Provide an analysis of the business system

Assignment Help Computer Engineering
Reference no: EM133424114

Network Design and Evaluation 

Background 

The following extract is part of the report1 on the reason for the collapse of Barings, an international investment bank. 

The management of Barings broke a cardinal rule of any trading operation - they effectively let Leeson settle his own trades by putting him in charge of both the dealing desk and the back office. This is tantamount to allowing the person who works a cash-till to bank in the day's takings without an independent third party checking whether the amount banked at the end of the day reconciles with the till receipts. 

The back-office records, confirms and settles trades transacted by the front office, reconciles them with details sent by the bank's counterparties and assesses the accuracy of prices used for its internal valuations. It also accepts/releases securities and payments for trades. Some back offices also provide the regulatory reports and management accounting. In a nutshell, the back office provides the necessary checks to prevent unauthorised trading and minimise the potential for fraud and embezzlement. Since Leeson was in charge of the back office, he had the final say on payments, ingoing and outgoing confirmations and contracts, reconciliation statements, accounting entries and position reports. He was perfectly placed to relay false information back to London.

 Abusing his position as head of the back-office, Leeson suppressed information on account '88888'. This account was set up in July 1992 - it was designated an error account in Barings Futures Singapore system ... But Barings London did not know of its existence since Leeson had asked a systems consultant, Dr Edmund Wong, to remove error account '88888' from the daily reports which BFS sent electronically to London. This state of affairs existed from on or around 8 July 1992 to the collapse of Barings on 26 February 1995...

 Error accounts are set up to accommodate trades that cannot be reconciled immediately. A compliance officer investigates the trade, records them on the firm's books and analyses how it affects the firm's market risk and profit and loss. Reports of error accounts are normally sent to senior officers of the firm. 

Barings' management compounded their initial mistake of not segregating Leeson's duties by ignoring warnings that prolonging the status quo would be dangerous. An internal auditor's report in August 1994 concluded that his dual responsibility for both the front and back offices was "an excessive concentration of powers." The report warned that there was a significant general risk that the general manager (Mr Nick Leeson) could override the controls. 

The audit team recommended that Leeson be relieved of ... duties: supervision of the back-office team, cheque-signing ... and bank reconciliations. Leeson never gave up any of these duties even though Simon Jones, regional operations manager South Asia and chief operating officer of Barings Securities Singapore, had told the internal audit team that Leeson will "with immediate effect cease to perform the[se] functions."

Assumptions 

From this article we can identify a number of banking roles as follows. You may assume that each will be supported by a software application and related data.

 a. Dealer (i.e. selling and buying)

 b. Accountant ('settling trades' - actually moving the money, verifying trading partners, recording transactions in the bank ledgers)

 c. Compliance Officer (reviewing the risk associated with 'error' trades)

 d. Reporter (reporting to management)

 You may ignore other roles, such as system management.

 Questions

 You are tasked with designing a networked system for a business with the roles listed above. You are required to answer the following questions, and provide a clear explanation that justifies your answers:

  1. Provide an analysis of the business system described in the above report. You MUST include a system diagram of your designed network that clearly shows different roles, assets, and their interaction in the system with explanation.
  2.  (ii) Apply a structured security design process to the above analysis to describe the primary security features and functions of your resulting network design including the function of each subnet and justification for the controls that you propose.
  3.  (iii) Evaluate how your design would have successfully prevented the problems described in the above report.

Reference no: EM133424114

Questions Cloud

Describe disclosure processes of adolescents on social media : Describe the motivations behind the disclosure processes of adolescents on social media, including its influence on identity development.
List the process to obtain state-specific prescribing : List the process to obtain state-specific prescribing privileges for an FNP in Oklahoma, including DEA number. Includes restrictions and suggestions to address
Client who has experienced panic attacks : A nurse is talking with a client who has experienced panic attacks. The client asks the nurse, "What causes these attacks?"
Explain why these should concern the executive board : explain why these should concern the executive board of a regulated firm and why, as a regulatory compliance professional, the attitude and approach of some
Provide an analysis of the business system : Provide an analysis of the business system described in the above report. You MUST include a system diagram of your designed network
Report the leapfrog and medicare : Report the Leapfrog and Medicare Compare scores of a chosen organization or provider type
How the principles of professional ethical behaviour can be : Explain how and why each individual employee's behaviour is a key component of a robust ethical culture and the achievement of a firm's corporate values.
Implementing artificial intelligence in healthcare : Consider what training to orovide new employees and what on - going training may be necessary for implementing artificial intelligence in healthcare
What is a composite function and how are composite functions : what is a composite Function? How are composite functions solved? Give examples.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many digits the number has

Write a program that reads an integer and prints how many digits the number has, by checking whether the number is = 10, = 100, and so on.

  Describe the four phases of the requirements

describe the four phases of the requirements engineering process with one sentence describing each phase

  What would change in your design to accommodate the feature

Suppose that the elevators are divided into two sets, the first comprising the elevators. What would change in your design to accommodate this feature?

  Write the declaration for a void function named wow

Write the declaration (prototype) for a void function named wow. The function wow has two parameters, the first of type speed as defined.

  Design a vote structure to hold candidate

Design a Vote structure to hold candidate, votes received and percentage of total votes. Then use a STL list of Vote structure to implement the program.

  Write a method findlongestpalindrome

Write a method findLongestPalindrome(String s) that returns the longest palindrome (string that matches its own reverse) contained within the parameter s.

  Questionafter front-office network at xyz corp is set up an

questionafter front-office network at xyz corp. is set up an accountant realizes that if loading dock connected to the

  Display each square on a separate line in the the control

Unzip and open the Odd Squares Solution\Odd Squares Solution.sln file. Code the Display button's Click event procedure so that it displays the squares.

  What did you find out about the network

Demonstrates how to conduct "Footprinting of a network" The best way to ensure your infrastructure is secure is to understand the steps an intruder may use.

  1 the degreev of a pendant vertex may be either one or

1. the degreev of a pendant vertex may be either one or zero.nbspnbspnbspnbspnbsp tnbsp ornbsp fnbsp2. a tree is any

  What implications does queues have for the mach scheduler

Each of the global run queues has a single mutex for locking it. What implications does this have for the Mach scheduler?

  Is there another approach that might work better

Today's Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd