SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Protecting information
„New Literacy Set” Project
2015-2017
In UK in 2015. were:
•2.46 million cyber incidents
•2.11 million victims of cyber
crime
•UK businesses reported
losses of £1,079,447,765 in
the past year
• In 2015, the maximum
total annualized cost od
cyber-crime committed
against US companies
amounted to 65.05
million U.S.dollars
• 35% of the global
cybercrime were U.S.
fraud victims
•Legislative inhomogeneity
makes it virtually impossible for
an unanimous judgement of the
criminal events that is then
treated differently depending on
the country.
•Criminal acts could be
conducted in foreign
countries.
Lifecycle
Collect and
hold
Handling
Assess the
risks
Protect your
informations
Destroy
1. Consider What Personal Information
Is Important
• Personal information
includes personal data:
• Identification data
• Contact data
• Physical
characteristics data
• Ideology data
2. Privacy By Design
• Malware – malicious software
• Where malware comes from?
– Internet
– e-mail
– Hacked websites
– Games demos
– Music files
– Toolbars
– Software
– Free subscriptions
• How to recognize malware?
– Slow computer
– Pop-ups
– Spam
– Frequent crashes
• How to remove malware?
– Use a reliable malware removal tool!
• How to prevent malware?
– Use powerful antivirus and anti-malware software
– Don’t open email attachments from unknown or
unexpected sources
3. If In Doubt, Throw It Out
Online shopping statistics
• 40% of global internet users, or more than 1
billion people, have bought products or goods
online
• The U.S. e-commerce economy is worth $349
billion while China’s e-commerce economy is
worth $562.66 billion
• 8 out of 10 consumers will shop online if
offered free shipping
Online shopping statistics
• Online retail sales in the U.K. reached an
estimated £52.25 billion in 2015, with the
average shopper spending £1,174
• 40% of shoppers consult 3 or more channels,
often in the process of shopping, before
making a purchase; it goes to show the
increasing importance of having an online
presence in as many places as possible
Ecommerce customers in Spain
• Credit cards amount for more than half of all
online transactions, followed by cash (32%),
electronic bank transfer (20%) and eWallet
(14%).
• The most important payment option in Spain
seems to be 4B, which has 20 million cards
circulating amongst the Spanish population.
• The credit and debit cards of Euro6000 are
also widely used.
Ecommerce customers in Spain
Ecommerce customers in Spain
• Based on data from from Instituo Nacional de
Estadictica, about 22% of the Spanish
population bought something in the last three
months
• About 10.7 million Spanish people (31% of the
population aged 16 to 74 years old) ordered
something online in the last year.
Top 10 Online Shopping Sites in the World
Online payment methods
Phishing
• What does a phishing email message look
like?
4. Stay Updated
• Install anti-virus/malware software
• Keep your antivirus software up to date
• Run regularly scheduled scans with your anti-
virus software
• Keep your operating system current
• Secure your network
• Think before you click
4. Stay Updated
• Keep your personal information safe
• Don’t use open wi-fi
• Back up your files
• Use multiple string passwords
5. Assessing the risk
• Metadata – „data about data”
6. Taking appropriate steps and putting strategies into
place to protect personal information
• Use a unique password for each of your important
accounts
• Use a mix of letters, numbers and symbols in your
passwords
• Don’t use personal information or common words as a
password
• Make sure your backup password options are up-to-
date and secure in case you need to reset or forget
your passord
• Keep your passwords secure and don’t leave notes with
your passwords to various sites on your computer or
desk
7. Destroying personal information
• Wipe the drive completely
• Delete only your sensitive files
• Destroy the hard drive

Más contenido relacionado

La actualidad más candente

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in GovernmentJacqueline Fick
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsArthit Suriyawongkul
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy Carolina Rossini
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaMyles Freedman
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017isc2-hellenic
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsTara Aaron
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...APNIC
 
GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?MediaPost
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRIT Governance Ltd
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersIT Governance Ltd
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection RegulationSabrina Kirrane
 
Student Assignment Presentation Template
Student Assignment Presentation TemplateStudent Assignment Presentation Template
Student Assignment Presentation TemplateBrandon S
 

La actualidad más candente (19)

Cyber Crime in Government
Cyber Crime in GovernmentCyber Crime in Government
Cyber Crime in Government
 
Consumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil RightsConsumer Rights IS THE NEW Civil Rights
Consumer Rights IS THE NEW Civil Rights
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy  Consumers' and Citizens' Privacy
Consumers' and Citizens' Privacy
 
DLA Piper Data Privacy in Africa
DLA Piper Data Privacy in AfricaDLA Piper Data Privacy in Africa
DLA Piper Data Privacy in Africa
 
GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017GDPR Cyber Insurance 11/1/2017
GDPR Cyber Insurance 11/1/2017
 
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy LawsWhen Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
When Big Data is Personal Data - Data Analytics in The Age of Privacy Laws
 
11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
The GDPR for Techies
The GDPR for TechiesThe GDPR for Techies
The GDPR for Techies
 
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
33rd TWNIC IP OPM: Legal cooperation to overcome jurisdictional and territori...
 
GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?GDPR Is Coming – Are Search Marketers Ready?
GDPR Is Coming – Are Search Marketers Ready?
 
Appointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPRAppointing a Data Protection Officer under the GDPR
Appointing a Data Protection Officer under the GDPR
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom Artificial Intelligence, elections, media pluralism and media freedom
Artificial Intelligence, elections, media pluralism and media freedom
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
GDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud ProvidersGDPR: Requirements for Cloud Providers
GDPR: Requirements for Cloud Providers
 
Modelling the General Data Protection Regulation
Modelling the General Data Protection RegulationModelling the General Data Protection Regulation
Modelling the General Data Protection Regulation
 
Student Assignment Presentation Template
Student Assignment Presentation TemplateStudent Assignment Presentation Template
Student Assignment Presentation Template
 
Reia news no48_aug15
Reia news no48_aug15Reia news no48_aug15
Reia news no48_aug15
 

Destacado

Communication Within Family
Communication Within FamilyCommunication Within Family
Communication Within FamilyŠkola Futura
 
Non-verbal Communication
Non-verbal CommunicationNon-verbal Communication
Non-verbal CommunicationŠkola Futura
 
Creating structured information
Creating structured informationCreating structured information
Creating structured informationŠkola Futura
 
Use of social networks
Use of social networksUse of social networks
Use of social networksŠkola Futura
 
Comprehension of a text
Comprehension of a textComprehension of a text
Comprehension of a textŠkola Futura
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual PropertyŠkola Futura
 
Types of communication in conflicts
Types of communication in conflictsTypes of communication in conflicts
Types of communication in conflictsŠkola Futura
 
Fear of public speaking
Fear of public speakingFear of public speaking
Fear of public speakingŠkola Futura
 
Analysing charts and graphics
Analysing charts and graphicsAnalysing charts and graphics
Analysing charts and graphicsŠkola Futura
 
Effective communication
Effective communicationEffective communication
Effective communicationŠkola Futura
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communicationŠkola Futura
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal CommunicationŠkola Futura
 
Self-awareness in communication
Self-awareness in communicationSelf-awareness in communication
Self-awareness in communicationŠkola Futura
 
Evaluating information
Evaluating informationEvaluating information
Evaluating informationŠkola Futura
 

Destacado (20)

New Technologies
New TechnologiesNew Technologies
New Technologies
 
Assertiveness
AssertivenessAssertiveness
Assertiveness
 
Communication Within Family
Communication Within FamilyCommunication Within Family
Communication Within Family
 
Non-verbal Communication
Non-verbal CommunicationNon-verbal Communication
Non-verbal Communication
 
Active listening
Active listeningActive listening
Active listening
 
Leadership
LeadershipLeadership
Leadership
 
Empathy
EmpathyEmpathy
Empathy
 
Creating structured information
Creating structured informationCreating structured information
Creating structured information
 
Use of social networks
Use of social networksUse of social networks
Use of social networks
 
Comprehension of a text
Comprehension of a textComprehension of a text
Comprehension of a text
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Types of communication in conflicts
Types of communication in conflictsTypes of communication in conflicts
Types of communication in conflicts
 
Fear of public speaking
Fear of public speakingFear of public speaking
Fear of public speaking
 
Analysing charts and graphics
Analysing charts and graphicsAnalysing charts and graphics
Analysing charts and graphics
 
Effective communication
Effective communicationEffective communication
Effective communication
 
Argumentative communication
Argumentative communicationArgumentative communication
Argumentative communication
 
