SlideShare a Scribd company logo
1 of 26
Managing and Securing the
       Enterprise
Securing the Enterprise
Information resources are distributed
throughout the organization and beyond
as Internet and wireless technologies
extend organizational boundaries.

Time-to-exploitation of sophisticated
spyware and worms has shrunk from
months to days.
Time-to-exploitation


        It is the elapsed
      time between when
        a vulnerability is
      discovered and the
      time it is exploited.
Regulations

    Industry Self-Regulations:
    Payment Card Industry (PCI)
    Data Security Standard.
    •   Visa
    •   Master Card
    •   American Express
    •   Discover
    •   It is required for all members, merchants,
        or service providers that store, process, or
        transmit cardholder data.
Small Business Regulations
                      • Visa
 The Council            USA
                      • Equifax
  of Better           • IBM
  Business            • Verizon
  Bureaus.            • eBay
Cyber-Blackmail

 Trojan encrypts the data
 on user’s computer, then
 the attacker offers to
 decrypt it for $300 or
 more.
Why IT Security??
Mistakes
 Information    • Human error
Security Forum • System malfunctioning
discovered that • Failure to understand the effect of
 the mistakes     adding a new piece of software to
caused due to:    the rest of the system




 Led to threats
     for IT
IT Security & Internal Control Model

  Senior                    Security
management                 procedures
commitment                     &
 & support                enforcement




              Security                   Security
             policies &                   tools :
              training                  Hardware &
                                         software
IS Vulnerabilities & Threats

                    Un-
               international
                  Threats




        Computer         International
         Crimes             Threats
Un-International Threats

               Human errors

               Environmental
                  hazards

                 Computer
               system failures
International Threats
             Intentional threat


               Theft of data


         Inappropriate use of data


            Theft of computers


      Theft of equipments or programs
International Threats
Deliberate manipulation in handling, entering, processing, transferring or programming
                                         data



                                    Strikes, riots




                       Malicious damage to computer resources




                      Destruction from viruses and other attacks




                           Miscellaneous computer abuses




                                    Internet fraud
Computer Crimes
Crime done on the
Internet, call cybercrimes.
• Hacker
  • White-hat hackers
  • Black-hat hackers
• Cracker
Methods of attack on computing
          Data tampering
        Programming attacks
              Viruses
              Worms
             Zombies
             Phishing
               DoS
              Botnets
Frauds and Computer Crimes

                Fraud is a
             serious financial
             crime involving:



 Deception     Confidence        Trickery
Types of Frauds
 Occupational Fraud

 Operating management fraud

 Conflict of interest

 Bribery

 Misappropriation

 Senior management financial reporting fraud

 Accounting cycle fraud
Fraud prevention and Detection

           Adelphia

             Global
            crossing

             Tyco
Other crimes


           Crimes by

               Flash    MP3/MP4
Computer
               drives    players
Computer Crimes
 Identity theft: worst and most prevalent crimes.

   Thefts where individuals’ social security and credit

   card numbers are stolen and used by thieves.
   Obtaining information about other people

     By stealing wallets

   E-sharing and databases
Types of identity crimes
 Stolen desktop

 Online, by an ex-employee

 Computer tapes lost in transit

 Malicious users

 Missing backup tapes
Internal control
 Is the work atmosphere that a company sets for its
  employees.
 It is a process designed to achieve:

   Reliability of financial reporting

   Operational efficiency

   Compliance with laws

   Regulations and policies

   Safeguarding of assets
Frauds to be controlled by ICS
 Fraud committed against a company

 Fraud committed for a company
Symptoms
 Missing documents

 Delayed bank deposits

 Holes in accounting records

 Numerous outstanding checks or bills

 Disparity between accounts payable and
 receivable
 Employees who do not take vacations etc.
-cont..
 A large drop in profits

 Major increase in business with other particular

 customers.

