Risk Management and SOX History
44 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does the principle of confidentiality ensure?

  • Traceability of an entity's actions
  • Verification of content changes during transmission
  • Timeliness and reliability of information access
  • Protection against unauthorized access and disclosure (correct)
  • What does integrity in information security primarily protect against?

  • Delayed access to information
  • Unauthorized access to data
  • Unreliable authentication of messages
  • Improper modification or destruction of data (correct)
  • Which factor describes the incentives or pressures that lead to malicious acts?

  • Motivation (correct)
  • Accountability
  • Integrity
  • Availability
  • What is the role of nonrepudiation in information security?

    <p>Confirms the origin or receipt of a message</p> Signup and view all the answers

    Which term refers to the ability to trace the actions of an individual entity?

    <p>Accountability</p> Signup and view all the answers

    What vulnerability can arise from flaws in a system?

    <p>Potential exploitation for damage or delay</p> Signup and view all the answers

    What does the principle of availability focus on in information security?

    <p>Ensuring resources are available on time</p> Signup and view all the answers

    Which aspect involves a third party's ability to verify message integrity?

    <p>Authenticity</p> Signup and view all the answers

    What was the primary goal of the Sarbanes-Oxley Act of 2002?

    <p>To strengthen investor confidence and restore trust in capital markets</p> Signup and view all the answers

    Which section of SOX requires management to evaluate the operational effectiveness of Internal Controls over Financial Reporting?

    <p>Section 404 (a)</p> Signup and view all the answers

    Who is primarily responsible for the application of risk treatment in achieving business objectives?

    <p>Business Process Owners</p> Signup and view all the answers

    What does Section 404 (b) of SOX require regarding internal controls?

    <p>Attestation regarding the issuer's ICFR compliance</p> Signup and view all the answers

    In the context of risk management, what does risk reduction entail?

    <p>Minimizing the impact of identified risks</p> Signup and view all the answers

    Who has the tertiary responsibility for the oversight of compliance with legal and regulatory expectations?

    <p>Those Charged with Governance</p> Signup and view all the answers

    Which of the following is a common method of risk transfer in project management?

    <p>Insuring against project-related risks</p> Signup and view all the answers

    What is the secondary responsibility in evaluating risk treatment effectiveness?

    <p>Internal Audit</p> Signup and view all the answers

    What is the primary goal of Enterprise Risk Management?

    <p>To identify vulnerabilities and reduce risk to an acceptable level.</p> Signup and view all the answers

    Which of the following best describes 'risk avoidance'?

    <p>Stopping a project to prevent potential risks.</p> Signup and view all the answers

    Which term refers to flaws in a system that can be exploited?

    <p>Vulnerability</p> Signup and view all the answers

    What does 'significant deficiency' indicate in risk treatment?

    <p>Risks are managed without appropriate controls.</p> Signup and view all the answers

    What is meant by 'uncertainty' in the context of risk management?

    <p>Lack of information regarding the impact and timing of an event.</p> Signup and view all the answers

    Who does the Enterprise Risk Management process primarily serve?

    <p>Stakeholders interested in the achievement of objectives.</p> Signup and view all the answers

    Which of the following is a characteristic of a 'material weakness'?

    <p>Indicates potential for financial misstatement.</p> Signup and view all the answers

    What do compensating controls do in risk assessment?

    <p>Compensate for deficiencies by reducing risk exposure.</p> Signup and view all the answers

    What is the primary purpose of DNS tunneling?

    <p>To disguise information in domain name system queries</p> Signup and view all the answers

    Which of the following best describes whaling?

    <p>Phishing targeting individuals in senior management</p> Signup and view all the answers

    What characterizes a Distributed Denial of Service (DDoS) attack?

    <p>It uses multiple compromised computers to flood a network</p> Signup and view all the answers

    What is a zero-day exploit?

    <p>A flaw discovered before a patch is developed</p> Signup and view all the answers

    What is deepfake technology primarily used for?

    <p>Producing AI-generated forgeries that can mislead</p> Signup and view all the answers

    Which of the following concepts refers to misleading AI/ML systems?

    <p>Adversarial AI/ML</p> Signup and view all the answers

    What must be done to ensure the safety of buildings regarding fire hazards?

