CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.

Slides:



Advertisements
Similar presentations
Chapter 9 Analyzing Results Using The Income Statement
Advertisements

WorkSafe Victoria is a division of the Victorian WorkCover Authority Guidance Note on the Prevention of Bullying and Violence at Work Evaluation results.
Saving, borrowing and paying in Finland Spring 2011.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
8 - 1 ©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Audit Planning and Analytical Procedures Chapter 8.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
PW SHRM Law Summit Presentation Presented by HR 3D/Solutions 10/5/12 11  3 HR3D/Solutions.
Week 12 – Monday.  What did we talk about last time?  Security policies  Physical security  Lock picking.
Research Findings Aviation Safety Inspector Study February/March
Moving from Analysis to Design
A Look at the 2004 CSI/FBI Computer Crime and Security Survey Robert Richardson Editorial Director Computer Security Institute How to Use Statistics in.
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
Auditing II Unit 1 : Audit Procedures Unit 2: Audit of Limited Companies Unit 3: Audit of Government Companies.
FISCAL POSITION This coming year’s financial conditions, including rising costs, a down economy, and a troublesome State budget situation have.
RKM / BIA 2011 Business Outlook Survey (1 of 8) Research Design:  Systematic in-depth phone interviews with:  302 businesses with at least one location.
1 EventView 2009: Financial Services. 2 Overview EventView Background Status Key Performance Indicators Summary Trends Budget ROI Measurement Green Event-to-Experience.
E-Commerce And You Lake Buena Vista, Fl November 3, 2004 Roger Blake Roger Blake Senior Information Systems Officer National Credit Union Administration.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
(ISC) Global Workforce Study U.S. Government Results May 7, 2013.
7 - 1 ©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter 7.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
CHAPTER 9 Capital Investment Decision Basics
Conference on “Privatisation, Employment and Employees” PRIVATIZATION IN TURKEY: ISSUES REGARDING PUBLIC BALANCE, SOCIAL SECURITY AND EMPLOYMENT Gülsüm.
Reflections in the Mirror Non-FDIC Insured ▪ May Lose Value ▪ No Bank Guarantee American Century Investment Services, Inc. – Distributor ©2014 American.
FIN 40153: Advanced Corporate Finance CAPITAL BUDGETING (BASED ON RWJ CHAPTERS 6)
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter 8.
The 2009 HIMSS Security Survey: Insights into the Status of Healthcare Security Implementation sponsored by Symantec Meeting of the HIT Standards Committee,
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
Chapter 6 Investment Decision Rules
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter 8.
Chapter 8 Audit Planning 1.
RCL & Associates The Economic Return of Security Bob Lonadier, CISSP RCL & Associates.
Logging Antivirus Examples Use recent examples from media of such attacks (RSA, Epsilon, Oak Ridge National Labs, HBGary). Articles in business magazines.
3. What business ? Most Compelling Investment? One Effective Way to Lead in the Mid Market.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Audit Planning and Analytical Procedures Chapter 8.
1 EventView 2009: Life Sciences. 2 Overview EventView Background Status Key Performance Indicators Summary Trends Budget ROI Measurement Green Event-to-Experience.
FNB Estate Agent Survey - Home Buying Market 1st Quarter 2014 Survey Results 9 April 2014.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
McGraw-Hill/Irwin Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Moving from Analysis to Design.
The State of Computer & Data Security in Corporations Independent Survey.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Personal Income and Spending Published by: Bureau of Economics Analysis (BEA) Published by: Bureau of Economics Analysis (BEA) Frequency: monthly Frequency:
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
1 The Importance of Cost Control OH 1-1.
Problem #9 Test 2 Solution. Record Keeping and Budgeting Chapter Three Objective: Compute the average monthly expenditure.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
Analyzing Results Using The Income Statement Pertemuan 9 Matakuliah: V Operational Tata Hidang II Tahun: 2010.
Wage & Operations Survey 2009 © RB Publishing Inc. Respondent Demographics Mailing Systems Technology 2009 Wage & Operations Survey Results Mailing Systems.
©2005 Prentice Hall Business Publishing, Introduction to Management Accounting 13/e, Horngren/Sundem/Stratton Capital Budgeting Chapter 11.
Economic Pain Deepens for Churches; Despite Caution More Offer Aid Survey of 1,002 Protestant Pastors November 2009.
Framework Chapter 1 Panko, Corporate Computer and Network Security Copyright 2002 Prentice-Hall.
February 26, 2016 Paula M. Santa Assistant Director School Relations & Matching Gifts Point, Set, Match! How awesome are Matching Gifts! SAMPLE IMAGE.
TEL2813/IS2820 Security Management Cost-Benefit Analysis Net Present Value Model, Internal Rate of Return Model Return on Investment (Based on Book by.
CPA Canada Q Business Monitor Background document On behalf of: Chartered Professional Accountants of Canada May 6, 2016.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
Commonwealth Financial Network ® does not provide legal or tax advice. You should consult a legal or tax professional regarding your individual situation.
Essential Standard 4.00 Understanding the role of finance in business. 1.
What about Shelby County? 2016 Business Outlook 1.
Practice and Revision.
CSI Survey 2007 Tiffany Gorman
Cybercrime and Canadian Businesses
Forensic and Investigative Accounting
Figuring out CyberSecurity Return On Investment
2019 AFP Payments Fraud & Control Survey
Presentation transcript:

CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 2 of 31

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 3 of 31 Eleven Key Findings for the 2005 Survey General Note: the number of responses increased dramatically in the 2005 survey, going from 494 responses in 2004 to 700 responses in 2005, even though the sample size remained the same. This was likely due in some measure to an increase in the number of reminders sent to the sample group. ❏ Virus attacks continue as the source of the greatest financial losses. Unauthorized access, however, showed a dramatic cost increase and replaced denial of service as the second most significant contributor to computer crime losses during the past year.

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 4 of 31 Eleven Findings for the 2005 Survey - 2 ❏ Unauthorized use of computer systems has increased slightly according to the respondents, but the total dollar amount of financial losses resulting from cyber crime is decreasing. Since the total number of respondents has dramatically increased, this implies a dramatic decrease in average total losses per respondent. Two specific areas (unauthorized access to information and theft of proprietary information) did show significant increases in average loss per respondent. ❏ Web site incidents have increased dramatically. ❏ State governments currently have both the largest information security operating expense and investment per employee of all industry/government segments.

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 5 of 31 Eleven Findings for the 2005 Survey - 3 ❏ Despite talk of increasing outsourcing, the survey results related to outsourcing are nearly identical to those reported last year and indicate very little outsourcing of information security activities. Among those organizations that do outsource some computer security activities, the percentage of activities outsourced is quite low. ❏ Use of cyber insurance remains low (i.e., cyber security insurance is not catching on despite the numerous articles that now discuss the emerging role of cyber security insurance). ❏ The percentage of organizations reporting computer intrusions to law enforcement has continued its multi-year decline. The key reason cited for not reporting intrusions to law enforcement is the concern for negative publicity.

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 6 of 31 Eleven Findings for the 2005 Survey - 4 ❏ A significant number of organizations conduct some form of economic evaluation of their security expenditures, with 38 percent using Return on Investment (ROI), 19 percent using Internal Rate of Return (IRR) and 18 percent using Net Present Value (NPV). ❏ Over 87 percent of the organizations conduct security audits, up from 82 percent in last year’s survey. ❏ The Sarbanes-Oxley Act has begun to have an impact on information security in more industry sectors than last year. ❏ The vast majority of respondents view security awareness training as important. However, (on average) respondents from all sectors do not believe their organization invests enough in it.

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 7 of 31 Survey Respondents by Industry

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 8 of 31 Respondents by Number of Employees

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 9 of 31 Survey Respondents by Revenue

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 10 of 31 Survey Respondents by Job Description

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 11 of 31 Percentage of IT Budget on Security

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 12 of 31 Computer Security Expenses / Employee

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 13 of 31 Computer Security Expenditure / Employee

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 14 of 31 Average Security Investment / Employee

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 15 of 31 Organizations using Metrics

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 16 of 31 Percentage Of Security Function Outsourced

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 17 of 31 Average Percent of Security Outsourced

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 18 of 31 External Insurance Against Risks

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 19 of 31 Unauthorized Use in Last 12 Months

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 20 of 31 Survey

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 21 of 31

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 22 of 31 Web Site Percentage Security Incidents

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 23 of 31

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 24 of 31 Security Technologies Used

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 25 of 31 Organizations Conduction Security Audits

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 26 of 31 Invest Appropriately on Security Awareness

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 27 of 31 Importance of Security Awareness Training

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 28 of 31 After Intrusion, What Actions Taken

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 29 of 31 Why Not Report to Law Enforcement?

CSI/FBI Crime Survey 2006 J. Scott 2006 Page 30 of 31 Percent of Organizations Sharing Information

CSI/FBI Crime SurveyJ. Scott 2006 Page 31 of 31 Survey