Verbal Communication
Verbal CommunicationVerbal Communication
Verbal Communication
 
Self-awareness in communication
Self-awareness in communicationSelf-awareness in communication
Self-awareness in communication
 
Mediation
MediationMediation
Mediation
 
Evaluating information
Evaluating informationEvaluating information
Evaluating information
 

Similar a Protecting information

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Tech and Law Center
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationRandyMcCall
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017Ray Bugg
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018bhagyasri patel
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptxSPMTPCAMPUS
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxPREMTRIVEDI5
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxjaved75
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfBalaMurali958529
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxMalikMumtaz6
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxSPMTPCAMPUS
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyProf. Neeta Awasthy
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates#TheFraudTube
 

Similar a Protecting information (20)

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA PresentationCanadian Clearinghouse on Cyberstalking NCFTA Presentation
Canadian Clearinghouse on Cyberstalking NCFTA Presentation
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Scot Secure 2017
Scot Secure 2017Scot Secure 2017
Scot Secure 2017
 
awareness.pdf
awareness.pdfawareness.pdf
awareness.pdf
 
Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018Acw stewart brown-cybercrime-presentation-feb-2018
Acw stewart brown-cybercrime-presentation-feb-2018
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
TPC_Presentation.pptx
TPC_Presentation.pptxTPC_Presentation.pptx
TPC_Presentation.pptx
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
Cyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptxCyber_Security_Awareness_Presentation (1).pptx
Cyber_Security_Awareness_Presentation (1).pptx
 
Cyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdfCyber_Security_Awareness_Presentation.pdf
Cyber_Security_Awareness_Presentation.pdf
 
Cyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptxCyber_Security_Awareness_Presentation.pptx
Cyber_Security_Awareness_Presentation.pptx
 
cybersec-01.pptx
cybersec-01.pptxcybersec-01.pptx
cybersec-01.pptx
 
TPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptxTPC_Presentation - Copy.pptx
TPC_Presentation - Copy.pptx
 
Cyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta AwasthyCyber crimes in india Dr. Neeta Awasthy
Cyber crimes in india Dr. Neeta Awasthy
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
FCF June 2014 - 01 news & updates
 FCF June 2014 -  01   news & updates FCF June 2014 -  01   news & updates
FCF June 2014 - 01 news & updates
 

Más de Škola Futura

Organizing information 2
Organizing information 2Organizing information 2
Organizing information 2Škola Futura
 
Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Škola Futura
 
Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Škola Futura
 
Behavioural approach to money
Behavioural approach to moneyBehavioural approach to money
Behavioural approach to moneyŠkola Futura
 
Management of bank accounts
Management of bank accountsManagement of bank accounts
Management of bank accountsŠkola Futura
 
Role of bank in today's world
Role of bank in today's worldRole of bank in today's world
Role of bank in today's worldŠkola Futura
 
Basics of stock exchange
Basics of stock exchangeBasics of stock exchange
Basics of stock exchangeŠkola Futura
 
Impact of marketing on children and youth
Impact of marketing on children and youthImpact of marketing on children and youth
Impact of marketing on children and youthŠkola Futura
 
Basket of goods in different countries
Basket of goods in different countriesBasket of goods in different countries
Basket of goods in different countriesŠkola Futura
 
Careers in financial system
Careers in financial systemCareers in financial system
Careers in financial systemŠkola Futura
 

Más de Škola Futura (20)

Organizing information 2
Organizing information 2Organizing information 2
Organizing information 2
 
Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018Srednjoskolske uspomene 2017-2018
Srednjoskolske uspomene 2017-2018
 
Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017Srednjoskolske uspomene 2016-2017
Srednjoskolske uspomene 2016-2017
 
Behavioural approach to money
Behavioural approach to moneyBehavioural approach to money
Behavioural approach to money
 
Leadership
LeadershipLeadership
Leadership
 
Assertivness
AssertivnessAssertivness
Assertivness
 
Methods of payment
Methods of paymentMethods of payment
Methods of payment
 
Management of bank accounts
Management of bank accountsManagement of bank accounts
Management of bank accounts
 
Loans and mortgages
Loans and mortgagesLoans and mortgages
Loans and mortgages
 
Role of bank in today's world
Role of bank in today's worldRole of bank in today's world
Role of bank in today's world
 
Basics of stock exchange
Basics of stock exchangeBasics of stock exchange
Basics of stock exchange
 
Making a budget
Making a budgetMaking a budget
Making a budget
 
Investing
InvestingInvesting
Investing
 
Insurance
InsuranceInsurance
Insurance
 
Business plan
Business planBusiness plan
Business plan
 
Famous entrepeneurs
Famous entrepeneursFamous entrepeneurs
Famous entrepeneurs
 
Tax burden
Tax burdenTax burden
Tax burden
 
Impact of marketing on children and youth
Impact of marketing on children and youthImpact of marketing on children and youth
Impact of marketing on children and youth
 
Basket of goods in different countries
Basket of goods in different countriesBasket of goods in different countries
Basket of goods in different countries
 
Careers in financial system
Careers in financial systemCareers in financial system
Careers in financial system
 

Último

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Protecting information

  • 1. Protecting information „New Literacy Set” Project 2015-2017
  • 2. In UK in 2015. were: •2.46 million cyber incidents •2.11 million victims of cyber crime •UK businesses reported losses of £1,079,447,765 in the past year
  • 3. • In 2015, the maximum total annualized cost od cyber-crime committed against US companies amounted to 65.05 million U.S.dollars • 35% of the global cybercrime were U.S. fraud victims
  • 4. •Legislative inhomogeneity makes it virtually impossible for an unanimous judgement of the criminal events that is then treated differently depending on the country. •Criminal acts could be conducted in foreign countries.
  • 5.
  • 7. 1. Consider What Personal Information Is Important • Personal information includes personal data: • Identification data • Contact data • Physical characteristics data • Ideology data
  • 8. 2. Privacy By Design • Malware – malicious software
  • 9. • Where malware comes from? – Internet – e-mail – Hacked websites – Games demos – Music files – Toolbars – Software – Free subscriptions
  • 10. • How to recognize malware? – Slow computer – Pop-ups – Spam – Frequent crashes
  • 11. • How to remove malware? – Use a reliable malware removal tool!
  • 12. • How to prevent malware? – Use powerful antivirus and anti-malware software – Don’t open email attachments from unknown or unexpected sources
  • 13. 3. If In Doubt, Throw It Out
  • 14. Online shopping statistics • 40% of global internet users, or more than 1 billion people, have bought products or goods online • The U.S. e-commerce economy is worth $349 billion while China’s e-commerce economy is worth $562.66 billion • 8 out of 10 consumers will shop online if offered free shipping
  • 15. Online shopping statistics • Online retail sales in the U.K. reached an estimated £52.25 billion in 2015, with the average shopper spending £1,174 • 40% of shoppers consult 3 or more channels, often in the process of shopping, before making a purchase; it goes to show the increasing importance of having an online presence in as many places as possible
  • 16. Ecommerce customers in Spain • Credit cards amount for more than half of all online transactions, followed by cash (32%), electronic bank transfer (20%) and eWallet (14%). • The most important payment option in Spain seems to be 4B, which has 20 million cards circulating amongst the Spanish population. • The credit and debit cards of Euro6000 are also widely used.
  • 18. Ecommerce customers in Spain • Based on data from from Instituo Nacional de Estadictica, about 22% of the Spanish population bought something in the last three months • About 10.7 million Spanish people (31% of the population aged 16 to 74 years old) ordered something online in the last year.
  • 19. Top 10 Online Shopping Sites in the World
  • 21. Phishing • What does a phishing email message look like?
  • 22. 4. Stay Updated • Install anti-virus/malware software • Keep your antivirus software up to date • Run regularly scheduled scans with your anti- virus software • Keep your operating system current • Secure your network • Think before you click
  • 23. 4. Stay Updated • Keep your personal information safe • Don’t use open wi-fi • Back up your files • Use multiple string passwords
  • 24. 5. Assessing the risk • Metadata – „data about data”
  • 25. 6. Taking appropriate steps and putting strategies into place to protect personal information • Use a unique password for each of your important accounts • Use a mix of letters, numbers and symbols in your passwords • Don’t use personal information or common words as a password • Make sure your backup password options are up-to- date and secure in case you need to reset or forget your passord • Keep your passwords secure and don’t leave notes with your passwords to various sites on your computer or desk
  • 26. 7. Destroying personal information • Wipe the drive completely • Delete only your sensitive files • Destroy the hard drive