IT Examiner School

HARDWARE/SOFTWARE

Threats and Vulnerabilities

Inherent Risk

Controls (How is it protected?) Information is saved on back up disks daily. User name and password requirement for system entry prevents unauthorized users from accessing the system. Use passwords expire every 60 days. Users are set up to access only necessary applications to perform jobs. User Virus protection is installed in the software. This protection is checked hourly and updated when needed, at least once per day. Laptops are locked up at night. security report reviewed daily. screen protectors and screen savers that activate within 5 minutes. Every computer has the option of self-locking when needed. Computers are equipped with

Effectiveness of Control ALL EFFECTIVE UNLESS OTHERWISE NOTED

Computer/Network System

Disaster occurs

LOW

Access to other computer.

LOW

Data being lost on system.

LOW

Virus, worm or unauthorized person tries to enter network. Firewall installed in the bank’s software/network being damaged Laptops that are kept at the bank during the day or night. Computer/desktops being damaged or accessed by an unauthorized person. Disks or CDs that are no longer in use. Information that is left on computer screens during the day. Collecting information on internet. Spies threaten infrastructure/networking equipment. Outsiders being able to plug in with their own network devices into the system via plug ins in offices and the Network switches on the tower by the vault.

LOW

LOW

MED

LOW

LOW

MED

LOW

HIGH

HIGH

All disks/CDs are

Made with FlippingBook Digital Publishing Software