Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

3 (03-a): For the following scenarios. describe the recommendations the internal auditors should make to prevent these problems in the future. (5 mark). Scenario 1:

3 (03-a): For the following scenarios. describe the recommendations the internal auditors should make to prevent these problems in the future. (5 mark). Scenario 1: After working together at a local school cafeteria for over ten years, two elderly employees announce their retirement citing reasons of wanting to spend more time with their families. They were popular at the school and were considered to be considerate, pleasant, caring, and loyal by the other employees at the cafeteria as well as the school authorities. They also always offered to come in early to work and stay back late to cash up. However, soon after their retirement, the authorities discover a sharp increase in their daily cash deposits for the cafeteria. Noting this significant difference, they investigated the matter, and the retired employees' theft was uncovered. Scenario 2: An employee who works in the production department of a large company manages to get access to the company storehouse. He pockets several materials from the storehouse, only some of which was purchased for his personal use. In the inventory journal, he excludes the quantity purchased for his personal use in recording the parts issued to the production department. Noting differences in the inventory records and the actual quantities available at the storehouse, the company hires an internal auditor to investigate the matter. (03-b): Which preventive, detective. and/or corrective controls would best mitiaste the following threats? a. An employee's laptop was stolen at the airport. The laptop contained personally identifying information about the company's customers that could potentially be used to commit identity theft. b. Attackers broke into the company's information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security c. Once an attack on the company's website was discovered, it took more than 30 minutes to determine who to contact to initiate resse acs. d. To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company's system by dialling into that modem. e. An attacker gained access to the company's internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office building that the company shared with seven other companies

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Financial Accounting Tools for business decision making

Authors: Paul D. Kimmel, Jerry J. Weygandt, Donald E. Kieso

6th Edition

978-1119191674, 047053477X, 111919167X, 978-0470534779

More Books

Students also viewed these Accounting questions