1 / 37

Introduction

Introduction. IT Tralee Republic of Ireland Speakers – Rebecca Flynn– Broadband & Tourism Edel Walsh- Cybercrime Patrick O’ Mahony- Encryption. Map Of Ireland. Tralee.

gefen
Download Presentation

Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction IT Tralee Republic of Ireland Speakers – • Rebecca Flynn– Broadband & Tourism • Edel Walsh- Cybercrime • Patrick O’ Mahony- Encryption

  2. Map Of Ireland

  3. Tralee • Tralee is the county town of County Kerry, in the south west corner of Ireland. The name Tralee comes from the Irish 'Trá Lí', or 'Trá Laoi', which means 'strand of the Lee' (river)

  4. IT Tralee • Firstly we will tell you a little about our college and Tralee itself.

  5. IT Tralee • The Institute of Technology, Tralee, has been to the forefront of learning since its establishment 30 years ago and has gained a reputation as a centre of distinction for teaching, learning and research. • The Institute offers a range of full-time and part-time programmes ranging from certificate through to honours degree and post-graduate Masters and Doctoral level. Enhancing the taught programmes at the Institute is a world class programme of research.

  6. Tralee • Tralee is the largest town in Kerry. The town's population including suburbs was 22,744 in the 2006 census.

  7. Tourism • Tralee is a major tourism destination and has seen some €55 million of tourism investment over the past several years. The town has developed a range of quality all weather visitor attractions. Tralee is also famous for the Rose of Tralee International Festival which is held annually in August.

  8. Sport • Tralee & Kerry has a strong sporting tradition and has a number of successful Gaelic Football Clubs and also a strong interest in Basketball.

  9. Education • In common with all parts of Ireland, most schools at all levels in Tralee are managed and owned by the churches. At secondary level most schools are explicitly Roman Catholic in ethos, except Gaelcholáiste Chiarraí, Tobar Mhaigh Dor.

  10. A little bit of home

  11. Broadband • And its effects on tourism and E-business in Ireland

  12. Broadband • Instant access saving time and money due to faster connection speeds and file transfer. Allows users to work from home with high speed access to corporate networks.

  13. Business Benefits of Broadband • Reduced costs • Improves Customer service • Benefits to employees • Benefit to marketplace • Increased productivity • Improved communication

  14. Improvements on Broadband in Ireland • Improve value for money for customers • Increase broadband awareness • Improve customer relations

  15. Uses of broadband in Irish Markets • Tourism is a prime example of how broadband has affected business in Ireland. • E.g. Fàilte Ireland (Irish Tourism Board)

  16. Focus of Fáilte Ireland • Fàilte Ireland’s dedicated E-business department • Services provided by Fàilte Ireland • Tourism Content System

  17. E-Courts • Establishment of special E-Courts • Update of Laws • Greater protection from threat of Cybercrime • Transfer of intellectual property should be reviewed

  18. Cybercrime

  19. What is cyber crime? • When a computer or network is a tool of the criminal • Examples include: • Spamming • Unauthorized access • Malicious code • Denial-of-service attacks • Etc

  20. Another way to define cybercrime is simply as criminal activities involving the information technology infrastructure: • Illegal access Misuse of Devices • Illegal interception Forgery • Data interference Electronic Fraud • Systems inference

  21. Research in 2006 • Every 10 seconds in Britain • 3.24 million times • 90% of crimes stay unreported

  22. Shirley McGuire a specialist in psychology of the University of San Francisco performed a study on 4800 students who hack and invade computer systems.

  23. Cybercrime • The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. • Most teenagers performed illegal computer actions of curiosity, to experience excitement.

  24. The love-bug virus Thursday, 4 May, 2000 • It crippled government and business computers in Asia and Europe • American State Department and the CIA, and major companies like Ford and Time-Warner. • first appeared in Hong Kong in the late afternoon • Analysts estimate hundreds of millions of dollars of damage has been caused in the US

  25. The love-bug virus Thursday, 4 May, 2000 • 1.27 million computer files were infected worldwide • The Love Bug e-mail appeared on computer screens in both houses of Congress in Washington and at the Pentagon. • It spread at great speed. One DJ in Texas received the e-mail virus 1,500 times.

  26. Cybercrime • The FBI have opened a criminal investigation. Reports suggest the virus may have originated in the Philippines. ISP Sky Internet Inc. in the Philippines are reported by ZDNet News to be hunting for a code writer who signed the virus code "Spyder, Manila, Philippines" and added the comment: "I hate go to school."

  27. Encryption

  28. Encryption • The Internet has grown at an incredibly fast rate and has excited both consumers and businesses with promises of changing the way we live and work. Lets be honest, there is a lot of information that we would not like other people to see, such as: • Bank Account Details • Credit Card Information • Social Security Number • Personal E-Mails • Employee or Business Records

  29. Encryption • E-Business relies on the ability to send and receive information securely. • Internet and computer security comes in a variety of methods but the most popular effective ones all rely on encryption. This process encodes information in such a way that only the person or computer with the “Key” can decode it.

  30. Encryption • Encryption is based on the ancient science of cryptography.

  31. Encryption • Computer encryption systems are divided into two categories: • Public-Key Encryption • Symmetric-Key Encryption

  32. Encryption • Public-Key Encryption –

  33. Encryption • Symmetric-Key Encryption –

  34. Encryption • Authentication – • This process works in tandem with encryption to create a secure environment on your computer. There are several ways to authenticate a person or their information on a computer – • Passwords • Digital Signatures • Biometrics

  35. Encryption • Biometrics uses biological information to verify the user’s identity. Some methods of Biometrics are : • Voice Identification • Face Scan • Retina Scan • Fingerprint Scan

  36. Encryption • Some good links – • www.entrust.com • www.pgp.com • www.tatanka.com • www.elock.com • www.qmw.ac.uk • www.ssh.fi/tech/crypto/intro.html

  37. That’s All Folks!

More Related