SlideShare uma empresa Scribd logo
1 de 25
Global figures - WEB

   At least one new domain
 each second

   2010 – 196 million domain
 per quarter

   2011 – 220 million domain
 names per quarter

 Source: VeriSign (Dec,2011)
Global figures - WEB

   Google: 88 000 000 000 searches per month, 3 billion
 per day, 121 million per hour

  Twitter: 6939 tweets per second, billion tweets per
 week, 24 000 000 000 searches per month

   Yahoo Sites: 9 400 000 000 searches per month

   Microsoft sites: “just” around 4,1 billion
 Public IM
 P2P
 Anonymizers
 VoIP               Financial IM
 Social Networks    Unified Communications
 Games              Web Conferencing
 Virtual Worlds     VoIP
 IPTV               Remote Admin Tools
Category              Number    Example
Social Networking                  936
Instant Messaging                  259
IPTV                               62
Remote Admin Tools                 23
P2P                                170
VoIP                               100
Web Conferencing                   55
Commercial Monitoring Software     257
Anonymizer                         58
Web Mail                           21
                                  6000 +
IT continues taking the lead in business
(ERP, CRM, document management, digital
prototyping, business intelligence etc.)

  Development of e-World continues (B2B,
B2C, e-Services, e-Government, e-Health,
social networking, Web 2.0, unified
communications etc.)

  Consumerization, mobility and borderless
enterprise is a reality

  Cyber culture grows faster than cyber
security (as well – not all countries have
compliance or penalties)
Global figures - cybercrime

                               2011 – 431 billion people
                            affected, with more than 114
                            billion USD directly and
                            another 274 billion USD
                            related to direct loss

                            (Source: Symantec, Dec 2011)


  Cybercrime costs the world significantly more than
the global black market of marijuana, cocaine and heroin
combined ($228 billion world wide)
Security today -

   Financially motivated
      Bank Accounts
      Identity theft
      Insiders

   Intellectual Property Theft

   “Hacktivists”
      Denial of Service
      Reputation Damage
      Customer data
FBI warns USA Congress that cybercriminals can
hack any internet-linked system
Gordon M. Snow, assistant director of the FBI’s Cyber
Division (13th of April, 2011)

Exclusive: Computer Virus Hits U.S. Drone Fleet
Noah Shachtman, Wired Magazine
(7th of October, 2011)


Betfair admits data hack... after 18 months - over
two million card details were stolen
Rory Cellan-Jones, BBC Technology
(30th of September, 2011)
Policy and real time control
   Of devices and applications
   Of people and IT stuff
   Of data leak protection
   Of internet usage
   Of remote access
   Of employees training
   Of….
Encryption
   Mobile phones
   Voice calls and text messages
   eMails
   Computers and devices
   Data bases
   …
Specialization – IT Security

    IT Security consulting
 (vulnerability    assessment
 tests, security audit, new
 systems integration, HR
 training, technical support)

   Innovative & selected
 software / hardware & hybrid
 solutions     from    leading
 technology vendors from
 over 10 different countries
www.dss.lv
     andris@dss.lv
Mobile: +371 2 9162784
 Twitter: andris_soroka

Mais conteúdo relacionado

Mais procurados

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
Sejahtera Affif
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
maruhope
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
ravijain90
 

Mais procurados (19)

Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
Cosmin Vilcu - Sonicwal - prezentare - Cyber Security Trends 2020
 
Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020Adrian Ifrim - prezentare - Cyber Security Trends 2020
Adrian Ifrim - prezentare - Cyber Security Trends 2020
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
Cscu module 11 security on social networking sites
Cscu module 11 security on social networking sitesCscu module 11 security on social networking sites
Cscu module 11 security on social networking sites
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
Cyber law
Cyber lawCyber law
Cyber law
 
IoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital TransformationIoT, AI and Blockchain: Catalysts for Digital Transformation
IoT, AI and Blockchain: Catalysts for Digital Transformation
 
Cyberlaws report
Cyberlaws reportCyberlaws report
Cyberlaws report
 
Cyber laws and patents
Cyber laws and patentsCyber laws and patents
Cyber laws and patents
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Bangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global PerspectiveBangladesh Cyber Security Status in Global Perspective
Bangladesh Cyber Security Status in Global Perspective
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 

Destaque

Pratica biologia 2
Pratica biologia 2Pratica biologia 2
Pratica biologia 2
iarabuture
 
Christel schneider presentation oscc2013
Christel schneider presentation  oscc2013Christel schneider presentation  oscc2013
Christel schneider presentation oscc2013
Christel Schneider
 
Ieee 2012 titles for matlab
Ieee 2012 titles for matlabIeee 2012 titles for matlab
Ieee 2012 titles for matlab
Musthafa Tema
 
Lecture7 circulatory system
Lecture7 circulatory systemLecture7 circulatory system
Lecture7 circulatory system
Reach Na
 
Ficha de trabalho nº2 modulo 1 - cv133a (1)
Ficha de trabalho nº2   modulo 1 - cv133a (1)Ficha de trabalho nº2   modulo 1 - cv133a (1)
Ficha de trabalho nº2 modulo 1 - cv133a (1)
Leonor Alves
 
