Question

In: Accounting

We can classify a company's control procedures into three major types: preventive controls, detective controls, and...

We can classify a company's control procedures into three major types: preventive controls, detective controls, and corrective controls.

What is the difference between prventive controls, detective controls and corrective controls?

Solutions

Expert Solution

the internal control shield is composed of three levels of control: preventive controls, detective controls, and corrective

controls. This is thePreventive-Detective-Corrective (PDC)control model.

Preventive Controls.

Prevention is the first line of the defense in the control structure.

Preventive controls are passive techniques designed to reducethe frequency of occurrence of undesirable events.

Preventive controls force compliance with prescribed or

desired actions and thus screen out aberrantevents.

When designing internal control systems, an ounce of pevention is most certainly worth apound of cure. Preventing

errors and fraud is far more cost effective than detecting and correcting problems after they occur. The vast majority of

undesirable events can be blocked at this first level. For example, a well designed source document is an example

of preventive control. The logical layout of thedocument

into zones that contain specific data, such as customer name, address, items, sold andquantity, forces that clerk to enter the necessary data. The source documents can therefore

prevent necessary data from being omitted. However, not all

problems can be anticipated and prevented. Somewill elude

the most comprehensive network of preventive controls.

Detective Controls.

Detective controls form the second line of defense.

These are devices,techniques,and procedures designed to identify and expose undesirable events that elude preventive controls.Detective controls reveal specific types of errors by comparing actual occurrences to pre-established standards. When the detective control identifies a departure from standard, it sounds an alarm toattract

attention to the problem. For example, assume a clerk entered the following data on a customersales order: quantity 10;

Price $10; Total $1000Before processing this transaction and posting to the accounts, a detective control should recalculatethe total value using the price and quantity. Thus the error in total price would be detected.

Corrective Controls.

Corrective controls are actions taken to reverse the effects

of errors detected in theprevious step/ There is an important

distinction between detective controls and corrective controls.Detective controls indentify anomalies and draw attention to them;corrective controls actually fix theproblem. For any

detected error, however, there may be more than one feasible

corrective action, butthe best course of action may not always be obvious. For example, in viewing the error above, your

firstinclination may have been to change the total value on the document are correct; they may not be. Atthis point, we cannot determine the real cause of the problems; we know only that one exists.Linking a corrective action to a detected error, as an automatic response, may result in an incorrectaction that

causes a worse problem than the original error. For this reason, error correction should beviewed as a separate control step

that should be taken cautiously.The PDC control model is

conceptually pleasing but offers little practical guidance for

designing specificcontrols. For this, we need a more precise

framework. The current authoritative document for

specifying internal control objectives and techniques is the statement on Auditing Standards No. 78, which is basedon

the COSO framework.


Related Solutions

Detective controls are better than preventive controls: a. Detective controls are better than preventive controls b....
Detective controls are better than preventive controls: a. Detective controls are better than preventive controls b. Detective controls are as useful as preventive controls c. There is only one kind of internal control d. Preventive controls are better than detective controls
For each of these classes, there are four types of controls: Preventive (Deterrent) Detective Corrective (Recovery)...
For each of these classes, there are four types of controls: Preventive (Deterrent) Detective Corrective (Recovery) Compensating Please assign the correct Class of Security Control and Type of Control that match with the Security Control Listed below. It might be possible that multiple control classes or Control types could be an answer. It could also be None. Security Control Control Class: A-Administration) T-Technical P Physical) Control Type P – Preventive D – Detective CR –Corrective CM-Compensating Security Awareness Training Firewall...
Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain...
Week 4 Question 1: "Classify the following control activities as preventive, detective or corrective and explain your reasoning, (a) Employees have a password to gain access to the system. (b) When sales are entered, the system retrieves customer details based on the customer number. (c) A check is performed to identify if all cheques can be accounted for. (d) Systems development is subject to sign-off by the CIO before it can take place. (e) Virus definitions are updated daily. (f)...
Name a preventive control, detective control, or corrective control you had developed or experienced or read...
Name a preventive control, detective control, or corrective control you had developed or experienced or read about.
Describe internal controls, why we have them and give an example of three internal control procedures.
Describe internal controls, why we have them and give an example of three internal control procedures.
Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats? An employee’s laptop...
Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats? An employee’s laptop was stolen at the airport. The laptop contained personal information about the company’s customers that could potentially be used to commit identity theft. A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password. A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the...
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employee’s laptop...
Which preventive, detective, and/or corrective controls would best mitigate the follow- ing threats? An employee’s laptop was stolen at the airport. The laptop contained personal in- formation about the company’s customers that could potentially be used to commit identity theft. A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password. Acriminalremotelyaccessedasensitivedatabaseusingtheauthenticationcredentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his...
discuss about further into COBIT and the 3 types on controls: preventative, detective and corrective.
discuss about further into COBIT and the 3 types on controls: preventative, detective and corrective.
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective,...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in well-developed, complete sentences. The VP of Sales, Carol, has sent you an email relating to her suspicions and would like for you to respond: I don’t want to sound paranoid, but it seems like we are getting beat out of our electronic contract bids by the same company each and every time. I don’t think...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective,...
For each scenario described, (1) identify the potential control issues/threats/vulnerabilities and (2) recommend applicable preventive, detective, and/or corrective control procedures. Please write your answers in well-developed, complete sentences. The VP of Sales, Brenda, has sent you an email relating to a recent IT incident and would like your response: I hate to tell you this, but one of my employees was traveling to meet a customer yesterday and left their computer in the back seat of the rental car. The...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT