E-Crime Controls-Greek Version

of 41/41
Ηλεκτρονικό e-Crime & IT Governance Controls Ηλεκτρονικό Έγκλημα και Διακυβέρνηση Πληροφορικής John Kyriazoglou October 2013
  • date post

    22-Apr-2015
  • Category

    Documents

  • view

    573
  • download

    2

Embed Size (px)

description

A presentation on IT Measures and Controls for controlling e-Crime in Greek

Transcript of E-Crime Controls-Greek Version

  • 1. e-Crime & IT Governance Controls John Kyriazoglou October 2013
  • 2. , , , . , &
  • 3. , , , , E-CRIME / , , , & ,
  • 4. AGENDA 1: & : - : , & 2: : : & : & 3: : &
  • 5. - &
  • 6. (=, =, ) (=, =, ) (=, =, ) ( ) (=, =, , ) &
  • 7. : (..,,) - / : . & (ICT: Information Technology & Communications), ( ) . (60% ) >>>= &
  • 8. & &
  • 9. & (Policies): . ( , (business transactions) ( )). (Procedures): , , . &
  • 10. & - (Data): (raw facts), . , (business transactions) ( ) - (Meta Data): (information objects), . , &
  • 11. > > (, ) : , , , &
  • 12. (Data): 01101010010101001011 0101001010001011 >> , , !!!! &
  • 13. : >> / >> : Electronic crime, e-crime, computer crime, computer-related crime, cyber-crime, high-tech crime &
  • 14. () >> , >> &
  • 15. (HACKER/CRACKER) >HACKER (1984): , , , . >HACKER=CRACKER (2010): (Digital Trespasser) HACKERS: Bill Gates, Steven Jobs, Stephen Wozniak &
  • 16. >> >> >> >> & >> >> & >> >> & &
  • 17. 90% & !! Hacker=$57,000. Hacker=$2,100,000.-!!!!! 15%-30% 70%-85% &
  • 18. &
  • 19. / /. / / ( , BIS) ( , ) (Corporate Governance) (IT Governance) ../ / / &
  • 20. / ( ) : : : &
  • 21. (Corporate Governance) : , / , ( & ), .. & stakeholders &
  • 22. (IT Governance) , : & &
  • 23. & & IT GOVERN ANCE & / / , & & / &
  • 24. , &
  • 25. / / // // &
  • 26. // // // // & & &
  • 27. // // &
  • 28. & &
  • 29. / , &
  • 30. Hacker: 1. 2. & ( ) 3. 4. & ( ) &
  • 31. / / (IT General Controls) (IT Application Controls) &
  • 32. & & (Performance Management) &
  • 33. (IT General Controls) & &
  • 34. (IT Application Controls) &
  • 35. & &
  • 36. & , . . , , , , &
  • 37. & , &
  • 38. 1. , , , ., , , 2. 3. & (, , control points, , , , ,) 4. . 5. . &
  • 39. evin Mitnick The methods that will most effectively minimize the ability of intruders to compromise information security are comprehensive user training and education. Enacting policies and procedures simply won't suffice. Even with oversight the policies and procedures may not be effective: my access to Motorola, Nokia, ATT, Sun depended upon the willingness of people to bypass policies and procedures that were in place for years before I compromised them successfully.' &
  • 40. :John Kyriazoglou IT STRATEGIC & OPERATIONAL CONTROLS ( www.itgovernance.co.uk) :John Kyriazoglou, Dr. F.Nasuti & Dr.C.J.Kyriazoglou CORPORATE CONTROLS ( ) &
  • 41. . [email protected] &