Poetry
Poetry Poetry
Poetry
gherm6
 
How to great someone
How to great someoneHow to great someone
How to great someone
sasensi5
 

Destaque (20)

Poesias 2008-2009
Poesias 2008-2009Poesias 2008-2009
Poesias 2008-2009
 
Proeftoets periode 4
Proeftoets periode 4Proeftoets periode 4
Proeftoets periode 4
 
Proyecto planeacion
Proyecto planeacionProyecto planeacion
Proyecto planeacion
 
Pratica biologia 2
Pratica biologia 2Pratica biologia 2
Pratica biologia 2
 
Christel schneider presentation oscc2013
Christel schneider presentation  oscc2013Christel schneider presentation  oscc2013
Christel schneider presentation oscc2013
 
Ieee 2012 titles for matlab
Ieee 2012 titles for matlabIeee 2012 titles for matlab
Ieee 2012 titles for matlab
 
Articulo Modelo
Articulo ModeloArticulo Modelo
Articulo Modelo
 
Kant
KantKant
Kant
 
6.fti madrid finalrego
6.fti madrid finalrego6.fti madrid finalrego
6.fti madrid finalrego
 
Lecture7 circulatory system
Lecture7 circulatory systemLecture7 circulatory system
Lecture7 circulatory system
 
Looking Back and Moving Forward by Thomas S. Monson
Looking Back and Moving Forward by Thomas S. MonsonLooking Back and Moving Forward by Thomas S. Monson
Looking Back and Moving Forward by Thomas S. Monson
 
Ficha de trabalho nº2 modulo 1 - cv133a (1)
Ficha de trabalho nº2   modulo 1 - cv133a (1)Ficha de trabalho nº2   modulo 1 - cv133a (1)
Ficha de trabalho nº2 modulo 1 - cv133a (1)
 
Nearly there...
Nearly there...Nearly there...
Nearly there...
 
Valores
ValoresValores
Valores
 
SLIDES
SLIDESSLIDES
SLIDES
 
Sail Away V2
Sail Away V2Sail Away V2
Sail Away V2
 
Poetry
Poetry Poetry
Poetry
 
How to great someone
How to great someoneHow to great someone
How to great someone
 
Teknologi Informasi UMY
Teknologi Informasi UMYTeknologi Informasi UMY
Teknologi Informasi UMY
 
portfolio design
portfolio designportfolio design
portfolio design
 

Semelhante a DSS @SFK Conference_2012_Cybercrime_welcomes_you

The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
helen23456789
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
IbuSrikandi
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
Dr Laurent Guiraud
 
Subimal bhattarchajee
Subimal bhattarchajeeSubimal bhattarchajee
Subimal bhattarchajee
IPPAI
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
shreemala1
 

Semelhante a DSS @SFK Conference_2012_Cybercrime_welcomes_you (20)

Cyber war
Cyber warCyber war
Cyber war
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
Jason Witty, SVP & CISO at US Bank - Next eneration information security meet...
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
The Global Implications of Intellectual Property (IP) Theft
The Global Implications of Intellectual Property (IP) TheftThe Global Implications of Intellectual Property (IP) Theft
The Global Implications of Intellectual Property (IP) Theft
 
Risk base approach for security management fujitsu-fms event 15 aug 2011
Risk base approach for security management   fujitsu-fms event 15 aug 2011Risk base approach for security management   fujitsu-fms event 15 aug 2011
Risk base approach for security management fujitsu-fms event 15 aug 2011
 
188
188188
188
 
Visible Market FinTech Demo 07182012
Visible Market FinTech Demo 07182012Visible Market FinTech Demo 07182012
Visible Market FinTech Demo 07182012
 
Cybercrime and Business Process Hacking
Cybercrime and Business Process HackingCybercrime and Business Process Hacking
Cybercrime and Business Process Hacking
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
Meeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptxMeeting04_Threats_to_Critical_Infrastructure.pptx
Meeting04_Threats_to_Critical_Infrastructure.pptx
 
IoT, Security & the Path to a Solution
IoT, Security & the Path to a SolutionIoT, Security & the Path to a Solution
IoT, Security & the Path to a Solution
 
Subimal bhattarchajee
Subimal bhattarchajeeSubimal bhattarchajee
Subimal bhattarchajee
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
A future security landscape
A future security landscapeA future security landscape
A future security landscape
 
Big data new era of network security analytic dwika
Big data new era of network security analytic dwikaBig data new era of network security analytic dwika
Big data new era of network security analytic dwika
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
How IoT Is Changing the Internet
How IoT Is Changing the InternetHow IoT Is Changing the Internet
How IoT Is Changing the Internet
 

Mais de Andris Soroka

Mais de Andris Soroka (20)

Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
Digitala Era 2017 - TransactPro - Normunds Aizstrauts - Maksājumu un finansu ...
 
