Question

In: Accounting

Provide examples of business concerns describing the Preventive, Detective and Corrective Action with reference to Internal...

  1. Provide examples of business concerns describing the Preventive, Detective and Corrective Action with reference to Internal Control.
  2. A disaster recovery plan (DRP) is a documented process or set of procedures to execute an organization's disaster recovery processes and recover and protect a business IT infrastructure in the event of a disaster. It is "a comprehensive statement of consistent actions to be taken before, during and after a disaster". Describe a Disaster Recovery Plan (DRP) for Information Technology of a Saudi Business Concern.               
  3. Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure. With reference to Privacy Concern how would you deal with SPAM and Identify Theft problem of your business organization?                 

Solutions

Expert Solution

Preventive actions attempt to deter or prevent undesirable events from occurring. They are proactive actions that help to prevent a loss. Examples of preventive actions are separation of duties, proper authorization, adequate documentation, and physical control over assets. Detective action is a type of internal control that seeks to uncover problems in a company's processes once they have occurred. Examples of detective actions include physical inventory checks, reviews of account reports and reconciliations, as well as assessments of current controls. Corrective actions are designed to correct errors or irregularities that have been detected.

DRP for Information technology of a Saudi Business Concern:

There are multiple options available as per the requirements of the organization. Data backup is used for keeping a copy of the entire data stored on the computers so that in case of disasters the company may not be left empty-handed but could have options to recover the data to the best possible extent and to minimize the loss. Firewall solutions are offered to companies so that the traffic could be monitored and any unfortunate situations can be avoided. Data backup and recovery services provided by Absolute Solutions protect the network of the organizations from any kind of malware threat or virus attack. These are necessary and if ignored can costs large sums of money to the company for overcoming the damages.

Preventing Viruses & Malware

The endpoint devices are prone to viruses due to data transfer using portable devices like USBs or CDs. These are more commonly infected and can cause the computer in the network to fell prey of the virus and the viruses can replicate over the entire network so the companies should incorporate the Data Backup and Recovery Systems in order to overcome certain scenarios.

Absolute Solutions are offering enterprise services in an unmatched quality to make the customers satisfied with the products of HR Management and Time attendance Systems along with Data Backup & Recovery. We are a team of qualified researchers who are well aware of the techniques of making the best solutions which can outperform in all aspects.

As the organisation collects the personal information and stores it. it should be very careful to deal with SPAM and also from theft by placing effective internal controls in the organisation. Cross verifying the customer details while collecting can decrease the chance of spam and placing a strong internal control like entry only to authorised personnel to access the  data collected can decrease the chances of theft.


Related Solutions

For each of these classes, there are four types of controls: Preventive (Deterrent) Detective Corrective (Recovery)...
For each of these classes, there are four types of controls: Preventive (Deterrent) Detective Corrective (Recovery) Compensating Please assign the correct Class of Security Control and Type of Control that match with the Security Control Listed below. It might be possible that multiple control classes or Control types could be an answer. It could also be None. Security Control Control Class: A-Administration) T-Technical P Physical) Control Type P – Preventive D – Detective CR –Corrective CM-Compensating Security Awareness Training Firewall...
Name a preventive control, detective control, or corrective control you had developed or experienced or read...
Name a preventive control, detective control, or corrective control you had developed or experienced or read about.
Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain...
Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain your reasoning, (a) Employees have a password to gain access to the system. (b) When sales are entered, the system retrieves customer details based on the customer number. (c) A check is performed to identify if all cheques can be accounted for. (d) Systems development is subject to sign-off by the CIO before it can take place. (e) Virus definitions are updated daily. (f)...
Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats? An employee’s laptop...
Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats? An employee’s laptop was stolen at the airport. The laptop contained personal information about the company’s customers that could potentially be used to commit identity theft. A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password. A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the...
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employee’s laptop...
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employee’s laptop was stolen at the airport. The laptop contained personal in- formation about the company’s customers that could potentially be used to commit identity theft. A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password. Acriminalremotelyaccessedasensitivedatabaseusingtheauthenticationcredentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his...
In Chapter 7, we discussed the differences between preventive, detective, and corrective controls. Chapters 8-10 offer...
In Chapter 7, we discussed the differences between preventive, detective, and corrective controls. Chapters 8-10 offer specific types of controls within those categories over information security, confidentiality, privacy, processing integrity, and availability. Think about controls that you have encountered in your own life (personal, professional, within organizational memberships, etc.). Note that at the time, you may or may not have realized that the answer to “why is this done?” was that a control was being implemented: a control over operations,...
how to identify detective internal controls risk with cash receipt and cash payment through the business...
how to identify detective internal controls risk with cash receipt and cash payment through the business JB HI-FI
Which components of the internal asset audit are the most valuable? Why? PROVIDE A REFERENCE
Which components of the internal asset audit are the most valuable? Why? PROVIDE A REFERENCE
Public Health class: Describe the characteristics of clinical preventive interventions and provide three examples (200 words...
Public Health class: Describe the characteristics of clinical preventive interventions and provide three examples (200 words at least)
- Provide at least 2 examples for each of the Internal Control components.
- Provide at least 2 examples for each of the Internal Control components.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT