Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

GCSE ICT Networks & Security..
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Your Identity: What to Know, What to Do.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
A guide to protecting your money and your identity KEEPING MONEY SAFE Keeping money safe Money Works: Level 1 Topic 3.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Protecting Your Identity While Attending College.
Lloydes TSB Case Study Lloyds: LloydsTsb is the banking arm of Lloyds International One of the only banks left with rural branches found in villages They.
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
Identity Theft By: Victoria Tuttle. DeterDetect Defend.
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services.
Identity Theft The Nation’s Fastest Growing Crime.
By: Asfa Khan and Huda Mukhtar
Jeff loses his identity! Lesson 8: Identity Theft.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
You. are at risk for the fastest growing crimes crime.
TAXCO BUSINESS SERVICES INC. Division of Des-Dawn Corporation BOOKKEEPING | PAYROLL | TAX FILING | TAX PLANNING | CONSULTING INTRODUCING TAXCO BILL PAY.
Protecting Your Assets By Preventing Identity Theft 1.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
An Online learning journal system. Staff record children's progress and activities using tablet devices and PCs. Parents can view their child’s journal.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
TYLER GROUP
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Protecting Your Assets By Preventing Identity Theft
ELECTRONIC PAYMENT SYSTEM
Attention Identity theft Definition
Protecting Your Identity:
Consider cards over cash
Consider cards over cash
What is Tapestry? An Online learning journal system.
What Is Tapestry? An Online learning journal system.
What Is Tapestry? An Online learning journal system.
Protecting Your Identity:
Who Uses Encryption? Module 7 Section 3.
Consider cards over cash
Feedback from people with learning disabilities
Data Protection Managing risk is not just about health and safety and insurance. It’s about data protection too. New stricter data protection legislation.
Protecting Your Credit Identity
Presentation transcript:

Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304

What happens when governments transfer data? HMRC(HM Revenue and Customs) lost 25 million individuals' data The data included information all families in the UK with children under the age of 16 Two disks were being transferred between branches of the government The information was being sent to the National Audit Office  This was to check for benefits fraud

The database Key identifier is the National Insurance Number Other information included  All family members names living in the same house Partners included  Dates of birth  Addresses  Employment information  Bank account information for head of household The disks were password protected, but not encrypted

The Black market for your information Bank account numbers=$30 to $400 Credit cards=$.50 to $5 15 million bank accounts were tied to the information that was lost The two missing computer discs could be worth up to £1.5bn to criminals.

Government Reaction Government only announced problem after a month of the data missing Set up hotline for fraud awareness/prevention  Which told people to check their bank accounts Sent out letters of assurance HMRC chancellor resigns

Two years on The government still loses one PC a week to theft  The discs have still no been found Procedures aren't being followed  After the first disks were lost, a second set was posted off. In breach of procedures. Data can still be directly downloaded from computers with sensitive information There are no controls on removable storage devices

Changes need to be made Removable devices need to be disabled Government agencies need to be hooked up to a secure network Encryption Access to large databases of information needs to be protected both online and in person Separate databases for names and financial data Don’t transfer computer information by MAIL!!!