StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The CSI Computer Crime and Security Survey - Essay Example

Cite this document
Summary
As the paper 'The CSI Computer Crime and Security Survey' tells, the Computer Security Institute (CSI) Computer Crime and Security Survey for 2008 as reported by Robert Richardson, CSI Director outlined the latest important facts and trends in regard to network and computer crime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.2% of users find it useful
The CSI Computer Crime and Security Survey
Read Text Preview

Extract of sample "The CSI Computer Crime and Security Survey"

The report cited several important findings of the 2008 survey. First, financial fraud still constitutes the largest and most expensive cybercrime and security incidents. Here, it was found that an average of $500,000 was lost to those who have experienced fraud.

Secondly, virus incidents still dominate the computing and networking community. The report, for instance, found that 49 percent of the respondents have experienced it for the past year. Then there is also the case of bots and malware, which costs organizations around $350,000 to eliminate.

Other cases of threats include theft of hardware such as laptops and mobile devices and insider abuse of networks, breaches in security such as unauthorized access, website defacement, system penetration, password sniffing, and sabotage.

The findings of the survey, compared to that of last year, reflected a downward trend in crimes and attacks on computer security. This could be attributed to the increase in security efforts of organizations. The study found that at least 68 percent of organizations have security in place; 18 percent are developing theirs; while only one percent does not have a security policy. Furthermore, the IT security budget still constitutes a significant share of the security budget for organizations in 2008.

In regard to solving cybercrimes, the CSI survey reported that while most organizations attempt to identify the perpetrators, only 27 percent report the incidents to law enforcement agency or has been referred to legal counsel. In addition, organizations are also more averse to being involved in information sharing in order to solve computer and networking threats.

According to the survey, the future computing and networking problems, as with the past two years, still concern issues about viruses, malware, security, and legal issues. The CSI, in its conclusion, identified two kinds of threats that must be addressed: the actual threats and the developing threats. These threats, the report stressed, must be addressed as we move to a more service-oriented Web.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Summarize Essay Example | Topics and Well Written Essays - 500 words - 1”, n.d.)
Summarize Essay Example | Topics and Well Written Essays - 500 words - 1. Retrieved from https://studentshare.org/miscellaneous/1557850-summarize
(Summarize Essay Example | Topics and Well Written Essays - 500 Words - 1)
Summarize Essay Example | Topics and Well Written Essays - 500 Words - 1. https://studentshare.org/miscellaneous/1557850-summarize.
“Summarize Essay Example | Topics and Well Written Essays - 500 Words - 1”, n.d. https://studentshare.org/miscellaneous/1557850-summarize.
  • Cited: 0 times

CHECK THESE SAMPLES OF The CSI Computer Crime and Security Survey

Problems and Risks with Information Security in the modern world

The researcher of the paper operates mainly based on research questions which can be stated as follows: What is the nature of information security?... What are the problems and risks that are encountered in information security?... The study intends to examine the nature of information security.... It also seeks to determine the various problems and risks that information security is dealing with.... Likewise, the study aims to identify some of the theories that are proposed in order to address the concerns and issues pertinent to information security....
38 Pages (9500 words) Research Paper

Cyber Crime and Cyber Warfare

The paper " Cyber crime and Cyber Warfare" conducts extensive research on the growing menace of cyber crimes and cyber warfare.... On the other hand, strong viruses are proved to be disastrous because they have the capability to destroy security measures or even anti-virus software.... Wilson (2005) highlighted that Cyber Terrorism could be defined as the use of computers from terrorist groups or criminals or hackers, which enjoy expertise in breaking operating system codes and damaging installed software (programs), to target other computer users, communication, and information networks....
11 Pages (2750 words) Essay

Computer Crime and Security

The paper "computer crime and security" discusses that the imperatives of not recording network access information will be stressed upon all employees.... The incident was worrisome as these files contain sensitive data such as patients' social security, insurance, and credit card numbers, not to mention home and place of employment addresses and contact information.... In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p....
6 Pages (1500 words) Essay

What Is Meant and Understood by the Term Computer Misuse

The focus of this analysis is to consider the definition of the term 'computer misuse' within the context of UK criminal law.... It is submitted at the outset that closely linked to the consideration of computer misuse is the growth of online use.... Finally, the All-Party Internet Group report was extremely useful in adding another dynamic to the assignment content by considering the industry perspective on the computer Misuse Act and legislative provisions....
6 Pages (1500 words) Article

An Emerging Area in Criminology

He divides crime into a number of types and categories but this paper intends to study an emerging area in the field of crimes and criminology, that is, “Cybercrimes”.... As stated by Strossen (2000) the term "cybercrime" refers to any crime accomplished through the use of computer technology.... This has caused an increase in the use of computers for white-collar crime.... omputers are objects of crime when they or their contents are damaged or made unavailable, as when a computer is stolen or its hard drive is damaged....
7 Pages (1750 words) Essay

Hacking: Definition, Types, and Facts

An example of a computer crime is the use of various techniques to corrupt or compromise data stored in a computer system.... In particular, hacking involves network security compromising, interference with the security network of computer systems, and the creation of malicious software often regarded as viruses.... However, it must be noted that not all hackers are bad (Kumar, 2012) since the government and some huge companies use hackers to maintain their computer network security in order (Rogers 1994)....
9 Pages (2250 words) Essay

Effects of Losing their Identities through Identity Theft

In a survey of 6,000 U.... In addition, Princeton survey Research Associates International published a study that finds 25% of Internet users no longer shop online and 86% have made some sort of the substantive change in their Internet usage due to risks of identity theft (Verisign, 2005).... Upgrading security measures must be constant.... he US Federal Trade Commission's definition says, 'Identity theft is brought about when someone possesses or uses your name, address, Social security number, bank or credit card account number, or other identifying information without your knowledge with the intent to commit fraud or other crimes....
12 Pages (3000 words) Report

Effectiveness of Internet and Network Security Measures

The paper "Effectiveness of Internet and Network security Measures' is an excellent example of a research proposal on information technology.... The paper "Effectiveness of Internet and Network security Measures' is an excellent example of a research proposal on information technology.... In contrast, since malicious codes (external from the Internet) can go through any communication channel such as Internet websites, email, portable devices, and others, the most common network security measures employed are networking traffic filtering (Firewall), scanning incoming files by an anti-malware program, and user behavior modification....
9 Pages (2250 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us