Controls by management while taking a risk, Other Subject

Assignment Help:

Controls 

When Management chooses to moderate a risk, they will do so by execute one or more of three dissimilar types of controls.

Administrative

Administrative controls (also called procedural controls) consist of accepted written, procedures, standards, policies and strategy. Administrative controls form the framework for running the business and organization people. They notify people on how the business is to be run and how day to day operations are to be conducted. Regulation and rules created by government bodies are also a type of managerial control because they notify the business. Some industry sectors have policies, events, standards and guidelines that must be followed - the Payment Card Industry (PCI) Data Security Standard required by master card and visa is such an instance. Other examples of administrative controls consist of the corporate password policy, security policy, hiring policies and disciplinary policies.

Administrative manage form the basis for the selection and implementation of logical and physical controls. Physical and Logical controls are manifestations of administrative controls. Administrative controls are of principal importance.

Logical

Logical controls (also called technical controls) use software and data to control and monitor access to information and computing systems. For instance: network, passwords and host based network intrusion detection systems, firewalls, data encryption and access control lists,are rational controls.

An significant logical control that is often overlooked is the principle of least privilege. The standard of least license requires that an entity, system or program process is not arranged any more access privileges than are necessary to execute the assignment. A blatant example of the failure to adhere to the principle of least opportunity is logging into Windows as user manager to examine Email and surf the Web. Contravention of this principle can also occur when an individual collects additional access privileges over time. This occurs when employees' job duties change, or they are promoted to a new position, or they transfer to one more section. The access rights required by their new duties are frequently added onto their previously existing access rights which may no longer be necessary or suitable.

Physical

Physical controls check and control the environment of the work place and computing conveniences. They also control and monitor access to and from such services. For instance: locks, doors, heating and air conditioning, smoke and fire alarms, fire cameras, barricades ,suppression systems,  fencing,  cable locks, security guards, etc. Separating the network and work place into functional areas are also physical controls.

An significant physical control that is often overlooked is the separation of duties. division of duties make sure that an individual can not entire a serious task by himself. For instance: an employee who submits a request for repayment should not also be able to approve payment or produce the ensure An applications programmer should not also be the server manager or the database administrator - these roles and responsibilities must be estranged from one another.


Related Discussions:- Controls by management while taking a risk

Interrelated aspects of corporate social responsibility, QUESTION 1 (a)...

QUESTION 1 (a) Using appropriate examples, explain Kantian ethics and critically discuss its applicability in business decision making (b) Assess five initiatives that can b

Access control, Access Control Identificatio n is an declaration of ...

Access Control Identificatio n is an declaration of who an important person is or what something is. If a person makes the declaration "Hello, my name is Johanna Doe." the

Gum infection, A 28 year old woman was visited by her GP.  She had been com...

A 28 year old woman was visited by her GP.  She had been complaining of general malaise for some days, and now appeared flushed and was sweating.  She had developed several bruises

Humanities, These essays should be a minimum of five paragraphs in length e...

These essays should be a minimum of five paragraphs in length each. They should contain a clear thesis statement in the first paragraph (an answer to the question!). Make sure your

Want work with you, i am sandeep singh gill. i did Btech in computer scienc...

i am sandeep singh gill. i did Btech in computer science (BE). i am expert in c/c++/java/php/HTML/ other technical fields. i want to do freelancing. can i work with u?? you can sen

Business process orientation (bpo), BUSINESS PROCESS ORIENTATION (BPO) ...

BUSINESS PROCESS ORIENTATION (BPO) The idea of BPO is used consistently with Server markets. The idea of business process orientation (BPO) is stand upon the work of Deming (Wa

Authorisation of electronic fund transfer, AUTHORISATION EFT transactio...

AUTHORISATION EFT transactions necessitate communication between number of parties. When a card is applied at a merchant or Automated teller machine   (ATM), the transaction is

Social inequality, Social Inequality: This is characterized through the ex...

Social Inequality: This is characterized through the existence of uneven opportunities and rewards for distinct social positions or statuses in a group or society. It has structur

Anthropology, Provided an example of secondary social group.

Provided an example of secondary social group.

Influential in maintaining the stability of the family, Question 1: It ...

Question 1: It is assumed that sexuality has always been influential in maintaining the stability of the family. Support the above argument explaining the following terms:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd