Question

In: Economics

Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain...

Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain your reasoning,

(a) Employees have a password to gain access to the system.

(b) When sales are entered, the system retrieves customer details based on the customer number.

(c) A check is performed to identify if all cheques can be accounted for.

(d) Systems development is subject to sign-off by the CIO before it can take place.

(e) Virus definitions are updated daily.

(f) The sales manager must approve all discounts for items sold below their sticker price."

Question 2: "For each of the following risks suggest a control that could be used to reduce it."

(a) Entering negative values for order quantity in a sales order

(b) Selling to a customer with an overdue account

(c) Ordering from a non-existent supplier

(d) Paying for goods that have not been received

(e) Entering an alphanumeric customer ID when the business policy is for numeric customer IDs

(f) Misappropriation of goods by receiving staff, who also maintain inventory records

(g) Ordering too much of a product"

WEEK 4

Question 1 Could you kindly reconsider your reasoning if you have classified the control activities as either detective or corrective?

Question 2 a) Have you considered range restrictions?

b) Would a credit check help? Can a credit hold help address this risk?

c) Would this risk be minimised if the orders were generated from a supplier master list? Would you consider independent maintenance of a supplier master list to be useful?

d) What needs to be matched prior to payment authorisation? Still unsure? Would the matching of the purchase order, receiving report and invoice be sufficient?

e) Would you specify filed content as 'alphanumeric' or 'numeric'? (Hint: Please refer to the business policy)

f) Have you considered the likelihood of misappropriation of goods when duties are separated between personnel?

g) Have you thought about the reasonableness test? Would the approval of quantities to be ordered help minimize the risk? Can ordering policies be useful in this scenario?

Solutions

Expert Solution

1. (a) Employees have a password to gain access to the system. : This is an example of an access control that helps keep the system running properly by restricting access to the system to a unautorized users. It is information system wide and not specific to a process or appication. This activity is classified as a Preventive because this ia form of authentication that allows only duly authorized people access to the system.

(b) When sales are entered, the system retrieves customer details based on the customer number. : This is an example of a control operating as part of data input within the sales process. This activity is classified as Preventive because by retrieving customer details for the operator, it prevents data entry errors and also prevents the operator from making incorrect assumptions about the customer.

(c) A check is performed to identify if all cheques can be accounted for.: This control operates to check the complete and accurate recording pf cheques issued as part of making payments. This activity is classified as Detective because this control is only effective if an error or something serious has already occurred. A cheque has to be missing first before this control activity can detect the fact that it is missing.

(d) Systems development is subject to sign-off by the CIO before it can take place.: System development relates to the information system and its ability to continue to operate properly and meet the organization's needs. Such procedures apply across the entire organization and are not specific to a particular process . This activity is classified as Preventive because this control activity prevents unauthorized modifications.

(e) Virus definitions are updated daily.: Virus update procedures relate to the information system and its ability to continue to operate properly and meet the organization's needs. Such procedures apply across the entire organization and are not specific to a particular process . This control activity is Preventive , if something is deteced and the anti-virus application prevents the virus from doing anything. And the other hand, it is Detective ,if the virus definition deteced the presence of a virus that has already in the system, then it would be a detective control.


Related Solutions

Name a preventive control, detective control, or corrective control you had developed or experienced or read...
Name a preventive control, detective control, or corrective control you had developed or experienced or read about.
Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats? An employee’s laptop...
Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats? An employee’s laptop was stolen at the airport. The laptop contained personal information about the company’s customers that could potentially be used to commit identity theft. A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password. A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the...
For each of these classes, there are four types of controls: Preventive (Deterrent) Detective Corrective (Recovery)...
For each of these classes, there are four types of controls: Preventive (Deterrent) Detective Corrective (Recovery) Compensating Please assign the correct Class of Security Control and Type of Control that match with the Security Control Listed below. It might be possible that multiple control classes or Control types could be an answer. It could also be None. Security Control Control Class: A-Administration) T-Technical P Physical) Control Type P – Preventive D – Detective CR –Corrective CM-Compensating Security Awareness Training Firewall...
We can classify a company's control procedures into three major types: preventive controls, detective controls, and...
We can classify a company's control procedures into three major types: preventive controls, detective controls, and corrective controls. What is the difference between prventive controls, detective controls and corrective controls?
Provide examples of business concerns describing the Preventive, Detective and Corrective Action with reference to Internal...
Provide examples of business concerns describing the Preventive, Detective and Corrective Action with reference to Internal Control. A disaster recovery plan (DRP) is a documented process or set of procedures to execute an organization's disaster recovery processes and recover and protect a business IT infrastructure in the event of a disaster. It is "a comprehensive statement of consistent actions to be taken before, during and after a disaster". Describe a Disaster Recovery Plan (DRP) for Information Technology of a Saudi...
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employee’s laptop...
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employee’s laptop was stolen at the airport. The laptop contained personal in- formation about the company’s customers that could potentially be used to commit identity theft. A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password. Acriminalremotelyaccessedasensitivedatabaseusingtheauthenticationcredentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his...
In Chapter 7, we discussed the differences between preventive, detective, and corrective controls. Chapters 8-10 offer...
In Chapter 7, we discussed the differences between preventive, detective, and corrective controls. Chapters 8-10 offer specific types of controls within those categories over information security, confidentiality, privacy, processing integrity, and availability. Think about controls that you have encountered in your own life (personal, professional, within organizational memberships, etc.). Note that at the time, you may or may not have realized that the answer to “why is this done?” was that a control was being implemented: a control over operations,...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective,...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in well-developed, complete sentences. The VP of Sales, Carol, has sent you an email relating to her suspicions and would like for you to respond: I don’t want to sound paranoid, but it seems like we are getting beat out of our electronic contract bids by the same company each and every time. I don’t think...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective,...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in well-developed, complete sentences. The VP of Sales, Brenda, has sent you an email relating to a recent IT incident and would like your response: I hate to tell you this, but one of my employees was traveling to meet a customer yesterday and left their computer in the back seat of the rental car. The...
Question 14. Explain the following 1.Monitor role 2.Unity of command 3. Primary activities 4. Leadership 5....
Question 14. Explain the following 1.Monitor role 2.Unity of command 3. Primary activities 4. Leadership 5. The micro -environemnt
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT