SlideShare a Scribd company logo
1 of 26
Download to read offline
Protecting information
„New Literacy Set” Project
2015-2017
In UK in 2015. were:
•2.46 million cyber incidents
•2.11 million victims of cyber
crime
•UK businesses reported
losses of £1,079,447,765 in
the past year
• In 2015, the maximum
total annualized cost od
cyber-crime committed
against US companies
amounted to 65.05
million U.S.dollars
• 35% of the global
cybercrime were U.S.
fraud victims
•Legislative inhomogeneity
makes it virtually impossible for
an unanimous judgement of the
criminal events that is then
treated differently depending on
the country.
•Criminal acts could be
conducted in foreign
countries.
Lifecycle
Collect and
hold
Handling
Assess the
risks
Protect your
informations
Destroy
1. Consider What Personal Information
Is Important
• Personal information
includes personal data:
• Identification data
• Contact data
• Physical
characteristics data
• Ideology data
2. Privacy By Design
• Malware – malicious software
• Where malware comes from?
– Internet
– e-mail
– Hacked websites
– Games demos
– Music files
– Toolbars
– Software
– Free subscriptions
• How to recognize malware?
– Slow computer
– Pop-ups
– Spam
– Frequent crashes
• How to remove malware?
– Use a reliable malware removal tool!
• How to prevent malware?
– Use powerful antivirus and anti-malware software
– Don’t open email attachments from unknown or
unexpected sources
3. If In Doubt, Throw It Out
Online shopping statistics
• 40% of global internet users, or more than 1
billion people, have bought products or goods
online
• The U.S. e-commerce economy is worth $349
billion while China’s e-commerce economy is
worth $562.66 billion
• 8 out of 10 consumers will shop online if
offered free shipping
Online shopping statistics
• Online retail sales in the U.K. reached an
estimated £52.25 billion in 2015, with the
average shopper spending £1,174
• 40% of shoppers consult 3 or more channels,
often in the process of shopping, before
making a purchase; it goes to show the
increasing importance of having an online
presence in as many places as possible
Ecommerce customers in Spain
• Credit cards amount for more than half of all
online transactions, followed by cash (32%),
electronic bank transfer (20%) and eWallet
(14%).
• The most important payment option in Spain
seems to be 4B, which has 20 million cards
circulating amongst the Spanish population.
• The credit and debit cards of Euro6000 are
also widely used.
Ecommerce customers in Spain
Ecommerce customers in Spain
• Based on data from from Instituo Nacional de
Estadictica, about 22% of the Spanish
population bought something in the last three
months
• About 10.7 million Spanish people (31% of the
population aged 16 to 74 years old) ordered
something online in the last year.
Top 10 Online Shopping Sites in the World
Online payment methods
Phishing
• What does a phishing email message look
like?
4. Stay Updated
• Install anti-virus/malware software
• Keep your antivirus software up to date
• Run regularly scheduled scans with your anti-
virus software
• Keep your operating system current
• Secure your network
• Think before you click
4. Stay Updated
• Keep your personal information safe
• Don’t use open wi-fi
• Back up your files
• Use multiple string passwords
5. Assessing the risk
• Metadata – „data about data”
6. Taking appropriate steps and putting strategies into
place to protect personal information
• Use a unique password for each of your important
accounts
• Use a mix of letters, numbers and symbols in your
passwords
• Don’t use personal information or common words as a
password
• Make sure your backup password options are up-to-
date and secure in case you need to reset or forget
your passord
• Keep your passwords secure and don’t leave notes with
your passwords to various sites on your computer or
desk
7. Destroying personal information
• Wipe the drive completely
• Delete only your sensitive files
• Destroy the hard drive

More Related Content

What's hot

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsArthit Suriyawongkul
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaMyles Freedman
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?MediaPost
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection RegulationSabrina Kirrane
 
Student Assignment Presentation Template
Student Assignment Presentation TemplateStudent Assignment Presentation Template
Student Assignment Presentation TemplateBrandon S
 

What's hot (19)

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in Africa
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
Student Assignment Presentation Template
Student Assignment Presentation TemplateStudent Assignment Presentation Template
Student Assignment Presentation Template
 
Reia news no48_aug15
Reia news no48_aug15Reia news no48_aug15
Reia news no48_aug15
 

Viewers also liked

Communication Within Family
Communication Within FamilyCommunication Within Family
Communication Within FamilyŠkola Futura
 
