06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.

Slides:



Advertisements
Similar presentations
CS5038 The Electronic Society
Advertisements

Protection of Information Assets I. Joko Dewanto 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cross Platform Single Sign On using client certificates Emmanuel Ormancey, Alberto Pace Internet Services group CERN, Information Technology department.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
HIPAA Security Standards What’s happening in your office?
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
1 Pertemuan 10 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Unit 28- Website Development Assignment 1- THEORY P3
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Internet Protocol Security (IPSec)
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Securing Information Systems
Kittiphan Techakittiroj (04/09/58 19:56 น. 04/09/58 19:56 น. 04/09/58 19:56 น.) Network Security (the Internet Security) Kittiphan Techakittiroj
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Defining Security Issues
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Internet Security for Small & Medium Business Week 6
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Section 12.1 Discuss the functions of a Web site Create a feedback form Compare and contrast option buttons and check boxes Section 12.2 Explain the use.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Computer Security and Cryptography Partha Dasgupta, Arizona State University.
Julie Latham Digital Citizenship: An Informational Guide.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Online Security Myths & Challenges HIGHER COLLEGES OF TECHNOLOGY Abeer Nijmeh Account Manager April 14, 2002.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-Commerce & Bank Security By: Mark Reed COSC 480.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Secure Software Confidentiality Integrity Data Security Authentication
Security in Networking
Presentation transcript:

06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel Ediau Anne Sedee

06/02/06 Group Question Security Skype and web2.0 tools More and more (free) online services are offered on Internet. But how secure are these services? This group investigated the Internet about security issues related to web2.0 tools.

06/02/06 OUTLINE 1.Security Defined 2.Security Threats, Concerns and Vulnerabilities Skype Web Possible solutions Skype Web 2.0

06/02/06 Definition of Security Refers to techniques for ensuring that data stored in computer networks cannot be accessed, read or compromised by any individuals without authorization. Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

06/02/06 Main areas of web security concerns,threats and vulnerabilities Data loss Violation of confidentiality by intrusion or tampering Denial of Service, spoofing Web bugs Managing cookies

06/02/06 Main security threats_Web 2.0 specific With Web 2.0 (webtop) your data is stored in several locations across the internet on many different servers. You have to use and remember several username/passwords all the time for every site/application that you use. Possibility of access by interested parties (governments, lawyers, insurance companies, etc). Google, the main player accessing and using your personal infor for their commercial advantage

06/02/06 Threats,Vulnerabilities and Concerns_Skype Specific eavesdropping tappings risk of not establishing and implementing an enterprise policy for Skype"Because the Skype client is a free download…most businesses have no idea how many Skype clients are installed on their systems or how much Skype traffic passes over their networks."

06/02/06 Possible solutions Information Lifecycle Management (ILM) methodologies, tiered storage, data replication, coordinated administration, Use of security applications

06/02/06 Solutions Authentication/encryption Biometrics, Digital Signatures, E-commerce Security, PKI, Smart Cards, SSL

06/02/06 Solutions Intrusion/tampering Anti-Hacking, Anti-Virus, Firewalls, Intrusion Detection Systems, Network Security, Spam -

06/02/06 Skype secure Here are the things you need to know about staying secure and protecting yourself while Skyping. Avoid scammers Keep your password safe Set privacy options Keep your payment data safe Secure your computer Be conscious about your communications

06/02/06 Skype secure ctd Do not put details in your profile that you do not want to be publicly viewed. Remember that your Skype profile can be seen by all other Skypers. You do not have to fill in your profile if you do not want to, and you can change it at all times. Always authenticate your communication partner before starting to discuss any private or confidential details, such as your home address or sensitive work data.

06/02/06 Skype secure ctd. If you are using Skype for work purposes, it's a good idea to have a list of known Skype Names for all colleagues, and not to trust anyone outside the list. Set your privacy options to avoid any unwanted communications. Education about the threats of communicating with strangers

06/02/06 Skype secure...SOLUTIONS actively manage version control of Skype client — and its distribution to authorized users — using configuration management tools."

06/02/06 thoughts, comments and questions