Page 427 - Using MIS
P. 427

Q2  How Big Is the Computer Security Problem?   395
                            Q2         How Big Is the Computer Security Problem?



                                       We do not know the full extent of the financial and data losses due to computer security threats.
                                       Certainly, the losses due to human error are enormous, but few organizations compute those
                                       losses, and even fewer publish them. However, a recent security report by Verizon called 2013
                                       “year of the retailer breach.” The number of user accounts stolen by hackers included Adobe
                                       150 million, Target Corp. 98 million, LivingSocial 50 million, Evernote 50 million, Korea Credit
                                       Bureau 20 million, Facebook 6 million, Schnuck Markets 2.4 million, Vodafone 2 million, and
                                                              2
                                       Neiman Marcus 1.1 million.  These are only the companies that made the news and reported
                                       estimated losses.
                                           Losses due to natural disasters are also enormous and impossible to compute. The 2011
                                       earthquake in Japan, for  example, shut down Japanese manufacturing, and losses rippled
                                       through the supply chain from the Far East to Europe and the United States. One can only imag-
                                       ine the enormous expense for Japanese companies as they restored their information systems.
                                           Furthermore, no one knows the cost of computer crime. For one, there are no standards for
                                       tallying crime costs. Does the cost of a denial-of-service attack include lost employee time, lost
                                       revenue, or long-term revenue losses due to lost customers? Or, if an employee loses a $2,000
                                       laptop, does the cost include the value of the data that was on it? Does it include the cost of the
                                       time of replacing it and reinstalling software? Or, if someone steals next year’s financial plan,
                                       how is the cost of the value that competitors glean determined?
                                           Second, all the studies on the cost of computer crime are based on surveys. Different re-
                                       spondents interpret terms differently, some organizations don’t report all their losses, and some
                                       won’t report computer crime losses at all. Absent standard definitions and a more accurate way
                                       of gathering crime data, we cannot rely on the accuracy of any particular estimate. The most we
                                       can do is look for trends by comparing year-to-year data, assuming the same methodology is
                                       used by the various types of survey respondents.
                                                                                               3
                                           Figure 10-4 shows the results of a survey done over four years.  It was commissioned by
                                       Hewlett-Packard and performed by the Ponemon Institute, a consulting group that specializes
                                       in computer crime. As shown, the study estimated the median loss per organization in 2013 to
                                       be $9.1 million, more than double that in 2010. From this we can conclude that the cost of crime
                                       for most organizations is increasing, but within bounds. Computer criminals aren’t taking more
                                       per incident, but they’re taking more from more organizations.
                                           By the way, this data underlines the problems of tallying crime data from surveys. In 2013,
                                       no organization reported less than $1.3 million in loss. Clearly, the survey did not include small
                                       companies that incurred small losses. Given the large number of small companies, those un-
                                       known losses could be substantial.
                                           Figure 10-5, from the same Ponemon study, shows the average cost and percent of total
                                       incidents of the six most expensive types of attack. Without tests of significance, it’s difficult to
                                       determine if the differences shown are random; they could be. But, taking the data at face value,





            Figure 10-4                                               2010     2011     2012     2013
            Computer Crime Costs per                 Maximum          $51.9    $36.5    $46.0    $58.1
            Organizational Respondent
            (Worldwide, in Millions of U.S.
            Dollars)                                 Median           $3.8     $5.9     $6.2     $9.1
            Source: Ponemon Institute. 2013 Cost
            of Cyber Crime Study: United States,     Minimum          $1.0     $1.5     $1.4     $1.3
            October 2013, p. 5.


                                       2 Verizon 2014 Data Breach Investigations Report, accessed June 2014, www.verizonenterprise.com/DBIR/2014/.
                                       3 Ponemon Institute, 2013 Cost of Cyber Crime Study: United States. October 2013.
   422   423   424   425   426   427   428   429   430   431   432