3. “As more businesses rely on
information technology to create
efficiency, computer security threats
will continue to rise and substantially
impact consumer security in a variety
of ways.”
6. Business Measures
• Cut corners to make cost-saving measures
– Waste of money and time
• Focus too much on themselves to worry
about potential for hackers to steal
consumer information
• Try to use efficiency through “shortcuts”
– Shortcuts often costly
7. Result of Business Measures
• Ignorance to true level of difficulty for
hackers to steal personal information
• Careless employees
– No time/consideration into clicking on
suspicious links
• 2006 study
– Out of 7818 businesses, 67% reported being
hacked that year
10. Ease of Hacking
• Just about anyone can create a computer
virus
– In just one Youtube search, over 30,000 videos
relating to making computer viruses can be found
• Typically “small-scale” viruses, but the very basis for
“large-scale” viruses
• Free “practice” for larger viruses
• Creates interest for performing viruses on others
• Simple software could potentially cause great
damage to a large system ($100-300)
($1,000,000)
– Information exposing flaws to programs like Internet
Explorer or Microsoft Word
–
11. How is information hacked and how
does this affect businesses and
consumers?
12. Hacking Methods
• Posing as legitimate software for
download
• Individuals/small businesses being
attacked more frequently than large
corporations
– Chain of attacks
• Hackers hold victims at ransom
– Threaten to delete files if victims did not pay
ransom
• Stock market manipulation
13. 2/3 to 3/4 of all computer crime within
a business somehow involves an
employee of that business.
17. Business Actions
• Companies put forth plenty of money-
ensure information safety
• No information put over a network will ever
be entirely safe
– No security software will ever be powerful
enough to completely eliminate threats
– Hackers move at faster technological pace than
businesses
– Difficult to track any and all viruses that could
harm system
18. Federal Government Action
• Restrictions set forth in terms of “spirit of
the law”
• Rights of citizens protected
– “Illegal search and seizure” prohibited
– People cannot be their own witnesses
• Attempts to ensure citizens’ right to privacy
19. It is often difficult to track the source of the
crime because hackers could be in a group,
multiple but separate hackers could be
involved, or the hacker(s) could remain
completely anonymous.
21. Do Not Avoid Computers Altogether
• Avoiding the internet does not solve
problem
• Government control over the internet does
not solve problem
– Makes matters worse- violate privacy of people
22. Education
• Safe internet navigation
• Risks/consequences of irresponsible
computer usage or theft
• How to defend potential attack if one were
to occur
23. Business Investments
• Investing in quality security software is
expensive, but saves money in long run
• Strategize in preparation for attack on
security
• Hiring IT specialist/security firm
– Assures- business will have knowledgeable
individuals in field of information technology and
security
25. Application
• Everyone is:
– Consumer
– Affected by technology
• Businesses are integrating technology
more into their systems at rapid rate
– Technological dependence
• Newer, more complicated viruses
developed daily
26. The great realms of information technology
hold a wealth of potential in the future for
business, but the only way that businesses
can be affected by this is through the security
of its technical infrastructures.