978-1133934400 Chapter 15 Solution Manual Part 3

subject Type Homework Help
subject Pages 9
subject Words 1541
subject Authors James A. Hall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
1. MULTIPLE CHOICE
1. D
2. D
2. problems
1. SERVICE PROVIDER AUDIT -- The Harvey Manufacturing Company
Explain how the Harvey Manufacturing auditors will assess the relevant
Or,
Carve-out Method.
page-pf2
Chapter 1 Page 2
Inclusive Method.
2. INTERNAL CONTROL - Howard Industries
a) Identify and explain any control concerns you have with the new
operations.
b) What potential computer fraud might this operational approach permit?
a)
b)
Possible Frauds include:
Program Fraud. This includes the following (1) creating illegal programs that
can access data files to alter, delete, or insert values into accounting records;
page-pf3
Chapter 1 Page 3
Operations fraud. This is the misuse or theft of the firm's computer
Reconciliation responsibility combined with the processing access, and
3. DISTRIBUTED DATA PROCESSING
a. When setting systems standards in a distributed processing environment,
discuss the pertinent factors about:
1. Computer hardware factors that need to be considered include:
page-pf4
Chapter 1 Page 4
2. Controls considerations include:
b. The benefits of having standardized hardware and software include:
c. The memorandum is likely to create the following concerns:
page-pf5
Chapter 1 Page 5
4. INTERNAL CONTROL
Compensating controls that Gustave most likely found include:
5. DISASTER RECOVERY PLANNING CONTROVERSY
1) Argument against auditing DRP
page-pf6
Chapter 1 Page 6
2) Argument supporting DRP audit
page-pf7
Chapter 1 Page 7
6. SEPARATION OF DUTIES
Since the employee will have performed several highly incompatible tasks, this
company needs to employ strong password access controls and constantly
require their employees to change their passwords, especially since they have
7. DISASTER RECOVERY SERVICE PROVIDERS
SunGard separates its recovery services into three groups: high availability,
systems recovery, and end-user recovery. Each contains specific services
The goal of high availability is to ensure the
ongoing availability of information, to eliminate exposure to lost information, to
reduce overall business risk, and to help ensure that the revenue stream will
stay intact. Many companies rely on redundant storage to ensure the
availability of information under uncertainty. If data is damaged or erased, the
company can use the backup information to recover lost records and continue
normal processing. The problem that exists is that many firms’ process and
page-pf8
Chapter 1 Page 8
System recovery focuses on recovering
mainframe and/or distributed systems quickly and efficiently. To do this,
SunGard provides specialized teams of up to 2,000 technicians working around
the clock to get clients’ systems running properly. These teams use a process
called Silhouette OS to understand and repair individual systems. Silhouette
End-user recovery is dedicated to maintain employee
productivity until systems are repaired and functional. One technique used is to
provide a disaster recovery center. These centers provide fully furnished
workstations, high-speed Internet access, all necessary hardware and software, and
communication devices for the clients’ use. Each center is secure and maintains a
8. PHYSICAL SECURITY OF DATA CENTER -- Big Apple Financials, Inc.,
a. Security over physical environment includes:
page-pf9
Chapter 1 Page 9
b. 6 Control Features
1. Physical Location:
2. Construction:
3. Limited Access to operators and authorized employees
4. Air Conditioning: Computers operate best in a temperature range of 70 to
5. Fire Suppression:
6. Fault Tolerance Controls:
c. Options to reduce operating costs
page-pfa
Chapter 1 Page 10

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.