ITU Regional Workshop on Bridging the Standardization Gap Information and Network Security Presentation by Philip Victor & Shahbaz Khan Nadi, Fiji 4 th.

Slides:



Advertisements
Similar presentations
EU Presidency Conference Effective policies for the development of competencies of youth in Europe Warsaw, November 2011 Improving basic skills in.
Advertisements

You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advanced Piloting Cruise Plot.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
UNITED NATIONS Shipment Details Report – January 2006.
Aviation Security Training Module 4 Design and Conduct Exercise II 1.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
Measuring and Reducing the Standardization Gap
Committed to connecting the world WELCOME TO ITU-T 1.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
International Telecommunication Union ITU-D Overview.
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
International Telecommunication Union Confidence and Security in the Information Society: ITU-IMPACT Alliance Information for the participants to the RPM.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
ZMQS ZMQS
1 Implementing Internet Web Sites in Counseling and Career Development James P. Sampson, Jr. Florida State University Copyright 2003 by James P. Sampson,
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Vision: A strong and capable civil society, cooperating and responsive to Cambodias development challenges 1.
ABC Technology Project
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
2 |SharePoint Saturday New York City
VOORBLAD.
15. Oktober Oktober Oktober 2012.
International Telecommunication Union Developing a Cybersecurity Strategy that Supports National Policy Goals “Regional Arab Forum on Cybersecurity,” Giza.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
© 2012 National Heart Foundation of Australia. Slide 2.
LO: Count up to 100 objects by grouping them and counting in 5s 10s and 2s. Mrs Criddle: Westfield Middle School.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Functional Areas & Positions
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Slippery Slope
CIRT/CERT Baseline Capabilities
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Database Administration
Intracellular Compartments and Transport
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Essential Cell Biology
To Create and Sustain a Career Pathway. CTE Works! Summit November 13, 2014.
Energy Generation in Mitochondria and Chlorplasts
CpSc 3220 Designing a Database
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Security in Banking Emmanuel van de Geer Senior Architect Governance, Risk,
NORMAPME ISO User Guide for European SMEs The essence of.
Presentation transcript:

ITU Regional Workshop on Bridging the Standardization Gap Information and Network Security Presentation by Philip Victor & Shahbaz Khan Nadi, Fiji 4 th – 6 th July 2011

About ITU-IMPACT

3 Global Coalition ITU-IMPACT The International Multilateral Partnership Against Cyber Threats (IMPACT) is the cybersecurity executing arm of the United Nations (UN) specialised agency - the International Telecommunication Union (ITU) - bringing together governments, academia and industry experts to enhance the global communitys capabilities in dealing with cyber threats.

4 Framework for International Cooperation ITUs Global Cybersecurity Agenda (GCA) ITUs Global Cybersecurity Agenda (GCA) – UN backed framework to enhance confidence and security in the information society. Global Cybersecurity Agenda

5 Operationalising the Global Cybersecurity Agenda

6 Global Coalition Industry Experts Academia International Bodies 192 Partner Countries Think Tank IMPACTs Global Alliances UNSystem

7 134 countries have joined the ITU-IMPACT coalition Cybersecurity Services Deployed

ITU-IMPACT Milestones 1.Global Response Centre a)Deployed cybersecurity services across 100 over countries globally b)Incident remediation coordination by the Global Response Centre for various governments globally c)Conducted cybersecurity assessments/workshops for 24 countries globally 2.Centre for Training & Skills Development a)Trained over 200 cybersecurity professionals and practitioners in 2010 b)Deployed 180 scholarships to 31 partner countries globally (SANS & EC-Council) c)Trained 50 law enforcement officers globally on Network Investigation 3.Centre for Policy & International Cooperation a)Conducted 7 high level briefings with industry partners for over 300 participants from partner countries b)ITU-IMPACT Partner Forum – participation from 7 global industry partners c)IMPACT collaborated with the US Department of Defense to sponsor the international category winners for the DC3 Forensics challenge in 2009 and Centre for Research and Security Assurance a)Successfully implemented IMPACT Government Security Scorecard (IGSS) for Malaysian Administration and Modernisation Planning Unit (MAMPU), Prime Ministers Department, Malaysia

Information & Network Security

10 Technology Trend Introduction - Information Security StoneIron IndustryInformation Age! The world has now moved from NATURAL RESOURCES to INFORMATION ECONOMY Today, information is a key asset of almost every organization and individual!

11 Information Security Space Intro. - Information Security Basic IdeaCIA

12 Security Scenarios (Confidentiality) Information Security – Key Areas Once spying was person against person, country against country. Today, cyber criminals sit on fiber-optic cables and our Wi-Fi networks. They steal data and information without breaking any glass. Keeping data confidential is one core mission of information security

13 Incorrect Information (Integrity) Information Security – Key Areas Wrong information is worse than no information. When users of information lose confidence that the information is accurate, theyll never rely on it. Maintaining data integrity is also a core mission of information security.

14 Inaccessible Information (Availability) Information Security – Key Areas Information security doesnt mean locking everything down. If people dont have the information they need, they cant do their jobs. Information security professionals must be able to balance access to information and the risk of damage. A third core mission of Information Security is making information available when needed.

15 How to start? Information Security

16 Things to do

17

18

19

20 Security tasks Vulnerability Assessment Penetration Testing Web Application Assessment Reactive Services Proactive Services Data Leakage Protection Human Capacity Building

21 Vulnerability Assessment Internet

22 Vulnerability Assessment Internet External Scanner Internal Scanner

23 Penetration Testing Internet

24 Penetration Testing Internet External Hacker

25 Penetration Testing Internet Internal Attacker

26 Web Application Assessment Attacker (Browser) HTTP/HTTPS (Transport Layer) IIS, APACHE, etc. (Middle Tier) MSSQL. MYSQL, etc. (Database Tier) Identify security vulnerabilities and exploitable elements residing within the web applications.

27 Reactive Services

28 Proactive Services Internet

29 Data Leakage Prevention Internet

30 Human Capacity Building Provide quality and current information security trainings

31 Things to do - Summary

IMPACT Jalan IMPACT Cyberjaya Malaysia T +60 (3) F +60 (3) E impact-alliance.org © Copyright 2011 IMPACT. All Rights Reserved. Thank you