Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.

Slides:



Advertisements
Similar presentations
Achieving online trust through Mutual Authentication.
Advertisements

CyberSource Strengths
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
Identity Security Time to Share Nicolas Popp VeriSign MM/DD/YY - Session Code: 22 pt Arial.
Chapter 13 Paying Via The Net. Agenda Digital Payment Requirements Fraud Detection Online Payment Methods Online Payment Types The Future Payment.
Securing Online Transactions with a Trusted Digital Identity Dave Steeves - Security Software Engineer Microsoft’s.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Federated Authentication mechanism for mobile services Dasun Weerasinghe, Saritha Arunkumar, M Rajarajan, Veselin Rakocevic Mobile Networks Research Group.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
E-Commerce Security and Fraud Issues and Protections
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
1. The VeriSign brand2. Extended Validation SSL
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
The “Any Era” Has Arrived… And Everyone Has Noticed Stratton Sclavos CEO and Chairman of the Board.
Norman SecureSurf Protect your users when surfing the Internet.
Online Banking Security Magdalena Padyasek. Why Security?  Computer-based businesses  Advances in technology  Internet crimes  September 11 th attacks.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Securing Information Systems
Chapter 10 E-Commerce Security.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
VeriSign® Identity Protection (VIP) Overview. 2 2 VeriSign Confidential Trust on the Internet is More Compelling Than Ever 1.5 billion Internet users.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Performance and Security of Internet Applications John Buten Manager, Enterprise Industries
Dell Connected Security Solutions Simplify & unify.
Exploring the Network.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Akamai Technologies - Overview RSA ® Conference 2013.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
The Changing World of Endpoint Protection
U-commerce: Fueling economic growth with electronic payments Mark Burbidge, SVP and GM, e-Visa Joint UNCTAD - UN ESCAP Asia Pacific Regional Conference.
Thomas E. Noonan President and Chief Executive Officer Issues in eBusiness Security.
A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Catherine Lian Managing Director, Dell Indonesia
The Changing Face of the Contact Centre 18 th September 2013.
Cyber Security : Indian perspective. 22 Internet Infrastructure in INDIA.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Online Security Myths & Challenges HIGHER COLLEGES OF TECHNOLOGY Abeer Nijmeh Account Manager April 14, 2002.
By: Shannon O’Hara The internet is born! 1971 People communicate over a network for the first time. is invented! A program to send messages.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Maximize Your Hosting Business: Covering all your SSL requirements Tim Callan May 31, 2006 VeriSign / thawte Confidential.
Reach us at Call: | Visit:
NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Securing Information Systems
Securing Information Systems
    Customer Profile: If you have tech savvy customers, having your site secured for mobile users is recommended. Business Needs: With the growing number.
Cyber Crime & What It Means For Your Business
Securing Information Systems
Secure & Unified Identity
Information Security Session October 24, 2005
Presentation transcript:

Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference

2 Digital World: How it looks? 1.3B Global Internet Users 1. Source: Forrester Research Source: Goldman Sachs 2007 CSO Survey 3. Source: Synovate 2008 Consumer Survey 1.5T s 177M Web sites

3 Source: _Resources/Domain_Name_Industry_Brief/index.html Enterprise interactions Have Become Enterprise Internet Interactions Why Such a Growth? Efficiency & Convenience = $$$

4 Digital India: How it looks? 50M India Internet Users 1. Source: Forrester Research Source: Goldman Sachs 2007 CSO Survey 3. Source: Synovate 2008 Consumer Survey 1.2M Web sites 20 web sites per 100 internet users – USA 2 web site per 100 internet users – India

5 Source: _Resources/Domain_Name_Industry_Brief/index.html Wiring of Enterprises in India 10 x expected growth in India with enterprises going online

6 Then what is the issue?

7 Online Launch: VULNERABLE….

8 Online Interaction: LACK OF VISIBILITY….

9 Online Results: UNCERTAIN…

10 Do you shop online?

11 How do some online businesses manage to inspire so much confidence with consumers ? eBay does $ 2.25 billion gross sales quarterly 34 million people Hardly any of them know one another $ 10 billion a year in commer ce Trust is richly repaid What has eBay done?

12 How do I build Trust Online?

13 Addressing the Trust Dilemma Three steps to Building digital trust Transparent Execution Visible Security Insider Security

14 The face of online threats in 2009 Phishing MalwareBlended Threats Social Engineering Theft from Insiders

15 As internet usage surges, so do the threats + Malware growth almost tripled in $ 4 billion in online revenues lost to payments frauds + Identity theft occurring every 3 seconds + Over $1 trillion was lost through cyber crime related thefts during the economic crisis in % of U.S. feel “Distrustful” when making online purchase + Rock Phish is responsible for more than half of all phishing sites worldwide ▪ Has cost banks more than $100 million. 2 Source: Cybersource online fraud report 2009

16 Plagued by security threats – Where and How? An infected Webpage is discovered every 4.5 seconds 5 scareware Web sites found everyday in 2008 India no. 1 spammer in Asia and no. 7 in the world with 4.26 billion spam messages sent out everyday 1. Source: Sophos Security threat report: Source: Marshall: Spam trend report 2008 Economic impact of spamming pegged at $100 million globally 3. Source: Ferris Research on economic impact of spamming 2007

17 Online Security: Solution

18 2 nd Factor for protecting Identity Theft What You Know v/s What You Have

19 Green Browser Bar (EV Certs) = Stop Phishing

20 Green Browser Bar = Increase Confidence Phishing Site – Bar turned Red!

21 Infrastructure: Evolving and Sophisticated DDoS Attacks Attack Bandwidth vs (Normal) Bandwidth DNS Gbps Attack Bandwidth Bandwidth required for attack vectors as a multiple of average daily traffic (Normal) Bandwidth Microsoft Root Server Attacks AOL Sobig Worm 30x 3x New threats due to increased nodes and adoption of IP-based mobile devices VoIP/Cell Phone Worm ? Attacks DNS Reflector Normal DNS Traffic 150x 100x 50x Routing Loop.COM 40x DDoS Packet Filtering During Attack

22 Protecting from Insiders: Enterprise Authentication Web Applications PKI Infrastructure += Remote Access Desktop Logon Networking Multi-Factor Desktop Logon Strong Web Authentication Secure Remote Access Secure Network Access

23 Protecting from Insiders: Encryption Applications PKI Infrastructure += Endpoint Security Data Storage Encrypted Communication Protected Assets and Data Secured Data at Rest

24 Protecting from Insiders: Digital Signature Applications PKI Infrastructure += Document Management Custom Applications Signed Communication Digital Workflow Signed Transactions

25 The World’s Web Leaders Turn to VeriSign ▪ 93% of the Fortune 500 ▪ The world’s largest 40 banks ▪ 47 of the 50 biggest e-commerce sites ▪ Over 1M Servers protected by SSL ▪ 150 million VeriSign Seal impressions per day

26 In Summary….. Building Trust = Security is Important Online Trust = Increased Revenues Going Online = Business Efficiency

27 Questions?