Breach of firm's IT Systems by external parties

Below are the details of the operational risks covered within this selected sub-risk category:

info1

Theft of intangible assets in digital form

Risk Description: -

Theft or robbery of intangible assets in digital form E.g.:-



Unauthorised updates to information within firm's IT Systems for fraudulent purposes

Risk Description: -

External parties may exploit weaknesses in firm's IT Systems to execute updates to information within the IT Systems, where such updates enables involved external parties to commit fraud. Examples of updates may include: -