Week 12 – Monday.  What did we talk about last time?  Security policies  Physical security  Lock picking.

Slides:



Advertisements
Similar presentations
MANAGERIAL ACCOUNTING
Advertisements

Project Selection (Ch 4)
Capital Budgeting Last Update Copyright Kenneth M. Chipps Ph.D
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Systems Analysis and Design 9th Edition
Security Controls – What Works
1 An Overview of Computer Security computer security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright 2006 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Third Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Copyright 2004 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Second Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Chapter.
Computer Security: Principles and Practice
Introduction to Network Defense
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
IT Assurance and Reliability Why Should You Care? Richard Oppenheim, CPA, CITP President, SysTrust Services Corporation Presented to ISACA Regional Meeting.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Management and Cost Accounting, 6 th edition, ISBN © 2004 Colin Drury Management and Cost Accounting, 6 th edition, ISBN ©
Capital expenditure decisions: an introduction
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
©2002 Prentice Hall Business Publishing, Introduction to Management Accounting 12/e, Horngren/Sundem/Stratton Chapter 11 Capital Budgeting.
Models for Estimating Risk and Optimizing the Return on Security Investment.
CHAPTER 9 Capital Investment Decision Basics
Conostix S.A. Sensible defence.
Revision Lecture Risk Management. Exam There will be 2 and a half questions from the topics operational risk, market risk, foreign exchange risk, interest.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Capital Budgeting The Capital Budgeting Decision Time Value of Money Methods of Capital Project Evaluation Cash Flows Capital Rationing The Value of a.
1 Copyright © 2008 Cengage Learning South-Western Heitger/Mowen/Hansen Capital Investment Decisions Chapter Twelve Fundamental Cornerstones of Managerial.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Copyright 2001 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Chapter 3 Systems Planning and Selection 3.1.
McGraw-Hill/Irwin Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Moving from Analysis to Design.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Why evaluate information technology investments? Pertemuan Matakuliah: A Evaluasi Efektivitas Sistem Informasi Tahun: 2006.
Note1 (Admi1) Overview of administering security.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Security Administration. Links to Text Chapter 8 Parts of Chapter 5 Parts of Chapter 1.
©2005 Prentice Hall Business Publishing, Introduction to Management Accounting 13/e, Horngren/Sundem/Stratton ©2008 Prentice Hall Business Publishing,
Auditing Internal Control Studies & Risk Assessment Chapter 9 Internal Control Studies & Risk Assessment Chapter 9.
111 © 2005 EMC Corporation. All rights reserved. Achieving Business Resilience 2005 Business Continuity and Corporate Security Show & Conference Stephen.
R.HARIHARAN AP/EEE. Introduction  Investment policy is a statement about the objectives, risk tolerance, and constraints the portfolio faces ◦ A statement.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
©2005 Prentice Hall Business Publishing, Introduction to Management Accounting 13/e, Horngren/Sundem/Stratton Capital Budgeting Chapter 11.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
How Projects Get Started Conducting a Project Assessment 1.
PRESENTATION ON FINANCIAL COMPONENT OF A BUSINESS PLAN BY AHMeD Hussain Khan.
MIS323 – Business Telecommunications Chapter 10 Security.
CYBER SECURITY & ITS IMPACT ON FINANCIAL STATEMENTS AUDITS BOB WAGNER TUESDAY, NOVEMBER FLORIDA SCHOOL FINANCE OFFICERS ASSOCIATION CONFERENCE.
TEL2813/IS2820 Security Management Cost-Benefit Analysis Net Present Value Model, Internal Rate of Return Model Return on Investment (Based on Book by.
Copyright  2006 McGraw-Hill Australia Pty Ltd PPTs t/a Management Accounting: Information for managing and creating value 4e Slides prepared by Kim Langfield-Smith.
Week 14 - Wednesday.  What did we talk about last time?  Ethics case studies.
Week 14 - Friday.  What did we talk about last time?  Finished ethics case studies  Codes of ethics.
Securing Information Systems
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Introduction to Business (MRK 151)
Securing Information Systems
CSI Survey 2007 Tiffany Gorman
Information Security: Risk Management or Business Enablement?
Cybercrime and Canadian Businesses
Forensic and Investigative Accounting
CyberSecurity Strategy For Defendable ROI
Presentation transcript:

Week 12 – Monday

 What did we talk about last time?  Security policies  Physical security  Lock picking

Graham Welsh

 If you do IT, you may need to make a case for spending money on security  For your own benefit (because it justifies your position)  For the business's benefit (because a security problem could be costly)  You shouldn't lie or exaggerate  Your proposal should be based on real improvements that are likely to cost the company less in the long run  You should use business language so that the proposal can be compared to other non-security and non-IT proposals

 A business case is a proposal that justifies an expenditure, usually including:  A description of the problem you're trying to solve  A list of possible solutions  Constraints on solving the problem  A list of assumptions  Analysis of each alternative ▪ Risks ▪ Costs ▪ Benefits  A summary of why your proposal is best

 Research suggests that investments should be considered from the following perspectives:  Customer – keeping customers happy  Operational – keeping your business running smoothly  Financial – return on investment or share price  Improvement – affect on market leadership  Companies tend to focus only on the financial perspective because it is the easiest to measure