 Customers complaining about double billing

 Repeated duplicate payments

 Employees with the same address or phone

 numbers as a vendor
IC procedures and activities
 Segregation of duties and dual custody

 Independent checks

 Proper system of authorization

 Physical safeguard

 Documents and records

More Related Content

What's hot

security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
Vineet Dubey
 
Information security threats
Information security threatsInformation security threats
Information security threats
complianceonline123
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
I P Abir
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
swapneel07
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
Ram Dutt Shukla
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
Leena Reddy
 

What's hot (20)

security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter11
Chapter11Chapter11
Chapter11
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Computer security and
Computer security andComputer security and
Computer security and
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 

Viewers also liked

The Chinese New Year ads delivering double prosperity
The Chinese New Year ads delivering double prosperityThe Chinese New Year ads delivering double prosperity
The Chinese New Year ads delivering double prosperity
TNS
 
Performance reviews development plan
Performance reviews development planPerformance reviews development plan
Performance reviews development plan
India Stephens
 
Perfomnce appraisal
Perfomnce appraisalPerfomnce appraisal
Perfomnce appraisal
Shreya Gupta
 
Stages of career development by saba abbas
Stages of career development by saba abbasStages of career development by saba abbas
Stages of career development by saba abbas
Saba Abbas
 
Chapter 3C - CENTRALIZATION AND DECENTRALIZATION
Chapter 3C - CENTRALIZATION AND DECENTRALIZATIONChapter 3C - CENTRALIZATION AND DECENTRALIZATION
Chapter 3C - CENTRALIZATION AND DECENTRALIZATION
Aizell Bernal
 
Modern methods of performance appraisal
Modern methods of performance appraisalModern methods of performance appraisal
Modern methods of performance appraisal
Kumar Gourav
 

Viewers also liked (20)

Objective performance appraisal
Objective performance appraisalObjective performance appraisal
Objective performance appraisal
 
What could politics learn from brands?
What could politics learn from brands?What could politics learn from brands?
What could politics learn from brands?
 
The Chinese New Year ads delivering double prosperity
The Chinese New Year ads delivering double prosperityThe Chinese New Year ads delivering double prosperity
The Chinese New Year ads delivering double prosperity
 
Performance reviews development plan
Performance reviews development planPerformance reviews development plan
Performance reviews development plan
 
A Systematic Approach Towards The Reorientation of Nigerian Values
A Systematic Approach Towards The Reorientation of Nigerian ValuesA Systematic Approach Towards The Reorientation of Nigerian Values
A Systematic Approach Towards The Reorientation of Nigerian Values
 
Performance Appraisal
Performance AppraisalPerformance Appraisal
Performance Appraisal
 
Perfomnce appraisal
Perfomnce appraisalPerfomnce appraisal
Perfomnce appraisal
 
Performance Appraisal Objective & methods
Performance Appraisal Objective & methodsPerformance Appraisal Objective & methods
Performance Appraisal Objective & methods
 
Concept of Promotion and Demotion
Concept of Promotion and DemotionConcept of Promotion and Demotion
Concept of Promotion and Demotion
 
Stages of career development by saba abbas
Stages of career development by saba abbasStages of career development by saba abbas
Stages of career development by saba abbas
 
Induction
InductionInduction
Induction
 
Career stages in HRM
Career stages in HRMCareer stages in HRM
Career stages in HRM
 
The difference between centralized and decentralized education
The difference between centralized and decentralized educationThe difference between centralized and decentralized education
The difference between centralized and decentralized education
 
Chapter 3C - CENTRALIZATION AND DECENTRALIZATION
Chapter 3C - CENTRALIZATION AND DECENTRALIZATIONChapter 3C - CENTRALIZATION AND DECENTRALIZATION
Chapter 3C - CENTRALIZATION AND DECENTRALIZATION
 
Modern methods of performance appraisal
Modern methods of performance appraisalModern methods of performance appraisal
Modern methods of performance appraisal
 
Employee development
Employee developmentEmployee development
Employee development
 
Workers Participation In Management
Workers Participation In ManagementWorkers Participation In Management
Workers Participation In Management
 
Understanding Employee Attrition
Understanding Employee AttritionUnderstanding Employee Attrition
Understanding Employee Attrition
 
Centralization and decentralization of authority
Centralization and decentralization of authorityCentralization and decentralization of authority
Centralization and decentralization of authority
 
HRM Induction Process
HRM Induction ProcessHRM Induction Process
HRM Induction Process
 

Similar to Managing and securing the enterprise

Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
Arifa Ali
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
Jan Wong
 

Similar to Managing and securing the enterprise (20)

9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 

More from Abha Damani (20)

Unit2
Unit2Unit2
Unit2
 
Unit6
Unit6Unit6
Unit6
 
Unit5
Unit5Unit5
Unit5
 
Unit4
Unit4Unit4
Unit4
 
Unit3
Unit3Unit3
Unit3
 
Unit 1 introduction to visual basic programming
Unit 1 introduction to visual basic programmingUnit 1 introduction to visual basic programming
Unit 1 introduction to visual basic programming
 
