Business Threats What could it mean for you?

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

UNIT 20 The ex-hacker.
Introduction and Overview of Digital Crime and Digital Terrorism
The Internet.
There are different threats and impacts that affect an organisation. Threats are things that the organisation will get attacked by so for example viruses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Using Your Knowledge – Security Threats
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
Security, Privacy, and Ethics Online Computer Crimes.
FIT3105 Security and Identity Management Lecture 1.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
CYBER CRIME AND SECURITY TRENDS
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Protecting ICT Systems
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Computer Crime and CyberCrime Why we need Computer Forensics.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
00870B2F.0/Internet%20Safety.jpg.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Monitoring Employees on Networks: Unethical or Good Business?
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
As a student in the NCCVT school district, you are privileged to have access to your own individual account on the District network. Your account.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Topic 5: Basic Security.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
INTERNET SAFETY.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
INTRODUCTION & QUESTIONS.
Safe’n’Sec IT security solutions for enterprises of any size.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
Securing Information Systems
Securing Information Systems
Chapter 1 Introduction to Computer User Support
Security, Social and Legal Issues Regarding Software and Internet
Add video notes to lecture
Misuses of ICT Malpractice and crime © Folens 2008.
Computer Ethics and Research
E&O Risk Management: Meeting the Challenge of Change
IT Security  .
To spy or not to spy; that is the question
Unit 32 – Networked Systems Security
A Project on CYBER SECURITY
Submitted By: Arslan Javaid Bsmc Submitted to: Sir Farrukh
Computer Technology in Health Care
Technology in Health Care
Chapter 11 crime and security in the networked economy
CHAPTER 4 Information Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
Internet Safety and Acceptable Use Policies.
Internet Safety and Acceptable Use Policies.
A Gift of Fire Third edition Sara Baase
Ethical Use of Computers
Presentation transcript:

Business Threats What could it mean for you? Lesley Price Manager RSC East Midlands

Outline Introduction Facts & Figures Examples from Industry Implications for educational establishments.

There once was an employee ……. Update tracking system Help desk Information on JISC Services Technical documentation Visit Colleges Technical Advice Web design

Who spent their time …………. On-line games Downloading music from Napster Chat rooms Downloading Games Software Piracy ‘Borrowing’ blank cds Passing off documentation

Resulting in ………….. Time wasting Poor customer service Poor team morale Additional Stress Lack of trust Illegal activities

2001 FBI Computer Crime and Security Survey 40% detected system penetration from outside. 25% in 2000 38% detected denial of service attacks 27% in 2000 91% detected employee abuse of Internet access privileges 79% in 2000 94% detected computer viruses 85% in 2000

Examples cited in the report Online Con Artist Steals Identities of World's Richest CD Rom containing details of thousands of prominent people. Swedish hacker stored music and video on American University server. Hacker gained access to confidential medical information at American University Medical School. Glitch in AT & T’s Web site exposed billing information.

Where does the threat come from? Internal Students Staff External Random or deliberate Disgruntled former staff/students Mr/Mrs X in cyberspace

How much do you rely on technology? Management Information Finance Registers Student Records Personnel Records Reports & Documentation stored electronically

How much do you rely on technology? Teaching & Learning Virtual classrooms Use of internet for resources Use of e mail as essential method of communication Supporting materials available in electronic format

How much do you rely on technology? Other uses Research Estates Marketing Purchasing Etc. etc. Is there an area that does not use technology?

What are the threats? Hi-tech Peeping Toms Work-rage assaults Stealing identities Stalking & harassment Stealing information Work-rage assaults Incorrect information put into the system Hacking Introduction of viruses

Possible implications ……. Reduced performance of the network Litigation Loss of productivity Physical loss of equipment Damage to credibility and reputation of the institution FINANCIAL COST

Only the bearer of bad tidings – need to wait until this afternoon!! Solutions ……..?? Only the bearer of bad tidings – need to wait until this afternoon!!