Accounting and Intrusion Detection
In a report issued by Paladin Technologies, Inc., entitled: "Security Metrics: Providing Cost Justification for Security Projects," 273 organizations were surveyed on the topic of security. The report illustrates in quantifiable terms the depth and reach of intrusion detection on the financial viability of the organization. The combined reported losses from the firms surveyed totaled $265.6 million in 1999. The highest loss categories were reported as follows:
Type of Loss
Estimated Dollar Value
Number of Respondents
Theft of intellectual capital
m
Financial Fraud
m
Sabotage
m
The average annual financial loss of firms surveyed was estimated at $40 million. Forty three percent of respondents were able to quantify financial losses, and seventy four percent were able to acknowledge financial loss. Ninety percent detected cyber attacks within the most recent twelve-month period and seventy percent reported serious breaches other than viruses, laptop theft, and employee abuse of net privileges. As for these categories, six hundred and forty three security professionals were surveyed regarding the types of attacks that they had identified or encountered. Of these, 25% identified external penetrations
27% identified denial of service attacks
85% detected computer viruses
79% detected employee abuses of Internet privileges (pornography access, downloaded pirated software, etc.)
In order to view these statistics in context, among those surveyed, 93% have www.sites:64% reported web site vandalism
43% conduct e-commerce: 60% of these reported denial of service
19% suffered unauthorized access or misuse in the last twelve months
32% did not know if there had been unauthorized access or misuse
35% acknowledged more than one incident
19% reported more than ten incidents
8% reported theft of transaction information
3% reported financial fraud
Losses of a financial nature are most likely to be immediately recognized by the accounting function. For public companies, direct fluctuations in stock price, financial fraud, declines in profitability and increases in expense levels will command the attention of accounting staff (as well as the CEO!). In addition, unauthorized access to sensitive financial data, such as levels of executive compensation, profit margins and financial forecasts could be disastrous to the reputation of an organization.
Effect of Intrusion Detection on the Accounting Structure
Intrusion detection poses various classes of threats to information security, each with their own types of ramifications. Among them are:
Disclosure (Snooping i.e., passive wiretapping and monitoring of communications)
Disclosure can result in the release of private information to various public sectors. An early release of financial results, real or false, could cause stock prices, for instance, to plummet. Depending on the situation, if released figures fall short of previously published forecasts, investors may withdraw funds, consumers may not invest in the stocks of the company, and products sales could even be affected.
Deception/Disruption
Modification (an example of passive wiretapping where the attacker injects something into a communication or modifies parts of the communication, sometimes called alteration)
Intercepting communications can have many adverse ramifications for a company. Internal communications can contain information regarding trade secrets, product secrets, competitive secrets, strategy and tactics, marketing plans, productions plans, and more. If this information is leaked to competitors and/or consumers, it can alter sales dramatically and have a lasting and irreversible impact on an organization's profitability.
Spoofing (delegation, whereby one asserts authority for another to act as an agent.)
Spoofing is when authority is delegated, either voluntarily or fraudulently, for one person to represent another. This often involves gaining access to that person's available resources. For instance, if the human resources manager is on vacation, and the assistant manager has obtained his or her password and has gained access to the files containing the lists of executive compensation. The assistant manager is not very good at keeping such secrets, and leaks the information to other people in the department. Soon, the information is circulating company-wide and beyond the organization's walls.
Denial of receipt
Conversely, the human resources manager may be trying to access the executive compensation file in order to process a quarterly bonus payment, but finds himself "locked out" of that directory for no apparent reason. The H.R. manager is on a deadline and it is now an emergency.
Usurpation
Delay
The delay of access can be as deadly to productivity as denial. Any process that slows down, is bogged down, or fails to deliver in a timely manner is costly. An example is when a system is running concurrent processes...
IRS Technological Solutions Improvements in technology for a public organization: The IRS The IRS is a public agency that affects virtually every American's life. Even Americans who do not owe taxes must submit forms to the IRS, detailing their economic status. The IRS contains a wealth of information that would be of interest to someone attempting to impinge upon the security of the organization, including Social Security and financial data. To ensure people's
OSIIT An analysis of IT policy transformation The aim of this project is to evaluate the effectiveness of information security policy in the context of an organization, OSI Systems, Inc. With presence in Africa, Australia, Canada, England, Malaysia and the United States, OSI Systems, Inc. is a worldwide company based in California that develops and markets security and inspection systems such as airport security X-ray machines and metal detectors, medical monitoring anesthesia
Snort Author's note with contact information and more details on collegiate affiliation, etc. This report is my own work. Any assistance I received in its preparation is acknowledged within, in accordance with academic practice. For any material, from whatever source, quoted or not, I have cited sources fully and completely and provided footnotes and bibliographical entries. The report was prepared by me for this class, has not been submitted in whole or
Remote access controls. Network security management. Password policies. Compliance with the policies and procedures of the company is very vital to the organization, and the policies and procedures should be clearly communicated to the appropriate business teams. Intruder: The suggested treatment for the attack by the external intruder such as hacker is to ensure that all communication within the organization is encrypted to deter the unauthorized access to the company data. Moreover, the organization
Security at workplaces is not only the responsibility of the management, but all the parties in the premises. Therefore, it is important that everyone is involved one way or another in maintenance of security. In a company the size of Walter Widget, with 240 personnel, it can be challenging to maintain high security standards. With the increasing nationwide crime against workplaces and businesses, the stakes in workplace security are high. Walter
The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers. The most important skill for a system administrator is problem solving. The systems administrator is on call when a computer system goes
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now