Page 244 - CA Final PARAM Digital Book.
P. 244

DNS Tunnelling is a cyberattack using DNS queries to bypass security, allowing hackers to transmit data or
                   deploy malware by encoding information in DNS responses.
                   IoT-Based Attacks:
                   An IoT attack targets Internet of Things devices or networks, letting hackers control the device, steal data, or
                   add it to an infected group.

          QNO      Impact of Cyber Risk                                                   New Course – (SM23)
          DAA.500 TITANIUM CNO -- DAA.160

                   Sukanya, a CA final student, is of the view that cyber risks are issues of IT and result only in information
                   loss to an entity. She also feels that many cyber-attacks are not directly targeted at financial systems and
                   do not pose risk of material misstatements to financial statements of an entity. Is her view proper?
          Answer
                   The cyber risks are not an issue of IT alone. Rather, it is a business risk and has an effect on whole business
                   organization. It affects entity’s reputation and can lead to many other consequences which are listed below:-

                     •  Regulatory costs
                     •  Business interruptions causing an operational challenge for an organization.
                     •  Data loss, reputational loss and litigation.
                     •  Ransomware - more common these days where entire systems are encrypted.
                     •  Intellectual property theft which may not only take the competitive advantage, but we may also result
                        in any impairment/impediment charge because of the loss of IP.
                     •  Incident response cost which could be for investigations & remediations
                     •  Breach of Privacy, if personal data of a consumer is hacked it could have a significant impact on the
                        organization.
                     •  Fines and penalties

                   It may happen that many cyber-attacks are not directly targeted at financial systems. However, the access
                   gained by the attackers may provide them the ability to:
                     •  Manipulate or modify financial records
                     •  Modify key automated business rules
                     •  Modify automated controls relied upon by the management.

                   Further, auditor should consider whether cyber risk (like other business risks) represents a risk of material
                   misstatement to the financial statement as part of the audit risk assessment activities. Focus should be on
                   understanding the cyber risks affecting the entity and the actions being taken to address these risks.


          QNO      Cyber security Framework                                               New Course – (SM23)
          DAA.600 TITANIUM CNO -- DAA.180
                   Briefly describe the cyber security Framework


                   The five pillars of Cybersecurity Framework:

                   1. Identify the Risk:
                   This involves understanding what assets you have (data, systems, applications) and what threats they face.
                   Think of it like mapping your valuables and potential entry points for a burglar.

                   2. Protect the Risk:
                   Once you know what needs protection, implement safeguards like firewalls, access controls, and encryption.
                   Imagine installing strong locks and an alarm system on your treasure chest.

                   3. Detect the Risk (Attacks):
                   Monitor your systems for suspicious activity that could indicate an attack. It's like having cameras and guards
                   constantly watching for intruders.
        www.auditguru.in                                                      PARAM                               12.3 | P a g e
   239   240   241   242   243   244   245   246   247   248   249