Electronic Safety and Soundness in Colombia Financial Sector Policy Global Dialogue Series #19 Milton Quiroga

Slides:



Advertisements
Similar presentations
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Legal and Ethical Issues: Privacy and Security Chapter Five.
© 2006 IBM Corporation Privacy Matters: Safeguarding Identity, Data and Corporate Reputation Harriet P. Pearson VP Corporate Affairs & Chief Privacy Officer.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
18/05/99 FAMO- MODELO /05/99 FAMO- MODELO REGIONAL HIGH-LEVEL WORKSHOP ON ELECTRONIC COMMERCE AND ICT FOR CENTRAL AMERICA AND THE CARIBBEAN.
Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
E-Commerce: Regulatory, Ethical, and Social Environments
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
National Smartcard Project Work Package 8 – Security Issues Report.
Internet safety By Lydia Snowden.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
Combating cyber-crime: the context Justice Canada March 2005.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Digital Citizenship By: Miranda Scorver.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Internet Security for Small & Medium Business Week 6
ECMM 6000, Fall 2004 Intro 1 Overview of Electronic Commerce Technology Issues 1.Networking 2.Web programming 3.Cryptography 4.Other topics Introduction.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
8.1 © 2007 by Prentice Hall Minggu ke 6 Chapter 8 Securing Information Systems Chapter 8 Securing Information Systems.
The State of in Developing Countries: Perspective Ananya Raihan October 24, 2001, Geneva E-Finance Bangladesh Centre for Policy Dialogue.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
E-finance for SMEs in Brazil Antonio C. B. Oliveira Executive Director, Banco Itaú UNCTAD, Geneva, October 2001.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Internet Security Breach & Its Impact on Business Operations Kim Nguyen Manish Shirke Wa Mo Saravanan Velrajan.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Cybercrime What is it, what does it cost, & how is it regulated?
Security and Privacy: Panel of Perspectives Rick Skeel University of Oklahoma.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Cyber Safety Jamie Salazar.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
Security and Ethics Safeguards and Codes of Conduct.
This lesson we will look at organisational:. Policies and Procedures Part of your role as an employee in a workplace is to support and promote your company.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Loss caused by customer theft, fraudulent payment, or nonpayment is a human risk.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Safe Computing Practices. What is behind a cyber attack? 1.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
TYLER GROUP
Securing Information Systems
Decrypting Data Compliance in China
Securing Information Systems
Wissam Maroun- CAMS Head Of Compliance- BBAC S.A.L
Presentation transcript:

Electronic Safety and Soundness in Colombia Financial Sector Policy Global Dialogue Series #19 Milton Quiroga

Trends in e-security incidents in Banking in Colombia Malicious code, virus, worms, chain-letters are daily problems, Companies are ill-prepared for incident handling: –No formal procedures for incident handling, Usually based on tips interchanged in forums, –No formal procedures for evidence collection, Important black numbers of unpunished crimes, Banks don’t have major incentives to improve its security in e- commerce, –In credit card transactions client (user) is always liable! A growing and undocumented problem: identity theft, –Privacy in Colombia? Of course, spamming is also a growing (and annoying) problem,

Processes to mitigate electronic security risks In Colombia risk management is usually an auditor problem, –Computer security is not a mainstream problem for employees, In general computer security is not part of the organizational culture, We are using technological and management tools to improve our security: –PKI, smart-cards, … –BCP/DRP, role separation, risk management, … –However, these topics are still “esoteric” for many Colombian banks, A big challenge: keep our systems up to date!

Role of multilateral institutions UNCITRAL wrote a “model law” for e-commerce and digital signatures that several countries adopted and adjusted to its necessities: –v.g Colombia in 1999, It’s desirable to have a “model law” based on “civil law” (not “common law”): –Computer crime (electronic vandalism, identity theft, DoS, …), –Transnational issues, –Privacy, –Spamming, –…