Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club,

Slides:



Advertisements
Similar presentations
SHRM-GT SPOTLIGHT Membership Committee. Meet the Committee Garrett Kowalewski, Chair Owner, in the process of founding a new technical and general staffing.
Advertisements

Are You Smarter Than a 5 th Grader? 1,000,000 Blog Online Search Kindle? Documents? Backup Virus click here! Downloading Music Expiration Date?
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Lighting Up the Dark Side of the Web Colin Rose Quarter Past Five Limited Monday 11 th October 2004.
Cyber X-Force-SMS alert system for threats.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Social Engineering PA Turnpike Commission. “Social Engineering is the practice of obtaining confidential information by manipulation of legitimate users”
Using Wireless Laptops August Academy August 2, 2007 Kerry George.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Lecture 16 Page 1 CS 236 Online Cross-Site Scripting XSS Many sites allow users to upload information –Blogs, photo sharing, Facebook, etc. –Which gets.
DIRECT MARKETING Saket Kandoi Tanja Janjilovic Katarina Matkovic Jusa Neza Mihelcic Jessica Dávila Kaja Vidic IT4Everybody.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Digital Citizenship By Bhavna. Plagiarism Plagiarism is illegal and can get you arrested. If a teacher finds out you used plagiarism he/she can fail you.
Social impacts of the use of it By: Mohamed Abdalla.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
PC Support & Repair Chapter 10 Communication Skills.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
Chapter Intranet Agents. Chapter Background Intranet: an internal corporate network based on Internet technology. Typically, an intranet can.
Reliability & Desirability of Data
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Krug Book Presentation By Ian Novickis For MFC215.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
©Holm Publications Security Awareness Presentation.
Adrian Ellison Assistant Director, IT Services Wednesday 23 November 2011.
CYBER CRIME.
Staying Safe Online A Practical Guide for Middle School Students.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Putting it all together Dynamic Data Base Access Norman White Stern School of Business.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
ITCS373: Internet Technology Lecture 5: More HTML.
The Internet Do you really know what is out there?
CCT355H5 F Presentation: Phishing November Jennifer Li.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Cyber Security and Staying Safe Online Mark D. Riley College of Health Sciences and Professions.
All you need to know to keep you and your computer safe!!!
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
1 LinkedIn For Business Networking Patrick O’Malley PATRICK, i.e
By Liam Wright Manga comic group Japan SAFETY on your computer.
Digital Citizenship Merlyne Kittrell Technology and Education ED SP2OL.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Computer Security By Duncan Hall.
Lighting Up the Darker Side of the Web Colin Rose Quarter Past Five Limited Tuesday 9 th March 2004.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
12 web app security Your web app is in danger. Trouble lurks in every corner of the network, as crackers, scammers, and criminals try to break into your.
© 2015 albert-learning.com How to talk to your boss How to talk to your boss!!
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
Unit 4 Protecting Your Information Section C. Chapter 1, Slide 2Starting Out with Visual Basic 3 rd EditionIntroduction to ComputersUnit 4C – Protecting.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Engage Beginning Computer Programmers with Interactive Concepts
Introduction to Computers
HOW DO I KEEP MY COMPUTER SAFE?
Research Methods Designing a research project: Getting started.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Communicating in the IT Industry
Week 7 - Wednesday CS363.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club, Mons

Some Themes Requirements Future Development A Commercial Mindset

Some Themes Requirements Future Development A Commercial Mindset

Requirements Understanding what you want? Commodity – Value Proposition How Secure does it have to be? Available Accurate Exclusive Where do “Features” fit into the requirements?

Understand What You Are Asking For Men are from Mars Women are from Venus Business people speak “board-room” IT people speak “server-room” Political people speak XXXX Military people speak XXXX Military requirements must be met Commercial salesmen WILL NOT SAY NO

Some Themes Requirements Future Development A Commercial Mindset

Future Developments Commercial Technology Services Commerce Small Military Fish in Big Commercial Ocean Commercial Drivers Technological Drivers Economic and Market Drivers Are You Happy Being Connected to the Commercial World? E.g. the ubiquitous product update mindset?

