Motherboards and More Pty Ltd Internal Control Report
VerifiedAdded on 2020/03/23
|8
|1505
|36
Report
AI Summary
This report provides a comprehensive analysis of internal control systems, focusing on Motherboards and More Pty Ltd. It begins by defining the revenue cycle and then identifies various deficiencies in the company's internal control system, including inadequate risk assessment, failure to identify collusion, and poorly defined business cycles. The report explores the impact of these weaknesses, such as vulnerability to unauthorized transactions and manipulation of financial records. It proposes specific internal controls to mitigate risks, including increased oversight, incentives for reporting suspicious activity, employee training, third-party financial data checks, detailed risk assessments, protection of cash funds, and avoidance of related-party transactions. The report also discusses the WannaCry ransomware attack and recommends cybersecurity measures to protect the company from cyber threats, such as avoiding suspicious email links, using hardware-based firewalls, disabling Autorun, installing antivirus software, and implementing data backups. The report concludes with a list of relevant references.

System document and internal control
1 | P a g e
1 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Solution 1:.............................................................................................................................................3
Solution 2:.............................................................................................................................................3
(i) Motherboards and More Pty ltd suffering from various Deficiencies in internal control system
and the some of the deficiencies are listed below:.............................................................................3
(ii) Impact of internal control weaknesses on the organizations:.......................................................3
(iii) Specific Internal Controls implemented to mitigate the risk in the organizations:......................4
Solution 3:.............................................................................................................................................5
Solution 4:.............................................................................................................................................6
References.............................................................................................................................................7
2 | P a g e
Solution 1:.............................................................................................................................................3
Solution 2:.............................................................................................................................................3
(i) Motherboards and More Pty ltd suffering from various Deficiencies in internal control system
and the some of the deficiencies are listed below:.............................................................................3
(ii) Impact of internal control weaknesses on the organizations:.......................................................3
(iii) Specific Internal Controls implemented to mitigate the risk in the organizations:......................4
Solution 3:.............................................................................................................................................5
Solution 4:.............................................................................................................................................6
References.............................................................................................................................................7
2 | P a g e

Solution 1:
When the Activities like Sales made by the company, inventory, working capital to finance
daily operations, trade receivables completed in a period it is called as Revenue Cycle.
Revenue cycle starts from considering the need of customers and making products according
to them and sells those products in the form of cash or credit and records these transactions in
the books of accounts (Romney & Steinbart, 2012).
.
3 | P a g e
When the Activities like Sales made by the company, inventory, working capital to finance
daily operations, trade receivables completed in a period it is called as Revenue Cycle.
Revenue cycle starts from considering the need of customers and making products according
to them and sells those products in the form of cash or credit and records these transactions in
the books of accounts (Romney & Steinbart, 2012).
.
3 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Solution 2:
(i) Motherboards and More Pty ltd suffering from various Deficiencies in internal
control system and the some of the deficiencies are listed below:
A. Inadequate Risk Assessment Procedures: Procedures made for assessing the risk is
inadequate and the management failed to identify the risks which affects the daily operations
of the company.
B. Failed to Identify the Collusion among the Employees: Internal controls of the
company are completely failed in identifying the conspiracy between the employees and the
members of staff (Marinovic, 2013).
C. Key Business Cycles not properly Defined: Managers and Owners failed in making the
effective policies and procedures and the policies is not defined in written and various
important cycles are not made by the company which affects the operations of the company.
(ii) Impact of internal control weaknesses on the organizations:
Internal Controls are the process derived by the management to provide a reasonable
assurance that the daily operations of the company is achieved with the efficiency and
effectiveness and complies with the provisions of law and follow necessary regulations. If the
internal controls of the company are very weak then it will fall out in the near future (Badara
& Saidin, 2013). Weakness in the internal controls made companies vulnerable to the risk.
Some of the risks are making unauthorized accounting and taxable transactions, manipulation
of financial and accounting records and inconsistent applications of accounting policies.
Weakness in the internal control system leads to conflict of interest between the employees
and management and the possible risks affect the productivity of the company and interest of
the users of financial statement will not be protected.
(iii) Specific Internal Controls implemented to mitigate the risk in the organizations:
4 | P a g e
(i) Motherboards and More Pty ltd suffering from various Deficiencies in internal
control system and the some of the deficiencies are listed below:
A. Inadequate Risk Assessment Procedures: Procedures made for assessing the risk is
inadequate and the management failed to identify the risks which affects the daily operations
of the company.
B. Failed to Identify the Collusion among the Employees: Internal controls of the
company are completely failed in identifying the conspiracy between the employees and the
members of staff (Marinovic, 2013).
