical danger that the auditor's conclusion drawn from a limited sample diverges fundamentally from the conclusion that would be reached if the entire population were tested. Example: The auditor tests 10 servers and finds them perfectly patched, concluding the whole network is safe, when in reality the remaining 990 servers are entirely unpatched.

  • Self-Interest Threat: A threat to objectivity occurring when a financial or other personal interest inappropriately influences the auditor's professional judgment or behaviour. Example: An auditor suppressing negative findings regarding an application because they personally own significant stock in the third-party vendor that developed the application.

  • Self-Review Threat: A threat to objectivity occurring when an auditor must evaluate the results of previous judgments made or services performed by themselves. Example: An auditor being assigned to independently review the effectiveness of the disaster recovery plan that they authored and implemented six months prior.

  • Stop-or-Go Sampling: A flexible sampling methodology that helps prevent excessive testing by allowing the auditor to halt the test at the earliest moment if few errors are encountered. Example: An auditor begins testing firewall rules; after finding absolutely zero errors in the first 25 samples, they cease testing, inferring a highly effective control environment.

  • Stratified Mean per Unit: A specific variable sampling technique where a population is divided into homogenous subgroups (strata) based on characteristics to reduce variance and improve estimation accuracy. Example: Grouping an inventory database into high-value servers, medium-value laptops, and low-value peripherals before taking statistical samples from each distinct group.

  • Substantive Testing: A rigorous audit procedure designed to bypass the control environment to gather evidence evaluating the ultimate integrity, completeness, and accuracy of individual data points. Example: Manually recalculating the accrued interest on 5,000 separate bank accounts to verify that the banking software's mathematical logic executed flawlessly over the year.

  • Variable Sampling: A quantitative statistical model utilised predominantly in substantive testing to estimate the continuous value, weight, or monetary magnitude of a vast population. Example: Selecting a statistical sample of IT hardware acquisition invoices to accurately estimate the total monetary misstatement of IT capital expenditures for the entire fiscal year.