Running head: SYSTEMS DOCUMENTATION AND INTERNAL CONTROLSSystems Documentation and Internal ControlsName of the Student:Student ID:Name of the University:Author’s note:
1SYSTEMS DOCUMENTATION AND INTERNAL CONTROLSExecutive SummaryThe report had been developed for analysis of revenue cycle of Motherboards and More Pty Ltdfor forming the improved integration of the ERP system with the functions of the organization.The internal control weakness of the Revenue Cycle Motherboards and More Pty Ltd wereanalyzed to be unable for managing the huge number of customers, wrong delivery of the itemsto the customers, delay in deliveries, and lack of physical count of stock. The impact of theweaknesses of Motherboards and More Pty Ltd were delay in providing services to the customersof Motherboards and More Pty Ltd, decrease in number of customers due to fall of customersatisfaction, and No insight on the stock maintenance. The control strategy for the Motherboardsand More Revenue Cycle were developed to be Integrated CRM and ERP System and StockManagement System. The appropriate controls required for protecting the data and informationof Motherboards and More Pty Ltd from Ransomware Cyber Attack were update of securityfunctions and implementation of IDS/IPS.
2SYSTEMS DOCUMENTATION AND INTERNAL CONTROLSTable of ContentsIntroduction......................................................................................................................................31. Overview of Revenue Cycle........................................................................................................32. Identification of the Issues and Development of Control Strategies...........................................42a. Internal Control Weaknesses of Revenue Cycle of Motherboards and More.......................42b. Impact of Weaknesses of Revenue Cycle of Motherboards and More.................................42c. Control Strategy for Motherboards and More Revenue Cycle..............................................53. Overview of Ransomware Attack................................................................................................54. Review of Appropriate Controls..................................................................................................5Conclusion.......................................................................................................................................6References........................................................................................................................................7
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Analysis for Revenue Cycle and Ransomware Cyber Attack in May 2017lg...
|9
|1668
|225
Motherboards and More Pty Ltdlg...
|7
|1373
|487
Impact of ransomware on revenue cycle in the organizational systemlg...
|9
|1799
|197
Ransomware and Revenue Cycle Assignmentlg...
|10
|1513
|57
Impact of ransomware on the revenue cyclelg...
|9
|1804
|247
Report on Threats of Ransomware on Revenue Systemlg...