Lecture Accounting information systems: Basic concepts and current issues (4/e): Chapter 11 - Robert L. Hurt

12 25 0
Lecture Accounting information systems: Basic concepts and current issues (4/e): Chapter 11 - Robert L. Hurt

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Chapter 11 - Computer crime and information technology security. When you''ve finished studying this chapter, and completing the activities at its conclusion, you should be able to: Explain Carter’s taxonomy of computer crime, identify and describe business risks and threats to information systems, discuss ways to prevent and detect computer crime, explain the main components of the CoBIT framework and their implications for IT security.

Chapter 11 Computer Crime and Information Technology Security Copyright © 2016 McGraw­Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw­Hill Education Outline • Learning objectives • Carter’s taxonomy • Risks and threats • IT controls • COBIT 11­2 Learning objectives Explain Carter’s taxonomy of computer crime Identify and describe business risks and threats to information systems Discuss ways to prevent and detect computer crime Explain the main components of the CoBIT framework and their implications for IT security 11­3 Carter’s taxonomy • • Four-part system for classifying computer crime • A specific crime may fit more than one classification • • Target – Targets system or its data – Example: DOS attack Instrumentality – Uses computer to further criminal end – Example: Phishing The taxonomy provides a useful framework for discussing computer crime in all types of organizations 11­4 Carter’s taxonomy • Four-part system for • classifying computer Incidental – Computer not required, but related to crime – Example: Extortion crime • A specific crime may fit more than one classification • The taxonomy provides • Associated – New versions of old crimes – Example: Cash larceny a useful framework for discussing computer crime in all types of organizations 11­5 Risks and threats • Fraud • Service interruption and delays • Disclosure of confidential information • Intrusions • Malicious software • Denial-of-service attacks Please consult the chapter for the full list 11­6 IT controls Confidentiality C-I-A triad Data integrity Availability 11­7 IT controls • Physical controls Guards, locks, fire suppression systems • Technical controls Biometric access controls, malware protection • Administrative controls Password rotation policy, password rules, overall IT security strategy 11­8 COBIT • • Control Objectives for Information and Two main parts – Five ideas that form the foundation of strong IT governance and management Related Technology • Information Systems Audit and Control Association (ISACA) • Framework for IT governance and management Principles – Enablers Seven tools that match the capabilities of IT tools with users’ needs 11­9 COBIT 11­10 COBIT 11­11 11­12 ... organizations 11? ?5 Risks and threats • Fraud • Service interruption and delays • Disclosure of confidential information • Intrusions • Malicious software • Denial-of-service attacks Please consult the chapter. .. Carter’s taxonomy • Risks and threats • IT controls • COBIT 11? ?2 Learning objectives Explain Carter’s taxonomy of computer crime Identify and describe business risks and threats to information systems... security strategy 11? ?8 COBIT • • Control Objectives for Information and Two main parts – Five ideas that form the foundation of strong IT governance and management Related Technology • Information

Ngày đăng: 14/10/2020, 14:04

Từ khóa liên quan

Mục lục

  • Slide 1

  • Outline

  • Learning objectives

  • Carter’s taxonomy

  • Carter’s taxonomy

  • Risks and threats

  • IT controls

  • IT controls

  • COBIT

  • COBIT

  • COBIT

  • Slide 12

Tài liệu cùng người dùng

Tài liệu liên quan