The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.

Slides:



Advertisements
Similar presentations
Its a new digital world with new digital dangers….
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
A Framework to Implement a National Cyber Security Structure for Developing Nations ID Ellefsen - SH von Solms - Academy.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
National Cyber Security and Information (Cyber) Security Awareness Prof SH (Basie) von Solms Immediate Past President : IFIP University of Johannesburg.
National Cybersecurity Awareness Campaign 11
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN OLDER AMERICANS PRESENTATION.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Company LOGO Internet Safety A Community Approach.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
1 May 2006 … Identity management - Internet - Data controller - PKI - Vulnerabilities - Fingerprint - Critical Information Infrastructure - Privacy and.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
The National Cyber Security Alliance Martha J. Lockwood, CAE, APR Executive Director EDUCAUSE Live! October 6, 2004.
Internet safety By Lydia Snowden.
A First Course in Information Security
Design of a cyber security awareness campaign for Internet Cafés users in rural areas WA Labuschagne, MM Eloff, N Veerasamy, L Leenen, M Mujinga CSIR /
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
From Digital Divide to Digital Opportunity – Policy Issues Kelly Levy, Associate Administrator National Telecommunications and Information Administration.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Safer Internet Forum 2007, TANJA ŠTERK, project coordinator SAFE-SI: SLOVENIAN AWARENESS NODE IDENTIFYING THE ACTORS AND ACTIONS.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Malicious Attacks By Katya, Grace, Lachlan, Sairus and Eric!
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Local Threat Report Vikram Kumar – Chief Executive, InternetNZ 22/08/2012.
Mission: NCSA’s mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Get Safe Online Expert advice for everyone In association with.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Hurdles in implementation of cyber security in India.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
INTRODUCTION & QUESTIONS.
Information Security: Current Threats Marc Scarborough Information Security Officer
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Global Digital Security Market WEBSITE Single User License: US$ 2500 No of Pages: 60 Corporate User License: US$ 4000.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
Broadband Challenges 2017 Christopher Tamarin
Cybersecurity Education & Awareness Overview
Cyber Crime What’s all the fuss about?
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Teaching Internet Safety
Cloud Security Market Share
Securing Information Systems
Today’s Risk. Today’s Solutions. Cyber security and
Risk of the Internet At Home
Protecting Your Company’s Most Valuable Asset
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
October is National Cybersecurity Awareness Month
Presentation transcript:

The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University of Johannesburg The South African Cyber Security Awareness Month (SACSAM)

The Cyber Risk The Symantec Internet Security Threat Report (Symantec, April 2011) Symantec recorded early 3 billion malware attacks in 2010 A 93% increase in Web attacks Identities on average exposed per breach 42% more mobile vulnerabilities Rustock, the largest botnet had well over one million bots under its control could be rented for US$ 15 for Denial of Service attacks

The Cyber Risk The Sophos Security Threat Report infected websites are discovered every day. That’s one every 3.6 seconds 15 new bogus anti-virus vendor websites are discovered every day % of all business is spam The report further makes the following very worrying statement: ‘The vast majority of infected websites are in fact legitimate sites that have been hacked to carry malicious code. Users visiting the websites may be infected by simply visiting affected websites, … The scope of these attacks cannot be underestimated, since all types of sites – from government departments and educational establishments to embassies and poltical parties … - have been targeted.’

"The Internet is the crime scene of the 21st Century," (Wall Street Journal, 2010a) The Cyber Risk

The CISCO White Paper, 2009 ‘Internet users are under attack. Organized criminals methodically and invisibly exploit vulnerabilities in websites and browsers and infect computers, stealing valuable information (login credentials, credit card numbers and intellectual property) and turning both corporate and consumer networks into unwilling participants in propagating spam and malware’

Like the anticrime, environmental awareness, and antismoking television ad campaigns of recent years, a comprehensive and repeated program of public awareness could help instill fundamental security principals to make cyber space safer and more secure. Such awareness programs should point out that securing one’s own computer not only lowers the risk for that individual but also helps improve the security of cyber space and the country as a whole. The major Countermeasure : Cyber Security Awareness

Thus, user awareness education is just as vital a tool in protecting cyber space as the latest firewall or encryption technology The sorry state of information security awareness for the public at large is an even bigger problem …………… The state of information security in cyber space can be significantly improved by public service announcements and education campaigns The major Countermeasure : Cyber Security Awareness

6. From SA’s Draft National Cyber Security Policy

Proposed SA Initiative Establish an annual Cyber Security Awareness Month/Week

Let us look at some examples relating to such a Cyber Security Awareness Month/Week

Australia National Cyber Security Awareness Week an annual initiative held in partnership with industry, community and consumer groups and state and territory governments. The Week aims to help Australians understand cyber security risks and educate home and small business users on the simple steps they can take to protect their personal and financial information.

