SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
Protecting information
„New Literacy Set” Project
2015-2017
In UK in 2015. were:
•2.46 million cyber incidents
•2.11 million victims of cyber
crime
•UK businesses reported
losses of £1,079,447,765 in
the past year
• In 2015, the maximum
total annualized cost od
cyber-crime committed
against US companies
amounted to 65.05
million U.S.dollars
• 35% of the global
cybercrime were U.S.
fraud victims
•Legislative inhomogeneity
makes it virtually impossible for
an unanimous judgement of the
criminal events that is then
treated differently depending on
the country.
•Criminal acts could be
conducted in foreign
countries.
Lifecycle
Collect and
hold
Handling
Assess the
risks
Protect your
informations
Destroy
1. Consider What Personal Information
Is Important
• Personal information
includes personal data:
• Identification data
• Contact data
• Physical
characteristics data
• Ideology data
2. Privacy By Design
• Malware – malicious software
• Where malware comes from?
– Internet
– e-mail
– Hacked websites
– Games demos
– Music files
– Toolbars
– Software
– Free subscriptions
• How to recognize malware?
– Slow computer
– Pop-ups
– Spam
– Frequent crashes
• How to remove malware?
– Use a reliable malware removal tool!
• How to prevent malware?
– Use powerful antivirus and anti-malware software
– Don’t open email attachments from unknown or
unexpected sources
3. If In Doubt, Throw It Out
Online shopping statistics
• 40% of global internet users, or more than 1
billion people, have bought products or goods
online
• The U.S. e-commerce economy is worth $349
billion while China’s e-commerce economy is
worth $562.66 billion
• 8 out of 10 consumers will shop online if
offered free shipping
Online shopping statistics
• Online retail sales in the U.K. reached an
estimated £52.25 billion in 2015, with the
average shopper spending £1,174
• 40% of shoppers consult 3 or more channels,
often in the process of shopping, before
making a purchase; it goes to show the
increasing importance of having an online
presence in as many places as possible
Ecommerce customers in Spain
• Credit cards amount for more than half of all
online transactions, followed by cash (32%),
electronic bank transfer (20%) and eWallet
(14%).
• The most important payment option in Spain
seems to be 4B, which has 20 million cards
circulating amongst the Spanish population.
• The credit and debit cards of Euro6000 are
also widely used.
Ecommerce customers in Spain
Ecommerce customers in Spain
• Based on data from from Instituo Nacional de
Estadictica, about 22% of the Spanish
population bought something in the last three
months
• About 10.7 million Spanish people (31% of the
population aged 16 to 74 years old) ordered
something online in the last year.
Top 10 Online Shopping Sites in the World
Online payment methods
Phishing
• What does a phishing email message look
like?
4. Stay Updated
• Install anti-virus/malware software
• Keep your antivirus software up to date
• Run regularly scheduled scans with your anti-
virus software
• Keep your operating system current
• Secure your network
• Think before you click
4. Stay Updated
• Keep your personal information safe
• Don’t use open wi-fi
• Back up your files
• Use multiple string passwords
5. Assessing the risk
• Metadata – „data about data”
6. Taking appropriate steps and putting strategies into
place to protect personal information
• Use a unique password for each of your important
accounts
• Use a mix of letters, numbers and symbols in your
passwords
• Don’t use personal information or common words as a
password
• Make sure your backup password options are up-to-
date and secure in case you need to reset or forget
your passord
• Keep your passwords secure and don’t leave notes with
your passwords to various sites on your computer or
desk
7. Destroying personal information
• Wipe the drive completely
• Delete only your sensitive files
• Destroy the hard drive

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsArthit Suriyawongkul
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaMyles Freedman
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?MediaPost
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection RegulationSabrina Kirrane
 
Student Assignment Presentation Template
Student Assignment Presentation TemplateStudent Assignment Presentation Template
Student Assignment Presentation TemplateBrandon S
 

Was ist angesagt? (19)

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in Africa
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
Student Assignment Presentation Template
Student Assignment Presentation TemplateStudent Assignment Presentation Template
Student Assignment Presentation Template
 
Reia news no48_aug15
Reia news no48_aug15Reia news no48_aug15
Reia news no48_aug15
 

Andere mochten auch

Communication Within Family
Communication Within FamilyCommunication Within Family
Communication Within FamilyŠkola Futura
 
Non-verbal Communication
Non-verbal CommunicationNon-verbal Communication
Non-verbal CommunicationŠkola Futura
 
