Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Computer Crime

Welcome to the Computer Crime topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
502 Members
1 Online
6707 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 21 total

Must be a Topic member to contribute
View All »
Hello. In the event of Fraud that involves the use of a computer, are there certain steps that are required in regards to the Chain of Custody? Thanks.
Angela712 | 2/11/2016 8:02:52 AM | COMMENTS(2)
This article, whilst having some minor shortcomings, does make very good reading and explains very well the motives of the perpetrators and the issues we will face if/when we suffer a breach - and in today's climate it's more a matter of "when" not "if"  ...
Phil Green | 12/16/2015 6:28:19 AM | COMMENTS(0)
Dear All What are the pre-requisites that a organization is ready or prepared for a ciber crime or attacks.What we will do if a data get stolen or a crime happened and needs immediate investigations?What are the following documents to be prepared for read...
Prasanth914 | 10/23/2015 1:52:03 AM | COMMENTS(2)
More sophisticated and powerful computer systems are playing an ever-growing role in our professional and private lives. On the plus side, information is moving faster and at cheaper costs. Business has become more efficient and people, in their role as c...
Gadnus | 6/23/2015 12:18:08 AM | COMMENTS(6)
Hi everybody, There was an ISACA webinar about the harsh reality of cyber protection in which a new methodology called "exploit prevention module" was described. Does anybody utilizes this tool as security measure? Is there any experience you could shar...
Rainer092 | 6/23/2015 12:17:27 AM | COMMENTS(9)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 3:56:49 AM | COMMENTS(0)

Documents & Publications: 52 total

Events & Online Learning: 1 total

17 Oct 2016
ISACA International Event
Las Vegas, NV, US

Journal Articles: 45 total

Volume 3, 2016
by Davi Ottenheimer and Matthew Wallace | Reviewed by A. Krista Kivisild, CISA, CA, CPA
This book is aimed at anyone with an interest in security and compliance in virtualized and cloud environments—appealing to both technical and nontechnical readers.
Volume 2, 2016
by Leighton R. Johnson III | Reviewed by A. Krista Kivisild, CISA, CA, CPA
The book addresses how to prosecute malicious insiders or external hackers and describes all of the incident response stages that should be followed and completed.
Volume 1, 2016
by Steven J. Ross, CISA, CISSP, MBCP
Twice in the past year or so I have received replacement credit cards because the numbers and expiration dates had been disclosed by merchants that I frequented.
Volume 6, 2015
by Wade Alcorn, Christian Frichot and Michele Orru | Reviewed by Ibe Etea, CISA, CRISC, CA, CFE, CIA, CRMA
To understand the vulnerabilities in web browsers and how to strengthen them, it is necessary to learn the methods of infiltrating and wreaking havoc on browsers.
Volume 5, 2015
by Gary Lieberman, Ph.D., CISSP
With 2014 being known as The Year of the Mega Breach, cyberattacks have quickly become a key focus in almost every BC/DR program.
Volume 5, 2015
by Steven J. Ross, CISA, CISSP, MBCP
If you think of cyberattacks as war, which it is in both the figurative and literal senses, make yourself ready to win it.

Wikis: 2 total

Blog Posts: 7 total

For a long time, the main focus of most organization was to have a solid protected network perimeter, by installing the most powerful shiny firewall, IPS/IDS to avoid intruders to trespass inside their networks. The endpoint (host) protection was always c...
Posted By : Willian Guilherme | 0 comments
Agile technique in software development has been around for quite some time. There have been efforts to adopt the agile techniques for strategic planning, alignment and execution. Following are some of the relevant articles/blog posts in this area. The to...
Posted By : SA | 0 comments
Slowly are organization have started using web as a service delivery platform.   Various study reveals that the web as the most economical platform and branches / office being the most expensive platform for the delivery of service to customer. Further w...
Posted By : Parthasarathy | 0 comments
13 Nov 2014
Now a days, you don’t need to be a IT guru or best software programmer to access /control other personal/organization data. If you follow below techniques, you can easily get confidential information.1. Masquerading2. Tailgeting (Piggy back)3. Dumpster di...
Posted By : Shaklain | 1 comments
On March 1st,  I was invited to speak at the CampIT conference on Enterprise Risk/Security Management at Rosemont Convention Center. Before me there were two speakers. The first presenter spent an hour presenting the story from the trenches of technolog...
Posted By : appolloconsulting | 2 comments
(By: William Darío Ávila Díaz, PhD)A new tool to combat Internet crime is now a reality thanks to an agreement signed by thirty countries, where they commit to the creation of international legislation attached to the local laws of each of the nations. Th...
Posted By : William733 | 2 comments