BUS 300: Case Study Analysis - Audit Control Policies and Procedures

Verified

Added on  2020/04/01

|4
|718
|61
Case Study
AI Summary
This case study examines audit control policies and procedures, focusing on four specific situations and their associated errors. The analysis explores how various policies, such as account-name matching software, verification processes, physical security measures, and biometric access controls, could have prevented or detected these errors. The document emphasizes the importance of implementing robust controls to ensure data accuracy, prevent unauthorized access, and maintain the integrity of financial and operational processes. The study references key concepts in audit control and highlights the significance of proactive measures in mitigating risks and safeguarding company assets. The analysis also provides specific recommendations for improving security protocols, including the use of concrete walls, biometric access for vital files, and password protection to enhance overall security. The document concludes by emphasizing the importance of a layered approach to security, utilizing a combination of technological and procedural controls to protect sensitive information and prevent financial losses.
Document Page
Running head: ASSESSMENT 2: CASE STUDY 1
Assessment 2: Case Study
Institution Affiliation
Name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ASSESSMENT 2: CASE STUDY 2
Assessment 2: Case Study
Audit control policies are considered to be diverse procedures that are basically established
so as to offer a reasonable assurance of the success of the management control (Fong, &
Siahaan, 2011). This aspect is vital during auditing because it enhances the production of
companies and its control.
Situation (a)
In this particular situation, the best policy or procedure that would have prevented or detected
this error is that the company should have enforced account-name matching software so that
when the accountant or sales manager key in the account number it will specifically rum into
the system and pop out the matching name (Jayaraman, Ganesh, Tripunitara, Rinard, &
Chapin, 2011). This aspect would have been important because it will prevent any situation
that may involve entering wrong figures on wrong names. Verification of the customers’
names and account numbers should have also prevented such situations from happening
because doing this will enable the clerk to realize the number and name of the owner that
matches the sales order being made.
Situation (b)
In this situation where a keypunch operator incorrectly entered a customer payment as
$575.00 instead of $5 750.00, the best policy or procedure that would have prevented or
detected this error is counterchecking figures when posting. This aspect is significant because
it will assist the company from making such material errors that may make the company lose
more funds and thus loss to the company (Fong, & Siahaan, 2011). Use of confirming option
when making payment should also be utilized as this police would have basically protected
this kind of error from happening.
Situation (c)
Document Page
ASSESSMENT 2: CASE STUDY 3
In this particular situation, the best policy or procedure that would have prevented this action
is that the company should have employed several personnel who will guard the computer
area. This is an important policy or procedure because it will basically minimize the risk of
many people being allowed to walk in or accessing the main level of the office building
(Jayaraman, et al. 2011). Another procedure is that the company should have installed
concrete walls so that to prevent any individuals from forcing their way into the main level of
the office building that contained the company computers. This procedure is important
because basically presence of hard core walls will not allow anybody from accessing the
main level of the office building.
Situation (d)
In this particular situation, the best policy or procedure that would have prevented this action
is that the company should have implemented the use of allowed biometrics when accessing
vital files and records such as master payroll. Online storage of important records such as
payroll should also be biometric protected. This action would have assisted a lot because the
company computer operator would not have accessed the master payroll online since it
requires the biometrics of the allowed person for executions (Fong, & Siahaan, 2011). Use of
passwords should also have been implemented so that in order to access any master file that
belongs to the company, the password should be inputted to allow access. The passwords
should be kept by at least three management personnel in that the three passwords should be
inputted at the same time so as to allow alteration.
Document Page
ASSESSMENT 2: CASE STUDY 4
References
Fong, P. W., & Siahaan, I. (2011, June). Relationship-based access control policies and their
policy languages. In Proceedings of the 16th ACM symposium on Access control models and
technologies (pp. 51-60). ACM.
Jayaraman, K., Ganesh, V., Tripunitara, M., Rinard, M., & Chapin, S. (2011, October).
Automatic error finding in access-control policies. In Proceedings of the 18th ACM
conference on Computer and communications security (pp. 163-174). ACM.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]