    <p>Secure multiple types of fire detection and suppression systems</p> Signup and view all the answers

    Where should an emergency evacuation plan be posted?

    <p>In a conspicuous place</p> Signup and view all the answers

    What is the primary purpose of threat intelligence?

    <p>To help organizations understand common vulnerabilities.</p> Signup and view all the answers

    What information is typically collected during manual logging of visitors?

    <p>Visitor's name, company, reason for visit, and times.</p> Signup and view all the answers

    What is a key benefit of virtualization?

    <p>It allows multiple operating systems to operate on one server.</p> Signup and view all the answers

    What does Mobile Device Management (MDM) primarily help with?

    <p>Segregating corporate and personal data on devices.</p> Signup and view all the answers

    What is a major concern with Bring Your Own Device (BYOD) policies?

    <p>They can result in unauthorized access to sensitive data.</p> Signup and view all the answers

    Which of the following best describes cloud computing?

    <p>On-demand access to computing resources via the internet.</p> Signup and view all the answers

    What is a risk associated with signing in visitors at a front reception desk?

    <p>The log can be easily altered or forged.</p> Signup and view all the answers

    What is a characteristic of zero-day threats?

    <p>They exploit unknown vulnerabilities.</p> Signup and view all the answers

    What technique involves a malicious actor posing a false scenario to gain trust?

    <p>Pretexting</p> Signup and view all the answers

    Which term refers to the method of accessing a server by hijacking a session through the client's IP address?

    <p>Session Hijacking</p> Signup and view all the answers

    What method is characterized by trial-and-error attempts to crack passwords?

    <p>Brute Force</p> Signup and view all the answers

    What method involves using existing stolen credentials across different applications?

    <p>Credential Stuffing</p> Signup and view all the answers

    Study Notes

    Risk Management - AUDCIS US SOX History

    • Twenty years ago, financial reporting scandals eroded investor confidence.
    • The Sarbanes-Oxley Act (SOX) of 2002 aimed to restore trust.
    • SOX 404 primarily focuses on internal controls over financial reporting (ICFR).

    Evaluation of Design and Operating Effectiveness

    • Section 404(a) mandates annual evaluation of internal controls.
    • Management documents control procedures and testing.
    • Results publicly reported in Form 10-K.

    Attestation Over Effectiveness of Internal Controls

    • Section 404(b) requires auditor attestation of ICFR.

    Enterprise Risk Management

    • Identifying vulnerabilities in achieving business objectives.
    • Implementing countermeasures to reduce risk.
    • Definition of Risk: Uncertainty of an event affecting objective attainment.
    • Uncertainty: Lack of information about impact and timing of an event.

    Risk Treatment

    • Risk Avoidance: Stopping a project.
    • Risk Transfer: Outsourcing a project.
    • Risk Reduction: Outsourcing part of a project.
    • Risk Sharing: Outsourcing part of a project

    Enterprise Risk Management Responsibility

    • Business Process Owners: Apply risk treatment to achieve business objectives.
    • Internal Audit: Assess risk treatment applied by business process owners.
    • Those Charged with Governance: Oversee compliance with legal and regulatory expectations, stakeholder management and resource-provision.
    • External Audit: Provide assurance to legislative and regulatory bodies.

    Reportorial Requirements

    • Material Weakness: Potential for a financial misstatement.

    Information Security Principle

    • Confidentiality: Restrictions against unauthorized access and disclosure.
    • Integrity: Restrictions against improper modification or destruction.
    • Availability: Protection against untimely and unreliable access.

    Fraud Risk Factors

    • Motivation: Incentives and pressures driving perpetrator actions.
    • Rationalization: Justification for the perpetrator's actions.
    • Opportunity: Methods for the perpetrator to commit fraud, e.g., poor internal controls.

    Vulnerabilities, Threats, and Attacks

    • Risk: Uncertainty affecting objective achievement.
    • Uncertainty: Lack of information about impact and timing.
    • Vulnerability: Result of flaws in a system.
    • Threat: System flaw that's exploited by malicious action.
    • Attack: Intentional malicious action to access, damage, or delay an asset.
    • IT Risk: Lack of information impacting and timing an event due to a system flaw.

