Wednesday, May 6, 2020

Systems Documentation and Internal Controls for More Pty Ltd

Question: Discuss about theSystems Documentation and Internal Controls for More Pty Ltd. Answer: Introduction The development of the organizations had been largely dependent on the implication of the effective and improved development schemes (Singh, Mindel Mathiassen, 2016). The integration of the processes would be formed for forming the development of the operations. The evaluation of the project would integrate the deployment of the effective and improved analysis of the processing and development. The following analysis in the report had formed the evaluation of the Ransomware Cyber Attack in May 2017 and it would evaluate the development of the some control strategies for implying the safety and security of the operations and development of the system integration and development. Overview of Revenue Cycle The revenue cycle had been deployed for ensuring a cyclic process for integrating the development of improved operations (Colwell, 2015). The revenue cycle of Motherboards and More Pty Ltd is developed for forming the improved integration of the ERP system with the functions of the organization. The sales in the organization are carried on credit and the customer places their order through the website, email, or by telephone. The orders are collected from the warehouse and it would result in forming the development of the issues and integration of the operations for forming the accurate processing of customers information. The order is loaded in the dock by following the customers name alphabetically (Ameri, Sadeh Didehkhani, 2015). The perpetual inventory is formed for managing the customers data and developing the smart management of the data. The system generates the sales invoice for payment process. The system is implied for developing the integration of the operations and form ing the accurate payment system (Kilic, Zaim Delen, 2015). The customers are asked for payment only after the employees enter correct quantity of materials supplied to the customers. It helps in ensuring that customers would be billed for the actual items sent to them. The request is stacked in the dock by following the client's name sequentially. The unending stock is shaped for dealing with the client's information and building up the brilliant administration of the information. The framework produces the business receipt for installment process. The framework is suggested for building up the mix of the operations and shaping the precise installment framework (Carmen Marius, 2016). The clients are requested installment simply after the workers enter adjust amount of materials provided to the clients. Identification of the Issues and Development of Control Strategies Internal Control Weaknesses of Revenue Cycle of Motherboards and More The internal control weakness of the Revenue Cycle Motherboards and More Pty Ltd are unable for managing the huge number of customers, wrong delivery of the items to the customers, delay in deliveries, and lack of physical count of stock. According to Long et al. (2013), the management of the warehouse had been largely disrupted and it had resulted in forming the issues of the operations for Motherboards and More Pty Ltd. The issues have been raised due to the unsymmetrical and slackness of operations in the organization. Impact of Weaknesses of Revenue Cycle of Motherboards and More The impact of the weaknesses of unable for managing the huge number of customers, wrong delivery of the items to the customers, delay in deliveries, and lack of physical count of stock are, Delay in Providing Services to the Customers of Motherboards and More Pty Ltd Decrease in number of customers due to fall of customer satisfaction No insight on the stock maintenance Control Strategy for Motherboards and More Revenue Cycle The control strategy for the organization is developed for forming the appropriate solutions in implying the effective processes. The optimized control strategies for Motherboards and More Revenue Cycle includes, Integrated CRM and ERP System for management of information Stock Management System for the analysis of the companys stock Overview of Ransomware Attack The Ransomware Attack was initiated in April, 2017 and it had affected a huge number of people and organizations (Titcomb McGoogan, 2017). The attack was initiated by Shadow Breakers (a group of hackers and cyber criminals) and it had affected almost whole of the globe. The attackers have targeted the organizations using Legacy system for impacting their operations and functions. The attackers had launched a malware named WannaCry for encrypting the data and information of the computer system. The data and information would become useless for the users and it would make those unavailable for the users. The hackers have demanded the initial ransom of the $300 for decrypting the files that had been encrypted (Kettley, 2017). The organization would have to pay the sum of money for being able to access the information. The attack was initiated from Europe and later on spread to Russia, China, India, Egypt and many other countries. Review of Appropriate Controls The appropriate controls required for protecting the data and information of Motherboards and More Pty Ltd from Ransomware Cyber Attack are given below, Update of Security functions: The update of the security functions like firewall, authorization, and authentication function in the organization for the operations. The security functions would be implied for forming the development of the privacy of operations and it would form the protection of the data from external infiltration. Implementation of IDS/IPS: The implementation of the IDS/IPS would be developed for forming the accurate protection of the network from the infiltration and virus attack. The IDS/IPS would be implemented for the forming the security of the network. Conclusion It can be concluded from the assignment that the integration of the processes would be formed for forming the development of the operations and processes of the organization. The revenue cycle of Motherboards and More Pty Ltd was developed for forming the improved integration of the ERP system with the functions of the organization. The internal control weakness of the Revenue Cycle Motherboards and More Pty Ltd were unable for managing the huge number of customers, wrong delivery of the items to the customers, delay in deliveries, and lack of physical count of stock. The attack of Ransomware could be mitigated by using update of security functions and implementation of IDS/IPS. References Ameri, M., Sadeh, E., Didehkhani, H. (2015). Presenting Management Model of Relationship with Electronic Customer (e-CRM), Customer Satisfaction and Loyalty.Turkish Journal of Scientific Research. Vol,2(2), 44-52. Carmen, R., Marius, S. (2016). Customer Loyalty Using Customer Relationship Management.Management Strategies Journal,31(1), 285-288. Colwell, J. (2015). Tech tools to aid with revenue cycle management.Medical economics,92(23), 54-54. Kettley, S. (2017).What is ransomware? How the global cyber attack is holding companies ransom.Express.co.uk. Retrieved 20 September 2017, from https://www.express.co.uk/life-style/science-technology/822003/ransomware-what-is-cyber-attack-Petya-virus-Wannacry-UK-Ukraine-WPP Kilic, H. S., Zaim, S., Delen, D. (2015). Selecting The Best ERP system for SMEs using a combination of ANP and PROMETHEE methods.Expert Systems with Applications,42(5), 2343-2352. Long, C. S., Khalafinezhad, R., Ismail, W. K. W., Rasid, S. Z. A. (2013). Impact of CRM factors on customer satisfaction and loyalty.Asian Social Science,9(10), 247. Singh, R., Mindel, V., Mathiassen, L. (2016, January). IT-Based Revenue Cycle Management: An Action Research into Relational Coordination. InSystem Sciences (HICSS), 2016 49th Hawaii International Conference on(pp. 3152-3161). IEEE. Titcomb, J., McGoogan, C. (2017).Cyber attack: Latest evidence indicates 'phishing' emails not to blame for global hack.The Telegraph. Retrieved 20 September 2017, from https://www.telegraph.co.uk/technology/2017/05/15/nhs-cyber-attack-latest-authorities-warn-day-chaos-ransomware/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.