Chapter 5: Cybersecurity, Risk Management, and Financial Crime
Chapter 5: Cybersecurity, Risk Management, and Financial Crime
Chapter 5: Cybersecurity, Risk Management, and Financial Crime
Management
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
The Face and
Cyber Risk
Future of
Management
Cyberthreats
Defending
against
Fraud
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Prevent
Compliance
attacks
Detect,
Secure and diagnose,
legal sharing and respond
in real time
Acceptable Internal
policies controls
Availability
while Cybersecurity Disaster
restricting Objectives recovery
access
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
The Face and
Cyber Risk
Future of
Management
Cyberthreats
Defending
against
Fraud
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Data and
Information Systems
Security
1: Confidentiality
2: Integrity
3: Availability
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
ROOTKITS
VIRUSES
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
The Face and
Cyber Risk
Future of
Management
Cyberthreats
Defending
against
Fraud
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
The Face and
Cyber Risk
Future of
Management
Cyberthreats
Defending
against
Fraud
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Learning Objectives
The Face and
Cyber Risk
Future of
Management
Cyberthreats
Defending
against
Fraud
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Expected Loss = P1 * P2 * L
where
– P1 = probability of attack (estimate, based on
judgment)
– P2 = probability of attack being successful
(estimate, based on judgment)
– L = loss occurring if attack is successful
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.
Chapter 5
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved.