Download presentation
Presentation is loading. Please wait.
1
Business Threats What could it mean for you?
Lesley Price Manager RSC East Midlands
2
Outline Introduction Facts & Figures Examples from Industry
Implications for educational establishments.
3
There once was an employee …….
Update tracking system Help desk Information on JISC Services Technical documentation Visit Colleges Technical Advice Web design
4
Who spent their time ………….
On-line games Downloading music from Napster Chat rooms Downloading Games Software Piracy ‘Borrowing’ blank cds Passing off documentation
5
Resulting in ………….. Time wasting Poor customer service
Poor team morale Additional Stress Lack of trust Illegal activities
6
2001 FBI Computer Crime and Security Survey
40% detected system penetration from outside. 25% in 2000 38% detected denial of service attacks 27% in 2000 91% detected employee abuse of Internet access privileges 79% in 2000 94% detected computer viruses 85% in 2000
7
Examples cited in the report
Online Con Artist Steals Identities of World's Richest CD Rom containing details of thousands of prominent people. Swedish hacker stored music and video on American University server. Hacker gained access to confidential medical information at American University Medical School. Glitch in AT & T’s Web site exposed billing information.
8
Where does the threat come from?
Internal Students Staff External Random or deliberate Disgruntled former staff/students Mr/Mrs X in cyberspace
9
How much do you rely on technology?
Management Information Finance Registers Student Records Personnel Records Reports & Documentation stored electronically
10
How much do you rely on technology?
Teaching & Learning Virtual classrooms Use of internet for resources Use of e mail as essential method of communication Supporting materials available in electronic format
11
How much do you rely on technology?
Other uses Research Estates Marketing Purchasing Etc. etc. Is there an area that does not use technology?
12
What are the threats? Hi-tech Peeping Toms Work-rage assaults
Stealing identities Stalking & harassment Stealing information Work-rage assaults Incorrect information put into the system Hacking Introduction of viruses
13
Possible implications …….
Reduced performance of the network Litigation Loss of productivity Physical loss of equipment Damage to credibility and reputation of the institution FINANCIAL COST
14
Only the bearer of bad tidings – need to wait until this afternoon!!
Solutions ……..?? Only the bearer of bad tidings – need to wait until this afternoon!!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.