Show simple item record

dc.contributor.authorQuinn, K J Spikeen_NZ
dc.date.available2011-04-07T03:16:20Z
dc.date.copyright2010-11en_NZ
dc.identifier.citationQuinn, K. J. S. (2010). 2010 New Zealand computer crime and security survey (Technical Report). New Zealand Computer Crime and Security Survey. Retrieved from http://hdl.handle.net/10523/1455en
dc.identifier.urihttp://hdl.handle.net/10523/1455
dc.description.abstractThe New Zealand Computer Crime and Security Survey is conducted by the Security Research Group (SRG) of the University of Otago, in partnership with the NZ Internet Task Force (NZITF), New Zealand Police, and the Computer Security Institute (CSI). This 2010 survey is the fourth annual New Zealand (NZ) survey. It is based on the US CSI Computer Crime and Security Survey, the longest running continuous survey in the information security field and commonly known as a leading source of statistics related to computer crime and security. The 2010 survey results are based on the responses of 176 computer security practitioners in NZ utility, manufacturing / production, financial, telecommunications, transport, high technology, medical, wholesale, retail, tertiary education, legal, national and local government agencies, entertainment/media, construction, commercial/trade services providers regarding the 2009 calendar year. All monetary figures are in NZ$, roughly equivalent to US$0.75 at time of publication. Considerations in this survey are: - Budgeting: percentage of IT budget spent on security, outsourcing of security function, incident insurance, security investment, cost-benefit metrics in security planning - Frequency, Nature and Cost of Cyber Security Breaches - Incidents and the Law - Security Audits and Security Awareness - Security Technologies - IT Standards, Policies and Procedures - Information Security Training, Qualifications and Certification - Perceived Importance of Threats - Mobile device deployment prevalence, security incident incidence and protection measures - Conficker incidence, handling and cost - USB Protection NB References to US figures refer to those from CSI surveys. In referring to monetary costs, ‘k’ is substituted for ‘thousand’ for brevity.en_NZ
dc.format.mimetypeapplication/pdf
dc.publisherNew Zealand Computer Crime and Security Surveyen_NZ
dc.subjectComputer securityen_NZ
dc.subjectNew Zealand Computer Crime and Security Surveyen_NZ
dc.subjectComputer Security Instituteen_NZ
dc.subjectNew Zealand’s Centre for Critical Infrastructure Protectionen_NZ
dc.subjectNew Zealand Policeen_NZ
dc.subjectNew Zealand Internet Task Forceen_NZ
dc.subjectComputer Crime and Security Surveyen_NZ
dc.subjectSecurity Research Groupen_NZ
dc.subjectSRGen_NZ
dc.subjectCSIen_NZ
dc.subjectCCIPen_NZ
dc.subjectSRG surveyen_NZ
dc.subjectIntruder Detection Systemsen_NZ
dc.subjectcommon workstation operating systemsen_NZ
dc.subjectsecurity issuesen_NZ
dc.subjectsecurity incidentsen_NZ
dc.subject.lcshT Technology (General)en_NZ
dc.subject.lcshQ Science (General)en_NZ
dc.subject.lcshQA76 Computer softwareen_NZ
dc.title2010 New Zealand computer crime and security surveyen_NZ
dc.typeTechnical Reporten_NZ
dc.description.versionPublisheden_NZ
otago.date.accession2010-12-01 01:20:55en_NZ
otago.openaccessOpen
otago.place.publicationDunedin, New Zealanden_NZ
dc.identifier.eprints1017en_NZ
otago.school.eprintsSecurity Research Groupen_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.references1. 2009 CSI Computer Crime and Security Survey. Available online from: http://gocsi.com/survey 2. 2007 NZ Computer Crime & Security Survey. Available online from: http://eprints.otago.ac.nz/895/ 3. 2008 CSI Computer Crime and Security Survey. Available online from: http://www.i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf 4. 2006 NZ Computer Crime & Security Survey. Available online from: http://eprints.otago.ac.nz/732/ 5. 2005 NZ Computer Crime & Security Survey. Available online from: http://eprints.otago.ac.nz/342/ 6. Wolfe H.B., (2007). Electronic Forensics: A Case for First Responders. Proceedings of Forum for Incident Response and Security Teams (FIRST) 2007 - Seville, Spain. Available online from: http://www.first.org/conference/2007/papers/wolfe-henry-paper.pdf 7. ISO/IEC 27037 -- IT Security -- Security techniques -- Guidelines for identification, collection and/or acquisition and preservation of digital evidence (DRAFT). Available online from: http://www.iso27001security.com/html/27037.htmlen_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record