The following is a list of 13 control plans from this chapter, followed by a list of 10 situations that have control implications. Match the 10 situations with the control plan that would best prevent the system failure from occurring. Because there are 13 control plans, you should have 3 letters left over.
Control Plans
- A. Firewall
- B. Backup batteries and generators
- C. Insurance
- D. Employee badges, guest sign-in, locks on computer room doors
- E. Hot site
- F. Intrusion detection systems
- G. Off-site storage of backup computer programs and data
- H. Training (personnel development)
- I. Personnel termination procedures
- J. Security guards
- K. Program change controls
- L. Operations run manuals
- M. Fidelity Bond
Situations
- 1. The computer users at the Identity Company do not know how to use the computer very well.
- 2. A computer hacker created a program to generate random user IDs and passwords. He used the random number program to access the computer system of Samson, Inc.
- 3. During the nightly computer run to update bank customers’ accounts for deposits and withdrawals for that day, an electrical storm caused a temporary power failure. The run had to be reprocessed from the beginning, resulting in certain other computer jobs not being completed on schedule.
- 4. A fire destroyed part of the computer room and the adjacent library of computer disks at Petunia, Inc. It took several months to reconstruct the data from manual source documents and other hard copy records.
- 5. A competitor flooded the Wolfeson Company Web server with false messages (i.e., a denial-of-service attack). The Web server, unable to handle all of this traffic, shut down for several hours until the messages could be cleared.
- 6. A group of demonstrators broke into a computer center and destroyed computer equipment worth several thousand dollars.
- 7. A computer programmer at Dover Company was fired for gross incompetence. During the two-week notice period, the programmer destroyed the documentation for all programs that he had developed since being hired.
- 8. The cash receipts clerk was on his way to the bank to deposit all the cash and checks received by the company that day when he decided that he would prefer to have a vacation in Brazil. The clerk kept the cash and cashed the checks. All the money was lost to the company.
- 9. A disgruntled programmer at the Going Company planted a logic bomb in the computer program that produced weekly payroll checks. The bomb was triggered to go off if the programmer were ever terminated. When the programmer was fired for continued absenteeism, the next weekly payroll run destroyed all the company’s payroll master data.
- 10. The computer systems at Club, Inc. were destroyed in a recent fire. It took Club several days to get its IT functions operating again.
1)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
The company I have the computer users, who do not know how to use the computer.
Determine the control plan for a given situation:
Training (personnel development): Training can be given to the users to use the computers in a better way.
2)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
A computer hacker generated random user ID and password using the program created by him and he used the ID and password to access the system of Company S
Determine the control plan for a given situation:
Intrusion detection systems: It helps to monitor the personnel who are all trying to access the network. It can also be used to detect denial-of-service attacks.
3)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given the situation:
A temporary power failure in Company D resulting in the run that update customer accounts details regarding deposits and withdrawals has to be processed from the beginning. Due to this, they could not able to complete the jobs on schedule.
Determine the control plan for a given situation:
Backup batteries and generators: Backup batteries help to protect the data from being erased due to power failure.
4)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
At Company P, the fire destroyed the computer room and the library of a computer disk. In order to reconstruct the data from hard copy records, it took several months.
Determine the control plan for a given situation:
Offsite-storage of backup computer programs and data: Offsite-storage helps to reconstruct the data without any difficulty.
5)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
A competitor of Company W flooded the web server of Company W with several messages and the server was shut down until the messages cleared.
Determine the control plan for a given situation:
Insurance: Insurance will help the firm to save the web server of the firm.
6)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
Demonstrators broke into the computer center and demolished the equipment that worth several thousand dollars.
Determine the control plan for a given situation:
Security guards: Having security guards will help the company to protect the firm and equipment from access.
7)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
At Company D, a computer programmer was fired for gross incompetence. He demolished all the programs developed by him since being hired.
Determine the control plan for a given situation:
Personnel termination procedures: The firm should have personnel termination procedure, which will restrict the employees who are working in a notice period to access certain things.
8)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
The clerk kept the cash and cashed the checks, as he prefers to have a vacation rather than depositing in the bank. All the money was lost to the company.
Determine the control plan for a given situation:
Fidelity bond: Fidelity bond will protect the policyholders from the fraudulent acts that are incurred by the specified individuals.
9)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
At Company G, a dissatisfied programmer planted a logic bomb in the computer and the bomb will destroy all the payroll master data if he was terminated by the company. The company’s payroll master data was destroyed, as he was fired for continued absenteeism.
Determine the control plan for a given situation:
Program change controls: Program change control is the control that would reduce the risk that is implemented by the unauthorized systems. A program that performs a credit check and validation should be prevented from the unauthorized alternation which can be done with the help of program change controls.
10)
To determine: The control plan for the given situation.
Introduction:
Accounting Information System (AIS) is said to be the specialized subsystem of the Information System (IS). AIS can be used in the business events for the purpose of collecting, processing, and reporting the financial information.
Explanation of Solution
Given situation:
In the recent fire, the computer systems at Company C was destroyed. It took them several days to re-function the operation again.
Determine the control plan for a given situation:
Hot site: The hot site can be able to accommodate many businesses and it is a fully equipped data center. The hot site will be available to client companies for subscriber fees. A hot site is costly and highly responsive.
Want to see more full solutions like this?
Chapter 8 Solutions
MindTap Accounting, 1 term (6 months) Printed Access Card for Gelinas/Dull/Wheeler/Hill's Accounting Information Systems, 11th (MindTap Course List)
- On how far do you endorse this issue? Analyze the situation critically using official statistics and the literature.arrow_forwardIs globalization a real catalyst for enhancing international business? It is said that relevance of globalization and regionalism in the current situation is dying down. More specifically, concerned has been raised from different walks of life about Nepal’s inability of reaping benefits of joining SAFTA, BIMSTEC and WTO.arrow_forwardIn the derivation of the option pricing formula, we required that a delta-hedged position earn the risk-free rate of return. A different approach to pricing an option is to impose the condition that the actual expected return on the option must equal the equilibrium expected return. Suppose the risk premium on the stock is 0.03, the price of the underlying stock is 111, the call option price is 4.63, and the delta of the call option is 0.4. Determine the risk premium on the option.arrow_forward
- General Financearrow_forwardAssume an investor buys a share of stock for $18 at t = 0 and at the end of the next year (t = 1) , he buys 12 shares with a unit price of $9 per share. At the end of Year 2 (t = 2) , the investor sells all shares for $40 per share. At the end of each year in the holding period, the stock paid a $5.00 per share dividend. What is the annual time-weighted rate of return?arrow_forwardPlease don't use Ai solutionarrow_forward
- A flowchart that depicts the relationships among the input, processing, and output of an AIS is A. a system flowchart. B. a program flowchart. C. an internal control flowchart. D. a document flowchart.arrow_forwardA flowchart that depicts the relationships among the input, processing, and output of an AIS is A. a system flowchart. B. a program flowchart. C. an internal control flowchart. D. a document flowchart.arrow_forwardPlease write proposal which needs On the basis of which you will be writing APR. Write review of at least one article on the study area (Not title) of your interest, which can be finance related study area. Go through the 1. Study area selection (Topic Selection) 2. Review of Literature and development of research of framework 3. Topic Selection 4. Further review of literature and refinement of research fraework 5. Problem definition and research question…arrow_forward
- Let it denote the effective annual return achieved on an equity fund achieved between time (t-1) and time t. Annual log-returns on the fund, denoted by In(1+i̟²), are assumed to form a series of independent and identically distributed Normal random variables with parameters µ = 7% and σ = 10%. An investor has a liability of £20,000 payable at time 10. Calculate the amount of money that should be invested now so that the probability that the investor will be unable to meet the liability as it falls due is only 5%. Express your answer to the NEAREST INTEGER and do NOT include a "£" sign. Note: From standard Normal tables, we have (-1.645) = 0.05.arrow_forwardFor this question, use this data: myFunc = function (x, y = 2) {z = 7 Z+x^2+y } What is the output of myFunc(2)? O 13. O An error, y is undefined. O Nothing, we have to assign it as a vari O 9.arrow_forwarda medical test has some probability of being positive if the patient has the disease (hasPos) and another probability of testing positive if the person does not have the disease (notHasPos). a random member of the entire population has a real problem of having the disease (actual incidence). Based on the attached information what does the result of the function?arrow_forward
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE LAccounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,