Trojan Horse, Logic Bomb, Salami Technique, Superzapping, and Asynchronous Attack are: A. Names of this year's top five rock groups B. Impressive vernacular of Yuppies at their afternoon happy hour C. Informal Pentagon designations to categorize foreign military installations D. Labels coined by Wall Streeters in identifying causes of Black Monday E. Jargon evolving from the numerous automated computer crimes committed since the onset of the Age of Information If A, B, C, or D is your choice, this article may provide substantial insight into the management and security of computerized information systems. Recent studies by the American Bar Association,1 the American Institute of Certified Public Accountants,2 the American Bankers Association,3 the Inspector General of the U.S. Department of Health and Human Services,4 and Britain's Local Government Inspectorate5 acknowledge the rapid growth and profitability of computer crimes. Theft by computer is more lucrative, is much safer, and carries less punishment than armed bank robbery. The American Bar Association reported an estimated average annual loss from $2 million to $10 million by each computer abuse.6 Sixteen percent of the 199 fraud cases identified by the AICPA exceeded $100,000.7 Of the 67 computer fraud cases involving financial loss examined in the Local Government Inspectorate study, 22% exceeded $100,000.8 Twelve percent of the 65 cases reported in the Inspector General's report exceeded this amount.9The ABA survey of credit card fraud reported an increase from $5.5 to $29.2 million (430% increase) in the total dollar value of bank card fraud losses in a 12-month period.10 To compound the seriousness of the situation, one source predicts that computer crime will increase more rapidly than controls that detect and thwart the crimes.1 With the increase of computer literacy, this alarming trend has the potential for creating serious management issues for all organizations.
Read full abstract