Professional Documents
Culture Documents
Information
System
Tigor Tambunan
UKWMS – FB - Akuntansi
CyberSecurity,
Compliance, and
Business Continuity
01 Up Close Look at Cybercrimes,
Criminals, and Motivations
05 Network Security
Persistent Threats
Mobile computing
Pretexting
Social engineering
Baiting
BYOD (Bring Your Own Device) Megatrend
Device
Control Costs
Security
threats
Challenge for
company
AT& T Toogle (personal
Compliance vs work mode)
Privacy
2. IT Vulnerabilities and Threats
Human errors
Environmental
Unintentional
hazards
Computer
system failures
Threats
Theft of data
Theft of
Intentional mainframe
computer time
Theft of
equiment
Risk Exposure Model for Digital Assets
3. Defending Against Fraud
4. Information Assurance and Risk Management
Prevention and
deterrence
Detection
Contain the
Defense damage
Strategy
Recovery
Correction
Awareness and
compliance
5. Network Security (layers)
IT Security Mechanism Locations
Network Authentication and Authorization