Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011.

Slides:



Advertisements
Similar presentations
Building our security culture
Advertisements

Some names to Remember ! Herbert Street Technologies Ltd
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar.
Making Your Business Grow
Minimum Data-set for all mental health referrals.
© 2011 Amadeus North America, Inc. All rights reserved. Trademark of Amadeus North America, Inc. and/or affiliates. Amadeus is a registered trademark of.
Tyntec Research: Brazilian and Russian Social Media Users Are Concerned About Identity Theft – UK and US Counterparts Worry Most About Lack of Information.
25 % of users don’t bother with privacy settings 1.11 billion users 665 million daily users 23 % of users check their account 5 times a day 1in10 people.
East Midlands Councils Member Development Skills Portal Survey February 2012.
MAPCAFE Alberton Group Venue - The Glen Alberton, City of Jo’burg, South Africa Tel: Vacant Speaker.
Sedex: Registration and Account Set Up Instructions
TASK 2: WHO DO YOU SEE?. TASK 2: WHO DO YOU SEE?
Privacy: Facebook, Twitter
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
INFORMATION REVELATION AND PRIVACY IN ONLINE SOCIAL NETWORKS (THE FACEBOOK CASE) Rachid Hamcha IMM.
Using LinkedIn. LinkedIn At A Glance LinkedIn is a social network aimed toward professionals More than 50 million users Usually seen as an online version.
0 Using Linkedin for ACACSO Networking Lisa Gering November 13, 2009.
The popularity of the social networks. The most popular social networks.
Web 2.0: Concepts and Applications 5 Connecting People.
Week 2 Social Media and Online Identity. Feedback on week 1 How did you get on? What are your thoughts on Digital literacies Did you take the Digital.
Web 2.0: Concepts and Applications 5 Connecting People.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
1 On Protecting Private Information in Social Networks: A Proposal Bo Luo 1 and Dongwon Lee 2 1 The University of Kansas, 2 The Pennsylvania.
Hobbies: Social networking YOU TUBE FACE BOOK MYSPACE.
WEB2.0 Social Media & Independent Pharmacy Real World Use & Possibilities.
Create Award Winning Websites! A Look at the AAM Website Award Winners Presenter: Gail Perry, CPA Publisher/Editor-in-Chief AccountingWEB Sponsored by:
WELCOME TO A NATIONAL DISABILITY INSTITUTE 30 SECOND TRAINING.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
Clarity in a World of Social Madness How Social Media Works for YOU, Your BUSINESS and.
Social Networking Pluses and Minuses By: Julie Nguyen and Carol Osorio.
Using Facebook to Connect With Customers Part 1. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Facebook for Personal Use.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Internet Safety Night Raising Good Digital Citizens.
Using Facebook to Connect With Customers. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Hands-On Workshop Summary / Conclusions.
Social Networking Presentation to Department Heads January 21, 2010.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
What is Social Networking? Grouping of individuals into specifics groups like a community or a subdivision. Online social networking websites are commonly.
Using Facebook to Connect With Customers. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Hands-On Workshop Summary / Conclusions.
PERSONAL HISTORY AND ITS IMPACT ON A CAREER IN HEALTH PERSONAL HISTORY AND ITS IMPACT ON A CAREER IN HEALTH South Carolina AHEC Health Careers Academy.
Facebook: The Social Network That Took Over The World By Sarah Benqlilou.
Web 2.0 Technologies Photocopiable/digital resources may only be copied by the purchasing institution on a single site and for their own use.
Durban, South Africa, 8 July 2013 Automated Targeted Attacks Alexandru Catalin Cosoi, Chief Security Strategist, Bitdefender ITU.
How Chapters Can use Social Media Mark Storace Sacramento Chapter March 2013.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
We are UK based property investment company. we provide Buy to Let Properties for Sale, property investment and full letting management for any properties.
Micron Associates
TITLE Date Social Networking: Crafting the Perfect Social Media Strategy.
Post Root Canal Treatment
Hawaii Property Management Companies -
Social networks: Advantages and disadvantages
Marketing Partnerships
Pre-writing topic discussion: Speak to your partner
Business Meetings in Australia
4 Most Common Dental Problems in America
Accounting Network . -
Overview Social media applications inform, educate, and entertain people through online (multi-)media A social networking application allows users to create.
Social Networks.
Information Security – Aug 18
Over time, the car dealership/car ownership relationship has become very transactional and highly commoditized. At Cowell Auto Group’s Audi of Richmond,
Security Essentials for Small Businesses
Progress Leisure 2016 B063 – ICT GCSE.
Looking out for Electrical Power Distribution System for your firm? Rely on professionals from
CYBERSAFETY & Personal information
Social Media Safety.
Now Buy Best External Door Hardware from Doorhardware
Using Facebook to Connect With Customers
Presentation transcript:

Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011

2 Copyright © 2011 IsecT Ltd. Introduction Do you use Facebook, MySpace, Flickr, Linked In, Blogger or Twitter? Do your colleagues, friends or family use them? Do you tend to trust the people you know? Are you human?

3 Copyright © 2011 IsecT Ltd. The risks

4 Copyright © 2011 IsecT Ltd. Low-end risk

5 Copyright © 2011 IsecT Ltd. High-end risk? Personal information on as many as 35 million users of a South Korean social network site may have been exposed as the result of what has been described as the country's biggest ever hack attack … Names, phone numbers, addresses, and other details may have been exposed through the Cyworld hack, which follows previous attacks against South Korean government sites and financial service firms. North Korea has been implicated in some of these hacks. … The RegisterThe Register 28 th July 2011

6 Copyright © 2011 IsecT Ltd. Leveraging information

7 Copyright © 2011 IsecT Ltd. Social engineering

8 Copyright © 2011 IsecT Ltd. Social engineering

9 Copyright © 2011 IsecT Ltd. Social engineering

10 Copyright © 2011 IsecT Ltd. D elay A uthenticate R esist T ransfer Dealing with social engineers General employees Front-line employees

11 Copyright © 2011 IsecT Ltd. Other controls

12 Copyright © 2011 IsecT Ltd. Conclusion You may believe you are immune to the kinds of attacks we have discussed … but are your colleagues, friends, bosses, family members, suppliers …? Please help us raise awareness: knowing that we might be attacked, what forms attacks may take, and how to respond (remember DART) are important controls

13 Copyright © 2011 IsecT Ltd. Further information Speak to colleagues Visit the intranet Security Zone Contact the Information Security Manager Read these books …