The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
National Cyber Security and Information (Cyber) Security Awareness Prof SH (Basie) von Solms Immediate Past President : IFIP University of Johannesburg.
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 1 Introduction to Security
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Internet Fraud By: Noelle Woodman.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
David M. Pujals CEO of T³ Corporation and On the Board of the White Hall Business Association Perspective & Scope of the Problem White Hall Business Association.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Cyber Security Nevada Businesses Overview June, 2014.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
Local Threat Report Vikram Kumar – Chief Executive, InternetNZ 22/08/2012.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Topic 5: Basic Security.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
INTRODUCTION & QUESTIONS.
Security Mindset Lesson Introduction Why is cyber security important?
Information Security: Current Threats Marc Scarborough Information Security Officer
Cybersecurity Test Review Introduction to Digital Technology.
Computer Security Mike Asoodeh & Ray Dejean Office of Technology Southeastern Louisiana University.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.
Team Electronics Automation & Machinery S-17, DLF Ind. Area, Phase-1, Sec-32, Faridabad ,
Broadband Challenges 2017 Christopher Tamarin
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Executive Director and Endowed Chair
Educause/Internet 2 Computer and Network Security Task Force
Cyber Security Awareness Workshop
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Securing Information Systems
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
Internet Security Threat Status
Philip Nichilo Vincent Carestia
Strategic threat assessment
Presentation transcript:

The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University of Johannesburg A Cyber Security Culture in Southern Africa

The Growing use of the Internet more and more web based systems rolled out e-everything the web user became the target much easier to compromise the end user than hack into the company’s systems

Information (Cyber) Security has to concentrate much more on the end (web) user providing ways to protect this end user Let us investigate some recent statistics concerning cyber incidents The Growing Cyber risk to the user

The Symantec Internet Security Threat Report (Symantec, April 2011) Symantec recorded nearly 3 billion malware attacks in % increase in Web attacks Identities on average exposed per breach 42% more mobile vulnerabilities Rustock, the largest botnet had well over one million bots under its control could be rented for US$ 15 for Denial of Service attacks The report also states : ‘The ability to research targets online has enabled hackers to create powerful social engineering attacks that easily fool even sophisticated users.’ 'A well-executed social engineering attack has become almost impossible to spot.’

The Sophos Security Threat Report infected websites are discovered every day. That’s one every 3.6 seconds 15 new bogus anti-virus vendor websites are discovered every day % of all business is spam The report further makes the following very worrying statement: ‘The vast majority of infected websites are in fact legitimate sites that have been hacked to carry malicious code. Users visiting the websites may be infected by simply visiting affected websites, … The scope of these attacks cannot be underestimated, since all types of sites – from government departments and educational establishments to embassies and political parties … - have been targeted.’

"The Internet is the crime scene of the 21st Century," (Wall Street Journal, 2010a)

The CISCO White Paper, 2009 ‘Internet users are under attack. Organized criminals methodically and invisibly exploit vulnerabilities in websites and browsers and infect computers, stealing valuable information (login credentials, credit card numbers and intellectual property) and turning both corporate and consumer networks into unwilling participants in propagating spam and malware’

CISCO Annual Security Report 2009 ‘as more individuals worldwide gain Internet access through mobile phones, Cyber criminals will have millions of inexperienced users to dupe with unsophisticated or well-worn scamming techniques that more savvy users grew wise to (or fell victim to) ages ago.’

Cyber Security Public Awareness Act, US, 2011 The damage caused by malicious activity in cyberspace is enormous and unrelenting. Every year, cyber attacks inflict vast damage on our Nation's consumers, businesses, and government agencies. This constant cyber assault has resulted in the theft of millions of Americans' identities; exfiltration of billions of dollars of intellectual property; loss of countless American jobs; vulnerability of critical infrastructure to sabotage; and intrusions into sensitive government networks.

Many countermeasures do exist, but one of the most important ones is to create a Culture of Cyber Security Awareness

From SA’s Draft National Cyber Security Policy

6. From SA’s Draft National Cyber Security Policy

Essential to ensure that all users must be made aware of inherent risks involved when venturing into cyber space. Core to such awareness is the challenge to create a national culture of Cyber Security Awareness in SA. Establish a Culture of Cyber Security

The International Telecommunications Union (ITU) is presently working on a toolkit to help to establish such a culture. The final product is not yet available, but some draft ideas are. The following initiatives are suggested by this draft document Implement a cyber-security plan for government-operated systems Implement security awareness programs and initiatives for users of systems and networks Encourage the development of a culture of security in business enterprises Support outreach to civil society with special attention to the needs of children and individual users Promote a comprehensive national awareness program so that all participants – businesses, the general public workforce and the general population – secure their own parts of cyber space Enhance Science and Technology (S&T) and Research and Development (R&D) activities Develop awareness of cyber risks and available results. Establish a Culture of Cyber Security

The First Southern African Cyber Security Awareness Workshop (SACSAW 2011) is specifically adding value in establishing such a Culture of Cyber Security in the following areas suggested by the ITU

The International Telecommunications Union (ITU) Implement security awareness programs and initiatives for users of systems and networks Support outreach to civil society with special attention to the needs of children and individual users Promote a comprehensive national awareness program so that all participants – businesses, the general public workforce and the general population – secure their own parts of cyber space Enhance Science and Technology (S&T) and Research and Development (R&D) activities Establish a Culture of Cyber Security

This value added by SACSAW 2011 is not in the form of esoteric academic efforts, but in terms of real life, immediately usable projects and examples which can be rolled out in any country

Ladies and Gentlemen Enjoy this special Workshop and ensure that you become part of rolling out such a Culture of Cyber Security in your country, province and working environment.

Thanks