Question
The Control Environment, Risk Assessment and Management, Control Activities, Outsourcing or Monitoring. Identify the following: Which of the components is affected by the situation and
The Control Environment, Risk Assessment and Management, Control Activities, Outsourcing or Monitoring. Identify the following:
- Which of the components is affected by the situation and which of the principles of said component is not being met and needs to be improved.
- Recommend the preventive, detective and corrective control procedures (at least one of each) to be used to mitigate the risks found.
- Based on the components and principles of COSO, How a company can develop a fraud risk management program that is effective and efficient. Risk Assessment and Information/Communication: Risks and Benefits of Remote Access
- Your company has recently upgraded its accounting software. The consultant who installed the software has explained that a new option makes the system available through the Internet for staff (remote access capability). Previously, staff only had access to the system when they were physically in the headquarters building. With remote access to the system, they would be able to access the system from anywhere by entering their user name and password. Currently, user name and password specifications are not regulated. For example, passwords are allowed to be as short as three characters and may remain unchanged for up to six months.
Some of the staff expressed interest in being able to access the system from home, especially on weekends, instead of making the drive into town. Additionally, some managers have expressed a desire to be able to access some of the reports when they are away at business meetings.
As the IT Audit Director, the decision as to whether to implement remote access is in your hands.
What issues should you consider before deciding whether to allow remote access?
What would be some of the risks in allowing remote access?
If remote access is allowed, what do you recommend as a password policy to minimize the opportunity for mishandling of remote access?
Step by Step Solution
3.42 Rating (168 Votes )
There are 3 Steps involved in it
Step: 1
The Control Environment Risk Assessment and Management Control Activities and Outsourcing or Monitor...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started