Audcis Chapter I III
Audcis Chapter I III
IT GOVERNANCE
The process by which an enterprise’s IT is directed
and controlled.
BENEFITS:
o It helps ensure that IT supports business goals
o Maximizes business investment in IT, and
whatever facilities used to store, process, &
transmit data in whatever form
o Helps ensure the achievement of critical
success factors
o Develop secure & reliable information and
applied technology
IT AUDITS/AUDITING
REASONS FOR ITS IMPLEMENTATION:
- Became an integral part of the audit function
o Increasing dependence on information and
because it supports the auditor’s judgment on the
the system
quality of the information processed by computer
o Increasing vulnerabilities and a wide spectrum
systems.
- Broad groupings: of threats
o Scale and cost of current and future
General Computer Controls Audit
- Examines IT general controls, including investments in information and IS
policies and procedures, that relate to o Potential for technologies to dramatically
many applications and sup- ports the change organizations and business practices
effective functioning of application to create new opportunities and reduce costs
controls.
- Includes controls over: GOOD INFORMATION SECURITY POLICY
o IS operations Encompasses the ff:
o Information Security o Specifying required security features
o Defining “reasonable expectations” of privacy o Cyber Campaigns
regarding such issues as monitoring people’s o Cyberwarfare
activities o Cyberterrorism
o Defining access rights and privileges and protecting INTERNET CRIME DESCRIPTION
assets from losses, disclosures, or damages by Sophisticated scam targeting businesses
specifying acceptable use guidelines for users Business Email working with foreign suppliers and/or
o Providing guidelines for external communications Compromise (BEC) businesses who regularly perform wire
(networks) transfer payments.
o Defining responsibilities of all users Ransomware is a form of malware
targeting both human and technical
o Establishing trust through an effective Ransomware weaknesses in an effort to deny the
password policy availability of critical data and/or
o Specifying recovery procedures systems.
o Requiring violations to be recorded Tech support fraud occurs when the
subject claims to be associated with a
o Acknowledging that owners, custodians, and Tech Support Fraud computer software or security company,
clients of information need to report or even a cable or Internet company,
irregularities and protect its use and offering technical support to the victim.
dissemination Typical automobile fraud scam involves
o Providing users with support information selling a consumer an automobile (listed
on a legitimate Website) with a price
significantly below its fair market value.
CHAPTER II. LEGISLATION RELATED TO The seller (fraudster) tries to rush the sale
INFORMATION TECHNOLOGY by stating that he/she must sell
immediately due to relocation, family
issues, need of cash, or other personal
IT CRIMES AND CYBERATTACKS
reasons. The seller does not allow for
Three main categories of crimes involving Auto Fraud inspecting the automobile nor meet with
computers: the consumer
1) The computer is the target of the crime
a. Theft of information face to face. The seller then asks the
b. Unauthorized access or modification consumer to wire payment to a third-
party agent, and to fax the payment
of records receipt back to him or her as proof of
i. Become a super-user thru payment. The seller keeps the money and
backdoor in a system never gets to deliver the automobile.
Super-user is equivalent to This type of Internet crime involves
being the system’s manager & posing as government, law enforcement
Government
officials, or simply someone pretending to
allows access to almost all Impersonation E-mail
have certain level of authority in order to
areas and functions within the Scam
persuade unaware victims to provide
system their personal information.
2) The computer is used as an instrument of This type of crime utilizes demands for
the crime money, property, assets, etc. through
Intimidation/Extortion undue exercise of authority (i.e., threats
a. Fraudulent used of ATM cards,
Scam of physical harm, criminal prosecution, or
credit cards, public exposure) in order to extort and
telecommunications, & financial intimidate.
fraud from computer Similar to Auto Fraud. The seller
transactions (fraudster) tries to rush the sale of a
3) Computer is not necessary to the crime house (with a price significantly below its
market rental rates) by stating that
but is incidental & is used to commit the he/she must sell immediately due to
crime faster relocation, new employment, family
a. Child pornography Real Estate Fraud
issues, need of cash, or other personal
Cyberattacks reasons. Such significant price reduction
is used to attract potential victims. The
- an attempt by hackers to damage or destroy a seller will then ask the consumer to
computer network or system. provide personal identifying information
- the deliberate and malicious exploitation of and to wire payment to a third-party.
computer networks, systems, and data by Upon receiving payment, the seller is
individuals or organizations to obtain valuable never found.
