370 likes | 391 Views
Introduction. IT Tralee Republic of Ireland Speakers – Rebecca Flynn– Broadband & Tourism Edel Walsh- Cybercrime Patrick O’ Mahony- Encryption. Map Of Ireland. Tralee.
E N D
Introduction IT Tralee Republic of Ireland Speakers – • Rebecca Flynn– Broadband & Tourism • Edel Walsh- Cybercrime • Patrick O’ Mahony- Encryption
Tralee • Tralee is the county town of County Kerry, in the south west corner of Ireland. The name Tralee comes from the Irish 'Trá Lí', or 'Trá Laoi', which means 'strand of the Lee' (river)
IT Tralee • Firstly we will tell you a little about our college and Tralee itself.
IT Tralee • The Institute of Technology, Tralee, has been to the forefront of learning since its establishment 30 years ago and has gained a reputation as a centre of distinction for teaching, learning and research. • The Institute offers a range of full-time and part-time programmes ranging from certificate through to honours degree and post-graduate Masters and Doctoral level. Enhancing the taught programmes at the Institute is a world class programme of research.
Tralee • Tralee is the largest town in Kerry. The town's population including suburbs was 22,744 in the 2006 census.
Tourism • Tralee is a major tourism destination and has seen some €55 million of tourism investment over the past several years. The town has developed a range of quality all weather visitor attractions. Tralee is also famous for the Rose of Tralee International Festival which is held annually in August.
Sport • Tralee & Kerry has a strong sporting tradition and has a number of successful Gaelic Football Clubs and also a strong interest in Basketball.
Education • In common with all parts of Ireland, most schools at all levels in Tralee are managed and owned by the churches. At secondary level most schools are explicitly Roman Catholic in ethos, except Gaelcholáiste Chiarraí, Tobar Mhaigh Dor.
Broadband • And its effects on tourism and E-business in Ireland
Broadband • Instant access saving time and money due to faster connection speeds and file transfer. Allows users to work from home with high speed access to corporate networks.
Business Benefits of Broadband • Reduced costs • Improves Customer service • Benefits to employees • Benefit to marketplace • Increased productivity • Improved communication
Improvements on Broadband in Ireland • Improve value for money for customers • Increase broadband awareness • Improve customer relations
Uses of broadband in Irish Markets • Tourism is a prime example of how broadband has affected business in Ireland. • E.g. Fàilte Ireland (Irish Tourism Board)
Focus of Fáilte Ireland • Fàilte Ireland’s dedicated E-business department • Services provided by Fàilte Ireland • Tourism Content System
E-Courts • Establishment of special E-Courts • Update of Laws • Greater protection from threat of Cybercrime • Transfer of intellectual property should be reviewed
What is cyber crime? • When a computer or network is a tool of the criminal • Examples include: • Spamming • Unauthorized access • Malicious code • Denial-of-service attacks • Etc
Another way to define cybercrime is simply as criminal activities involving the information technology infrastructure: • Illegal access Misuse of Devices • Illegal interception Forgery • Data interference Electronic Fraud • Systems inference
Research in 2006 • Every 10 seconds in Britain • 3.24 million times • 90% of crimes stay unreported
Shirley McGuire a specialist in psychology of the University of San Francisco performed a study on 4800 students who hack and invade computer systems.
Cybercrime • The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. • Most teenagers performed illegal computer actions of curiosity, to experience excitement.
The love-bug virus Thursday, 4 May, 2000 • It crippled government and business computers in Asia and Europe • American State Department and the CIA, and major companies like Ford and Time-Warner. • first appeared in Hong Kong in the late afternoon • Analysts estimate hundreds of millions of dollars of damage has been caused in the US
The love-bug virus Thursday, 4 May, 2000 • 1.27 million computer files were infected worldwide • The Love Bug e-mail appeared on computer screens in both houses of Congress in Washington and at the Pentagon. • It spread at great speed. One DJ in Texas received the e-mail virus 1,500 times.
Cybercrime • The FBI have opened a criminal investigation. Reports suggest the virus may have originated in the Philippines. ISP Sky Internet Inc. in the Philippines are reported by ZDNet News to be hunting for a code writer who signed the virus code "Spyder, Manila, Philippines" and added the comment: "I hate go to school."
Encryption • The Internet has grown at an incredibly fast rate and has excited both consumers and businesses with promises of changing the way we live and work. Lets be honest, there is a lot of information that we would not like other people to see, such as: • Bank Account Details • Credit Card Information • Social Security Number • Personal E-Mails • Employee or Business Records
Encryption • E-Business relies on the ability to send and receive information securely. • Internet and computer security comes in a variety of methods but the most popular effective ones all rely on encryption. This process encodes information in such a way that only the person or computer with the “Key” can decode it.
Encryption • Encryption is based on the ancient science of cryptography.
Encryption • Computer encryption systems are divided into two categories: • Public-Key Encryption • Symmetric-Key Encryption
Encryption • Public-Key Encryption –
Encryption • Symmetric-Key Encryption –
Encryption • Authentication – • This process works in tandem with encryption to create a secure environment on your computer. There are several ways to authenticate a person or their information on a computer – • Passwords • Digital Signatures • Biometrics
Encryption • Biometrics uses biological information to verify the user’s identity. Some methods of Biometrics are : • Voice Identification • Face Scan • Retina Scan • Fingerprint Scan
Encryption • Some good links – • www.entrust.com • www.pgp.com • www.tatanka.com • www.elock.com • www.qmw.ac.uk • www.ssh.fi/tech/crypto/intro.html