Kế toán, kiểm toán - Chapter 11: Computer crime and information technology security

Explain Carter’s taxonomy of computer crime. Identify and describe business risks and threats to information systems. Name & describe common types of computer criminals. Discuss ways to prevent & detect computer crime. Explain CoBIT’s information criteria & accountability framework. Explain how CoBIT can be used to strengthen internal controls against computer crime.

ppt17 trang | Chia sẻ: thuychi11 | Lượt xem: 482 | Lượt tải: 0download
Bạn đang xem nội dung tài liệu Kế toán, kiểm toán - Chapter 11: Computer crime and information technology security, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Chapter 11Computer Crime and Information Technology SecurityOutlineExpected outcomesComputer crimeRisks and threatsComputer criminalsInternal control issuesCoBIT frameworkExpected outcomesExplain Carter’s taxonomy of computer crime.Identify and describe business risks and threats to information systems.Name & describe common types of computer criminals.Discuss ways to prevent & detect computer crime.Explain CoBIT’s information criteria & accountability framework.Explain how CoBIT can be used to strengthen internal controls against computer crime.Computer crimeCarter’s taxonomy TargetTargets the system or its data InstrumentalityUses computer to further a criminal end; i.e., to commit the crime IncidentalComputer not required, but related to crime AssociatedNew versions of old crimesA single crime can fit more than one category.Risks and threatsFraudErrorService interruption and delaysDisclosure of confidential informationIntrusionsInformation theftInformation manipulationMalicious softwareDenial-of-service attacksWeb site defacementsExtortionComputer criminalsScript kiddiesHackersCyber-criminalsOrganized crimeCorporate spiesTerroristsInsidersLecture break 11-1Divide the class into seven groups.Assume the “identity” of one type of computer criminal. Suggest how your “type” might enact one or two of the risks / threats from the previous slide. Internal control issuesC-I-A- triadWith respect to information systems, organizations need to protect: Confidentiality Integrity AvailabilityConfidentialityIntegrityAvailabilityInternal control issuesPhysical controlsProtect the physical aspects of information systemsExamplesLocked doorsSecurity personnelAlarm systemsInternal control issuesTechnical controlsProtect electronic aspects of information systemExamplesFirewallsData encryptionAnti-virus softwareInternal control issuesAdministrative controlsPolicies that may relate to either physical and / or electronic aspects of the systemExamplesPassword strength and rotation policiesAdequate supervisionProcedures manualsInternal control issuesLecture break 11-2Consider the work you completed in Lecture break 11-1.Suggest one helpful internal control in each category:PhysicalTechnicalAdministrativeCoBIT frameworkDeveloped by Information Systems Audit and Control Association (www.isaca.org) Control Objectives for Information and Related TechnologyComprehensive framework for addressing the totality of an organization’s ITCoBIT frameworkComponentsDomains of knowledge: tasks to completePlan and organizeAcquire and implementDeliver and supportMonitor and evaluateNotice the connection with the systems development life cyclePoints of view: issues to consider in each domainBusiness objectives: how does each domain relate to the entity’s overall goals?Information technology resources: what IT resources are needed within each domain?Information technology processes: how should those resources be managed?CoBIT frameworkComponentsInformation criteria: what characteristics should the information have to make it most useful?EffectivenessEfficiencyConfidentialityIntegrityAvailabilityComplianceReliabilityNotice the relationship between the information criteria, the CIA triad and the qualitative characteristics in the FASB conceptual framework.CoBIT frameworkComponentsAccountability framework: what reporting relationships does an organization need to ensure everything else is working?Classroom assessmentThis chapter has focused on:Carter’s taxonomy of computer crimeRisks and threats to information systemsComputer criminalsInternal control issuesCoBIT frameworkWhich of those areas do you understand best? Prepare a short written summary of it.Which do you understand least? Jot down two questions you have about it.