Creating structured information
Creating structured informationCreating structured information
Creating structured informationŠkola Futura
 
Use of social networks
Use of social networksUse of social networks
Use of social networksŠkola Futura
 
Comprehension of a text
Comprehension of a textComprehension of a text
Comprehension of a textŠkola Futura
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyŠkola Futura
 
Types of communication in conflicts
Types of communication in conflictsTypes of communication in conflicts
Types of communication in conflictsŠkola Futura
 
Fear of public speaking
Fear of public speakingFear of public speaking
Fear of public speakingŠkola Futura
 
Analysing charts and graphics
Analysing charts and graphicsAnalysing charts and graphics
Analysing charts and graphicsŠkola Futura
 
Effective communication
Effective communicationEffective communication
Effective communicationŠkola Futura
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communicationŠkola Futura
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal CommunicationŠkola Futura
 
Self-awareness in communication
Self-awareness in communicationSelf-awareness in communication
Self-awareness in communicationŠkola Futura
 
Evaluating information
Evaluating informationEvaluating information
Evaluating informationŠkola Futura
 

Andere mochten auch (20)

New Technologies
New TechnologiesNew Technologies
New Technologies
 
Assertiveness
AssertivenessAssertiveness
Assertiveness
 
Communication Within Family
Communication Within FamilyCommunication Within Family
Communication Within Family
 
Non-verbal Communication
Non-verbal CommunicationNon-verbal Communication
Non-verbal Communication
 
Active listening
Active listeningActive listening
Active listening
 
Leadership
LeadershipLeadership
Leadership
 
Empathy
EmpathyEmpathy
Empathy
 
Creating structured information
Creating structured informationCreating structured information
Creating structured information
 
Use of social networks
Use of social networksUse of social networks
Use of social networks
 
Comprehension of a text
Comprehension of a textComprehension of a text
Comprehension of a text
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Types of communication in conflicts
Types of communication in conflictsTypes of communication in conflicts
Types of communication in conflicts
 
Fear of public speaking
Fear of public speakingFear of public speaking
Fear of public speaking
 
Analysing charts and graphics
Analysing charts and graphicsAnalysing charts and graphics
Analysing charts and graphics
 
Effective communication
Effective communicationEffective communication
Effective communication
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communication
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal Communication
 
Self-awareness in communication
Self-awareness in communicationSelf-awareness in communication
Self-awareness in communication
 
Mediation
MediationMediation
Mediation
 
Evaluating information
Evaluating informationEvaluating information
Evaluating information
 

Ähnlich wie Protecting information

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018bhagyasri patel
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfBalaMurali958529
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates#TheFraudTube
 

Ähnlich wie Protecting information (20)

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates
 

Mehr von Škola Futura

Organizing information 2
Organizing information 2Organizing information 2
Organizing information 2Škola Futura
 
Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Škola Futura
 
Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Škola Futura
 
Behavioural approach to money
Behavioural approach to moneyBehavioural approach to money
Behavioural approach to moneyŠkola Futura
 
Management of bank accounts
Management of bank accountsManagement of bank accounts
Management of bank accountsŠkola Futura
 
Role of bank in today's world
Role of bank in today's worldRole of bank in today's world
Role of bank in today's worldŠkola Futura
 
Basics of stock exchange
Basics of stock exchangeBasics of stock exchange
Basics of stock exchangeŠkola Futura
 
Impact of marketing on children and youth
Impact of marketing on children and youthImpact of marketing on children and youth
Impact of marketing on children and youthŠkola Futura
 
Basket of goods in different countries
Basket of goods in different countriesBasket of goods in different countries
Basket of goods in different countriesŠkola Futura
 
Careers in financial system
Careers in financial systemCareers in financial system
Careers in financial systemŠkola Futura
 

Mehr von Škola Futura (20)

Organizing information 2
Organizing information 2Organizing information 2
Organizing information 2
 
Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018
 
Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017
 
Behavioural approach to money
Behavioural approach to moneyBehavioural approach to money
Behavioural approach to money
 
Leadership
LeadershipLeadership
Leadership
 
Assertivness
AssertivnessAssertivness
Assertivness
 
Methods of payment
Methods of paymentMethods of payment
Methods of payment
 
Management of bank accounts
Management of bank accountsManagement of bank accounts
Management of bank accounts
 
Loans and mortgages
Loans and mortgagesLoans and mortgages
Loans and mortgages
 
Role of bank in today's world
Role of bank in today's worldRole of bank in today's world
Role of bank in today's world
 
