Fraud Prevention and Risk Management

Slides:



Advertisements
Similar presentations
Module 1 Evaluation Overview © Crown Copyright (2000)
Advertisements

Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Massachusetts Digital Government Summit October 19, 2009 IT Management Frameworks An Overview of ISO 27001:2005.
Chapter 10 Accounting Information Systems and Internal Controls
Auditing Computer-Based Information Systems
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Auditing Computer Systems
Auditing Computer-Based Information Systems
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
6-1 McGraw-Hill/Irwin ©2002 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 6 Internal Control Evaluation: Assessing Control Risk.
Environmental Management Systems Refresher
18- 1 © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 18 Integrated Audits of Internal Control (For Public Companies Under Sarbanes-Oxley.
Computer Security: Principles and Practice
First Practice - Information Security Management System Implementation and ISO Certification.
Information Systems Controls for System Reliability -Information Security-
Gurpreet Dhillon Virginia Commonwealth University
Information Security Framework & Standards
SEC835 Database and Web application security Information Security Architecture.
Evolving IT Framework Standards (Compliance and IT)
Continual Service Improvement Process
Introduction to ISO 9001:2000.
Chapter Three IT Risks and Controls.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 1 – Overview.
Computer Security: Principles and Practice
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Internal Control in a Financial Statement Audit
1 Chapter Three IT Risks and Controls. 2 The Risk Management Process Identify IT Risks Assess IT Risks Identify IT Controls Document IT Controls Monitor.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Presented by : Miss Vrindah Chaundee
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Quality Concepts within CMM and PMI G.C.Reddy
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Fundamentals I: Accounting Information Systems McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
Adaptive Processes Consulting Pvt. Ltd. An ISO 9001:2000 Certified Company This document is the property of and proprietary to.
Security Engineering Assurance & Control Objectives Priyanka Vanjani ASU Id #
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
[Hayes, Dassen, Schilder and Wallage, Principles of Auditing An Introduction to ISAs, edition 2.1] © Pearson Education Limited 2007 Slide 7.1 Internal.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
ISMS Implementation Workshop Adaptive Processes Consulting Pvt. Ltd.
IS 630 : Accounting Information Systems Auditing Computer-based Information Systems Lecture 10.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
SE513 Software Quality Assurance Lecture12: Software Reliability and Quality Management Standards.
Chapter 21: Evaluating Systems Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 3-Auditing Computer-based Information Systems.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
Primary Steps for Achieving ISO Certification.
Dr. Yeffry Handoko Putra, M.T
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
The Demand for Audit and Other Assurance Services
Chapter 10 Software Quality Assurance& Test Plan Software Testing
Project proposal for ISO 27001:2013 implementation
ISO/IEC 27001:2005 A brief introduction Kaushik Majumder
Awareness and Auditor training kit
Presentation transcript:

Fraud Prevention and Risk Management 05 Fraud Prevention and Risk Management McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.

Fraud Prevention and Risk Management Overview Fraud prevention requires information security and good internal control. Information security can’t be obtained simply by studying and applying lists of security measures. Rather security must be studied and applied as a management system in the context of enterprise risk management. This chapter focuses primarily on one the information security management system (ISMS), which is an organizational internal control process that ensures the following 3 objectives in relation to data and information within the organization: integrity, confidentiality, and availability. Information systems security is merely the application of standard internal control principles to information resources.

ISMS Security Objectives: Integrity involves accuracy and completeness. Accuracy means inputting the correct data into the system and then processing it as intended, without errors. Completeness ensures that no unauthorized additions, removals, or modifications are made to data that has been inputted into the system. Confidentiality This concept involves ensuring that data and information are made available only to authorized persons. Availability This concept involves ensuring that data and information are available when and where they are needed.

