Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 3 Table 1, which is shown on the next page, lists ten (10) threats or system failures (numbered 1-10) and 14 control procedures (shown

Question 3

Table 1, which is shown on the next page, lists ten (10) threats or system failures (numbered 1-10) and 14 control procedures (shown using the letters a-n). Match each threat / system failure (see column one of Table 1) to the most appropriate control procedure (see column two of Table 1) that could be used to eliminate/minimise that threat or system failure. Each control procedure may only be used once and only select ten (10) control procedures from the list.

In the answer table (immediately below), place a letter (a-n) in the second column of the answer table for each row of this table (representing the most appropriate control procedure for the respective threat / system failure).

Place your answers in the second column

Answer Table:

Threat / System Failure

Control Procedure

(a-n)

1

2

3

4

5

6

7

8

9

10

Table 1: Ten threats or system failures and fourteen control procedures

Threat / System Failure

Control Procedure

  1. While moving the new payroll program from testing status into production status, John, the programmer, made a last-minute change to the payroll program. Thereafter, each time he executed/ran the payroll program using the live payroll data, the amount of money direct deposited into his bank account for his fortnightly pay was overstated by 30%. This situation continued for the next twenty fortnightly pay periods.
  2. Flooding destroyed all of the data records at Kelantan Tech Company. Sales are affected because the company is unable to restore its accounting information system.
  3. The accounts receivable department sent 87 cheques to the computer centre for processing. No one realised that one cheque was dropped/misplaced along the way. Thus, the computer only processed 86 cheques.
  4. After careful screening and selection of employees, an organisation issues its employees name badges with magnetic strips that store the employees personal information. Employees in the IT function can scan their badge, which enables them to gain access to select rooms within the IT centre depending upon the permissions that have been stored on their card. Recently management discovered that employees are sharing their badges to enable them to gain access to every room in the facility.
  5. Confidential and proprietary information is transmitted over the open Internet via email and thus could be a security risk.
  6. James was just hired as a computer operator at Vampire Inc. Just a few days after being hired, he discovered that he would not be allowed to write computer programs. This was contrary to what he was told initially, and he is now quite unhappy with his circumstances.
  1. Documentation control plans
  2. Segregation of programmers from computer operations
  3. Business continuity planning
  4. Biometric security system
  5. Protection tabs, doors, and rings
  6. Batch control total
  7. Edit test
  8. Check digits
  9. Selection and hiring control plans
  10. Use a VPN
  11. Use a firewall
  12. Concurrency controls
  13. Install a UPS
  14. Populate input screens with master data

Question 3

Threat / System Failure

Control Procedure

  1. A customers credit card account number is wrongly entered into the computer by Maria.
  2. A data entry clerk entered an invoice value of $5,000,000 instead of $5,000 for one of the credit sales transactions.
  3. A scheduled 30-minute outage for a companys order processing system turned into a 24-hour outage after a system update failed due to a power failure.
  4. Two travelling sales representatives from the same company accessed the inventory database at the same time and promised to sell, to different customers, the last of a particular item of inventory that was in stock.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Controlling Fur Kleine Und Mittlere Unternehmen

Authors: David Muller

2nd Edition

3110514877, 9783110514872

More Books

Students also viewed these Accounting questions

Question

6-23. Marketing brochureyour opinion

Answered: 1 week ago