Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You are the auditor of Tech Ltd. You note the following facts regarding the IT environment of Tech Ltd and the FIXT system, which is
You are the auditor of Tech Ltd. You note the following facts regarding the IT environment of Tech Ltd and the FIXT system, which is the fixed assets application used by Tech.
Fact # | Details |
---|---|
1 | Users access the system directly from remote terminals, and can also log in from home. |
2 | The manager of the IT department has just presented the Board with an analysis of the FIXT system versus its competitors. The key recommendation is that the FIXT system be replaced within a year. |
3 | The main data centre is located in a suburban office, whereas the main office is in the city. |
4 | The data centre is open (and staffed) 24 hours per day. |
5 | Access to the data centre requires that a retina (eye) scan of the employee matches the approved list. |
6 | Access to the system is via a 5-digit password, which is the employee's staff number. |
7 | As many of Tech's accounting staff are highly computer-literate, they are encouraged to fix problems by modifying the system themselves rather than waiting for IT support. |
8 | Before an asset can be entered into the FIXT system, it must be matched with the asset category, which has a depreciation rate attached. Users complain that this approach lacks flexibility. |
9 | The FIXT system is incapable of printing reports in colour. |
10 | The FIXT system is considered reliable by staff. Depreciation totals are produced but the breakdown of these results is not available. |
11 | The FIXT system reporting module is only available to specific staff, which slows the production of important reports at year-end. |
For each of the elements of the IT system below, select the most relevant fact and whether this fact indicates the IT element is strong or weak.
Most relevant fact | Strong or Weak | ||||
General controls | |||||
Physical security | #/10 | Strong/Weak | |||
Logical security | #/10 | StrongWeak | |||
Segregation of duties | #/10 | Strong/Weak | |||
Application controls | |||||
Input control | #/10 | Strong/Weak | |||
Processing control | #/10 | Strong/Weak | |||
Output control | #/10 | Strong/Weak | |||
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started