SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Data security problems Mathew Wembridge
Questions What are the main issues or problems highlighted in the articles above. Customers’ bank details sold on eBay- A data processing firm sold a computer through a third party that contained million of bank costumer details. ‘Greatest cyber-heist in world history’- A hacker has used a Trojan horse program at a Best Western hotel to steal records that have been alleged to more then 8 million customers. Memory stick with 84,000 prisoner records lost in U.K- A contractor of PA consulting has lost a memory stick with over 84,000 prisoner records.
Questions What are the possible consequences for each organisation? Customers’ bank details sold on eBay- There is nothing really the organisation can do because the computer has been sold. But it may lose credibility for the companies security measures. ‘Greatest cyber-heist in world history’- The Best Western Hotel chain could lose customers and credibility for their security measures. Memory stick with 84,000 prisoner records lost in U.K- The PA consulting company would probably never get a job with the government again after failing to follow protocol.
Questions 3. What are the consequences for the individuals/consumers affected by the breaches? All individuals/consumers now have to deal with their personal details being accessed by individuals they have not given consent to viewing their details. For the individuals who have their bank details stolen they now have to change all their bank details so their money isn't stolen.
Questions 4. If these events occurred in Australia, would their be any possible legal implications? I don’t think if these events happened in Australia that there would be any real difference we have the same sort of privacy laws as countries such as America and Britain. 5. Use the internet to find a recent example where personal information has been found leaked or misused in similar ways to those described in these articles.
Example Turkish Hackers Steal Thousands of Email, PayPal, Bank Acct IDsby Hana Levi Julian Follow Israel news on and . Turkish hackers have stolen the details of thousands of Israeli bank, credit card and Pay Pal accounts, and posted the information online. According to the Israeli We-CMS blog, the information was posted on to the message board of a Turkish Internet forum. By Sunday morning, the We-CMS blog itself was found “suspended” when Israel National News attempted to access the site. In addition to the details of at least 32,561 Israelis, more than 140 passwords to Israeli government web sites and more than 300 passwords to Israeli academic web pages were swiped as well. Globes business news service reports that many of the email addresses and passwords obtained by the Internet terrorists included accounts on Face book, Gmail and Microsoft Live Messenger. Most of those had been hacked since the flotilla clash between IHH terror activists and Israeli Navy commandos aboard the Turkish Mavi Marmara ship in May. Erez Wolf, owner of the We-CMS, warned reporters, “The hackers used the information in their possession to enter accounts on other web sites. Assuming that many surfers use the same email, same password and same user name to register on all the sites that require registration – because it's easier to remember – the email and password from the hacked site will be the same one that gets them into others... like Pay Pal. From what I've been able to learn on the forum, the hackers penetrated the Pay Pal accounts of Israelis, and their bank accounts, and also were able to obtain credit card details as well.” Wolf added that surfers have been debating the use of the information on the Turkish message board where the passwords and user names were posted in an Excel document. The discussion, said Wolf, is focused on whether or not it is permitted under Islamic law to use the stolen data. Some of the writers have contended that as enemies of Islam, it is permitted to wreak whatever havoc is possible to Israeli users, citing social, criminal and religious arguments. Several quoted passages from the Koran that referred to the disposition of assets belonging to infidels (heretics). The Excel file was downloaded from the Turkish web site and handed over to the Israel Police, who were unavailable for comment Sunday morning.
Questions 6. Summarise what you find. Turkish hackers have stolen the of thousands of Israeli bank, credit card and Pay Pal accounts, and posted the information online. Some groups have stated that as enemies of Islam, it is permitted to wreak whatever havoc is possible to Israeli users, citing social, criminal and religious arguments.
Questions  7. Comment on possible causes and effects what you found on those involved. Some possible causes and effects would be loss of personal information and private details from the victims. The perpetrators may be likely to get away with the crime as it is being claimed as an act of war. 8. Explain why personal details need to be protected, including potential consequences of personal information being misused. Personal information need to be protected so consumers or individuals do not have to deal with there private information being sold or used against them to cause personal harm to there social and emotional status.

Weitere ähnliche Inhalte

Was ist angesagt?

