CYBERTHON Use-cases.

Slides:



Advertisements
Similar presentations
Account HIGHJACKING & IDENTITY THEFT GPCE Credit Union has prepared a slide show presentation to examine the most prevalent financial crimes at work today.
Advertisements

PORTFOLIO.  TYPE OF INTERNET TRANSACTION 1. ONLINE BANKING 2. ONLINE SHOPPING.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
Security+ Guide to Network Security Fundamentals
FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.
Michigan’s Digital Strategy Michigan Information Systems Association Passport to Smarter Government September 18, 2014 Presented by: David Behen DTMB Director.
Electronic Transaction Use & Risk of Identity Theft.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Securing Information Systems
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
Slide 1 City of Seattle 8 October 2004 Nine Tough Questions Bill Schrier, CTO, City of Seattle Nine Tough Questions Mayors Should Ask Their Geeks For Mayors’
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
A Cyber- Security Portal for Southern Africa Dr. Johan van Niekerk & Prof. Rossouw von Solms.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Information Warfare Playgrounds to Battlegrounds.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Aware the Effect of Social Network For 1 Malaysia’s Safety Towards A Healthy Virtual Socialization.
Maritime Cyber Vulnerabilities in the Energy Sector Center for Joint Operations of the Sea ODU Maritime Institute Students Crow, Fresco, Lee.
What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Network security Product Group 2 McAfee Network Security Platform.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Andrew Staniforth Chapter 17 - Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 213.
E- Enterpris e. What is e- Enterprise??? Business conducted online using any Internet based application. Designed to educate on appropriate online buying.
Other Types of Fraud FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud in E-Commerce Chapter 15.
Consumer Authentication for Networked Personal Health Information Redwood Health Information Collaborative March 18, 2008 Josh Lemieux Director, Personal.
Can you spot the honest customer… …from the fraudster? Presentation by: Alex Bowes, Corporate Sales Manager, 192.com Business Services.
Identity Assurance Emory University Security Conference March 26, 2008.
Homework for Wed’s topic: Threats to E-Commerce 1. Review Chapter 5 in Laudon textbook 2. “Facebook's Top Cop”— Joe Sullivan and a staff of 50 people Fortune.
Information Warfare Playgrounds to Battlegrounds.
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
Internet Dangers Technology Communication Tools E-Literate.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Consumer Fraud Chapter 14.
Online Security Myths & Challenges HIGHER COLLEGES OF TECHNOLOGY Abeer Nijmeh Account Manager April 14, 2002.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Problem being addressed –Fraudsters file in advance of the actual taxpayer resulting in lost government dollars ($5.2M in payments to fraudulent identities.
Digital Security Focus Area & Critical Infrastructure Protection in H2020 SC7 WP Aristotelis Tzafalias Trust and Security Unit DG Communications.
Kevin Watson and Ammar Ammar IT Asset Visibility.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud in E-Commerce Chapter 17.
CMGT 411 Week 3 Individual Attack Prevention Article Evaluation Using various Internet sources, find an article or website on attack prevention. Prepare.
Security and resilience for Smart Hospitals Key findings
Broadband Challenges 2017 Christopher Tamarin
Horizon 2020 Secure Societies European Info Day and Brokerage Event
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
ACC 571 EDU Education Terms/acc571edu.com
Cyber Security Zafar Sadik
Emerging Payments Market Developments: Trends and Risks James Van Dyke, President and Founder Presented at the Federal Reserve Bank of Atlanta, November.
Software Security Testing
A Project on CYBER SECURITY
Trends in my profession, Information Technology
CSI Survey 2007 Tiffany Gorman
Home Internet Vulnerabilities
Securing the Threats of Tomorrow, Today.
INFORMATION SYSTEMS SECURITY and CONTROL
John Carlson Senior Director, BITS
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
DIGITALIZATION AND SUPPLY CHAIN RISK AMONG COMMERCIAL BANKS IN KENYA
WELCOME AOI Tech Solutions Get Instant Tech Help & Support.
Security Considerations for the Enterprise
WELCOME AOI Tech Solutions - Network Security.
Department of Corporate Secretaryship
Streamline your move to the cloud
Global Cyber Security Market (By Product Segments, Service Segments, Industry Verticals, Geography, Recent Developments) - Forecast to 2025
Presentation transcript:

CYBERTHON Use-cases

Cyber Security Awareness Increased usage of internet, mobile and gadgets, has widened the surface area of cyber attacks. There is a need for every citizen to be equipped with fundamentals of cyber security to prevent attacks towards their assets. Develop an application to bring security awareness among citizens Pick common vulnerable areas of attacks Intuitive workflows

Fraud Call detection Identity theft is becoming prevalent with advancement of online transactions as well increased usage of social networks. One aspect of identity theft is fraudsters impersonating to collect personal identity. Develop an application that can detect fraud calls through various channels. Detect Fraudsters Intuitive workflows

Prevent Question Paper Leak Every year around examination time, students who have worked hard throughout the year fear on one major news - question paper leak. Over the year this has become an epidemic. It is important we prevent these leaks in order to ensure government’s investments and reforms in education sector. Develop an application to address this epidemic. Intuitive workflows Scalable model Remote reachability