close solutoin list

Question : Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer. Code Control Plan _____ 1 Aptitude tests _____ 2. Program change controls _____ 3. Fire and water alarms _____ 4. Fire and water insurance _____ 5. Install batteries to provide backup for temporary loss of power _____ 6. Backup and recovery procedures _____ 7. Service level agreements _____ 8. IT steering committee _____ 9. Security officer _____ 10. Operations run manuals _____ 11. Rotation of duties and forced vacations _____ 12. Fidelity bonding _____ 13. Personnel management (supervision) _____ 14. Personnel termination procedures _____ 15. Segregation of duties _____ 16. Strategic IT plan _____ 17. Disaster recovery planning _____ 18. Restrict entry to the computer facility through the use of employee badges, guest sign-in, and locks on computer room doors _____ 19. Access control software _____ 20. Personnel development controls

BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127
BuyFind

Accounting Information Systems

11th Edition
Ulric J. Gelinas + 3 others
Publisher: Cengage Learning
ISBN: 9781337552127

Solutions

Chapter
Section
Chapter 8, Problem 2P
Textbook Problem

Question :

Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preventive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer.

Code Control Plan
_____ 1 Aptitude tests
_____ 2. Program change controls
_____ 3. Fire and water alarms
_____ 4. Fire and water insurance
_____ 5. Install batteries to provide backup for temporary loss of power
_____ 6. Backup and recovery procedures
_____ 7. Service level agreements
_____ 8. IT steering committee
_____ 9. Security officer
_____ 10. Operations run manuals
_____ 11. Rotation of duties and forced vacations
_____ 12. Fidelity bonding
_____ 13. Personnel management (supervision)
_____ 14. Personnel termination procedures
_____ 15. Segregation of duties
_____ 16. Strategic IT plan
_____ 17. Disaster recovery planning
_____ 18. Restrict entry to the computer facility through the use of employee badges, guest sign-in, and locks on computer room doors
_____ 19. Access control software
_____ 20. Personnel development controls

Expert Solution

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

See Solution

*Response times vary by subject and question complexity. Median response time is 34 minutes and may be longer for new subjects.

Chapter 8 Solutions

Accounting Information Systems
Show all chapter solutions
Ch. 8 - What types of documentation constitute a...Ch. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Describe backup and recovery.Ch. 8 - Describe continuous data protection (CDP), a...Ch. 8 - What is the difference between a hot site and a...Ch. 8 - Describe a denial-of-service attack. What controls...Ch. 8 - Describe the three layers of controls for...Ch. 8 - Explain biometric identification systems.Ch. 8 - Describe the four layers of controls for...Ch. 8 - Distinguish firewalls, intrusion-detections...Ch. 8 - What is data encryption? What is the key in...Ch. 8 - Define computer hacking and cracking, and explain...Ch. 8 - Provide three examples of hacking techniques....Ch. 8 - The chapter discusses environmental hazards with...Ch. 8 - What is the COBIT 5 framework? How does it differ...Ch. 8 - Name the five principles delineated by COBIT 5.Ch. 8 - List the seven enablers in the COBIT 5 framework.Ch. 8 - What are the five IT control process domains in...Ch. 8 - The Enterprise Risk Management (ERM) framework...Ch. 8 - In small companies with few employees, it is...Ch. 8 - No matter how sophisticated a system of internal...Ch. 8 - If personnel hiring is done correctly, the other...Ch. 8 - Monitoring must be performed by an independent...Ch. 8 - A key control concern described in Table 8.2 (p....Ch. 8 - Debate the following point: Business continuity...Ch. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Preventing the unauthorized disclosure and loss of...Ch. 8 - Your boss was heard to say, If we implemented...Ch. 8 - For each of these control plans, suggest a...Ch. 8 - The following is a list of six control plans from...Ch. 8 - The following is a list of six control plans from...Ch. 8 - Question: 1. Using a key of 2 and an algorithm of...Ch. 8 - Question : Listed here are 20 control plans...Ch. 8 - The following is a list of 13 control plans from...Ch. 8 - Assume that accounts payable are processed on a...Ch. 8 - Personnel at CP Company must perform the following...Ch. 8 - AS5 outlines the processes for An Audit of...Ch. 8 - Examine the last column in Table 8.2 (p. 280) for...

Additional Business Textbook Solutions

Find more solutions based on key concepts
Show solutions
CAPM AND REQUIRED RETURN Bradford Manufacturing Company has a beta of 1.45, while Farley Industries has a beta ...

Fundamentals of Financial Management, Concise Edition (with Thomson ONE - Business School Edition, 1 term (6 months) Printed Access Card) (MindTap Course List)

What information is needed to prepare a statement of cash flows?

College Accounting, Chapters 1-27 (New in Accounting from Heintz and Parry)