Answer :
Final answer:
A networked environment presents risks such as shared data, internal threats, and external attacks. Controls for 'approved supplier Masterfile' additions include restricted access, logging changes, verification procedures, and data entry checks. Both manual and programmed controls must also be in place when receiving deliveries.
Explanation:
The increased risk of unauthorized access to data and programs in a networked environment like the one Emilda (Pty) Ltd uses comes from various vulnerabilities inherent in such systems. They include the fact that data is shared across multiple computers, making it harder to secure than if it's on a single machine; the potential for inside threats from malicious employees; and the risks posed by external attacks via the internet.
Ensuring appropriate controls are in place for the 'approved supplier masterfile' requires several steps. It should be accessible only by authorized personnel and changes should be logged to maintain an audit trail. Before additions, there should be meticulous verification procedures to ensure the supplier's legitimacy and determine their reliability. Proper data entry checks should be implemented to prevent incorrect information from being added.
For receiving deliveries, both manual and programmed application controls should be in place. Manually, there should be checks on the physical state of delivered goods and a comparison of the delivery note with the original order. Programmatically, delivery information should be input into the system and automatically checked against the order for discrepancies, with any unusual findings reported for further investigation.
Learn more about Network Security and Control Systems here:
https://brainly.com/question/32366487
#SPJ11