SlideShare a Scribd company logo
1 of 26
By: Momina
Click for More >>>

      Need to Protect            Data Protection
    Confidentiality of Data        Legislation

                                 Social and Ethical
           Shop Security       Implications of Access
                              to Personal Information

           Online Banking        Online Shopping




Back to
Contents
Need to protect confidentiality
               of data
  • This means that data should only be
    seen by people who are authorised to
    see it.
  What is the main technique used into ICT
     to ensure the confidentiality of data in
                 online systems?
                   Encryption


Back to
              What is encryption?
Contents
Encryption
  • This is a process by which ordinary data is
    converted into a secret code. This is done so
    that anyone unauthorised to see the data
    doesn‟t.
  • However, they do have the ability to delete
    the information that they intercept.
  • On the receiving on of the encrypted data it
    is decrypted using a secret key.

                                              Note:
                                     Unencrypted data
                                     is called plain text
                                     Encrypted data is
                                     referred to as cipher
Back to
                                     text
Contents
Shop Security
 There are two types of encryption keys:
 1. Public encryption key
 2. Private encryption key
 People have a public encryption key they can tell
    everyone about. And they have a private
    encryption key, which only they know about.

                     So what?



Back to
Contents
So…
   • If you know a persons public encryption key; you
      can encrypt a message and send it to them. But
       ONLY that individual can decrypt the message
                   using their private key.
  • For example: When John wants to send a secure
    message to Jane, he uses Jane's public key to
    encrypt the message. Jane then uses her private
    key to decrypt it.


             What is a public key system?


Back to
Contents
Public Key System
             “This is used to encrypt data
             that is transmitted using the
           Internet for payment purposes”

       Keep in mind that when we use the
      Internet to make a payment; all these
        tasks of encrypting and decrypting
        happens in the background (so we
                    don’t see it)
Back to
Contents
Online Banking
              “Online banking uses secure
           sites and all the data transferred
           using the Internet including your
                password, is encrypted.”

  • Encryption does not prevent hackers from
    accessing your PC. These hackers could use a key
    logging software. This allows them to detect the
    keys you are pressing on the keyboard. (this may
    also allow them to discover your password)

Back to        Additional Methods of Security
Contents
Additional Methods of Security
    1- Use Transaction numbers (TANs): these are passwords that can only
    be used once. This could be sent to you via a text message from the
    bank. They are only valid for a few minutes thus reducing the time for
                       a hacker to intercept and use it.

      2- Ask the user to type in only part of the password. Every time the
     user logs in they are asked for the part of the password in a different
      combination (i.e. 2nd character, 3rd character, and 6th character)


      3- Providing the customer with a handheld chip and PIN device. This
       device generates single-use passwords. Several things are required
          by the user to access their account, it includes the following:
     • debit card
                                      A customer enters the card into the
     •PIN number                      device and enters their PIN number.
     •Online security number          They are then issued with an 8-digit
     •Chip and PIN itself             code. Using this they can then log in.
Back to
Contents
Online Shopping
  • It is the customers responsibility that they
    use a reputable, secure online store.
    How do you know if data is being
    transmitted in a secure way?
  1.   The „https‟ prefix in
       the URL compared
                                 Protocols used in the
       to the normal „http‟      encryption of
  2.   The secure socket         messages between a
       layer (SSL)- the pad-     client computer and
       lock sign at the bottom   server
       of the screen.
                                       Few Important
Back to                                    Points
Contents
Important Points
  × The customer MUST check the contact details of the company
    to ensure reliability.
  × The store MUST have a privacy policy and the customer MUST
    read this. If the store does not have one, or the customer is
    unsure about some parts of it, they shouldn‟t trust the online
    store.
  × The customer must know exactly what they are buying. “Both
    description and what to do in the event that they are not
    satisfied should be clear.”
  × A customer must always print out the details from the
    transaction they make in case of future disputes.




