Question: Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to analyze the relationship among risk/opportunity/control. Also consider how these
Identify which IT Application Controls would best mitigate the threats outlined. Expand upon your answer to analyze the relationship among risk/opportunity/control. Also consider how these scenarios could be detected by an audit internal or external.
Which types of input controls would mitigate the following threats?
- Posting the amount of a sale to a customer account that does not exist.
- A Customer entering too many characters into the five-digit zip code while making an online purchase, causing the server to crash.
- An interns pay rate was entered as $150 per hour, not $15 per hour.
- Approving a customer order without the customers address so the order was not shipped on time.
- Entering the contract number of a critical contract as 13688 instead of 16388, which is a serious mistake for the company.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
