MIS 213 Spring 2015. Why are we talking it?  It’s a major problemproblem  What do you think of?

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
LA BEOC Built Through Public – Private Collaboration.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.

8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Using the Internet? Is the internet a safe place?.
Lesson 1: Understanding Browsers. This unit is a set of investigations into how to protect against digital threats, and how to detect digital crimes.
Quiz Review.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Securing Information Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
IT Security for Users By Matthew Moody.
Social The social impact may include allowing others to access your personal information, potential employers cheacking your face book page to obtain.
Non Physical Business Interruption Malcolm Randles, Underwriter, Kiln Syndicate February 2011.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
computer
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Slide 1 of 12 Cybersecurity o Threats Risks Vulnerabilities o 6 Environments o Competitive Environment o Technological Environment o Cyber risks o Infrastructure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
The social impacts of ICT is that its gives you access to your personal information. Face book is acceptable in some cases because employers can access.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hurdles in implementation of cyber security in India.
1 A Lesson in Cyber Terrorism. 2 Cyber Terrorism Look up definitions to the listed terms using the website below
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
The social impacts of IT: Spending more time on the computer, laptop, phone, tab etc. than going outside. Negative effect on health. Negative effect on.
ONLINE RISKS FOR TEENS MRS. WISCOUNT. DO YOU KNOW WHO YOU ARE TALKING TO? design-a-seo-blog?start=55
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Click to edit Master title Information Security: A Discussion Wednesday, December 6, 2006 Bob Steadman Director, National IT Security Sobeys.
Mission Computers Inc.  In 2013 ◦ 1,000,000,000 phones were hacked  because of ◦ lack of a secure password or ◦ no password at all Source:
1 A Closer Look at Cyber Terrorism. 2 Cyber Terrorism Look up definitions to the listed terms using the website below
Tech Vocab Slideshow Quarter 4 By: Jordan McCamman.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
MIS323 – Business Telecommunications Chapter 10 Security.
Loss caused by customer theft, fraudulent payment, or nonpayment is a human risk.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Calgary Computer Security Solutions
Securing Information Systems
GCSE ICT SECURITY THREATS.
Liberty International Underwriters
P.6 Impacts of Technology on society.
Securing Information Systems
Norton.com/Setup | +1(844) | Norton Internet Security
Reconnaissance Report Trillium Technologies
Prepared By : Binay Tiwari
Keeping your data, money & reputation safe
Cybersecurity ATD Scenario conclusion
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Year 7 ICT Topic 3: e-Safety Challenge: Easy Reward: 1 – 4 HPs
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

MIS 213 Spring 2015

Why are we talking it?  It’s a major problemproblem  What do you think of?

Types of Threats  Virus  Spyware  What’s the difference?  What can they do?

Viruses/Malware  How do they get on your computer?  How can you keep them off? How can companies keep them off?  How do you get them off?

Threats  Phishing Spear Phishing  Whaling  Hacking Where is the threat? How do they get in?

Controls and Risk  Physical  Electronic  Policy  Backups

New Developments  Cyber Warfare SCADA  Cyber Terrorism  State sponsored hacking