2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and securityGolden Locksmith
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORTvineetkathan
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacksSreejith.D. Menon
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingWilliam hendric
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Er. Rahul Jain
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 

Was ist angesagt? (20)

2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
From Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack EverythingFrom Credit Cards to Power Plants to Puppies - We Hack Everything
From Credit Cards to Power Plants to Puppies - We Hack Everything
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
June NOW 2014
June NOW 2014June NOW 2014
June NOW 2014
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 

Andere mochten auch (17)

Nombor bulat
Nombor bulatNombor bulat
Nombor bulat
 
HFX Bike Trailer Share Designs
HFX Bike Trailer Share DesignsHFX Bike Trailer Share Designs
HFX Bike Trailer Share Designs
 
Biot Book
Biot BookBiot Book
Biot Book
 
Seminar 3 Feb
Seminar 3 FebSeminar 3 Feb
Seminar 3 Feb
 
Un mundo sin granjas
Un mundo sin granjasUn mundo sin granjas
Un mundo sin granjas
 
Seminar 3 Feb Oblivion
Seminar 3 Feb OblivionSeminar 3 Feb Oblivion
Seminar 3 Feb Oblivion
 
Marketing
MarketingMarketing
Marketing
 
Capitulo v y vi
Capitulo v y viCapitulo v y vi
Capitulo v y vi
 
Cancer awareness by Mary Joyce S. Teoxon; M.D
Cancer awareness by Mary Joyce S. Teoxon; M.DCancer awareness by Mary Joyce S. Teoxon; M.D
Cancer awareness by Mary Joyce S. Teoxon; M.D
 
Austin community final Lauren
Austin community final LaurenAustin community final Lauren
Austin community final Lauren
 
Portfolio
PortfolioPortfolio
Portfolio
 
Balik Kulturu
Balik KulturuBalik Kulturu
Balik Kulturu
 
123976391 peka
123976391 peka123976391 peka
123976391 peka
 
Presentatie Ouder Oudercontacten Def
Presentatie Ouder Oudercontacten DefPresentatie Ouder Oudercontacten Def
Presentatie Ouder Oudercontacten Def
 
How to-design-our-world
How to-design-our-worldHow to-design-our-world
How to-design-our-world
 
Orient west
Orient westOrient west
Orient west
 
Computer Keyboards
Computer KeyboardsComputer Keyboards
Computer Keyboards
 

Ähnlich wie Data security problems

Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Securityczarviscayno
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Assignment 1 Requirements For your first assignment you a.docx
Assignment 1 Requirements  For your first assignment you a.docxAssignment 1 Requirements  For your first assignment you a.docx
Assignment 1 Requirements For your first assignment you a.docxfelicitytaft14745
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity TheftDanielle Jobe
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxacarolyn
 
IT security - a never ending saga - M Falcinelli
IT security - a never ending saga - M FalcinelliIT security - a never ending saga - M Falcinelli
IT security - a never ending saga - M FalcinelliMassimiliano Falcinelli
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfinfo48697
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudInternet Law Center
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 

Ähnlich wie Data security problems (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
IDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By WrfIDT Red Flags White Paper By Wrf
IDT Red Flags White Paper By Wrf
 
Internet Safety/Security
Internet Safety/SecurityInternet Safety/Security
Internet Safety/Security
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Assignment 1 Requirements For your first assignment you a.docx
Assignment 1 Requirements  For your first assignment you a.docxAssignment 1 Requirements  For your first assignment you a.docx
Assignment 1 Requirements For your first assignment you a.docx
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Online Identity Theft
Online Identity TheftOnline Identity Theft
Online Identity Theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docxSecurity Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
Security Breaches and the Six Dumb Ideas Consider a recent (2014- 2015.docx
 
IT security - a never ending saga - M Falcinelli
IT security - a never ending saga - M FalcinelliIT security - a never ending saga - M Falcinelli
IT security - a never ending saga - M Falcinelli
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Data Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdfData Security Read the article below and answer the following questi.pdf
Data Security Read the article below and answer the following questi.pdf
 
Unearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet FraudUnearthing and Dissecting Internet Fraud
Unearthing and Dissecting Internet Fraud
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 

