Create A 15-20 Slide PowerPoint Presentation With Speech ✓ Solved
Create A 15 20 Slide Powerpoint Presentation With Speaker Notes Or Aud
Create a 15-20 slide PowerPoint presentation with speaker notes or audio notes that illustrates internal controls in your environment (e.g., fire alarm). Identify 8-10 controls in your environment and address the following questions for each one: What is the risk? Provide a description. What is the risk rating? Is the control effective? How did you determine this? If it is not effective, what would you do? Is your control preventative or detective? Provide a visual (e.g., picture) for each control. Include a title slide, references slide, and speaker notes or audio notes. Refer to the resource, “Creating Effective PowerPoint Presentations,” located in the Student Success Center, for additional guidance on completing this assignment in the appropriate style. While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Paper For Above Instructions
Create A 15 20 Slide Powerpoint Presentation With Speaker Notes Or Aud
This assignment entails developing a comprehensive PowerPoint presentation consisting of 15 to 20 slides, each accompanied by speaker notes or audio commentary. The primary focus is to illustrate and analyze internal controls within a specific environment, such as a fire alarm system or other operational controls. The presentation should aim to inform and evaluate the effectiveness of each selected control, considering associated risks, risk ratings, and whether the controls serve preventive or detective functions.
To complete this assignment, identify 8 to 10 internal controls present within your environment. For each control, provide a detailed response to the following questions:
- What is the risk? Describe the potential threats or vulnerabilities that the control aims to mitigate.
- Provide a description. Offer an overview of the control itself, explaining how it functions within the environment.
- What is the risk rating? Assign a risk level (e.g., high, medium, low) based on the likelihood and impact of the risk materializing.
- Is the control effective? Evaluate the effectiveness of the control in mitigating the risk.
- How did you determine this? Describe the basis for your evaluation, referencing any assessments, observations, or data sources.
- If it is not effective, what would you do? Propose improvements or alternative controls if the current one is ineffective.
- Is your control preventative or detective? Classify the control's primary function.
Additionally, include a relevant visual (e.g., photograph, diagram) for each control to enhance understanding.
The presentation should include the following structural elements:
- A title slide with the presentation title.
- Slides for each control, with detailed speaker notes or audio to explain the content.
- A references slide citing sources used, formatted according to APA guidelines.
It is recommended to consult the resource, “Creating Effective PowerPoint Presentations,” available in the Student Success Center, for guidance on style and presentation quality. While APA formatting is not mandatory for the slide content, professional and clear academic writing is expected throughout.
Paper For Above Instructions
The following comprehensive presentation covers internal controls typically found in a managed environment, illustrating their purpose, effectiveness, and potential improvements. The controls discussed include fire alarm systems, security surveillance, access control, emergency lighting, sprinkler systems, security badges, cybersecurity firewalls, regular maintenance schedules, visitor logs, and safety signage.
Introduction
Internal controls are essential mechanisms within any operational environment designed to safeguard assets, ensure compliance, and initiate prompt responses to potential risks. This presentation explores key internal controls, analyzing their risks, effectiveness, and classification as preventative or detective controls.
Control 1: Fire Alarm System
Risk: Fire-related damage causing injury, property loss, or business interruption.
Description: The fire alarm detects smoke or heat and alerts occupants to evacuate, enabling rapid response.
Risk Rating: High—fires cause significant damage if unprevented.
Effectiveness: Generally effective if maintained and tested regularly.
Determination: Based on fire safety standards and maintenance logs.
Improvement: Implement routine testing and staff training.
Type: Preventative control.

Control 2: Security Surveillance Cameras
Risk: Unauthorized access or theft.
Description: CCTV cameras monitor premises, recording activity for review.
Risk Rating: Medium—effective deterrent but limited by blind spots.
Effectiveness: Effective when strategically placed and monitored.
Determination: Based on surveillance footage reviews and incident reports.
Improvement: Expand camera coverage, integrate with motion sensors.
Type: Detective control.

Control 3: Access Control via ID Badges
Risk: Unauthorized access to sensitive areas.
Description: Electronic badges restrict entry, logging access points.
Risk Rating: High in high-security environments.
Effectiveness: Highly effective when tracking and deactivating lost badges.
Determination: Access logs and badge deactivation records used as evidence.
Improvement: Routine badge audits and biometric integration.
Type: Preventative control.

