SlideShare une entreprise Scribd logo
1  sur  7
Security of systems
Security risks come from two areas: employees (who introduce
accidental and intentional risks) and external computer crime.
Unfortunately for organisations, the greatest security threat is
                      from its employees.
Accidental employee errors
• Losses from accidental employee errors stem from ignorance
   and carelessness.
• Some of the dangers to information refrom accidents include:
■ failure to keep dust out of computers
■ failure to consistently backup information from portable devices
■ accidental dropping of equipment
■ loss or theft of equipment
■ liquid spillage
■ non-adherence to handling procedures for storage devices
■ carelessness when inputting data
Email security
Question

• You have no doubt heard the term ‘email scam’, or
  perhaps even experienced it. What do you think this
  means? Why would businesses feel threatened by email
  scams?
• In small groups, brainstorm a list of all the email scams
  you have heard or read about. See if you can identify at
  least five different scams. Search the internet to find
  more and discuss the different types found.
Email security
Steps that employers can undertake to ensure risks are
  kept to a minimum are
outlined below.
1 Develop an email policy that is signed (and followed) by
  every employee.
2 Train employees to recognise possible threats, as many
  employees open emails through ignorance of the types
  of fraud that exist.
3 Provide continual reminders and updates on the types
  of new scams.
Some different categories of scam email are malware, phishing, vishing,
                     pharming and mule recruitment.


• Malware is software designed to infiltrate or damage a
  computer system without the owner’s informed
  consent.
• Phishing refers to the use of spam emails purporting to
  be from a financial institution in the hope of luring
  unsuspecting, innocent people into providing their
  personal information, such as credit card numbers,
  passwords, account data or other banking details.
• Pharming differs from phishing in that it operates through real
  URL addresses. When a user types in a web address, such as
  their bank’s, they are immediately taken to a copycat website,
  without having any idea that the site is bogus. Hackers then use
  spyware, Trojan horses or a virus to get past a computer’s
  defences and lodge itself into the background of the user’s
  computer.

• Vishing is voice phishing. Instead of posing as a bank, phishing
  for financial details on the internet, victims are lured into calling
  a number and providing details over
  the phone.

• Mule recruitment is when criminals attempt to get a person to
  receive stolen funds using his or her bank account, and then
  transfer those funds to criminals overseas
Question
• Type a paragraph in which you compare the difference
  between malware, phishing, vishing, pharming and mule
  recruitment.

• Why do you think email security is so important to any
  organisation?

Contenu connexe

Tendances

Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Jevaughan Edie
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
tawnygsu
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
ITNet
 

Tendances (20)

Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)Cape it unit 2 module 3 unedited students notes (compiled from internet)
Cape it unit 2 module 3 unedited students notes (compiled from internet)
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Presentation on cyber safety
Presentation on cyber safetyPresentation on cyber safety
Presentation on cyber safety
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Security Threats to Electronic Commerce
Security Threats to Electronic CommerceSecurity Threats to Electronic Commerce
Security Threats to Electronic Commerce
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
Lock It Down, Keep It Safe
Lock It Down, Keep It SafeLock It Down, Keep It Safe
Lock It Down, Keep It Safe
 
My presentation
My presentationMy presentation
My presentation
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Safety, Security and Ethics
Safety, Security and EthicsSafety, Security and Ethics
Safety, Security and Ethics
 

En vedette

Brochure sph 14 15 versie 2-1
Brochure sph 14 15 versie 2-1Brochure sph 14 15 versie 2-1
Brochure sph 14 15 versie 2-1
Alice Linden
 
2 energie besparen slimme lichtregeling2
2 energie besparen slimme lichtregeling22 energie besparen slimme lichtregeling2
2 energie besparen slimme lichtregeling2
Lighting Controls BV
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
BAILEYP
 

En vedette (9)

Pp1
Pp1Pp1
Pp1
 
Brochure sph 14 15 versie 2-1
Brochure sph 14 15 versie 2-1Brochure sph 14 15 versie 2-1
Brochure sph 14 15 versie 2-1
 
