Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Computer Crime

Welcome to the Computer Crime topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
430 Members
0 Online
5966 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 17 total

Must be a Topic member to contribute
View All »
You’ve probably heard the adage “information is power,” and that is certainly true when it comes to cybercrime. Access to your personal information is what gives hackers the power to tap into your accounts and steal your money or your identity. But the ...
emwaka1 | 4/28/2015 1:44:59 AM | COMMENTS(11)
Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. So , is it safe to say that , when the actual users are not aware or made aware of their indi...
BERNARD598 | 2/28/2015 4:34:22 AM | COMMENTS(7)
Hi everybody, There was an ISACA webinar about the harsh reality of cyber protection in which a new methodology called "exploit prevention module" was described. Does anybody utilizes this tool as security measure? Is there any experience you could shar...
Rainer092 | 2/22/2015 9:50:48 PM | COMMENTS(8)
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking Here are some of the top threats facing mobile computing risks .They includes: 1. Data...
emwaka1 | 2/22/2015 9:10:34 PM | COMMENTS(4)
At 6:30am more than 20 men aged between 14 and 28 - mostly school dropouts - gathered in front of the metal door of a street-side shop waiting for it to open... What is it..  follow the link..http://www.aljazeera.com/news/africa/2014/08/cracking-down-cybe...
nooruddin | 2/14/2015 6:53:23 AM | COMMENTS(5)
“It’s an army that’s attacking your site, not little fraudsters.” says the report. How true. Infact media often paints it as hype, but fact remains that what is reported is only a tip of the iceberg. Most of it goes unreported. Read the full report at h...
Dr Vishnu | 2/11/2015 2:27:48 AM | COMMENTS(3)

Documents & Publications: 48 total

Events & Online Learning: 2 total

19 Oct 2015
ISACA International Event
Washington, DC, US

Journal Articles: 84 total

Volume 3, 2015
by Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams | Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA
The rise of hacking exploits and their potential to cause havoc to enterprises, nations, industries and individuals has led to a need for more information on hacking.
Volume 2, 2015
by Steven J. Ross, CISA, CISSP, MBCP
I did a Google search on the word cyber and was told there are 467 million references to that term.
Volume 2, 2015
by Larry G. Wlosinski, CISA, CISM, CRISC, CAP, CBCP, CDP, CISSP, ITIL V3
Information security events that affect cloud systems are occurring with no end in sight, so it should be no surprise that the cloud should be treated as a nonsecure environment with numerous threats and concerns.
Volume 1, 2015
by P. W. Singer and Allan Friedman | Reviewed by Larry Marks, CISA
This book defines cybersecurity, discusses the basic issues of cybersecurity about which everyone should be aware and supplies the reader with tools to address these threats.
Volume 1, 2015
by Guiliano Pozza and John D. Halamka | Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA
For anyone who is interested in the modern dynamics and possible impacts of cybersecurity and cyberhacking, the benefits of the book are twofold: learn and enjoy this well-written novel.
Volume 6, 2014
by Eric A. Beck
Corporate risk managers and security professionals understand that risk is not a problem that can be solved, but rather a process that must be managed.

Wikis: 2 total

Blog Posts: 6 total

Must be a Topic member to view blog posts
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Slowly are organization have started using web as a service delivery platform.   Various study reveals that the web as the most economical platform and branches / office being the most expensive platform for the delivery of service to customer. Further w...
Posted By : Parthasarathy | 0 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : Umesh391 | 2 comments
(By: William Darío Ávila Díaz, PhD)A new tool to combat Internet crime is now a reality thanks to an agreement signed by thirty countries, where they commit to the creation of international legislation attached to the local laws of each of the nations. Th...
Posted By : William733 | 2 comments
(By: William Darío Ávila Díaz, PhD)Keywords: trilogy in the security strategy; criminal gangs; terrorism on the Internet; legislation; and cyber-communication tools. In Colombia we have seen that has developed over the past 50 years, cyberterrorism.Curren...
Posted By : William733 | 0 comments