Information Technology Reference
In-Depth Information
n
n
n
Australian Federal Police, Australian Computer Crime and Security Survey
FBI, FBI Computer Crime and Security Survey
UK Department of Trade and Industry, Information System Security
Breaches Survey
Japan's Information Security Survey
The Information Technology Association of America (ITAA) and Brain-
bench™ Global Cyber Security Survey
Many more
n
n
n
All surveys show an increase in computer crime over the past year, though it
is difficult to conclude with confidence if incidents are increasing or the ability to
detect and willingness to report are increasing. The likely reality is that all three
are influencing findings and conclusions. Worldwide concerns about cyber-security
have prompted national surveys to determine the breadth and depth of these threats.
Interestingly, according to a Digital Research survey, “disgruntled employees are
the biggest threat to computer security in the United States than external hackers,”
says a research firm survey. The second biggest problem reported were those created
by user accounts left active after employees have quit the company.”
13.8.2
Recent Media Coverage
Whether the increase in cyber-security incidents is a result of actual increase in
attacks, better detection methods, or a willingness to share information, there is
no doubt that IA is critical for an E-commerce economy. The IA experiences of
other organizations provide justification for IA within your own. Real and recent
accounts of attempted attacks, successful or otherwise, provide business rationale
for investing in IA.
13.9 Compliance requirements
Many federal laws and regulations describe compliance requirements for informa-
tion assurance. Noncompliance may result in financial penalties and jail time. Even
if not a direct requirement of the law, there remain executive responsibilities of
due diligence and due care, a violation of which may result in shareholder or other
lawsuits. Information technology introduces many new concerns with respect to
legal obligations, including, but certainly not limited to, protection of informa-
tion assets, contract definitions, intellectual property management, and defama-
tion protection.
http://www.ciol.com/content/news/trends/101062102.asp.
 
Search WWH ::




Custom Search