2 energie besparen slimme lichtregeling2
2 energie besparen slimme lichtregeling22 energie besparen slimme lichtregeling2
2 energie besparen slimme lichtregeling2
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Christmas on a Budget
Christmas on a BudgetChristmas on a Budget
Christmas on a Budget
 
A Few Things To Consider When Renting A House
A Few Things To Consider When Renting A HouseA Few Things To Consider When Renting A House
A Few Things To Consider When Renting A House
 
Wildlife Photography Guide
Wildlife Photography GuideWildlife Photography Guide
Wildlife Photography Guide
 
10 Charity Fundraising Opportunities for 2014
10 Charity Fundraising Opportunities for 201410 Charity Fundraising Opportunities for 2014
10 Charity Fundraising Opportunities for 2014
 
Things to do with your dad on fathers day
Things to do with your dad on fathers dayThings to do with your dad on fathers day
Things to do with your dad on fathers day
 

Similaire à Pp8

wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 

Similaire à Pp8 (20)

Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
Information security
Information securityInformation security
Information security
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Phishing
PhishingPhishing
Phishing
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 

Plus de BAILEYP

Plus de BAILEYP (17)

Lesson 8
Lesson 8Lesson 8
Lesson 8
 
Lesson 7
Lesson 7Lesson 7
Lesson 7
 
Lesson 6
Lesson 6Lesson 6
Lesson 6
 
Lesson 5
Lesson 5Lesson 5
Lesson 5
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Pp10
Pp10Pp10
Pp10
 
Pp9
Pp9Pp9
Pp9
 
Pp5
Pp5Pp5
Pp5
 
Pp7
Pp7Pp7
Pp7
 
Pp6
Pp6Pp6
Pp6
 
Pp4
Pp4Pp4
Pp4
 
Pp3
Pp3Pp3
Pp3
 
Pp2
Pp2Pp2
Pp2
 
Pp 1 pdf
Pp 1 pdfPp 1 pdf
Pp 1 pdf
 
Pp 1
Pp 1Pp 1
Pp 1
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Pp8

  • 1. Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately for organisations, the greatest security threat is from its employees.
  • 2. Accidental employee errors • Losses from accidental employee errors stem from ignorance and carelessness. • Some of the dangers to information refrom accidents include: ■ failure to keep dust out of computers ■ failure to consistently backup information from portable devices ■ accidental dropping of equipment ■ loss or theft of equipment ■ liquid spillage ■ non-adherence to handling procedures for storage devices ■ carelessness when inputting data
  • 3. Email security Question • You have no doubt heard the term ‘email scam’, or perhaps even experienced it. What do you think this means? Why would businesses feel threatened by email scams? • In small groups, brainstorm a list of all the email scams you have heard or read about. See if you can identify at least five different scams. Search the internet to find more and discuss the different types found.
  • 4. Email security Steps that employers can undertake to ensure risks are kept to a minimum are outlined below. 1 Develop an email policy that is signed (and followed) by every employee. 2 Train employees to recognise possible threats, as many employees open emails through ignorance of the types of fraud that exist. 3 Provide continual reminders and updates on the types of new scams.
  • 5. Some different categories of scam email are malware, phishing, vishing, pharming and mule recruitment. • Malware is software designed to infiltrate or damage a computer system without the owner’s informed consent. • Phishing refers to the use of spam emails purporting to be from a financial institution in the hope of luring unsuspecting, innocent people into providing their personal information, such as credit card numbers, passwords, account data or other banking details.
  • 6. • Pharming differs from phishing in that it operates through real URL addresses. When a user types in a web address, such as their bank’s, they are immediately taken to a copycat website, without having any idea that the site is bogus. Hackers then use spyware, Trojan horses or a virus to get past a computer’s defences and lodge itself into the background of the user’s computer. • Vishing is voice phishing. Instead of posing as a bank, phishing for financial details on the internet, victims are lured into calling a number and providing details over the phone. • Mule recruitment is when criminals attempt to get a person to receive stolen funds using his or her bank account, and then transfer those funds to criminals overseas
  • 7. Question • Type a paragraph in which you compare the difference between malware, phishing, vishing, pharming and mule recruitment. • Why do you think email security is so important to any organisation?