140 likes | 242 Views
Business Threats What could it mean for you?. Lesley Price Manager RSC East Midlands. Outline. Introduction Facts & Figures Examples from Industry Implications for educational establishments. There once was an employee ……. Update tracking system. Help desk. Information on JISC Services.
E N D
Business ThreatsWhat could it mean for you? Lesley Price Manager RSC East Midlands
Outline • Introduction • Facts & Figures • Examples from Industry • Implications for educational establishments.
There once was an employee ……. Update tracking system Help desk Information on JISC Services Technical documentation Visit Colleges Technical Advice Web design
Who spent their time …………. On-line games Downloading music from Napster Chat rooms Downloading Games Software Piracy ‘Borrowing’ blank cds Passing off documentation
Resulting in ………….. Time wasting Poor customer service Poor team morale Additional Stress Lack of trust Illegal activities
2001 FBI Computer Crime and Security Survey • 40% detected system penetration from outside. • 25% in 2000 • 38% detected denial of service attacks • 27% in 2000 • 91% detected employee abuse of Internet access privileges • 79% in 2000 • 94% detected computer viruses • 85% in 2000
Examples cited in the report • Online Con Artist Steals Identities of World's Richest • CD Rom containing details of thousands of prominent people. • Swedish hacker stored music and video on American University server. • Hacker gained access to confidential medical information at American University Medical School. • Glitch in AT & T’s Web site exposed billing information.
Where does the threat come from? • Internal • Students • Staff • External • Random or deliberate • Disgruntled former staff/students • Mr/Mrs X in cyberspace
How much do you rely on technology? • Management Information • Finance • Registers • Student Records • Personnel Records • Reports & Documentation stored electronically
How much do you rely on technology? • Teaching & Learning • Virtual classrooms • Use of internet for resources • Use of e mail as essential method of communication • Supporting materials available in electronic format
How much do you rely on technology? • Other uses • Research • Estates • Marketing • Purchasing • Etc. etc. • Is there an area that does not use technology?
What are the threats? • Hi-tech Peeping Toms • Stealing identities • Stalking & harassment • Stealing information • Work-rage assaults • Incorrect information put into the system • Hacking • Introduction of viruses
Possible implications ……. • Reduced performance of the network • Litigation • Loss of productivity • Physical loss of equipment • Damage to credibility and reputation of the institution • FINANCIAL COST
Solutions ……..?? Only the bearer of bad tidings – need to wait until this afternoon!!