SlideShare a Scribd company logo
1 of 5
Data security  By chantelle
Recent examples 1-http://www.naturalnews.com/024153_heart_monitors_hackers_risk.html 2-http://www.gadgetell.com/tech/comment/shields-up-man-uses-neighbors-wifi-to-threaten-vp/ 3-http://www.gadgetell.com/tech/comment/security-flaw-lets-hackers-delete-facebook-friends/
Summaries 1-this article was explaining how a university was experimenting in ways of hacking different systems in different ways. They actually found a way of being able to hack into a implantable cardioverter defibrillator which detects the rhythm of the heart and when the rhythm is out it shocks the heart back into rhythm, they were able to control this and shock the heart at a powerful level. 2-this is about how a person was able to hack into his neighbours computer set up email accounts in the neighbours name them send threats to Vice President Joe Biden and Minnesota governor Tim Pawlenty. Also he sent child pornography to his neighbours co workers.   3-a flaw in face book has people being able to hack into your account and like pages and delete their friends.
Causes and effects  If people are able to hack into these personal thing it can effect the individual negatively in an emotional way. If able to hack into the implantable cardioverter defibrillator they could possibly really hurt a person or even kill them. Being able to hack into someone's computer and setting up accounts in there name and using them to send around inappropriate images or threats to people can lead to the person who got hacked getting into serious trouble such as jail. Hacking into someone’s face book account can lead to personal information being stolen and used against people. People caught hacking into things can be jailed depending on the severity.
Why personal information needs to be protected Personal information needs to be protected because if someone is to obtain this information they would be able to use this against you, take money out of your account, send emails from under your name, find out your location , rob your house the list is endless. If not protected not only your information is at risk they could find links to your family or friends information and hack there computers  to.

More Related Content

What's hot (19)

Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Online Security and Safety
Online Security and SafetyOnline Security and Safety
Online Security and Safety
 
Ap fake tweet
Ap fake tweetAp fake tweet
Ap fake tweet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Twitter Presentation
Twitter PresentationTwitter Presentation
Twitter Presentation
 
Internet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid itInternet Crimes : Why it is scary & How to avoid it
Internet Crimes : Why it is scary & How to avoid it
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber Safety
Cyber SafetyCyber Safety
Cyber Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Phishing
PhishingPhishing
Phishing
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Phishing
PhishingPhishing
Phishing
 
Idenity Theft
Idenity TheftIdenity Theft
Idenity Theft
 

Viewers also liked

Techniques To Spark Great Ideas.Dec.10
Techniques To Spark Great Ideas.Dec.10Techniques To Spark Great Ideas.Dec.10
Techniques To Spark Great Ideas.Dec.10Lucidity
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesPriyanka Aash
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 

Viewers also liked (8)

Techniques To Spark Great Ideas.Dec.10
Techniques To Spark Great Ideas.Dec.10Techniques To Spark Great Ideas.Dec.10
Techniques To Spark Great Ideas.Dec.10
 
The State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ WebsitesThe State of End-User Security—Global Data from 30,000+ Websites
The State of End-User Security—Global Data from 30,000+ Websites
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 

Similar to Data security powerpoint

Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Securityczarviscayno
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02ITNet
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08Vic Hemard
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08Vic Hemard
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 

Similar to Data security powerpoint (20)

Cyber crime ethics and un ethics
Cyber crime ethics and un ethicsCyber crime ethics and un ethics
Cyber crime ethics and un ethics
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Users guide
Users guideUsers guide
Users guide
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
E-Tech_Lesson2.pptx
E-Tech_Lesson2.pptxE-Tech_Lesson2.pptx
E-Tech_Lesson2.pptx
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 

Data security powerpoint

  • 1. Data security By chantelle
  • 2. Recent examples 1-http://www.naturalnews.com/024153_heart_monitors_hackers_risk.html 2-http://www.gadgetell.com/tech/comment/shields-up-man-uses-neighbors-wifi-to-threaten-vp/ 3-http://www.gadgetell.com/tech/comment/security-flaw-lets-hackers-delete-facebook-friends/
  • 3. Summaries 1-this article was explaining how a university was experimenting in ways of hacking different systems in different ways. They actually found a way of being able to hack into a implantable cardioverter defibrillator which detects the rhythm of the heart and when the rhythm is out it shocks the heart back into rhythm, they were able to control this and shock the heart at a powerful level. 2-this is about how a person was able to hack into his neighbours computer set up email accounts in the neighbours name them send threats to Vice President Joe Biden and Minnesota governor Tim Pawlenty. Also he sent child pornography to his neighbours co workers. 3-a flaw in face book has people being able to hack into your account and like pages and delete their friends.
  • 4. Causes and effects If people are able to hack into these personal thing it can effect the individual negatively in an emotional way. If able to hack into the implantable cardioverter defibrillator they could possibly really hurt a person or even kill them. Being able to hack into someone's computer and setting up accounts in there name and using them to send around inappropriate images or threats to people can lead to the person who got hacked getting into serious trouble such as jail. Hacking into someone’s face book account can lead to personal information being stolen and used against people. People caught hacking into things can be jailed depending on the severity.
  • 5. Why personal information needs to be protected Personal information needs to be protected because if someone is to obtain this information they would be able to use this against you, take money out of your account, send emails from under your name, find out your location , rob your house the list is endless. If not protected not only your information is at risk they could find links to your family or friends information and hack there computers to.