1 / 14

Business Threats What could it mean for you?

Business Threats What could it mean for you?. Lesley Price Manager RSC East Midlands. Outline. Introduction Facts & Figures Examples from Industry Implications for educational establishments. There once was an employee ……. Update tracking system. Help desk. Information on JISC Services.

zalika
Download Presentation

Business Threats What could it mean for you?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Business ThreatsWhat could it mean for you? Lesley Price Manager RSC East Midlands

  2. Outline • Introduction • Facts & Figures • Examples from Industry • Implications for educational establishments.

  3. There once was an employee ……. Update tracking system Help desk Information on JISC Services Technical documentation Visit Colleges Technical Advice Web design

  4. Who spent their time …………. On-line games Downloading music from Napster Chat rooms Downloading Games Software Piracy ‘Borrowing’ blank cds Passing off documentation

  5. Resulting in ………….. Time wasting Poor customer service Poor team morale Additional Stress Lack of trust Illegal activities

  6. 2001 FBI Computer Crime and Security Survey • 40% detected system penetration from outside. • 25% in 2000 • 38% detected denial of service attacks • 27% in 2000 • 91% detected employee abuse of Internet access privileges • 79% in 2000 • 94% detected computer viruses • 85% in 2000

  7. Examples cited in the report • Online Con Artist Steals Identities of World's Richest • CD Rom containing details of thousands of prominent people. • Swedish hacker stored music and video on American University server. • Hacker gained access to confidential medical information at American University Medical School. • Glitch in AT & T’s Web site exposed billing information.

  8. Where does the threat come from? • Internal • Students • Staff • External • Random or deliberate • Disgruntled former staff/students • Mr/Mrs X in cyberspace

  9. How much do you rely on technology? • Management Information • Finance • Registers • Student Records • Personnel Records • Reports & Documentation stored electronically

  10. How much do you rely on technology? • Teaching & Learning • Virtual classrooms • Use of internet for resources • Use of e mail as essential method of communication • Supporting materials available in electronic format

  11. How much do you rely on technology? • Other uses • Research • Estates • Marketing • Purchasing • Etc. etc. • Is there an area that does not use technology?

  12. What are the threats? • Hi-tech Peeping Toms • Stealing identities • Stalking & harassment • Stealing information • Work-rage assaults • Incorrect information put into the system • Hacking • Introduction of viruses

  13. Possible implications ……. • Reduced performance of the network • Litigation • Loss of productivity • Physical loss of equipment • Damage to credibility and reputation of the institution • FINANCIAL COST

  14. Solutions ……..?? Only the bearer of bad tidings – need to wait until this afternoon!!

More Related