SlideShare uma empresa Scribd logo
1 de 20
Online Security – An Assessment of the New Menace Global E-Business Marketing (200232)  Online Seminar Mini Report Monroe Myers	95774855   Sunny Joshi	17093024  
Table of Content Introduction - Online Security – An Assessment of the New Menace Literature Review & Findings Specific Topic Related Examples Discussion & Recommendations Futuristic Scenario & Class Activity
Introduction The following online seminar addresses aspects of a worrying trend in the digital world, online security, or lack thereof. And for a better understanding of the topic lets go through some key definitions related to the seminar. Before that, lets watch a short compilation of Personal security online videos. http://www.youtube.com/watch?v=zXzN3uJTGbI
Online Security – An Assessment of the New Menace Online security: “a threat that creates a circumstance, condition, or event with the potential to cause economic hardship to data or network resources in the form of destruction, disclosures, modification of data, denial of service, and/or fraud, waste and abuse” (Kalakota and Whinston, 1997). Information security: “the technical guarantees that ensure that the legal requirements and good practices with regard to privacy will be effectively met” (Flavian and Guinaliu, 2006).
Online Security – An Assessment of the New Menace   	Information warfare: “the actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary” (Alger, 1996).   	Internet Security Risk (ISR): “the degree of uncertainty and mistrust aroused from thoughts about providing personal and financial information over the internet” (Lynn et al., 2011).
Online Security – An Assessment of the New Menace Trust: “the willingness to rely on another based on expectations of ability, benevolence, and integrity (Lee and Turban, 2001; Bhattacherjee, 2002). Also defined as: “ the willingness of a trustor to be vulnerable to actions of a trustee due to an expectation the trustor will behave responsibly” (Mayer et al., 1995). Privacy: “to the degree to which the online shopping web site is safe and protects the customers’ information” (Chiu et al., 2009).
Literature Review & Findings Increasing dependence on Internet for various routine activities such as — finance and banking, energy, information and telecommunications, public health, transportation, emergency services, water, medical, defense, food and agriculture, shipping and postal services (Kenneth, Knapp and Boulton, 2006). Criminal activity is rapidly expanding into an underground economy specialising in identity theft, phishing and spam (Verton, 2004) as technical barriers to gaining access to valuable resources fall (Kenneth, Knapp and Boulton, 2006).
Literature Review and Findings Identity theft is another type of 'cyber-terrorism against individuals' (Sterling, 2004) encountered through online communications. As a result of the growing risk, demand for certifiably skilled cyber-security specialists growing at a fast pace.
Literature Review & Findings Following the development of hacking tools for attacking systems sporting the ubiquitous Windows operating system, cyber-criminals are turning their attention to Mac users as the Mac OS platform expands its market share (AVG, 2011) The rise of rogue smart-phone apps such as those relating to Google's Android Market and others is another worrying trend in the battle for greater online security measures (PC World, 2011).
Literature Review & Findings Curiously, most of the victims of cyber-attacks chose not to inform the outside world about such breaches. In 2005, only 20% of intrusions were reported to law enforcement agencies in the US, primarily because of concerns with negative publicity (Gordon et al., 2005) As a result of the recent wave of cyber-attacks and flowing from the perceived effects of potential liability, including leaks of corporate communications, negotiation contracts and other sensitive information influencing a firm's competitive-advantage in its industry and markets, demand for cyber-insurance is growing fast (Kolodzinski, 2002; Keating, 2003).
Literature Review & Findings Computer Economics estimated the damages resulting from The Love Bug, Melissa, Code Red to have exceeded US$54 billion in downtime, removal expenses, and repairs (Geralds, 2003). Ernst and Young alerted that online security-related occurrences can cost a firm US$20 million on average per incident (Garg, Curtis and Halper, 2003). A Fortune 1000 companies survey found a 64% annual growth rate in cyber-attacks carried out using the Internet (Bagchi and Udo, 2003). For example, cyber-technology is increasingly used in corporate espionage (Hansell, 2004).
Literature Review & Findings According to AVG (2011), 53,834 pieces of signed malware were detected in the first 5 months of 2011, a 300% increase on the previous year. Trusted malware involves passing and installing malicious code on a PC with the help of stolen digital certificates. Recently, stolen digital certificates made headlines with the Stuxnet 'worm' and the RSA hack of Lockheed Martin network breach (AVG, 2011). – It’s just like stealing the keys of the house as opposed to using physical force to gain access to a property. Around 7,000 spyware programs reportedly existed five years ago and are responsible for 50% of all PC crashes (Sipior, Ward and Roselli, 2005). Richmond (2004) argued that 91 percent of home computers host spyware code!  
Specific Online Security Related Examples According to the source, MacAfee, a data security firm controlled by Intel Corp., through its five-year long “Operation Shady RAT”, identified 72 government and corporate parties that have been silently compromised, in some instances over years without being detected. List is as follows-  1 -Asian and Western national Olympic Committees  2 -The International Olympic Committee (IOC)  3 -The United Nations  4 -The Association of Southeast Asian Nations (ASEAN) Secretariat 5 - South Korean steel and construction companies 6 -A South Korean Government agency  7- A Department of Energy Research Laboratory 8 -A US real estate firm 9 -Four US defense contractors  10 - A Vietnam’s government-owned technology company 11 - A US federal government agency 12 - Several US state and county governments, and one computer network security company (Alperovitch, 2011).
Specific Online Security Related Examples 2011 Set to Be Worst Year Ever for Security Breaches (Liebowitz 2011)       Companies as follows have faced severe breaches  - Sony, the data-security firm RSA, Lockheed Martin, the email wholesaler Epsilon, the Fox broadcast network, NASA, PBS, the European Space Agency, the FBI, the British and French treasuries  and the banking and insurance giant Citigroup.  What do all these organizations have in common? Along with dozens of other companies and government agencies, they were victims of massive network security breaches in the first six months of this year.  "In the last 10 years, I don't think we've seen breaches that have affected consumers at this scale," said OndrejKrehel, information security officer for Scottsdale
Discussion & Recommendations Given current and projected growth of information technology, its use in e-commerce and the magnitude, spread and affordability of launching cyber-threats in their many forms, contemporary levels of complacency afforded by business organizations, individuals and governments are largely and alarmingly inadequate. As superior cyber-attack technologies trickle down from state-sponsored labs to the increasingly sophisticated, financially-motivated cyber-criminals of late, businesses of all sizes are faced with the challenging task of managing the risks involvedspecially for small businesses. Therefore, it is strongly recommended for all stakeholders to adopt appropriate cyber-strategies for effective information security management.
Discussion & Recommendations A multi-layered approach to protecting online communications from prying eyes is needed in order to boost confidence in online services by a growing base of interested parties of all denominations governments, business organizations and individuals alike will need to collaborate in creating and maintaining an array of defense barriers in order to minimize chances for exposure to the rapidly sophisticated intrusions of the online world. For an effective strategy against the invisible threat, elements of technology, law and societal awareness are advised to be incorporated in management's strategy , it is significant to help small and medium enterprise become better acquainted with their increasingly important role in securing B2B and B2C networks and data streams in an effort to foster a safer online environments.
Discussion & Recommendations Bush (2003), for instance, divided the complex cyber-challenge into five levels as part of the National Strategy to Secure Cyberspace. Those levels are - 1 - Home users and small businesses 2 - Large enterprises 3 - Critical infrastructure sectors 4 - National vulnerabilities  5 - The global information grid of networked        systems.
Discussion & Recommendations ,[object Object]
. Corporations are also recommended to collaborate with governments in designing and adopting appropriate mechanisms for dealing with the various facets of the problem and reaching binding agreements with regard to their rights and obligations in the process
Individuals carry the ultimate responsibility for using the expanding medium within reason while raising their own awareness of the dangers of venturing unprepared, in terms of hardware and software, into the 'World Wild Web'.,[object Object]

