SlideShare a Scribd company logo
1 of 7
BOT AUDIT:
NECESSARY TO AVOID LOSS
OF INTEGRITY?
Types of bots
1. Web crawlers
2. Chat bots
3. Video game bots
4. Text reading algorithm
5. Robots
EXAMPLES
FIELDS OF OPERATION
WHAT DO BOTS DO?
In current scenario software bots
are everywhere. Tasks that they
perform are as follows:
-IT and Software Development
-Virtual Workforce
-Finance
-Office tasks
-Legal Tech
-Sales
-Marketing
-Content Writing
-HR
WHAT IS THIER AREA OF OPERATION
According to the Article,
-Regulatory Reporting Dashboards (Data privacy
standards, PCI DSS)
-Credit control Validation
-Customer Complaint Interface.
PROS AND CONS
Pros:
• Automates manual
repetitive tasks.
• 24-hour
availability
• Helps an
organization
deliver services
faster, better and
cheaper.
• Improved
customer service
and satisfaction.
• Monitoring
consumer data
Cons:
• Privacy issues.
• Security.
• Complex
interface.
• Inability to
understand.
THREATS AND SOLUTIONS
Solutions:
• Be extra careful with email
attachments.
• Ignore suspicious web ads
and pop ups
• Choose your internet
security software carefully.
• Make sure all your
software is updated.
Threats:
• Mass-spam delivery that
floods millions of inboxes in
a matter of seconds.
• DoS and DDoS attacks that
crash entire websites and can
put legitimate businesses in
serious trouble.
• Brute-force hacking attacks
by cracking passwords and
other internet security
measures.
• Identity theft and internet
fraud by collecting private
BOT AUDIT
Bot auditing is critical to ensure an organization has
a measured approach to development of bots.
Organizations should follow a “security by design”
framework.
Following are a few measures
•Business Process Controls in robotic environment
(SoX/ICOFR controls)
•Complying with regulatory requirements
(PCIDSS,Data privacy standards)
•Cybersecurity Controls
•Incident/Failover Controls
Bots have specific controls as part of their
implementation, thus organizations have to bring
relevant specific changes to their control
environment. This requires a multiskilled team which
consists of RPA technical architect, business analysts
and cybersecurity personnel.
WAY FORWARD
Verticals or activities where processes can be
automated have enormous scope for BOTs in the
near future . Few such examples are :-
1) Healthcare Sector
2) Sports Sector
3) Driverless Cars
Conclusion :-
Auditing of BOTs requires a multi-skilled team
which consists of RPA(Robotic process automation)
technical architects , business analysts and cyber
security personnel.
So the areas of their concern are as follows :-
1.Bot integrity(internal)
2.Bot security(external)
3.Setting a feedback loop(to curb BOT malfunction)

More Related Content

Similar to Bot audit

Security Design Considerations In Robotic Process Automation.docx
Security Design Considerations In Robotic Process Automation.docxSecurity Design Considerations In Robotic Process Automation.docx
Security Design Considerations In Robotic Process Automation.docxSridevi Kakolu
 
2018-10-25 Group RPA - AA Deck.pptx
2018-10-25 Group RPA - AA Deck.pptx2018-10-25 Group RPA - AA Deck.pptx
2018-10-25 Group RPA - AA Deck.pptxsaubhagya ranjan
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWinfosec train
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication Precisely
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?ITU
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Entering the Conversational Era with Chatbots for the Enterprise
Entering the Conversational Era with Chatbots for the EnterpriseEntering the Conversational Era with Chatbots for the Enterprise
Entering the Conversational Era with Chatbots for the EnterpriseAleisha McKeeby
 
IoT security Compliance Checklist
IoT security Compliance ChecklistIoT security Compliance Checklist
IoT security Compliance ChecklistPriyaNemade
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
The Road to Amazon and Beyond
The Road to Amazon and BeyondThe Road to Amazon and Beyond
The Road to Amazon and BeyondVasiliy Fomichev
 
How can insurers benefit from using ISO Electronic Rating Content?
How can insurers benefit from using ISO Electronic Rating Content?How can insurers benefit from using ISO Electronic Rating Content?
How can insurers benefit from using ISO Electronic Rating Content?ValueMomentum
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
The Nuts and Bolts of Bot Engineering
The Nuts and Bolts of Bot EngineeringThe Nuts and Bolts of Bot Engineering
The Nuts and Bolts of Bot EngineeringCognizant
 

Similar to Bot audit (20)