Back to
Contents
Data Protection Legislation
  What does it do?
  It keeps data private as well as confidential.
  For example:
  The UK Data Protection Act states
  • Personal data shall be processed fairly and lawfully.
  • Personal data shall be obtained only for a lawful
      purpose.
  • Personal data shall be accurate and will be kept up-to-
      date.
  • Appropriate measures will be taken against
      unauthorised processing of personal data

            Punishment for breaking ANY rules listed in the
                 UK Protection Act is a very large fine.
Back to
Contents
Social and Ethical Implications of
         access to Personal Data

       Duty of             Aggregated
                                                 Phishing
     Confidence            Information
                           Breaches of
   Duty of Fidelity                              Spyware
                           Confidence
     Responsibility for
                            Need for         Online Auction or
        passing on
       information          Security         Shopping Fraud

                    Anonymised
                                       Identity Theft
                    Information


Back to
Contents
Duty of Confidence
  • They must not tell anyone or use the
    information for any reason except with
    the permission of the person who it told
    them.
  • Confidential data includes business
    secrets or personal information.
  • This could be between an employee and
    employer.
  • The employee is asked to sign a
    confidentiality agreement.
Back to    Back to Social/
              Ethical
Contents
Duty of Fidelity
  • This is when an employee must remain
    loyal to their employer.
  • They must not tell any of the rival
    companies about their work.
  • However, once an employee leaves a
    company they have the free liberty of
    using their skills and knowledge that
    they acquired from the company.
Back to    Back to Social/
              Ethical
Contents
Responsibility for passing on
              information

  • When a company passes on information about any
    individual they must ensure that the least amount of
    information that could identify the individual is used.
  • Things like online banking or online shopping require
    you to give them your personal information. It MUST
    be ensured that information is not passed from
    organisation to organisation without authorisation
    from the individual.



Back to    Back to Social/
              Ethical
Contents
Anonymised Information
  • This is when information about an
    individual is passed on without the
    mention of their name.
  • Companies should always omit any
    personal details wherever possible.




Back to      Back to Social/
                Ethical
Contents
Aggregated Information
  • It is a summary of personal information without
    naming the person.
                      For example:
    All the people who are above the age of 60
                   and have diabetes.
           This way no one can be identified.

            However, there is a downside to this. There might be
           only one person in the whole hospital so identification
           of the person will be easy and may be embarrassing
                              for the individual.



Back to        Back to Social/
                  Ethical
Contents
Breaches of Confidence
  • This is basically a „non-disclosure
    agreement‟.
  • All employment contracts should have
    a duty of confidence clause.




Back to      Back to Social/
                Ethical
Contents
Need for Security
  • All organisations need to protect they
    computerized information.
  • Many people don‟t use online banking
    because they are scared that people
    will defraud them.




Back to    Back to Social/
              Ethical
Contents
Identity Theft
  • It starts off by stolen credit card details.
  So when does it all go wrong?
    Scenario: Purchase is made at a restaurant;
     the customer lets the waiter take their credit
                   card out of their sight.
   The card is then skimmed on a special reader
     and all the details from the card are copied
                       from the card.
Back to Social/
   Ethical        A less obvious way
 Implications
                      would be…
Back to
Contents
Identity Theft
  • Sometimes the machine is below the cash till
    and the customer hardly notices that it has
    been skimmed as well as swiped for the
    transaction.
  Another Method:
  Retail outlets’ databases are hacked into and
    all the customer data is copied for illegal use.

       When data is encrypted, it at some point does
        need to be decrypted and at that point the
         information becomes vulnerable to theft.

Back to    Back to Social/
              Ethical
Contents
Phishing
  • This is when a fraudulent email is sent to a
    person. It will seem as if the email is sent
    by the bank however in reality it isn‟t.
  • The email will request the person to give
    their password, card or account number
    and other security details.
      What the phishers do is that they include the website
   address for the customer to go on to. And this website looks
                                legit.
    This fake website is set up PURELY to get customer details.

                                What is pharming?
Back to     Back to Social/
               Ethical
Contents
Pharming

  • This is when a fraudster REDIRECTS a genuine
    websites traffic to their own website.
  • The customer thinks that they are dealing
    with their bank site but they are actually
    sending details to the fraudsters website.




Back to    Back to Social/
              Ethical
Contents
Spyware
  • This is a software that customers unknowingly
    download.
  • It usually is attached to a software which the
    computer user downloads.
  • The fraudster has attached spyware to gather
    personal details of the user.
  • They do this by using a key logging software when
    the user logs on to their bank account of online
    shopping.



