Preview

a rogue trader at societe generale roils the world financial system

Better Essays
Open Document
Open Document
1209 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
a rogue trader at societe generale roils the world financial system
A Rogue Trader at Societe Generale Roils the World Financial System.

1. What concepts in this chapter are illustrated in this case?
System vulnerabilities
Computer crime: using computers as instruments of crime to defraud the bank, customers, and other financial institutions
Internal threats from employees: Jerome Kerviel has access to privileged information; he was able to run through the organizations system without leaving a trace
Business value of security and control: Organizations can be held liable for needless risk and harm created if the organization fails to take appropriate protective action to prevent loss of confidential information, data, corruption, or breach of privacy
Information system controls: General controls: govern the design, security, and use of computer programs and the security of data files in general throughout the organizational information technology infrastructure
Application controls: automated and manual procedures that ensure that only authorized data are completely and accurately processed by that application
Risk assessment: determines the level of risk to the firm if a specific activity or process is not properly controlled
Security policy: drives policies determining acceptable use of the firms information resources and which members of the company have access to its information assets
The role of auditing: an MIS audit examines the firms overall security environment as well as controls governing individual information systems

2. Describe the control weaknesses at SocGen. What management, organization, and technology factors contributed to those weaknesses?

One former SocGen risk auditor, Maxime Legrand, called the control procedures used to monitor the activity of its traders a sham and that the management pretend(s) to have an inspection to please the banking commission.

Management: Jerome Kerviel’s supervisors saw a balanced book when in fact he was exposing the bank to substantial risk because of

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    A popular saying is, “inspect what you expect,” and this is definitely true in the area of IT information security auditing. The goal should not be to catch rule breakers, but rather to work with IT and the business to ensure nothing slips through the cracks and that solid practices are always followed. Doing this will go a long way to ensuring and maintaining the expected information security policy of the…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What are the different types of control systems? What are some advantages and disadvantages of the various control mechanisms? How does your organization use the steps of the control process?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Xastray

    • 276 Words
    • 2 Pages

    The “Mind Map” – “CISSP.pdf” is a list of all areas you need to learn.…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Bernard Madoff is most prominently known by the public as the man responsible for the largest known Ponzi scheme in the United State’s history. Madoff ran his Ponzi scheme through the company he founded, Bernard L. Madoff Investment Securities (BLMIS). Bernard was taking investor’s money spending it for personal gain while simultaneously coaxing new investors and using their investments to pay off the old investors. When Bernard’s scheme was uncovered in 2008 it had reached a total of 50 billion dollars. Ultimately Madoff’s Ponzi scheme was shut down on December 11, 2008 with his arrest and closing of his company; however, the aftermath would be felt for many years to come. As a result of such an enormous fraud case many people’s lives would…

    • 854 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Goodner Brothers

    • 327 Words
    • 2 Pages

    2. The key internal control weaknesses that were evident in the Huntington unit’s operations are “inadequate control over safeguarding of assets; inadequate segregation of duties; Inadequate design of IT general and application controls that prevent the information system from providing complete and accurate information consistent with financial reporting objectives and current needs; Employees or management who lack the qualifications and training to fulfill their assigned functions; Inadequate design of monitoring controls used to assess the design and operating effectiveness of the entity's internal control over time.” (AU325)…

    • 327 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This case study we will identify the underlying reasons as to why Mr Kerviel found it necessary to carry out this fraudulent activity and how he accomplished this. We will also analyse Soc Gen’s reaction and response to his activities and did they take the appropriate steps to overcome these? And finally, what would have been the outcome if this was uncovered as a rogue trading scandal resulting in a profitable position rather than a €4.9bn loss?…

    • 2899 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    The magnitude of the crisis was further fueled by Knight’s initial lack-luster response. As a flood of faulty trades were executed that fateful August 1st morning from a Knight Capital trading program, no one at the firm managed to stop it for more than a half-hour. This is critical because in a market of high frequency and speed, trading losses can pile up in seconds. According to unconfirmed reports, alarming messages were sent to Knight managers, who failed to act in time - executives typically have a simple command that can immediately halt trading.…

    • 1202 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Information system controls arc methods and deviccs that attempt to ensure the accuracy, validity, and propriety of information system activities. Controls must be developed to ensure proper data entry, processing techniques, storage methods, and information output. Thus, information system controls are designed to monitor and maintain the quality and security of the input, processing, output, and storage activities of any information system.…

    • 1493 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    Executive Summary Key Report Findings  Page 4: Insiders Considered Greatest Organizational Security Threat  Page 5: Privileged Accounts Are Increasingly Targeted – Regardless of Attack Entry Point  Page 5: High Profile Security Incidents Impact Organizational Security Strategies  Page 6: Organizations are taking a broad approach to security in 2012  Page 7: Increasing Number of Organizations at Risk by Failing to Monitor Privileged Accounts  Page 8: Motivated Insiders Get Around Current Controls  Page 8: Employees Accessing Unauthorized Information  Page 9: Administrative Passwords – Wide Ranging Access  Page 10: Employees Plan on Taking Privileged Passwords on Way Out  Page 12: Intellectual Property – Competitive Theft  Page 13: Data Breach Notification Laws Fail to Curb Data Loss…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cis Environment

    • 1270 Words
    • 6 Pages

    General controls are those control policies and procedures that relate to the overall computer information system. The purpose of general CIS controls is to establish a framework of overall controls over the CIS activities and to provide a reasonable assurance that the overall objectives of internal control are achieved. These may include:…

    • 1270 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Audit assignment

    • 440 Words
    • 2 Pages

    Business owners may be unaware of the best internal control audit systems to implement in the company. This lack of knowledge makes it difficult…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Introduction Objectives Objectives Upon completion of this chapter, you should be able to: Define security Describe Describe an information system and its components Define database management system functionalities Outline the concept of information security Identify the major components of information security architecture Define database security…

    • 1816 Words
    • 8 Pages
    Powerful Essays