It’s that time of year when college and professional football are beginning their seasons. Looking at how teams set up their defensive players, one sees an exercise in internal controls. By examining the functions of different defensive players, one can see how they act to neutralize offensive threats and learn from their best practices and incorporate them into the defensive game plan (internal controls).
Teams set up three layers of protection against the threat of the offensive team moving the ball down the field. The first layer of defensive internal control is the defensive line. If the offensive side tries to run the ball, the defensive linemen will act to tackle the player who carries the ball to stop his progress as soon as possible. If the offensive team calls a pass play, the defensive linemen act to sack the quarterback or knock down the ball. If either action is successful, the defense will have neutralized the threat of the quarterback passing the ball down the field.
The second layer of protection is the linebackers. In the event of running play, they assist the linemen in tackling the ball carrier. In the event of a passing play, they will either assist the linemen in trying to sack the quarterback, or disrupt passes that the quarterback throws. The players who make up the last line of defense (set of controls) are the cornerbacks and safeties. These players primarily guard against passes that the quarterback throws. In the event of a running play where the ball carrier gets through the linemen and the linebackers, the responsibility falls to the cornerbacks and safeties to neutralize the threat.
If we replace the setting of a football field with, say, a computer and the threat of the opposition advancing the ball into our territory with someone trying to access the computer, we can learn from those football analogies (internal controls). The computer is housed in a building. Our defensive line are the security guards who block access to the building, except for those individuals who have legitimate reason and are authorized to be in the building. Next, the computer should be set up in a locked room. Instead of linebackers, we have a locked door to the room that will block unauthorized access to that room. If a person is then able to get past the guards and get into the building, we have a password to the computer instead of cornerbacks and safeties.” Hopefully, the result of both set of controls will be the same. The offensive attack will be stopped before any significant damage is done.