Mais conteúdo relacionado

Mais procurados

WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionWilliam McBorrough
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)Bradley Susser
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information societySomerco Research
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Creus Moreira Carlos
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copysmita mitra
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 

Mais procurados (17)

WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
B susser researchpaper (3)
B susser researchpaper (3)B susser researchpaper (3)
B susser researchpaper (3)
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
Carlos Moreira Cyber Security Round-table Moderation in NY 2014 M&A Advisory ...
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Final presentation cyber security submit copy
Final presentation cyber security submit copyFinal presentation cyber security submit copy
Final presentation cyber security submit copy
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 

Destaque

Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingANURAG CHAKRABORTY
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking pptshreya_omar
 
Introduction To Dotnet
Introduction To DotnetIntroduction To Dotnet
Introduction To DotnetSAMIR BHOGAYTA
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminarshilpi nagpal
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 

Destaque (14)

Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Ethical hacking/ Penetration Testing
Ethical hacking/ Penetration TestingEthical hacking/ Penetration Testing
Ethical hacking/ Penetration Testing
 
Secura Security India Overview
Secura Security India OverviewSecura Security India Overview
Secura Security India Overview
 
Google Fiber
Google FiberGoogle Fiber
Google Fiber
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Introduction To Dotnet
Introduction To DotnetIntroduction To Dotnet
Introduction To Dotnet
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Semelhante a Online security – an assessment of the new

B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)Bradley Susser
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfTirthShah760404
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...Fas (Feisal) Mosleh
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza Belayneh
 

Semelhante a Online security – an assessment of the new (20)

Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
B susser researchpaper (2)
B susser researchpaper (2)B susser researchpaper (2)
B susser researchpaper (2)
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
EA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdfEA&SP_GROUP_ASSIGNMENT_1.pdf
EA&SP_GROUP_ASSIGNMENT_1.pdf
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Beza belayneh information_warfare_brief
Beza belayneh information_warfare_briefBeza belayneh information_warfare_brief
Beza belayneh information_warfare_brief
 

Último

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Último (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