This type of crime refers to schemes
information from the users through fraudulent
Confidence Fraud/ designed to look for companionship,
means Romance Scam friendship, or romance via online
- can be labeled as: resources.
and issuance of audit reports and the
obligations and liabilities of accountants
RECENT CYBERATTACKS ON US COMPANIES with respect thereto
Verizon - suffered a data security breach with 7) Set the budget and manage the operations
over 6 million U.S. customers’ personal details of the board and the staff of the board.
exposed on the Internet
Yahoo! - hackers stole information associated COMPUTER FRAUD ANND ABUSE ACT OF 1984
with at least 500 million Yahoo! user accounts, - The Act requires that certain conditions needed
including names, e-mail addresses, telephone to be present for the crime to be a violation of
numbers, encrypted or unencrypted security the CFAA. Only if these conditions are present
questions and answers, dates of births, and will the crime fall under violation of the CFAA.
encrypted password. - The three types of attacks that are covered under
Target - Cyberattack during the 2013 Christmas the Act and the conditions that have to be met
holiday season compromised Target’s computer include:
systems and stole data from up to 40 million o Fraudulent trespass - This is when a trespass
customers’ credit and debit cards. is made with the intent to defraud that
Sony Pictures – the cyberattack stole significant results in both furthering the fraud and the
amounts of private and of confidential data and attacker obtaining something of value.
released them to the public. o Intentional destructive trespass - This is a
o Hackers were believed to be linked to the trespass along with actions that intentionally
North Korean government, which was cause damage to a computer, computer
extremely angry at the major Hollywood system, network, information, data, or
movie studio for producing a movie that program, or results in denial of service and
portrayed North Korea in a negative way causes at least $1,000 in total loss in the
course of a year.
FEDERAL FINANCIAL INTEGRITY LEGISLATION o Reckless destructive trespass - This is when
(SARBANES-OXLEY ACT OF 2002) there is the presence of trespass along with
- prohibits all registered public accounting firms reckless actions (although not deliberately
from providing audit clients, contemporaneously harmful) that cause damage to a computer,
with the audit, certain non-audit services computer system, network, information,
including internal audit outsourcing, financial- data, or program, or results in denial of
information-system design and implementation service and causes at least $1,000 in total
services, and expert services, among others. loss in the course of a year.
- Independence compliance Issues:
o Requires auditor rotation for independence COMPUTER SECURITY ACT OF 1987
acceptance - General purpose: a declaration from the
o CEO, CFO, Chief Accounting Officer, or any government that improving the security of
equivalent position cannot be employed by sensitive information in federal computer systems
the company’s audit firm during the 1-year is in the public interest
period preceding the audit - It assigned responsibility for developing
- Requirements for Board of Directors: government- wide computer system security
1) Register public accounting firms standards, guidelines, and security training
2) Establish or adopt auditing quality control, programs to the National Bureau of Standards
ethics, independence, and other standards - SIGNIFICANCE: it is fundamental to the
relating to the preparation of audit reports development of federal standards of safeguarding
for issuers unclassified information and establishing a balance
i. Issuers – a legal entity that registers and between national security and other non-classified
sells securities to finance its operations issues in implementing security policies within the
3) Conduct inspections of accounting firms; federal government.
4) Conduct investigations and disciplinary
proceedings, and impose appropriate HOMELAND SECURITY ACT OF 2002
sanctions - Purpose: to prevent terrorist attacks within the
5) Perform such other duties or functions as United States and to reduce the vulnerability of the
necessary or appropriate United States to terrorism and any form of attack
6) Enforce compliance with the act, the rules of
the board, professional standards, and the PAYMENT CARD INDUSTRY DATA SECURITY
securities laws relating to the preparation STANDARDS OF 2004
- technical and operational requirements applicable examination of authenticity that applies
to entities that store, process, or transmit to traditional paper documents and wet
cardholder data, with the intention of protecting ink signatures.
such data in order to reduce credit card fraud. - To be valid under US law, the e-signature must
- Was founded in 2006 by major credit card have the ff:
companies, such as American Express, Discover, o There must be a clear intent to sign by all
JCB International, MasterCard, and Visa, Inc. who involved parties.
share equally in governance, execution, and o Parties to the transaction must consent to
compliance of the Council’s work. do business electronically.
o The application system used to capture the
FEDERAL INFORMATION SECURITY MANAGEMENT electronic signature must be configured
ACT OF 2002 and ready to retain (for validation
- was enacted as part of the E-Government Act of purposes) all processing steps performed
2002 to "provide a comprehensive framework for in generating the electronic signature
ensuring the effectiveness of information security as well as the necessary electronic
controls over information resources that support signature records for accurate and
Federal operations and assets and to provide for timely reproduction or restoration, if
development and maintenance of minimum needed.
controls required to protect Federal information
and information systems PRIVACY LEGISLATION
- It requires federal agencies to develop Privacy
information security programs with the purpose - involves the “freedom from unauthorized
of protecting both, the information and the intrusion or disclosure of information about
systems implemented to support the operations an individual.”
and assets of the agencies, including those - focuses on protecting personal information
provided or managed by another agency, about customers, employees, suppliers, or
contractor, or other source business partners.
COMMUNICATION
- The value of an audit depends, in large part, on
how efficiently and effectively its results are
communicated.
- It is best to discuss the identified findings with IT
management to gain their agreement and begin
any necessary corrective action.