Preview

Sofitech Computers Module 1 4

Powerful Essays
Open Document
Open Document
5390 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sofitech Computers Module 1 4
Sofitech computers
CASE LOgistics
Activity Type: Individual Case
Material/Resources You May Use: Open Book (Anything)
Deliverable(s): One document not to exceed 4 pages (single-spaced). Appendices, tables and figures do not count towards page size limit.
Background
The following provides high-level information about auditing a fictional entity, called Sofitec Computers, created for this case study. This case does not include a complete description of the entity or the industry, nor does it provide comprehensive information on auditing; it is only intended to provide the information that will be necessary and helpful in completing this case study and answering discussion questions.
The IT Controls Overview and IT General Controls Overview sections in the Appendix 1 provide relevant terms and definitions that will be used throughout the case.
Portfolio Structure and Business
Sofitec is one of several entities in a portfolio (companies, partnerships, joint ventures) that are owned by a single parent company. The shares of the parent company are 100% owned by one individual of high net worth. The Company assembles laptop computers from purchased components and sells those laptop computers. Sofitec has been established in this business for a number of years.
Product Strategy and Customers
Sofitec’s product strategy is based on obtaining low-cost components through the negotiated supply agreements in order to offer laptops at competitive prices to its customers. The final customer is described as a person who needs only the basic computer functionalities (Internet, word processing, etc.) at the lowest possible cost. The Company’s customers are mainly retailers or significant individual purchasers (e.g., volume purchases by educational facilities). The competition for laptop computer sales is intense and cost containment is a critical element of profitability.
Product Description
Sofitec has standard product configuration lists with a limited range of custom

You May Also Find These Documents Helpful

  • Good Essays

    Kudler Fine Food has expanded business and updated their computer systems to meet demands. As IT information is adopted within the organization, automation control processes has become more virtualized. To ensure that Kudler’s computerize systems function properly an audit must be performed on an annual basis. Management at Kudler Fine Foods wants to see the proposed audit schedules for all systems. Management wants to know the types of audit and how they will be conducted. In addition, management would like to know about events that might prevent reliance on auditing through the computer.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Hunton, J. A., Bryant, S. M., & Bagranoff, N. A. (2004). Core Concepts of Information Technology Auditing. New York: Wiley & Sons.…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Before any strategy takes place, an auditor must determine the end result desired from the Information Technology being used as well as the type of technology being dealt with. The most important thing is security thus it is vital to know this technology in and out to be able to determine its strengths and weaknesses. This allows for proper compensation to combat such attacks whether they are fraudulent or accidental in nature. It is necessary to be familiar with different types of proven viable internal control setups to properly test and gage an IT’s internal control system. There are three different strategies use when testing internal controls. First includes assessing the controls using user control information. In this strategy, an auditor would gather computer-generated reports and compare those to all documentation on specific transactions. This process is also known as auditing around the computer because it deals with more hard copy documents. The next strategy entails using application controls to determine the level of risk…

    • 627 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    : ACC 571 - Strayer. Tags: acc 571, acc 571 strayer, acc 571 strayer tutorials, acc571, assignment 1, Assignment 1: Corporate Fraud Schemes, assignment 2, Assignment 2: Cybercrimes and Computer Security Systems, Assignment 3, Assignment 3: Fraud Schemes and Fraud Investigations, Assignment 4, Assignment 4: Asset Misappropriation and Corporate Governance, Forensic Accounting.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Electronics over the past fifteen years have become an everyday essential in today’s market. The use of personal computers skyrocketed from being in higher income households to common place in almost every home. Equalus Inc. is excited to jump into the world of desktop computers and notebooks by providing service to the masses of a “build-your-own” personal system with tech help and customer service all originating within the United States. Based on a series of questions Equalus will be able to build a desktop or notebook to the user’s needs. Consumers will no longer wonder if their purchase will be able to handle what they need it to do and last for as long as they need it to. With the type of business Equalus will be bringing to the consumer the closest competition would the Hewlett-Packard (HP). This analysis of HP is in attempts to foresee any possible issues that may occur for Equalus and provide an accurate description of the market competition.…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Acc/490 Week 4

    • 2141 Words
    • 9 Pages

    The generalized auditing software is designed to be used, and is adaptable to virtually any organization that requires auditing services. Audit software can be further selected as appropriate depending on the type of audit that needs to be performed. For example, an organization with a control environment that is high risk or ineffective can be tailored to by using auditing software that incorporates high fraud risk environments. Organizations that have a greater than average susceptibility to risk in the network environment should use auditing software specifically designed to address these…

    • 2141 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    A popular saying is, “inspect what you expect,” and this is definitely true in the area of IT information security auditing. The goal should not be to catch rule breakers, but rather to work with IT and the business to ensure nothing slips through the cracks and that solid practices are always followed. Doing this will go a long way to ensuring and maintaining the expected information security policy of the…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Rsm322

    • 655 Words
    • 3 Pages

    * All pages should be numbered and your report should include a cover page which is not included in the page limit count ( nor are the appendices). The page limit for each assignment is 5 pages as is stated in the course outline.…

    • 655 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Module9 10

    • 367 Words
    • 2 Pages

    Stops: Using the information learned in this course, explain three things you will not do when driving.…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. Images, like the ones you make with your digital camera, cannot be stored as…

    • 435 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC571 tips

    • 460 Words
    • 2 Pages

    * Minimum length 3 pages, maximum length 5 pages (not counting cover sheet, diagram(s), references). Do not exceed the maximum length.…

    • 460 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Our team initially reviewed key provisions included in SAS 109, SOX Section 404, PCAOB Auditing Standard No.5, and FFC policies. To provide the financial auditors with a complete and accurate review of the critical ITGC areas, we reviewed FFC’s IT and security procedures, interviewed relevant FFC client personnel, and observed FFC operations and procedures related to its ITGCs. Upon review of all relevant evidence and data collected through our walkthrough of FFC, we developed our risk assessment of each ITGC area and an associated assessment of the strengths and weaknesses of each ITGC area documented in Exhibit 3, parts A &B.…

    • 1520 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    UNFO traditionally has been a brick-and-mortar retailer, and the management has experiences of associated business risks such as employee theft and shoplifting. However, as the organization moves into the e-commerce model, new risks will be introduced to the organization. As the information security analyst, it will be your role to summarize the business impact of these new risks, the motivating factors that one may have to exploit vulnerabilities, and how the risks can be mitigated.…

    • 258 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Liberal Arts

    • 3433 Words
    • 14 Pages

    • Hall, James A., (2011), Information Technology Auditing, 3e, Mason: South-Western Cengage Learning (Referred to as “IT Audit Text” in the Readings List for each class)…

    • 3433 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Nothiong

    • 1330 Words
    • 6 Pages

    * include at least four pages of text-based content (this does not include any images, tables, or other visual (non-text) elements. This content should:…

    • 1330 Words
    • 6 Pages
    Good Essays