SlideShare uma empresa Scribd logo
1 de 8
*
*
* Internet fraud
Something that Topshop have to protect against is
fraud. Internet fraud/theft can occur if you respond
to an unsolicited email. If the offer looks too good to
be true, it probably is! Identity theft can occur when
a cybercrook illegally gets hold of and uses your
personal data.
*

* To protect against fraud, Topshop do not share
 your personal information with any other
 companies for marketing or commercial
 reasons. They also recommend that you
 memorise your password and also make it very
 hard to guess, meaning it’s harder for hackers
 to guess.
*
* Phishing
Phishing is where somebody tricks you into giving
them your details, such as passwords and credit
card details. Phishing is an example of social
engineering techniques used to deceive users.
Phishers are targeting the customers of banks
and online payment services, which is why
phishing is such a big threat to online stores such
as Topshop.com.
*
* Pharming
This is where a hacker directs Internet users to a
bogus website that has an appearance almost
identical to the original. Pharming has become a
major concern to businesses hosting ecommerce
and online banking websites. Pharming could be
a huge threat to Topshop.com as a hacker could
mimic the site to Internet users and take money
out of peoples account if they were to order
something.
*

* Spoofing
A spoofing attack can occur at any time.
Spoofing is where hackers track other peoples
information and pretend to be somebody else,
e.g. a computer.
*
* Virus’s
A virus is designed to make your pc breakdown
and to spread further. They are mainly sent by
email, almost like SPAM, but they are much more
dangerous. They are a threat to Topshop because
people can sign up to receive free weekly emails
from Topshop.com. If the site got hacked,
thousands of customers would receive an email
that could possible contain a virus from the
hacker.
*
* What is legislation?
 Legislation can refer to laws or the process by which
 they are enacted in certain countries. Many countries
 have some form of legislature, which is a body
 dedicated primarily to passing and amending laws. It is
 there to illegalise unauthorised access to computer
 systems and to also stop the wrong people getting hold
 of other peoples information.

Mais conteúdo relacionado

Mais procurados

Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attackijtsrd
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingJacqueline Fick
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft businessMatt Smith
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystemamiable_indian
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraudCyberSangam
 
Is Your ID Approved for Travel?
Is Your ID Approved for Travel?Is Your ID Approved for Travel?
Is Your ID Approved for Travel?AaliyahSims
 
Must know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against ThemMust know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against Themizoologic
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 

Mais procurados (20)

Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attack
 
Sim swapping
Sim swappingSim swapping
Sim swapping
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
Mr SIM Swap Gone Phishing
Mr SIM Swap Gone PhishingMr SIM Swap Gone Phishing
Mr SIM Swap Gone Phishing
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Identity Theft business
Identity Theft businessIdentity Theft business
Identity Theft business
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Phishing
PhishingPhishing
Phishing
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Phishing
PhishingPhishing
Phishing
 
What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraud
 
Phishing
PhishingPhishing
Phishing
 
Cyber crimes & cyber security
Cyber crimes & cyber securityCyber crimes & cyber security
Cyber crimes & cyber security
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Is Your ID Approved for Travel?
Is Your ID Approved for Travel?Is Your ID Approved for Travel?
Is Your ID Approved for Travel?
 
Must know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against ThemMust know about Phishing Attacks and How to Protect Against Them
Must know about Phishing Attacks and How to Protect Against Them
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 

Semelhante a Topshop potential threats

The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environmentJeet Kothadiya
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdfgaherwarsaloni1234
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crimeDevanshi Solanki
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptxangellaclarianes1
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 

Semelhante a Topshop potential threats (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
The disadvantage of ict.pptx
The disadvantage of ict.pptxThe disadvantage of ict.pptx
The disadvantage of ict.pptx
 
internet security
internet securityinternet security
internet security
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Topshop potential threats

  • 1. *
  • 2. * * Internet fraud Something that Topshop have to protect against is fraud. Internet fraud/theft can occur if you respond to an unsolicited email. If the offer looks too good to be true, it probably is! Identity theft can occur when a cybercrook illegally gets hold of and uses your personal data.
  • 3. * * To protect against fraud, Topshop do not share your personal information with any other companies for marketing or commercial reasons. They also recommend that you memorise your password and also make it very hard to guess, meaning it’s harder for hackers to guess.
  • 4. * * Phishing Phishing is where somebody tricks you into giving them your details, such as passwords and credit card details. Phishing is an example of social engineering techniques used to deceive users. Phishers are targeting the customers of banks and online payment services, which is why phishing is such a big threat to online stores such as Topshop.com.
  • 5. * * Pharming This is where a hacker directs Internet users to a bogus website that has an appearance almost identical to the original. Pharming has become a major concern to businesses hosting ecommerce and online banking websites. Pharming could be a huge threat to Topshop.com as a hacker could mimic the site to Internet users and take money out of peoples account if they were to order something.
  • 6. * * Spoofing A spoofing attack can occur at any time. Spoofing is where hackers track other peoples information and pretend to be somebody else, e.g. a computer.
  • 7. * * Virus’s A virus is designed to make your pc breakdown and to spread further. They are mainly sent by email, almost like SPAM, but they are much more dangerous. They are a threat to Topshop because people can sign up to receive free weekly emails from Topshop.com. If the site got hacked, thousands of customers would receive an email that could possible contain a virus from the hacker.
  • 8. * * What is legislation? Legislation can refer to laws or the process by which they are enacted in certain countries. Many countries have some form of legislature, which is a body dedicated primarily to passing and amending laws. It is there to illegalise unauthorised access to computer systems and to also stop the wrong people getting hold of other peoples information.