Question Tag: Cyber Security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

RM – JUL 2020 – L4 – Q2 – Information Risk Policy and Risks in IT Space

Discuss objectives of an information risk policy and prevalent risks in a bank's IT space, in the context of cyber concerns and Data Protection Act compliance.

In an age of increasing cyber security concerns and the obligation to comply with the Data Protection Act 2018, the Board and management of Banks must focus on information risk.

(a) Discuss at least (5) five objectives of an information risk policy of a bank. (10 marks)

(b) Discuss any five (5) risks prevalent in the information technology space of a bank. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "RM – JUL 2020 – L4 – Q2 – Information Risk Policy and Risks in IT Space"

RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management

Defines Cyber Security, sources of vulnerabilities, and its importance in banking.

(a) What is “Cyber Security” in the context of Information Security Management? (10 marks)

(b) What are the key sources of vulnerabilities in the Cyber Space of Banking Businesses? (5 marks)

(c) Why has Cyber Security assumed such importance in Contemporary Banking? (5 marks)

[Total: 20 marks]

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management"

AA – Nov 2024 – L2 – Q2a – Cyber Security Threats & amp; Audit Response

Discusses cyber security threats in an IT-enabled audit environment and the appropriate audit responses to mitigate such risks.

You are part of a team undertaking the audit of Glaglo LTD, a local retail company. The company recently introduced an online marketing and sales system. As part of understanding the company’s revenue process by way of a walkthrough test, you noted that the company has recently engaged a fintech company to handle payment processing from these online sales.

Required:

i) Discuss FOUR cyber security threats associated with the IT System employed by Glaglo LTD.

ii) State the audit response to the cyber security threats associated with the IT System employed by Glaglo LTD.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Nov 2024 – L2 – Q2a – Cyber Security Threats & amp; Audit Response"

AAA – Nov 2019 – L3 – Q5a – Current Issues, Audit-related Services

Outline the purposes of a cyber security policy and explain what a cyber security audit is intended to achieve.

Recently one of your clients in the financial service sector has had its ICT system hacked and large sums of depositors’ funds stolen. He called and informed you about what happened. You intimated to him that his company needs a cyber security policy and cyber security audit. He requested a briefing on the issue.

Required:

i) Outline the purposes of a cyber security policy.

(5 marks)

ii) Explain cyber security audit and what it is intended to achieve.

(5 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AAA – Nov 2019 – L3 – Q5a – Current Issues, Audit-related Services"

RM – JUL 2020 – L4 – Q2 – Information Risk Policy and Risks in IT Space

Discuss objectives of an information risk policy and prevalent risks in a bank's IT space, in the context of cyber concerns and Data Protection Act compliance.

In an age of increasing cyber security concerns and the obligation to comply with the Data Protection Act 2018, the Board and management of Banks must focus on information risk.

(a) Discuss at least (5) five objectives of an information risk policy of a bank. (10 marks)

(b) Discuss any five (5) risks prevalent in the information technology space of a bank. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "RM – JUL 2020 – L4 – Q2 – Information Risk Policy and Risks in IT Space"

RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management

Defines Cyber Security, sources of vulnerabilities, and its importance in banking.

(a) What is “Cyber Security” in the context of Information Security Management? (10 marks)

(b) What are the key sources of vulnerabilities in the Cyber Space of Banking Businesses? (5 marks)

(c) Why has Cyber Security assumed such importance in Contemporary Banking? (5 marks)

[Total: 20 marks]

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "RM – APR 2024 – L4 – Q5 – Cyber Security in Information Security Management"

AA – Nov 2024 – L2 – Q2a – Cyber Security Threats & amp; Audit Response

Discusses cyber security threats in an IT-enabled audit environment and the appropriate audit responses to mitigate such risks.

You are part of a team undertaking the audit of Glaglo LTD, a local retail company. The company recently introduced an online marketing and sales system. As part of understanding the company’s revenue process by way of a walkthrough test, you noted that the company has recently engaged a fintech company to handle payment processing from these online sales.

Required:

i) Discuss FOUR cyber security threats associated with the IT System employed by Glaglo LTD.

ii) State the audit response to the cyber security threats associated with the IT System employed by Glaglo LTD.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AA – Nov 2024 – L2 – Q2a – Cyber Security Threats & amp; Audit Response"

AAA – Nov 2019 – L3 – Q5a – Current Issues, Audit-related Services

Outline the purposes of a cyber security policy and explain what a cyber security audit is intended to achieve.

Recently one of your clients in the financial service sector has had its ICT system hacked and large sums of depositors’ funds stolen. He called and informed you about what happened. You intimated to him that his company needs a cyber security policy and cyber security audit. He requested a briefing on the issue.

Required:

i) Outline the purposes of a cyber security policy.

(5 marks)

ii) Explain cyber security audit and what it is intended to achieve.

(5 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "AAA – Nov 2019 – L3 – Q5a – Current Issues, Audit-related Services"

Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan