A+ Network+ Security+ Microsoft Certified Systems Administrator (MCSA) 2/1/20111.

Slides:



Advertisements
Similar presentations
Industry selected : Lenovo
Advertisements

ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
EGNOS OS/Galileo regulated tracking & tracing services for personal mobility “EGNOS/Galileo services benefiting to.
Mobile Security George Bailey Information Security Ivy Tech Community College of Indiana Tech Day 2006, Columbus, IN.
Illustration collectées par Jean Burdy - 8/09/20111.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Laptop Security SIRT IT Security Roundtable Harvard Townsend IT Security Officer May 2, 2008.
Cyber Security on the go
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Mobile Devices and Wireless Tracy Jackson Liz Nenni Matt Hinson Chris Eiben.
Sophos Mobile Control SophSkills Session Name: Thomas Lippert – Product Management DPG Date: 17-Feb-2011.
© Robert G Parker – UW-CISA 2010 S-1 New and Emerging Technologies 3 - New and Emerging Technologies.
Outpost Office Firewall Product presentation. What is Outpost Office Firewall? Software firewall solution designed especially to meet small and medium.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
WHICH TO CHOOSE RIGHT SERVER FOR THE RIGHT JOB. Today’s business environment demands that small and midsize businesses do more with less. The large majority.
Planning, Research and Institutional Effectiveness July 13, /13/20111PRIE Dashboard Modul 1.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
© 2009 Lenovo Security at the Endpoint Henry Ramos.
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
Computer Security and Privacy Chapter Overview  This chapter covers:  Hardware loss, hardware damage, and system failure, and the safeguards that.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
PROPERTY MONITORING TECHNOLOGY BY: ALEXANDER GOUNTRAS.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
Mobile Computing in Society Jared Sutherland CIS 497
Telecommunications. General Information Industry: Telecommunication Industry Patent Number: (US Patent) Title: Electronic Device Security.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
A security system for tracking and remote management of Android mobile devices client design and implementation Ihor Karpachev.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Keeping I.T. Safe ®. Jun Lin Nandini Aijia Vincent (Leader)….clearly Oliver Fiona Kiran.
The State of Computer & Data Security in Corporations Independent Survey.
M-COMMERCE Group 3 Amy Ruble, Marva Holiday, D. J. McBride, Josh Hamm.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Apple Inc ISO.
The I Phone Multimedia Group Project Jameelah Hogan Jamell Matthews.
Sponsored by the U.S. Department of Defense © 2008 by Carnegie Mellon University page 1 Pittsburgh, PA The Implications of a Single Mobile Computing.
LBS Division INDOOR POSITIONING SYSTEM Indoors Independent infrastructure that communicates via wireless connection standards: RFID Technology: Continuous.
Introduction TO Network Administration
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
If you are thinking about developing mobile application for your customer, this is an important aspect to consider the platform.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Mobile Device Security Threats Christina Blakley Host Computer Security.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Mobile Operating Systems
Computer Virus and Antivirus
MICROSOFT AZURE ISV PROFILE: ONEBE
Security in mobile technologies
Securely run and grow your business
Presentation transcript:

A+ Network+ Security+ Microsoft Certified Systems Administrator (MCSA) 2/1/20111

Portable PC Theft Up to 12,000 laptops are lost at United States airports each week 1 Between 65 and 70 percent of lost laptops are never reclaimed 1 Many business travelers have sensitive and/or personal information stored on laptops 1. Microexpert.com Microexpert.com 2/1/20112

How Many? More than 2 million laptops are stolen every year px px 2/1/20113

Market Potential Around 30 – 50 million laptops are sold each year in the United States College students, businessmen (and women), and nerds nearly all own laptops 2/1/20114

L.S.D. (Laptop Security Device) A hardware/software, multi-faceted solution to the problem of laptop theft in public areas Hardware: A built-in (i.e. in the type-II slot) device with an accelerometer, GPS, and 3G receiver Software: A password to de-activate alarm mode, user interface for sensitivity, alarm, and if stolen settings Sounds an alarm if moved in alarm mode, app support for cell phone disarm of alarm, remote encyrption/wipe, gps tracking on iphones 2/1/20115

Competition & Existing Products 2/1/20116

Who? Computer & electronics manufacturers – i.e. Dell, HP, Asus, Apple, etc… 6 2/1/20117

Advantages & Limitations L.S.D. could prevent identity theft L.S.D could protect confidential business data, and ensure the protection of personal data L.S.D. could be cheap enough to be available to the public market L.S.D. could be disabled by sufficiently tech-savvy evil- doers, however, most are not Car alarm syndrome (ignoring alarm) – not likely in airport or coffee shop 2/1/20118

study/ 2/1/20119