Some Themes Requirements Future Development A Commercial Mindset

Commercial Mindset Feature Rich Fix It When It Goes Wrong Adopt and Adapt Technologies

Questions – Not Answers Is Commercial Technology All That Threatening? Could Be!! Understand Your Requirements Understand Your Supplier Forewarned is Forearmed

An Un-Commercial Mindset Commercial V Mercenary Is the Technology Better or Worse? Does it Matter? Is the Solution Better or Worse? This Matters!

Technology Can Get In The Way More information does not mean more understanding Photocopying lecture notes does not mean that you understood the lecture Quotation Game “Don’t be too proud of this technological terror you have constructed.”  Darth Vader

The Enemy Without - The Enemy WithinThe Enemy Within The Enemy of What? (What is it against?) Securing against something? or- Securing for something? Understand what you are dealing with Define your Systems? Technically and effectively. Making Your Systems Work (not just the technology) Who is on your network -  

Alternative Uses of Technology Google – A Case in Point Unofficial Slogan “Don’t Be Evil” But Is a Spoon Dangerous?

Google Hacking

Google Hacking A Note of Caution

What You Could Get Up To ! The Old Times Copyright Confidentiality Anarchy and theft Credit card fraud Telephone fraud Lock picking

More Old Fun Denial of Service Steganography Spoofs and sucksites Virus creation Password crackers Music & Movies

A Word About The Future (Or is that the past?) People Process Technology No matter how much the technology changes, the individuals change, even how much the environment changes. There are still some things that remain the same

To re-cap…. Technology is ambivalent The solution goes beyond the technology Risk management V Risk avoidance Assess all the factors Progress accordingly Technology Value PropositionCommodity ?

Thank You

What are the drawbacks? Of increased user internet and access “Users; who would have them?” Users do not know what to do Users mess things up Users are lazy Users change things Users are a maverick component

What are the consequences? Of increased user internet and access “Users; what would you do without them?” Users need to be told what to do (and what not to do) Users are the main reason why you have a computer network Users are the larger half of your information systems Users can spot problems Users need to be “configured”, you just need to understand how to “configure” them.

Fred Smith, currently on placement, can always be found hard at work at his desk. Fred works independently, without wasting company time talking to colleagues. Fred never thinks twice about assisting fellow employees, and he always finishes given assignments on time. Often Fred takes extended measures to complete his work, sometimes skipping coffee breaks. Fred is an individual who has absolutely no vanity in spite of his high accomplishments and profound knowledge in his field. I firmly believe that Fred can be classed as a high-caliber asset, the type which cannot be dispensed with. Consequently, I duly recommend that Fred be offered permanent employment here, and a proposal be executed as soon as possible. Steganography

Fred Smith, currently on placement, can always be found wasting company time talking to colleagues. Fred never finishes given assignments on time. Often Fred takes extended breaks. Fred is an individual who has absolutely no knowledge in his field. I firmly believe that Fred can be dispensed with. Consequently, I duly recommend that Fred be executed as soon as possible.

Confidentiality Inadvertent disclosure (MS Word)MS Word Cached information (Hotel Phoenix)Hotel Phoenix Revelation Phishing

We Control The Vertical…….

Anyone Want To Go Shopping?

Getting Personal

Keeping it Personal (Not)

Rumbled  !!

What is Google? It’s a Search Engine! Well – Yes But …. There is a Lot More

What Google Is It has Spiders It is a Database There is a Simple Web Interface a BIG Database

Why is the Google Database Interesting? It Records What You Don’t Want it to Look at Robots Robots It Doesn’t Only Record Web Page Where it is e.g. in Title or in URL Where it is e.g. in Title or in URL It Stores Details From Your Servers Allowing us to find what you might not want us to Allowing us to find what you might not want us to If You Mess Up – It Tells The World It Finds Your Target For You

Google Does Draw The Line Slightly

Robots Clicking on this link

From Disallowed List

For The Truly Lazy Among Us The old “script kiddie” mentality G2P.org

Lock (picking) Guide