html5-img
1 / 9

IT Consultant Project

IT Consultant Project. By Justin Groc. IT Professional I Consulted to. Position: Vice President of IT Operations Oversees all of the electronic online commerce when servicing other businesses within the company. Company: First Data Corporation

hide
Download Presentation

IT Consultant Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IT Consultant Project By Justin Groc

  2. IT Professional I Consulted to • Position: Vice President of IT Operations • Oversees all of the electronic online commerce when servicing other businesses within the company. • Company: First Data Corporation • FDC is a payment processing company where provided is electronic commerce along with payment solutions. They provide fraud protections and authentication solutions.

  3. What I Researched • I was requested to research for his department the ways that identity theft is indeed a constant occurring crime during electronic commerce and ways in which it could be prevented. • A little snippet from my interview: • “… I would like you to research statistics dealing with identity theft. Look for… help [that makes] online commerce flow more safely while avoiding theft. I would like to know how we can stay on top of our job in providing safer and more efficient transactions…”

  4. Identity Theft Defined in Two Ways Existing-Account Fraud New-Account Fraud • Occurs when an existing credit or debit card is stolen, and then used to purchase goods and services. • Occurs when a thief uses personal identifying data to open a new account. (Roberds & Schreft, 2008)

  5. Threats Within an Organization • Devices that support universal serial bus (USB) are threats because of their easy ability to transfer information, software, and applications on the go. • 86% of IT workers cited USB flash drive use • While nearly 50% of IT staff surveyed took no avoiding measures against iPod use in the office (Sarrel, 2008). • Organizations should seriously consider what they download and install especially if the software is from a third-party company.

  6. Prevention • Make the network easy to scan for vulnerability issues. • Manage and update all patches frequently. • Providing a usable graphic user interface (GUI) is the most important consideration when selecting a patch-management system (Sarrel, 2008).

  7. A Responsive Plan • A framework for investigation of any crime requires recorded artifacts of evidential value and creating profiles with listed suspects for potential identity thefts (Angelopoulou, 2007). • Should comprise of: • Prevention and Detection • Reaction • Investigation of Incidents

  8. Rounding it All Out… • Having threat-management strategies to combat security risks will help the company comply with corporate policies that deal with government regulations (Qiu & Diney, 2005). • The Federal Trade Commission regulates commercial e-mails, online advertising, and consumer privacy. • In order to always have customers protected, a company must integrate a whole threat management solution for customers and set it up to align with business management goals (Markowitz, 2006).

  9. Relevant Sources • Angelopoulou, O. (2007). Online ID theft techniques, investigation and response. Inderscience Publishers, 1 (Volume 1, Number 1/2007), 76-88. Retrieved April 10, 2010, from http:// inderscience.metapress.com/app/home/contribution.asp? referrer=parent&backto=issue,7,10;journal,9,9;linkingpublicationresults, 1:120736,1 • Roberds, W., & Schreft, S. (2009). Data security, privacy, and identity theft: The economics behind the policy debates. Economic Perspectives, 33(1), 22-30. Retrieved from Academic Search Premier database. • Markowitz, E. (2006). Get involved in security. eWeek, 23(22), 23. Retrieved from Academic Search Premier database.   • Qiu, H., & Dinev, T. (2005). IS SPYWARE AN Internet Nuisance or Public Menace?. Communications of the ACM, 48(8), 61-66. Retrieved from Academic Search Premier database. • Vijayan, J. (2005). Training Needed to Halt 'Spear-Phishing' Attacks. Computerworld, 39(34), 6. Retrieved from Academic Search Premier database.

More Related