Preview

a rogue trader at societe generale roils the world financial system

Better Essays
Open Document
Open Document
1209 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
a rogue trader at societe generale roils the world financial system
A Rogue Trader at Societe Generale Roils the World Financial System.

1. What concepts in this chapter are illustrated in this case?
System vulnerabilities
Computer crime: using computers as instruments of crime to defraud the bank, customers, and other financial institutions
Internal threats from employees: Jerome Kerviel has access to privileged information; he was able to run through the organizations system without leaving a trace
Business value of security and control: Organizations can be held liable for needless risk and harm created if the organization fails to take appropriate protective action to prevent loss of confidential information, data, corruption, or breach of privacy
Information system controls: General controls: govern the design, security, and use of computer programs and the security of data files in general throughout the organizational information technology infrastructure
Application controls: automated and manual procedures that ensure that only authorized data are completely and accurately processed by that application
Risk assessment: determines the level of risk to the firm if a specific activity or process is not properly controlled
Security policy: drives policies determining acceptable use of the firms information resources and which members of the company have access to its information assets
The role of auditing: an MIS audit examines the firms overall security environment as well as controls governing individual information systems

2. Describe the control weaknesses at SocGen. What management, organization, and technology factors contributed to those weaknesses?

One former SocGen risk auditor, Maxime Legrand, called the control procedures used to monitor the activity of its traders a sham and that the management pretend(s) to have an inspection to please the banking commission.

Management: Jerome Kerviel’s supervisors saw a balanced book when in fact he was exposing the bank to substantial risk because of

You May Also Find These Documents Helpful

  • Good Essays

    Acct 504 Case Study 2

    • 1426 Words
    • 5 Pages

    Risk assessment – The organization must identify and analyze the different factors that generate risk for the business and must decide how to manage these risks. Because economic industry, regulatory and operating conditions will continue to change. (coso)…

    • 1426 Words
    • 5 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What are the different types of control systems? What are some advantages and disadvantages of the various control mechanisms? How does your organization use the steps of the control process?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Xastray

    • 276 Words
    • 2 Pages

    The “Mind Map” – “CISSP.pdf” is a list of all areas you need to learn.…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete situation and a recognized threat, it is also called a hazard. Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probabilit that the loss will occur. Acceptable risk is a risk that is understood and tolerated usually because the cost or difficulty of implementing an effective countermeasure for the associated vulnerability exceeds the expectation of loss.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Bernard Madoff is most prominently known by the public as the man responsible for the largest known Ponzi scheme in the United State’s history. Madoff ran his Ponzi scheme through the company he founded, Bernard L. Madoff Investment Securities (BLMIS). Bernard was taking investor’s money spending it for personal gain while simultaneously coaxing new investors and using their investments to pay off the old investors. When Bernard’s scheme was uncovered in 2008 it had reached a total of 50 billion dollars. Ultimately Madoff’s Ponzi scheme was shut down on December 11, 2008 with his arrest and closing of his company; however, the aftermath would be felt for many years to come. As a result of such an enormous fraud case many people’s lives would…

    • 854 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Technical Controls

    • 875 Words
    • 4 Pages

    Technical controls use software and hardware resources to control access to information and computing systems, to help mitigate the potential for errors and blatant security policy violations. Examples of technical controls include passwords, network- and host-based firewalls, network intrusion detection systems, and access control lists and data encryption. Associated with technical controls is the Principle of Least Privilege, which requires that an individual, program, or system process is not granted any more access privileges than are necessary to perform the task.…

    • 875 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Goodner Brothers

    • 327 Words
    • 2 Pages

    2. The key internal control weaknesses that were evident in the Huntington unit’s operations are “inadequate control over safeguarding of assets; inadequate segregation of duties; Inadequate design of IT general and application controls that prevent the information system from providing complete and accurate information consistent with financial reporting objectives and current needs; Employees or management who lack the qualifications and training to fulfill their assigned functions; Inadequate design of monitoring controls used to assess the design and operating effectiveness of the entity's internal control over time.” (AU325)…

    • 327 Words
    • 2 Pages
    Good Essays
  • Better Essays

    This case study we will identify the underlying reasons as to why Mr Kerviel found it necessary to carry out this fraudulent activity and how he accomplished this. We will also analyse Soc Gen’s reaction and response to his activities and did they take the appropriate steps to overcome these? And finally, what would have been the outcome if this was uncovered as a rogue trading scandal resulting in a profitable position rather than a €4.9bn loss?…

    • 2899 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    The magnitude of the crisis was further fueled by Knight’s initial lack-luster response. As a flood of faulty trades were executed that fateful August 1st morning from a Knight Capital trading program, no one at the firm managed to stop it for more than a half-hour. This is critical because in a market of high frequency and speed, trading losses can pile up in seconds. According to unconfirmed reports, alarming messages were sent to Knight managers, who failed to act in time - executives typically have a simple command that can immediately halt trading.…

    • 1202 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Information Security

    • 2381 Words
    • 10 Pages

    Executive Summary Key Report Findings  Page 4: Insiders Considered Greatest Organizational Security Threat  Page 5: Privileged Accounts Are Increasingly Targeted – Regardless of Attack Entry Point  Page 5: High Profile Security Incidents Impact Organizational Security Strategies  Page 6: Organizations are taking a broad approach to security in 2012  Page 7: Increasing Number of Organizations at Risk by Failing to Monitor Privileged Accounts  Page 8: Motivated Insiders Get Around Current Controls  Page 8: Employees Accessing Unauthorized Information  Page 9: Administrative Passwords – Wide Ranging Access  Page 10: Employees Plan on Taking Privileged Passwords on Way Out  Page 12: Intellectual Property – Competitive Theft  Page 13: Data Breach Notification Laws Fail to Curb Data Loss…

    • 2381 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Introduction Objectives Objectives Upon completion of this chapter, you should be able to: Define security Describe Describe an information system and its components Define database management system functionalities Outline the concept of information security Identify the major components of information security architecture Define database security…

    • 1816 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Audit assignment

    • 440 Words
    • 2 Pages

    Business owners may be unaware of the best internal control audit systems to implement in the company. This lack of knowledge makes it difficult…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    1 lave you heard the phrase "garbage in, garbage out" (GIGO)? Figure 11 shows why controls are needed for the proper entry of data into an information system. Examples include passwords and other security codes, formatted data entry scrccns, audible error signals, templates over the keys of key-driven input devices, and prerecorded and prenumbered forms. Input of source documents can also be controlled by registering them in a logbook when they are received by data entry personnel. Realtime systems that use direct acccss Files frequently record all entries into the system on magnetic tape control logs that preserve evidence of all system inputs.…

    • 1493 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Cis Environment

    • 1270 Words
    • 6 Pages

    3. Enumerate and describe each of the five (5) general controls in a CIS environment.…

    • 1270 Words
    • 6 Pages
    Good Essays