Your SlideShare is downloading. ×
  • Like
ASSIST - Fraud Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply
Published

ASS

ASS

Published in Education
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
258
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Traditional problems for business
    • Trusted employees
    • Cheque theft ( e.g. interception )
    • Cheque washing
    • Invoice falsification
    • Long firm fraud
  • 2. WHERE CAN FRAUDSTERS GET PERSONAL OR BUSINESS DETAILS?
    • FACEBOOK
    • YOUR WEBSITE
    • PHISHING/SMISHING
    • UNSHREDDED WASTE
    • Companies House
  • 3. Some facts about a computer
    • keeps a record of everything it does.
    • When a file is deleted only the entry in the File Allocation Table is deleted.
    • All data stored on a computer is therefore potentially recoverable.
  • 4. WHAT IS A TROJAN? According to Wikipedia7 “a Trojan horse or Trojan is a malicious program that is disguised as legitimate software … Trojan horse programs cannot replicate themselves , as do some other types of malware, like viruses or worms. A Trojan horse can be deliberately attached to otherwise useful software by a programmer, or it can be spread by tricking users into believing that it is a useful program.” A Trojan is simply a delivery mechanism. It contains a payload to be delivered elsewhere. The payload may consist of almost anything such as a piece of spyware, adware, a backdoor, implanted data or simply a routine contained within a batch file. Additional tools such as keyloggers, packet generation tools (for denial-of-service attacks) and sniffers may form part of the payload.  
  • 5. Technical Challenges • Hardware –hard drive sizes, RAID • Software –free tools to hack and to cover tracks • Operating Systems –built in encryption • Networks –always on –always at risk • Passwords, Encryption, Steganography • Anonymous Remailers • Spoofing • Ever Changing Technology
  • 6.  
  • 7. POPUPS AND SPAM
    • Unsolicited emails, or advertisements which ‘Pop Up’ onto a user’s screen whilst they are surfing the Internet
    • CAN BE USED TO INTRODUCE VIRUSES/TROJANS
  • 8. INTERNET BENEFITS
    • EXCELLENT GLOBAL COMMUNICATIONS, TRADING and LEARNING RESOURCE
    • Vast capacity for data storage ( “The Cloud” )
    • YOU might KNOW WHERE YOUR BELOVED STAFF/MONSTER(S) ARE?
    • LESS NEED TO BUY ENCYLOPAEDIA COLLECTION
    • FEWER TRIPS TO REFERENCE LIBRARY
    • ( saves fuel and fines!? )
  • 9. DISADVANTAGES
    • Less face to face communication ( who exactly is your e-correspondent? )
    • Your computers are partially open doors to the world
    • May be part of a botnet ( almost limitless e-crime platform/ad hoc network )
    • Your website/data may be copied and/or infected
    • New clients cannot easily be authenticated
    • Social network site profile data may be harvested and sold on
  • 10. USEFUL WEBSITES
    • www.actionfraud.org.uk
    • www.virtualglobaltaskforce.com
    • www.iwf.org.uk
    • www.getsafeonline.org .uk
    • www.banksafeonline.org.uk
    • www.phonepayplus.org .uk
    • www.childline.org.uk
    • www.bbc.co.uk/cbbc/help/safesurfing
    • www.thinkuknow.co.uk