Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
Forecasting Computer Crime Complaints Adnan Omar Ada Kwanbunbumpen David Alijani.
CSI 2005 Computer Crime Survey Put together by J. Scott, 2006 Using Graphics and Text from the Published CSI/FBI 2005 Crime Survey.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security, Continuity & Compliance Gordon McKenzie Business Development Director, Syan Limited.
Introduction Security is a major networking concern. 90% of the respondents to the 2004 Computer Security Institute/FBI Computer Crime and Security Survey.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Did You Know? Number of spam s sent each day? 100 billion.
Disaster Prevention and Recovery Presented By: Sean Snodgrass and Theodore Smith.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
VIRTUAL BUSINESS RETAILING
Securing Information Systems
The IS Security Problem GP Dhillon, Ph. D. Associate Professor of IS, VCU
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
WHAT IS IT? Also called Identity Fraud, Identity Theft is when an individual uses another persons identifying information, such as name, social security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
An Investigation into E-Banking Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 20 March 2004.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
The State of Computer & Data Security in Corporations Independent Survey.
March 21, 2012 John Vigouroux CEO M86 Security (acquired by Trustwave)
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Topic 5: Basic Security.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
Information Security: Current Threats Marc Scarborough Information Security Officer
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 The 28 th Annual International Computer Software and Applications Conference COMPSAC 2004 Hong Kong September 28, :30 am – 12:00 noon Session.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Securing Information Systems
Chapter 1: Exploring the Network
IT Security  .
What is an anonymous reporting hotline?
Securing Information Systems
Philip Nichilo Vincent Carestia
Forensic and Investigative Accounting
What is an anonymous reporting hotline?
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Figuring out CyberSecurity Return On Investment
SECURITY IN THE DIGITAL AGE
Sam elkholy Director, systems engineering
Presentation transcript:

Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan

Agenda 1. Introduction--Kim 2. Problem Description---WA 3. Definition of Concepts---WA 4. Data Analysis ----Manish 5. Major Findings: ----Saro 6. Conclusions & Recommendations ---Kim

Introduction Analyzed Security Issues Security related concerns in organizations Money spent on Internet Security

Problem Description Digital data is being exposed to higher risk factors Spam gaining momentum worldwide Intrusion can result in data theft, permanent data damages, and complete data loss Internet security breach is becoming the biggest, potential threat to data loss in the 21st century

Definition of Concepts and Terms Viruses and Worms Spam Spyware Eavesdropping

Data Analysis - Primary Data We conducted a survey for collecting Primary Data : How comfortable you feel using the Internet for money related transactions? (Comfort levels 1 (Low) & 5 (High)) Did you conduct any money or credit transaction over the Internet in the past month? If yes, how many? Were you or anyone you know a victim of Internet identity theft? How many times were you attacked by spam, virus…in the past 6 months? What percentage of junk s received in past 3 months?

The median comfort level for money related transactions via the Internet was 4. Survey Results

The median number of transactions processed via the Internet was 5.

Only one participant had been a victim of Internet identity theft.

Seven participants had been attacked by spam/virus.

The median number of junk s received was twenty percent.

Inferences from Primary Data People are comfortable making money related transactions via the internet. Internet users are attacked by spam and virus and have been victims of identity theft. A significant amount of received by internet users is spam or junk .

Data Analysis - Secondary Data The number of daily spam outbreak shoot up to 1,600,000 per day in the year (Internet Security Solutions, 2005). Known computer viruses grew by 28,327 in 2004 to bring the number of old and new viruses to 112,438, according to IBM (Security Statistics, 2005). The market for web intrusion protection services and products is expected to increase to nearly US $700,000,000 by 2006 (Spam and Viruses, 2004). Only 0.4% of a company’s revenue, on average, is dedicated to information security in the U.S. By 2011, however, that figure will accelerate tenfold to 4% of revenue for U.S. companies. (Computer world, 2001). An average of six IT security professionals is there for every 1,000 employees (Global Security Survey, 2005).

Impact of Internet Security Breach Financial Losses Theft of proprietary information Greater online security costs for smaller companies

Recent Impact Studies Deleting spam costs ~$22 billion a year in lost worker productivity 45% of the companies surveyed used intrusion prevention systems Worldwide damages due to virus/worm attacks in 2004 were ~$17.5 billion Information security professionals expected grow to ~2.1 million workers by 2008

Regulatory Effects Compliance Regulations by Government Encryption of Data Sarbanes-Oxley Act requires public companies to save every record related to the audit process

Responses to Internet Security Breach Internet Infrastructure security setup

Conclusion 70% of companies go out of business after a major data loss Major disasters affect IT every 5 years Security Market grow to $45 billion in 2006