Data security problems

  • 1. Data security problems Mathew Wembridge
  • 2. Questions What are the main issues or problems highlighted in the articles above. Customers’ bank details sold on eBay- A data processing firm sold a computer through a third party that contained million of bank costumer details. ‘Greatest cyber-heist in world history’- A hacker has used a Trojan horse program at a Best Western hotel to steal records that have been alleged to more then 8 million customers. Memory stick with 84,000 prisoner records lost in U.K- A contractor of PA consulting has lost a memory stick with over 84,000 prisoner records.
  • 3. Questions What are the possible consequences for each organisation? Customers’ bank details sold on eBay- There is nothing really the organisation can do because the computer has been sold. But it may lose credibility for the companies security measures. ‘Greatest cyber-heist in world history’- The Best Western Hotel chain could lose customers and credibility for their security measures. Memory stick with 84,000 prisoner records lost in U.K- The PA consulting company would probably never get a job with the government again after failing to follow protocol.
  • 4. Questions 3. What are the consequences for the individuals/consumers affected by the breaches? All individuals/consumers now have to deal with their personal details being accessed by individuals they have not given consent to viewing their details. For the individuals who have their bank details stolen they now have to change all their bank details so their money isn't stolen.
  • 5. Questions 4. If these events occurred in Australia, would their be any possible legal implications? I don’t think if these events happened in Australia that there would be any real difference we have the same sort of privacy laws as countries such as America and Britain. 5. Use the internet to find a recent example where personal information has been found leaked or misused in similar ways to those described in these articles.
  • 6. Example Turkish Hackers Steal Thousands of Email, PayPal, Bank Acct IDsby Hana Levi Julian Follow Israel news on and . Turkish hackers have stolen the details of thousands of Israeli bank, credit card and Pay Pal accounts, and posted the information online. According to the Israeli We-CMS blog, the information was posted on to the message board of a Turkish Internet forum. By Sunday morning, the We-CMS blog itself was found “suspended” when Israel National News attempted to access the site. In addition to the details of at least 32,561 Israelis, more than 140 passwords to Israeli government web sites and more than 300 passwords to Israeli academic web pages were swiped as well. Globes business news service reports that many of the email addresses and passwords obtained by the Internet terrorists included accounts on Face book, Gmail and Microsoft Live Messenger. Most of those had been hacked since the flotilla clash between IHH terror activists and Israeli Navy commandos aboard the Turkish Mavi Marmara ship in May. Erez Wolf, owner of the We-CMS, warned reporters, “The hackers used the information in their possession to enter accounts on other web sites. Assuming that many surfers use the same email, same password and same user name to register on all the sites that require registration – because it's easier to remember – the email and password from the hacked site will be the same one that gets them into others... like Pay Pal. From what I've been able to learn on the forum, the hackers penetrated the Pay Pal accounts of Israelis, and their bank accounts, and also were able to obtain credit card details as well.” Wolf added that surfers have been debating the use of the information on the Turkish message board where the passwords and user names were posted in an Excel document. The discussion, said Wolf, is focused on whether or not it is permitted under Islamic law to use the stolen data. Some of the writers have contended that as enemies of Islam, it is permitted to wreak whatever havoc is possible to Israeli users, citing social, criminal and religious arguments. Several quoted passages from the Koran that referred to the disposition of assets belonging to infidels (heretics). The Excel file was downloaded from the Turkish web site and handed over to the Israel Police, who were unavailable for comment Sunday morning.
  • 7. Questions 6. Summarise what you find. Turkish hackers have stolen the of thousands of Israeli bank, credit card and Pay Pal accounts, and posted the information online. Some groups have stated that as enemies of Islam, it is permitted to wreak whatever havoc is possible to Israeli users, citing social, criminal and religious arguments.
  • 8. Questions 7. Comment on possible causes and effects what you found on those involved. Some possible causes and effects would be loss of personal information and private details from the victims. The perpetrators may be likely to get away with the crime as it is being claimed as an act of war. 8. Explain why personal details need to be protected, including potential consequences of personal information being misused. Personal information need to be protected so consumers or individuals do not have to deal with there private information being sold or used against them to cause personal harm to there social and emotional status.