Back to    Back to Social/
              Ethical
Contents
Online Auction or Shopping
                 Fraud
  • This is when somebody sets up a
    genuine site and puts up expensive
    items for sale and then they don‟t
    deliver it or they send a cheap
    imitation.
  • They take the money but never deliver
    the goods.


Back to    Back to Social/
              Ethical
Contents

More Related Content

What's hot

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Traditional vs E-contract
Traditional vs E-contractTraditional vs E-contract
Traditional vs E-contractSumit Sanyal
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentationbrettlieberman
 
User-Friendly Digital Signatures
User-Friendly Digital SignaturesUser-Friendly Digital Signatures
User-Friendly Digital SignaturesJon Matonis
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Electronic signature
Electronic signatureElectronic signature
Electronic signatureSonu Mishra
 
IPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological AspectsIPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological AspectsMudit Mittal
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...OKsystem
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting PresentationEndcode_org
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchainAniket Singh
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiquestioninginstitute
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfStephen Rappaport
 

What's hot (20)

Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Traditional vs E-contract
Traditional vs E-contractTraditional vs E-contract
Traditional vs E-contract
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cyber
CyberCyber
Cyber
 
E-BUSINESS
E-BUSINESSE-BUSINESS
E-BUSINESS
 
E commerce PPT
E commerce PPTE commerce PPT
E commerce PPT
 
E contracts
E contractsE contracts
E contracts
 
E Signature Presentation
E Signature PresentationE Signature Presentation
E Signature Presentation
 
User-Friendly Digital Signatures
User-Friendly Digital SignaturesUser-Friendly Digital Signatures
User-Friendly Digital Signatures
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Electronic signature
Electronic signatureElectronic signature
Electronic signature
 
IPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological AspectsIPR Laws - DRM Technological Aspects
IPR Laws - DRM Technological Aspects
 
E contract
E  contractE  contract
E contract
 
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
Smart Cards & Devices Forum 2012 - Mobile ID usnadňuje život jak uživatelům, ...
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
Introduction to blockchain
Introduction to blockchainIntroduction to blockchain
Introduction to blockchain
 
Listening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qiListening data collection concerns and ethics, rappaport, qi
Listening data collection concerns and ethics, rappaport, qi
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Listening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arfListening data collection concerns and ethics, rappaport, arf
Listening data collection concerns and ethics, rappaport, arf
 

Viewers also liked

2.8 Payroll Applications
2.8 Payroll Applications2.8 Payroll Applications
2.8 Payroll ApplicationsMomina Mateen
 
4.3 Development and Testing
4.3 Development and Testing4.3 Development and Testing
4.3 Development and TestingMomina Mateen
 
3.4 Online Services and Working Patterns
3.4 Online Services and Working Patterns3.4 Online Services and Working Patterns
3.4 Online Services and Working PatternsMomina Mateen
 
3.6 Online Services and Health and Safety
3.6 Online Services and Health and Safety3.6 Online Services and Health and Safety
3.6 Online Services and Health and SafetyMomina Mateen
 
2.10 Art and Design Work
2.10 Art and Design Work2.10 Art and Design Work
2.10 Art and Design WorkMomina Mateen
 
2.9 Technical and Customer Support
2.9 Technical and Customer Support2.9 Technical and Customer Support
2.9 Technical and Customer SupportMomina Mateen
 
2.7 Use of ICT in Data Management
2.7 Use of ICT in Data Management2.7 Use of ICT in Data Management
2.7 Use of ICT in Data ManagementMomina Mateen
 
4.1 systems analysis
4.1 systems analysis4.1 systems analysis
4.1 systems analysisMomina Mateen
 
2.7 use of ict in data management
2.7 use of ict in data management2.7 use of ict in data management
2.7 use of ict in data managementHaa'Meem Mohiyuddin
 
Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned Momina Mateen
 
Computerized payroll system
Computerized payroll systemComputerized payroll system
Computerized payroll systemFrancis Genavia
 

Viewers also liked (20)

