Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Computer Crime

Welcome to the Computer Crime topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
325 Members
0 Online
5269 Visits

 Recent Discussions

Tips on how to prevent cybercrime. Posted by emwaka1.
Cyber Criminals Using Photo-Sharing Programs to Scam Victims. Posted by Gadnus.
Cyber Crime Report. Posted by Dr Vishnu.

Community Leader

Dr Vishnu
NEW! Participate in Discussions Via Email. 

You can now respond to discussions by simply replying to the email alert. Just enable this feature in discussions on this topic. Learn more

Discussions: 12 total

Must be a Topic member to contribute
View All »
You’ve probably heard the adage “information is power,” and that is certainly true when it comes to cybercrime. Access to your personal information is what gives hackers the power to tap into your accounts and steal your money or your identity. But the ...
emwaka1 | 7/21/2014 4:51:04 AM | COMMENTS(8)
If you are planning to buy a vehicle online, beware. Cyber criminals are posting ads on the Internet without pictures, providing photos only upon request. Sometimes these images are sent as attachments, other times as a link to an online gallery—but in ei...
Gadnus | 7/21/2014 4:42:06 AM | COMMENTS(2)
Here is a useful white paper - a report by Fortinet that outlines how cybercrime has moved into an organized professional way of working. It has suggestions to tackle cybercrime too. A worth read for an insight. Here is the link: http://www.fortinet.co...
Dr Vishnu | 7/21/2014 4:37:41 AM | COMMENTS(4)
More sophisticated and powerful computer systems are playing an ever-growing role in our professional and private lives. On the plus side, information is moving faster and at cheaper costs. Business has become more efficient and people, in their role as c...
Gadnus | 4/15/2014 12:32:57 AM | COMMENTS(3)
Use Strong Passwords Use different user ID / password combinations for different accounts and avoid writing them down. Make the passwords more complicated by combining letters, numbers, special characters (minimum 10 characters in total) and change them o...
Gadnus | 2/13/2014 1:29:32 AM | COMMENTS(0)
I feel that user awareness is the basic element of combating cyber crime. Technology alone can not defend the adversaries. End User awareness and discipline in using the IT systems should be given prime importance. Awareness sessions should not be ritual,...
Sreedhar968 | 2/9/2014 4:20:28 PM | COMMENTS(7)

Documents & Publications: 39 total

Must be a Topic member to contribute
View All »
Books
Posted by ISACA 15 hours ago
Books
Posted by ISACA 5 days ago
Books
Posted by ISACA 41 days ago
Books
Posted by ISACA 65 days ago

Events & Online Learning: 0 total

No Results Found

Journal Articles: 77 total

Volume 4, 2014
by Steven J. Ross, CISA, CISSP, MBCP
The time has come to accept that cyberattacks are a global reality—malicious forces in the world have gone beyond vandalism toward institutionalized espionage, sabotage and crime.
Volume 4, 2014
by Viktor Polic, Ph.D., CISA, CRISC, CISSP
Information security vendors have recognized the need to optimize the process of managing ethical hacking projects with the goal to reduce their costs.
Volume 3, 2014
by Nikos Virvilis, CISA, CISSP, GPEN, Oscar Serrano, CISA, CISM, CISSP, and Luc Dandurand
The major players in today’s cyberconflicts are well organized and heavily funded teams with specific goals and objectives, some of which are working under a state umbrella.
Volume 2, 2014
by Jide Olakunle, CISA, CISM, CISSP
Cyberattacks and the resulting security breaches are part of the rapidly expanding security threats organizations face.
Volume 2, 2014
by Tommie Singleton, CISA, CGEIT, CPA
Entities that maintain large databases of individuals and their PII should be prepared for a data breach by doing due diligence, as defined by cybersecurity professionals.
Volume 1, 2014
by Steven J. Ross, CISA, CISSP, MBCP
Sadly, cyberthreats are a part of business life in the 21st century.

Wikis: 2 total

Blog Posts: 5 total

Must be a Topic member to view blog posts
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Ina fast changing world of business and relentless competition, strategicplanning is not only critical, but also the differentiating factor for anorganization. Since IT has moved from a supportive role to a more strategicrole, the IT Strategic Planning an...
Posted By : SA | 0 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : Umesh391 | 2 comments
(By: William Darío Ávila Díaz, PhD)A new tool to combat Internet crime is now a reality thanks to an agreement signed by thirty countries, where they commit to the creation of international legislation attached to the local laws of each of the nations. Th...
Posted By : William733 | 2 comments
(By: William Darío Ávila Díaz, PhD)Keywords: trilogy in the security strategy; criminal gangs; terrorism on the Internet; legislation; and cyber-communication tools. In Colombia we have seen that has developed over the past 50 years, cyberterrorism.Curren...
Posted By : William733 | 0 comments