Information Security Casebook

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Information Governance Jym Bates Head of Information Assurance.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
YOUR FINANCIAL FUTURE A GUIDE TO MANAGING YOUR FINANCES.
R ed F lag R ule Training for the Veterinary Industry © Chery F. Kendrick & Kendrick Technical Services.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Introduction to Computer Security PA Turnpike Commission.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Data Protection Act ‘ What you need to know’ Corporate Information Governance Team Strategic Intelligence.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Topic 5: Basic Security.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
You. are at risk for the fastest growing crimes crime.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Mr C Johnston ICT Teacher
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
H UMAN R ISKS By: Rachel, Melika, & Mellisa. H UMAN R ISKS Risks caused by human mistakes or dishonesty, or other risks that can be controlled by humans.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Computer Security Keeping you and your computer safe in the digital world.
2014 From Phish to Phraud Kat Seymour October 10, 2014 #GHC
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
BSHS 442 Week 3 DQ 1 Check this A+ tutorial guideline at 442/BSHS-442-Week-3-DQ-1 Explore the challenges and potential.
Identity Theft It’s a crime!
Handling Personal Data
LAND RECORDS INFORMATION SYSTEMS DIVISION
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter 3: IRS and FTC Data Security Rules
Five Unethical Uses of Computers
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Confidentiality October 14, 2005.
Data Protection Scenarios
Protecting Your Identity:
Cyber Issues Facing Medical Practice Managers
Risk Management: Insurance
Understand ethics and ethical decision-making.
INFORMATION GOVERNANCE
Encryption and Hacking
Protecting Yourself from Fraud including Identity Theft
Objective 5.02 Understand ethics and ethical decision-making.
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Presented by Elizabeth Kunkel Member Service Trainer
LO1 - Know about aspects of cyber security
Understand ethics and ethical decision-making.
Anuj Dube Jimmy Lambert Michael McClendon
REGIONAL WORKSHOP ON WHISTLEBLOWER PROTECTION IN SECURITY SECTOR
Handling information 14 Standard.
School of Medicine Orientation Information Security Training
Presentation transcript:

Information Security Casebook Your Name

Objectives At the end of this session you will be able to: Identify the main risks that occur when the security of our information is compromised Recognise your personal responsibility for the security of information and what this means in practical terms 2

Which of these is correct? Information security has got nothing to do with data protection law. Information security is essential to comply with data protection law but covers much more. Information security is just another term for complying with data protection law.

Confidential Information

Potential Threats Theft and Malicious Activity Leakage of Information Corruption of Information and Systems

Possible Consequences Lose Money Damage to Reputation Complaints generated Fines or other sanctions

The Cases Case 1 Case 4 Case 7 Case 8 Case 5 Case 2 Case 3 Case 6

Objectives At the end of this session you will be able to: Identify the main risks that occur when the security of our information is compromised Recognise your personal responsibility for the security of information and what this means in practical terms 8

Case 1: Identity Cards What must you do if you forget your card? Should you challenge your colleague?

Case 2: Passwords Colleague forgets password Password guidelines

Case3: Desk Security Computer Confidential papers

Case 4: Telephone Call How do you know who you are talking to? Does an identity check matter if you are making the call?

Card 5: Payment Cards Taking payment details Recording payment details

Case 6: E Mail Attachment Unexpected e-mail Unexpected attachment

Case 7: Homework? Confidential Project Wants to e mail work to home computer

Case 8: Company Laptop Takes laptop home Leaves it in parked car

Case 9: Loose Talk Social gathering Is it alright to talk about work?