2.8 Payroll Applications
2.8 Payroll Applications2.8 Payroll Applications
2.8 Payroll Applications
 
4.0 Introduction
4.0 Introduction4.0 Introduction
4.0 Introduction
 
4.3 Development and Testing
4.3 Development and Testing4.3 Development and Testing
4.3 Development and Testing
 
4.4 implementation
4.4 implementation4.4 implementation
4.4 implementation
 
3.4 Online Services and Working Patterns
3.4 Online Services and Working Patterns3.4 Online Services and Working Patterns
3.4 Online Services and Working Patterns
 
4.6 Evaluation
4.6 Evaluation4.6 Evaluation
4.6 Evaluation
 
3.6 Online Services and Health and Safety
3.6 Online Services and Health and Safety3.6 Online Services and Health and Safety
3.6 Online Services and Health and Safety
 
4.2 Design
4.2 Design4.2 Design
4.2 Design
 
4.5 Documentation
4.5 Documentation4.5 Documentation
4.5 Documentation
 
2.8 payroll applications
2.8 payroll applications2.8 payroll applications
2.8 payroll applications
 
Nutrition
NutritionNutrition
Nutrition
 
System analysis
System analysisSystem analysis
System analysis
 
2.10 Art and Design Work
2.10 Art and Design Work2.10 Art and Design Work
2.10 Art and Design Work
 
2.9 Technical and Customer Support
2.9 Technical and Customer Support2.9 Technical and Customer Support
2.9 Technical and Customer Support
 
2.7 Use of ICT in Data Management
2.7 Use of ICT in Data Management2.7 Use of ICT in Data Management
2.7 Use of ICT in Data Management
 
4.1 systems analysis
4.1 systems analysis4.1 systems analysis
4.1 systems analysis
 
2.7 use of ict in data management
2.7 use of ict in data management2.7 use of ict in data management
2.7 use of ict in data management
 
Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned Nuclear Accidents and Lessons Learned
Nuclear Accidents and Lessons Learned
 
Computerized payroll system
Computerized payroll systemComputerized payroll system
Computerized payroll system
 
Payroll management
Payroll   managementPayroll   management
Payroll management
 

Similar to 3.5 Online Services and Security and Privacy of Data

E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayMichele Chubirka
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and securityDjTechs
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Management Insights LLC
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftDiane M. Metcalf
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethicsXophia Montawal
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxStephen Jesukanth Martin
 

Similar to 3.5 Online Services and Security and Privacy of Data (20)

E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2Protect against id fraud workshop 2 of 2
Protect against id fraud workshop 2 of 2
 
Information security
Information securityInformation security
Information security
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Phishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptxPhishing Whaling and Hacking Case Studies.pptx
Phishing Whaling and Hacking Case Studies.pptx
 

More from Momina Mateen

Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes Momina Mateen
 
Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Momina Mateen
 
Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Momina Mateen
 
Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Momina Mateen
 
Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Momina Mateen
 
Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Momina Mateen
 
Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Momina Mateen
 
Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Momina Mateen
 
Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Momina Mateen
 
Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Momina Mateen
 
Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Momina Mateen
 
Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Momina Mateen
 
Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Momina Mateen
 
Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Momina Mateen
 
Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Momina Mateen
 
Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Momina Mateen
 
Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Momina Mateen
 
Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)Momina Mateen
 

More from Momina Mateen (20)

Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes Al Baqarah Ayah 74-82 Notes
Al Baqarah Ayah 74-82 Notes
 
Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word Al Baqarah Ayah 74-82 Word to Word
Al Baqarah Ayah 74-82 Word to Word
 
Zakariyya and Yahya
Zakariyya and YahyaZakariyya and Yahya
Zakariyya and Yahya
 
Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)Al Mulk Verse 29 (for kids)
Al Mulk Verse 29 (for kids)
 
Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)Al Mulk Verse 28 (for kids)
Al Mulk Verse 28 (for kids)
 
Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)Al Mulk Verse 27 (for kids)
Al Mulk Verse 27 (for kids)
 
Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)Al Mulk Verse 26 (for kids)
Al Mulk Verse 26 (for kids)
 
Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)Al Mulk Verse 25 (for kids)
Al Mulk Verse 25 (for kids)
 
Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)Al Mulk Verse 24 (for kids)
Al Mulk Verse 24 (for kids)
 
Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)Al Mulk Verse 23 (for kids)
Al Mulk Verse 23 (for kids)
 
Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)Al Mulk Verse 22 (for kids)
Al Mulk Verse 22 (for kids)
 
