Professional Documents
Culture Documents
AND
INTERNET
CRIME
DARWIN ROBERT A. GUTIERREZ
FACULTY, CARES
IT Security Incidents: A Major Concern
• The security of information technology
used in business is of utmost importance.
• Confidential business data and private
customer and employee information must
be safeguarded, and systems must be
protected against malicious acts of theft
or disruption.
• Although the necessity of security is
obvious, it must often be balanced against
other business needs and issues.
Countries with highest rate of Countries with lowest rate of
infected computer infected computers
• Incident Notification
• Protection of Evidence and
Activity Logs
• Incident Containment
• Eradication
• Incident Follow-up
• Computer Forensics
Key Elements of a formal
incident report:
• IP address and name of host
• A determination of whether or not the host
computer(s) involved.
was compromised as a result of the attack.
• The date and time when the
• The nature of the data stored on the
incident was discovered
computer (customer, employee, etc)
• Whether the data is considered personal,
• The length of the incident private, or confidential
• How the incident was • The number of hours the system was down
discovered
• The method used to gain • The overall impact on the business
access to the host computer. • An estimate of total monetary damage from
the incident
• A detailed discussion of • A detailed chronology of all evernys
vulnerabilities that were associated with the incident
exploited
THANK YOU!
Darwin Robert A. Gutierrez
dagutierrez@uerm.edu.ph