TECH. - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

TECH.

Description:

A 'phishing' email contains official looking urls, addresses, and logos to gain ... a nutshell criminalized Internet scams involving fraudulently obtaining personal ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 14
Provided by: tyle
Category:
Tags: tech | scams

less

Transcript and Presenter's Notes

Title: TECH.


1
TECH.
  • NEWS

2
Survey Results
  • 13-1 believed Pres. Bush crossed the line
  • 11-3 would not like to see CCTV installed in
    Public facilities
  • 9-5 believed CCTV is a invasion of priacy
  • 10-4 would not feel safer with the installment of
    CCTV
  • 13-1 believe the Naked Scaner is an invasion of
    privacy
  • 10-4 would take the machine over a frisk
  • 9-0 would not fly if they had to wear only a
    surgeons gown
  • 8-6 believe with the advancement of RFID
    technology that we will become serial numbers

3
Quick Fixes
  • How long has is taken for 2.5 million CCTV
    cameras to be installed in the UK?
  • The use of CCTV began in the 70s and 80s on a
    small scale
  • One of the first cases of outdoor CCTV was in
    Bournemouth in 1985
  • CCTV started on the big scale in the 1990s
  • With the passing of CCTV Looking Out for you
    issued by Home Office in 1994, CCTV took off

4
More Quick Fixes
  • Is there a special type of holder available to
    prevent the use of an unwanted scanner?
  • There are other protections used as well
  • The chips come installed with extra layers of
    metal
  • The chips can also sense a differentiation in
    thermal and UV light usage.

5
Consent Debate
  • Legal in public place
  • Legal if non profit
  • Illegal in place where privacy is expected (
    bathroom, bedroom)
  • Illegal if ease dropping
  • Illegal if you slander what people have said
    (Borat the Movie)

6
RFID on Containers
  • Currently two government initiatives to help the
    screening process of shipping containers
  • CSI (Container Security Initiative)
  • SST (Smart and Secure Tradelanes)
  • The primary advantage to RFID in a port is it is
    automatic data collection. Two benefits
  • Accurate and complete data collection
  • Better utilization of employees time.

7
CSI
  • CSI is intended to extend the U.S.s zone of
    security outward, making them the last line of
    defense.
  • CSI consists of four core elements
  • Establish security criteria for identifying high
    risk containers based on advance information
  • Pre-screen containers ASAP
  • Use technology to quickly pre-screen high risk
    containers.
  • Develop secure and "smart" containers.

8
SST
  • Trying to improve the security and productivity
    of cargo shipments with the technology available
    including RFID smart seals
  • Monitor containers security at all times
  • Speed shipments through the supply chain
  • Verify the container was loaded securely
  • Reduce probability of a tamper event
  • Gather data to conduct a "virtual inspection"
  • Make sure containers meet governmental security
    regulations.
  • Receive "green lane" through customs
  • Avoid delays in the shipment process
  • Minimize the cost of handling

9
RFID Security Features
  • RFID also allows increase in security in 5 ways
  • Access Control
  • Container Security
  • Container Identification/Location
  • Activity Tracking
  • Regulatory Compliance

10
Phishing
  • Show video clip Email Phishing
  • The act of phishing is referred to as an
    attempt to fraudulently obtain personal
    information such as credit card numbers,
    passwords, and/or your social security number.
  • A phishing email contains official looking
    urls, addresses, and logos to gain your trust so
    you are easily persuaded to hand over your
    information on a platter.
  • On February 28th 2005, the Anti-Phishing Act was
    passed. The act in a nutshell criminalized
    Internet scams involving fraudulently obtaining
    personal information, commonly known as phishing.

11
(No Transcript)
12
Phishing Prevention
  • How to protect yourself from a phishing email
  • DONT respond
  • Report the suspicious website
  • Dont click any links on the email you receive
  • Check the security certificates of the website
  • Type the url of the website you need directly
  • Dont type personal information into pop up
    windows
  • Update prevention software

13
TECH.
  • NEWS
Write a Comment
User Comments (0)
About PowerShow.com