United Kingdom Get Safe Online Week Get Safe Online, the UK’s national internet security awareness initiative Get Safe Online Week encourages web users to take time out of their week to learn more about internet safety and to make sure that their computer is properly protected. It reaches out to consumers and small businesses through competitions, events and PR activity.

Singapore The Cyber Security Awareness Alliance I Our Mission The aim of the Alliance is to: Build a positive culture of cyber security in Singapore, where security becomes second nature for all users; and Promote and enhance awareness and adoption of essential security practices for both the private and public sectors. The Alliance comprises representatives from the government, private enterprises, trade associations and non-profit organisations.

America What is National Cyber Security Awareness Month? National Cyber Security Awareness Month is an annual effort to increase awareness and prevention of online security problems, spearheaded by the U.S. Department of Homeland Security and the National Cyber Security Alliance (NCSA).U.S. Department of Homeland SecurityNational Cyber Security Alliance

The National Cyber Security Alliance (NCSA) Mission: NCSA's mission is to educate and therefore empower a digital society to use the Internet safely and securely at home, work, and school, protecting the technology individuals’ use, the networks they connect to, and our shared digital assets. Vision: In a climate of persistent threats, securing cyber space is a responsibility we all share. Securing the Internet and our shared global digital assets—cybersecurity—is critical if we are to achieve the potential of an empowered digital society NCSA builds strong public/private partnerships to create and implement broad reaching education and awareness efforts to empower users at home, work and school with the information they need to keep themselves, their organizations, their systems, and their sensitive information safe and secure online and encourage a culture of cybersecurity. America

Scope of these programs Schools Universities Home Users Enterprises Topics Identity fraud Phishing Viruses, spyware and malware Mobile internet security Online scams Social networking Online dating Shopping and selling online

Tools Posters Cartoons Flyers Podcasts Lectures Videos Advertisements etc

NCSA Resource Library

Step 1 : Create a SA Mandating Authority (MA) and invite supporters and endorsers from the public and private sectors. Department of Communications Department of Education (Basic and Higher) Financial Institutions Telecommunications companies Universiities Etc The Centre of Competency for Research in Cyber Security and Related Areas (CCRCSRA) at UJ is offering to act as an initial vehicle to get such a MA established. SA Cyber Security Awareness Month

Step 2 : Create an initial plan as far as content and distribution of material and awareness for the first Cyber Security Awareness Month in October 2011 is concerned As initial concentration is on schools and Universities, the UNISA and NMMU efforts can take responsibility for the schools area. The CCRCSRA at UJ will concentrate on Universities. In cooperation with the MA and sponsors (see later) some marketing material for radio and TV can be developed. The material of the NCSAM (US) can also be used with good effect.

Step 3 : Find sponsors Part of establishing the MA (Step 1 above) will be to find sponsorship to produce and distribute some of the material mentioned in Step 2.

Step 4 : Roll out the first SA Cyber Security Awareness Month in October 2011 initially be a small effort, but should grow in coming years. Without starting slow, we will never get anywhere. Although the initiative is directed towards SA, it can just as well be a Southern Africa Cyber Security Awareness Month involving other countries from Southern Africa. The emphasis on SA in this case is just to ensure that we can kick off here in The main purpose of the SACSAM is therefore a sort of national public awareness campaign to encourage everyone to protect their computers and our nation’s critical cyber infrastructure.

Summary It will do SA good to have some concentrated effort to expand awareness about Cyber Security risks amongst the whole civil society. The planned SA National Cyber Security Awareness Month may be the first coordinated effort to do so. Interested parties are invited to contact me

Thanks