1.Why has there been a dramatic increase in the number of computer related security incident in recent years?
*For me as an IT student,it maybe they have a lot of people using computer or those people who are experts in different kinds of including of codes they use that to create a virus that can affect the software and hardware of computer they are call perpetrators.It maybe also increase because they create a virus that can affect the fire wall of a computer and some of them they want to have a money so that they install a virus in a computer or they sell it in a biggest amount.
*For me as an IT student,it maybe they have a lot of people using computer or those people who are experts in different kinds of including of codes they use that to create a virus that can affect the software and hardware of computer they are call perpetrators.It maybe also increase because they create a virus that can affect the fire wall of a computer and some of them they want to have a money so that they install a virus in a computer or they sell it in a biggest amount.
2.What are some characteristics of common computer criminals including their objectives?
*They have a lot of characteristics of common computer criminals some of they want to become known in a computer.They manipulate the system of computer and they destroy the software and hardware.Their objectives is to have money using the computer and so forth.
3.What actions must be taken in response to a security incidents?
ption. *The Computer Security Institute, among other industry analysis, reports that computersecurity incidents are widespread (2000 CSI/FBI Computer Crime and Security Survey,
Computer Security Institute, March 2000). 90% of respondents detected computer
security breaches in the previous 12 months, and 70% reported serious security
breaches other than the most common ones (viruses, laptop theft, and employee “net
abuse”), such as theft of proprietary information, financial fraud, system penetration by
outsiders, denial of service attacks, and sabotage of data or networks. The survey also
shows that attacks occur frequently, with 35% percent of those acknowledging attacks
reporting between two and five incidents in the last year, and 19% reporting ten or more
incidents. 71% of the survey’s respondents detected instances of unauthorized access
by insiders, demonstrating that even companies whose networks are not connected to
the Internet are at risk.
The computer security industry offers a variety of solutions to this problem, from
firewalls, authentication, and encryption to vulnerability scanning tools and intrusion
detection systems. Consulting firms offer a broad range of security services, including
security assessments, secure network infrastructure design and deployment, policy
development, penetration testing, and so forth. But while all of these products and
services have their place, they take time (often months, sometimes years) and money to
procure and implement correctly. In the meantime, a company has to live with the
security implementation it has – it may not be state-of-the-art, it may not be as strong as
it should be, but the systems and networks that depend on it are critical to the
company’s business, and cannot simply be turned off while waiting for a stronger
security solution to be designed and installed.
*Computer Security Incident Response Plan (CSIRP) provides guidance and
documentation on computer security incident response handling and communication
efforts. The CSIRP is activated whenever a computer security incident occurs, and
guides the responses to all incidents whose severity is such that they could affect a
company’s ability to do business, or undermine its reputation.
The inevitability that (possibly successful) attempts will be made to compromise system
and network security dictates that every company, from the largest multinationals to the
smallest “dot com” startups, should have a formal CSIRP in place. CSIRP development
should be the top security budget priority in any company – more important than security
services, and more important than security products. When a security incident occurs,
reactions and decisions must be made very quickly (often in a matter of minutes). The
company has to be prepared to deal with these incidents as soon as they occur; waiting
until a new product arrives or a consulting engagement is completed is not an option.
(source.Ethics in information technology 2nd edition by:GEORGE REYNOLDS p.6
No comments:
Post a Comment