ISRM
ISRM
True/False Questions
Scenario-Based Questions
Scenario 1
Scenario 2
Scenario 3
Scenario 4
Scenario-Based Questions:
Scenario 5
1. Detail the steps to trace the origin of the malicious scripts using digital
auditing tools. What challenges might arise during this process?
o Steps:
▪ Use forensic imaging tools to capture and analyze the affected
system’s data.
▪ Apply network traffic analysis with Wireshark to trace
suspicious packet transfers.
▪ Use event correlation tools (e.g., Splunk) to link the activity to
the vendor's system.
o Challenges:
▪ Limited access to third-party systems.
BAIT 3 INFORMATION SECURITY AND
RISK MANAGEMENT TUTORIAL
SOLUTIONS
▪ Difficulty in distinguishing malicious scripts from normal
operations.
▪ Potential encryption of attack data by the attacker.
2. Discuss how third-party risk impacts fintech companies and propose
measures to audit third-party software security.
o Impact:
▪ Third-party vulnerabilities can directly affect customer data and
financial transactions, leading to financial loss and reputation
damage.
o Measures:
▪ Conduct regular security assessments and penetration testing of
third-party software.
▪ Require third parties to adhere to cybersecurity standards.
▪ Implement a robust vendor risk management framework and
monitor their security patches.
3. Design a comprehensive incident response plan for mitigating the effects
of this breach. Include steps for restoring customer trust and preventing
future occurrences.
o Incident Response Plan:
▪ Detection and Analysis: Identify and confirm the breach using
network and log analysis.
▪ Containment: Isolate the affected systems and prevent further
data leakage.
▪ Eradication and Recovery: Remove malicious scripts and
restore systems to a secure state.
BAIT 3 INFORMATION SECURITY AND
RISK MANAGEMENT TUTORIAL
SOLUTIONS
▪ Communication: Notify customers about the breach, outlining
what happened and what is being done.
▪ Prevention: Implement stronger security controls for third-
party software and continuous monitoring of system activities.
Scenario 6
1. Identify the flaws in the existing 2FA process and suggest improvements
to strengthen authentication mechanisms.
o Flaws:
▪ Weakness in the 2FA method used (e.g., SMS-based codes that
can be intercepted).
▪ Lack of time-based token expiration or multi-device
verification.
o Improvements:
▪ Use more secure 2FA methods, like app-based or hardware
tokens.
▪ Implement biometric authentication (fingerprint or face
recognition).
▪ Introduce adaptive authentication, where multiple factors are
considered based on risk levels.
BAIT 3 INFORMATION SECURITY AND
RISK MANAGEMENT TUTORIAL
SOLUTIONS
2. How can digital auditing techniques be used to identify patterns in the
unauthorized access attempts? Propose specific tools and approaches
for this investigation.
o Approach:
▪ Use UEBA to analyze user login times and geolocation data to
identify patterns of suspicious access.
▪ Apply Splunk for log aggregation and to track failed login
attempts, account lockouts, and other irregular activities.
3. What ethical obligations does the mobile banking provider have toward
its customers in addressing this issue? Discuss in the context of
Tanzanian cybercrime laws.
o Ethical obligations:
▪ Notify affected customers immediately and provide clear
information about the breach.
▪ Offer affected customers support (e.g., temporary account
freezing, fraud monitoring).
▪ Ensure that all measures are taken to prevent similar incidents.
▪ Comply with the Cybercrimes Act (2015) by reporting the
breach to authorities within the legally required time frame.
Scenario 7
Scenario 8
1. Explain how forensic imaging and audit trails can be used to identify
the source of the modifications. What challenges might be encountered
in this process?
o Forensic Imaging: Capture the system's hard drive to ensure a bit-by-
bit copy for investigation.
o Audit Trails: Review logs to track changes made to financial reports,
focusing on access times and users involved.
o Challenges:
▪ Potential tampering with logs or overwriting evidence.
▪ Difficulty identifying malicious insiders if access permissions
are too broad.
BAIT 3 INFORMATION SECURITY AND
RISK MANAGEMENT TUTORIAL
SOLUTIONS
2. Discuss the ethical responsibilities of the accounting firm in disclosing
this incident to clients and regulatory bodies.
o Ethical Responsibilities:
▪ Immediately inform affected clients and explain the nature of
the violation.
▪ Report the breach to regulatory bodies as required by law (e.g.,
Tanzanian Financial Reporting Regulations).
▪ Cooperate with authorities in resolving the incident and
ensuring transparency.
3. Recommend measures to prevent future integrity violations, including
digital timestamping and tamper-evident logs.
o Measures:
▪ Implement strong user access controls and separate duties to
prevent a single person from making critical changes.
▪ Use digital timestamping to record all changes made to reports,
ensuring a clear audit trail.
▪ Enable tamper-evident logs to ensure any unauthorized
modifications are easily detected.
Note:
Please keep in mind that these solutions are provided to help guide you through the
tutorial questions, but there may be occasional errors or differences in
BAIT 3 INFORMATION SECURITY AND
RISK MANAGEMENT TUTORIAL
SOLUTIONS
interpretation due to various factors (such as rounding, assumptions, or different
methods). I recommend reviewing the steps carefully and checking your own
understanding, as some answers may not be 100% accurate. If anything seems
unclear or doesn’t match your expectations, feel free to reach out and we can go
over it together!