Computer Crime and Information Technology Security
Information Security
Basic principles
confidentialtiy
data integrity
availability
Physical security controls
locks
security guards
badges
alarms
Administrative security controls
security policies and procedures
security awareness and training
adequate superision of employees
security reviews and audits
Technical security controls
firewalls
encryption
access control software
antivirus software
Perpetrators of Computer Crime
Script kiddies
Hackers
Cyber-criminals
Organized crime
Corporate spies
Terrorists
Insiders
CoBIT
7 information criteria
Effectiveness
Efficiency
Confidentiality
Integrity
Availability
Compliance
Reliability of information
Accountability Framework
Stakeholders
Board of Directors
IT and information security management
Internal audit
External audit
Audit committee
Risks and Threats
Fraud
Error
Service interruption and delays
Disclosure of confidential information
Intrusions
Information theft
Information maniputlation
Malicious software
Denial-of-service attacks
Web site defacements
Extortion