SlideShare ist ein Scribd-Unternehmen logo
1 von 27
INFORMATION
SECURITY
Effects On Businesses And Consumers
Victoria McIntyre
“As more businesses rely on
information technology to create
efficiency, computer security threats
will continue to rise and substantially
impact consumer security in a variety
of ways.”
What measures are being
 taken by businesses?
Money
      vs.
Computer Security
Business Measures
• Cut corners to make cost-saving measures
   – Waste of money and time
• Focus too much on themselves to worry
  about potential for hackers to steal
  consumer information
• Try to use efficiency through “shortcuts”
   – Shortcuts often costly
Result of Business Measures
• Ignorance to true level of difficulty for
  hackers to steal personal information
• Careless employees
   – No time/consideration into clicking on
     suspicious links
• 2006 study
   – Out of 7818 businesses, 67% reported being
     hacked that year
How easy is it for information
      to be hacked?
Ease of Hacking
• Just about anyone can create a computer
  virus
   – In just one Youtube search, over 30,000 videos
     relating to making computer viruses can be found
       • Typically “small-scale” viruses, but the very basis for
         “large-scale” viruses
       • Free “practice” for larger viruses
       • Creates interest for performing viruses on others
• Simple software could potentially cause great
  damage to a large system ($100-300)
  ($1,000,000)
   – Information exposing flaws to programs like Internet
     Explorer or Microsoft Word
   –
How is information hacked and how
 does this affect businesses and
            consumers?
Hacking Methods
• Posing as legitimate software for
  download
• Individuals/small businesses being
  attacked more frequently than large
  corporations
   – Chain of attacks
• Hackers hold victims at ransom
   – Threaten to delete files if victims did not pay
     ransom
• Stock market manipulation
2/3 to 3/4 of all computer crime within
a business somehow involves an
employee of that business.
Consumer Information Hacked

•   Name
•   Credit Card Number
•   Telephone Number
•   Address
•   Social Security Number
Result of Hacked Consumers
• Consumers at risk for:
   – Fraud
   – Identity theft
   – Scams
• Consumers lose trust for company
What is being done to
 prevent hacking?
Business Actions
• Companies put forth plenty of money-
  ensure information safety
• No information put over a network will ever
  be entirely safe
   – No security software will ever be powerful
     enough to completely eliminate threats
   – Hackers move at faster technological pace than
     businesses
   – Difficult to track any and all viruses that could
     harm system
Federal Government Action
• Restrictions set forth in terms of “spirit of
  the law”
• Rights of citizens protected
   – “Illegal search and seizure” prohibited
   – People cannot be their own witnesses
• Attempts to ensure citizens’ right to privacy
It is often difficult to track the source of the
crime because hackers could be in a group,
multiple but separate hackers could be
involved, or the hacker(s) could remain
completely anonymous.
What should/should not be done to
       prevent hacking?
Do Not Avoid Computers Altogether
• Avoiding the internet does not solve
  problem
• Government control over the internet does
  not solve problem
   – Makes matters worse- violate privacy of people
Education
• Safe internet navigation
• Risks/consequences of irresponsible
  computer usage or theft
• How to defend potential attack if one were
  to occur
Business Investments
• Investing in quality security software is
  expensive, but saves money in long run
• Strategize in preparation for attack on
  security
• Hiring IT specialist/security firm
   – Assures- business will have knowledgeable
     individuals in field of information technology and
     security
How does this apply
  to everyone?
Application
• Everyone is:
   – Consumer
   – Affected by technology
• Businesses are integrating technology
  more into their systems at rapid rate
   – Technological dependence
• Newer, more complicated viruses
  developed daily
The great realms of information technology
hold a wealth of potential in the future for
business, but the only way that businesses
can be affected by this is through the security
of its technical infrastructures.
Citations For Slide Supplements
• http://www.youtube.com/watch?v=DG1vQfaEsf4
• http://hiton.en.alibaba.com/productlist.html
• http://soshable.com/tumblrs-biggest-strength-is-its-
  biggest-weakness-to-google/
• http://www.stockbrokers4u.com/etrade-review/
• http://www.iraq-
  businessnews.com/2010/05/09/iraq-sends-shell-
  gas-deal-to-cabinet-for-approval/
• http://branding-logo-
  design.blogspot.com/2010/07/top-5-tech-
  corporations-and-their-logos.html

Weitere ähnliche Inhalte

Was ist angesagt?

Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
PECB
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Damir Delija
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
 

Was ist angesagt? (20)

Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber security 07
Cyber security 07Cyber security 07
Cyber security 07
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 

Andere mochten auch

OIG: Information Technology Security: Improvements Needed in NASA's Continuou...
OIG: Information Technology Security: Improvements Needed in NASA's Continuou...OIG: Information Technology Security: Improvements Needed in NASA's Continuou...
OIG: Information Technology Security: Improvements Needed in NASA's Continuou...
Bill Duncan
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Andere mochten auch (10)

Admin Panels that Don't Suck!
Admin Panels that Don't Suck!Admin Panels that Don't Suck!
Admin Panels that Don't Suck!
 