    Example of Vulnerabilities

    • Authenticity: Verifying content hasn’t changed in transit
    • Nonrepudiation: Verifying origin or receipt of a message
    • Accountability: Trackable actions of an entity
    • Network Availability: Timely and reliable IT resource access

    Perpetrators May Use and Their Controls

    • Unauthorized hardware/software.
    • Untrusted wireless network.
    • Use of unsecured network.
    • Untrusted devices.

    Types of Attacks

    • Malware (malicious software).
    • Viruses: Software activated to cause damage.
    • Trojans: Viruses hidden in legitimate software.
    • Worms: Viruses that replicate on their own.
    • Spyware: Secretly collects sensitive data.
    • Ransomware: Demands payment to recover data.

    Social Engineering

    • Exploitation of human behavior to gain physical/security access.
    • Tailgating/piggybacking: Tagging along behind employees.
    • Eavesdropping: Listening to private communications.
    • Shoulder surfing: Physically spying on someone.
    • Brute Force: Trial-and-error password cracking.
    • Keylogging: Recording every keystroke.
    • Credential stuffing: Re-using stolen credentials.
    • Kerberoasting: Brute force attack on authentication systems.
    • Downgrading: Forcing into less secure environments.
    • Phishing: Enticing victims to share info.
    • Spear phishing: Targeted phishing attacks.
    • WHaling: Attacking top-level executives.
    • Smishing: Phishing via text messages.
    • Vishing: Phishing via phone calls.
    • Spoofing: Disguising as a trusted source.
    • Honeytrap: Luring victims into traps.
    • Domain spoofing: Disguises use of a known organization's email.
    • ARP spoofing: Disguising use of a known organization protocol.
    • Pretexting: False scenarios to gain trust.
    • Quid pro quo: Exchanging services for sensitive data
    • Man-in-the-middle: Altering communications between parties.
    • Session hijacking: Changing IP address to access a server.
    • Pass-the-Hash: Using stolen info.
    • DNS tunneling: Using DNS to bypass firewalls.
    • Denial-of-service (DoS): Flooding networks with malicious requests.
    • Distributed denial-of-service (DDoS): Using multiple compromised computers to launch attacks.
    • Zero-day exploits: Exploiting vulnerabilities before patches.
    • Deepfakes: Al-generated forgeries to cause damage to reputation and sway political landscapes.
    • Adversarial AI/ML: Exploiting AI/ML models by introducing inaccuracies.

    Physical and Environmental Controls

    • Information asset protections (physical).
    • Fire and Humidity hazards.
    • Disaster recovery plan.
    • Recovery time objectives (RTO).
    • Recovery point objective (RPO).
    • Emergency evacuation plan.
    • Fire suppression system.

    Virtualization

    • Virtualization (on-prem server): Increase efficiency by allowing multiple OSs to coexist on one hardware.
    • Cloud Computing (third-party or backup server): On-demand access to computing resources.

    Emerging Technologies

    • Private Branch Exchange (PBX).
    • Peer-to-Peer.
    • Voice over Internet Protocol (VoIP).
    • Wireless networks.
    • Instant messaging (IM).
    • Digital signatures.
    • Mobile (Edge) Computing.
    • Bring your own device (BYOD).
    • Internet of Things (IoT).
    • Cloud Computing (sharing computing resources).

    Cloud Models

    • Private Cloud: Solely for one organization.
    • Community Cloud: Shared by several organizations.
    • Public Cloud: Available to the general public.
    • Hybrid Cloud: Composition of two or more clouds for data portability.

    IT Forensics

    • Process of identifying, preserving, analyzing, and reporting digital evidence.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Risk Management - Audcis PDF

    Description

    Explore the key concepts of Risk Management and the Sarbanes-Oxley Act (SOX) in this quiz. Understand the importance of internal controls and the process of evaluating their effectiveness. Learn how these regulations impact financial reporting and risk treatment strategies.

    More Like This

    Mastering Accounting Information Systems
    5 questions
    Sarbanes-Oxley Act (SOX) Quiz
    3 questions
    Use Quizgecko on...
    Browser
    Browser