SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Cyber Security
Mobile Devices and On-line Threats
Cyber Security
Mobile Devices and On-line Threats
Presented by: Umer
Saeed
What is Cyber security
• The term Cyber dates back to the 40’s and 50’s and originates
from the word Cybernetics, which dealt with rise of Control
systems and human interaction with it.
• In simple terms, today the word Cyber indicates Internet or
having to do with computers e.g. Cyber fraud, Cyber security.
• Since its widespread acceptance, Internet has become home of
virtually every activity and huge amount of valuable data.
• Some of that data is extremely valuable and pertinent to
corporate and national security which naturally attracts bad
actors resulting in Cyber Crime and espionage
• Cyber Security deals with the defensive operations carried out
to defend valuable data on computers and especially on Smart
phones against threats like virus, malware, ransomware,
hacking, phishing and various other malicious attacks.
Why is Cyber Security more important than ever
• Exponential growth in use of technology and mobile devices to
process data

Massive use by corporations and people
 Governments, businesses and people, rely very heavily on various forms of
information
 Information, big-data, market statistics are now the key business success factors
 Impacts rich and poor, young and adults, men and women
 Exposes digital devices users to risks, regardless of gender, age, status
 Because these devices play an Irreplaceable role in our daily lives
 Abundance of technology and big-data has attractions for cyber criminals
Why is Cyber Security more important than ever
• Growing possibility of threats to our privacy and security
 HOW - Prejudice about security products/practices due to

Lack of awareness or availability of cheap security solutions

Unavailability of trained security professionals
 WHERE - Lack of understanding of magnitude of risks posed to our integrity

Governments, enterprises, businesses and common people fail to realize the
impact of security incidents
 WHY - Little awareness by relevant authorities, media and education institutes

The laws on Cyber crime, data leakage, defamation are in their early stages
and provide little deterrence
 WHEN – High probability of risks due to

always on, always present mobile/storage devices (e.g. USB sticks, Memory
Cards. Smart phones)
Why is Cyber Security more important than ever
• Lack of training and education at grass root level
 Lack of awareness of Cyber crime laws, basics of frauds and prevention
 Uncontrolled access to harmful mobile apps and websites before proper training
 Easy access given to toddlers, teenagers without proper training
 Ignoring recommended privacy settings for social media (Facebook, Whatsapp)
• Non-negotiable for business sustenance and growth
 Every business needs to operate On-line safely to stay relevant and in touch
with market and its growing consumer base
 A requirement for reaching emerging and developed markets
 Rapidly rising on-line market as compared to traditional businesses
 In most cases, the damages of Cyber crime are irrecoverable
Why worry about Mobile devices?
• Mobile devices have largest market share for Internet access
 More smart phones sold than Personal Computers and Laptops combined
 Easier to carry and operate in contrast to laptops
 Offers similar and in some cases, better computing and storage
• Hides in plain sight
 Exposed to more threats than a larger device e.g. Laptop
 Easy to steal, snatch, abuse data and in some cases leaking corporate resources
 Use in public places, large gathering exposing to Fake Wifi and MITM attacks
• Used for same tasks as we perform on Laptops/PCs
 Storing and processing Corporate information on the go
 Storing confidential files, sensitive and exploitable information

Little or no security for Photos, Online copies of Financial and bank records etc

Hardly any mobile has anti-virus or firewall
How Businesses can protect against Mobile Device threats
• Know what needs protection
●
Know what information assets are important for your business to operate effectively

Ensure strictly devised data classification policy exists and is adhered to for all data

Provide training to users to process data diligently according to classification
●
more you invest to train your business/family people​, less are the chances of security incidents

Evaluate the cost of data leakage and protect information assets accordingly
●
Cost of data leakage is the cost need to gather same data and same reputation. Two very
different things and yet crucial for business survival.

If you don't get involved, don't expect anyone else to be. Security is a Senior management
responsibility.
How Businesses can protect against Mobile Device threats
Protection of Information Assets

Never use pirated PC/Software to process data that is valuable to you, your family or business

Use strong encryption to protect data during operations (i.e. storage, processing, transmission)

Use Firewall, Intrusion Prevention, VLAN, DMZ, honeypots to protect sensitive data

Maintain regular off-line backup of valuable data. Test backups for possible recovery scenario

Avoid using USB sticks to store UN-encrypted data, at all costs

Avoid using Open WiFi and hot-spots in Coffee shops, airport and bus terminals. Use Mobile data.

Use strong passwords. Use pass phrases if possible.

Do NOT share sensitive information over social media

If costs are concern, use Open Source software. There’s an open source software for every need.

Hire only trained professionals to be custodians of information assets.
Three basic rules of protection
Protect
Business data
• Train staff and show your
involvement
• Classify Data and employ
controls matching data
sensitivity
• Genuine skills, software and
technology
Protect
Personal data
• Education about abuse of
personal data and misuse of
Social Media
• Use built-in cloud/App-lock
features to prevent device
misuse
• Encrypt valuable data, if you
have to keep on mobile.
About Presenter
• 20+ years in Systems and Networks Management, Security
• Held roles with prestigious organizations like British Council,
Arabian Co, ISACA
• Avid supporter of grass-root level, easily available security
education, awareness and training for youth
• Believes in adapting Linux in home as well as corporate
environments to end piracy and security issues
• Trainer for CISA, CISM
fb.me/FutureNOW
Cyber security and mobile devices

Mais conteúdo relacionado

Mais procurados

Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
Jacqueline Fick
 

Mais procurados (20)

Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Cyber security
Cyber securityCyber security
Cyber security
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Cyber security
Cyber security Cyber security
Cyber security
 

Semelhante a Cyber security and mobile devices

43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 

Semelhante a Cyber security and mobile devices (20)

Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Cyber security and mobile devices

  • 1. Cyber Security Mobile Devices and On-line Threats Cyber Security Mobile Devices and On-line Threats Presented by: Umer Saeed
  • 2.
  • 3. What is Cyber security • The term Cyber dates back to the 40’s and 50’s and originates from the word Cybernetics, which dealt with rise of Control systems and human interaction with it. • In simple terms, today the word Cyber indicates Internet or having to do with computers e.g. Cyber fraud, Cyber security. • Since its widespread acceptance, Internet has become home of virtually every activity and huge amount of valuable data. • Some of that data is extremely valuable and pertinent to corporate and national security which naturally attracts bad actors resulting in Cyber Crime and espionage • Cyber Security deals with the defensive operations carried out to defend valuable data on computers and especially on Smart phones against threats like virus, malware, ransomware, hacking, phishing and various other malicious attacks.
  • 4. Why is Cyber Security more important than ever • Exponential growth in use of technology and mobile devices to process data  Massive use by corporations and people  Governments, businesses and people, rely very heavily on various forms of information  Information, big-data, market statistics are now the key business success factors  Impacts rich and poor, young and adults, men and women  Exposes digital devices users to risks, regardless of gender, age, status  Because these devices play an Irreplaceable role in our daily lives  Abundance of technology and big-data has attractions for cyber criminals
  • 5. Why is Cyber Security more important than ever • Growing possibility of threats to our privacy and security  HOW - Prejudice about security products/practices due to  Lack of awareness or availability of cheap security solutions  Unavailability of trained security professionals  WHERE - Lack of understanding of magnitude of risks posed to our integrity  Governments, enterprises, businesses and common people fail to realize the impact of security incidents  WHY - Little awareness by relevant authorities, media and education institutes  The laws on Cyber crime, data leakage, defamation are in their early stages and provide little deterrence  WHEN – High probability of risks due to  always on, always present mobile/storage devices (e.g. USB sticks, Memory Cards. Smart phones)
  • 6. Why is Cyber Security more important than ever • Lack of training and education at grass root level  Lack of awareness of Cyber crime laws, basics of frauds and prevention  Uncontrolled access to harmful mobile apps and websites before proper training  Easy access given to toddlers, teenagers without proper training  Ignoring recommended privacy settings for social media (Facebook, Whatsapp) • Non-negotiable for business sustenance and growth  Every business needs to operate On-line safely to stay relevant and in touch with market and its growing consumer base  A requirement for reaching emerging and developed markets  Rapidly rising on-line market as compared to traditional businesses  In most cases, the damages of Cyber crime are irrecoverable
  • 7. Why worry about Mobile devices? • Mobile devices have largest market share for Internet access  More smart phones sold than Personal Computers and Laptops combined  Easier to carry and operate in contrast to laptops  Offers similar and in some cases, better computing and storage • Hides in plain sight  Exposed to more threats than a larger device e.g. Laptop  Easy to steal, snatch, abuse data and in some cases leaking corporate resources  Use in public places, large gathering exposing to Fake Wifi and MITM attacks • Used for same tasks as we perform on Laptops/PCs  Storing and processing Corporate information on the go  Storing confidential files, sensitive and exploitable information  Little or no security for Photos, Online copies of Financial and bank records etc  Hardly any mobile has anti-virus or firewall
  • 8. How Businesses can protect against Mobile Device threats • Know what needs protection ● Know what information assets are important for your business to operate effectively  Ensure strictly devised data classification policy exists and is adhered to for all data  Provide training to users to process data diligently according to classification ● more you invest to train your business/family people​, less are the chances of security incidents  Evaluate the cost of data leakage and protect information assets accordingly ● Cost of data leakage is the cost need to gather same data and same reputation. Two very different things and yet crucial for business survival.  If you don't get involved, don't expect anyone else to be. Security is a Senior management responsibility.
  • 9. How Businesses can protect against Mobile Device threats Protection of Information Assets  Never use pirated PC/Software to process data that is valuable to you, your family or business  Use strong encryption to protect data during operations (i.e. storage, processing, transmission)  Use Firewall, Intrusion Prevention, VLAN, DMZ, honeypots to protect sensitive data  Maintain regular off-line backup of valuable data. Test backups for possible recovery scenario  Avoid using USB sticks to store UN-encrypted data, at all costs  Avoid using Open WiFi and hot-spots in Coffee shops, airport and bus terminals. Use Mobile data.  Use strong passwords. Use pass phrases if possible.  Do NOT share sensitive information over social media  If costs are concern, use Open Source software. There’s an open source software for every need.  Hire only trained professionals to be custodians of information assets.
  • 10. Three basic rules of protection Protect Business data • Train staff and show your involvement • Classify Data and employ controls matching data sensitivity • Genuine skills, software and technology Protect Personal data • Education about abuse of personal data and misuse of Social Media • Use built-in cloud/App-lock features to prevent device misuse • Encrypt valuable data, if you have to keep on mobile.
  • 11. About Presenter • 20+ years in Systems and Networks Management, Security • Held roles with prestigious organizations like British Council, Arabian Co, ISACA • Avid supporter of grass-root level, easily available security education, awareness and training for youth • Believes in adapting Linux in home as well as corporate environments to end piracy and security issues • Trainer for CISA, CISM fb.me/FutureNOW