Key Concepts in ISMS Organizational Embedding, Risk Management, and Internal Control Prevention, Detection, and Response The ISMS Life Cycle and PDCA Risk Management and Threat and Vulnerability Analysis

ISO 27001: Implementing ISMSs Plan Phase Initiating the project Defining the scope of the ISMS Establishing an ISMS policy, Performing a risk assessment, Selecting risk treatments, Selecting control objectives, and Producing a statement of applicability

Assets and Risk Assessment General categories of assets at risk: Human resources Information Documents Software Physical equipment Services Company image and reputation Each asset should also be classified according to its desired access security level: Unclassified, Shared, Company only, Confidential

Active Threats Input manipulation (most common source of fraud) Direct file alteration (bypass normal software) Program alteration (requires sophistication) Data theft (hard to detect and prove) Sabotage (disgruntled employees) Misappropriation of information system resources

ISO 27001: Implementing ISMSs Do Phase Applying the controls defined in the SOA Operating the ISMS Ensuring that all employees are properly trained and competent to perform their security duties Mechanisms for compliance monitoring Mechanisms for incident detection and response

ISO 27001: Implementing ISMSs Check and Act Phases The check phase ensures that all the controls objectives are being met and that all controls are in place and working. Various check activities identified in ISO 27001 include intrusion detection, incident handling, learning from outside sources, internal and external audits, self-policing procedures, and management reviews. The act phase involves continually improving the entire ISMS based on analysis of incident reports and the overall efficiency and effectiveness of the ISMS processes.

IT Security Assurance Defined Information security assurance (ISA) refers to some type of evidence-based assertion that increases the certainty that a security-related deliverable can withstand specified security threats. Information security assurance is achieved for a target of evaluation (TOE) by performing assurance activities that satisfy a predefined security target or security protection profile.

Key Definitions Relating to Assurance Target of evaluation (TOE) This is the information security deliverable, the object for which assurances are made. Assurance activities These activities depend on the method of assessment. Various methods of assessment are discussed later. Security target (ST) This is the set of security specifications and requirements used to evaluate the target of evaluation. Security protection profile (SPP) Similar to a security target, this profile is much broader in scope. Unlike an ST, a SPP does not apply to any one particular deliverable but represents the security needs of a given individual or group of individuals.

Forms of Assurance Informal or semiformal An internal project development leader could simply write a letter to management indicating that the product meets company security standards. Formal certification by an accredited certification body Some ISO standards, such as ISO 27002, are designed so that organizations can be certified against them. Self-certification Some organizations perform their own internal certification process as part of their internal quality assurance process. Self-certification can be against internally developed standards or widely recognized standards.

Assurance Methods and Approaches An assurance method is a recognized specification for assurance activities that yields reproducible assurance results. Assurance results are reproducible when different evaluators working independently of each other are likely to obtain similar assurance results. Assurance Approaches are categories of assurance methods. ISO 15443 classifies assurance approaches according to the methods used to develop the deliverable, and the environment in which the deliverable is deployed. Methods that assess the deliverable itself, that assess the deliverable’s development process, that assess the deliverable’s development environment Life cycle phases: design, integration, transition, operation

Some Well-know Assurance Methods/Approaches ISO 21827: Systems Security Engineering Capability Maturity Model (SSE-CMM®) and Security Engineering Baseline Protection Manual Trusted Product Evaluation Program (TPEP) and the Trust Technology Assessment Program (TTAP) IEC 15408—Evaluation Criteria for IT Security (the Common Criteria) Information Technology Security Evaluation Criteria ISO/IEC 27000 Series The Trusted Capability Maturity Model (TCMM) ISO/IEC 13335—Management of Information and Communications Technology Security (MICTS) Certified Information Systems Security Professionals (CISSP) Federal Information Processing Standard 140 (FIPS 140) Control Objectives for Information and Related Technology (COBIT)

ISO/IEC 27002 Areas Applied to ISMSs Security Policy Organization of Information Security Asset Management Human Resources Security Physical and Environmental Security Communications and Operations Management Access Controls Information Systems Acquisition, Development and Maintenance Information Security Incident Management Business Continuity Management Compliance