Eileen Presentation


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Eileen Presentation

  1. 1. Jackey Chin Eileen Perez
  2. 2. <ul><li>Businesses are a major part of our society. </li></ul><ul><li>We rely on businesses to provide us with jobs, services, and goods. </li></ul><ul><li>There are many types of organizations in the Business Industry, which include (not limited to): </li></ul><ul><ul><ul><li>Education </li></ul></ul></ul><ul><ul><ul><li>Financial/Banking </li></ul></ul></ul><ul><ul><ul><li>Government </li></ul></ul></ul><ul><ul><ul><li>Legal </li></ul></ul></ul><ul><ul><ul><li>Medical </li></ul></ul></ul><ul><ul><ul><li>Professional/Business Services </li></ul></ul></ul><ul><ul><ul><li>Retail </li></ul></ul></ul><ul><ul><ul><li>Logistics </li></ul></ul></ul><ul><ul><ul><li>And many others! </li></ul></ul></ul>
  3. 3. <ul><li>We hope to provide you with an overview of: </li></ul><ul><ul><li>The Security issues concerning the nature of Businesses. </li></ul></ul><ul><ul><li>Data from reputable sources. </li></ul></ul><ul><ul><li>The types of attacks that are targeted towards Businesses. </li></ul></ul><ul><ul><li>How organizations can prevent attacks. </li></ul></ul><ul><ul><li>How these attacks can be resolved . </li></ul></ul>
  4. 4. <ul><li>The most common type of security breach in Business is theft of data. This includes theft of: </li></ul><ul><ul><ul><li>Sensitive information </li></ul></ul></ul><ul><ul><ul><li>Proprietary information </li></ul></ul></ul><ul><ul><ul><li>And other intellectual property stored in Corporate computer systems </li></ul></ul></ul><ul><ul><li>7 out of 10 data breaches are committed by company employees </li></ul></ul><ul><ul><li>One out of 100 (1%) employees are thought to adhere consistently to corporate data and security policies </li></ul></ul><ul><ul><ul><li>( http://www.prweb.com/releases/2007 ) </li></ul></ul></ul>
  5. 5. <ul><li>Data breaches and computer theft are growing problems in the corporate world. </li></ul><ul><ul><ul><li>27% of companies reporting data breaches. </li></ul></ul></ul><ul><ul><ul><li>55% experiencing laptop thefts. </li></ul></ul></ul><ul><ul><ul><li>Worse yet: 33% of IT managers believe that data breaches and computer thefts have occurred and gone undetected within their organization. </li></ul></ul></ul><ul><ul><ul><li>1 in 5 data security breaches involves customer information </li></ul></ul></ul><ul><ul><ul><li>1 in 5 data security breaches involves employee information </li></ul></ul></ul><ul><ul><ul><li>1 in 5 data security breaches involve social security numbers and/or credit card numbers </li></ul></ul></ul><ul><ul><ul><li>The rest is involved in other information </li></ul></ul></ul><ul><ul><ul><li>( http://www.prweb.com/releases/2007 ) </li></ul></ul></ul>
  6. 6. <ul><li>Usually theft of corporate information is done by employees of the company. </li></ul><ul><ul><li>The thief may want to profit from stealing the information and potentially sell it to a rival business. </li></ul></ul><ul><ul><ul><li>For example: Pepsi alerted Coca-Cola to Stolen-Coke-Secrets offer. </li></ul></ul></ul><ul><ul><ul><li>( http://www.foxnews.com/story/0,2933,202439,00.html ) </li></ul></ul></ul><ul><ul><ul><li>( http://www.comicsonduty.com/images/Pepsi_Logo.jpg ) </li></ul></ul></ul><ul><ul><ul><li>( http://www.northfloridafair.com/images/upload/coca-cola-logo-w-ice.jpg ) </li></ul></ul></ul>
  7. 7. <ul><li>To protect customers, employees, and shareholders, data loss prevention needs to become a top priority at every level of the organization from the board room to the lunch room. </li></ul><ul><li>Just last week, the U.S. Department of Agriculture announced that it had exposed the personal identifying information on about 150,000 people over the last 26 years. </li></ul><ul><li>( http://www.informationweek.com ) </li></ul>
  8. 8. <ul><li>The vast majority of security threats imposed on organizations are possible because of the Internet. </li></ul><ul><li>This connection of millions of computers all over the world that allows for the exchange of information and data has brought with it many security issues which must continue to be addressed. </li></ul><ul><li>(Dixon, 2005: 9) </li></ul>
  9. 9. <ul><ul><li>A virus is designed to &quot;infect” a program file or boot sector of a computer. </li></ul></ul><ul><ul><li>A worm is designed to make copies of itself </li></ul></ul><ul><ul><li>A logic bomb is designed to execute (or “explode”) under certain conditions </li></ul></ul><ul><ul><li>A Trojan horse appears to be useful or benign but actually conceals a smaller program that is designed to be damaging, annoying, or “humorous” </li></ul></ul><ul><ul><li>A denial of service (DOS) attack is an explicit effort to prevent legitimate users from accessing computer systems </li></ul></ul><ul><ul><li>(NW3C, 2005: 2) </li></ul></ul>
  10. 10. <ul><li>According to the FBI and the Computer Security Institute annual survey of 520 companies and institutions, more than 60% reported unauthorized use of computer systems over the past 12 months and 57% of all break-ins involved the Internet. </li></ul><ul><li>(Sukhai, 2005: 131) </li></ul>
  11. 11. <ul><ul><li>It’s important for an organization to adopt a reactive approach to information security. </li></ul></ul><ul><ul><ul><li>The vulnerability of systems is usually evaluated after an attack takes place, resulting in money spent of fixing the security holes and recovering from the data and business loss. </li></ul></ul></ul><ul><ul><li>It is recommended that companies have awareness training </li></ul></ul><ul><ul><ul><li>Includes specific security policies for employees, incident respond plans and visual reminders such as posters. </li></ul></ul></ul><ul><ul><li>Housekeeping – backing up files, password routines and system logs. </li></ul></ul><ul><ul><ul><li>It is important to remove access from employees who leave. </li></ul></ul></ul><ul><ul><ul><li>( http://www.businesslink.gov.uk ) </li></ul></ul></ul>
  12. 12. <ul><ul><li>Enhance your system security to protect your business from potential virus attacks and hacking </li></ul></ul><ul><ul><ul><li>This should include anti-virus software, firewall, or software barrier) </li></ul></ul></ul><ul><ul><li>Keep this up to date and download relevant patches – updates to software that fix security threats. </li></ul></ul><ul><ul><ul><li>Viruses are frequently released </li></ul></ul></ul><ul><ul><li>If your staff needs to access the network while off-site, consider a virtual private network. </li></ul></ul><ul><ul><ul><li>This creates a secure link and protects information sent and received. </li></ul></ul></ul><ul><ul><li>( http://www.businesslink.gov.uk ) </li></ul></ul>
  13. 13. <ul><li>In Businesses, as many as 60% of attacks go undetected and only 15% of exposed attacks are reported to law enforcement agencies. </li></ul><ul><li>Why? </li></ul><ul><ul><li>Companies just don’t want the publicity. </li></ul></ul><ul><ul><li>A successful attack may challenge other hackers to repeat the crime. </li></ul></ul><ul><ul><li>Bad publicity can seriously undermine the image and reputation of the company, as well as public trust. </li></ul></ul><ul><li>There are a number of reasons why companies are hesitant to report cybercrime to FBI and Computer Security Institute, but they should so it will lead to less cyber crimes being committed. </li></ul><ul><ul><li>(Sukhai, 2005:131) </li></ul></ul>