Question: 2. Search the Web for the term computer crime statistics and find two sources other than the Ponemon surveys cited in Q2. a. For each
2. Search the Web for the term computer crime statistics and find two sources other than the Ponemon surveys cited in Q2.
a. For each source, explain the methodology used and ex- plain the strengths and weaknesses of that methodology.
b. Compare the data in the two new sources to that in Q2 and describe the differences. c. Using your knowledge and intuition, describe why you think those differences occurred.
3. Go to www.ponemon.org/local/upload/file/2012_US_Cost _of_Cyber_Crime_Study_FINAL6%20.pdf and download the 2012 report (or a more recent report if one is available). a. Summarize the survey with regard to safeguards and other measures that organizations use. b. Summarize the studys conclusions with regard to the efficacy of organizational security measures. c. Does your team agree with the conclusions in the study? Explain your answer.
4. Suppose your boss asks for a summary of what your or- ganization should do with regard to computer security.
Using your knowledge of this chapter and your answer to questions 13 above, create a PowerPoint presentation for your summary. Your presentation should include, but not be limited to: a. Definition of key terms b. Summary of threats c. Summary of safeguards d. Current trends in computer crime e. What senior managers should do about computer security f. What managers at all levels should do about computer security
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