Ch14
Ch14Ch14
Ch14
 
Ch12
Ch12Ch12
Ch12
 
Ch11
Ch11Ch11
Ch11
 
Ch10
Ch10Ch10
Ch10
 
Ch08
Ch08Ch08
Ch08
 
Ch01 enterprise
Ch01 enterpriseCh01 enterprise
Ch01 enterprise
 
3 data mgmt
3 data mgmt3 data mgmt
3 data mgmt
 
2 it supp_sys
2 it supp_sys2 it supp_sys
2 it supp_sys
 
1 org.perf it supp_appl
1 org.perf it supp_appl1 org.perf it supp_appl
1 org.perf it supp_appl
 
Ch6
Ch6Ch6
Ch6
 
Unit2
Unit2Unit2
Unit2
 
Unit 3
Unit 3Unit 3
Unit 3
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 5
Unit 5Unit 5
Unit 5
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Managing and securing the enterprise

  • 1. Managing and Securing the Enterprise
  • 2. Securing the Enterprise Information resources are distributed throughout the organization and beyond as Internet and wireless technologies extend organizational boundaries. Time-to-exploitation of sophisticated spyware and worms has shrunk from months to days.
  • 3. Time-to-exploitation It is the elapsed time between when a vulnerability is discovered and the time it is exploited.
  • 4. Regulations Industry Self-Regulations: Payment Card Industry (PCI) Data Security Standard. • Visa • Master Card • American Express • Discover • It is required for all members, merchants, or service providers that store, process, or transmit cardholder data.
  • 5. Small Business Regulations • Visa The Council USA • Equifax of Better • IBM Business • Verizon Bureaus. • eBay
  • 6. Cyber-Blackmail Trojan encrypts the data on user’s computer, then the attacker offers to decrypt it for $300 or more.
  • 8. Mistakes Information • Human error Security Forum • System malfunctioning discovered that • Failure to understand the effect of the mistakes adding a new piece of software to caused due to: the rest of the system Led to threats for IT
  • 9. IT Security & Internal Control Model Senior Security management procedures commitment & & support enforcement Security Security policies & tools : training Hardware & software
  • 10. IS Vulnerabilities & Threats Un- international Threats Computer International Crimes Threats
  • 11. Un-International Threats Human errors Environmental hazards Computer system failures
  • 12. International Threats Intentional threat Theft of data Inappropriate use of data Theft of computers Theft of equipments or programs
  • 13. International Threats Deliberate manipulation in handling, entering, processing, transferring or programming data Strikes, riots Malicious damage to computer resources Destruction from viruses and other attacks Miscellaneous computer abuses Internet fraud
  • 14. Computer Crimes Crime done on the Internet, call cybercrimes. • Hacker • White-hat hackers • Black-hat hackers • Cracker
  • 15. Methods of attack on computing Data tampering Programming attacks Viruses Worms Zombies Phishing DoS Botnets
  • 16. Frauds and Computer Crimes Fraud is a serious financial crime involving: Deception Confidence Trickery
  • 17. Types of Frauds  Occupational Fraud  Operating management fraud  Conflict of interest  Bribery  Misappropriation  Senior management financial reporting fraud  Accounting cycle fraud
  • 18. Fraud prevention and Detection Adelphia Global crossing Tyco
  • 19. Other crimes Crimes by Flash MP3/MP4 Computer drives players
  • 20. Computer Crimes  Identity theft: worst and most prevalent crimes.  Thefts where individuals’ social security and credit card numbers are stolen and used by thieves.  Obtaining information about other people  By stealing wallets  E-sharing and databases
  • 21. Types of identity crimes  Stolen desktop  Online, by an ex-employee  Computer tapes lost in transit  Malicious users  Missing backup tapes
  • 22. Internal control  Is the work atmosphere that a company sets for its employees.  It is a process designed to achieve:  Reliability of financial reporting  Operational efficiency  Compliance with laws  Regulations and policies  Safeguarding of assets
  • 23. Frauds to be controlled by ICS  Fraud committed against a company  Fraud committed for a company
  • 24. Symptoms  Missing documents  Delayed bank deposits  Holes in accounting records  Numerous outstanding checks or bills  Disparity between accounts payable and receivable  Employees who do not take vacations etc.
  • 25. -cont..  A large drop in profits  Major increase in business with other particular customers.  Customers complaining about double billing  Repeated duplicate payments  Employees with the same address or phone numbers as a vendor
  • 26. IC procedures and activities  Segregation of duties and dual custody  Independent checks  Proper system of authorization  Physical safeguard  Documents and records