Question: Cyber Security and Internal Controls A. Complete the Internal Control Matrix below. Internal Control Matrix for Cyber Security Using COSO 17 Principles Control Objective: Provide

Cyber Security and Internal Controls

A. Complete the Internal Control Matrix below.

Internal Control Matrix for Cyber Security

Using COSO 17 Principles

Control Objective: Provide assurance that the entity is protected from CYBER THEATS.

[You can use CHATGPT to generate ideas]

Internal Control Component (COSO) COSO Principle

Control Objective

(To stop the Threat-Management's Responsibility)

Provide a Management Control that meets the Control Objective.

(Management's Responsibility)

[COSO-17 principles]

[What does Management SPECIFICALLY do, and the auditor can actually obtain as Evidence?]

What Audit Procedure can the auditor perform to test this control?
Control Environment

Principle #1

Demonstrate commitment to integrity and ethical values

Management ensures that the entity is protected from CYBER THREATS by demonstrating a commitment to integrity and ethical values.

Control Environment

Principle #2

Ensure that board exercises oversight responsibility

Management ensures that the entity is protected from CYBER THREATS by ensuring that the board exercises oversight responsibility.
Control Environment

Principle #3

Establish structures, reporting lines, authorities, and responsibilities

Management ensures that the entity is protected from CYBER THREATS by establishing structures, reporting lines, authorities, and responsibilities.

Control Environment

Principle #4

Demonstrate commitment to a competent workforce

Management ensures that the entity is protected from CYBER THREATS by demonstrating a commitment to a competent workforce.
Control Environment

Principle #5

Hold people accountable

Management ensures that the entity is protected from CYBER THREATS by holding people accountable.
Risk assessment

Principle #6

Specify appropriate objectives

Management ensures that the entity is protected from CYBER THREATS by specifying appropriate objectives.

Risk Assessment

Principle #7

Identify and analyze risks

Management ensures that the entity is protected from CYBER THREATS by identifying and analyzing risks.

Risk assessment

Principle #8

Evaluate fraud risks

Management ensures that the entity is protected from CYBER THREATS by evaluating fraud risks.

Risk assessment

Principle #9

Identify and analyze changes that could significantly affect internal controls

Management ensures that the entity is protected from CYBER THREATS by identifying and analyzing changes that could significantly affect internal controls.

Control Activity

Principle #10

Select and develop control activities that mitigate risks

Management ensures that the entity is protected from CYBER THREATS by selecting and developing control activities that mitigate risks.

Control Activity

Principle #11

Select and develop technology controls

Management ensures that the entity is protected from CYBER THREATS by selecting and developing technology controls.
Control Activity

Principle #12

Deploy control activities through policies and procedures

Management ensures that the entity is protected from CYBER THREATS by deploying control activities through policies and procedures.
Information and Communications

Principle #13

Use relevant, quality information to support the internal control function

Management ensures that the entity is protected from CYBER THREATS by using relevant, quality information to support the internal control function.
Information and Communications

Principle #14

Communicate internal control information internally

Management ensures that the entity is protected from CYBER THREATS by communicating internal control information internally.

Information and Communications

Principle #15

Communicate internal control information externally

Management ensures that the entity is protected from CYBER THREATS by communicating internal control information externally.

Monitoring

Principle #16

Perform ongoing or periodic evaluations of internal controls (or a combination of the two)

Management ensures that the entity is protected from CYBER THREATS by performing ongoing or periodic evaluations of internal controls.

Monitoring

Principle #17

Communicate internal control deficiencies

Management ensures that the entity is protected from CYBER THREATS by communicating internal control deficiencies.

B. Using Deloitte's "State of Ethics and Trust in Technology Annual Report" [fifty-three pages]

https://www2.deloitte.com/content/dam/Deloitte/us/Documents/us-tte-annual-report-2023-12-8.pdf

From page 6 of this report, select one of the emerging technologies (Cognitive Technologies; Digital Reality; Ambient Experiences; Autonomous Vehicles; Quantum Computing; Distributed Ledger Technology; or Robotics.)

Then using page 27 of this report, pick one of the "Trustworthy and Ethical Principles" (Responsible; Safe and Secure; Transparent and Explainable; Robust and Reliable; Accountable; Fair and Impartial; Private; Collaborative; Adaptable; and Controlled)

Required: Using your words, explain how your selected "trustworthy and ethical principle" can be applied to your selected emerging technology. (This should be about three to six sentences.) In other words, how could a company using a technology make sure that it is using the technology in an ethical manner.

Cyberspace includes the global internet and all its accoutrements. There are 1.7 billion global users of this cyber space. Cyber security is the system in place to keep cyber space secure from hacking, pirating, terrorism, fraud, etc. for individuals, companies and governments. $575 billion is loss to cyber security violations annually.

As an accountant you will be expected to help corporations and governments secure their cyberspace against cyber penetration. This cyber security project will give you practice in helping your clients.

You will be preparing a matrix with 17 suggested controls to ensure the entity will not be cyber attached!

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!