Your SlideShare is downloading. ×
0
ICM - Social Media & Security Review
ICM - Social Media & Security Review
ICM - Social Media & Security Review
ICM - Social Media & Security Review
ICM - Social Media & Security Review
ICM - Social Media & Security Review
ICM - Social Media & Security Review
ICM - Social Media & Security Review
ICM - Social Media & Security Review
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

ICM - Social Media & Security Review

218

Published on

Slides from Gavin Whittaker\'s presentation to the Sheffield branch of the Institute of Credit Management regards the security risks associated to social media.

Slides from Gavin Whittaker\'s presentation to the Sheffield branch of the Institute of Credit Management regards the security risks associated to social media.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
218
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • The UK Government recognise the serious risk of sabotage to your business and our vital computer networks, so much so Cyber Warfare is now a top priority in its new national security strategy, so much so it has boosted the UK’s Intelligence Services budget by £500 million to tackle cyber terrorism
  • Transcript

    • 1. Fraud on the Web Gavin Whittaker IT Security Specialist A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 2. Spanair Flight 5022 Killed 154 Only 18 survivors A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 3. “ Britain must defend itself against cyber warfare before planes start falling out of the sky” William Hague, Foreign Secretary A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 4. <ul><li>Mexican Gulf </li></ul><ul><li>BP Deep Water Horizon </li></ul><ul><li>Killed 11 people </li></ul><ul><li>Injured many more </li></ul>A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 5. A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 6. <ul><li>Employees are a major risk </li></ul><ul><li>Business, personal information & money </li></ul><ul><li>Malicious attacks and code has now evolved </li></ul><ul><li>Data backups are not a solution </li></ul><ul><li>Awareness of the common scams is essential </li></ul>A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 7. <ul><li>Threats can be classified by their target </li></ul><ul><li>Spam and phishing target users </li></ul><ul><li>Malware targets computer systems and software </li></ul>Types of Threats A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 8. User Threats A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    • 9. Systems Threats A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals

    ×