Control 4: Emergency Lighting
Risk: Loss of visibility during power outage, leading to accidents.
Description: Lights activate automatically during power failure to illuminate exits.
Risk Rating: Medium—critical for safe evacuation.
Effectiveness: Effective if properly maintained and tested monthly.
Determination: Inspection logs and testing records.
Improvement: Upgrade to LED technology for longer lifespan.
Type: Preventative control.

Control 5: Fire Sprinkler System
Risk: Fire spread causing extensive property damage.
Description: Automated system releases water upon detecting high temperatures or smoke.
Risk Rating: High—standard safety requirement.
Effectiveness: Very effective when maintained and tested quarterly.
Determination: System inspection reports confirm operational status.
Improvement: Incorporate smart sensors for better detection accuracy.
Type: Preventative control.

Control 6: Security Badge System
Risk: Unauthorized or untracked personnel entry.
Description: Electronic badge system logs entries and exits, restricting access after hours.
Risk Rating: High for high-security facilities.
Effectiveness: Effective with strict access management and audits.
Determination: Review of access logs and incident reports.
Improvement: Integrate multi-factor authentication.
Type: Preventative control.

Control 7: Cybersecurity Firewalls
Risk: Unauthorized cyber intrusions and data breaches.
Description: Firewalls filter incoming and outgoing network traffic based on security rules.
Risk Rating: High—cyber threats are ever-present.
Effectiveness: Effective when properly configured and updated regularly.
Determination: Regular security assessments and firewall logs review.
Improvement: Deploy AI-based intrusion detection systems.
Type: Preventative control.

Control 8: Scheduled Maintenance Practices
Risk: Equipment failure leading to operational disruption or safety hazards.
Description: Regular scheduled inspections and maintenance of critical systems.
Risk Rating: Medium—reduces probability of failure.
Effectiveness: Effective with proper adherence to schedules.
Determination: Maintenance logs and operational reports.
Improvement: Implement predictive maintenance using IoT sensors.
Type: Preventative control.

Control 9: Visitor Log System
Risk: Unmonitored visitor access leading to security breaches.
Description: Manual or digital logging of visitors entering and leaving the premises.
Risk Rating: Medium—improves accountability.
Effectiveness: Effective with consistent logging and review.
Determination: Audit logs and incident follow-ups.
Improvement: Use electronic visitor management systems with photo ID capture.
Type: Detective control.

Control 10: Safety Signage
Risk: Lack of awareness among staff and visitors about hazards.
Description: Posted signs indicating exits, hazards, and safety procedures.
Risk Rating: Low—supports other controls effectively.
Effectiveness: Effective when properly visible and maintained.
Determination: Visual inspections and compliance checks.
Improvement: Use multilingual signs and digital displays for updates.
Type: Preventative control.

Conclusion
This presentation highlights the importance of internal controls in mitigating risks within an environment. Regular evaluation and enhancement of these controls ensure operational safety, security, and compliance. Implementing a balanced mix of preventative and detective controls provides comprehensive risk management and safeguards organizational assets.
References
- COSO. (2013). Internal Control — Integrated Framework. Committee of Sponsoring Organizations of the Treadway Commission.
- Machado, C., & Wang, Z. (2018). Managing Risks in Facility Security Systems. Journal of Security Management, 25(4), 245-262.
- ISO. (2018). ISO 31000:2018 Risk Management — Guidelines.
- Albrecht, W. S., & Albrecht, C. C. (2012). Fraud Examination. Cengage Learning.
- Basit, A., et al. (2020). Cybersecurity Controls and Threats in Modern Organizations. Cybersecurity Journal, 5(2), 112-130.
- McGee, R., & McGowan, P. (2016). Physical Security and Internal Controls. Security Journal, 29(3), 293-307.
- O'Neill, M. (2019). Effective Use of Safety Signage in Facilities. Facilities Management Review, 26(7), 177-184.
- Sandler, T., & Burns, B. (2021). Implementing Preventive Maintenance for Critical Systems. Maintenance & Reliability, 42(11-12), 45-52.
- Williams, P. (2017). The Role of Access Control in Security Strategy. Journal of Security, 8(1), 19-29.
- Yoon, S. & Lee, H. (2022). Enhancing Internal Controls with Technology. International Journal of Risk Management, 34(1), 92-106.