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
Digitala Era 2017 - Datu Valsts Inspekcija - Lauris Linabergs - Vispārīgā dau...
 
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
Digitala Era 2017 - PMLP - Vilnis Vītoliņš - Gaisa kuģu pasažieru datu apstrā...
 
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
Digitala Era 2017 - BOD LAW - Līva Aleksejeva - LIELIE DATI un personas datu ...
 
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
Digitala Era 2017 - Spridzans Law Office - Anna Vladimirova Krykova - Mobilo ...
 
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
Digitala Era 2017 - ZAB “BULLET” - Ivo Krievs - Vai uz valsti attiecināmi cit...
 
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
Digitala Era 2017 - LSPDSA - Arnis Puksts - Datu aizsardzības speciālists (DPO)
 
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
Digitala Era 2017 - IIZI - Lauris Kļaviņš - GDPR - Kādus izdevumus un riskus ...
 
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
Digitala Era 2017 - E-Risinajumi - Māris Ruķers - Vai ar vienu datu aizsardzī...
 
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
Digitala Era 2017 - Gints Puškundzis - Personas datu apstrādes līgumi
 
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
Digitala Era 2017 - DatuAizsardziba.LV - Agnese Boboviča - Datu aizsardzības ...
 
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
Digitala Era 2017 - NotAKey - Janis Graubins - Mobile technologies for single...
 
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
Digitala Era 2017 - Hermitage Solutions - Gatis Kaušs - Clearswift - Komunikā...
 
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
Digitala Era 2017 - Digital Mind - Leons Mednis - eDiscovery risinājums GDPR ...
 
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
Digitala Era 2017 - ALSO - Artjoms Krūmiņš - Personas datu regulas (EU GDPR) ...
 
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
Digitala Era 2017 - ZAB Skopiņa & Azanda - Jūlija Terjuhana - Tiesības uz dat...
 
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
Digitala Era 2017 - IT Centrs - Agris Krusts - Latvijas iedzīvotāju digitālo ...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Datu Aizsardzības Tehnoloģiskā...
 
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
Digitala Era 2017 - DSS.LV - Arturs Filatovs - Mobilitāte un Personas Datu Dr...
 
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
Digitala Era 2017 - DSS.LV - Andris Soroka - Personas datu regulas tehnoloģis...
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

DSS @SFK Conference_2012_Cybercrime_welcomes_you

  • 1.
  • 2. Global figures - WEB At least one new domain each second 2010 – 196 million domain per quarter 2011 – 220 million domain names per quarter Source: VeriSign (Dec,2011)
  • 3. Global figures - WEB Google: 88 000 000 000 searches per month, 3 billion per day, 121 million per hour Twitter: 6939 tweets per second, billion tweets per week, 24 000 000 000 searches per month Yahoo Sites: 9 400 000 000 searches per month Microsoft sites: “just” around 4,1 billion
  • 4.
  • 5.
  • 6.  Public IM  P2P  Anonymizers  VoIP  Financial IM  Social Networks  Unified Communications  Games  Web Conferencing  Virtual Worlds  VoIP  IPTV  Remote Admin Tools
  • 7. Category Number Example Social Networking 936 Instant Messaging 259 IPTV 62 Remote Admin Tools 23 P2P 170 VoIP 100 Web Conferencing 55 Commercial Monitoring Software 257 Anonymizer 58 Web Mail 21 6000 +
  • 8. IT continues taking the lead in business (ERP, CRM, document management, digital prototyping, business intelligence etc.) Development of e-World continues (B2B, B2C, e-Services, e-Government, e-Health, social networking, Web 2.0, unified communications etc.) Consumerization, mobility and borderless enterprise is a reality Cyber culture grows faster than cyber security (as well – not all countries have compliance or penalties)
  • 9.
  • 10. Global figures - cybercrime 2011 – 431 billion people affected, with more than 114 billion USD directly and another 274 billion USD related to direct loss (Source: Symantec, Dec 2011) Cybercrime costs the world significantly more than the global black market of marijuana, cocaine and heroin combined ($228 billion world wide)
  • 11. Security today - Financially motivated Bank Accounts Identity theft Insiders Intellectual Property Theft “Hacktivists” Denial of Service Reputation Damage Customer data
  • 12.
  • 13.
  • 14. FBI warns USA Congress that cybercriminals can hack any internet-linked system Gordon M. Snow, assistant director of the FBI’s Cyber Division (13th of April, 2011) Exclusive: Computer Virus Hits U.S. Drone Fleet Noah Shachtman, Wired Magazine (7th of October, 2011) Betfair admits data hack... after 18 months - over two million card details were stolen Rory Cellan-Jones, BBC Technology (30th of September, 2011)
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. Policy and real time control Of devices and applications Of people and IT stuff Of data leak protection Of internet usage Of remote access Of employees training Of…. Encryption Mobile phones Voice calls and text messages eMails Computers and devices Data bases …
  • 23.
  • 24. Specialization – IT Security IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support) Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries
  • 25. www.dss.lv andris@dss.lv Mobile: +371 2 9162784 Twitter: andris_soroka