SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Data security problems,[object Object],Mathew Wembridge,[object Object]
Questions,[object Object],What are the main issues or problems highlighted in the articles above.,[object Object],Customers’ bank details sold on eBay- A data processing firm sold a computer through a third party that contained million of bank costumer details.,[object Object],‘Greatest cyber-heist in world history’- A hacker has used a Trojan horse program at a Best Western hotel to steal records that have been alleged to more then 8 million customers.,[object Object],Memory stick with 84,000 prisoner records lost in U.K- A contractor of PA consulting has lost a memory stick with over 84,000 prisoner records.,[object Object]
Questions,[object Object],What are the possible consequences for each organisation?,[object Object],Customers’ bank details sold on eBay- There is nothing really the organisation can do because the computer has been sold. But it may lose credibility for the companies security measures.,[object Object],‘Greatest cyber-heist in world history’- The Best Western Hotel chain could lose customers and credibility for their security measures.,[object Object],Memory stick with 84,000 prisoner records lost in U.K- The PA consulting company would probably never get a job with the government again after failing to follow protocol.,[object Object]
Questions,[object Object],3. What are the consequences for the individuals/consumers affected by the breaches?,[object Object],All individuals/consumers now have to deal with their personal details being accessed by individuals they have not given consent to viewing their details. For the individuals who have their bank details stolen they now have to change all their bank details so their money isn't stolen.,[object Object]
Questions,[object Object],4. If these events occurred in Australia, would their be any possible legal implications?,[object Object],I don’t think if these events happened in Australia that there would be any real difference we have the same sort of privacy laws as countries such as America and Britain.,[object Object],5. Use the internet to find a recent example where personal information has been found leaked or misused in similar ways to those described in these articles.,[object Object]
Example,[object Object],Turkish Hackers Steal Thousands of Email, PayPal, Bank Acct IDsby Hana Levi Julian,[object Object],Follow Israel news on and . Turkish hackers have stolen the details of thousands of Israeli bank, credit card and Pay Pal accounts, and posted the information online. According to the Israeli We-CMS blog, the information was posted on to the message board of a Turkish Internet forum. By Sunday morning, the We-CMS blog itself was found “suspended” when Israel National News attempted to access the site. In addition to the details of at least 32,561 Israelis, more than 140 passwords to Israeli government web sites and more than 300 passwords to Israeli academic web pages were swiped as well. Globes business news service reports that many of the email addresses and passwords obtained by the Internet terrorists included accounts on Face book, Gmail and Microsoft Live Messenger. Most of those had been hacked since the flotilla clash between IHH terror activists and Israeli Navy commandos aboard the Turkish Mavi Marmara ship in May. Erez Wolf, owner of the We-CMS, warned reporters, “The hackers used the information in their possession to enter accounts on other web sites. Assuming that many surfers use the same email, same password and same user name to register on all the sites that require registration – because it's easier to remember – the email and password from the hacked site will be the same one that gets them into others... like Pay Pal. From what I've been able to learn on the forum, the hackers penetrated the Pay Pal accounts of Israelis, and their bank accounts, and also were able to obtain credit card details as well.” Wolf added that surfers have been debating the use of the information on the Turkish message board where the passwords and user names were posted in an Excel document. The discussion, said Wolf, is focused on whether or not it is permitted under Islamic law to use the stolen data. Some of the writers have contended that as enemies of Islam, it is permitted to wreak whatever havoc is possible to Israeli users, citing social, criminal and religious arguments. Several quoted passages from the Koran that referred to the disposition of assets belonging to infidels (heretics). The Excel file was downloaded from the Turkish web site and handed over to the Israel Police, who were unavailable for comment Sunday morning.,[object Object]
Questions,[object Object],6. Summarise what you find.,[object Object],Turkish hackers have stolen the of thousands of Israeli bank, credit card and Pay Pal accounts, and posted the information online. Some groups have stated that as enemies of Islam, it is permitted to wreak whatever havoc is possible to Israeli users, citing social, criminal and religious arguments. ,[object Object]
Questions ,[object Object],7. Comment on possible causes and effects what you found on those involved.,[object Object],Some possible causes and effects would be loss of personal information and private details from the victims. The perpetrators may be likely to get away with the crime as it is being claimed as an act of war.,[object Object],8. Explain why personal details need to be protected, including potential consequences of personal information being misused.,[object Object],Personal information need to be protected so consumers or individuals do not have to deal with there private information being sold or used against them to cause personal harm to there social and emotional status.,[object Object]

