Cyber Security Zafar Sadik

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Ethics, Privacy and Information Security
Computer Fraud Chapter 5.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
General Security Guidelines Best Practices for Everyone Presented at: Nextbridge LHR C1 June 1, 2012.
Course ILT Security overview Unit objectives Discuss network security Discuss security threat trends and their ramifications Determine the factors involved.
Security+ Guide to Network Security Fundamentals
CHAPTER 4 Information Security. Announcements Project 2 – due today before midnight Tuesday Class Quiz 1 – Access Basics Questions/Comments.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
E-Commerce Security and Fraud Issues and Protections
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 3 Ethics, Privacy & Security
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Dell Connected Security Solutions Simplify & unify.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Desktop Security: Making Sure Your Office Environment is Secure.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
Securing Information Systems
Securing Information Systems
Your Partner for Superior Cybersecurity
Cybersecurity - What’s Next? June 2017
IT Security  .
Journey to Microsoft Secure Cloud
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
CHAPTER 4 Information Security.
Dissecting the Cyber Security Threat Landscape
Securing Information Systems
Matt G change over point ?
Today’s Risk. Today’s Solutions. Cyber security and
Week 7 Securing Information Systems
Unit 1.6 Systems security Lesson 2
E-Commerce Security and Fraud Issues and Protections
Prepared By : Binay Tiwari
Identity & Access Management
Securing the Threats of Tomorrow, Today.
INFORMATION SYSTEMS SECURITY and CONTROL
Secure once, run anywhere Simplify your security with Sophos
Cybercrime and Canadian Businesses
Computer Security By: Muhammed Anwar.
ITU-T Workshop on Security, Seoul (Korea), May 2002
Presentation transcript:

Cyber Security www.computechlimited.com Zafar Sadik Zafar.sadik@computechlimited.com www.computechlimited.com KENYA | UGANDA | TANZANIA | RWANDA | |ZAMBIA | BURUNDI

Security Incidents Kenyan Facebook users have lost millions of shillings to hackers(Identity Theft) An Airline company had to convince the committee inquiring into its affairs over whether it’s IT system is secure (lack of access revocation) 2014. “Kenya Arrests 77 Chinese Nationals in Cybercrime Raids.”Ransomware, Phishing, DDOS , SQL Injection, Advanced Persistent Threats In 2014, for instance, Kenya Banking Fraud Investigations Department reported hacking into customer bank accounts between 2012 and 2013 that led to losses of Sh1.49 billion. The schemes were hatched by staff The annual cost of cybercrime to Kenyan companies in 2015 is estimated to be KES 15 billion (USD146 Million). 2017 wannacry outbreak (Ransomware)

Business survival depends on information security. Protects information from a range of threats Ensures business continuity Minimizes financial loss Optimizes return on investments Increases business opportunities Business survival depends on information security.

Threat Sources Source Motivation Threat External Hackers Challenge Ego Game Playing System hacking Social engineering Dumpster diving Internal Hackers Deadline Financial problems Disenchantment Backdoors Fraud Poor documentation Terrorist Revenge Political System attacks Social engineering Letter bombs Viruses Denial of service Poorly trained employees Unintentional errors Programming errors Data entry errors Corruption of data Malicious code introduction System bugs Unauthorized access

Security Maturity Assessment Chart

Security - Journey

Security - Framework

Cyber Security Can you account for all access to your systems? Do you have full Visibility over your Entire environment? How long would it take you to detect and recover from a cyber attack? Would better Cyber security increase revenue or reduce costs? Do you know exactly how many assets you have and if they are fully protected? At the beginning of the year we restructured to 4 business units so as to have the right focus to our customers

Cyber Security ACCESS PROTECTION ASSET PROTECTION Advanced Threat Protection Sandboxing Web & Email Gateways Data Loss Prevention Encryption Data Integrity Antivirus / Anti Malware Employee Access & Activity Monitoring Asset Mgmt Vulnerability / Patch Mgmt Anti Ransomware Anti Phishing / Anti Spam Rights Mgmt Data Privacy / Integrity Fraud Mgmt IT Disaster Recovery & Mgmt Bring Your Own Device Mgmt ASSET PROTECTION Next Gen Firewall Internal Firewall Unified Threat Mgmt Network Access Control Identity & Access Mgmt Anti DDOS Wifi Protection Internet Of Things Database Access Mgmt / Database Firewall Web Application Firewall Multi Factor Authentication Anti Web Page Hijacking Anti Man In The Middle Attacks Application Rating Priviledged Identity and Access Mgmt Intrusion Prevention / Detection System Security Incident & Event Mgmt At the beginning of the year we restructured to 4 business units so as to have the right focus to our customers

Thank You!