Emerging Internet Threats Graham Connolly Websense Territory Manager Australia & New Zealand.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Bank Crime Investigation Techniques by means of Forensic IT
P.E.O. Salt Lake City Reciprocity Meeting Keeping Safe Using Technology April 8, 2010 Presented by Rebecca Conant (Y) P.E.O. Salt Lake City Reciprocity.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Digital Citizenship By: Miranda Scorver.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Scams & Schemes Common Sense Media.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
Jamel Callands Austin Chaet Carson Gallimore. Downloading
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
Get Safe Online Expert advice for everyone In association with.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
H UMAN R ISKS By: Rachel, Melika, & Mellisa. H UMAN R ISKS Risks caused by human mistakes or dishonesty, or other risks that can be controlled by humans.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Phishing, identity theft, and more
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
I S P S loss Prevention.
Protect Your Computer Against Harmful Attacks!
Year 10 ICT ECDL/ICDL IT Security.
Information Security Session October 24, 2005
Internet Safety Vocabulary
Philip Nichilo Vincent Carestia
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety and Security Curtis Shaw nwtel.ca November 2012
Computer Security.
Security in mobile technologies
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Emerging Internet Threats Graham Connolly Websense Territory Manager Australia & New Zealand

Bandwidth Hogs Productivity Drains Security Risks Inappropriate Material

80% of network security managers claim their biggest security threat comes from their own employees. Gartner

Websense Enterprise

3m users sharing 4.2m GB Over Port 80 – Firewall can’t block e.g. Lord of The Rings: 1.4GB

Spyware Information leakage Bandwidth problems PC stability problems: –Dell: 12 percent of all consumer tech support calls caused by spyware (Wired, May 04) –Microsoft: 50% of all computer crashes reported by its customers are caused by spyware (Wired, May 04)

Ad-aware Spybot

Embedded virus code in webpage

Phishing Fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords. –Credit card fraud –Identity theft –Financial loss. November 2003 = 28 scams April 2004 = 1125 scams 5% of recipients to respond source:antiphishing.org

Streaming Media Radio –10 users, 8 hours per day, 20 days per month = 20GB Video –5 minute video = 16MB at 60k/sec

Instant Messaging Port tunneling Attachments Hacking / viruses

Websense Explorer Analytics & Forensics Reporting Demo Reporting Demo

Addressing the Threats Employee Hacking –Block access to hacking websites and applications Music, porn, games, movie downloads –Kill the P2P protocol on your network Malicious and Phished websites –Block access to infected or scammed sites Spyware –Block outbound communication and websites Streaming Media –Manage who and when SM can be accessed Security hole via Instant Messaging –Block attachments

Thank You for Your Time Conduct an Internet Access Policy Compliance Check (02) Q&A