SlideShare uma empresa Scribd logo
1 de 29
The Battle for Internet Safety Vic Laurie vlaurie.com
What We Will Cover ,[object Object],[object Object],[object Object]
The Bad News ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Good News ,[object Object],[object Object]
The Problem Is Inherent ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bad Statistics  ,[object Object],[object Object]
 
 
 
An ad online showing bulk credit card numbers for sale
 
How Much Security Is Enough? ,[object Object],[object Object],[object Object],[object Object]
21 ZoneAlarm Internet Security 35 Trend Micro Internet Security Pro 19 PC Security Shield 24 Panda Internet Security 15 Norton Internet Security 2010 26 Norman Internet Security Suite 19 McAfee Internet Security 15 Kaspersky Internet Security 40 BitDefender Internet Security Boot Time Increase   (sec) Suite
Different Types of Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Criteria for Basic Defense for Average Home User ,[object Object],[object Object],[object Object],[object Object]
Minimum Defenses for Average PC User ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Defenses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Useful References ,[object Object],[object Object],[object Object],[object Object]
 
Menu from “Safety” button in Internet Explorer 8
Firefox Site Filtering
 
 
Network Security ,[object Object],[object Object],[object Object]
Privacy Issues ,[object Object],[object Object],[object Object],[object Object]
 
The  End vlaurie.com tips.vlaurie.com

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Enterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesEnterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security Cases
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
cyber security
cyber securitycyber security
cyber security
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 

Destaque (8)

Anniversary intro
Anniversary introAnniversary intro
Anniversary intro
 
Gvo2
Gvo2Gvo2
Gvo2
 
My virtual Bio
My virtual BioMy virtual Bio
My virtual Bio
 
3c
3c3c
3c
 
CDP – Статистика за 2012 год
CDP – Статистика за 2012 годCDP – Статистика за 2012 год
CDP – Статистика за 2012 год
 
あなたはどっち? クラウドでDebian // Debianでクラウド
あなたはどっち? クラウドでDebian // Debianでクラウドあなたはどっち? クラウドでDebian // Debianでクラウド
あなたはどっち? クラウドでDebian // Debianでクラウド
 
THE VALUE OF GLOBAL CAREERS TO THE UK
THE VALUE OF GLOBAL CAREERS TO THE UKTHE VALUE OF GLOBAL CAREERS TO THE UK
THE VALUE OF GLOBAL CAREERS TO THE UK
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 

Semelhante a The battle for safety

Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
Patty Ramsey
 

Semelhante a The battle for safety (20)

C3
C3C3
C3
 
Information security
Information securityInformation security
Information security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Hamza
HamzaHamza
Hamza
 
INT 1010 05-3.pdf
INT 1010 05-3.pdfINT 1010 05-3.pdf
INT 1010 05-3.pdf
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 

Mais de Joel May

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
Joel May
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
Joel May
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
Joel May
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
Joel May
 
Free software
Free softwareFree software
Free software
Joel May
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
Joel May
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
Joel May
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
Joel May
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
Joel May
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
Joel May
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
Joel May
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
Joel May
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
Joel May
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
Joel May
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
Joel May
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
Joel May
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
Joel May
 

Mais de Joel May (20)

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Free software
Free softwareFree software
Free software
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
 
Your family legacy
Your family legacyYour family legacy
Your family legacy
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

The battle for safety

  • 1. The Battle for Internet Safety Vic Laurie vlaurie.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.  
  • 9.  
  • 10.  
  • 11. An ad online showing bulk credit card numbers for sale
  • 12.  
  • 13.
  • 14. 21 ZoneAlarm Internet Security 35 Trend Micro Internet Security Pro 19 PC Security Shield 24 Panda Internet Security 15 Norton Internet Security 2010 26 Norman Internet Security Suite 19 McAfee Internet Security 15 Kaspersky Internet Security 40 BitDefender Internet Security Boot Time Increase (sec) Suite
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.  
  • 22. Menu from “Safety” button in Internet Explorer 8
  • 24.  
  • 25.  
  • 26.
  • 27.
  • 28.  
  • 29. The End vlaurie.com tips.vlaurie.com