Search the Web for the term computer crime statistics and find two sources other than the Ponemon
Question:
Search the Web for the term computer crime statistics and find two sources other than the Ponemon surveys cited in Q2.
a. For each source, explain the methodology used and explain the strengths and weaknesses of that methodology.
b. Compare the data in the two new sources to that in Q2and describe the differences.
c. Using your knowledge and intuition, describe why you think those differences occurred.
3. Go to www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdf and download the 2012 report (or a more recent report if one is available).a. Summarize the survey with regard to safeguards and other measures that organizations use.
b. Summarize the study’s conclusions with regard to the efficacy of organizational security measures.
c. Does your team agree with the conclusions in the study? Explain your answer.
4. Suppose your boss asks for a summary of what your organization should do with regard to computer security.
Using your knowledge of this chapter and your answerto questions 1–3 above, create a PowerPoint presentationfor your summary. Your presentation should include, butnot be limited to:
a. Definition of key terms
b. Summary of threats
c. Summary of safeguards
d. Current trends in computer crime
e. What senior managers should do about computersecurity
f. What managers at all levels should do about computer security
Elementary Statistics A step by step approach
ISBN: 978-0073386102
8th edition
Authors: Allan Bluman