a Jennifer Ryan 12 éve
536
Chapter 11
Computer Crime and Information Technology Security
Risks and Threats
Extortion
Web site defacements
Denial-of-service attacks
Malicious software
Information maniputlation
Information theft
Intrusions
Disclosure of confidential information
Service interruption and delays
Error
Fraud
CoBIT
Accountability Framework
Audit committee
External audit
Internal audit
IT and information security management
Board of Directors
Stakeholders
7 information criteria
Reliability of information
Compliance
Availability
Integrity
Confidentiality
Efficiency
Effectiveness
Perpetrators of Computer Crime
Insiders
Terrorists
Corporate spies
Organized crime
Cyber-criminals
Hackers
Script kiddies
Information Security
Technical security controls
antivirus software
access control software
encryption
firewalls
Administrative security controls
security reviews and audits
adequate superision of employees
security awareness and training
security policies and procedures
Physical security controls
alarms
badges
security guards
locks
Basic principles
availability
data integrity
confidentialtiy