Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 11
Computer Crime and Information
Technology Security
11-2
Outline
• Learning objectives
• Carter’s taxonomy
• Risks and threats
• IT controls
• COBIT
11-3
Learning objectives
1. Explain Carter’s taxonomy of computer
crime.
2. Identify and describe business risks and
threats to information systems.
3. Discuss ways to prevent and detect
computer crime.
4. Explain the main components of the CoBIT
framework and their implications for IT
security.
11-4
Carter’s
taxonomy
• Target
– Targets system or its data
– Example: DOS attack
• Instrumentality
– Uses computer to further
criminal end
– Example: Phishing
• Four-part system for
classifying computer
crime
• A specific crime may fit
more than one
classification
• The taxonomy provides
a useful framework for
discussing computer
crime in all types of
organizations.
11-5
Carter’s
taxonomy
• Incidental
– Computer not required,
but related to crime
– Example: Extortion
• Associated
– New versions of old
crimes
– Example: Cash larceny
• Four-part system for
classifying computer
crime
• A specific crime may fit
more than one
classification
• The taxonomy provides
a useful framework for
discussing computer
crime in all types of
organizations.
11-6
Risks and threats
• Fraud
• Service interruption and delays
• Disclosure of confidential information
• Intrusions
• Malicious software
• Denial-of-service attacks
Please consult the
chapter for the full
list.
11-7
IT controls
Confidentiality
Data integrity Availability
C-I-A triad
11-8
IT controls
• Physical controls
Guards, locks, fire
suppression systems
• Technical controls
Biometric access
controls, malware
protection
• Administrative
controls
Password rotation policy,
password rules, overall
IT security strategy
11-9
COBIT
• Two main parts
– Principles
Five ideas that form the
foundation of strong IT
governance and
management
– Enablers
Seven tools that match the
capabilities of IT tools with
users’ needs
• Control Objectives for
Information and
Related Technology
• Information Systems
Audit and Control
Association (ISACA)
• Framework for IT
governance and
management
11-10
COBIT
11-11
COBIT
11-12

Sppt chap011

  • 1.
    Copyright © 2016McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education. Chapter 11 Computer Crime and Information Technology Security
  • 2.
    11-2 Outline • Learning objectives •Carter’s taxonomy • Risks and threats • IT controls • COBIT
  • 3.
    11-3 Learning objectives 1. ExplainCarter’s taxonomy of computer crime. 2. Identify and describe business risks and threats to information systems. 3. Discuss ways to prevent and detect computer crime. 4. Explain the main components of the CoBIT framework and their implications for IT security.
  • 4.
    11-4 Carter’s taxonomy • Target – Targetssystem or its data – Example: DOS attack • Instrumentality – Uses computer to further criminal end – Example: Phishing • Four-part system for classifying computer crime • A specific crime may fit more than one classification • The taxonomy provides a useful framework for discussing computer crime in all types of organizations.
  • 5.
    11-5 Carter’s taxonomy • Incidental – Computernot required, but related to crime – Example: Extortion • Associated – New versions of old crimes – Example: Cash larceny • Four-part system for classifying computer crime • A specific crime may fit more than one classification • The taxonomy provides a useful framework for discussing computer crime in all types of organizations.
  • 6.
    11-6 Risks and threats •Fraud • Service interruption and delays • Disclosure of confidential information • Intrusions • Malicious software • Denial-of-service attacks Please consult the chapter for the full list.
  • 7.
  • 8.
    11-8 IT controls • Physicalcontrols Guards, locks, fire suppression systems • Technical controls Biometric access controls, malware protection • Administrative controls Password rotation policy, password rules, overall IT security strategy
  • 9.
    11-9 COBIT • Two mainparts – Principles Five ideas that form the foundation of strong IT governance and management – Enablers Seven tools that match the capabilities of IT tools with users’ needs • Control Objectives for Information and Related Technology • Information Systems Audit and Control Association (ISACA) • Framework for IT governance and management
  • 10.
  • 11.
  • 12.