Al Mulk Revision
Al Mulk RevisionAl Mulk Revision
Al Mulk Revision
 
Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)Al Mulk Verse 30 (for kids)
Al Mulk Verse 30 (for kids)
 
Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)Al Mulk Verse 20 (for kids)
Al Mulk Verse 20 (for kids)
 
Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)Al Mulk Verse 18 (for kids)
Al Mulk Verse 18 (for kids)
 
Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)Al Mulk Verse 17 (for kids)
Al Mulk Verse 17 (for kids)
 
Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)Al Mulk Verse 16 (for kids)
Al Mulk Verse 16 (for kids)
 
Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)Al mulk verse 14 (for kids)
Al mulk verse 14 (for kids)
 
Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)Al Mulk Verse 13 (for kids)
Al Mulk Verse 13 (for kids)
 
Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)Al mulk verse 15 (for kids)
Al mulk verse 15 (for kids)
 

Recently uploaded

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 

Recently uploaded (20)

Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 

3.5 Online Services and Security and Privacy of Data

  • 2. Click for More >>> Need to Protect Data Protection Confidentiality of Data Legislation Social and Ethical Shop Security Implications of Access to Personal Information Online Banking Online Shopping Back to Contents
  • 3. Need to protect confidentiality of data • This means that data should only be seen by people who are authorised to see it. What is the main technique used into ICT to ensure the confidentiality of data in online systems? Encryption Back to What is encryption? Contents
  • 4. Encryption • This is a process by which ordinary data is converted into a secret code. This is done so that anyone unauthorised to see the data doesn‟t. • However, they do have the ability to delete the information that they intercept. • On the receiving on of the encrypted data it is decrypted using a secret key. Note: Unencrypted data is called plain text Encrypted data is referred to as cipher Back to text Contents
  • 5. Shop Security There are two types of encryption keys: 1. Public encryption key 2. Private encryption key People have a public encryption key they can tell everyone about. And they have a private encryption key, which only they know about. So what? Back to Contents
  • 6. So… • If you know a persons public encryption key; you can encrypt a message and send it to them. But ONLY that individual can decrypt the message using their private key. • For example: When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it. What is a public key system? Back to Contents
  • 7. Public Key System “This is used to encrypt data that is transmitted using the Internet for payment purposes” Keep in mind that when we use the Internet to make a payment; all these tasks of encrypting and decrypting happens in the background (so we don’t see it) Back to Contents
  • 8. Online Banking “Online banking uses secure sites and all the data transferred using the Internet including your password, is encrypted.” • Encryption does not prevent hackers from accessing your PC. These hackers could use a key logging software. This allows them to detect the keys you are pressing on the keyboard. (this may also allow them to discover your password) Back to Additional Methods of Security Contents
  • 9. Additional Methods of Security 1- Use Transaction numbers (TANs): these are passwords that can only be used once. This could be sent to you via a text message from the bank. They are only valid for a few minutes thus reducing the time for a hacker to intercept and use it. 2- Ask the user to type in only part of the password. Every time the user logs in they are asked for the part of the password in a different combination (i.e. 2nd character, 3rd character, and 6th character) 3- Providing the customer with a handheld chip and PIN device. This device generates single-use passwords. Several things are required by the user to access their account, it includes the following: • debit card A customer enters the card into the •PIN number device and enters their PIN number. •Online security number They are then issued with an 8-digit •Chip and PIN itself code. Using this they can then log in. Back to Contents
  • 10. Online Shopping • It is the customers responsibility that they use a reputable, secure online store. How do you know if data is being transmitted in a secure way? 1. The „https‟ prefix in the URL compared Protocols used in the to the normal „http‟ encryption of 2. The secure socket messages between a layer (SSL)- the pad- client computer and lock sign at the bottom server of the screen. Few Important Back to Points Contents
  • 11. Important Points × The customer MUST check the contact details of the company to ensure reliability. × The store MUST have a privacy policy and the customer MUST read this. If the store does not have one, or the customer is unsure about some parts of it, they shouldn‟t trust the online store. × The customer must know exactly what they are buying. “Both description and what to do in the event that they are not satisfied should be clear.” × A customer must always print out the details from the transaction they make in case of future disputes. Back to Contents
