2. Why it matters?
• Intellectual property
• Customer or user data
• Organisation’s image and public perception
• Cost of attacks in relation to money
3. Who are they?
• Criminals
• Hacktivists
• “The concept of hacktivism is also becoming increasingly popular and refers,
essentially, to civil disobedience in the cyber realm. The motives of
hacktivists range from political issues, promoting free speech or supporting
human rights, and are not based on financial gain.” John Green
• General hackers
White Hat’s
Black Hat’s
Julian Assange,
founder of
Wikileaks
Edward
Snowden
4. What can be done?
• Education
• “In addition to IT protection, firms must fully educate company employees on
the nature of attacks and how to identify suspicious emails or behaviour, and
have adequate preparations in place for if attacks do arise. “ – Phil Beckett
• Security competence
5. What can be done?
• Organisations need to be pro-active
• Penetration test, within the organisation or by hiring
professionals
• Information Technology’s cyclic development and advancement
• Worst case scenario plan of action
6. Digitisation and Cyber Security
• Prospective employee’s of the field need to understand it’s nature.
7. References1. Toh, K.G (2013). Intellectual Property [Image]. Retrieved from http://fr.123rf.com/photo_9914637_background-concept-wordcloud-illustration-of-ideology.html
2. Database server [Image]. (2013). Retrieved from http://www.freepik.com/free-vector/database-server_610184.htm#term=server&page=3&position=12
3.Cisco logo [Image]. (2008). Retrieved from https://commons.wikimedia.org/wiki/File:Cisco_logo.svg
4. Falling off the chart [Image]. (2001). Retrieved from http://www.srilankamuslimeconomistsuk.org/2011/01/spectre-of-double-dip-recession.html
5. Data Thief [Image]. (2014). Retrieved from https://www.flickr.com/photos/111692634@N04/15855653380
6. Julian Assange [Image]. (2010). Retrieved from https://commons.wikimedia.org/wiki/File:Julian_Assange_20091117_Copenhagen_1_cropped_to_shoulders.jpg
7. Wikileaks (2008). Wikileaks Logo [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Wikileaks_logo.svg
8. Laura Poitras (2013). Edward Snowden [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:Edward_Snowden-2.jpg
9. Louis Courtney (2012). Anonymous black [Image]. Retrieved from https://c2.staticflickr.com/8/7260/6870002408_abf6b5b6a8_b.jpg
10. Gerd Altmann (2014). Education [Image]. Retrieved from https://pixabay.com/p-379219/?no_redirect
11. Gerd Altmann (2015). Digital road sign [Image]. Retrieved from https://pixabay.com/p-579553/?no_redirect
12. Gerd Altmann (2015). Digital lock [Image]. Retrieved from https://pixabay.com/p-538722/?no_redirect
13. Safe [Image] (n.d.). Retrieved from https://www.jisc.ac.uk/sites/default/files/safe.jpg
14. Karn G. Bulsuk (2008). Plan of action [Image]. Retrieved from https://commons.wikimedia.org/wiki/File:PDCA_Cycle.svg
15. Digitisation [Image]. (2015). Retrieved from https://www.linkedin.com/pulse/astounding-effects-digitisation-workplace-laura-white