SlideShare a Scribd company logo
Threat: Phishing - Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by
deception. Phishing messages usually take the form of fake notifications or emails from a site.
Damage caused: It includes theft of passwords, credit card numbers, bank account details and other
confidential information.
How they could effect business:
- Less money because of less trust from customers
- Change the image of the site with peoples opinions
- Less money
- Investing in higher security
How they could effect customers:
- Less trust for a site
- Less use? _ less money spent
- Information stolen, money lost and card or back account used.

How does NIKE protect themselves? How do they reduce targeting?
- Sender authentication
-   Only sending necessary emails in order for people not to think its spam or for recipients to
   question it
- Never asks for personal information over email
- http://www.csoonline.com/article/221737/phishing-the-basics
•  Threat: Spam - Spam is anonymous, bulk email. Spam is sent in enormous quantities. Spammers
   make money from the small percentage of recipients that actually respond, so for spam to be cost-
   effective, the initial mails have to be high-volume.
How they could effect business:
- Less money because of less trust from customers
- Change the image of the site with peoples opinions
- Less money
- Investing in higher security
- Less people may believe transferred information
How they could effect customers:
- Less trust for a site
- Some information might not be believed
- Information stolen, money lost and card or back account used through misleading information
How does NIKE protect themselves? How do they reduce targeting?
- Sender authentication
- Never asks for personal information over email
- Makes certain important emails are unique
- Notifies you on website user logon that an email has been sent and any changes to an account
•  Pharming - Phishing email messages are designed to steal your identity. They ask for personal data,
   or direct you to websites or phone numbers to call where they ask you to provide personal data.
How they could effect business:
- Less money because of less trust from customers
- Change the image of the site with peoples opinions
- Less money
- Investing in higher security
- Less people may believe transferred information
- Little or less responses to real emails
How they could effect customers:
- Less trust for a site
- Some information might not be believed
- Information stolen, money lost and card or back account used through misleading information
- Not as likely to reply to information sent over email
How does NIKE protect themselves? How do they reduce targeting?
- Sender authentication
- Never asks for personal information over email
-   Firewalls – Firewalls can prevent malware from downloading to a computer. A firewall works by
    monitoring connections made to and from a computer.
-   Secure socket layer (SSL) – an encryption of data which is transferred over the internet developed by
    Netscape. It allows documents to be sent over the internet safely.
-   Anti virus protection and software (up to date!) - Programs used to detect and remove computer
    viruses. Anti virus software’s are constantly active, attempting to detect viruses. It includes a regular
    update service allowing it to keep up to date with the latest viruses and software's that are realised.
-   Cookies – Small files of information that are stored on a users computer by web servers on the sites
    that the users visit. Cookies are used to identify specific information and looks at the users
    preferences.
-   Ad-ware – Programs that you usually install onto a computer which tracks online behaviour and
    preferences. Just like cookies, although you install the program or often do so without realising.
-   Spyware – spyware is similar to Ad-ware, although it is usually more devious within what it is doing.
    Spyware effectively ‘customises’ your browser for mostly the worse. Worst cases report if hidden
    programs that spy on a users interactions, key-strokes, passwords and general details of computer
    usage.
-   Privacy policy – A privacy policy is a statement or a declaration of all of the ways in which consumer
    data and information will be used.
-   Pop up blocker – Software which can infiltrate pop ups before they have a chance to infect. Its an
    extension which works with a browser to stop a computer being affected.

More Related Content

Viewers also liked

Viewers also liked (20)

The pr master class presentation
The pr master class presentationThe pr master class presentation
The pr master class presentation
 
Content Marketing Ideas for SMEs
Content Marketing Ideas for SMEsContent Marketing Ideas for SMEs
Content Marketing Ideas for SMEs
 
Technologies work
Technologies workTechnologies work
Technologies work
 
Fin.354 lecture notes
Fin.354 lecture notesFin.354 lecture notes
Fin.354 lecture notes
 
Power point
Power pointPower point
Power point
 
Labelled Screen Shots
Labelled Screen ShotsLabelled Screen Shots
Labelled Screen Shots
 
Isolation Feedback
Isolation FeedbackIsolation Feedback
Isolation Feedback
 
Los planetas del sistema solar
Los planetas del sistema solarLos planetas del sistema solar
Los planetas del sistema solar
 