Online security – an assessment of the new

  • 1. Online Security – An Assessment of the New Menace Global E-Business Marketing (200232)  Online Seminar Mini Report Monroe Myers 95774855   Sunny Joshi 17093024  
  • 2. Table of Content Introduction - Online Security – An Assessment of the New Menace Literature Review & Findings Specific Topic Related Examples Discussion & Recommendations Futuristic Scenario & Class Activity
  • 3. Introduction The following online seminar addresses aspects of a worrying trend in the digital world, online security, or lack thereof. And for a better understanding of the topic lets go through some key definitions related to the seminar. Before that, lets watch a short compilation of Personal security online videos. http://www.youtube.com/watch?v=zXzN3uJTGbI
  • 4. Online Security – An Assessment of the New Menace Online security: “a threat that creates a circumstance, condition, or event with the potential to cause economic hardship to data or network resources in the form of destruction, disclosures, modification of data, denial of service, and/or fraud, waste and abuse” (Kalakota and Whinston, 1997). Information security: “the technical guarantees that ensure that the legal requirements and good practices with regard to privacy will be effectively met” (Flavian and Guinaliu, 2006).
  • 5. Online Security – An Assessment of the New Menace   Information warfare: “the actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary” (Alger, 1996).   Internet Security Risk (ISR): “the degree of uncertainty and mistrust aroused from thoughts about providing personal and financial information over the internet” (Lynn et al., 2011).
  • 6. Online Security – An Assessment of the New Menace Trust: “the willingness to rely on another based on expectations of ability, benevolence, and integrity (Lee and Turban, 2001; Bhattacherjee, 2002). Also defined as: “ the willingness of a trustor to be vulnerable to actions of a trustee due to an expectation the trustor will behave responsibly” (Mayer et al., 1995). Privacy: “to the degree to which the online shopping web site is safe and protects the customers’ information” (Chiu et al., 2009).
  • 7. Literature Review & Findings Increasing dependence on Internet for various routine activities such as — finance and banking, energy, information and telecommunications, public health, transportation, emergency services, water, medical, defense, food and agriculture, shipping and postal services (Kenneth, Knapp and Boulton, 2006). Criminal activity is rapidly expanding into an underground economy specialising in identity theft, phishing and spam (Verton, 2004) as technical barriers to gaining access to valuable resources fall (Kenneth, Knapp and Boulton, 2006).
  • 8. Literature Review and Findings Identity theft is another type of 'cyber-terrorism against individuals' (Sterling, 2004) encountered through online communications. As a result of the growing risk, demand for certifiably skilled cyber-security specialists growing at a fast pace.
  • 9. Literature Review & Findings Following the development of hacking tools for attacking systems sporting the ubiquitous Windows operating system, cyber-criminals are turning their attention to Mac users as the Mac OS platform expands its market share (AVG, 2011) The rise of rogue smart-phone apps such as those relating to Google's Android Market and others is another worrying trend in the battle for greater online security measures (PC World, 2011).
  • 10. Literature Review & Findings Curiously, most of the victims of cyber-attacks chose not to inform the outside world about such breaches. In 2005, only 20% of intrusions were reported to law enforcement agencies in the US, primarily because of concerns with negative publicity (Gordon et al., 2005) As a result of the recent wave of cyber-attacks and flowing from the perceived effects of potential liability, including leaks of corporate communications, negotiation contracts and other sensitive information influencing a firm's competitive-advantage in its industry and markets, demand for cyber-insurance is growing fast (Kolodzinski, 2002; Keating, 2003).
  • 11. Literature Review & Findings Computer Economics estimated the damages resulting from The Love Bug, Melissa, Code Red to have exceeded US$54 billion in downtime, removal expenses, and repairs (Geralds, 2003). Ernst and Young alerted that online security-related occurrences can cost a firm US$20 million on average per incident (Garg, Curtis and Halper, 2003). A Fortune 1000 companies survey found a 64% annual growth rate in cyber-attacks carried out using the Internet (Bagchi and Udo, 2003). For example, cyber-technology is increasingly used in corporate espionage (Hansell, 2004).