Non-verbal Communication
Non-verbal CommunicationNon-verbal Communication
Non-verbal CommunicationŠkola Futura
 
Creating structured information
Creating structured informationCreating structured information
Creating structured informationŠkola Futura
 
Use of social networks
Use of social networksUse of social networks
Use of social networksŠkola Futura
 
Comprehension of a text
Comprehension of a textComprehension of a text
Comprehension of a textŠkola Futura
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyŠkola Futura
 
Types of communication in conflicts
Types of communication in conflictsTypes of communication in conflicts
Types of communication in conflictsŠkola Futura
 
Fear of public speaking
Fear of public speakingFear of public speaking
Fear of public speakingŠkola Futura
 
Analysing charts and graphics
Analysing charts and graphicsAnalysing charts and graphics
Analysing charts and graphicsŠkola Futura
 
Effective communication
Effective communicationEffective communication
Effective communicationŠkola Futura
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communicationŠkola Futura
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal CommunicationŠkola Futura
 
Self-awareness in communication
Self-awareness in communicationSelf-awareness in communication
Self-awareness in communicationŠkola Futura
 
Evaluating information
Evaluating informationEvaluating information
Evaluating informationŠkola Futura
 

Viewers also liked (20)

New Technologies
New TechnologiesNew Technologies
New Technologies
 
Assertiveness
AssertivenessAssertiveness
Assertiveness
 
Communication Within Family
Communication Within FamilyCommunication Within Family
Communication Within Family
 
Non-verbal Communication
Non-verbal CommunicationNon-verbal Communication
Non-verbal Communication
 
Active listening
Active listeningActive listening
Active listening
 
Leadership
LeadershipLeadership
Leadership
 
Empathy
EmpathyEmpathy
Empathy
 
Creating structured information
Creating structured informationCreating structured information
Creating structured information
 
Use of social networks
Use of social networksUse of social networks
Use of social networks
 
Comprehension of a text
Comprehension of a textComprehension of a text
Comprehension of a text
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Types of communication in conflicts
Types of communication in conflictsTypes of communication in conflicts
Types of communication in conflicts
 
Fear of public speaking
Fear of public speakingFear of public speaking
Fear of public speaking
 
Analysing charts and graphics
Analysing charts and graphicsAnalysing charts and graphics
Analysing charts and graphics
 
Effective communication
Effective communicationEffective communication
Effective communication
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communication
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal Communication
 
Self-awareness in communication
Self-awareness in communicationSelf-awareness in communication
Self-awareness in communication
 
Mediation
MediationMediation
Mediation
 
Evaluating information
Evaluating informationEvaluating information
Evaluating information
 

Similar to Protecting information

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018bhagyasri patel
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfBalaMurali958529
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates#TheFraudTube
 

Similar to Protecting information (20)

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates
 

More from Škola Futura

Organizing information 2
Organizing information 2Organizing information 2
Organizing information 2Škola Futura
 
Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Škola Futura
 
Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Škola Futura
 
Behavioural approach to money
Behavioural approach to moneyBehavioural approach to money
Behavioural approach to moneyŠkola Futura
 
Management of bank accounts
Management of bank accountsManagement of bank accounts
Management of bank accountsŠkola Futura
 
Role of bank in today's world
Role of bank in today's worldRole of bank in today's world
Role of bank in today's worldŠkola Futura
 
Basics of stock exchange
Basics of stock exchangeBasics of stock exchange
Basics of stock exchangeŠkola Futura
 
Impact of marketing on children and youth
Impact of marketing on children and youthImpact of marketing on children and youth
Impact of marketing on children and youthŠkola Futura
 
Basket of goods in different countries
Basket of goods in different countriesBasket of goods in different countries
Basket of goods in different countriesŠkola Futura
 
Careers in financial system
Careers in financial systemCareers in financial system
Careers in financial systemŠkola Futura
 

More from Škola Futura (20)

Organizing information 2
Organizing information 2Organizing information 2
Organizing information 2
 
Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018
 
Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017
 
Behavioural approach to money
Behavioural approach to moneyBehavioural approach to money
Behavioural approach to money
 
Leadership
LeadershipLeadership
Leadership
 
Assertivness
AssertivnessAssertivness
Assertivness
 
Methods of payment
Methods of paymentMethods of payment
Methods of payment
 
Management of bank accounts
Management of bank accountsManagement of bank accounts
Management of bank accounts
 
Loans and mortgages
Loans and mortgagesLoans and mortgages
Loans and mortgages
 
Role of bank in today's world
Role of bank in today's worldRole of bank in today's world
Role of bank in today's world
 