Security Design Considerations In Robotic Process Automation.docx
Security Design Considerations In Robotic Process Automation.docxSecurity Design Considerations In Robotic Process Automation.docx
Security Design Considerations In Robotic Process Automation.docx
 
2018-10-25 Group RPA - AA Deck.pptx
2018-10-25 Group RPA - AA Deck.pptx2018-10-25 Group RPA - AA Deck.pptx
2018-10-25 Group RPA - AA Deck.pptx
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Israel IT Market 2006 2008
Israel IT Market 2006 2008Israel IT Market 2006 2008
Israel IT Market 2006 2008
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 Effectively Defending Your IBM i from Malware with Multi-Factor Authentication  Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
 
IAM
IAMIAM
IAM
 
Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?Blockchains : Risk or Mitigation?
Blockchains : Risk or Mitigation?
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
ProjectReport_Finalversion
ProjectReport_FinalversionProjectReport_Finalversion
ProjectReport_Finalversion
 
Entering the Conversational Era with Chatbots for the Enterprise
Entering the Conversational Era with Chatbots for the EnterpriseEntering the Conversational Era with Chatbots for the Enterprise
Entering the Conversational Era with Chatbots for the Enterprise
 
IoT security compliance checklist
IoT security compliance checklistIoT security compliance checklist
IoT security compliance checklist
 
IoT security Compliance Checklist
IoT security Compliance ChecklistIoT security Compliance Checklist
IoT security Compliance Checklist
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
The Road to Amazon and Beyond
The Road to Amazon and BeyondThe Road to Amazon and Beyond
The Road to Amazon and Beyond
 
How can insurers benefit from using ISO Electronic Rating Content?
How can insurers benefit from using ISO Electronic Rating Content?How can insurers benefit from using ISO Electronic Rating Content?
How can insurers benefit from using ISO Electronic Rating Content?
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
The Nuts and Bolts of Bot Engineering
The Nuts and Bolts of Bot EngineeringThe Nuts and Bolts of Bot Engineering
The Nuts and Bolts of Bot Engineering
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Bot audit

  • 1. BOT AUDIT: NECESSARY TO AVOID LOSS OF INTEGRITY?
  • 2. Types of bots 1. Web crawlers 2. Chat bots 3. Video game bots 4. Text reading algorithm 5. Robots EXAMPLES
  • 3. FIELDS OF OPERATION WHAT DO BOTS DO? In current scenario software bots are everywhere. Tasks that they perform are as follows: -IT and Software Development -Virtual Workforce -Finance -Office tasks -Legal Tech -Sales -Marketing -Content Writing -HR WHAT IS THIER AREA OF OPERATION According to the Article, -Regulatory Reporting Dashboards (Data privacy standards, PCI DSS) -Credit control Validation -Customer Complaint Interface.
  • 4. PROS AND CONS Pros: • Automates manual repetitive tasks. • 24-hour availability • Helps an organization deliver services faster, better and cheaper. • Improved customer service and satisfaction. • Monitoring consumer data Cons: • Privacy issues. • Security. • Complex interface. • Inability to understand.
  • 5. THREATS AND SOLUTIONS Solutions: • Be extra careful with email attachments. • Ignore suspicious web ads and pop ups • Choose your internet security software carefully. • Make sure all your software is updated. Threats: • Mass-spam delivery that floods millions of inboxes in a matter of seconds. • DoS and DDoS attacks that crash entire websites and can put legitimate businesses in serious trouble. • Brute-force hacking attacks by cracking passwords and other internet security measures. • Identity theft and internet fraud by collecting private
  • 6. BOT AUDIT Bot auditing is critical to ensure an organization has a measured approach to development of bots. Organizations should follow a “security by design” framework. Following are a few measures •Business Process Controls in robotic environment (SoX/ICOFR controls) •Complying with regulatory requirements (PCIDSS,Data privacy standards) •Cybersecurity Controls •Incident/Failover Controls Bots have specific controls as part of their implementation, thus organizations have to bring relevant specific changes to their control environment. This requires a multiskilled team which consists of RPA technical architect, business analysts and cybersecurity personnel.
  • 7. WAY FORWARD Verticals or activities where processes can be automated have enormous scope for BOTs in the near future . Few such examples are :- 1) Healthcare Sector 2) Sports Sector 3) Driverless Cars Conclusion :- Auditing of BOTs requires a multi-skilled team which consists of RPA(Robotic process automation) technical architects , business analysts and cyber security personnel. So the areas of their concern are as follows :- 1.Bot integrity(internal) 2.Bot security(external) 3.Setting a feedback loop(to curb BOT malfunction)