Basics of stock exchange
Basics of stock exchangeBasics of stock exchange
Basics of stock exchange
 
Making a budget
Making a budgetMaking a budget
Making a budget
 
Investing
InvestingInvesting
Investing
 
Insurance
InsuranceInsurance
Insurance
 
Business plan
Business planBusiness plan
Business plan
 
Famous entrepeneurs
Famous entrepeneursFamous entrepeneurs
Famous entrepeneurs
 
Tax burden
Tax burdenTax burden
Tax burden
 
Impact of marketing on children and youth
Impact of marketing on children and youthImpact of marketing on children and youth
Impact of marketing on children and youth
 
Basket of goods in different countries
Basket of goods in different countriesBasket of goods in different countries
Basket of goods in different countries
 
Careers in financial system
Careers in financial systemCareers in financial system
Careers in financial system
 

Kürzlich hochgeladen

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Kürzlich hochgeladen (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Protecting information

  • 1. Protecting information „New Literacy Set” Project 2015-2017
  • 2. In UK in 2015. were: •2.46 million cyber incidents •2.11 million victims of cyber crime •UK businesses reported losses of £1,079,447,765 in the past year
  • 3. • In 2015, the maximum total annualized cost od cyber-crime committed against US companies amounted to 65.05 million U.S.dollars • 35% of the global cybercrime were U.S. fraud victims
  • 4. •Legislative inhomogeneity makes it virtually impossible for an unanimous judgement of the criminal events that is then treated differently depending on the country. •Criminal acts could be conducted in foreign countries.
  • 5.
  • 7. 1. Consider What Personal Information Is Important • Personal information includes personal data: • Identification data • Contact data • Physical characteristics data • Ideology data
  • 8. 2. Privacy By Design • Malware – malicious software
  • 9. • Where malware comes from? – Internet – e-mail – Hacked websites – Games demos – Music files – Toolbars – Software – Free subscriptions
  • 10. • How to recognize malware? – Slow computer – Pop-ups – Spam – Frequent crashes
  • 11. • How to remove malware? – Use a reliable malware removal tool!
  • 12. • How to prevent malware? – Use powerful antivirus and anti-malware software – Don’t open email attachments from unknown or unexpected sources
  • 13. 3. If In Doubt, Throw It Out
  • 14. Online shopping statistics • 40% of global internet users, or more than 1 billion people, have bought products or goods online • The U.S. e-commerce economy is worth $349 billion while China’s e-commerce economy is worth $562.66 billion • 8 out of 10 consumers will shop online if offered free shipping
  • 15. Online shopping statistics • Online retail sales in the U.K. reached an estimated £52.25 billion in 2015, with the average shopper spending £1,174 • 40% of shoppers consult 3 or more channels, often in the process of shopping, before making a purchase; it goes to show the increasing importance of having an online presence in as many places as possible
  • 16. Ecommerce customers in Spain • Credit cards amount for more than half of all online transactions, followed by cash (32%), electronic bank transfer (20%) and eWallet (14%). • The most important payment option in Spain seems to be 4B, which has 20 million cards circulating amongst the Spanish population. • The credit and debit cards of Euro6000 are also widely used.
  • 18. Ecommerce customers in Spain • Based on data from from Instituo Nacional de Estadictica, about 22% of the Spanish population bought something in the last three months • About 10.7 million Spanish people (31% of the population aged 16 to 74 years old) ordered something online in the last year.
  • 19. Top 10 Online Shopping Sites in the World
  • 21. Phishing • What does a phishing email message look like?
  • 22. 4. Stay Updated • Install anti-virus/malware software • Keep your antivirus software up to date • Run regularly scheduled scans with your anti- virus software • Keep your operating system current • Secure your network • Think before you click
  • 23. 4. Stay Updated • Keep your personal information safe • Don’t use open wi-fi • Back up your files • Use multiple string passwords
  • 24. 5. Assessing the risk • Metadata – „data about data”
  • 25. 6. Taking appropriate steps and putting strategies into place to protect personal information • Use a unique password for each of your important accounts • Use a mix of letters, numbers and symbols in your passwords • Don’t use personal information or common words as a password • Make sure your backup password options are up-to- date and secure in case you need to reset or forget your passord • Keep your passwords secure and don’t leave notes with your passwords to various sites on your computer or desk
  • 26. 7. Destroying personal information • Wipe the drive completely • Delete only your sensitive files • Destroy the hard drive