Web Security and Regulations Unit 23. Assessment Objective One Research and describe current and past security risks.

Slides:



Advertisements
Similar presentations
CSC668 Topics in Computing Project Information and Suggestions.
Advertisements

Lesson Objectives, Unit 4. Learn what is required for Unit 4 Assessment 1.
E-Commerce Unit 06 A/601/7313 LEVEL 3
Digital Citizenship Instruction and Resources Julie Harris Media Specialist Rochester High School Rochester Hills, MI.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Key Words. Investigating measures to control security risks Ao2.
0-1 Team # Status Report (1 of 4) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team #: Team Name.
0-1 Team # Status Report (1 of 4) Client Contact –Status Point 1 –Status Point 2 Team Meetings –Status Point 1 –Status Point 2 Team Organization –Description.
Unit 24 OCR Nationals – LEVEL 3 Kick Start. Well you asked... There are no Model Assignments for any of the Units beyond the compulsories, so this is.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Credit Card Fraud, Jan Prochazka, Credit Card Fraud on the Web Jan Prochazka.
Desktop Publishing Unit 7. Unit Layout Five Assessment Objectives Unit Completion end of January – Allowing 2-3 Months contingency work.
Using the Internet? Is the internet a safe place?.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Digital Literacy. Productivity Programs Digital Literacy Courses and Topics Computer Basics Security and Privacy Internet and Web Basics Digital Lifestyle.
Business Studies Information & Communication Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
OCR Nationals Technological Innovation and E-Commerce Unit version.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
RI Advice - Cyberfraud PRESENTED BY Peter Ornsby | Nov 2014.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
OutlookHotmail Professional service Contains features such as calendar, contacts, high priority/low priority, etc Controlled (to some extent)
Following the submission of your CV and letter of application, the head of Human Resources has invited you to proceed to the second stage of the recruitment.
Structures, Strategies and Compositions Lesson 7 Decisions made when fulfilling role Adaptations to SSC.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
ICT & Crime Identity theft & fraud. Homework Worksheet – due back on Monday.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Information Security: Current Threats Marc Scarborough Information Security Officer
Understand why software needs installing or upgrading
Cybersecurity Test Review Introduction to Digital Technology.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
SLC – You tell me Web design – Using software design a website.
OCR National Travel and Tourism Unit 5: Assessment Objective 2a Thorpe Park.
Unit 4 – Design and produce multimedia products AO1 – Review existing interactive multimedia products Mr S Farmer.
Introduction to E-commerce Principles By Dr. Gabriel.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Tech Level 3 Cyber Security
Comprehensive Security and Compliance at an Affordable Price.
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Level 2 Diploma Unit 11 IT Security
Lifecycle Services for Advanced Wireless LAN (LCSAWLAN) practice-questions.html.
NTC 411 Competitive Success-- snaptutorial.com
NTC 411 Education for Service-- snaptutorial.com
NTC 411 RANK Knowledge is divine-- ntc411rank.com.
NTC 411 RANK Perfect Education/ ntc411rank.com.
NTC 411 Teaching Effectively-- snaptutorial.com
Starter What is identity theft?
Computer Security.
Cambridge TECHNICALS- LEVEL 3
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Web Security and Regulations Unit 23

Assessment Objective One Research and describe current and past security risks

Pass Candidates research and provide a basic description, supported with few examples, of: three security breaches, two examples of fraudulent use of ecommunications, one hazard through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They describe, in basic terms, the vulnerability of WLANs (wireless local area networks).

Merit Candidates research and provide a detailed description, supported with appropriate examples, of: three security breaches, two examples of fraudulent use of ecommunications, two hazards through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They clearly describe the vulnerability of WLANs.

Distinction Candidates research and provide a comprehensive description, supported with a variety of well chosen examples, of: three security breaches, two examples of fraudulent use of e- communications, two hazards through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They evaluate the vulnerability of WLANs.

Three Security Breaches House Analogy Three Teams Three Questions Three Minutes How is your house protected How are your belongings protected What is the worst case scenario is your house security is breached

School Security

Security Not just hacking! Gaining information through any means

Three Famous Breaches! Labour Party Photo Gallery Data Leak from a University Careers site USA theft of credit card details from an eCommerce enterprise

Other Breaches

Merit Candidates research and provide a detailed description, supported with appropriate examples, of: three security breaches, two examples of fraudulent use of ecommunications, two hazards through site overload and two examples of hardware or software being contaminated or ruined through e-communications. They clearly describe the vulnerability of WLANs.

Fraudulent use of E- Communications Scams are the most common The “Nigerian Scam” is the most common

Fraudulent use of E- Communications Phishing Scams NbGdU

Outcomes Two Scams – How they worked – The outcomes – How it could have been stopped – Why are these two noticeable – Quote sources – Start of Thursdays lesson.

Task Three One hazard through site overload (DoS Attacks) Two examples of hardware or software being contaminated or ruined through e-communications.

Homework They clearly describe the vulnerability of WLANs.

Submission Work due in at the start of Mondays Lesson