SlideShare a Scribd company logo
1 of 5
Threat: Phishing - Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by
deception. Phishing messages usually take the form of fake notifications or emails from a site.
Damage caused: It includes theft of passwords, credit card numbers, bank account details and other
confidential information.
How they could effect business:
- Less money because of less trust from customers
- Change the image of the site with peoples opinions
- Less money
- Investing in higher security
How they could effect customers:
- Less trust for a site
- Less use? _ less money spent
- Information stolen, money lost and card or back account used.

How does NIKE protect themselves? How do they reduce targeting?
- Sender authentication
-   Only sending necessary emails in order for people not to think its spam or for recipients to
   question it
- Never asks for personal information over email
- http://www.csoonline.com/article/221737/phishing-the-basics
•  Threat: Spam - Spam is anonymous, bulk email. Spam is sent in enormous quantities. Spammers
   make money from the small percentage of recipients that actually respond, so for spam to be cost-
   effective, the initial mails have to be high-volume.
How they could effect business:
- Less money because of less trust from customers
- Change the image of the site with peoples opinions
- Less money
- Investing in higher security
- Less people may believe transferred information
How they could effect customers:
- Less trust for a site
- Some information might not be believed
- Information stolen, money lost and card or back account used through misleading information
How does NIKE protect themselves? How do they reduce targeting?
- Sender authentication
- Never asks for personal information over email
- Makes certain important emails are unique
- Notifies you on website user logon that an email has been sent and any changes to an account
•  Pharming - Phishing email messages are designed to steal your identity. They ask for personal data,
   or direct you to websites or phone numbers to call where they ask you to provide personal data.
How they could effect business:
- Less money because of less trust from customers
- Change the image of the site with peoples opinions
- Less money
- Investing in higher security
- Less people may believe transferred information
- Little or less responses to real emails
How they could effect customers:
- Less trust for a site
- Some information might not be believed
- Information stolen, money lost and card or back account used through misleading information
- Not as likely to reply to information sent over email
How does NIKE protect themselves? How do they reduce targeting?
- Sender authentication
- Never asks for personal information over email
-   Firewalls – Firewalls can prevent malware from downloading to a computer. A firewall works by
    monitoring connections made to and from a computer.
-   Secure socket layer (SSL) – an encryption of data which is transferred over the internet developed by
    Netscape. It allows documents to be sent over the internet safely.
-   Anti virus protection and software (up to date!) - Programs used to detect and remove computer
    viruses. Anti virus software’s are constantly active, attempting to detect viruses. It includes a regular
    update service allowing it to keep up to date with the latest viruses and software's that are realised.
-   Cookies – Small files of information that are stored on a users computer by web servers on the sites
    that the users visit. Cookies are used to identify specific information and looks at the users
    preferences.
-   Ad-ware – Programs that you usually install onto a computer which tracks online behaviour and
    preferences. Just like cookies, although you install the program or often do so without realising.
-   Spyware – spyware is similar to Ad-ware, although it is usually more devious within what it is doing.
    Spyware effectively ‘customises’ your browser for mostly the worse. Worst cases report if hidden
    programs that spy on a users interactions, key-strokes, passwords and general details of computer
    usage.
-   Privacy policy – A privacy policy is a statement or a declaration of all of the ways in which consumer
    data and information will be used.
-   Pop up blocker – Software which can infiltrate pop ups before they have a chance to infect. Its an
    extension which works with a browser to stop a computer being affected.

More Related Content

Viewers also liked

Viewers also liked (20)

The pr master class presentation
The pr master class presentationThe pr master class presentation
The pr master class presentation
 
Content Marketing Ideas for SMEs
Content Marketing Ideas for SMEsContent Marketing Ideas for SMEs
Content Marketing Ideas for SMEs
 
Technologies work
Technologies workTechnologies work
Technologies work
 
Fin.354 lecture notes
Fin.354 lecture notesFin.354 lecture notes
Fin.354 lecture notes
 
Power point
Power pointPower point
Power point
 
Labelled Screen Shots
Labelled Screen ShotsLabelled Screen Shots
Labelled Screen Shots
 
