Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Ethics, Privacy and Information Security
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Crime and Security in the Networked Economy Part 4.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Information Security Management Chapter “We Have to Design It for Privacy and Security. ” Tension between Maggie and Ajit regarding terminology.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Security, Privacy, and Ethics Online Computer Crimes.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Security Issues: Phishing, Pharming, and Spam
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
Securing Information Systems
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Risks and Revenues Virtual Business Copyright © Texas Education Agency, All rights reserved.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
CYBER CRIME.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Information Security MGMT Summer 2012 Night #4, Lecture Part 2.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Section 6 Theory Issues with information found on the Internet.
CONTROLLING INFORMATION SYSTEMS
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
An Introduction to Phishing and Viruses
how to prevent them from being successful
CHAPTER 4 Information Security.
Securing Information Systems
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
Malware, Phishing and Network Policies
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately for organisations, the greatest security threat is from its employees.

Accidental employee errors Losses from accidental employee errors stem from ignorance and carelessness. Some of the dangers to information refrom accidents include: ■ failure to keep dust out of computers ■ failure to consistently backup information from portable devices ■ accidental dropping of equipment ■ loss or theft of equipment ■ liquid spillage ■ non-adherence to handling procedures for storage devices ■ carelessness when inputting data

security Question You have no doubt heard the term ‘ scam’, or perhaps even experienced it. What do you think this means? Why would businesses feel threatened by scams? In small groups, brainstorm a list of all the scams you have heard or read about. See if you can identify at least five different scams. Search the internet to find more and discuss the different types found.

security Steps that employers can undertake to ensure risks are kept to a minimum are outlined below. 1 Develop an policy that is signed (and followed) by every employee. 2 Train employees to recognise possible threats, as many employees open s through ignorance of the types of fraud that exist. 3 Provide continual reminders and updates on the types of new scams.

Some different categories of scam are malware, phishing, vishing, pharming and mule recruitment. Malware is software designed to infiltrate or damage a computer system without the owner’s informed consent. Phishing refers to the use of spam s purporting to be from a financial institution in the hope of luring unsuspecting, innocent people into providing their personal information, such as credit card numbers, passwords, account data or other banking details.

Pharming differs from phishing in that it operates through real URL addresses. When a user types in a web address, such as their bank’s, they are immediately taken to a copycat website, without having any idea that the site is bogus. Hackers then use spyware, Trojan horses or a virus to get past a computer’s defences and lodge itself into the background of the user’s computer. Vishing is voice phishing. Instead of posing as a bank, phishing for financial details on the internet, victims are lured into calling a number and providing details over the phone. Mule recruitment is when criminals attempt to get a person to receive stolen funds using his or her bank account, and then transfer those funds to criminals overseas

Question Type a paragraph in which you compare the difference between malware, phishing, vishing, pharming and mule recruitment. Why do you think security is so important to any organisation?