Preview

is3230 week1 assgnmnt1

Satisfactory Essays
Open Document
Open Document
362 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
is3230 week1 assgnmnt1
Segregation of Duties Matrix

(System User–Rights and Permissions)
Department
Jennifer
Buster
Bradley
Lloyd
LuEllen
Robert
Spare
Sam
Receiving
RO
RO
F
F
RO
F
T/BP
F
Shipping
RO
F
F
RO
F
RO
T/BP
F
Sales
F
N
F
RO
N
RO
T/BP
F
Accounts Payable
F
N
F
F
N
N
T/BP
F

What were the incompatible functions in Jennifer’s access account, and why do you think such an incompatibility existed?
In Jennifer’s access account there were two incompatible functions. She was assigned access to both the receiving and shipping departments. This would have allowed her to make entries into the systems that may not have been accurate. With Jennifer’s primary job as Sales, and secondary as an Accounts Payable clerk, her system access needs to be modified in accordance with her duties. By correcting her access to read only for the Receiving and Shipping departments, she can now see the activity and provide updates to customers that may inquiry her about a shipment, and still perform her duties in Sales and Accounts Payable. Based on the initial duties matrix, it appears that everyone had been granted access to every department. This incompatibility that began with entering the users into the system, is what can lead to incorrect and accidental entries into a specific departments system.
What were the potential conflicts and incompatible functions in Lloyd’s access account authorizations?
The potential conflicts and incompatible functions in Lloyd’s access was having access to all departments. As the purchasing agent, Lloyd would need to update Receiving and Accounts Payable as orders dictate. Lloyd having Read Only access to Shipping and Sales can allow him to keep ahead as orders are entered into the system.
What are the requirements for Buster and LuEllen?
As Buster and LuEllen are shippers, the only access they should be granted is to the shipping department. Allowing Read Only access to the Receiving department can allow them to keep abreast of inventory fluctuations and be better



References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Buster and LuEllen are shippers. They need full access to shipping to perform their duties. I am assuming the inventory is managed by receiving so they would need to have Read Only access to receiving in order to know where stock is put after it is received so they can ship it to customers. Their position would require limited access to sales in order to know what products have sold and where to ship them to.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wgu Financial Case 6-2

    • 569 Words
    • 3 Pages

    Principle violated- Divide responsibilities for related transactions and separate recordkeeping from custody of assets. The business will need to separate the duties of Ms. Flat. She is currently recording all cash receipts and posting the payments to the customer accounts. This leaves much room for error and fraud. Ms. Flat also has control or access over all cash receipts as well as being responsible for posting the payment to accounts. 2.…

    • 569 Words
    • 3 Pages
    Good Essays
  • Good Essays

    a) Joan’s first mistake is not using control of cash receipts. She is having only one person go through the whole accounting controls process. There should be other people involved in this process including Joan herself. Joan must also realize the limitations of human controls. One person going through the entire process is bound to make a human error.…

    • 710 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Acc202 Wk 1 Assgnment 1

    • 566 Words
    • 3 Pages

    The three main components of product cost for a manufacturing entity are direct materials, direct labor, and manufacturing overhead.…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5. Application of a device that holds the bone in place from outside is called?…

    • 237 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    1. The purpose of identifying IT assets and inventory is to evaluate assets and track them.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    Pyle, N. (2009, September 01). Designing and implementing a pki: Part i design and planning. Retrieved from…

    • 634 Words
    • 3 Pages
    Better Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    It was the HR system that accessed the files and they also need to make sure everything has been corrected.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Powerful Essays

    Sandhu, R., & Samarati, P. (1996). Authentication, access control, and audit. ACM Computing Surveys (CSUR), 28(1), 241-243.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    PBUSE Case Study

    • 1873 Words
    • 8 Pages

    This is a view only access section for unit level personnel. This section includes authorizations, administrative adjustment report, asset adjustments, and lateral transfers. The Modification Table of Organization and Equipment (MTOE) is an organizations authorization document. This document is automated and pushed to PBUSE from the Logistics Support Activity (LOGSA) whenever there is an update. The PBO has the ability the view and update certain authorizations. The administrative adjustment report process is used to change serial/registration/lot numbers, create assemblies, or record disassemblies and post those adjustments to the activity register. Asset adjustments process is used to increase and decrease on hand quantities of material items on the property book. The lateral transfer process is used to transfer material items from one Unit Identification Code (UIC) to another…

    • 1873 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    1.3 The company has the “front office” and “back office”. As LeBlanc says, “The trust officers blamed the operations people and the operations people blamed the trust officers. It had been running this way forever”(Case study page 3 para.3). I think this is shifting responsibility, and this kind of working environment is not good for a company.…

    • 1019 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Based on the facts presented in the case, it may be assumed that while LeBlanc wanted to convert the trust division's information system into a more an efficient one the ultimate result of this project would have been a reengineering of the division's business processes. While the old system allowed agents to be personally involved in customer accounts the proposed new system operations people would be assuming the duties of the…

    • 3282 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Audit Reports of Purchase

    • 2437 Words
    • 10 Pages

    We have come across with cases where item of same nature were routed through different account head. If department has to purchase any item having different description, it opens different head for the same item having different specification, however in the system item can be…

    • 2437 Words
    • 10 Pages
    Good Essays