Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

2. Search the Web for the term computer crime statistics and find two sources ot

ID: 3890820 • Letter: 2

Question

2. Search the Web for the term computer crime statistics
and find two sources other than the Ponemon surveys
cited in Q2.

a. For each source, explain the methodology used and ex-
plain the strengths and weaknesses of that methodology.

b. Compare the data in the two new sources to that in Q2
and describe the differences.
c. Using your knowledge and intuition, describe why you
think those differences occurred.

3. Go to www.ponemon.org/local/upload/file/2012_US_Cost
_of_Cyber_Crime_Study_FINAL6%20.pdf and download
the 2012 report (or a more recent report if one is available).
a. Summarize the survey with regard to safeguards and
other measures that organizations use.
b. Summarize the study’s conclusions with regard to the
efficacy of organizational security measures.
c. Does your team agree with the conclusions in the
study? Explain your answer.

4. Suppose your boss asks for a summary of what your or-
ganization should do with regard to computer security.

Using your knowledge of this chapter and your answer
to questions 1–3 above, create a PowerPoint presentation
for your summary. Your presentation should include, but
not be limited to:
a. Definition of key terms
b. Summary of threats
c. Summary of safeguards
d. Current trends in computer crime
e. What senior managers should do about computer
security
f. What managers at all levels should do about computer security

Explanation / Answer

1. National Computer Security Survey

Method: Sampling and data collection for representative group.

Strength: Sponsored by Bureau of Justice

Weakness: May not represent exhaustive set of security issues

2. Federal Bureau of Investigation - Internet Crime coomplaint center ( IC3 )

Method: Crime Report from victims

Strength : Larger survey base

Weakness : Accuracy dependes on information shared by victims

In comparison Ponemon surver uses a proprietary benchmarking algorithm for reportiing computer crime data.

Prevention strategies:

- Advanced perimeter controls and firewall technologies

- Extensive deployment of encryption technologies

- Security intelligence systems

- Extensive use of data loss prevention tools

- Access governance tools

- Enterprise deployment of GRC tools

- Automated policy management tools

2) The organizational security measures need to be strengthened with regard to the above parameters.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote