(2003)Incident response and fraud investigation – the role of the information technology auditor.pdfVIP
- 1
- 0
- 约2.47万字
- 约 9页
- 2017-12-06 发布于浙江
- 举报
Incident response and fraud investigation – the role of the information
technology auditor
By Willem Dirven, Anthony Samer, and David Taylor, Protiviti, Inc.
Information systems can both facilitate and detect fraud. The increasing accessibility of
information systems to employees, business partners and customers, from both inside and
outside the organization, heightens the vulnerability of the systems to attack and the potential
for theft or misuse of confidential data.
All IT-related frauds start as an IT incident, which is an IT
event that disrupts the day-to-day IT processing. Incident
response is the first step: determine what happened,
decide what to do about it and determine whether the
incident is fraud related. If so, the next step involves
computer forensics: the means by which an incident
investigator retrieves and assembles evidence about a
computer crime. This article discusses incident response
issues and then provides detailed guidance on the role of
information technology in fraud response, investigation,
analysis, and prevention.
Why is incident response so important?
Government regulations and initiatives such as Health
Insurance Portability and Accountability Act (HIPAA),
Gramm-Leach-Bliley Act (GLBA) of 1999 and California
Law “SB 1386” are forcing businesses to pay attention to
incidents that could impact the confidentiality of corporate
data. These regulations call for incident response policies
and procedures. Corporations in general are following this
regulatory trend, particularly those who have previously
experienced an incident and have realized as a result that
they need to have a good plan in place.
Not every computer incident will turn out to be a fraud.
However, the number of corporate network security
incidents continues to climb each year with increased
financial implications for companies that fall victim to an
attack:
• 90% of surveyed companies detected security
breaches within the
您可能关注的文档
- (2000)Kennametal Uses ACL as Its Best Practices Tool.doc
- (2000)The impacts of electronic commerce on auditing practices:an auditing process model for evidence collection and validation.pdf
- (2000)Client-acceptance decisions:Simultaneous effects of client business risk, audit risk, auditor business risk, and risk adaptation.pdf
- (2000)The role of audit technology and extension of audit procedures in strategic auditing.pdf
- (2000)Worldwide audit automation.pdf
- (2001)A Comparison of Online Electronic Commerce Assurance Service Providers in Australia.pdf
- (2001)A Framework for Proactive, Automated and Continuous E-commerce Control and Assruance.pdf
- (2001)Assurance Service:The Expansion of the CPAs' Traditional Services in Local CPA Firms.pdf
- (2001)Audit Automation.pdf
- (2001)Auditing E-business:Challenges and Opportunities.pdf
- 小区绿化施工协议书.docx
- 墙面施工协议书.docx
- 1 古诗二首(课件)--2025-2026学年统编版语文二年级下册.pptx
- (2026春新版)部编版八年级道德与法治下册《3.1《公民基本权利》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《4.3《依法履行义务》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《6.2《按劳分配为主体、多种分配方式并存》PPT课件.pptx
- (2026春新版)部编版八年级道德与法治下册《6.1《公有制为主体、多种所有制经济共同发展》PPT课件.pptx
- 初三教学管理交流发言稿.docx
- 小学生课外阅读总结.docx
- 餐饮门店夜经济运营的社会责任报告(夜间贡献)撰写流程试题库及答案.doc
最近下载
- LY_T 1955-2022 林地保护利用规划林地落界技术规程.docx
- 2025年独角兽企业:宁德时代组织结构及部门职责.pdf VIP
- 2026年党支部在学习贯彻党的创新理论等“对照五个方面”存在的问题及整改措施4280字范文.docx VIP
- 汉英翻译技巧课件钟书能 ISBN9787566304049 PPT11.ppt VIP
- 西华大学2024-2025学年第1学期《高等数学(上)》期末考试试卷(A卷)附参考答案.pdf
- 2026年责任制整体护理工作计划范文(2篇).docx VIP
- 2026年党支部在学习贯彻党的创新理论、加强党性锤炼等“对照五个方面”存在的问题及整改措施4030字范文.docx VIP
- 《药品上市后评价管理规程》.docx VIP
- 学校1530安全教育记录(2026年春季期).docx
- 《边教书边成长》读书分享课件.pptx VIP
原创力文档

文档评论(0)