SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Threats to online Security
                      and Data
By Anthony Wheeler
Threats
Stealing Data
 Stealing Data is when a hacker manages to code themselves
  into a websites server and access private information like
  bank details and addresses. However, websites holding this
  kind of information will usually Encrypt it, so that it is
  inaccessible for hackers.
Malware
Malware is malicious software. It is software
that is created by an attacker and
transferred to your computer by a variety of
different ways, including a malicious email or
through downloaded software.
Direct Hackers
 A hacker is somebody that finds and
 creates loop holes in operating systems, to
 then enter into them to edit certain items, or
 delete parts of the operating system, or
 even the whole thing.
Taking Over a Website
Taking over a website is when a hacker
 accesses the site through loop holes, and
 changes certain parts of the site. An
 example of this would be if somebody had
 changed Apple’s homepage to say ‘Android
 Is Better’.
Spam
Spam is only received over emails. Spam is
unwanted emails, usually sent out in bulk to
a set mailing list, of which thousands of
other victims are added every day. The
content of the email will usually be offers
saying you have won something, or
questionnaires asking you to input personal
information.
Phishing
Phishing is when a person attempts, with
 intent, to access personal data like
 usernames, passwords and credit card
 information.
Pharming
Pharming is when the attacker gets into a
 websites servers and changes where a
 user would end up if they entered the
 normal URL for that website.
Legislations
This Act was passed in 2000, to protect
online shoppers from fraud. The rules apply
when a company is selling a product or
service, without face to face contact. The
regulations of this act include Confirmation in
writing, a ‘cool off’ period, where the
customer can return items within 7 days
without penalty and protection from payment
card fraud.

Distance Selling Regulations
This act was passed in 1998, to control who can access certain data.
There are 8 principles with this act, all about how businesses must
control private information and data:
 Processed fairly and lawfully
 Obtained for specified and lawful purposes
 Adequate, relevant and not excessive
 Accurate and up to date
 Not kept any longer than necessary
 Processed in accordance with the individuals rights
 Securely kept
 Not transferred to any other country without adequate protection



      The Data Protection Act
Threats to online security and data

Weitere ähnliche Inhalte

Was ist angesagt?

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 
Viruses, Biometrics, & Encryption
Viruses, Biometrics, &  EncryptionViruses, Biometrics, &  Encryption
Viruses, Biometrics, & Encryption
parkera
 

Was ist angesagt? (20)

Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | IntellipaatPhishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
Phishing For Beginners | Phishing Tutorial | What is Phishing | Intellipaat
 
Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020Why cyber security needs to be your top priority 2020
Why cyber security needs to be your top priority 2020
 
Appsian remote access_infographic
Appsian remote access_infographicAppsian remote access_infographic
Appsian remote access_infographic
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
RSA Conference 2016 Review
RSA Conference 2016 ReviewRSA Conference 2016 Review
RSA Conference 2016 Review
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
PayPal Law Enforcement Guide
PayPal Law Enforcement GuidePayPal Law Enforcement Guide
PayPal Law Enforcement Guide
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Cyber Insurance Types of Attacks
Cyber Insurance Types of AttacksCyber Insurance Types of Attacks
Cyber Insurance Types of Attacks
 
PawnSafeBox Tri-fold 7-1-15FF
PawnSafeBox Tri-fold 7-1-15FFPawnSafeBox Tri-fold 7-1-15FF
PawnSafeBox Tri-fold 7-1-15FF
 
Phishing
PhishingPhishing
Phishing
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Viruses, Biometrics, & Encryption
Viruses, Biometrics, &  EncryptionViruses, Biometrics, &  Encryption
Viruses, Biometrics, & Encryption
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Hacking computer crime
Hacking computer crimeHacking computer crime
Hacking computer crime
 
Mod7 Lab Kohne
Mod7 Lab KohneMod7 Lab Kohne
Mod7 Lab Kohne
 
Equifax data breach
Equifax data breachEquifax data breach
Equifax data breach
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 

Andere mochten auch

Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
Colin058
 

Andere mochten auch (8)

The Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our CommunityThe Endless Wave of Online Threats - Protecting our Community
The Endless Wave of Online Threats - Protecting our Community
 
New Threats to Data Security
New Threats to Data SecurityNew Threats to Data Security
New Threats to Data Security
 
Emerging Threats and Trends in Online Security
Emerging Threats and Trends in Online SecurityEmerging Threats and Trends in Online Security
Emerging Threats and Trends in Online Security
 
Cybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurityCybersecurity 1 intro to cybersecurity
Cybersecurity 1 intro to cybersecurity
 
Online Security
Online SecurityOnline Security
Online Security
 
Information Security Challenges & Opportunities
Information Security Challenges & OpportunitiesInformation Security Challenges & Opportunities
Information Security Challenges & Opportunities
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Ähnlich wie Threats to online security and data

onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
jainutkarsh078
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 

Ähnlich wie Threats to online security and data (20)

Information security
Information securityInformation security
Information security
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Internet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptxInternet fraud and Common modes of security threats .pptx
Internet fraud and Common modes of security threats .pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Digital security
Digital securityDigital security
Digital security
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Data Theft.pdf
Data Theft.pdfData Theft.pdf
Data Theft.pdf
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 

Threats to online security and data

  • 1. Threats to online Security and Data By Anthony Wheeler
  • 3. Stealing Data  Stealing Data is when a hacker manages to code themselves into a websites server and access private information like bank details and addresses. However, websites holding this kind of information will usually Encrypt it, so that it is inaccessible for hackers.
  • 4. Malware Malware is malicious software. It is software that is created by an attacker and transferred to your computer by a variety of different ways, including a malicious email or through downloaded software.
  • 5. Direct Hackers  A hacker is somebody that finds and creates loop holes in operating systems, to then enter into them to edit certain items, or delete parts of the operating system, or even the whole thing.
  • 6. Taking Over a Website Taking over a website is when a hacker accesses the site through loop holes, and changes certain parts of the site. An example of this would be if somebody had changed Apple’s homepage to say ‘Android Is Better’.
  • 7. Spam Spam is only received over emails. Spam is unwanted emails, usually sent out in bulk to a set mailing list, of which thousands of other victims are added every day. The content of the email will usually be offers saying you have won something, or questionnaires asking you to input personal information.
  • 8. Phishing Phishing is when a person attempts, with intent, to access personal data like usernames, passwords and credit card information.
  • 9. Pharming Pharming is when the attacker gets into a websites servers and changes where a user would end up if they entered the normal URL for that website.
  • 11. This Act was passed in 2000, to protect online shoppers from fraud. The rules apply when a company is selling a product or service, without face to face contact. The regulations of this act include Confirmation in writing, a ‘cool off’ period, where the customer can return items within 7 days without penalty and protection from payment card fraud. Distance Selling Regulations
  • 12. This act was passed in 1998, to control who can access certain data. There are 8 principles with this act, all about how businesses must control private information and data:  Processed fairly and lawfully  Obtained for specified and lawful purposes  Adequate, relevant and not excessive  Accurate and up to date  Not kept any longer than necessary  Processed in accordance with the individuals rights  Securely kept  Not transferred to any other country without adequate protection The Data Protection Act