Purchase Solution

This post addresses IT risk IT internal controls.

Not what you're looking for?

Ask Custom Question

For effective control, management must also develop, enforce, and adhere to the control systems in place. We noted in previous weeks that companies can reduce the risk of compromising information captured in their AIS through control systems. As discussed in Hunton, Bryant and Bagranoff, in recent years, there is an increased emphasis in risk based audit model in contrast to control-based models. This is a very interesting shift.

In order to help us pursue this topic, let first consider the following question: Why is it important to identify and assess IT risk before developing IT internal controls?

Please search for a filing on Diagnostics Inc at http://sec.gov/edgar/searchedgar/companysearch.html, I also attached their k10 locate the most recent 10k report and share your thoughts on the independent auditor's assessment of the internal controls of the company.

Purchase this Solution

Solution Summary

This solution addresses the following exercise:

For effective control, management must also develop, enforce, and adhere to the control systems in place. We noted in previous weeks that companies can reduce the risk of compromising information captured in their AIS through control systems. As discussed in Hunton, Bryant and Bagranoff, in recent years, there is an increased emphasis in risk based audit model in contrast to control-based models. This is a very interesting shift.

In order to help us pursue this topic, let first consider the following question: Why is it important to identify and assess IT risk before developing IT internal controls?

Please search for a filing on Diagnostics Inc at http://sec.gov/edgar/searchedgar/companysearch.html, I also attached their k10 locate the most recent 10k report and share your thoughts on the independent auditor's assessment of the internal controls of the company.

Solution Preview

It is always, always necessary to develop risk before designing controls, whether we're talking about IT or some other area of internal control within the company. Basically, you've got to ask yourself this question: Why are we designing the controls? What are we trying to protect? There is no way to answer this question in any type of thorough manner without first understanding where our weak areas are, and we can only do this if we complete a risk assessment. I will say that IT is particularly more vulnerable in this area because of the nature of IT. We are protecting sensitive company information, customer data that includes sensitive information, and other proprietary data that if compromised, can put our customers, our employees, and our operations at risk. To mitigate this risk, we complete a comprehensive risk assessment which allows us to ...

Purchase this Solution


Free BrainMass Quizzes
Situational Leadership

This quiz will help you better understand Situational Leadership and its theories.

Writing Business Plans

This quiz will test your understanding of how to write good business plans, the usual components of a good plan, purposes, terms, and writing style tips.

MS Word 2010-Tricky Features

These questions are based on features of the previous word versions that were easy to figure out, but now seem more hidden to me.

Basic Social Media Concepts

The quiz will test your knowledge on basic social media concepts.

Managing the Older Worker

This quiz will let you know some of the basics of dealing with older workers. This is increasingly important for managers and human resource workers as many countries are facing an increase in older people in the workforce