National Telecom Regulatory Authority EGYPT Eng. Aly Anis Livingstone, Zambia 10-12 September 2013 The Fifth Annual African Consumer Protection Dialogue.

Slides:



Advertisements
Similar presentations
Secure, Scalable, Synchronizable, and Social Business oriented Rich Internet Applications to reduce costs and add value to clients Authors: Avenir Cokaj,
Advertisements

European Consumer Summit 2014 On-line and mobile payments Dr Florent Frederix Trust & Security Unit, DG CONNECT, European Commission 1 th of April 2014.
The internet. Background Created in 1969, connected computers at UCLA, Stanford Research Institute, U. of Utah, and UC at Santa Barbara With an estimated.
Wireless Communications with Channel Feedback
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. The Path to 4G April 2, 2008.
Australian Mobile Telecommunications Association Productivity - Connectivity - Mobility Mobile Broadband A Key Economic Driver.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Company LOGO Internet Safety A Community Approach.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Norman SecureSurf Protect your users when surfing the Internet.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Computer Concepts 2014 Chapter 6 The Internet. 6 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access Chapter 6: The Internet2.
The Internet. What is the internet? a vast network designed to transfer data from one computer to another.
Presentation on Copyright (c) 2011 Presentation Point ( m)
Evolving Threats. Application Security - Understanding the Problem DesktopTransportNetworkWeb Applications Antivirus Protection Encryption (SSL) Firewalls.
Welcome! Presenter: Sam Foster. Major Topics To Be Covered In This Presentation Content Management System Amazon, eBay, and Gun Broker Integration Shopping.
Computer Concepts 2014 Chapter 6 The Internet. 6 Background  The ARPANET, created in 1969, connected computers at UCLA, Stanford Research Institute,
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Securing Information Systems
Chapter 6 The Internet. 6 Chapter 6: The Internet2 Chapter Contents  Section A: Internet Technology  Section B: Fixed Internet Access  Section C: Portable.
NEW WAVES IN DIGITAL WORLD Mehmet C. TOROS Vice President Sectorial Relations & Project Management Coordinator Caspian Telecoms’2013 – 18th April 2013.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Information Security Issues at Casinos and eGaming
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
The Cyber Defense center and its services portfolio McAfee Professional Services – Foundstone Services.
Implications of E(verything) over IP Robert Pepper Chief, Policy Development Federal Communications Commission TTI/Vanguard April 2005.
Mobile Internet _________________________________ …The New Computing Cycle.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
1 We’ve been p0wn’d? Review of 2015 Surface Transportation Cybersecurity Incidents 2015 TRB Session 850 Edward Fok USDOT/FHWA – Resource Center.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
An Overview of the Smart Grid David K. Owens Chair, AABE Legislative Issues and Public Policy Committee AABE Smart Grid Working Group Webinar September.
The Internet TexPREP Summer Camp Computer Science.
The Digital Revolution and The Global E-Marketplace Chapter 25 Matakuliah: J0474 International Marketing Tahun: 2009.
1  2005 Level 3 Communications, Inc. All Rights Reserved. Industry At The Bottom? Kevin O’Hara President & COO Level 3 Communications.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Society & Computers PowerPoint
INTRODUCTION & QUESTIONS.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
Securing Information Systems
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Chapter 6 The Internet.
Date: March. 30, Monday Evening.
Cybersecurity - What’s Next? June 2017
What is the CYBERSECURITY plan for tomorrow?
Call AVG Antivirus Support | Fix Your PC
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Cyber Trends and Market Update
Home Internet Vulnerabilities
E-Commerce for Developing Countries (EC-DC)
Cybercrime and Canadian Businesses
SEO Stats
Presentation transcript:

National Telecom Regulatory Authority EGYPT Eng. Aly Anis Livingstone, Zambia September 2013 The Fifth Annual African Consumer Protection Dialogue Conference

1.It is well known that the conversions of (services, networks, and devices) are the trend now likes: Cloud, VOIP, DSL, Wi-Fi, and IPTV. 2.Changing media landscape: analogue to digital conversions, height frequency updates, Video on demand (non-linear broadcasting). 3.Cellular revolution: – 1G voice only – 2G voice and data capability – 3G evolved voice and data – 4G new trend LTE (voice, data) with height speeds. 2 Mobile Technology

