Question

In: Finance

Create a scenario in which you attempt to breach the company’s information system in order to...

Create a scenario in which you attempt to breach the company’s information system in order to commit financial fraud. Explain how and why your scheme might work. Identify two internal controls, one preventative control and one detective control, that would quickly prevent or uncover the potential fraud.

Solutions

Expert Solution

I attempted to breach the company’s information system to commit financial fraud by entering a new standing instruction on the company’s bank to make a recurring monthly payment to a new company. I will form a shell company and then use the company’s information system to register my shell company as a vendor for my employer company. I will also give a standing instruction to remit certain amounts to the shell company on a monthly basis and will get the transaction recorded as transaction for materials supplied by my shell company. The scheme might work as the amounts will not be very high to raise red flags and hence will go unnoticed.

Two internal controls: A preventive internal control that will quickly prevent the potential fraud is that duties are separated within the company. So one person cannot approve vendors as well as make payments. So for instance even if I register my shell company as an approved vendor the payments will be done by another employee and that too after it has been approved by the accounts manager. This will quickly prevent my fraud from occurring.

One detective control that will uncover my potential fraud is monthly reconciliation of payments to vendors against physical verification of all materials and inventories purchased. This reconciliation will show that my registered shell company is only receiving payments but there is no actual supply of materials from my company. Hence my fraud will be uncovered.


Related Solutions

Please create a Risk Mitigation Plan for this scenario. Scenario: You are an information technology (IT)...
Please create a Risk Mitigation Plan for this scenario. Scenario: You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a colocation data center, where...
For this discussion, you will create a scenario in which you are counseling a client, applying...
For this discussion, you will create a scenario in which you are counseling a client, applying techniques from Reality theory. The details of the counseling session scenario are up to you; however, note that your client must come from a diverse social or cultural background. Write the script of your hypothetical counseling session. The script must have at least 20 responses—10 from the client and 10 from you as the counselor. Your responses must align with the philosophy and goals...
using SANS policy template for "Data Breach Response Policy", create a scenario, and list all details...
using SANS policy template for "Data Breach Response Policy", create a scenario, and list all details pf the policy
In Python Create customer information system as follows: Python 3 Create customer information system as follows:...
In Python Create customer information system as follows: Python 3 Create customer information system as follows: Ask the user to enter name, phonenumber, email for each customer. Build a dictionary of dictionaries to hold 10 customers with each customer having a unique customer id. (random number generated) Take the keys of the above mentioned dictionary which are customer ids and make a list. Ask the use to enter a customer id and do a binary search to find if the...
Which scenario will result in the greatest decrease in energy for the system? (a) The system...
Which scenario will result in the greatest decrease in energy for the system? (a) The system releases 234 cal of heat and has 430 J of work done to it. (b) The system gains 904 J of heat and does 23.9 cal of work. (c) The system does 321 cal of work and loses 2.34 kJ of heat. (d) The system has 1.09 kJ of work done to it and loses 892 cal of heat. (e) The system gains 1000....
Create your own scenario in which you can compare the cost for two choices for the...
Create your own scenario in which you can compare the cost for two choices for the same service. You will need to create two equations, each of which should include:: 1. fixed cost 2. variable cost Then write an inequality to compare the two choices and solve it. Interpret your solution to further explain your comparison. Below is an example that you may use as a model to help you develop your own scenario. I am trying to decide whether...
In an attempt to create a biological battery for energy storage, you examine the possibility of...
In an attempt to create a biological battery for energy storage, you examine the possibility of incorporating a rare enzyme that facilitates the phosphorylation of 3-phosphoglycerate (3PG) in the presence of H+ to form 1,3 bisphosphoglycerate (1,3-BPG). The delta G for this enzymatically driven process is +59.6 kj/mol. A.) Draw the reaction scheme for 3PG to (1,3-BPG). B.) is this a spontaneous or nonspontaneous reaction? C.) What is the Keq under standard biological conditions, based on the delta G value...
Which location determines the jurisdiction of a breach of personally identifiable information (PII)? Where the PII...
Which location determines the jurisdiction of a breach of personally identifiable information (PII)? Where the PII breach occurred Where the individuals with compromised PII reside Where the PII was processed Where the compromised PII was stored
Create a scenario on University management system that provides services to students and professors alike. and...
Create a scenario on University management system that provides services to students and professors alike. and prepare use case diagrams, sequence diagrams, activity diagram(s), and class diagrams for the system developing.
3. If you had the ability, what government policies would you implement to attempt to create...
3. If you had the ability, what government policies would you implement to attempt to create economic growth? Would your approach be more “Classical” or “Keynesian” in nature? You may choose to focus on growing a local/state economy (for example: Lancaster’s, Columbus’s, Ohio’s) or growing a nation’s economy (the American economy). Keep your answer to the space provided! Be concise! In your answer: • Explain the “general factors” that all economists agree cause economic growth. • Give at least two...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT