SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Computer Security

is anything less than 100% -
      “good enough”?




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
how secure is “secure”?

exactly what are the threats out there?

why are “they” doing it?

what is necessary to protect your
business?




         Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what are risks?
data loss

public relations issues

regulatory non-compliance

legal exposure

productivity loss

unnecessary expense




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
if you are connected to the internet, the
      internet is connected to you




          Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
so, what is “out there”?

    Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
spyware
spam



                                                                          phishing


                              intrusion
       s
 viru



           cyber-threats

        Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
targeted




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
to whom it may concern




   Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
but why & who?




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
political reasons




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
money!
Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
So far...



we know what the threats are
who is doing it
why




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
so, what is “good enough”?

     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
is there such thing as “good enough”
when it comes to network security?
are periodic signature updates OK?

should you allow portable media? company “policy”

how long could your organization go without email?

do you know if any of your computers are already compromised?

should you filter content?

is your public wireless network segregated?

how safe is “cloud” storage?

how much illegal software is on your company network?



                 Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
security basics
firewall
intrusion detection
anti-virus
anti-spam
anti-spyware
content filter (web browsing)
data leakage prevention




     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what should a manager do?

each business must carefully evaluate
circumstances
look long and hard at current and
future data
determine where and how to store
data
budget



         Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
security
diy or hire someone?




                                    or




 Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what do we know now?

every computer that ever connects
to the internet is at risk
the risks run 24/7/365 and... they
are constantly changing
effective security is not difficult or
expensive




        Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
books? - what’s a book?




   Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
how do kids learn today?




    Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
blue reef sonar
  Makes students accountable for the time they spend on the internet

  Protects laptops even when not on the school network

  Support and manage ALL devices - even Apple, iOS, Android, Windows,
Linux, MacOS - with a single log-on

  Teachers can open blocked web sites without involving IT

  Monitor chats, social networking

  Cyber bullying solutions

  STOP anonymous proxies...


if you know a school - do them a favor - tell them
        about Sonar - they will thank you


                     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
ขอบคุณมากๆ

  thank you




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok

Más contenido relacionado

La actualidad más candente

IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
Daren Dunkel
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
AM Publications,India
 

La actualidad más candente (20)

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
IoT
IoTIoT
IoT
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
 

Similar a Computer Network Security

How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobile
Carsonified Team
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
shericehewat
 

Similar a Computer Network Security (20)

Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web Apps
 
How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobile
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile Workshop
 
How To Use It With Safe
How To Use It With SafeHow To Use It With Safe
How To Use It With Safe
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobile
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology Adoption
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentation
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Computer Network Security

  • 1. Computer Security is anything less than 100% - “good enough”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 2. Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 3. how secure is “secure”? exactly what are the threats out there? why are “they” doing it? what is necessary to protect your business? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 4. what are risks? data loss public relations issues regulatory non-compliance legal exposure productivity loss unnecessary expense Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 5. if you are connected to the internet, the internet is connected to you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 6. so, what is “out there”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 7. spyware spam phishing intrusion s viru cyber-threats Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 8. targeted Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 9. to whom it may concern Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 10. but why & who? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 11. political reasons Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 12. money! Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 13. So far... we know what the threats are who is doing it why Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 14. so, what is “good enough”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 15. is there such thing as “good enough” when it comes to network security? are periodic signature updates OK? should you allow portable media? company “policy” how long could your organization go without email? do you know if any of your computers are already compromised? should you filter content? is your public wireless network segregated? how safe is “cloud” storage? how much illegal software is on your company network? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 16. security basics firewall intrusion detection anti-virus anti-spam anti-spyware content filter (web browsing) data leakage prevention Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 17. what should a manager do? each business must carefully evaluate circumstances look long and hard at current and future data determine where and how to store data budget Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 18. security diy or hire someone? or Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 19. what do we know now? every computer that ever connects to the internet is at risk the risks run 24/7/365 and... they are constantly changing effective security is not difficult or expensive Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 20. books? - what’s a book? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 21. how do kids learn today? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 22. blue reef sonar Makes students accountable for the time they spend on the internet Protects laptops even when not on the school network Support and manage ALL devices - even Apple, iOS, Android, Windows, Linux, MacOS - with a single log-on Teachers can open blocked web sites without involving IT Monitor chats, social networking Cyber bullying solutions STOP anonymous proxies... if you know a school - do them a favor - tell them about Sonar - they will thank you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 23. ขอบคุณมากๆ thank you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok