Page 597 - ITGC_Audit Guides
P. 597

GTAG —  IT Fraud Risks





              Other IT fraud vulnerabilities that should be considered
            during the risk assessment include:
               •   Fictitious billings for services or misappropriation of

                  employee,  customer,  or  company  confidential  data
                  for personal gain by an independent contractor or an
                  onshore or offshore programmer.
               •   Copyright infringement and loss of intellectual prop-

                  erty when employees or contractors copy or download
                  files illegally.

               •   Misappropriation  of  company  data  by  third-party
                  service  providers  that  process  employee  and/or
                  customer information, or other company confiden-
                  tial information.

              The  following  are  some  examples  of  best  practices  in
            addressing IT fraud risks.
               •   Completing  periodic  enterprise  wide  IT  fraud  risk

                  assessments.

               •   Instituting  periodic  security  and  fraud  awareness
                  training for all employees.

               •   Enforcing segregation of duties.
               •   Restricting access to systems and data on a business

                  need to know.
               •   Implementing strict password and identity manage-

                  ment policies and practices.

               •   Logging,  monitoring,  and  auditing  employees’
                  network actions.

               •   Using extra caution with system administrators and
                  privileged users.

               •   Using layers of defense against network intrusions.

               •   Developing an effective incident response plan and
                  assembling an incident response team.

               •   Deactivating  computer  access  upon  an  employee's
                  termination of employment.

               •   Collecting and saving forensic data for use in investiga-
                  tions.

               •   Allowing for secure back-up and recovery processe.

               •   Implementing  good  vulnerability  management
                  programs.






















                                                              8
   592   593   594   595   596   597   598   599   600   601   602