ICM - Social Media & Security Review

323 views

Published on

Slides from Gavin Whittaker\'s presentation to the Sheffield branch of the Institute of Credit Management regards the security risks associated to social media.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
323
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • The UK Government recognise the serious risk of sabotage to your business and our vital computer networks, so much so Cyber Warfare is now a top priority in its new national security strategy, so much so it has boosted the UK’s Intelligence Services budget by £500 million to tackle cyber terrorism
  • ICM - Social Media & Security Review

    1. 1. Fraud on the Web Gavin Whittaker IT Security Specialist A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    2. 2. Spanair Flight 5022 Killed 154 Only 18 survivors A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    3. 3. “ Britain must defend itself against cyber warfare before planes start falling out of the sky” William Hague, Foreign Secretary A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    4. 4. <ul><li>Mexican Gulf </li></ul><ul><li>BP Deep Water Horizon </li></ul><ul><li>Killed 11 people </li></ul><ul><li>Injured many more </li></ul>A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    5. 5. A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    6. 6. <ul><li>Employees are a major risk </li></ul><ul><li>Business, personal information & money </li></ul><ul><li>Malicious attacks and code has now evolved </li></ul><ul><li>Data backups are not a solution </li></ul><ul><li>Awareness of the common scams is essential </li></ul>A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    7. 7. <ul><li>Threats can be classified by their target </li></ul><ul><li>Spam and phishing target users </li></ul><ul><li>Malware targets computer systems and software </li></ul>Types of Threats A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    8. 8. User Threats A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals
    9. 9. Systems Threats A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals A summary of this goal will be stated here that is clarifying and inspiring 2009 Goals

    ×