Traditional problems for business <ul><li>Trusted employees </li></ul><ul><li>Cheque theft ( e.g. interception ) </li></ul...
WHERE CAN FRAUDSTERS GET PERSONAL OR BUSINESS DETAILS? <ul><li>FACEBOOK </li></ul><ul><li>YOUR WEBSITE </li></ul><ul><li>P...
Some facts about a computer <ul><li>keeps a record of everything it does. </li></ul><ul><li>When a file is deleted only th...
WHAT IS A TROJAN? According to Wikipedia7 “a Trojan horse or Trojan is a malicious program that is disguised as   legitima...
Technical Challenges • Hardware –hard drive sizes, RAID • Software –free tools to hack and to cover tracks • Operating Sys...
 
POPUPS AND SPAM <ul><li>Unsolicited emails, or advertisements which ‘Pop Up’ onto a user’s screen whilst they are surfing ...
INTERNET BENEFITS   <ul><li>EXCELLENT  GLOBAL  COMMUNICATIONS, TRADING and LEARNING RESOURCE </li></ul><ul><li>Vast capaci...
DISADVANTAGES <ul><li>Less face to face communication   ( who exactly is your e-correspondent? ) </li></ul><ul><li>Your co...
USEFUL WEBSITES <ul><li>www.actionfraud.org.uk </li></ul><ul><li>www.virtualglobaltaskforce.com </li></ul><ul><li>www.iwf....
Upcoming SlideShare
Loading in...5
×

ASSIST - Fraud Presentation

277

Published on

ASS

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
277
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

ASSIST - Fraud Presentation

  1. 1. Traditional problems for business <ul><li>Trusted employees </li></ul><ul><li>Cheque theft ( e.g. interception ) </li></ul><ul><li>Cheque washing </li></ul><ul><li>Invoice falsification </li></ul><ul><li>Long firm fraud </li></ul>
  2. 2. WHERE CAN FRAUDSTERS GET PERSONAL OR BUSINESS DETAILS? <ul><li>FACEBOOK </li></ul><ul><li>YOUR WEBSITE </li></ul><ul><li>PHISHING/SMISHING </li></ul><ul><li>UNSHREDDED WASTE </li></ul><ul><li>Companies House </li></ul>
  3. 3. Some facts about a computer <ul><li>keeps a record of everything it does. </li></ul><ul><li>When a file is deleted only the entry in the File Allocation Table is deleted. </li></ul><ul><li>All data stored on a computer is therefore potentially recoverable. </li></ul>
  4. 4. WHAT IS A TROJAN? According to Wikipedia7 “a Trojan horse or Trojan is a malicious program that is disguised as legitimate software … Trojan horse programs cannot replicate themselves , as do some other types of malware, like viruses or worms. A Trojan horse can be deliberately attached to otherwise useful software by a programmer, or it can be spread by tricking users into believing that it is a useful program.” A Trojan is simply a delivery mechanism. It contains a payload to be delivered elsewhere. The payload may consist of almost anything such as a piece of spyware, adware, a backdoor, implanted data or simply a routine contained within a batch file. Additional tools such as keyloggers, packet generation tools (for denial-of-service attacks) and sniffers may form part of the payload.  
  5. 5. Technical Challenges • Hardware –hard drive sizes, RAID • Software –free tools to hack and to cover tracks • Operating Systems –built in encryption • Networks –always on –always at risk • Passwords, Encryption, Steganography • Anonymous Remailers • Spoofing • Ever Changing Technology
  6. 7. POPUPS AND SPAM <ul><li>Unsolicited emails, or advertisements which ‘Pop Up’ onto a user’s screen whilst they are surfing the Internet </li></ul><ul><li>CAN BE USED TO INTRODUCE VIRUSES/TROJANS </li></ul>
  7. 8. INTERNET BENEFITS <ul><li>EXCELLENT GLOBAL COMMUNICATIONS, TRADING and LEARNING RESOURCE </li></ul><ul><li>Vast capacity for data storage ( “The Cloud” ) </li></ul><ul><li>YOU might KNOW WHERE YOUR BELOVED STAFF/MONSTER(S) ARE? </li></ul><ul><li>LESS NEED TO BUY ENCYLOPAEDIA COLLECTION </li></ul><ul><li>FEWER TRIPS TO REFERENCE LIBRARY </li></ul><ul><li>( saves fuel and fines!? ) </li></ul>
  8. 9. DISADVANTAGES <ul><li>Less face to face communication ( who exactly is your e-correspondent? ) </li></ul><ul><li>Your computers are partially open doors to the world </li></ul><ul><li>May be part of a botnet ( almost limitless e-crime platform/ad hoc network ) </li></ul><ul><li>Your website/data may be copied and/or infected </li></ul><ul><li>New clients cannot easily be authenticated </li></ul><ul><li>Social network site profile data may be harvested and sold on </li></ul>
  9. 10. USEFUL WEBSITES <ul><li>www.actionfraud.org.uk </li></ul><ul><li>www.virtualglobaltaskforce.com </li></ul><ul><li>www.iwf.org.uk </li></ul><ul><li>www.getsafeonline.org .uk </li></ul><ul><li>www.banksafeonline.org.uk </li></ul><ul><li>www.phonepayplus.org .uk </li></ul><ul><li>www.childline.org.uk </li></ul><ul><li>www.bbc.co.uk/cbbc/help/safesurfing </li></ul><ul><li>www.thinkuknow.co.uk </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×