Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Account Assurance Services This is what we protect you from the consequences of Cyber Crime.
Section C Threats to Data.
POSSIBLE THREATS TO DATA
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Social media threats. Warning! May contain mild peril.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Data Storage. Database structure 1 What is a database system? Answer 1 a database is a system for managing a collection of data. Answer 2 data bases are.
Unit 4 – Impact of the use of IT on Business Systems.
Protecting ICT Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Unit 19 INTERNET SECURITY
1.1 System Performance Security Module 1 Version 5.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Safety and Security issues of using ICT Alys brooks.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Dangers Technology Communication Tools E-Literate.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Privacy, Security and Ethics
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
MIS323 – Business Telecommunications Chapter 10 Security.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Information Management System Ali Saeed Khan 29 th April, 2016.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Securing Information Systems
Securing Information Systems
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
Lecture 5. Security Threats
CHAPTER 4 Information Security.
Topic 6: Issues Press F5 to view!
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Learning Area 1 Information And Communication Technology and Society
Prepared By : Binay Tiwari
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Possible Threats To Data

Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will be assessed by the creation of a PowerPoint presentation

The Need To Protect Easy to commit computer crime What crimes have you committed? Logged on as somebody else? Downloaded illegal music? Deleted somebody's work? Industrial espionage?

Threats To ICT Systems Data is valuable – Opportunist Threats Online crime – Phishing Malicious attacks on data – Cyber-Terrorists Malpractice Internal threats – Virus, Malware External threats – Natural Disasters

Importance Of Security All computers are vulnerable to continuous and ever-changing cyber attacks. This could result in some form of loss (data or financial) to an individual, organisation or society. Examples include: Damaged reputation for online traders Organisations secrets are spread to competitors or the general public Identity theft Disclosure of information can cause legal problems for an organisation – selling of personal information!

Preventative and Remedial Actions Passwords – good practice to….. Anti virus – what should be happening? Access levels – why? Think about a school.. Firewalls – why? Encryption….. Backups Physical protection How would you access the location?