THREATS IT in HOTEL INDUSTRY Pertemuan 8

Slides:



Advertisements
Similar presentations
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Advertisements

1 Spreadsheet, Text Document & Data Table Pertemuan 5 & 6 Matakuliah: V0062/Pengantar Teknologi Informasi Tahun: 2008.
1 Pertemuan 10 Membuat dan mengelola resiko dan kriminalitas sistem informasi Matakuliah: H0472 / Konsep Sistem Informasi Tahun: 2006 Versi: 1.
The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Using Your Knowledge – Security Threats
Chapter 10 Privacy and Security McGraw-Hill
1 IT Cost Control Pertemuan Matakuliah: A Evaluasi Efektivitas Sistem Informasi Tahun: 2006.
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 Pertemuan 7 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Pertemuan 9-10 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
CSCE101 –Chapter 9 – Sections 2 and 3 Thursday, December 7, 2006.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Computer Ethics in Information Technology
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.
Chapter 14 Security, Privacy, & Ethical Issues in IS & the Internet.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
1 Computer Network & Communication Pertemuan 3 & 4 Matakuliah: V0062/Pengantar Teknologi Informasi Tahun: 2008.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 9 Enhancing Information/Computer Security.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
1 Internet & World Wide Web Pertemuan 7 Matakuliah: V0062/Pengantar Teknologi Informasi Tahun: 2008.
Using Information Technology
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
CONTROLLING INFORMATION SYSTEMS
IT-Secrurity Cookbook Enter your login: Enter your password:
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
Loss caused by customer theft, fraudulent payment, or nonpayment is a human risk.
Computer Security Threats
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Cyber crime and security issues
Information Security and Privacy in HRIS
Securing Information Systems
Using Information Technology
Securing Information Systems
Add video notes to lecture
Online Backup Service 30 Day FREE Trial
Internet & World Wide Web Pertemuan 7
Computing Issues that Affect Us All
Chapter 11 crime and security in the networked economy
Chapter 13 Security and Ethical Challenges.
Computers: Tools for an Information Age
Chapter # 3 COMPUTER AND INTERNET CRIME
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Presentation transcript:

THREATS IT in HOTEL INDUSTRY Pertemuan 8 Matakuliah : V0062/Pengantar Teknologi Informasi Tahun : 2008 THREATS IT in HOTEL INDUSTRY Pertemuan 8

Civil unrest and terrorism Threat Category Errors & accidents Human errors Procedural errors Software errors Electromagnetic problem “Dirty Data” problems Natural hazards Civil unrest and terrorism

Crime against computer & communications Threat Category Crime against computer & communications Theft of hardware Theft of software & data Theft of time and services Theft on information Crimes of malice & destruction\ Crimes using computers & communications

Threat Category Worms & viruses Computer criminals Hackers and crackers Employees Outside users Professional criminals

Threats in Hotel Industry Online Reservation Is it save or no?? How to solve the problem?

QUIZ Search the article about threats for IT in hotel industry, and make a summarize (groups)