Mais conteúdo relacionado

Mais procurados

2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and securityGolden Locksmith
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingWilliam hendric
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 

Mais procurados (20)

2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack Everything
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
June NOW 2014
June NOW 2014June NOW 2014
June NOW 2014
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 

Destaque (17)

Nombor bulat
Nombor bulatNombor bulat
Nombor bulat
 
HFX Bike Trailer Share Designs
HFX Bike Trailer Share DesignsHFX Bike Trailer Share Designs
HFX Bike Trailer Share Designs
 
Biot Book
Biot BookBiot Book
Biot Book
 
Seminar 3 Feb
Seminar 3 FebSeminar 3 Feb
Seminar 3 Feb
 
Un mundo sin granjas
Un mundo sin granjasUn mundo sin granjas
Un mundo sin granjas
 
Seminar 3 Feb Oblivion
Seminar 3 Feb OblivionSeminar 3 Feb Oblivion
Seminar 3 Feb Oblivion
 
Marketing
MarketingMarketing
Marketing
 
Capitulo v y vi
Capitulo v y viCapitulo v y vi
Capitulo v y vi
 
Cancer awareness by Mary Joyce S. Teoxon; M.D
Cancer awareness by Mary Joyce S. Teoxon; M.DCancer awareness by Mary Joyce S. Teoxon; M.D
Cancer awareness by Mary Joyce S. Teoxon; M.D
 
Austin community final Lauren
Austin community final LaurenAustin community final Lauren
Austin community final Lauren
 
Portfolio
PortfolioPortfolio
Portfolio
 
Balik Kulturu
Balik KulturuBalik Kulturu
Balik Kulturu
 
123976391 peka
123976391 peka123976391 peka
123976391 peka
 
Presentatie Ouder Oudercontacten Def
Presentatie Ouder Oudercontacten DefPresentatie Ouder Oudercontacten Def
Presentatie Ouder Oudercontacten Def
 
How to-design-our-world
How to-design-our-worldHow to-design-our-world
How to-design-our-world
 
Orient west
Orient westOrient west
Orient west
 
Computer Keyboards
Computer KeyboardsComputer Keyboards
Computer Keyboards
 

Semelhante a Data security problems

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Analysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsHeidi Maestas
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Securityczarviscayno
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
The Topic Of Identity Theft
The Topic Of Identity TheftThe Topic Of Identity Theft
The Topic Of Identity TheftLupita Vickrey
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Data Security Breach For Target
Data Security Breach For TargetData Security Breach For Target
Data Security Breach For TargetChristina Santos
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity TheftDanielle Jobe
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Arguments Against Equifax
Arguments Against EquifaxArguments Against Equifax
Arguments Against EquifaxAndrea Turner
 
Essay On Cybersecurity Breaches
Essay On Cybersecurity BreachesEssay On Cybersecurity Breaches
Essay On Cybersecurity BreachesJessica Cannella
 

Semelhante a Data security problems (20)

Essay On Identity Theft
Essay On Identity TheftEssay On Identity Theft
Essay On Identity Theft
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
Analysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity ConsultantsAnalysis Of BJG Cybersecurity Consultants
Analysis Of BJG Cybersecurity Consultants
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
 
Identity Theft Essay
Identity Theft EssayIdentity Theft Essay
Identity Theft Essay
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Informative Essay On Identity Theft
Informative Essay On Identity TheftInformative Essay On Identity Theft
Informative Essay On Identity Theft
 
The Topic Of Identity Theft
The Topic Of Identity TheftThe Topic Of Identity Theft
The Topic Of Identity Theft
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Data Security Breach For Target
Data Security Breach For TargetData Security Breach For Target
Data Security Breach For Target
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Essay On Identity Theft
Essay On Identity TheftEssay On Identity Theft
Essay On Identity Theft
 
Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity Theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Arguments Against Equifax
Arguments Against EquifaxArguments Against Equifax
Arguments Against Equifax
 
Essay On Cybersecurity Breaches
Essay On Cybersecurity BreachesEssay On Cybersecurity Breaches
Essay On Cybersecurity Breaches
 

Data security problems

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.