  • 12. Literature Review & Findings According to AVG (2011), 53,834 pieces of signed malware were detected in the first 5 months of 2011, a 300% increase on the previous year. Trusted malware involves passing and installing malicious code on a PC with the help of stolen digital certificates. Recently, stolen digital certificates made headlines with the Stuxnet 'worm' and the RSA hack of Lockheed Martin network breach (AVG, 2011). – It’s just like stealing the keys of the house as opposed to using physical force to gain access to a property. Around 7,000 spyware programs reportedly existed five years ago and are responsible for 50% of all PC crashes (Sipior, Ward and Roselli, 2005). Richmond (2004) argued that 91 percent of home computers host spyware code!  
  • 13. Specific Online Security Related Examples According to the source, MacAfee, a data security firm controlled by Intel Corp., through its five-year long “Operation Shady RAT”, identified 72 government and corporate parties that have been silently compromised, in some instances over years without being detected. List is as follows- 1 -Asian and Western national Olympic Committees 2 -The International Olympic Committee (IOC) 3 -The United Nations 4 -The Association of Southeast Asian Nations (ASEAN) Secretariat 5 - South Korean steel and construction companies 6 -A South Korean Government agency 7- A Department of Energy Research Laboratory 8 -A US real estate firm 9 -Four US defense contractors 10 - A Vietnam’s government-owned technology company 11 - A US federal government agency 12 - Several US state and county governments, and one computer network security company (Alperovitch, 2011).
  • 14. Specific Online Security Related Examples 2011 Set to Be Worst Year Ever for Security Breaches (Liebowitz 2011) Companies as follows have faced severe breaches - Sony, the data-security firm RSA, Lockheed Martin, the email wholesaler Epsilon, the Fox broadcast network, NASA, PBS, the European Space Agency, the FBI, the British and French treasuries and the banking and insurance giant Citigroup. What do all these organizations have in common? Along with dozens of other companies and government agencies, they were victims of massive network security breaches in the first six months of this year. "In the last 10 years, I don't think we've seen breaches that have affected consumers at this scale," said OndrejKrehel, information security officer for Scottsdale
  • 15. Discussion & Recommendations Given current and projected growth of information technology, its use in e-commerce and the magnitude, spread and affordability of launching cyber-threats in their many forms, contemporary levels of complacency afforded by business organizations, individuals and governments are largely and alarmingly inadequate. As superior cyber-attack technologies trickle down from state-sponsored labs to the increasingly sophisticated, financially-motivated cyber-criminals of late, businesses of all sizes are faced with the challenging task of managing the risks involvedspecially for small businesses. Therefore, it is strongly recommended for all stakeholders to adopt appropriate cyber-strategies for effective information security management.
  • 16. Discussion & Recommendations A multi-layered approach to protecting online communications from prying eyes is needed in order to boost confidence in online services by a growing base of interested parties of all denominations governments, business organizations and individuals alike will need to collaborate in creating and maintaining an array of defense barriers in order to minimize chances for exposure to the rapidly sophisticated intrusions of the online world. For an effective strategy against the invisible threat, elements of technology, law and societal awareness are advised to be incorporated in management's strategy , it is significant to help small and medium enterprise become better acquainted with their increasingly important role in securing B2B and B2C networks and data streams in an effort to foster a safer online environments.
  • 17. Discussion & Recommendations Bush (2003), for instance, divided the complex cyber-challenge into five levels as part of the National Strategy to Secure Cyberspace. Those levels are - 1 - Home users and small businesses 2 - Large enterprises 3 - Critical infrastructure sectors 4 - National vulnerabilities 5 - The global information grid of networked systems.
  • 18.
  • 19. . Corporations are also recommended to collaborate with governments in designing and adopting appropriate mechanisms for dealing with the various facets of the problem and reaching binding agreements with regard to their rights and obligations in the process
  • 20.
  • 21. Futuristic Scenario It’s the 22nd of August 2025….. …. A Nation has declared a war against an another Nation. Minimum or no use of Arms.. Keyboards replace Bullets.. Traditional reasons for war such as land and resources are replaced by Cyberspace invasions and capturing of the online infrastructure and the data virtually. Lets discuss..