TOOLS AND TIPS FOR MINIMIZING RISKS
CES WEST DISTRICT
NOVEMBER 29, 2012
1
CES WEST DISTRICT NOVEMBER 29, 2012 1 TOPICS NCSU Internal Audit: - - PowerPoint PPT Presentation
TOOLS AND TIPS FOR MINIMIZING RISKS CES WEST DISTRICT NOVEMBER 29, 2012 1 TOPICS NCSU Internal Audit: Who are We and How Can We Help? Self Assessments: Why Do Them? Fraud Awareness and How to Report Suspected Fraud at NCSU IT Security Tips
1
2
3
Recommendations
4
WHY NOT? Maintain independence AND Avoid conflict of interest
5
6
Identify risks Help to avoid potential fraud
Improved CED
Increased awareness of policies and procedures
Identify training needs Heighten your awareness – especially of “gray areas”
Slide
7
– http://www.fis.ncsu.edu/controller/training/class_resources.asp
8
– http://www.fis.ncsu.edu/controller/training/class_resources.asp – http://www.fis.ncsu.edu/FinTraining/FocusGroup/job_aids/
9
http://www.ncsu.edu/human_resources/hrim/comp_time.php
http://www.ncsu.edu/human_resources/classcomp/timerecdefault.php
10
11
12
http://www.ncsu.edu/general_counsel/training/PublicRecords Tutorial.html
13
Source: The Association of Certified Fraud Examiners, 2002 Report to the Nations on Occupational Fraud and Abuse
Source: TheIIA.org 14
Source: ACFE.com 15
Source: http://www.bizjournals.com/atlanta/stories/2008/08/18/daily29.html 16
Source: http://www.newsobserver.com/2012/11/13/2481665/unc-audit-uncovers-123500-missing.html 17
Source: ACFE.com 19
receipt”
credit”
“honest errors”
campus
Source: University of South Florida Internal Audit 20
pennyscribbler.wordpress.com jimunro.blogspot.com Source: ACFE.com 21
Source: ACFE.com 22
Source: http://www.ncsu.edu/internal_audit/hotline/ 23
24
25
http://policies.ncsu.edu/policy/pol-08-00-01
– Broad outline of acceptable use of university IT resources
http://policies.ncsu.edu/regulation/reg-08-00-02
– More details on acceptable use – Limited personal use allowed; expect no privacy – No commercial gain; no University endorsement
http://policies.ncsu.edu/regulation/reg-08-00-03 – Assigns data stewards and data custodians – Makes you responsible for data security, privacy, appropriate use, disposition of data in your custody
26
27
www.ncsu.edu/security/prr/computer-use/PasswordStandard20070509.doc
– Min Password Length: 8 – Max Password Age: 30, 90, 365 – Allow password re-use: No
28
29
No! Yes!
– TrendMicro: http://oit.ncsu.edu/antivirus – Approved Alternate Antivirus Products:
http://oit.ncsu.edu/antivirus/clients-alternate-approved
– MalwareBytes or Spybot – Search & Destroy:
http://oit.ncsu.edu/computing/fall-2009-keep-your-computer-secure
30
31
(http://www.wolftech.ncsu.edu/support/support/NCSU_VPN)
32
33
34
– send usernames, passwords, PINS in email to anyone – share credentials (e.g., Unity/password) with anyone – share your session with anyone – click on links in unsolicited or untrusted email
– Baiting attacks
– Quid pro quo attacks
“it is much easier to trick someone into giving a password for a system than to spend the effort to crack into the system” – Kevin Mitnick
35
36
37