-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April 2011 -Hacker gained access to personal information -May have.

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

Section C Threats to Data.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Parachute Neighborhood Watch Presentation February 9, 2010.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Cyber Security and the Global Business Environment Jeremy Schaar:)
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft consumer.gov. What is identity theft? When someone uses information about you without your permission. The information can be your: – Name.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
INTERNET SAFETY.
What is identity theft, and how can you protect yourself from it?
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Ethical Hacking by Shivam.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Social impacts of the use of it By: Mohamed Abdalla.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
報告者:劉旭哲 Anonymous: We didn't hack PlayStation Network.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Staying Safe Online Keep your Information Secure.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Scams & Schemes Common Sense Media.
TRENDS IN COMPUTING VIDEO GAME CONSOLES ~ BY DREW CRONIKEN 4096 WILDERN SCHOOL
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Hackers And Hacking.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
MORE MONEY FOR CYBER- SECURITY?. CYBER SECURITY: A TICKING TIME BOMB? Richie Sabu G/T Independent Research Howard High School Mr. Brian Price, Advisor.
By Jessica Parkinson. Mobile phones have allowed our generation to connect with others all over the world. However, the potential threats are numerous,
INTRODUCTION & QUESTIONS.
The Internet of Things(IoT) BY CODEY DISNEY. Objectives  What Is the IOT?  How are corporations at risk? What are the security risks and what can happen.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
CYBER CRIMES Know how's of cyber crimes. I’M HERE………
Social impacts of IT By Lewis dancocks. Social impacts Due to IT people around the world can commutate with each other anywhere at any time, this is due.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Computer games are very popular across the whole world. Computer games are one of the biggest ways to make money. They are across all types of platform.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Issues for Computer Users, Electronic Devices, Computer and Safety.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Check By Phone Software - A Tool To Accept Checks Payments in Seconds Submitted By :
Merchant Services for Website Paycron. About Paycon Paycron is purposive in meeting immediate solutions in crafting merchant account services and credit.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Policy Development Milan Adams.
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Who am I?. Information Security and You: Identity Theft and Credit Card Encryption.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

-Tyler

Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have gotten credit card information -77 Million customers affected Reliability and Integrity - Network went down for over a week - Sony didn’t notify customers of attack until almost a week later

Relationship between primary stakeholder and IT system Customer’s relationship Customer uses internet to connect to network Uses network to play games online with other people through internet Gives personal information to create account and buy extra stuff through the network Trusts that Sony will store information securely

How the Playstation Network works Connect to network via internet on console or computer Create an account by entering information such as name, address, and other standard information Turn console on, enter account username and password You are now able to connect to PSN and play online with friends locally and around the world.

Relationship between IT system and Criterion A system The security issue is placed solely on PSN PSN is responsible for storing information securely Must support over 77 Million customers

Impact of social/ethical issues on stakeholders + Network allows to connect with friends + Global + Lead to better security + Company finds vulnerabilities - Customers at risk for identity theft - Company loses money

Impact of issues continued - Third party developers will be more wary to create games for network - Investors lose money - Company gets sued - Embarrassing for company

Solution to one problem in Criterion C Problem – Hacker got personal information Solution – Educate consumers about what to do if this ever happens again Hackers will always be around Educate consumers what to do if their personal information gets compromised Notify credit card company File potential fraud report

Conclusion The Playstation Network is a great network to connect with friends Hackers will always be trying to find ways into places they aren’t suppose to Sony just has to learn from their mistakes and improve their security