Actividad i x trabajo en equipo ii
Actividad i x trabajo en equipo iiActividad i x trabajo en equipo ii
Actividad i x trabajo en equipo ii
 
Conheço Um Coração
Conheço Um CoraçãoConheço Um Coração
Conheço Um Coração
 
Desafio 24h Curitiba
Desafio 24h   CuritibaDesafio 24h   Curitiba
Desafio 24h Curitiba
 
7 85 Mat05
7 85 Mat057 85 Mat05
7 85 Mat05
 
Paysms
PaysmsPaysms
Paysms
 
Las colecciones Otto Dix parte 2
Las colecciones Otto Dix parte 2Las colecciones Otto Dix parte 2
Las colecciones Otto Dix parte 2
 
Financial accounting
Financial accountingFinancial accounting
Financial accounting
 
C:\fakepath\política nacional de sangre
C:\fakepath\política nacional de sangreC:\fakepath\política nacional de sangre
C:\fakepath\política nacional de sangre
 
Girona, temps de flors 2013
Girona, temps de flors 2013Girona, temps de flors 2013
Girona, temps de flors 2013
 
Estrategia para la negociación de los precios 1
Estrategia para la negociación de los precios 1Estrategia para la negociación de los precios 1
Estrategia para la negociación de los precios 1
 
Santo rosário tradicional
Santo rosário tradicionalSanto rosário tradicional
Santo rosário tradicional
 
Talleres semana santa
Talleres semana santaTalleres semana santa
Talleres semana santa
 

Similar to Data protection

Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporationsharmaakash1881
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop ThemAnvesh Vision Private Limited
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks pptAryan Ragu
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1NetWatcher
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication? Sinch
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web SiteDonny Shimamoto
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfanjandavid
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudNuData Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybodyavahe
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in EcommerceMartyn Sukys
 

Similar to Data protection (20)

Internet Phishing
Internet PhishingInternet Phishing
Internet Phishing
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Pad 750 podcast
Pad 750 podcastPad 750 podcast
Pad 750 podcast
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them5 Cyber Security Threats That Small Businesses Face And How To Stop Them
5 Cyber Security Threats That Small Businesses Face And How To Stop Them
 
Why Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small BusinessesWhy Cybercriminals are targeting Small Businesses
Why Cybercriminals are targeting Small Businesses
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web Site
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web Fraud
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Cyber Security for Everybody
Cyber Security for EverybodyCyber Security for Everybody
Cyber Security for Everybody
 
Phishing
PhishingPhishing
Phishing
 
Fraud in Ecommerce
Fraud in EcommerceFraud in Ecommerce
Fraud in Ecommerce
 

More from burto111

Casting Contacts
Casting ContactsCasting Contacts
Casting Contactsburto111
 
Institutions Research
Institutions ResearchInstitutions Research
Institutions Researchburto111
 
Storyboard
StoryboardStoryboard
Storyboardburto111
 
StopGoSixty Copyright
StopGoSixty CopyrightStopGoSixty Copyright
StopGoSixty Copyrightburto111
 
Initial Ideas
Initial IdeasInitial Ideas
Initial Ideasburto111
 
Storyboard
StoryboardStoryboard
Storyboardburto111
 
3 Point Lighting
3 Point Lighting3 Point Lighting
3 Point Lightingburto111
 
Credit Timeline of Forest Gump
Credit Timeline of Forest GumpCredit Timeline of Forest Gump
Credit Timeline of Forest Gumpburto111
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentburto111
 
Step up Opening Sequence Analysis
Step up Opening Sequence AnalysisStep up Opening Sequence Analysis
Step up Opening Sequence Analysisburto111
 
Shot Types
Shot TypesShot Types
Shot Typesburto111
 
Props List
Props ListProps List
Props Listburto111
 
Crew Roles
Crew RolesCrew Roles
Crew Rolesburto111
 
Crew Names
Crew NamesCrew Names
Crew Namesburto111
 
Location shots
Location shotsLocation shots
Location shotsburto111
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Radio advert evaluation
Radio advert evaluationRadio advert evaluation
Radio advert evaluationburto111
 

More from burto111 (20)

Casting Contacts
Casting ContactsCasting Contacts
Casting Contacts
 
Institutions Research
Institutions ResearchInstitutions Research
Institutions Research
 
Storyboard
StoryboardStoryboard
Storyboard
 
StopGoSixty Copyright
StopGoSixty CopyrightStopGoSixty Copyright
StopGoSixty Copyright
 
