MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Section C Threats to Data.
POSSIBLE THREATS TO DATA
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Unit 4 – Impact of the use of IT on Business Systems.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crimes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
CYBER CRIME.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Done by… Hanoof Al-Khaldi Information Assurance
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
IT Security  .
Unit 4 IT Security.
Tool Server Workstation Router Universal
Scams, Identity Theft, and Viruses Kelly & Caitlin
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

MANAGING RISK

CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers can break into bank accounts and steal money and move it to other accounts. Unlawful purchases can be made from undesirable sites and unscrupulous organisations can offer illegal wares to the general public and adult products to under age consumers. Diverting financial assets – megabyte money – criminals are able to transfer sums of money across the Internet easily and quickly. Sabotage of communications – Virus’s through attachments. Bugs are likely to occur where where software is introduced prematurely onto the market without sufficient testing. Wireless telecommunications area also subject to sabotage – mobile networks. Anti Virus – software to protect your system – firewalls – blocking device

INTELLECTUAL PROPERTY THEFT Two main types of business: those that provide a service and those that make and /or sell products. Exclusive right s to a product – patent – cannot be copied – copyright. When a person or organisation copies or uses patented or copyright material without the owners permission this is called stealing intellectual property. This is a major problem with copyright material that is made available on the internet. Many people copy and paste information from the internet and pass it off as their own. This is an illegal activity and is known as plagiarism.

DENIAL OF SERVICE ATTACKS Interruption to the operation of a network. Denial of service can happen when a site is bombarded with requests fro a page and the site jams. Preventative technologies – these can aid the management of risks. They include systems that monitor compliance with data protection and firewall software that can prevent access to certain undesirable websites. Firewalls – hardware or software that limits access to and between networks. Firewalls use filters to block unauthorised material and potentially dangerous attacks such as viruses from entering the system Controlled access – password required to log in. Secure areas in a network requires password access and wireless networks need a secure enabled to limit unauthorised access.

Phishing – criminals send out fraudulent s that claim to be from a legitimate company with the aim of obtaining the recipients personal details and committing identify theft. Secure payment systems – paypal offer the VeriSign Identity Protection Network (VIP). Padlock for secure sites. Disaster recovery – organisations and individuals should have a plan for ensuring that information stored electronically is not only secure, but also backed up. Organisations should have a formal disaster recovery plan setting out clearly what they should do in the event of a range of disastrous scenarios. Specialist accounting software often have a simple process for restoring accounts if they become accidently over written or corrupt. Data protection act does not only apply to file servers but also PDA’s Risks become threats only when organisations choose not to move with the times.