Current Issues of Information Security in Japanese Society Yukihiro FURUSE Visiting Professor, Center for Global Communications, International University.

Slides:



Advertisements
Similar presentations
Steps towards E-Government in Syria
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Computer security Viruses Hacking Backups
Rodolfo Fücher Community Affairs Microsoft Corporation Modelos de Negocios en acción: Aprendizajes y retos.
Internet Safety in Henry County Schools By the division’s Internet Safety Task Force.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY FOR STUDENTS
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
INTERNET and CODE OF CONDUCT
INTERNET SAFETY FOR STUDENTS
Lesson 1: Understanding Browsers. This unit is a set of investigations into how to protect against digital threats, and how to detect digital crimes.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Jonathan Reichardt. Internet Regulation Internet regulations censor data on the internet monitor IP addresses. The Internet Society wants to stop regulations.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
C4- Social, Legal, and Ethical Issues in the Digital Firm
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
Atif Iqbal, R. K. Bagga.  Appropriate mechanism for good governance with the involvement of Information Technology in the system of the government and.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
Cultural Conformity and Adaptation Social Change Chapter 3, section 3 Pgs
Heba Daraghmeh 27/6/2010 Basic Computer Terminology.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Digital Citizenship. Digital Citizen  A person using IT in order to engage in society, politics, and government expectations.  “Those who use the internet.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
STAY SAFE!! Don’t fall for the same old tricks !!.
Physical Design of a network People who develop & support networks.
Telecommunications Communication over a long distance; Distant communication.
The Internet and Constitutional Rights Copyright © Texas Education Agency, All rights reserved.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Role of Communication Systems b INTERNET Hardware, Software, ServicesHardware, Software, Services Information searching, Publication of informationInformation.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Internet Safety Internet Safety LPM
Instructor: Richard Fredrickson. Desktop Support Specialist Diploma program Course: DESK 201.
Access : connection to the Internet account : an arrangement you have with a company or Internet provider to use a service they provide. browse : to look.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 01 Introduction to Computer Networking.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Small Peer-Peer PC Network No dedicated (full- time) server User PCs supply services to each other So user PCs act both as clients and as servers.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Windows Small Business Server 2003 R2 Powering Small Businesses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Section 13 Activities. Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason.
COMPUTER STUDIES Introduction. What is Computer Studies?  Many workplaces today utilise computers competencies  When applying for employment you may.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Ron Enger Southern Oregon Educational Service District Medford, Oregon Cliff Ehlinger Grant Wood Area Education Agency Cedar Rapids, Iowa December, 2006.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
A Parent’s Guide to Child Safety on the Internet.
1 Connecting Schools: the Portuguese Experience Bad Nauheim 17 June 2003.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
ICT II Unit 6 Networking.
How to build a good reputation online
Internet Safety and Acceptable Use Policies.
Part 3.
Principles of Information Technology
Presentation transcript:

Current Issues of Information Security in Japanese Society Yukihiro FURUSE Visiting Professor, Center for Global Communications, International University of Japan

Outline Outlook of Information Age in Japan Analysis of ICT as Social Tools Structures of Risks With ICT Open Architecture Dilemma

Outlook of Information Age in Japan What is “Information Age?”  Key points: 1. Connectivity to the computer network, specially to the Internet. 2. Bandwidth of each person’s channel for information sending, uploading, and broadcasting.  in Japan Year 1996 might be the taking off year to the Information Age.  Explosion of WWW sites and connections.

Analysis of ICT as Social Tools Tools Tank, FighterTrain, BusPrivate carICT OwnerNationCompany or Nation Citizens Relationship with citizens IsolatedSeparatedInvolved Based RulesLawLaw and regulation Law (police)Almost none, and no license Maintenance100% by Professionals Almost 100% by Professionals Almost 100% by Themselves Socialized Specialized

Structures of Risks With ICT Structure 1  Socialized, but not sophisticated ICT tools bring many trouble to people. Computer virus, Spam mail, HDD’s going out of order, etc. People have to maintain the ICT tools by themselves, even it needs specialized knowledge. Structure 2  Efficiency based system design causes big trouble when some bad person operates. It seems that computer related people tend to estimate system by its efficiency, though the damage will be bigger if the system is designed only for efficiency.

Structure of Risks With ICT Structure 3  ICT empowers people to broadcast, publish without any license. Even the child can publish something to the world. Structure 4  ICT enable people to trace someone’s private action. People have to protect by themselves with specialized knowledge.

Beyond The Risks of ICT We have to recognize that ICT tools are socialized, but not sophisticated.  Have to think about how control the ICT using people. Law? Regulation? License?

Open Architecture Dilemma Open architecture of PC and the Internet  Reason why PC and the Internet grow rapidly.  Also reason why computer virus exploded. Dilemma at the company  Information section wants to control user terminal. Same operating system, application such as Outlook express.  Users want to use them freely. Want to install various software, but no authority…

Controlled OperationNot Controlled Operation Closed SystemLow performance No risk Low learning costs Low performance Low risk Middle learning costs Open SystemMiddle performance Middle risk Middle learning costs High performance High risk High learning costs* * It will be the big problem for us to use ICT tools if we can not stop risk and costs increase under not controlled operation with open system.