SlideShare a Scribd company logo
1 of 29
Security and ethics
Thomas O’Grady 07398051
Brian Stewart    08883696
Last Year...............
 Sony's PS3 network was hacked leading to one of
  the greatest leaks in history.......

 Over 77 million customers
  account details where hacked.

 US government also claimed
involvement in a massive breach
in 2011 involving Social Security
nos.
Will Anonymous be one of the many hackers that take control?
Their rise to fame could indicate so!




     Could Facebook be their next target?
Malware
 Is becoming a major problem..
within the hospitality and financial services sector

 In 2010 SQL coding accounted for 80% of breaches


 It can come in many forms....
Types include
 Adware


 Spyware


 Hijackers


 Toolbars


 Dialers
In a 2010 report
 Over 71 % of Hacking attacks where carried out on
 remote access and desktop services.

 This motive was carried out via the vendors
 authentication

 Other attacks include Social, Misuse and Physical
In a 2010 US Data Breach Study
 43% of companies told victims of breach within one
  month of happenings

 For the first time on record, malicious attacks are their
  highest cause financially

 Awareness programs are the best solutions, yet
  encryption is gaining ground.
In 2010 Breaches Increased by 7%
 Data breaches cost in the region of $214 for each
  record.

 With the most costly one being in the region of $35.3
  million to resolve

 That’s a lot of money, especially
  for smaller firms
 Organisations have begun to be more proactive in
 minding themselves from breach attacks.

 In 2010 we seen an increase in the US in organisations
 reacting more sufficiently under a month period
 together with companies investing in better IT security
 structure
Companies have invested heavily in fixing data breaches
imposed which is appearing to pay off sufficiently.
Do we know the people who have access to our details?
Cover ups by business’s and disclosure of personal
details have in industries in the US such as
Technology and Education.
?
Should the FBI or have they clamped down
significantly implement massive fines for breach?
Sen Leahy thinks so.....




With companies facing up to 5 years Imprisonment
What about Laws in Ireland?
Data Commissioner feels resources just aren't there!
The Current Economic climate in Ireland doesn't make
things any better!

Social networking has become an area of concern for the
Data Commissioner to control
Should we worry?
 With a rise in breaches in the Republic by 350% in
 2010 data commissioner feels it has become a problem
 Croke park was also at the centre of controversary with
 a massive breach of its database of up to 500,000
 members
Going Forward how can it be prevented?
 Secure all data in the intranet especially with
    administrator.
   Inhibit copying of Resources eg. USB, CD Burning.
   Have Knowledge of your Intruder or potential ones.
   Use a Proxy server for both internal and external with a
    Linux server connecting them
   Ensure the server is constantly kept up to date and
    maintained
   Throw caution with SQL servers with excellent
    passwords and encryption installed
But the question Remains?
The elephant in the room is whether breaches are
going to get bigger and redevelop over time
Data data every where!! Thomas O'Grady

More Related Content

What's hot

Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
aliuet
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
Yash
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
Fahad Abbasi
 

What's hot (20)

Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
Facebook
FacebookFacebook
Facebook
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Cyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButTCyber crime presentation by HuNnY ButT
Cyber crime presentation by HuNnY ButT
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Cyber Crime & Law
Cyber Crime & LawCyber Crime & Law
Cyber Crime & Law
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 

Viewers also liked

Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
moppettharry
 
Social game의 가까운 미래
Social game의 가까운 미래Social game의 가까운 미래
Social game의 가까운 미래
gndolf
 
班级新变化
班级新变化班级新变化
班级新变化
jody531
 
Perniagaan Borong
Perniagaan BorongPerniagaan Borong
Perniagaan Borong
Sharina Nor
 
Call center guide printable landscape
Call center guide   printable landscapeCall center guide   printable landscape
Call center guide printable landscape
Fitira
 
презентация1
презентация1презентация1
презентация1
Danil Kozlov
 
Facebook-Zynga
Facebook-ZyngaFacebook-Zynga
Facebook-Zynga
gndolf
 
Maritime New Haven - Sound School
Maritime New Haven - Sound SchoolMaritime New Haven - Sound School
Maritime New Haven - Sound School
Amy Durbin
 
Evaluation for the music magazine
Evaluation for the music magazineEvaluation for the music magazine
Evaluation for the music magazine
Liam Wylie
 

Viewers also liked (20)

R00 manual guía call center
R00 manual guía call centerR00 manual guía call center
R00 manual guía call center
 
Klein, aber oho - Continuous Delivery von Micro Applications mit Jenkins, Doc...
Klein, aber oho - Continuous Delivery von Micro Applications mit Jenkins, Doc...Klein, aber oho - Continuous Delivery von Micro Applications mit Jenkins, Doc...
Klein, aber oho - Continuous Delivery von Micro Applications mit Jenkins, Doc...
 
Simplify and run your development environments with Vagrant on OpenStack
Simplify and run your development environments with Vagrant on OpenStackSimplify and run your development environments with Vagrant on OpenStack
Simplify and run your development environments with Vagrant on OpenStack
 
M01 inside selling.
M01 inside selling.M01 inside selling.
M01 inside selling.
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
P m01 inside_selling
P m01 inside_sellingP m01 inside_selling
P m01 inside_selling
 
Actualiteiten IPR: Nieuw Boek 10 BW; What's new in het ipr?
Actualiteiten IPR: Nieuw Boek 10 BW; What's new in het ipr?Actualiteiten IPR: Nieuw Boek 10 BW; What's new in het ipr?
Actualiteiten IPR: Nieuw Boek 10 BW; What's new in het ipr?
 
