Question

In: Accounting

One category of general controls is physical and online security. Describe the control and give at...

One category of general controls is physical and online security. Describe the control and give at least three examples of implementation of the control.

Solutions

Expert Solution

General Controls are the basic controls that are related to the various aspects of the IT function. These are the controls that are related to the various functions like systems development , computer operation controls , separation of IT duties, back up and recovery controls , online security and physical security controls , hardware controls etc.

Physical controls over the computer systems are the safeguards that are put in place in order to restrict the access to the hardware , software and back up data files .

Examples of Physical controls are are as follows:

  1. Badge Entry system
  2. Security cameras and security personnel
  3. Biometrics i.e the employee fingerprints or the scanning of the retinas and matching the results with the database before giving access
  4. Installation of fire extinguishment systems
  5. Locked and bolted strong doors

Online security controls are the controls that are put in place to restrict the access to software and the various data files and thereby minimizing and preventing the chances of any unauthorized access or any unauthorized changes that can possibly be made to the software or the organization’s data .

Examples of online security controls are are as follows:

  1. Firewalls
  2. Encrytion Programs
  3. Proper user ID’s and passwords
  4. AASB: Reflective Thinking skills
  5. Separate additional security taken as add-ons and software packages.

Related Solutions

Part 2: Describe physical controls, independent internal verification, and human resource controls. For each internal control...
Part 2: Describe physical controls, independent internal verification, and human resource controls. For each internal control principle, explain what weaknesses are being prevented for the company.
Identify the six categories of general controls and give one example of each
Identify the six categories of general controls and give one example of each
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2)...
HIPAA security , physical safeguard give examples of the following : 1) user-based access control 2) role-based access control 3) context-based access control
Describe internal controls, why we have them and give an example of three internal control procedures.
Describe internal controls, why we have them and give an example of three internal control procedures.
1. Give examples of security measures that might be used to control information security, personnel security,...
1. Give examples of security measures that might be used to control information security, personnel security, and health hazard security issues. 2. Should the federal and state governments enact tougher laws or regs to deal with security violators? If so, what are your recommendations?
Security Controls to Protect Assets What are the control measures currently in use to protect against...
Security Controls to Protect Assets What are the control measures currently in use to protect against payroll fraud? What are the vulnerabilities related to payroll fraud found by the risk assessment team? Please make copy paste available Must be 250 words
course : Accounting information system GITC/Application Controls 1. GITC, general information technology controls is control activities...
course : Accounting information system GITC/Application Controls 1. GITC, general information technology controls is control activities performed by management to ensure the ongoing effectiveness of the organization's automated application controls and related systems. Where as application controls help ensure that transactions occured are recorded completely and accurately. Application controls also are automated in nature and often apply to the processing of individual transactions. Also, GITC includes execution of policies and procedures that relate to financially relevant applications and support the...
Identify six classes of physical controls employed in the expenditure cycle and give examples of each.
Identify six classes of physical controls employed in the expenditure cycle and give examples of each.
• What are the different types of internal controls? Give examples of each. Physical, technical, administrative....
• What are the different types of internal controls? Give examples of each. Physical, technical, administrative. • Know the elements of the COSO internal control framework. How does the COSO framework help in implementing/updating internal controls?
Many business environments have both visible and invisible physical security controls. You see them at the...
Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT