1 / 13

Diana Lucas Adelia McClain Cynthia McDaniel Christopher Mullins Doris Murrel Joseph Needham

Case Study: Professional Football. Diana Lucas Adelia McClain Cynthia McDaniel Christopher Mullins Doris Murrel Joseph Needham. CSMN 601: Issues, Trends and Strategies for Computer Systems Management Spring 2007. Overview. Synopsis of Professional Football Organization

gilda
Download Presentation

Diana Lucas Adelia McClain Cynthia McDaniel Christopher Mullins Doris Murrel Joseph Needham

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Case Study: Professional Football Diana Lucas Adelia McClain Cynthia McDaniel Christopher Mullins Doris Murrel Joseph Needham CSMN 601: Issues, Trends and Strategies for Computer Systems Management Spring 2007

  2. Overview • Synopsis of Professional Football Organization • Identity Theft Issues and Countermeasures • Threats on Portable Computers and Countermeasures • Mobile Access to Games • Network for Mobile Access

  3. NFLSynopsis • 32 teams • Two, 16- team conferences • Four, 4-team divisions • Uses cable and satellite television, radio, satellite radio, and Internet radio to broadcast its games

  4. STATS & Facts • What is Identity Theft? • Identity theft is one of today’s fastest growing crimes. • Identity theft has increased on the Internet due to its inability to physically verify an applicants’ identity. Thieves apply for, and often receive multiple credit cards, personal loans, automobile loans, checking accounts, and other accounts in the name of the victim. • Despite the numerous safeguards in place by financial advisors who monitor the accounts of celebrities and star athletes, they remain vulnerable in today's age of information in which a wealth of personal data can be accessed with a few keystrokes on a computer. • Some think the proliferation of information about athletes—including birthdays, middle names, parents’ names, etc.—on websites and media guides / booklets has exacerbated the problem. • Almost seven members of every NFL team could be impacted by identity theft. • NFL players are often the targets of identity theft.

  5. SAFETY Resources Resource Business Solutions – identity theft-consulting firm Offers: customized protection plan, Credit report monitoring, Assigned recovery advocate, Damage assessment and recovery plan, Recovery team services family coverage option, Reimbursement for lost income and expenses, The key to successful and speedy recovery is early detection. Intersections Leading provider of identity theft protection and credit management solutions, teamed up with the NFLPA (National League Players Association) to help professional football players monitor and manage their personal financial information and protect their identity. Offers the company powerful IDENTITY GUARD Credit protection free of charge for the first year. To NFL players and their coaches. FACTA Fair and Accurate Credit Transaction Act – protects consumers from identity theft and aid in its prevention. Ensures all citizens are treated fairly when applying for credit and entitles them to a free annual credit report to verify its accuracy. Credit Bureaus Equifax 800-525-6285 Experian – 888-397-3742 TransUnion – 800-680-7289 FTA Federal Trade Commission

  6. GAME Plan • DEFENSIVE Strategies • Manage personal identity cautiously • Avoid giving it out on the phone or mail. Internet transactions should be through secure and encrypted mode. This information includes credit card information, birth date, your mother's maiden name or Social Security Number. • Shred sensitive, personal, and financial documents • Periodically review your credit report to catch suspicious activity • Review credit card and bank statements carefully • Cancel cards that you are not using • Eliminate junk mail, mailing lists, including those for pre-approved credit cards. • NFL annual symposium for both rookies and long-term players • Sign autographs differently than on checks • Don’t include address or social security number on checks • Criminal background checks • Lock mailbox • The risks are substantially smaller if the misuse is discovered quickly; be PROACTIVE. • OFFENSIVE Measures • Contact credit reporting agencies to put a fraud alert on your credit file • File crime reports with law enforcement agencies, • Contact the security departments of merchants listing unauthorized accounts, • Remain persistent.

  7. PENALIZED Players Tiger Woods Pro Golfer Michael Bennett Kansas City Chiefs Oprah Winfrey Talk Show Host Ty Law Kansas City Chiefs Ted Turner Media Mogul Roy Williams Detrioit Lions

  8. NETWORKS of Today Source: http://en.wikipedia.org/wiki/NFL_on_television#Sunday_regional_coverage 8

  9. Mobile RECEPTION • Threats • A high volume of unprotected data is available on portable devices; • This data becomes much less secure outside the corporate security realm; • Without adequate protection the user is virtually inviting the public inside their corporation's networks; • The popularity of portable systems makes it convenient for thieves; 9

  10. PortableDEVICES • Threats • Laptops may be stolen purely for the value of the hardware, as well as, for the secrets they contain. • Devices that are connected to the internet, especially those with a wireless connection, are also susceptible to network attacks • The theft of the portable device could have serious consequences to potential players and the recruiting agency.

  11. PortableDEVICES • Countermeasures • Use passwords correctly: • Use Strong Passwords; • Don't allow computer to remember passwords, • Use different passwords for different programs • Encryption: • Encrypting files. • Full disk encryption

  12. PortableDEVICES • Countermeasures (continued) • Protect Laptop against Theft: • Do not leave the laptop unattended; • Invest in an alarm for laptop bag; • Use a cable lock; • Downplay the portable device: • Avoid using in public areas and consider non-traditional bags for carrying a laptop. • Back up files: • Backups of important information should be made and stored in a separate location.

  13. PortableDEVICES • Countermeasures (continued) • Install and maintain anti-virus software: • Keep virus definitions up to date; • Install and maintain a firewall: • Firewalls are especially important if you are traveling and utilizing different networks, because it can help prevent outsiders from gaining unwanted access to your device;

More Related