Isolation Feedback
Isolation FeedbackIsolation Feedback
Isolation Feedback
 
Los planetas del sistema solar
Los planetas del sistema solarLos planetas del sistema solar
Los planetas del sistema solar
 
Actividad i x trabajo en equipo ii
Actividad i x trabajo en equipo iiActividad i x trabajo en equipo ii
Actividad i x trabajo en equipo ii
 
Conheço Um Coração
Conheço Um CoraçãoConheço Um Coração
Conheço Um Coração
 
Desafio 24h Curitiba
Desafio 24h   CuritibaDesafio 24h   Curitiba
Desafio 24h Curitiba
 
7 85 Mat05
7 85 Mat057 85 Mat05
7 85 Mat05
 
Paysms
PaysmsPaysms
Paysms
 
Las colecciones Otto Dix parte 2
Las colecciones Otto Dix parte 2Las colecciones Otto Dix parte 2
Las colecciones Otto Dix parte 2
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
C:\fakepath\política nacional de sangre
C:\fakepath\política nacional de sangreC:\fakepath\política nacional de sangre
C:\fakepath\política nacional de sangre
 
Girona, temps de flors 2013
Girona, temps de flors 2013Girona, temps de flors 2013
Girona, temps de flors 2013
 
Estrategia para la negociación de los precios 1
Estrategia para la negociación de los precios 1Estrategia para la negociación de los precios 1
Estrategia para la negociación de los precios 1
 
Santo rosário tradicional
Santo rosário tradicionalSanto rosário tradicional
Santo rosário tradicional
 
Talleres semana santa
Talleres semana santaTalleres semana santa
Talleres semana santa
 

Similar to Data protection

Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop ThemAnvesh Vision Private Limited
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication? Sinch
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web SiteDonny Shimamoto
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfanjandavid
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudNuData Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybodyavahe
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in EcommerceMartyn Sukys
 

Similar to Data protection (20)

Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web Site
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web Fraud
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybody
 
Phishing
PhishingPhishing
Phishing
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 

More from burto111

Casting Contacts
Casting ContactsCasting Contacts
Casting Contactsburto111
 
Institutions Research
Institutions ResearchInstitutions Research
Institutions Researchburto111
 
Storyboard
StoryboardStoryboard
Storyboardburto111
 
StopGoSixty Copyright
StopGoSixty CopyrightStopGoSixty Copyright
StopGoSixty Copyrightburto111
 
Initial Ideas
Initial IdeasInitial Ideas
Initial Ideasburto111
 
Storyboard
StoryboardStoryboard
Storyboardburto111
 
3 Point Lighting
3 Point Lighting3 Point Lighting
3 Point Lightingburto111
 
Credit Timeline of Forest Gump
Credit Timeline of Forest GumpCredit Timeline of Forest Gump
Credit Timeline of Forest Gumpburto111
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentburto111
 
Step up Opening Sequence Analysis
Step up Opening Sequence AnalysisStep up Opening Sequence Analysis
Step up Opening Sequence Analysisburto111
 
Shot Types
Shot TypesShot Types
Shot Typesburto111
 
Props List
Props ListProps List
Props Listburto111
 
Crew Roles
Crew RolesCrew Roles
Crew Rolesburto111
 
Crew Names
Crew NamesCrew Names
Crew Namesburto111
 
Location shots
Location shotsLocation shots
Location shotsburto111
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Radio advert evaluation
Radio advert evaluationRadio advert evaluation
Radio advert evaluationburto111
 

More from burto111 (20)

Casting Contacts
Casting ContactsCasting Contacts
Casting Contacts
 
Institutions Research
Institutions ResearchInstitutions Research
Institutions Research
 
Storyboard
StoryboardStoryboard
Storyboard
 
StopGoSixty Copyright
StopGoSixty CopyrightStopGoSixty Copyright
StopGoSixty Copyright
 
