Preview

Acc542 Kudler Risks and Internal Controls

Better Essays
Open Document
Open Document
1178 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Acc542 Kudler Risks and Internal Controls
Risks and Internal Controls for Kudler Fine Foods
ACC/542
June 3, 2013
Jana L. Highwort, MBA
University of Phoenix
Risks and Internal Controls for Kudler Fine Foods Internal controls are policies and procedures a company uses to ensure the accuracy and validity of their data. Risks are threats to that data that could be internal or external of the company (Hunton, Bryant, & Bagranoff, 2004). The following paragraphs will identify and analyze the risks and internal controls as they relate to the information systems for Kudler Find Foods. This will give Kudler information on how to evaluate risks and the application of the internal controls and this document will discuss other external risks associate with buying a new accounting information system (AIS).
Identifying and Analyzing Risks There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004). It is important to thoroughly evaluate the AIS selected for risks as it includes confidential



References: Apollo Group, Inc. (2013). Kudler Fine Foods: Intranet. Retrieved from ACC/542 – Accounting Information Systems course website. Disaster Recovery Journal. (2011). Generally Accepted Practices: Risk Evaluation and Control. Retrieved from http://www.drj.com/GAP/gap Goldenberg, N. (2011). Are Your ERP Systems Vulnerable? Retrieved from http://www.eisneramper.com/ERP-Systems-Vulnerability-211.aspx Hunton, J. A., Bryant, S. M., & Bagranoff, N. A. (2004). Core Concepts of Information Technology Auditing. New York: Wiley & Sons. Pomerantz, G. and Rao, N. (August, 2009). 2009 Segregation of Duties Checklist. Retrieved from http://www.bdoconsulting.com/resources/thought-leaders/SegDutiesChecklist-19.pdf

You May Also Find These Documents Helpful

  • Good Essays

    References: Gray, I and Mason, S (2008), The Audit Process: Principles, Practice and Cases, (4th ed.), London: Thomson Learning Ch 1…

    • 1171 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    Next security risks, is the assurance that unauthorized personnel will not have access to vital information. For internal control measures to be effective the company must have internal controls to reduce unauthorized system access. Next are audit risks which contribute to the authenticity of the system chosen. Audit risk carries with it several subcomponents of various risks, such as inherant, control, and detection risks (Hunton, Bryant, & Bagranoff, 2004). Similar to business risk, the opportunity for fraudulant activity to occur contributes significantly to control risk. An auditors failure to uncover…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The purpose of this paper is to describe the value of a new accounting system for Kudler Fine Foods. The author will cover the key features, core technology, benefits, and cost of the proposed system.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Acct 504 Case Study 2

    • 1426 Words
    • 5 Pages

    Thank you for selecting our firm to provide your company with an evaluation of your organizations internal control system. Internal control systems are vital in securing your organizations assets, it will limit the risk of fraud as well as misuse of your assets. Comprehending how to separate duties among your employees will aid in improving transparency as well as keep your company financially strong.…

    • 1426 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    2. Why is it difficult to conduct a qualitative risk assessment for an IT infrastructure?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hunton, J. E. (2004). Core Concepts of Information Technology Auditing. John Wiley & Sons, Inc.…

    • 1023 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Acc 544 Internal Control

    • 800 Words
    • 4 Pages

    The purpose of this brief report is to explain the need for the internal control system within the organization. When controls are in place with an insurance and portfolio approach. An internal control system in any organization is a way to regulate, to reduce lost, to minimize risks, and to accomplish the organizational goals and success (McCarthy, 2004). The majority of organizations depend on the insurance approach and the portfolio risk management approach. The company to manage a business risk is currently using these approaches. It is now being recommended that the company make a transition in order to capture the benefits of an internal control system. Explained below are the two types of currently used approaches, insurance and portfolio, that are used within the organization.…

    • 800 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Kudler

    • 2941 Words
    • 12 Pages

    References: Apollo Group, Inc. (2007). Kudler Fine Foods. Strategic Plan. Retrieved April 16, 2010. STR/581 – Strategic Planning and Implementation. https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/Kudler/Admin/KudlerAdmin001.htm…

    • 2941 Words
    • 12 Pages
    Best Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Better Essays

    Apollo Group 2. (2005). Kudler Fine Foods: Sales & Marketing: Sales Plan 2006. Retrieved February 26, 2006, from University of Phoenix Web Site: eResource Web Site: https://ecampus.phoenix.edu/secure/aapd/CIST/VOP/Business/Kudler/Sales/KudlerSM002.htm…

    • 1031 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    At its core, the purpose of a risk assessment is identifying and evaluating risks that may potentially have a negative impact on an organization. It can help management understand the impact in terms of costs to the organization or the severity of a loss depending on the methodology used to conduct the risk assessment. The goal is to provide sound recommendations based on the risk assessment to help maintain data confidentiality, integrity and vulnerability while ensuring functionality and usability. Based on the results, management can make more informed decisions about what resources to protect, how to protect them and understand the potential costs and impact. Once the purpose of the risk assessment is understood, defining the scope is next.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Liberal Arts

    • 3433 Words
    • 14 Pages

    • Hall, James A., (2011), Information Technology Auditing, 3e, Mason: South-Western Cengage Learning (Referred to as “IT Audit Text” in the Readings List for each class)…

    • 3433 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Pipkin (2000) points out that a risk assessment should not focus on the creation of large amounts of information, but rather it should help to identify sensible measures to control the threats on data security and confidentiality that may brought on by a disaster. A risk assessment should include steps that will help to save the security and confidentiality of data.…

    • 1049 Words
    • 3 Pages
    Good Essays
  • Better Essays

    and search within the software to find whether the system the company uses to document all…

    • 2327 Words
    • 10 Pages
    Better Essays