Basics of stock exchange
Basics of stock exchangeBasics of stock exchange
Basics of stock exchange
 
Making a budget
Making a budgetMaking a budget
Making a budget
 
Investing
InvestingInvesting
Investing
 
Insurance
InsuranceInsurance
Insurance
 
Business plan
Business planBusiness plan
Business plan
 
Famous entrepeneurs
Famous entrepeneursFamous entrepeneurs
Famous entrepeneurs
 
Tax burden
Tax burdenTax burden
Tax burden
 
Impact of marketing on children and youth
Impact of marketing on children and youthImpact of marketing on children and youth
Impact of marketing on children and youth
 
Basket of goods in different countries
Basket of goods in different countriesBasket of goods in different countries
Basket of goods in different countries
 
Careers in financial system
Careers in financial systemCareers in financial system
Careers in financial system
 

Recently uploaded

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 

Recently uploaded (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 

Protecting information

  • 1. Protecting information „New Literacy Set” Project 2015-2017
  • 2. In UK in 2015. were: •2.46 million cyber incidents •2.11 million victims of cyber crime •UK businesses reported losses of £1,079,447,765 in the past year
  • 3. • In 2015, the maximum total annualized cost od cyber-crime committed against US companies amounted to 65.05 million U.S.dollars • 35% of the global cybercrime were U.S. fraud victims
  • 4. •Legislative inhomogeneity makes it virtually impossible for an unanimous judgement of the criminal events that is then treated differently depending on the country. •Criminal acts could be conducted in foreign countries.
  • 5.
  • 7. 1. Consider What Personal Information Is Important • Personal information includes personal data: • Identification data • Contact data • Physical characteristics data • Ideology data
  • 8. 2. Privacy By Design • Malware – malicious software
  • 9. • Where malware comes from? – Internet – e-mail – Hacked websites – Games demos – Music files – Toolbars – Software – Free subscriptions
  • 10. • How to recognize malware? – Slow computer – Pop-ups – Spam – Frequent crashes
  • 11. • How to remove malware? – Use a reliable malware removal tool!
  • 12. • How to prevent malware? – Use powerful antivirus and anti-malware software – Don’t open email attachments from unknown or unexpected sources
  • 13. 3. If In Doubt, Throw It Out
  • 14. Online shopping statistics • 40% of global internet users, or more than 1 billion people, have bought products or goods online • The U.S. e-commerce economy is worth $349 billion while China’s e-commerce economy is worth $562.66 billion • 8 out of 10 consumers will shop online if offered free shipping
  • 15. Online shopping statistics • Online retail sales in the U.K. reached an estimated £52.25 billion in 2015, with the average shopper spending £1,174 • 40% of shoppers consult 3 or more channels, often in the process of shopping, before making a purchase; it goes to show the increasing importance of having an online presence in as many places as possible
  • 16. Ecommerce customers in Spain • Credit cards amount for more than half of all online transactions, followed by cash (32%), electronic bank transfer (20%) and eWallet (14%). • The most important payment option in Spain seems to be 4B, which has 20 million cards circulating amongst the Spanish population. • The credit and debit cards of Euro6000 are also widely used.
  • 18. Ecommerce customers in Spain • Based on data from from Instituo Nacional de Estadictica, about 22% of the Spanish population bought something in the last three months • About 10.7 million Spanish people (31% of the population aged 16 to 74 years old) ordered something online in the last year.
  • 19. Top 10 Online Shopping Sites in the World
  • 21. Phishing • What does a phishing email message look like?
  • 22. 4. Stay Updated • Install anti-virus/malware software • Keep your antivirus software up to date • Run regularly scheduled scans with your anti- virus software • Keep your operating system current • Secure your network • Think before you click
  • 23. 4. Stay Updated • Keep your personal information safe • Don’t use open wi-fi • Back up your files • Use multiple string passwords
  • 24. 5. Assessing the risk • Metadata – „data about data”
  • 25. 6. Taking appropriate steps and putting strategies into place to protect personal information • Use a unique password for each of your important accounts • Use a mix of letters, numbers and symbols in your passwords • Don’t use personal information or common words as a password • Make sure your backup password options are up-to- date and secure in case you need to reset or forget your passord • Keep your passwords secure and don’t leave notes with your passwords to various sites on your computer or desk
  • 26. 7. Destroying personal information • Wipe the drive completely • Delete only your sensitive files • Destroy the hard drive