C. Key Business Cycles not properly Defined: Managers and Owners failed in making the
effective policies and procedures and the policies is not defined in written and various
important cycles are not made by the company which affects the operations of the company.
(ii) Impact of internal control weaknesses on the organizations:
Internal Controls are the process derived by the management to provide a reasonable
assurance that the daily operations of the company is achieved with the efficiency and
effectiveness and complies with the provisions of law and follow necessary regulations. If the
internal controls of the company are very weak then it will fall out in the near future (Badara
& Saidin, 2013). Weakness in the internal controls made companies vulnerable to the risk.
Some of the risks are making unauthorized accounting and taxable transactions, manipulation
of financial and accounting records and inconsistent applications of accounting policies.
Weakness in the internal control system leads to conflict of interest between the employees
and management and the possible risks affect the productivity of the company and interest of
the users of financial statement will not be protected.
(iii) Specific Internal Controls implemented to mitigate the risk in the organizations:
4 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Increase Oversight: Various Monitoring devices will be installed in the entire
organization to find any suspicious activity and it will be removed by using various devices
like camera installed in the place of work.
Give Incentive to those who report for Suspicious Activity: If any employee or
member of staff reports for any suspicious activity and the information provided by him leads
to any fraud then he will be rewarded with a incentive. This will encourage other employees
and the chances of fraud in the company will decrease.
Educate Employees by providing Required Training: A complete training related
to the operations of the company will be provided to the employees which will prevent the
employees to making any unintentional errors (Vijayakumar & Nagaraja, 2012).
Financial Data Checked by the Third Party: financial data prepared by the
company will be checked by the third party like an audit team who will give his opinion and
report the necessary matters in his audit report.
Conduct Detailed Risk Assessment: The management of the company and those
charged with governance should make a complete analysis of the risk and make procedures to
reduce the extent of the risk. A detailed risk assessment should made by the company to
mitigate the risk.
Protect Petty Cash funds and other cash funds: Mainly defaults and frauds will
come into the cash account the management of the company made a detailed procedure to
protect the cash funds and the cash fund should be reconcile at the end of every week if
possible.
Avoid Related Party Transactions: Related party transactions should be avoided by
the management of the company to protect the conflict of interest between the top
management (Reginato, et.al., 2011).
These changes in internal controls should help the company in minimizing their risk and
increase the productivity of the organization.
5 | P a g e
organization to find any suspicious activity and it will be removed by using various devices
like camera installed in the place of work.
Give Incentive to those who report for Suspicious Activity: If any employee or
member of staff reports for any suspicious activity and the information provided by him leads
to any fraud then he will be rewarded with a incentive. This will encourage other employees
and the chances of fraud in the company will decrease.
Educate Employees by providing Required Training: A complete training related
to the operations of the company will be provided to the employees which will prevent the
employees to making any unintentional errors (Vijayakumar & Nagaraja, 2012).
Financial Data Checked by the Third Party: financial data prepared by the
company will be checked by the third party like an audit team who will give his opinion and
report the necessary matters in his audit report.
Conduct Detailed Risk Assessment: The management of the company and those
charged with governance should make a complete analysis of the risk and make procedures to
reduce the extent of the risk. A detailed risk assessment should made by the company to
mitigate the risk.
Protect Petty Cash funds and other cash funds: Mainly defaults and frauds will
come into the cash account the management of the company made a detailed procedure to
protect the cash funds and the cash fund should be reconcile at the end of every week if
possible.
Avoid Related Party Transactions: Related party transactions should be avoided by
the management of the company to protect the conflict of interest between the top
management (Reginato, et.al., 2011).
These changes in internal controls should help the company in minimizing their risk and
increase the productivity of the organization.
5 | P a g e

Solution 3:
The famous Attack which affects the data of million computers was happened in May 2017
which is known as WannaCry Ransomware attack. It is a cryptoworm made to affects the
workings of the computers and it enters into the computer through the same network and
encrypt the important files in the computer and demand a ransom number of payment in
exchange of decrypting these files. It first affects the computers which is operated on
Microsoft windows and not updated and do not have a security patch. Bitcoin is the currency
in which they demand payment for decrypting the files (Hathaway, et. al., 2012). More than
1millions companies are affected from this attack across all over the world.
6 | P a g e
The famous Attack which affects the data of million computers was happened in May 2017
which is known as WannaCry Ransomware attack. It is a cryptoworm made to affects the
workings of the computers and it enters into the computer through the same network and
encrypt the important files in the computer and demand a ransom number of payment in
exchange of decrypting these files. It first affects the computers which is operated on
Microsoft windows and not updated and do not have a security patch. Bitcoin is the currency
in which they demand payment for decrypting the files (Hathaway, et. al., 2012). More than
1millions companies are affected from this attack across all over the world.
