Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,

Slides:



Advertisements
Similar presentations
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Advertisements

Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
2013 FTC Consumer Protection and Competition Highlights Deon Woods Bell Office of International Affairs Livingstone, Zambia September 2013 The Fifth.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Internet safety By Lydia Snowden.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
1.1 System Performance Security Module 1 Version 5.
Mobile and Cyber Threat Issues Consumer Perspective on Uganda by Kimera Henry Richard, Chief Executive, CONSENT The Fifth Annual African Dialogue Consumer.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Kaspersky Labs 6 ht Annual Partner Conference · Turkey, June Kaspersky Labs 6 th Annual Partner Conference · Turkey, 2-6 June 2004 November 16.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Get Safe Online Expert advice for everyone In association with.
The Internet of Things and Consumer Protection
What is Spam? d min.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Put a Lock on It: Protecting your online privacy A project of Consumer Action |
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Call Us: (Toll Free)
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Information Management System Ali Saeed Khan 29 th April, 2016.
Securing Information Systems
An Introduction to Phishing and Viruses
Cyber Security Zafar Sadik
IT Security  .
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Securing Information Systems
Philip Nichilo Vincent Carestia
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
INTERNET SECURITY.
Presentation transcript:

Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone, Zambia September 2013

The U.S. Mobile Market 2 87 percent of Americans have a mobile phone Of those, only about 12 percent currently use them to make mobile payments Some believe that mobile payments will achieve “widespread mainstream consumer adoption” by 2015 Third party charges on wireless bills are estimated at $1.5 billion per year Few mobile devices have antivirus protection According to one survey, less than one-third of mobile users felt in control of their personal information on their device More than 800,000 apps are available in the Apple App Store and 700,000 in Google Play

Mobile Payments 3 Issues: There are many kinds of mobile payments Protections against fraudulent or unauthorized mobile payments vary by funding source Security of mobile payments FTC Initiatives: Workshop and Report on Mobile Payments WorkshopReport on Mobile Payments

Mobile “Cramming” 4 Issues: Third parties place unexpected charges on consumers’ phone bills Many consumer are unaware this can occur and often fail to spot such charges on their bills FTC Initiatives: Roundtable on Mobile Cramming Law Enforcement: Wise Media, LLC

Mobile Security 5 Issues: Personal information now regularly stored on smartphones Vectors for attack include malware as well as network and operating system vulnerabilities Concerns about the security of mobile payment systems are slowing their use FTC Initiatives: Workshop on mobile security Video: Public Wi-Fi Networks Law Enforcement: HTC America, Inc.

Mobile Privacy 6 Issues: Mobile devices are typically personal to an individual, always on, and with the user A single device can facilitate data collection and sharing among many entities Small screens constrain how critical privacy-related information is conveyed to consumers FTC Initiatives: Report: Mobile Privacy Disclosures: Building Trust Through Transparency Report: Mobile Privacy Disclosures: Building Trust Through Transparency

Mobile Consumer and Business Education 7 The FTC’s website offers a wealth of information on mobile issues for consumers and businesses. In addition, consumers from the U.S. and abroad can use FTC sites to report complaints about mobile-related transactions

Cyber Threats to Consumers and Countermeasures 8 Threats Malware – viruses, worms, spyware, and Trojan horses Phishing Wireless and operating system vulnerabilities Spam Countermeasures Anti-virus software Firewalls Intrusion detection systems Authentication systems Encryption

FTC Cyber-related Law Enforcement 9 Wyndham Worldwide Corp. The FTC alleges that data security failures led to three data breaches at Wyndham hotels in less than two years, resulting in the theft of information on hundreds of thousands of payment accounts and millions of dollars in fraud loss Cbr Systems, Inc. The FTC reached a settlement with the cord blood bank over allegations CBR failed to provide reasonable and appropriate security for customers’ personal information, resulting in a security breach Tech Support Scams Collaborating with foreign partners, the FTC halted telemarketing operations that allegedly tricked consumers into paying for the removal of non-existent viruses and malware

Consumer and Business Cyber Threat Education 10 FTC Initiatives: Video: Computer Security Video: Protect Your Computer from Malware Video: Protect Your Computer from Malware Game: Phishing Scams: Avoid the Bait Game: Beware of Spyware Game: The Case of the Cyber Criminal Peer-to-Peer File Sharing: a Guide for Business Peer-to-Peer File Sharing: a Guide for Business

11 THANK YOU!