Question

In: Accounting

For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective,...

For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in well-developed, complete sentences.

The VP of Sales, Carol, has sent you an email relating to her suspicions and would like for you to respond:

I don’t want to sound paranoid, but it seems like we are getting beat out of our electronic contract bids by the same company each and every time. I don’t think we have an inside mole in our department, I know we have been really tight on authentication and authorization controls when it comes to our contract bidding as its only me and one other person that does this. Can you tell if someone is able to either break into our system to get these files or is intercepting them at all? What are the controls that we can put in place to really ensure that this does not happen?

Solutions

Expert Solution

Potential dangers and vulnerabilities are those things which can turn out to be heartbreaking for the organization's execution and ought to be considered if there should arise an occurrence of basic leadership inside the organization.

Conceivable Threats/Control/Vulnerabilities

The conceivable dangers alluded in the previously mentioned case is robbery of information of the organization which will result in money related misfortunes to the organization and can make the matter of the organization reach to an end, will adversy affect the organization in long haul.

Client's confidence on workers will get lessened because of such sheer carelessness by representatives. as it is said that " we create what the client requests". .This will hugy affect the benefits of the organization as number of clients will be lessened , along these lines affecting deals and benefits over the long haul.

there are odds of representatives utilizing the assets of organization determinedly which will expand the money streams and Thereby working salary of the organization will be influenced unfavorably.

Thus, there ought to be clear feeling of power and obligation among the employees.As referenced for the situation, sufficient remuneration ought to be charged from the concerned representative to keep any such further acts. furthermore, clear arrangements ought to be made with respect to the forces and obligations of the representatives. Suitable preparing and evaluation projects ought to be perceived for representatives.

Control techniques:

Sufficient evaluation and preparing expenses ought to be fused in the financial plan.

Counteractive action costs, i.e. the expenses caused to keep the low quality of merchandise and services.These are acquired before real activity and is worried about plan, execution and upkeep of value the board framework.

Legitimate direction ought to be given to representatives and work well disposed air is kept.

Clear division of power and duty ought to be made.and legitimate arrangement with respect to appointment of power ought to be fused.

Sufficient punishment ought to be put forth in defense of resistance of laws made by the supervisory crew albeit suitable measures ought to be made for enhancing the representative assurance with the goal that they work proficiently and viably for the satisfaction of organization's targets.

Sufficient administration control systems and cost the executives methods ought to be affirmed and actualized.

Assets of the organization ought to be used in the most productive and viable way conceivable. In the event that tyhere is any arrangement of key work, it ought to be set up as per articulation of positioning and p[roduct giving top level input ought to be used.

End:

Presentation of the representatives towards organization's assets should de viably controlled.. Legitimate consideration cshould be taken in regards to this issue.We should contact the leasing experts andd endeavor to recoup our information as though it will go into wrong hands, it can end up being heartbreaking to the organization.


Related Solutions

For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective,...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in well-developed, complete sentences. The VP of Sales, Brenda, has sent you an email relating to a recent IT incident and would like your response: I hate to tell you this, but one of my employees was traveling to meet a customer yesterday and left their computer in the back seat of the rental car. The...
Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain...
Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain your reasoning, (a) Employees have a password to gain access to the system. (b) When sales are entered, the system retrieves customer details based on the customer number. (c) A check is performed to identify if all cheques can be accounted for. (d) Systems development is subject to sign-off by the CIO before it can take place. (e) Virus definitions are updated daily. (f)...
Identify the control activity that is applicable to each item in the table shown below: 1...
Identify the control activity that is applicable to each item in the table shown below: 1 All cash is deposited intact, in the bank account, daily. 2 Blank cheques are stored in a safe in the controller’s office. 3 All cashiers are bonded. 4 All over-the-counter receipts are recorded on cash registers. 5 All payments, except for petty cash transactions, are made by cheque. 6 Cheque signers are not allowed to record cash payment transactions. 7 Company cheques are pre-numbered....
Read the scenario. Highlight the type of control described for each scenario. In other words, is...
Read the scenario. Highlight the type of control described for each scenario. In other words, is it a behavior or an output control and is it a feedforward, concurrent or feedback control mechanism? 2. Employee drug use is a serious problem for employers. Possible consequences include injuries, illness, absenteeism, breakage, theft, and reduced productivity. Illegal drug use by employees costs U.S. industry an estimated $25 billion a year. The extent of this problem has challenged managers to find ways to...
For each of the issues described below, explain the organisational policies or procedures that you recommend...
For each of the issues described below, explain the organisational policies or procedures that you recommend to prevent each activity from taking place. Also classify each control you recommend as whether it is a preventive, detective or a corrective control. a. A vendor employee forwards an invoice for $476 of packing materials to a large company that manufactures fragile components, but without sending the packing materials. The company is accustomed to receiving invoices from the vendor and makes the payment,...
Q 1) Recommend internal control procedure(s) that can provide protection against the following threats? 1. An...
Q 1) Recommend internal control procedure(s) that can provide protection against the following threats? 1. An employee issues credit memos to write-off account balances for friends 2. Workers on the shipping dock steal goods, claiming that the inventory shortages reflect errors in the inventory records. 3. An employee fails to bill customers for the goods which are shipped to them, which results in the loss of assets and erroneous data about sales, inventory, and accounts receivable. 4. An employee uses...
II. Preventive Maintenance 1. What is preventive maintenance?= 2. Give at least 5 defects on each...
II. Preventive Maintenance 1. What is preventive maintenance?= 2. Give at least 5 defects on each category. Metal Parts                           Rubber, Fiber, Plastic, Glass fiber 1.                               1. 2.                               2. 3.                               3. 4.                               4. 5.                               5. Control sys. Components          ...
1-Identify the independent variable 2-Identify the dependent variable 3-Identify the control group
CO: 13, 15, 11, 8, 15, 16, 12,14 Control:  8, 9, 13, 7, 8, 6, 10, 11 1-Identify the independent variable 2-Identify the dependent variable 3-Identify the control group 4-Calculate the means for each group ( CO, and control) I5-ndicate the ranges for each group ( CO, and control) 6-Indicate the medians for each group ( CO and control) 7-Indicate the mode for each group ( CO, and control) 8-Calculate the standard deviation for each group ( CO and control)?...
By using SWOT analysis identify 6 strengths, 3weaknesses, 1 opportunity, and 2 threats. Then to write...
By using SWOT analysis identify 6 strengths, 3weaknesses, 1 opportunity, and 2 threats. Then to write an analytical text for the case study. Johnson & Johnson Consumer Products, INC. Johnson & Johnson is a household name in baby-care as well as medical products. Nearly every family in the United States has in its house at least one product made by this company. Founded in 1885, Johnson & Johnson is currently an international enterprise, with 170 affiliated companies in fifty-five countries....
ANSWER ALL QUESTIONS... (1) "Described the purpose of the Statement Of Cash Flows". (2) "Identify the...
ANSWER ALL QUESTIONS... (1) "Described the purpose of the Statement Of Cash Flows". (2) "Identify the three (3) Sections of the Statement Of Cash Flows". (3) "Describe briefly what type of transactions are included in each of the three (3) sections of the Statement Of Cash Flows ". (4) "Discuss briefly the "Indirect Method" of the Operating Activities Section of the Statement Of Cash         Flows".
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT