22
Presentation on: Case Studies on Risk assessment and internal controls in IT enable Environment Presentation at: National Convention ICAI BHWAN Baroda Presentation @: 12 July 2013 Presentation By: Ishan Parikh(WRO0349134) Contact number: 9067408930 1

case studies on risk management in IT enabled organisation(vadodara)

Embed Size (px)

DESCRIPTION

This presentation contains two case studies regarding risk assesment and management.

Citation preview

Page 1: case studies on risk management in IT enabled organisation(vadodara)

Presentation on: Case Studies on Risk assessment and internal controls in IT enable Environment

Presentation at: National Convention ICAI BHWAN BarodaPresentation @: 12 July 2013Presentation By: Ishan Parikh(WRO0349134)Contact number: 9067408930

1

Page 2: case studies on risk management in IT enabled organisation(vadodara)

Risk assessment and internal controls in IT enabled Environment

Risk assessment:

The auditor should obtain an understanding of the accounting and internal control systems sufficient to plan the audit and develop an effective audit approach. The auditor should use professional judgment to assess audit risk and to design audit procedures to ensure that it is reduced to an acceptably low level.

Internal Control System:

ICS means all the policies and procedures (internal controls) adopted by the management of an entity to assist in achieving management's objective of ensuring, as far as practicable, the orderly and efficient conduct of its business, including adherence to management policies, the safeguarding of assets, the prevention and detection of fraud and error, the accuracy and completeness of the accounting records, and the timely preparation of reliable financial information.

IT enabled Environment:

IT enabled environment is a Area that is constitution of different Computers and its peripheral devices and work together to fulfill organization’s objectives.

Requirement of involving of IT in Accounting & Audit:

2

Well memorized definitions 1

2

3

Page 3: case studies on risk management in IT enabled organisation(vadodara)

Technological Revolution.

Increase in Volumes & Complexities of transactions.

Time & Information became most sought after.

Fall in Prices of Computer Hardware.

Availability of user friendly software.

Though no change in audit objectives

To establish reliability & integrity of information

To assess compliance with policies, laws & regulations

To see that assets are being safeguarded

To appraise economical & efficient use of resources

Accomplishment of established objectives & goals

IT Security Risk Assessment

Risk Assessment can be understood as the generation of a snapshot of current risks. More technically, it consists of the following phases:

3

Page 4: case studies on risk management in IT enabled organisation(vadodara)

1. Threats identification: identify all relevant threats2. Threat characterization: determine the impact and likelihood of the

relevant threats3. Exposure assessment: identify the vulnerability of the assets4. Risk characterization: determine the risks and evaluate their impacts

on the business

Figure 1 below illustrates how IT security risk can be seen as a function of threat, vulnerability and assets value. It also shows that there are different ways to reduce the risks: countermeasures can either reduce the probability for a threat to become true. They can reduce vulnerability or they might help to reduce the impact caused when a threat comes true.

figure 1

Risks that remain after applying countermeasures are called “residual risks”. Residual risks have to be considered by the management and be accepted or rejected (in the latter case the risks have to be treated again).

4

Page 5: case studies on risk management in IT enabled organisation(vadodara)

Let us consider the example of a commercial engineer who possesses a company laptop. This hardware stores a copy of the price list of products as well as a database with client data. The commercial engineer is a frequent traveller and he uses his laptop in public places like restaurants or the customers’ offices.In this example:

1. Threats are the loss or theft of the laptop with the impact of disclosure of company confidential information.

2. Vulnerabilities result from storing confidential plaintext data on the laptop or leaving the laptop unattended without a screen lock or appropriate password protection.

3. Assets are the hardware itself (replacement costs in case of theft or loss) and the confidential data for the company.

To calculate the value of these assets, several questions have to be answered:

a. What is the cost (money and time) for reconstructing the data in case of loss?

b. What is the degree of confidentiality of the data stored in the laptop?

c. What is the potential impact of data disclosure to competing companies?

5

Page 6: case studies on risk management in IT enabled organisation(vadodara)

Figure 2 shows the phases of the risk assessment process:

In the example, as a result of the risk assessment the risk that company information could be disclosed to non-trusted parties has been identified. This risk has major business impacts for the company.

6

Page 7: case studies on risk management in IT enabled organisation(vadodara)

Figure 3 below shows the steps required to deal with the risks connected to the threats and Vulnerabilities of an asset.

7

Page 8: case studies on risk management in IT enabled organisation(vadodara)

IT Security Risk Management

In order to mitigate the identified IT security risks a risk management process should be implemented. For each assessed risk, the risk manager should propose security internal controls.

Logical controls:

E.g. protection of data, protection of network assets, protection of access to applications etc.

Physical controls

E.g. alarm systems, fire sensors, physical access control, surveillance etc.)

Organizational controls

E.g. usage rules, administration procedures, process descriptions, definition of roles etc.

Personnel controls

E.g. sanctions, confidentiality clauses in contracts, training and awareness etc.

In our example these security controls could be:1. Awareness training for commercial engineers (i.e. control of

personnel type)

8

In general, security standards propose security controls categorized in the following areas:

Page 9: case studies on risk management in IT enabled organisation(vadodara)

2. Encryption of confidential data stored on the notebook (i.e. control of logical type)

3. Only the data actually needed for the trip should be stored on the notebook (i.e. control of organizational type).

4. Insurance for the case of theft or loss of the hardware (i.e. control of organizational type)

The security controls should be selected, planned, implemented, communicated and monitored. IT Security Risk Management is a global approach to risk: on the basis of the assessed risks the process continues with the selection and implementation of security controls (“risk treatment”), the acceptance of risk that cannot or should not be treated further, the communication of risks and their monitoring.