6 | P a g e
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Solution 4:
In the modern period the number of cyber-attacks has rapidly increased and to prevent the
company from these attacks various controls should be implemented by the management of
Motherboards and More Pty ltd and these are listed below:
Don’t click on email links and attachments: when the warning is given to not to click on
the email links and attachments which harms the data of the company then it should be
avoided by the employees and management of the company.
Use a hardware based firewall: All the computers of the company should use hardware
based firewall which will mitigate the threats posed by the company.
Disable Autorun: when any devices attached in the system it runs automatically and
sometimes worms comes through when any devices attached in the system. Management of
the company should disable the function of Autorun which should decrease the possibility of
cyber-attack.
Install Antiviruses in all the system of the company: Various security applications
available on the internet. Company has to purchase one of these antiviruses to protect the data
of the company. Some of the best software available in the market are Norton360, Quickheal
total security, Kaspersky,etc.
Data Backups should be made at regular intervals: Backup of the financial data of the
company should be made at regular intervals and the data backup should be store offline in
case of any cyber-attack (Kotenko and Chechulin, 2013).
Authentication reduces to less number of peoples: Authentication to financial data of the
company should remain to the less number of people so the important information about the
company should not spread everywhere.
7 | P a g e
In the modern period the number of cyber-attacks has rapidly increased and to prevent the
company from these attacks various controls should be implemented by the management of
Motherboards and More Pty ltd and these are listed below:
Don’t click on email links and attachments: when the warning is given to not to click on
the email links and attachments which harms the data of the company then it should be
avoided by the employees and management of the company.
Use a hardware based firewall: All the computers of the company should use hardware
based firewall which will mitigate the threats posed by the company.
Disable Autorun: when any devices attached in the system it runs automatically and
sometimes worms comes through when any devices attached in the system. Management of
the company should disable the function of Autorun which should decrease the possibility of
cyber-attack.
Install Antiviruses in all the system of the company: Various security applications
available on the internet. Company has to purchase one of these antiviruses to protect the data
of the company. Some of the best software available in the market are Norton360, Quickheal
total security, Kaspersky,etc.
Data Backups should be made at regular intervals: Backup of the financial data of the
company should be made at regular intervals and the data backup should be store offline in
case of any cyber-attack (Kotenko and Chechulin, 2013).
Authentication reduces to less number of peoples: Authentication to financial data of the
company should remain to the less number of people so the important information about the
company should not spread everywhere.
7 | P a g e
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

References
Badara, M. A. S., & Saidin, S. Z. (2013). Impact of the effective internal control system on
the internal audit effectiveness at local government level. Journal of Social and Development
Sciences, 4(1), 16-23.
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J.
(2012). The law of cyber-attack. California Law Review, 817-885.
Kotenko, I. and Chechulin, A., 2013, June. A cyber attack modeling and impact assessment
framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-24).
IEEE.
Marinovic, I. (2013). Internal control system, earnings quality, and the dynamics of financial
reporting. The RAND Journal of Economics, 44(1), 145-167.
Reginato, E., Paglietti, P., & Fadda, I. (2011). Formal or substantial innovation: enquiring the
internal control system reform in the italian local government. International Journal of
Business and Management, 6(6), 3.
Romney, M. B., & Steinbart, P. J. (2012). Accounting information systems. Boston: Pearson.
Vijayakumar, A. N., & Nagaraja, N. (2012). Internal Control Systems: Effectiveness of
Internal Audit in Risk Management at Public Sector Enterprises. BVIMR Management Edge,
5(1).
8 | P a g e
Badara, M. A. S., & Saidin, S. Z. (2013). Impact of the effective internal control system on
the internal audit effectiveness at local government level. Journal of Social and Development
Sciences, 4(1), 16-23.
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J.
(2012). The law of cyber-attack. California Law Review, 817-885.
Kotenko, I. and Chechulin, A., 2013, June. A cyber attack modeling and impact assessment
framework. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-24).
IEEE.
Marinovic, I. (2013). Internal control system, earnings quality, and the dynamics of financial
reporting. The RAND Journal of Economics, 44(1), 145-167.
Reginato, E., Paglietti, P., & Fadda, I. (2011). Formal or substantial innovation: enquiring the
internal control system reform in the italian local government. International Journal of
Business and Management, 6(6), 3.
Romney, M. B., & Steinbart, P. J. (2012). Accounting information systems. Boston: Pearson.
Vijayakumar, A. N., & Nagaraja, N. (2012). Internal Control Systems: Effectiveness of
Internal Audit in Risk Management at Public Sector Enterprises. BVIMR Management Edge,
5(1).
8 | P a g e
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.