Unit 4 – Impact of the use of IT on Business Systems.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

How to protect yourself, your computer, and others on the internet
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Internet Safety EL Civics Vocabulary Copyright © 2015 Donna Barr All rights reserved by author wwwESLAmerica.US.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Security (Computer crime and dangers associated with computer use). Legislation (Data Protection, Computer Misuse and Copyright Acts). 4 th module
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
October The Insider Financial Crime and Identity Theft Hacktivists Piracy Cyber Espionage and Sabotage.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
Scams & Schemes Common Sense Media.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CYBER CRIME.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
C YBER C RIME any criminal act dealing with computers and networks traditional crimes conducted through the Internet.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
Internet Safety Internet Safety LPM
By: Mallory Thornton.  Social code of website  Cyber term  Derived from network and etiquette.
Unit 4 – Impact of the use of IT on Business Systems
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Unit 4 – Impact of the use of IT on Business Systems.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
BTEC ICT Level 3 Unit 8 E-Commerce. Session 12 – Costings for an E- Commerce Site What is web hosting?
Securing the Electronic Frontier Ch. 6 Reading: pp ; ; CS 340.
Information Systems Design and Development Security Risks Computing Science.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Unit 4 – Impact of the use of IT on Business Systems.
Unit 4: Impact of the Use of IT on Business Systems
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
A Project on CYBER SECURITY
Seminar On Cyber Crime Submitted To: Submitted By:
Starter What is identity theft?
Chapter 13 Security and Ethical Challenges.
Safety on the Internet Claire Stabbert, Alexis Johnston, Kelly Gorcica, Kelly Hazzard, Amanda Henshaw MSTI 131 March 30, 2010.
Prepared By : Binay Tiwari
Forensic and Investigative Accounting
Unit 4 – Impact of the use of IT on Business Systems
Safety on the Internet Claire Stabbert, Alexis Johnston, Kelly Gorcica, Kelly Hazzard, Amanda Henshaw MSTI 131 March 30, 2010.
Presentation transcript:

Unit 4 – Impact of the use of IT on Business Systems

Session 7 – Managing Risk

Managing Risks Starter Starter Activity Working with a partner: 1.Can you identify 2 ‘risks’ a business should be concerned with when monitoring its IT Systems? 2.Explain what you think ‘in-house’ and ‘external risks’ may be?

Unit 4 Learning Aims After completing this unit you should: 1.Understand the effect of developments in information technology on organisations 2.Understand how organisations respond to information technology developments 3.Be able to propose improvements to business systems using IT

2.2 Managing Risk (1) There are a number of possible risks: Cyber Crime – such as fraud, phishing, identity theft have developed as with the increased use of the Internet. Diverting Financial Assets – such as ‘megabyte money’ can be diverted by criminals quickly and easily across the internet. Denial of Service Attacks – occur when a website is bombarded with too many requests causing it to slow down or stall.

2.2 Managing Risk (2) Sabotage of Communications – may occur through viruses, software bugs, blocking devices can cause malicious or non-malicious delays to online services. Intellectual Property Theft – such as through the abuse of Copyright Laws in a malicious or non- malicious way Access Control Methods – using passwords and log in systems to reduce the opportunity for criminals to conduct phishing and identity theft.