you will be presented with two internal control scenarios. For each scenario:
- Identify the internal control threat/weakness that may have lead to the issue described, and
- Recommend the appropriate preventive, detective, and/or corrective controls.
The VP of Sales, Carol, has sent you an email relating to her suspicions and would like for you to respond:
I donâ€™t want to sound paranoid, but it seems like we are getting beat out of our electronic contract bids by the same company each and every time. I donâ€™t think we have an inside mole in our department, I know we have been really tight on authentication and authorization controls when it comes to our contract bidding as its only me and one other person that does this. Can you tell if someone is able to either break into our system to get these files or is intercepting them at all? What are the controls that we can put in place to really ensure that this does not happen?