Ethics, Part 2 Chapter 5 pp. 153-169 2017 National Income Tax Workbook™

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Using Your Knowledge – Security Threats
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Issues Raised by ICT.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Viruses & Destructive Programs
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
 Malicious Code  Hacking  Natural Disaster  Theft.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
R ANSOMWARE CAN ORIGINATE FROM A MALICIOUS WEBSITE THAT EXPLOITS A KNOWN VULNERABILITY, PHISHING CAMPAIGNS,
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
Cyber Issues for Design Professionals
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
Breaking Down Cyber Liability
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
E&O Risk Management: Meeting the Challenge of Change
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Instructor Materials Chapter 7 Network Security
Network security threats
CHAPTER 6 – BASIC SECURITY
Cyber Security By: Pratik Gandhi.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Securing Information Systems
Teaching Computing to GCSE
Cybersecurity Awareness
– Communication Technology in a Changing World
Cyber Issues Facing Medical Practice Managers
Cyber Trends and Market Update
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Forensic and Investigative Accounting
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
School of Medicine Orientation Information Security Training
Presentation transcript:

Ethics, Part 2 Chapter 5 pp. 153-169 2017 National Income Tax Workbook™

p. 153 Introduction Cybersecurity Risk of a cyberattack Cybersecurity breaches Cost of a cybersecurity breach Risk management

p. 154 Continuing Education The duty to safeguard client privacy and security is an ethical duty Per the IRS, identity theft and data security programs that focus on enhancing tax professional awareness of protecting client data can also qualify for continuing education credit in the federal tax law category

p. 154 Risk of Cyberattack Data breaches increased 40% in 2016 Small businesses at greater risk because less time, money, and expertise to defend against cyberattack As big businesses become more secure, attackers target small businesses Attackers specifically targeting tax practices

Cybersecurity Breaches pp. 155-157 Hacking Phishing Denial-of-Service (DOS) Malicious Code Theft or Loss of Device Employee/Vendor Error

p. 155 Hacking Steal info or shut down the system Exploiting vulnerabilities to gain unauthorized access Download virus Unsecure wireless Unauthorized access to password Steal info or shut down the system

p. 155 Example 5.1 Hackers broke into retail credit card system of T.J. Maxx and Marshalls. Intercepted wireless transfers. Stole more than 90,000,000 credit and debit card numbers.

p. 155 Phishing Email that looks legit but designed to steal confidential information In 2016 IRS saw 400% increase in phishing and malware incidents

Example 5.2 p.155 New hire at the bank got a welcome email Appeared to come from HR Asked for DOB and SSN Really from third party trying to get confidential info

p. 155 Denial-of-Service Attacks Sends flood of requests to a web page so that the server crashes Legit users cannot access the system or the website

pp. 155-156 Example 5.3 DoS attackers hit Dyn Data Center and overwhelmed systems with junk data traffic Started on the East Coast and then international Disrupted access to Twitter, Netflix, and PayPal

p. 156 Malicious Code Gives the computer incorrect or destructive instructions Designed to damage, disrupt, steal Comes from infected drive, spam email, hacked webpage

p. 156 Example 5.4 Attackers planted malware on Hannaford Bros. servers. Intercepted payment card data. Forwarded up to 4.2M stolen card numbers overseas

Other Malware p. 156 Viruses – alter, replicate, and damage Trojan Horses – loss or theft of data Ransomware – blocks access to data

p. 156 Example 5.5 2017 Ransomware attack began in Europe and Asia, then spread. Attackers encrypted files, locking more than 200K computers in over 150 countries. Display screen demanded $300 in Bitcoin to restore the files

Spyware and Adware p. 157 Spyware - may display advertising, collect personal information, or change the configuration of a computer Adware - displays unwanted advertisements (like pop-ups), redirects search requests to advertising websites, and collects marketing data

Theft or Loss of Device p. 157 Breach b/c of theft or loss of Laptops Smart phones Tablets Removable media

p. 157 Example 5.6 Veterans Affairs employee was working from home. Laptop and external hard drive stolen. Unencrypted information on 26.5M people, including names, SSNs, and DOBs

Employee Errors p. 157 Unknowingly download malware Use an unsecure computer network Inadvertently release personal information

p. 157 Example 5.7 The Boston Globe accidentally recycled paper containing subscriber financial data and used the recycled paper for routing slips in 9,000 bundles of newspapers – distributed to retailers and newspaper carriers. Info on about 240,000 subscribers disclosed

pp. 158-159 Costs of Cybersecurity Breach Internal Costs to investigate and respond External Costs like lost business and damaged equipment

p. 158 Internal Costs of Breach Detect and deter: IT guy or other security Investigate: forensic accountant to determine what, if anything, was taken Containment: shut down unsecure applications and stop an attack Recovery: back up and restore data Response: improve system to deter future attack

pp. 158-159 External Costs of a Breach Information loss or theft: attorneys, reporting, identity repair, penalties and fines, lawsuits Business disruption: downtime Equipment damage: repair or replace software and systems Lost revenue: damage to reputation, lost customers

pp. 159-161 Risk Management Reduce likelihood of breach IT manager Employee training and awareness System security, encryption, passwords Intrusion prevention and detection system Separate guest network, etc.

pp. 161-162 Risk Management Cont. Reduce the size of a loss Response plan Cybersecurity insurance

pp. 162-163 Cybersecurity Insurance Transfers cost of loss to insurance co. Look closely at what is covered: Loss of income Equipment damage Attorney, forensic investigator, PR person Third party claims and defense Ransom $ Regulatory fines or penalties, etc.

p. 163 Coverage Limits and Cost Coverage limits depend on: Size and scope of business Number of customers Presence on the Internet Coverage cost depends on: Number of clients Loss history Selected coverage

pp. 166-169 Appendix 2 Sample Information Security Plan Every tax practice should have one

Questions?