Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Threats to online security and data


Published on

  • Be the first to comment

Threats to online security and data

  1. 1. Threats to online Security and DataBy Anthony Wheeler
  2. 2. Threats
  3. 3. Stealing Data Stealing Data is when a hacker manages to code themselves into a websites server and access private information like bank details and addresses. However, websites holding this kind of information will usually Encrypt it, so that it is inaccessible for hackers.
  4. 4. MalwareMalware is malicious software. It is softwarethat is created by an attacker andtransferred to your computer by a variety ofdifferent ways, including a malicious email orthrough downloaded software.
  5. 5. Direct Hackers A hacker is somebody that finds and creates loop holes in operating systems, to then enter into them to edit certain items, or delete parts of the operating system, or even the whole thing.
  6. 6. Taking Over a WebsiteTaking over a website is when a hacker accesses the site through loop holes, and changes certain parts of the site. An example of this would be if somebody had changed Apple’s homepage to say ‘Android Is Better’.
  7. 7. SpamSpam is only received over emails. Spam isunwanted emails, usually sent out in bulk toa set mailing list, of which thousands ofother victims are added every day. Thecontent of the email will usually be offerssaying you have won something, orquestionnaires asking you to input personalinformation.
  8. 8. PhishingPhishing is when a person attempts, with intent, to access personal data like usernames, passwords and credit card information.
  9. 9. PharmingPharming is when the attacker gets into a websites servers and changes where a user would end up if they entered the normal URL for that website.
  10. 10. Legislations
  11. 11. This Act was passed in 2000, to protectonline shoppers from fraud. The rules applywhen a company is selling a product orservice, without face to face contact. Theregulations of this act include Confirmation inwriting, a ‘cool off’ period, where thecustomer can return items within 7 dayswithout penalty and protection from paymentcard fraud.Distance Selling Regulations
  12. 12. This act was passed in 1998, to control who can access certain data.There are 8 principles with this act, all about how businesses mustcontrol private information and data: Processed fairly and lawfully Obtained for specified and lawful purposes Adequate, relevant and not excessive Accurate and up to date Not kept any longer than necessary Processed in accordance with the individuals rights Securely kept Not transferred to any other country without adequate protection The Data Protection Act