 Companies can be reluctant to invest in security  Surveys suggest that these are the motivating influences: CategoryImportance Regulatory requirement30.1% History or IT staff knowledge18.9% Client requirement or request16.2% Internal or external audit12.4% Current events and media attention8.2% Response to compromised internal security7.3% Reaction to external mandate or request5.0% Other1.7%

 Businesses care about money  But there are several different ways to evaluate the economic value of a decision  Net present value  Internal rate of return  Return on investment  Is spending this money now a good idea? We could invest it instead  Measuring IT impact in general is difficult  People only see how their life is changed after the fact

 Net present value (NPV) of a proposal is the present value of benefits minus the value of the initial investment  NPV looks at the lifetime of a project  Example:  Spending $100 today could earn a profit of $200 in 5 years  But, investing $100 could yield $170 in 5 years  NPV = $200 - $170 = $30  A positive NPV is a good proposal, and a negative is not

 The internal rate of return (IRR) is the discount rate that makes NPV zero  In other words, how good of an investment is your proposal?  Return on investment (ROI) is the last period's profits divided by the cost of the investments needed to realize the profits  ROI is a measure of how the company has performed  IRR and NPV are estimates of future performance

 The accounting ideas from the previous section depend on measuring the benefits of security  Difficult  We can relatively easily list:  Assets needing protection  Vulnerabilities in a system  Threats to a system  But what is the impact when an attack happens?

 We need data to make decisions  National and global data about security measures how cybersecurity affects national and international economies  Enterprise data lets us see how companies are preventing and recovering from attacks and how much it costs  Technology data outlines the attacks that are possible or common  The data needs to be:  Accurate  Consistent  Timely  Reliable

 We will list the results from a number of surveys, starting with the Information Security Breaches Survey (ISBS) from 2006 about cost of security incidents in the UK Overall Change Change for Large Businesses Companies affectedDown 20%Down 10% Median number of incidents at affected companies Up 50%Down 30% Average cost of each incidentUp 20%Down 10% Total change in cost of incidentsUp 50%Down 50%

 5,000 information security practitioners surveyed in 2005, 699 responded  Key findings:  Viruses are the largest source of financial loss  Unauthorized access went up, replacing DoS as the second greatest source of loss  The total dollar amount of financial loss from cyber crime is decreasing  Companies are reporting intrusions less because of negative publicity  87% of respondents conduct security audits, increased from 82% in the previous survey

 540 security officers surveyed in 2005, 188 responded  Key findings:  35% experienced attacks that affected CIA in 2005, 49% in 2004, and 42% in 2003  Insider attacks stayed at a constant 37% over three years  Viruses were the most prevalent attack  DoS caused the most financial loss  37% of respondents used security standards in 2003 but 65% used them in 2005

 Given in 2005  Key findings:  Organizations have improved security, making them less attractive to hackers  Humans are the weakest link, falling prey to phishing and pharming  17% of respondents think government regulations are very effective, and 50% think they are effective  Chief information security officers are reporting to the highest levels of the organization more and more

 Given in 2004  Key findings:  1 in 5 respondents strongly agreed that their organization put information security as a priority  Lack of security awareness by users is the top problem  But only 28% of respondents put raising employee awareness as a top initiative  Top concerns were viruses, Trojans, and worms with employee misconduct a distant second  Less than half of the respondents provide ongoing employee security training  1 in 4 thought their information security departments were successful at meeting organizational needs

 231,000 complaints in 2005  Key findings:  Almost 100,000 complaints were referred to law enforcement  Most cases involved fraud with a total loss of $182 million and a median loss of $424 per complainant  Internet auction fraud at 62.7% was the most common  Nondelivered merchandise or nonpayment was 16%  Credit card fraud was 7%  More than 75% of perpetrators were male  Half lived in CA, NY, FL, TX, IL, PA, or OH  For every dollar lost by a woman, $1.86 was lost by a man  Super Bowl ticket scams, phishing attempts, reshipping, eBay account takeovers, natural disaster fraud, and international lottery scams had high activity

 Surveyed 204 information technology and storage managers in 2004  Key findings:  Most companies have no formal data backup or storage procedures, relying on individual initiative  viruses are the main reason companies change their data protection procedures  Regular testing of disaster recovery procedures is not a common practice

 Surveyed 2,196 security practitioners in 2002, looking at the impact of business size  Key findings:  Security spending per user and per machine decreases as organization size increases  Allocating money for security does not reduce the probability of being attack but does help detect losses  Most organizations do not have a security culture or an incident response pan

 Surveys measure different things  Some have conflicting results  We can't know the level of expertise of the respondents in many cases  Regular users vs. security officers  Surveys were mostly voluntary  People who care about security or have recently had an incident are more likely to respond  Categories are inconsistent  "Electronic attacks" vs. "security incidents"  Are these the same things?

 Some of these surveys say that costs are going up  Others say cost is going down  The ICSA 2004 survey claimed that "respondents in our survey historically underestimate costs by a factor of 7 to 10"  How do they even know that?  Conclusions:  Viruses are bad  Phishing is bad  We should have better training and policies  We should have better surveys

 Modeling security

 Keep reading Chapter 9  Keep working on Project 3 Phase 1  Ack! Actually due on Thursday, April 17, unlike originally stated