Initial Ideas
Initial IdeasInitial Ideas
Initial Ideas
 
Storyboard
StoryboardStoryboard
Storyboard
 
Shot List
Shot ListShot List
Shot List
 
3 Point Lighting
3 Point Lighting3 Point Lighting
3 Point Lighting
 
Credit Timeline of Forest Gump
Credit Timeline of Forest GumpCredit Timeline of Forest Gump
Credit Timeline of Forest Gump
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Step up Opening Sequence Analysis
Step up Opening Sequence AnalysisStep up Opening Sequence Analysis
Step up Opening Sequence Analysis
 
Shot Types
Shot TypesShot Types
Shot Types
 
Schedule
ScheduleSchedule
Schedule
 
Costume
CostumeCostume
Costume
 
Props List
Props ListProps List
Props List
 
Crew Roles
Crew RolesCrew Roles
Crew Roles
 
Crew Names
Crew NamesCrew Names
Crew Names
 
Location shots
Location shotsLocation shots
Location shots
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Radio advert evaluation
Radio advert evaluationRadio advert evaluation
Radio advert evaluation
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationZilliz
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 

Data protection

  • 1.
  • 2. Threat: Phishing - Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception. Phishing messages usually take the form of fake notifications or emails from a site. Damage caused: It includes theft of passwords, credit card numbers, bank account details and other confidential information. How they could effect business: - Less money because of less trust from customers - Change the image of the site with peoples opinions - Less money - Investing in higher security How they could effect customers: - Less trust for a site - Less use? _ less money spent - Information stolen, money lost and card or back account used. How does NIKE protect themselves? How do they reduce targeting? - Sender authentication - Only sending necessary emails in order for people not to think its spam or for recipients to question it - Never asks for personal information over email - http://www.csoonline.com/article/221737/phishing-the-basics
  • 3. • Threat: Spam - Spam is anonymous, bulk email. Spam is sent in enormous quantities. Spammers make money from the small percentage of recipients that actually respond, so for spam to be cost- effective, the initial mails have to be high-volume. How they could effect business: - Less money because of less trust from customers - Change the image of the site with peoples opinions - Less money - Investing in higher security - Less people may believe transferred information How they could effect customers: - Less trust for a site - Some information might not be believed - Information stolen, money lost and card or back account used through misleading information How does NIKE protect themselves? How do they reduce targeting? - Sender authentication - Never asks for personal information over email - Makes certain important emails are unique - Notifies you on website user logon that an email has been sent and any changes to an account
  • 4. • Pharming - Phishing email messages are designed to steal your identity. They ask for personal data, or direct you to websites or phone numbers to call where they ask you to provide personal data. How they could effect business: - Less money because of less trust from customers - Change the image of the site with peoples opinions - Less money - Investing in higher security - Less people may believe transferred information - Little or less responses to real emails How they could effect customers: - Less trust for a site - Some information might not be believed - Information stolen, money lost and card or back account used through misleading information - Not as likely to reply to information sent over email How does NIKE protect themselves? How do they reduce targeting? - Sender authentication - Never asks for personal information over email
  • 5. - Firewalls – Firewalls can prevent malware from downloading to a computer. A firewall works by monitoring connections made to and from a computer. - Secure socket layer (SSL) – an encryption of data which is transferred over the internet developed by Netscape. It allows documents to be sent over the internet safely. - Anti virus protection and software (up to date!) - Programs used to detect and remove computer viruses. Anti virus software’s are constantly active, attempting to detect viruses. It includes a regular update service allowing it to keep up to date with the latest viruses and software's that are realised. - Cookies – Small files of information that are stored on a users computer by web servers on the sites that the users visit. Cookies are used to identify specific information and looks at the users preferences. - Ad-ware – Programs that you usually install onto a computer which tracks online behaviour and preferences. Just like cookies, although you install the program or often do so without realising. - Spyware – spyware is similar to Ad-ware, although it is usually more devious within what it is doing. Spyware effectively ‘customises’ your browser for mostly the worse. Worst cases report if hidden programs that spy on a users interactions, key-strokes, passwords and general details of computer usage. - Privacy policy – A privacy policy is a statement or a declaration of all of the ways in which consumer data and information will be used. - Pop up blocker – Software which can infiltrate pop ups before they have a chance to infect. Its an extension which works with a browser to stop a computer being affected.