McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.

Slides:



Advertisements
Similar presentations
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Advertisements

Is There a Security Problem in Computing? Network Security / G. Steffen1.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
The Islamic University of Gaza
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Security Controls – What Works
Chapter 15 Computer Crime and Information Technology Security Copyright © 2010 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
© 2008 Prentice Hall Business Publishing Accounting Information Systems, 11/e Romney/Steinbart1 of 222 C HAPTER 7 Information Systems Controls for Systems.
Accounting Information Systems Chapter Outlines
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Factors to be taken into account when designing ICT Security Policies
Information Systems Controls for System Reliability -Information Security-
Fraud Prevention and Risk Management
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 3 Internal Controls.
Chapter 4 Internal Controls McGraw-Hill/Irwin
PowerPoint Presentation Materials
Securing Information Systems
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Computer Crime and Information Technology Security
Chapter 3 Internal Controls.
What does “secure” mean? Protecting Valuables
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Slide 1 Using Models Introduced in ISA-d Standard: Security of Industrial Automation and Control Systems (IACS) Rahul Bhojani ISA SP99 WG4 Meeting.
Chapter Three IT Risks and Controls.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Chapter 9: Introduction to Internal Control Systems
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 7-1 Chapter Seven Auditing Internal Control over Financial Reporting.
Scott Charney Cybercrime and Risk Management PwC.
Chap1: Is there a Security Problem in Computing?.
Communication in Administration (Security)
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Introduction to Computer Security
Internal Control Chapter 7. McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Control and Security Frameworks Chapter Three Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 10 E-business and Enterprise Resource Planning Systems.
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 17 Auditing and Evaluating the AIS.
For More Tutorials ACC 210 WEEK 1 DQ 1  How does information flow between departments at your organizations? Why do some organizations.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Internal Control Chapter 7. McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, Inc., All Rights Reserved. 7-2 Summary of Internal Control Definition.
Securing Information Systems
Information Systems Security
Risk management.
Chapter 17 Risks, Security and Disaster Recovery
Securing Information Systems
ACC 210 Competitive Success-- snaptutorial.com
ACC 210 Education for Service-- snaptutorial.com.
ACC 210 Teaching Effectively-- snaptutorial.com
ACC 210 Education for Service-- tutorialrank.com
ACC 210 Inspiring Innovation-- snaptutorial.com
IS4680 Security Auditing for Compliance
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security

11-2 Outline Expected outcomes Computer crime Risks and threats Computer criminals Internal control issues CoBIT framework

11-3 Expected outcomes Explain Carter’s taxonomy of computer crime. Identify and describe business risks and threats to information systems. Name & describe common types of computer criminals. Discuss ways to prevent & detect computer crime. Explain CoBIT’s information criteria & accountability framework. Explain how CoBIT can be used to strengthen internal controls against computer crime.

11-4 Computer crime Carter’s taxonomy – Target Targets the system or its data – Instrumentality Uses computer to further a criminal end; i.e., to commit the crime – Incidental Computer not required, but related to crime – Associated New versions of old crimes A single crime can fit more than one category.

11-5 Risks and threats Fraud Error Service interruption and delays Disclosure of confidential information Intrusions Information theft Information manipulation Malicious software Denial-of-service attacks Web site defacements Extortion

11-6 Computer criminals Script kiddies Hackers Cyber-criminals Organized crime Corporate spies Terrorists Insiders Lecture break 11-1 –Divide the class into seven groups. –Assume the “identity” of one type of computer criminal. –Suggest how your “type” might enact one or two of the risks / threats from the previous slide.

11-7 Internal control issues C-I-A- triad With respect to information systems, organizations need to protect: – Confidentiality – Integrity – Availability Confidentiality IntegrityAvailability

11-8 Internal control issues Physical controls –Protect the physical aspects of information systems –Examples Locked doors Security personnel Alarm systems

11-9 Internal control issues Technical controls –Protect electronic aspects of information system –Examples Firewalls Data encryption Anti-virus software

11-10 Internal control issues Administrative controls –Policies that may relate to either physical and / or electronic aspects of the system –Examples Password strength and rotation policies Adequate supervision Procedures manuals

11-11 Internal control issues Lecture break 11-2 –Consider the work you completed in Lecture break –Suggest one helpful internal control in each category: Physical Technical Administrative

11-12 CoBIT framework Developed by Information Systems Audit and Control Association ( Control Objectives for Information and Related Technology Comprehensive framework for addressing the totality of an organization’s IT

11-13 CoBIT framework Components –Domains of knowledge: tasks to complete Plan and organize Acquire and implement Deliver and support Monitor and evaluate –Notice the connection with the systems development life cycle –Points of view: issues to consider in each domain Business objectives: how does each domain relate to the entity’s overall goals? Information technology resources: what IT resources are needed within each domain? Information technology processes: how should those resources be managed?

11-14 CoBIT framework Components –Information criteria: what characteristics should the information have to make it most useful?  Effectiveness  Efficiency  Confidentiality  Integrity  Availability  Compliance  Reliability Notice the relationship between the information criteria, the CIA triad and the qualitative characteristics in the FASB conceptual framework.

11-15 CoBIT framework Components Accountability framework: what reporting relationships does an organization need to ensure everything else is working?

11-16 Classroom assessment This chapter has focused on: –Carter’s taxonomy of computer crime –Risks and threats to information systems –Computer criminals –Internal control issues –CoBIT framework Which of those areas do you understand best? Prepare a short written summary of it. Which do you understand least? Jot down two questions you have about it.

11-17