* What is the deference between 3G and 4G ?: for 4G service at 100 (Mbps) for high mobility communication (such as from trains and cars) and 1000 (Mbps) for low mobility communication (such as pedestrians and stationary users. 3 Mobile Technology

4- Internet development : – Broadband instead of narrow band. – Mobile instead of fixed. – GIFT era : – Google, I-phone, Face book, Twitter. 5- Mobile applications: – Money transfer, location based services, mobile health …etc 6- Static to dynamic environment: – Accessibility to usability – Rights to sharing. 7- Machine to machine : – Internet of things, Vehicle to vehicle & smart grids. 4 Mobile Technology

Conclusion: The telecom mega trends now is changed to : From Fixed to mobile From Voice to video From Operators to users From Human to things. LTE Overlay vs. HSPA Overlay: For the traffic levels modeled and the price assumptions provided, the cost per Mb of an HSPA+ is 11% lower than that for an LTE Overlay deployment over the period studied as a function of the traffic carried. However, as a function of the network utilization (for like deployment spectrum) LTE has a lower cost per Mb than HSPA+ except at very low utilization For Overlay deployments, the cost per Mb of LTE can be as low as 25 to 30% the cost of HSPA+ for high utilization levels. 5 Mobile Technology

Conclusion: In general terms, LTE is more efficient in cost per Mb than HSPA+ for high traffic levels that lead to higher utilization for which the carrying capacity of LTE is a dominant factor. Operators considering either or both of the technologies for high data access will: – have to understand well the traffic forecast, take rates, penetration and – network utilization to make the appropriate decisions. – A critical decision point will be the applications that will generate the traffic carried by either technology. – Applications requiring a more symmetric traffic (VOIP, Gaming …), will be better suited for LTE due to its capacity advantage in the reverse link. 2

Cyber Security: Top 4 Most Expensive Data Breaches 1.Sony - $2B (est.): The Sony data breach, exposed information from over 100 million user accounts-April Epsilon - $225 million - $4 billion : In March 2011, hackers stole millions of names and addresses from the Dallas-based marketing firm. Epsilon handles lists for major retailers and banks like Best Buy, JPMorgan, TiVo, Walgreen, and Kroger.DallasBest Buy JPMorganTiVoWalgreenKroger 3.TJX – $256 million or more : Cyber criminals took more than 45 million credit and debit card numbers. 4.Heartland Payment Systems - $140 million: Criminals installed spying software on the company’s computer network and stole the numbers of over 100 million credit and debit cards. That is why the world build CERT: Egyptian Computer Emergency Response Team-(EG-CERT) Source: The Christian Science Monitor - CSMonitor.com – 4 May 2011

Establish 0n April 2009 (EG-CERT). Under Egyptian National Telecom Regulatory Authority (NTRA) July 2009, 24/7 Monitoring & Incident Response September 2009, Forensics Analysis Service April 2011, Malware analysis & Reverse Engineering March 2012, Full member in FIRST.

1.Reactive services. 2.Proactive Services. 3.Forensics Services. 4.Malware Analysis EG-CERT Services Incident (Response –Coordination-support on site) Vulnerability Scanning – Penetration testing- Technology watch Evidence handling & analysis – Reporting Malicious Software Collection. Malware analysis –Reverse engineering

Incidents From 1/4/2009 to 25/12/2012 EG-CERT - Incident Handling Incident TypeNo. of Cases Web Site Defacement826 Malware URL87 Phishing83 Spamdexing55 Online Web Shell6 DDOS28 Authentication Bypass15 Sql Injection41 Abusive Content11 Mass Web site Defacement12 Remote File Inclusion (RFI)2 Others23 EG-CERT Services

EG-CEG-CERT Services ERT - Incident Handling

Achievements EG-CERT has contributed to tone of largest phishing case by providing (forensics analysis; report +400 pages; 1600 working hours by 12 specialists). CEG-CERT Services Forensics

The risk of online infection around the world (Q1 2012) All of the statistics reported here are based on data collected by the Kaspersky Security Network and its security modules..

* Building Trust Signed MOU with : Malaysian CERT South Korean CERT US-CERT Team cymru IMPACT. Letter of intend Uganda. EG-CEG-CERT Services