SlideShare une entreprise Scribd logo
1  sur  39
Chapter 8   PROTECTING PEOPLE AND INFORMATION Threats and Safeguards
THEY KNOW ABOUT 96% OF AMERICAN HOUSEHOLDS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study Questions ,[object Object],[object Object],[object Object]
INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ETHICS ,[object Object],[object Object],[object Object]
Factors the Determine How You Decide Ethical Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Ethical Structure
Circumstances of the Situation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Intellectual Property ,[object Object],[object Object],[object Object]
Intellectual Property ,[object Object],[object Object]
PRIVACY ,[object Object],[object Object],[object Object],[object Object]
Privacy and Other Individuals ,[object Object],[object Object],[object Object],[object Object],[object Object]
An E-Mail is Stored on Many Computers
Identity Theft Why make calls when a computer can do it?
 
Identity Theft ,[object Object]
Identity Theft ,[object Object],[object Object],[object Object],[object Object]
Pharming ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Employees ,[object Object],[object Object],[object Object]
Reasons for Monitoring ,[object Object],[object Object],[object Object]
Privacy and Consumers ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cookies ,[object Object],[object Object],[object Object]
Spam ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Adware and Spyware ,[object Object],[object Object]
Adware in Free Version of Eudora
Trojan Horse Software ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Logs ,[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Government Agencies ,[object Object],[object Object],[object Object]
Government Agencies Storing Personal Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Government Agencies Storing Personal Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SECURITY AND EMPLOYEES ,[object Object],[object Object],[object Object]
Security and Outside Threats ,[object Object],[object Object],[object Object],[object Object]
Computer Viruses Can’t ,[object Object],[object Object],[object Object],[object Object],[object Object]
How fast can a “worm” spread “The Sapphire worm”
74855 infected in 30 minutes
Security Measures ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Measures ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web DevelopersKrishna Srikanth Manda
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesParsons Behle & Latimer
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)sentmery5
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyKunal Sharma
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Protecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackProtecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackBen Jones
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2Vikas Saw
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 

Tendances (20)

Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
It policy (ver 1.0)
It policy (ver  1.0)It policy (ver  1.0)
It policy (ver 1.0)
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Protecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber AttackProtecting Your Business from a Cyber Attack
Protecting Your Business from a Cyber Attack
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2HSC IT - Cyber Law and Ethics part 2
HSC IT - Cyber Law and Ethics part 2
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 

En vedette

communication module
communication modulecommunication module
communication module07Deeps
 
Bba 3-C Assessment till date
Bba 3-C Assessment till dateBba 3-C Assessment till date
Bba 3-C Assessment till date07Deeps
 
Project mgmt. & entrepenuership[1]
Project mgmt. & entrepenuership[1]Project mgmt. & entrepenuership[1]
Project mgmt. & entrepenuership[1]07Deeps
 

En vedette (8)

communication module
communication modulecommunication module
communication module
 
Bb601
Bb601Bb601
Bb601
 
Dbms
DbmsDbms
Dbms
 
Module
ModuleModule
Module
 
Bba 3-C Assessment till date
Bba 3-C Assessment till dateBba 3-C Assessment till date
Bba 3-C Assessment till date
 
Dbms 2
Dbms 2Dbms 2
Dbms 2
 
Project mgmt. & entrepenuership[1]
Project mgmt. & entrepenuership[1]Project mgmt. & entrepenuership[1]
Project mgmt. & entrepenuership[1]
 
Journal
JournalJournal
Journal
 

Similaire à information, people $ threats

Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguardslobnaqassem2
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptYäsh Chaudhary
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxMoizAhmed398372
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer SecurityKongChunLeong1
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital SecurityRichard Homa
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 

Similaire à information, people $ threats (20)

Chapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and SafeguardsChapter008.Protecting People and Information: Threats and Safeguards
Chapter008.Protecting People and Information: Threats and Safeguards
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Computer security
Computer securityComputer security
Computer security
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
CSC103 Digital Security
CSC103 Digital SecurityCSC103 Digital Security
CSC103 Digital Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 

Plus de 07Deeps

Role of strategists
Role of strategistsRole of strategists
Role of strategists07Deeps
 
Banking and working capital mgt course module
Banking and working capital mgt course moduleBanking and working capital mgt course module
Banking and working capital mgt course module07Deeps
 
E - commerce As a part of information sys
E - commerce As a part of information sysE - commerce As a part of information sys
E - commerce As a part of information sys07Deeps
 
How Google WOrks?
How Google WOrks?How Google WOrks?
How Google WOrks?07Deeps
 
Searching WWW
Searching WWWSearching WWW
Searching WWW07Deeps
 
Acc princ
Acc princAcc princ
Acc princ07Deeps
 
Accounting Introduction
Accounting IntroductionAccounting Introduction
Accounting Introduction07Deeps
 
Copy of communication barriers
Copy of communication barriersCopy of communication barriers
Copy of communication barriers07Deeps
 
Students
StudentsStudents
Students07Deeps
 
Communication module
Communication moduleCommunication module
Communication module07Deeps
 
Final Bca Module
Final Bca ModuleFinal Bca Module
Final Bca Module07Deeps
 
lesson 2
lesson 2lesson 2
lesson 207Deeps
 
Lesson 1
Lesson 1Lesson 1
Lesson 107Deeps
 
Mba module MIS
Mba module MISMba module MIS
Mba module MIS07Deeps
 
MIS course module BBA
MIS course module BBAMIS course module BBA
MIS course module BBA07Deeps
 
Course Module - IHRM
Course Module - IHRMCourse Module - IHRM
Course Module - IHRM07Deeps
 

Plus de 07Deeps (19)

Role of strategists
Role of strategistsRole of strategists
Role of strategists
 
Banking and working capital mgt course module
Banking and working capital mgt course moduleBanking and working capital mgt course module
Banking and working capital mgt course module
 
E - commerce As a part of information sys
E - commerce As a part of information sysE - commerce As a part of information sys
E - commerce As a part of information sys
 
How Google WOrks?
How Google WOrks?How Google WOrks?
How Google WOrks?
 
Searching WWW
Searching WWWSearching WWW
Searching WWW
 
Acc princ
Acc princAcc princ
Acc princ
 
Accounting Introduction
Accounting IntroductionAccounting Introduction
Accounting Introduction
 
Copy of communication barriers
Copy of communication barriersCopy of communication barriers
Copy of communication barriers
 
Students
StudentsStudents
Students
 
Blogs
BlogsBlogs
Blogs
 
Module
ModuleModule
Module
 
Mod 2
Mod 2Mod 2
Mod 2
 
Communication module
Communication moduleCommunication module
Communication module
 
Final Bca Module
Final Bca ModuleFinal Bca Module
Final Bca Module
 
lesson 2
lesson 2lesson 2
lesson 2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Mba module MIS
Mba module MISMba module MIS
Mba module MIS
 
MIS course module BBA
MIS course module BBAMIS course module BBA
MIS course module BBA
 
Course Module - IHRM
Course Module - IHRMCourse Module - IHRM
Course Module - IHRM
 

information, people $ threats