Initial Ideas
Initial IdeasInitial Ideas
Initial Ideas
 
Storyboard
StoryboardStoryboard
Storyboard
 
Shot List
Shot ListShot List
Shot List
 
3 Point Lighting
3 Point Lighting3 Point Lighting
3 Point Lighting
 
Credit Timeline of Forest Gump
Credit Timeline of Forest GumpCredit Timeline of Forest Gump
Credit Timeline of Forest Gump
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Step up Opening Sequence Analysis
Step up Opening Sequence AnalysisStep up Opening Sequence Analysis
Step up Opening Sequence Analysis
 
Shot Types
Shot TypesShot Types
Shot Types
 
Schedule
ScheduleSchedule
Schedule
 
Costume
CostumeCostume
Costume
 
Props List
Props ListProps List
Props List
 
Crew Roles
Crew RolesCrew Roles
Crew Roles
 
Crew Names
Crew NamesCrew Names
Crew Names
 
Location shots
Location shotsLocation shots
Location shots
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Radio advert evaluation
Radio advert evaluationRadio advert evaluation
Radio advert evaluation
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Data protection

  • 1.
  • 2. Threat: Phishing - Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception. Phishing messages usually take the form of fake notifications or emails from a site. Damage caused: It includes theft of passwords, credit card numbers, bank account details and other confidential information. How they could effect business: - Less money because of less trust from customers - Change the image of the site with peoples opinions - Less money - Investing in higher security How they could effect customers: - Less trust for a site - Less use? _ less money spent - Information stolen, money lost and card or back account used. How does NIKE protect themselves? How do they reduce targeting? - Sender authentication - Only sending necessary emails in order for people not to think its spam or for recipients to question it - Never asks for personal information over email - http://www.csoonline.com/article/221737/phishing-the-basics
  • 3. • Threat: Spam - Spam is anonymous, bulk email. Spam is sent in enormous quantities. Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost- effective, the initial mails have to be high-volume. How they could effect business: - Less money because of less trust from customers - Change the image of the site with peoples opinions - Less money - Investing in higher security - Less people may believe transferred information How they could effect customers: - Less trust for a site - Some information might not be believed - Information stolen, money lost and card or back account used through misleading information How does NIKE protect themselves? How do they reduce targeting? - Sender authentication - Never asks for personal information over email - Makes certain important emails are unique - Notifies you on website user logon that an email has been sent and any changes to an account
  • 4. • Pharming - Phishing email messages are designed to steal your identity. They ask for personal data, or direct you to websites or phone numbers to call where they ask you to provide personal data. How they could effect business: - Less money because of less trust from customers - Change the image of the site with peoples opinions - Less money - Investing in higher security - Less people may believe transferred information - Little or less responses to real emails How they could effect customers: - Less trust for a site - Some information might not be believed - Information stolen, money lost and card or back account used through misleading information - Not as likely to reply to information sent over email How does NIKE protect themselves? How do they reduce targeting? - Sender authentication - Never asks for personal information over email
  • 5. - Firewalls – Firewalls can prevent malware from downloading to a computer. A firewall works by monitoring connections made to and from a computer. - Secure socket layer (SSL) – an encryption of data which is transferred over the internet developed by Netscape. It allows documents to be sent over the internet safely. - Anti virus protection and software (up to date!) - Programs used to detect and remove computer viruses. Anti virus software’s are constantly active, attempting to detect viruses. It includes a regular update service allowing it to keep up to date with the latest viruses and software's that are realised. - Cookies – Small files of information that are stored on a users computer by web servers on the sites that the users visit. Cookies are used to identify specific information and looks at the users preferences. - Ad-ware – Programs that you usually install onto a computer which tracks online behaviour and preferences. Just like cookies, although you install the program or often do so without realising. - Spyware – spyware is similar to Ad-ware, although it is usually more devious within what it is doing. Spyware effectively ‘customises’ your browser for mostly the worse. Worst cases report if hidden programs that spy on a users interactions, key-strokes, passwords and general details of computer usage. - Privacy policy – A privacy policy is a statement or a declaration of all of the ways in which consumer data and information will be used. - Pop up blocker – Software which can infiltrate pop ups before they have a chance to infect. Its an extension which works with a browser to stop a computer being affected.