Social game의 가까운 미래
Social game의 가까운 미래Social game의 가까운 미래
Social game의 가까운 미래
 
班级新变化
班级新变化班级新变化
班级新变化
 
Cloud Computing mit OpenStack
Cloud Computing mit OpenStackCloud Computing mit OpenStack
Cloud Computing mit OpenStack
 
Leon fagan
Leon faganLeon fagan
Leon fagan
 
Perniagaan Borong
Perniagaan BorongPerniagaan Borong
Perniagaan Borong
 
Call center guide printable landscape
Call center guide   printable landscapeCall center guide   printable landscape
Call center guide printable landscape
 
презентация1
презентация1презентация1
презентация1
 
Facebook-Zynga
Facebook-ZyngaFacebook-Zynga
Facebook-Zynga
 
Gulteal region
Gulteal regionGulteal region
Gulteal region
 
Maritime New Haven - Sound School
Maritime New Haven - Sound SchoolMaritime New Haven - Sound School
Maritime New Haven - Sound School
 
Evaluation for the music magazine
Evaluation for the music magazineEvaluation for the music magazine
Evaluation for the music magazine
 
Internationaal privaatrecht en fundamentele rechten. Ipr als instrument ter b...
Internationaal privaatrecht en fundamentele rechten. Ipr als instrument ter b...Internationaal privaatrecht en fundamentele rechten. Ipr als instrument ter b...
Internationaal privaatrecht en fundamentele rechten. Ipr als instrument ter b...
 
Marketing Management
Marketing ManagementMarketing Management
Marketing Management
 

Similar to Data data every where!! Thomas O'Grady

2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
Larry Taylor Ph.D.
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
mharbpavia
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
newbie2019
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
Dr Laurent Guiraud
 
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docxRunning Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
todd271
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
IJERD Editor
 

Similar to Data data every where!! Thomas O'Grady (20)

2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
Protecting Organizations from Phishing Scams, RSA Webinar on Sep 2010
 
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
Protecting Organizations from Phishing Scams, for RSA Webinar in Sep2010
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docxRunning Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
Running Head DATA BREACH 1DATA BREACH 3Data Breach Whit.docx
 
Data Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network AnalysisData Leak Protection Using Text Mining and Social Network Analysis
Data Leak Protection Using Text Mining and Social Network Analysis
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Data data every where!! Thomas O'Grady

  • 1. Security and ethics Thomas O’Grady 07398051 Brian Stewart 08883696
  • 3.  Sony's PS3 network was hacked leading to one of the greatest leaks in history.......  Over 77 million customers account details where hacked.  US government also claimed involvement in a massive breach in 2011 involving Social Security nos.
  • 4. Will Anonymous be one of the many hackers that take control?
  • 5. Their rise to fame could indicate so! Could Facebook be their next target?
  • 6. Malware  Is becoming a major problem.. within the hospitality and financial services sector  In 2010 SQL coding accounted for 80% of breaches  It can come in many forms....
  • 7. Types include  Adware  Spyware  Hijackers  Toolbars  Dialers
  • 8. In a 2010 report  Over 71 % of Hacking attacks where carried out on remote access and desktop services.  This motive was carried out via the vendors authentication  Other attacks include Social, Misuse and Physical
  • 9. In a 2010 US Data Breach Study  43% of companies told victims of breach within one month of happenings  For the first time on record, malicious attacks are their highest cause financially  Awareness programs are the best solutions, yet encryption is gaining ground.
  • 10. In 2010 Breaches Increased by 7%
  • 11.  Data breaches cost in the region of $214 for each record.  With the most costly one being in the region of $35.3 million to resolve  That’s a lot of money, especially for smaller firms
  • 12.  Organisations have begun to be more proactive in minding themselves from breach attacks.  In 2010 we seen an increase in the US in organisations reacting more sufficiently under a month period together with companies investing in better IT security structure
  • 13. Companies have invested heavily in fixing data breaches imposed which is appearing to pay off sufficiently.
  • 14. Do we know the people who have access to our details?
  • 15. Cover ups by business’s and disclosure of personal details have in industries in the US such as Technology and Education.
  • 16. ?
  • 17. Should the FBI or have they clamped down significantly implement massive fines for breach?
  • 18. Sen Leahy thinks so..... With companies facing up to 5 years Imprisonment
  • 19. What about Laws in Ireland?
  • 20. Data Commissioner feels resources just aren't there!
  • 21. The Current Economic climate in Ireland doesn't make things any better! Social networking has become an area of concern for the Data Commissioner to control
  • 23.  With a rise in breaches in the Republic by 350% in 2010 data commissioner feels it has become a problem
  • 24.  Croke park was also at the centre of controversary with a massive breach of its database of up to 500,000 members
  • 25. Going Forward how can it be prevented?
  • 26.  Secure all data in the intranet especially with administrator.  Inhibit copying of Resources eg. USB, CD Burning.  Have Knowledge of your Intruder or potential ones.  Use a Proxy server for both internal and external with a Linux server connecting them  Ensure the server is constantly kept up to date and maintained  Throw caution with SQL servers with excellent passwords and encryption installed
  • 27. But the question Remains?
  • 28. The elephant in the room is whether breaches are going to get bigger and redevelop over time