  • 12. Data Protection Legislation What does it do? It keeps data private as well as confidential. For example: The UK Data Protection Act states • Personal data shall be processed fairly and lawfully. • Personal data shall be obtained only for a lawful purpose. • Personal data shall be accurate and will be kept up-to- date. • Appropriate measures will be taken against unauthorised processing of personal data Punishment for breaking ANY rules listed in the UK Protection Act is a very large fine. Back to Contents
  • 13. Social and Ethical Implications of access to Personal Data Duty of Aggregated Phishing Confidence Information Breaches of Duty of Fidelity Spyware Confidence Responsibility for Need for Online Auction or passing on information Security Shopping Fraud Anonymised Identity Theft Information Back to Contents
  • 14. Duty of Confidence • They must not tell anyone or use the information for any reason except with the permission of the person who it told them. • Confidential data includes business secrets or personal information. • This could be between an employee and employer. • The employee is asked to sign a confidentiality agreement. Back to Back to Social/ Ethical Contents
  • 15. Duty of Fidelity • This is when an employee must remain loyal to their employer. • They must not tell any of the rival companies about their work. • However, once an employee leaves a company they have the free liberty of using their skills and knowledge that they acquired from the company. Back to Back to Social/ Ethical Contents
  • 16. Responsibility for passing on information • When a company passes on information about any individual they must ensure that the least amount of information that could identify the individual is used. • Things like online banking or online shopping require you to give them your personal information. It MUST be ensured that information is not passed from organisation to organisation without authorisation from the individual. Back to Back to Social/ Ethical Contents
  • 17. Anonymised Information • This is when information about an individual is passed on without the mention of their name. • Companies should always omit any personal details wherever possible. Back to Back to Social/ Ethical Contents
  • 18. Aggregated Information • It is a summary of personal information without naming the person. For example: All the people who are above the age of 60 and have diabetes. This way no one can be identified. However, there is a downside to this. There might be only one person in the whole hospital so identification of the person will be easy and may be embarrassing for the individual. Back to Back to Social/ Ethical Contents
  • 19. Breaches of Confidence • This is basically a „non-disclosure agreement‟. • All employment contracts should have a duty of confidence clause. Back to Back to Social/ Ethical Contents
  • 20. Need for Security • All organisations need to protect they computerized information. • Many people don‟t use online banking because they are scared that people will defraud them. Back to Back to Social/ Ethical Contents
  • 21. Identity Theft • It starts off by stolen credit card details. So when does it all go wrong? Scenario: Purchase is made at a restaurant; the customer lets the waiter take their credit card out of their sight. The card is then skimmed on a special reader and all the details from the card are copied from the card. Back to Social/ Ethical A less obvious way Implications would be… Back to Contents
  • 22. Identity Theft • Sometimes the machine is below the cash till and the customer hardly notices that it has been skimmed as well as swiped for the transaction. Another Method: Retail outlets’ databases are hacked into and all the customer data is copied for illegal use. When data is encrypted, it at some point does need to be decrypted and at that point the information becomes vulnerable to theft. Back to Back to Social/ Ethical Contents
  • 23. Phishing • This is when a fraudulent email is sent to a person. It will seem as if the email is sent by the bank however in reality it isn‟t. • The email will request the person to give their password, card or account number and other security details. What the phishers do is that they include the website address for the customer to go on to. And this website looks legit. This fake website is set up PURELY to get customer details. What is pharming? Back to Back to Social/ Ethical Contents
  • 24. Pharming • This is when a fraudster REDIRECTS a genuine websites traffic to their own website. • The customer thinks that they are dealing with their bank site but they are actually sending details to the fraudsters website. Back to Back to Social/ Ethical Contents
  • 25. Spyware • This is a software that customers unknowingly download. • It usually is attached to a software which the computer user downloads. • The fraudster has attached spyware to gather personal details of the user. • They do this by using a key logging software when the user logs on to their bank account of online shopping. Back to Back to Social/ Ethical Contents
  • 26. Online Auction or Shopping Fraud • This is when somebody sets up a genuine site and puts up expensive items for sale and then they don‟t deliver it or they send a cheap imitation. • They take the money but never deliver the goods. Back to Back to Social/ Ethical Contents