Disaster Recovery Procedures

Improved Essays
Zones:
The Entity-Level controls associated with ABC Ferries include a Disaster Recovery Plan, and an Internal Audit of all IT records. Because the Disaster Recovery Plan focuses on higher-level issues, ensuring that all information is backed up off-site and a complete plan is in place in case of a disaster, it is considered an Entity-Level control. In addition, the Internal Audit is performed to help detect fraud and is an overall policy that is in place, making it an Entity-Level control as well.

The IT General Controls in the system are an Employee Login ID and Fingerprint Scanner, Removal of Duplicate Entries, and a Summary of Employee Logs. IT General Controls are put into place to address potential or real risks within an IT System and
…show more content…
An Application Control ensures that a specific business process is being done correctly in order to achieve specific goals or avoid risks. The Membership Card Validation occurs when an employee swipes the membership card of an individual, and ensures that the individual is in fact a current member, reducing the risk of an individual claiming to be a member without paying for a membership. Because the Membership Card Validation is used in only one application, it is considered an application control. The Ticket Verification System involves scanning a barcode on a customer’s ticket in order to ensure that their record is in the system which is related to a specific application, causing it to be classified as an application …show more content…
The Summary of Employee Logs is considered a detective control because the manager reviews them to see if anything is out of the ordinary, and to detect accidental errors as well as possible fraud or intentional mistakes. The Membership Card Validation is used to ensure that individuals claiming to be members actually have current memberships, and is considered detective because it will signal if someone is trying to falsely claim to be a member. The Ticket Verification System is detective because it will report if the ticket doesn’t match what is stored in the system, and signal that there is either an error, or the ticket is

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    After reviewing the data they can determine if they need to adjust anything or if they need additional information it should be able to narrow things down and get to the root of the problem. Next is to improve the issue, and if PCS is satisfied with the data they collect form the analysis performed, they can then work on developing a solution. Finally the control and this is the phase where PCS documents how they exactly want to pass on the solution to the issue and how employee can utilize the solution (GoLeanSixSigma,…

    • 743 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Management provides adequate controls including segregation of duties, dual control, and accounting. B. Management has implemented sound operating processes, information systems, internal control, and audit coverage. Risk: Security Controls Mitigation Strategies: A. Only authorized staff, have access to wire transfer software (PCBB) with a current certificate and password. B. With PCBB and Silverlake, dual control is in place for initiating and authorizing wires.…

    • 1287 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    ABSTRACT Hurricane Hugo caused much damaged on the coastal plain forest. The Santee Experimental Forest experienced the severe force of eyewall and wind damage. Northern east area i.e. on Hobcaw Forest was majorly damage by salt with some wind damage. Tallest trees and the largest trees were more damaged than smaller trees. Within the area impacted by the eyewall, 89% of the longleaf pine trees, 91% of loblolly pine trees, 86% of bottomland hardwood trees were uprooted.…

    • 2356 Words
    • 10 Pages
    Improved Essays
  • Improved Essays

    HGC Case Study

    • 1025 Words
    • 4 Pages

    These information systems are: • LAN – Switches, routers and firewall • Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS) • Workstations • Communication network – Phone and IP phones • Agency data processing center including its operating systems and utilities • Tactical radio network • Shared information processing service facilities (Bowen, Hash, & Swanson, 2006). A5: IT infrastructure that includes a description of information flow JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant…

    • 1025 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Although police respond to emergencies far less frequently than to routine incidents,32 emergency response is a vital aspect of what police agencies do. Emergency responses, often referred to as critical incidents, are used for crimes in progress, traffic accidents with serious injuries, natural disasters, incidents of terrorism, officer requests for assistance, and other situations in which human life may be in jeopardy. Emergency responses take priority over all other police work, and until an emergency situation is secured and some order restored, the officers involved will not turn to other tasks. An important part of police training involves emergency response techniques, including first aid, hostage rescue, and the physical capture of…

    • 112 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Evaluate the risk and create policies and procedures to negate or reduce them. Educate and communicate with management and staff about risk factors. Rank risks according to likelihood of occurrences for each dept. Periodically review and update risks, and risks management programs. (Rubbens, 2007)…

    • 819 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    These safeguards include access control, audit controls, integrity controls, and transmission security (HSS.org). Access control requires a covered entity to implement policies and procedures to restrict a certain level of individuals from obtaining technical access to the electronic information. Audit controls must be implemented including but limited to hardware, software, and procedures to examine the access of electronic information and ensure the information is…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    The wind howls, the bullets of rain shoot down, and the sun hides behind thick daunting clouds as Hurricane Katrina ransacks the vibrant southern coast of the United States. States including Florida, Georgia, Alabama, Louisiana, and many more surrounding were then thrown into a war against nature. On August 29, 2005, $118 million cubic yards were destroyed and over $110 billion dollars in damage were left in Katrina’s path of destruction. On that day, 1,836 lives were taken and millions more were ruined (Amadeo 1). Ten years later after the devastating hurricane seemed like a forgotten nightmare, the Carolinas faced severe flooding inducing 25 deaths and over $1 billion dollars worth of damage (Collins 1).…

    • 2180 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Terroristic activity is not a new concept here in the United States or in other countries plagued with high political turmoil. Terrorism is defined as the meaningful attempt of a smaller group or individual behaving irrationally with sadistic ideals who try to inflict their ways of thinking on a larger group or population. In every instance of terrorism, the tactics of fear and intimidation are always utilized (Schmallenger & Hall, 2014, p. 402). Terrorist organizations look for large areas with a booming population.…

    • 1447 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Corporate Social Responsibility: As a leader in the toy industry, Mattel failed to fulfill its corporate social responsibility and meet the legitimate concerns of society. In the business world, corporations should be responsible for all of stakeholders, including the shareholders, customers, and the society. Thus, the best social responsibility is to create shared value for society and the business (Hitt, Black, and Porter 51).…

    • 818 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Controlling is a process of establishing performance standards based on the organization objectives, evaluating and reporting actual performance, comparing the two, and taking corrective or preventive action as necessary. This function makes sure that goals are met. All the successful organizations, not important the size or how big they are pay close attention to the controlling function. In these moments we are learning of our errors and modifying part of the system of medical transportation and patient’s identification where some errors reduced the effectiveness of the organization.…

    • 1616 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    More and more organizations utilize a management control system (MCS). A MCS can assist an organization with evaluating the organization, as well as implementing corporate strategies that will enable the organization to roll out corporate-wide systems. Typically a MCS covers the administrative and financial areas of an organization.…

    • 1406 Words
    • 6 Pages
    Improved Essays