OIG: Information Technology Security: Improvements Needed in NASA's Continuou...
OIG: Information Technology Security: Improvements Needed in NASA's Continuou...OIG: Information Technology Security: Improvements Needed in NASA's Continuou...
OIG: Information Technology Security: Improvements Needed in NASA's Continuou...
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Scaling the Cloud - Cloud Security
Scaling the Cloud - Cloud SecurityScaling the Cloud - Cloud Security
Scaling the Cloud - Cloud Security
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Ähnlich wie Information Security: Effects On Businesses and Consumers

Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
apyn
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 

Ähnlich wie Information Security: Effects On Businesses and Consumers (20)

Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Information Security: Effects On Businesses and Consumers

  • 1. INFORMATION SECURITY Effects On Businesses And Consumers Victoria McIntyre
  • 2.
  • 3. “As more businesses rely on information technology to create efficiency, computer security threats will continue to rise and substantially impact consumer security in a variety of ways.”
  • 4. What measures are being taken by businesses?
  • 5. Money vs. Computer Security
  • 6. Business Measures • Cut corners to make cost-saving measures – Waste of money and time • Focus too much on themselves to worry about potential for hackers to steal consumer information • Try to use efficiency through “shortcuts” – Shortcuts often costly
  • 7. Result of Business Measures • Ignorance to true level of difficulty for hackers to steal personal information • Careless employees – No time/consideration into clicking on suspicious links • 2006 study – Out of 7818 businesses, 67% reported being hacked that year
  • 8. How easy is it for information to be hacked?
  • 9.
  • 10. Ease of Hacking • Just about anyone can create a computer virus – In just one Youtube search, over 30,000 videos relating to making computer viruses can be found • Typically “small-scale” viruses, but the very basis for “large-scale” viruses • Free “practice” for larger viruses • Creates interest for performing viruses on others • Simple software could potentially cause great damage to a large system ($100-300) ($1,000,000) – Information exposing flaws to programs like Internet Explorer or Microsoft Word –
  • 11. How is information hacked and how does this affect businesses and consumers?
  • 12. Hacking Methods • Posing as legitimate software for download • Individuals/small businesses being attacked more frequently than large corporations – Chain of attacks • Hackers hold victims at ransom – Threaten to delete files if victims did not pay ransom • Stock market manipulation
  • 13. 2/3 to 3/4 of all computer crime within a business somehow involves an employee of that business.
  • 14. Consumer Information Hacked • Name • Credit Card Number • Telephone Number • Address • Social Security Number
  • 15. Result of Hacked Consumers • Consumers at risk for: – Fraud – Identity theft – Scams • Consumers lose trust for company
  • 16. What is being done to prevent hacking?
  • 17. Business Actions • Companies put forth plenty of money- ensure information safety • No information put over a network will ever be entirely safe – No security software will ever be powerful enough to completely eliminate threats – Hackers move at faster technological pace than businesses – Difficult to track any and all viruses that could harm system
  • 18. Federal Government Action • Restrictions set forth in terms of “spirit of the law” • Rights of citizens protected – “Illegal search and seizure” prohibited – People cannot be their own witnesses • Attempts to ensure citizens’ right to privacy
  • 19. It is often difficult to track the source of the crime because hackers could be in a group, multiple but separate hackers could be involved, or the hacker(s) could remain completely anonymous.
  • 20. What should/should not be done to prevent hacking?
  • 21. Do Not Avoid Computers Altogether • Avoiding the internet does not solve problem • Government control over the internet does not solve problem – Makes matters worse- violate privacy of people
  • 22. Education • Safe internet navigation • Risks/consequences of irresponsible computer usage or theft • How to defend potential attack if one were to occur
  • 23. Business Investments • Investing in quality security software is expensive, but saves money in long run • Strategize in preparation for attack on security • Hiring IT specialist/security firm – Assures- business will have knowledgeable individuals in field of information technology and security
  • 24. How does this apply to everyone?
  • 25. Application • Everyone is: – Consumer – Affected by technology • Businesses are integrating technology more into their systems at rapid rate – Technological dependence • Newer, more complicated viruses developed daily
  • 26. The great realms of information technology hold a wealth of potential in the future for business, but the only way that businesses can be affected by this is through the security of its technical infrastructures.
  • 27. Citations For Slide Supplements • http://www.youtube.com/watch?v=DG1vQfaEsf4 • http://hiton.en.alibaba.com/productlist.html • http://soshable.com/tumblrs-biggest-strength-is-its- biggest-weakness-to-google/ • http://www.stockbrokers4u.com/etrade-review/ • http://www.iraq- businessnews.com/2010/05/09/iraq-sends-shell- gas-deal-to-cabinet-for-approval/ • http://branding-logo- design.blogspot.com/2010/07/top-5-tech- corporations-and-their-logos.html