100 Victoria Street Bristol BS1 6HZ United Kingdom a Sift Media publication Steve Gold, IT expert on the.

Slides:



Advertisements
Similar presentations
Protecting People and Information
Advertisements

ETHICAL HACKING A LICENCE TO HACK
CS5038 The Electronic Society
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Effective PR: the Power of Three Craig Coward Context Public Relations.
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
Introduction to Online Courses (click on each page to continue) Welcome to the The Equine Sciences Academy. The best source for career based education.
PaperLess Professional …so much more than a simple document management solution…
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
Changing State of Threats and Vulnerabilities FIRMA March 30, 2010.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Crime and Security in the Networked Economy Part 4.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
1 Telstra in Confidence Managing Security for our Mobile Technology.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Password Management for Multiple Accounts Some Security.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Credit Card Fraud, Jan Prochazka, Credit Card Fraud on the Web Jan Prochazka.
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter 3 Ethics, Privacy & Security
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
E-commerce Business Models and Concepts
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
ONLINE SHOPPING! SHANI GORMAN (
Module 3: Business Information Systems Chapter 11: Knowledge Management.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
BA 378: Accounting Information Systems Instructor: Dr. James R. Coakley.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
Business Information Systems Systems Analysis & Design Academic Year 2008/9 Lecture 2.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Anderson School of Management University of New Mexico.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
100 Victoria Street Bristol BS1 6HZ United Kingdom a Sift Media publication E-business for accountants.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
The Silk Road: An Online Marketplace
Information Systems Education Conference - ISECON Ryerson University School of Information Technology Management The Use of Internet-based Tools.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Audience Development – how to make the most of your data Presented by Ian Eckert
By: Micah Stevens Identity Theft in the World Today.
Internet Safety Professional Development Rob Girvin July 31, 2013.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Securing Information Systems
IT Security  .
ISYM 540 Current Topics in Information System Management
CHAPTER 4 Information Security.
EVOLVING THREATS, VULNERABILITIES AND COUNTERMEASURES
Securing Information Systems
Protect crypto exchange website from hackers
Chapter 9 E-Commerce Security and Fraud Protection
Introduction to Networking Security
Cybersecurity Simplified: Phishing
Presentation transcript:

100 Victoria Street Bristol BS1 6HZ United Kingdom a Sift Media publication Steve Gold, IT expert on the Business IT Guide

What are the most important IT skills that accountants need to have? Steve Gold, Business/IT Security Journalist AccountingWEB event July 15, 2008

Agenda Steve Gold - who on earth is this guy? IT skills needed by modern accountants Fraud and security threats – whats happening? How to protect you and your systems Lessons learned Further information

Audit security is a state of mind IT threats are becoming hybridised and multi-vectored Hackers are out to extract revenue from your organisation So what are the main threats? Phishing Trojan horses Electronic eavesdropping Man-in-the-middle attacks Fraud will always take the path of least resistance

Finjan IT threats report – July 15, 2008 The cybercrime world is continually evolving Welcome to the world of crimeware Similar to the legitimate business world, organisations are structured to supply their customers with a product or service while generating revenue. With the transition from hack for fame to cybercrime for profit, the industry is seeing see the rise of well-structured and highly effective cybercrime organisations.

Business Challenges How do you protect your systems from these threats? Multiple layers of security Out-sourced or in-house security? Where does the audit function sit in this brave new world? Is it necessary to program to be an effective auditor? Good applications software is the key

Business Challenges Virtual servers pose a major threat to your audit function Virtual servers are cost-effective Virtual servers improve IT and business efficiency Conventional IT audit techniques do not apply to virtual servers Behavioural analysis may be the key to virtual server security

Conventional techniques are still viable Pattern analysis (digital signatures) may be the key Conventional IT security software use digital signature searching Every IT transaction has its own digital signature Pattern searching/analysis is the key to effective security Pattern analysis may well be the key to future audit software

Conclusions IT security and fraud threats are constantly evolving IT security and the audit function are inextricably linked Good security and auditing software is the key to fraud control It isnt rocket science

Sources of further information Online resources are the key - one of the very first technology Web sites to launch in the UK back in 1999 and now one of the UKs leading business and technology resources provides you with all the information you need to make IT decisions that are right for your business. We can help you identify those issues which affect your business and recommend a clearly defined course of action. – Security and anti-fraud systems news, reviews and observations for todays accountants and auditors (and not just for techies).