Navigating Security in the World of Emerging Technologies

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Introduction Cloud characteristics Security and Privacy aspects Principal parties in the cloud Trust in the cloud 1. Trust-based privacy protection 2.Subjective.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Dell Connected Security Solutions Simplify & unify.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
1 Anti Hacker Poetry in the Mac OS X Your karma check for today: There once was a user that whined/ his existing OS was so blind/ he'd do better to pirate/
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Information Systems Security Operations Security Domain #9.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Android Mobile Security Krystal Salerno. Introductions.
Chapter 8 Managing Operations. Key Points in Chapter 8 Outsourcing IS Functions Outsourcing IS Functions Security in the Internet Age Security in the.
Secui.com Goh, Kyeongwon Secui.com Goh, Kyeongwon GRID Security Infrastructure
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Antimalware Smackdown Name: Frank Simorjay Title: TwC Sr. Product Manager Microsoft Corporation Name: Scott Wu Title: MMPC Technical Program Manager Microsoft.
Information Management System Ali Saeed Khan 29 th April, 2016.
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Chapter 1: Roles and Opportunities for Information Technology in Meeting Sustainability Challenges Helynranta Viola Parkkila Vilma
Context Rich Systems Market to Global Analysis and Forecasts by Component, Device and Vertical No of Pages: 150 Publishing Date: Apr 2017 Single.
Context Rich Systems Market to Global Analysis and Forecasts by Component, Device and Vertical No of Pages: 150 Publishing Date: May 2017 Single.
IEEE Computer Society Digital Library (CSDL)
Grievance Systems Real-time awareness changing the landscape of workers relations and stakeholder engagement.
Chapter 5 Electronic Commerce | Security Threats - Solution
Cisco's Assurance System
Hotspot Shield Protect Your Online Identity
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
Data and database administration
Honeypot in Mobile Network Security
Threats By Dr. Shadi Masadeh.
Secure Software Confidentiality Integrity Data Security Authentication
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.
Chapter 5 Electronic Commerce | Security Threats - Solution
Cyber Security By: Pratik Gandhi.
Chapter 5 Electronic Commerce | Security
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Microsoft’s Security Strategy
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
CYB 110 Competitive Success/snaptutorial.com
Consumer Benefits of Web Marketing
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Internet of Things (IoT)
Playing Safely in the Cloud
Chapter 5 Electronic Commerce | Security
Home Internet Vulnerabilities
Playing Safely in the Cloud
Cyber Security professions Overview
9 ways to avoid viruses and spyware
Security Hardening through Awareness August 2018
Networking for Home and Small Businesses – Chapter 8
By Oscar Suciadi CS 157B Prof. Sin-Min Lee
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
(With Hybrid Network Support)
Information security planning
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
JIM THE CAT.
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
Session 1 – Introduction to Information Security
INTERNET SECURITY.
Presentation transcript:

Navigating Security in the World of Emerging Technologies By Assoc. Prof Dr. Omar Zakaria Vice President Information Security Professional of Malaysia (ISPA.my)

Agenda Introduction Establishing the Status Quo of The Region’s Security Progression The Dynamic Business Environment of Virtual and Mobility Emerging Technologies vs. New Threats Question & Answer

Introduction Emerging Technologies in many domains: Agriculture Biomedical Displays Electronics Energy

InTRODUCTION (CONT..) IT and Communications (4G, AI, Pervasive Computing, Cloud etc.) Manufacturing Materials Science Robotics Transport

Introduction (cont..) How these technologies affect security? Ethical issue (i.e. act as Robin Hood?) Way to do things (i.e. physically vs. mobile/remote) New facilities offer new opportunities (i.e. location tracer)

Introduction (cont..) How these technologies affect security? More ways to exploit vulnerabilities (i.e. built-in tools, GUI hackers’ tools) New threats (i.e. viruses on smartphone) More countermeasures (i.e. anti-viruses software on smartphone)

Introduction (cont..) It is a need to navigate security in these emerging technologies: Establishing status quo Sustaining in dynamic environment (virtual and mobility) Emerging technologies vs. threats landscape

Establishing status quo Staff as security partner Obtaining ISO ISMS 27001:2005 Enforcement on privacy protection Perform penetration testing/ vulnerability test/PSA Treat information security as “all are responsible” rather than “they are responsible”

Establishing status quo (CONT..) Practising multi-authentication Accountability aspects Registered users for gaining access to free WiFi Secure programming approach

ESTABLISHING STATUS QUO (Cont..) Guidelines on networking scanning Data security agreement in cloud Trust level (i.e. trusted third parties)

Sustaining in Dynamic Environment Issues that need to be considered: Consumerisation (i.e. disclosure of consumer’s location) BYOD authentication Mobile-phone anti-virus scanning Pervasive computing Virtual reality

Emerging Technologies vs. Threats Landscape Smartphone/ Mobile threats Embedded hardware Virtual currency Advances in OS Blinking online traffic lights

Emerging Technologies vs. Threats Landscape (CONT..) Rogue certificates Cyberwar showoffs Hactivism Legalised spam Industrial attacks (blackmail or extortion)

conclusion Provide alternative ways to do things Enforce new countermeasure on new threat Emerging technologies also change threat landscape Security is a hardening process and not 100% a secure process

Q & A Session Thank you Any queries can send to omar@ispa.my Interested in ISPA? Visit this URL: www.ispa.my UPNM? Visit this URL: www.upnm.edu.my