Chapter 7,8,10 As system complexity and our dependence on them increase, companies face the growing risk of their systems being compromised. What are the threats a company faces? Or what are the threats to ais?


Describe control policies and procedures commonly used in business organizations



Download 0.52 Mb.
View original pdf
Page3/11
Date17.12.2020
Size0.52 Mb.
#55473
1   2   3   4   5   6   7   8   9   10   11
Chapter 7,8,10
4. Describe control policies and procedures commonly used in business organizations.
The second component of COSO’s internal control model is control activities. Generally, control procedures fall into one of five categories a) Proper authorization of transactions and activities b) Segregation of duties c) Design and use of adequate documents and records d) Adequate safeguards of assets and records e) Independent checks on performance
5. Suppose you are an executive supposed to make strategic decision. Discuss how you would

Download 0.52 Mb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10   11




The database is protected by copyright ©ininet.org 2024
send message

    Main page