BTCA 405 Case Study
BTCA 405 Case Study
framework. The initiative was triggered by an increasing number of cyber threats in the
fintech industry, along with the need to comply with evolving regulatory requirements and to
adopt COBIT for IT governance to align its IT operations with the business objectives and to
ensure regulatory compliance. The COBIT framework helped Secure Tech establish clear
policies for IT management, set objectives for IT performance, and implement a structured
including cyber threats, data breaches, and system failures. The company then developed a
measures, regular IT audits, and employee training programs on IT security best practices.
SecureTech developed a robust business continuity plan (BCP) and disaster recovery (DR)
strategy. This included the establishment of an off-site data backup system, the
i. Indicate in three (3) ways how the adoption of the COBIT framework benefit
1
iii. What measures did SecureTech take to ensure effective business continuity and
disaster recovery?
Case Study 2
FinTech Inc., renowned for its innovative financial technology solutions, faced a critical
challenge when it fell victim to a substantial data breach. This incident led to the
details, credit card numbers, and personal identification data. The breach not only jeopardized
customer trust but also exposed the company to significant regulatory scrutiny.
The breach's origin was traced back to a sophisticated phishing attack targeting company
employees. The attackers crafted a highly convincing email, purportedly from the company’s
link. One employee, deceived by the email's authenticity, complied, thereby providing the
attackers with access credentials. Upon gaining entry into FinTech Inc.'s network, the
rendered its data transmissions vulnerable to interception and decryption by the attackers.
Ineffective Endpoint Protection: The endpoint security solutions deployed by FinTech Inc.
were not updated to detect or prevent the latest malware and intrusion tactics used by the
attackers.
Lack of Anomaly Detection: The absence of advanced anomaly detection tools meant that
unusual network activity, such as the unauthorized exfiltration of large volumes of data, went
unnoticed.
2
The breach remained undetected for two weeks, during which the attackers systematically
accessed and exfiltrated sensitive customer data. The delay in detection compounded the
breach's severity, allowing the attackers ample time to exploit the accessed information,
Required
The adoption of the COBIT framework benefits SecureTech company Limited in the
following ways:
directly contribute to the company's overall goals. This alignment enhances efficiency
3
and mitigate IT risks effectively. By implementing COBIT's risk management
practices, SecureTech enhances its resilience to cyber threats, data breaches, and
system failures, thereby safeguarding its assets and maintaining business continuity.
cybersecurity measures to protect its IT infrastructure, systems, and data from cyber
threats. These measures may include network firewalls, intrusion detection systems,
of its security controls, policies, and procedures. These audits help identify
educate its workforce on IT security best practices and raise awareness about potential
risks. These training programs cover topics such as phishing awareness, password
strengthens its overall security culture and reduces the likelihood of human error-
iii. Measures Taken by SecureTech for Effective Business Continuity and Disaster Recovery:
4
1. Robust Business Continuity Plan (BCP): SecureTech develops a comprehensive
BCP to ensure the continued operation of critical business functions during and after a
disaster. The BCP outlines procedures, roles, and responsibilities for responding to
failures.
strategy to recover IT systems and data in the event of a disruption. This strategy
includes the establishment of off-site data backups, replication of critical systems, and
3. Regular BCP/DR Drills: SecureTech conducts regular drills and exercises to test the
effectiveness of its BCP and DR plans. These drills simulate various disaster
scenarios and allow SecureTech to identify weaknesses, refine procedures, and train
As an Information System Auditor, assessing the situation of FinTech Inc. reveals several
critical issues that contributed to the data breach and its severity:
1. Phishing Vulnerability: The data breach originated from a successful phishing attack
targeting company employees. This indicates a lack of robust email security measures
and employee training programs to recognize and report phishing attempts. FinTech
Inc. should implement comprehensive phishing awareness training for all employees
and enhance email security measures such as email authentication protocols and spam
filters.
5
2. Outdated Encryption Standards: FinTech Inc.'s reliance on legacy encryption
This highlights a failure to keep pace with evolving cybersecurity best practices and
FinTech Inc. were not updated to detect or prevent the latest malware and intrusion
and a failure to regularly update security software and patches. FinTech Inc. should
meant that unusual network activity, such as unauthorized data exfiltration, went
unnoticed for two weeks. This highlights a deficiency in the company's network
monitoring and detection capabilities. FinTech Inc. should implement robust intrusion
5. Delayed Detection: The breach remained undetected for two weeks, allowing
attackers ample time to access and exfiltrate sensitive customer data. This indicates a
failure in FinTech Inc.'s incident response and detection processes. The company
and assessments, and implement incident response procedures to promptly detect and
6
Overall, FinTech Inc. faces significant cybersecurity challenges stemming from
monitoring, and incident response processes. Addressing these issues requires a holistic