© LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.

Slides:



Advertisements
Similar presentations
Introduction to Cyber Crime Investigation Course Conducted in English Institute for Information Industry Decision Group.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Nasca Internet Networking and Security viruses.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
CYBER CRIME AND SECURITY TRENDS
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
© Experian CheetahMail All rights reserved. Confidential and proprietary. 1 © Experian Information Solutions, Inc All rights reserved. Confidential.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety By Lydia Snowden.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Marketing of Information Security Products. The business case for Information Security Management.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 OECD anti-spam initiatives Anti-SPAM Strategies – The Way Forward for the ASEAN Telecommunications Regulators’ Council (ATRC) 3-4 May 2005, Cyberjaya,
© 2006 Pearson Education Canada Inc.4-1 Chapter 4 Telecommunications and the Internet PowerPoint Presentation Jack Van Deventer Ward M. Eagen.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Cyber Terrorism Shawn Carpenter Computer Security Analyst
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
Hosted By: Kelly, Sean, and Kristina!! Security Suites Privacy Settings Viruses and Firewalls Internet Security
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Get Safe Online Expert advice for everyone In association with.
How we work as a national CERT in China ZHOU Yonglin CNCERT/CC, China 2 Addressing security challenges on a global scaleGeneva, 6-7 December 2010.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet Dangers Technology Communication Tools E-Literate.
Chapter 1: Explore the Network
2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter One Copyright © 2016 Thomas J. Holt. All rights reserved.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Cyber crime and security issues
Securing Information Systems
Matt G change over point ?
Today’s Risk. Today’s Solutions. Cyber security and
Information Technology Services Education and Awareness Team
Communicating Through the Internet and Other Technologies
Networking for Home and Small Businesses – Chapter 8
Information Technology Services Education and Awareness Team
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

© LogicaCMG All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant

Privacy in Cyberspace 2 Agenda 30 Second Introduction Current and Emerging Cyberspace Threats Addressing the Threats – Three Pronged Approach

Privacy in Cyberspace 3 30 Second Introduction LogicaCMG –Worldwide business support company –40,000 employees worldwide –250+ full time security consultants –Full boardroom to bytes security service

Privacy in Cyberspace 4 Current and Emerging Cyberspace Threats Consumers are exposed to fraud potential Viruses, Worms, Trojans, Letter Bombs and more… Unacceptable behaviour on-line Phishing already a significant problems for consumers Penetration of wireless networks interception Spear-phishing

Privacy in Cyberspace 5 Education Government websites ISP campaigns Vendor advice Industry advice Tools Anti-virus & Anti-Spam Firewalls Patch levels Secured wireless routers Global co-operation Cross border co-operation Education Targeted advice to public Tailored advice to public Tools Secure IE7 Behavioural Analytics Global co-operation MoU between countries Addressing the Threats – Three Pronged Approach

Privacy in Cyberspace 6 Summary Government to sponsor public awareness ISPs to provide customers with toolkit Businesses to safeguard their customers’ information Consumers to use the tools available Coherent - Cost-effective - Simple