More technically speaking, the process of Risk Management includes:

9

Page 10: case studies on risk management in IT enabled organisation(vadodara)

Risk assessment : Find out which risks apply to your business and evaluate them. Management has to decide which risks will be treated or not.

Risk treatment: Select and implement security controls to reduce risks. Controls can have different effects, like:

mitigation transfer avoidance and retention of risks

In the example given above, a disk encryption (that would strongly reduce the risk that competing companies get access to confidential data in case the laptop is stolen) is a measure of risk mitigation, an insurance covering the hardware replacement cost is a measure of risk transfer. An example for risk avoidance is to take on the laptop no more than the necessary data.

You can and should use multiple security controls to treat risks. It is advisable to use different types of controls.

Risk acceptance:Even when the risks have been treated, residual risks will generally remain, even after risk treatment has been performed or if controls are not feasible. The management has to accept the way risks have been treated. Thus, risk acceptance should always be a management decision.

IT security risk management is a part of business management

10

Page 11: case studies on risk management in IT enabled organisation(vadodara)

In order to establish risk management, you will need a supporting method. Risk management methods vary from simple step-by-step approaches up to complex methods requiring the support of automated tools:::::::::

The first step towards dealing with IT security risk management is to assess the importance of your organization’s information assets. This assessment is done in two steps:

Determine the importance of the business processes for the organization and the environment respectively. This importance may vary from ‘high’ to ‘low’:

Processes with high importance are the most valuable assets for the organization (e.g. the production processes) or the environment (e.g. if your organization does air traffic control). Disruption or congestion of such processes results in unacceptable damage1.

Processes with medium importance represent a moderate value for the organization. Disruption or congestion of such processes results in significant damage.

Processes with low importance are of minor value for the organisation. Disruption or congestion of such processes results in minor damage only.

Determine the dependency of the business processes on information systems:

High dependency : Disruption of information systems results in severe hindering or even congestion of the dependent processes.

Medium dependency: Disruption of information system results in significant but not severe hindering of the dependent process.

Low dependency: Disruption of information system results in only minor hindering of the dependent process.

Figure below illustrates the criticality as the combination of IT systems dependency and the importance of a business process.

11

1

2

Page 12: case studies on risk management in IT enabled organisation(vadodara)

12

Page 13: case studies on risk management in IT enabled organisation(vadodara)

Case Studies on Risk assessment and internal controls in IT enabled Environment

1. EBay India

2. Any Advanced law firm

13

Page 14: case studies on risk management in IT enabled organisation(vadodara)

EBay Inc. is an American multinational internet consumer-to-consumer corporation, headquartered in San Jose, California. It was founded in 1995, and became a notable success story of the dot-com bubble; it is now a multi-billion dollar business with operations localized in over thirty countries now in India too.

Business processes and their importance for the business:

Business process Importance for the business

Production high importanceFinance High ImportanceHuman Resources Low importanceMarketing High importance

14

Page 15: case studies on risk management in IT enabled organisation(vadodara)

Risk assessment process in EBay A online Store:

IT System

Business Process

CommentsProduction:highimportance

Finance:highimportance

HumanResources:lowimportance

Marketing:highimportance

ProductionWeb Services:highdependency

high criticality

Company sells its products mainly through an online store

ProductionDatabase: highdependency

high criticality

It stores salesdata (includingpersonal data)

Production Fileand Print:mediumdependency

mediumcriticality

Function needed to process orders,receipts,correspondencewith customers

Production /SpecificApplications:highdependency

high criticality

A set of programsused to access,manage and maintain the production environment

Finance andControllingapplications:lowdependency

lowcriticality

It stores data to proceed the internal cost performance ratio

Marketing Fileand Print:lowdependency

nocriticality

It is used by themarketing unit to produce their information material

E-Mail:mediumdependency

mediumcriticality

mediumcriticality

nocriticality

lowcriticality

The company has a centralized Email-system. This is anindispensableinternal and external communication channel

IT Infrastructure:highdependency

high criticality

high criticality

lowcriticality

mediumcriticality

Consist of hardware, local network, operating systems, system software which is needed to operate the information systems

15

Page 16: case studies on risk management in IT enabled organisation(vadodara)

Amarchand & Mangaldas & Suresh A Shroff & Co or AMSS in short, is the largest law firm in India with headquarters in Delhi and Mumbai. It has offices in 7 cities Viz New Delhi, Ahmedabad, Hyderabad, Kolkata, Mumbai, Bengaluru, Chennai and Pune. The firm now has nearly 575 lawyers with about 70 partners.

Business processes and their importance for the business:

Business process Importance for the business

Consultancy high importanceCase Proceeding High ImportanceFinance Low importanceHuman Resources Medium importance

16

Page 17: case studies on risk management in IT enabled organisation(vadodara)

Risk assessment process in AMSS a Biggest Law Firm of India:

IT System

Business Process

CommentsConsultancy:highimportance

CaseProceeding:highimportance

Finance:Lowimportance

Humanresources:mediumimportance

CaseProceedingDatabase:highdependency

high criticality

It stores information related to the cases(including personaldata)

ConsultingDatabase:highdependency

high criticality

It stores information related to the clients(including personaldata)

Finance andControllingapplication:lowdependency

nocriticality

It stores data to proceed the internal cost-performance ratio

E-Mail:highdependency

high criticality

high criticality

lowcriticality

mediumcriticality

The company has aCentralized mail system. This is anIndispensable internal and external communication channel

IT Infrastructure:highdependency

high criticality

high criticality

lowcriticality

mediumcriticality

Consists of hardware, local network, operating systems, system software which are needed to operatethe informationsystems

17