Case Study: Classroom Participation

Great Essays
AIT 612
Class 3 - Classroom Participation Case Study: Banking Scenario
Prof: Arthur R. Friedman
Date: 09/17/2017
Submitted by: Ujwal Rai, Shalikram Bhandari & Rajendra Shrestha

1. Background information and threat:
In past few days, our IT security team had been investigating on a fraudulent act on one of our customers’ bank account. The customer noticed the unusual activity on his bank account as the ATM statement he received at bank did not match with the monthly statement he received at his home. Therefore, he questioned regarding fraudulent transactions occurred on his bank account.
Based on our investigation, it is found that one of our clerks was involved on this act. The clerk changed the customer’s address to
…show more content…
Especially, for bank who deals with thousands of monetary transactions and personal information must develop and establish a formal documented access control policy and procedure that addresses the purpose, roles, responsibilities and compliance that implies to protect the secured information. The existing access control policy needs to be reviewed, update if required and implemented as soon as possible.
A better access enforcement has to be established in order to enforce assigned authorizations for controlling access to the confidential information with applicable policy. Access control must be applied in the applicable job and duties of the employees. The employees should not be granted more access than they are required to do their job. Only certain people should be granted the access to confidential data. This helps to prevent the misuse of data for personal benefit. In our scenario, if the clerk was not given access to update the customer’s information and get the pin number of the customer, probably the fraudulent act would not have
…show more content…
The second step is Content of Audit Records. An audit record content must include (i) date and time of the event, (ii) the component of the information system where the even occurred, (iii) type of event, (iv) subject identity and (v) the outcome of the event. The third step is audit monitoring, analysis and reporting. Our team recommends regularly reviews/analyzes audit records in order to identify as well as investigate inappropriate, suspicious or unusual activities and report findings to appropriate officials. Detail information from past audit records needs to be verified if the recent fraudulent incident by the clerk had occurred before but was noticed. In addition, detail investigation regarding how frequently an audit and accountability are being conducted in past and what contents are being recorded has to be checked as soon as possible. It will help to track if there are more incidents like this are happening in the bank that our audit and accountability team are not being able to catch. The fourth step is Protection of Audit Information. All the information collected from audit and audit tools shall be protected by the information management team from unauthorized access, modification, and deletion. Finally, the fifth step is audit retention. Audit information and logs shall be protected and retained by the bank to meet

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Next step to this was to draft a proposal for square trade and ask for additional data fields that are necessary for the audit. Different steps were identified in this meeting and the particular artifacts that we would require to inspect were laid out. 5. 23 checks that have been returned to us were posing a problem for our accounts payable as checks lying in their department more than 4 months are subject to inspection. The issue was alleviated by a handover procedure suggested by me to void all those checks and let BWG take over and issue these checks from their end.…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Ap Case Study 1.3 Essay

    • 654 Words
    • 3 Pages

    Case study 1 1 2 • Organise ongoing customer service staff trainings. • Monitor some customer service calls. Listen in unobtrusively on some customer service calls and pay attention to the tone and manner your representative use to discuss the situation with the customer. • Improve staff’s verbal communication and listening skills. • Give an excellent knowledge about products to all employees.…

    • 654 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Fraud Symptoms Even though Walker successfully concealed her theft for a long time, some red symptoms of fraud still could be noticed if we pay closer attentions as follow: Higher amount of sales returns every time the embezzler works In a retail store, the amount of sales return generally is relatedly stable since the store has sales operation control. Assumed the fact that during the period which Walker committed fraud, every time when Walker worked, the number or amount of sale returns significantly increased and the sales return percentage ratio much higher than its average level. This unexpected change may be considered a red flag. Lake of Proper Authorization While faking returns, Walker was the only person who processed these transactions.…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why do you need to hire a lawyer to support a real estate transaction? Everyone who has ever encountered a transaction with real estate, whether it is buying or selling, exchange, gift or another procedure, understands how difficult and responsible this process is. The deal with real estate is always connected with a large cash turnover and therefore carries a lot of risks.…

    • 441 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Summary: Data Integrity

    • 736 Words
    • 3 Pages

    Data Integrity Data Integrity in an organisation such as Kirby College must ensure Data integrity is an assurance that stores confidential data over the network and those only authorised are granted access. This should only be controlled through environmental physical of the network. The people in Kirby College must install security systems located around the important parts of the building, as this will prevent any security servers and network breach which will stop unauthorised users. The security level must be configured on users account so that staff and students in Kirby College can only access certain information that match the security level which are only necessary. Files that are confidential must be protected with strong password and configure the security level on the file to prevent information being accessed by users who are unauthorised.…

    • 736 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    5- Cash register and checks register: The owner of the company or a supervisor will review the checks, the check register, the cash register and the bank statements. This will prevent any fraud or error. The internal control will be determined by making a regular but not a predictable report of this…

    • 714 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Audit Planning Standards

    • 1118 Words
    • 5 Pages

    For example, AS 2010 has additional consideration regarding the audit activities. First, the nature and extent of planning activities that are necessary depend on the size and complexity of the company, the auditor 's previous experience with the company, and changes in circumstances that occur during the audit. Second, when developing the audit strategy and audit plan, the auditor should evaluate some matters and determine whether they are important to the company 's financial statements and internal control over financial reporting and, if so, how they will affect the auditor 's procedures. These matters include the knowledge about the internal control over the financial reporting, matters affecting the industry, matters relating to the company 's business, the extent…

    • 1118 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Pass/Failure Audit Case

    • 1504 Words
    • 7 Pages

    These proposed changes are based upon the same premise of avoiding the “illusion of accounting exactitude”. The auditing process requires a great deal of professional judgment and financial statement users must be cautioned against placing more than reasonable assurance on the report. In line with providing greater explanation of the financial statements, greater explanation of the audit process would be required for more uncertain parts of the auditing process, where additional judgment is needed. It is further proposed…

    • 1504 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Activation Process Summary

    • 1180 Words
    • 5 Pages

    Activation procedures first begin with the designation of personnel to authorize declaration of disaster and signaling of resumption of normal processing, which TAMUITDRP effectively states that the President, Vice President, and Chief Information Officer hold these responsibilities. A team is also pre-organized with specific responsibilities if a confirmation of threat is declared. Within a large organization, each team has a leader (and alternates) that are key university personnel that are IT specialists. Within smaller organizations, such as TAMU, IT staff must be assigned to multiple teams with specific assignments based on the knowledge, experience, and availability (Texas A&M University, 2012). Another key player of DRP team is the DRP…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Credit Card Fraud Case Study

    • 2744 Words
    • 11 Pages

    In South Africa, credit card fraud has been depicted as one of the worst breaches of customer card data to date (Mahomed, 2013). However, to combat credit card fraud in retails effectively, it is important to first understand the mechanisms of performing a credit card fraud in a retail outlet (Bhatla, Prabhu, & Dua, 2003). This chapter will explore the different types of credit card fraud activities performed in retail outlets and where credit card fraud occurs in South African retail outlets. This discussion will include the personnel responsible for performing each fraudulent activity and the mechanism employed. 3.2 Types of credit card fraud performed in South African retail outlets Credit card fraud has taken many procedures, from fraudsters using embezzled credit or debit cards to purchase goods or services to a more sophisticated problem of these fraudsters alerting with the security features (Budhram, 2012).Although technology may advance, the battle to combating credit card fraud continues as fraudulent people continue to poke and prod at the card industries weak spots (Budhram, 2007).These credit card fraudsters are very creative group of people.…

    • 2744 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    Law/Group/Agency Impact on company Examples Sales of Goods Act 1979: The goods must be: • as described • of satisfactory quality • fit for purpose All marketing should describe all products accurately and confirm any claims. An example of this would be a painting that was described in an auction catalogue as being by a German impressionist artist Gabrielle Munter. The claimant purchased this painting in the auction for £6,000.…

    • 724 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Information security is defined as protection of confidentiality, integrity as well as information access (Chen, Ramamurthy & Wen, 2012)). There is evidence which suggests that, regardless of technical controls numbers in place, institutions of higher learning such as Central Michigan University will still have to deal with security breaches. Information security does not only refer to technical problems, but is also known as ‘people’ problem. This is because most breaches occur when the people in an organization do not comply with information security policies pertaining to that particular organization. Information security compliance may be defined as information security standards as well as policies implementation for protection of information…

    • 857 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The audit file Audit file is divided into Permanent file and Current file. Current file is maintained as the date of the audit report issued less than ten years should be long-term preservation of permanent archives. There are two disadvantages in computerized environment for maintain audit files. Main disadvantages are : a. In computerized environment, data are stored in magnetic drive that is through electronic processing system so these kinds of media can be easily theft and also there are chances of loss, intentional or accidental destruction. b.…

    • 1204 Words
    • 5 Pages
    Superior Essays