Security threats from pervasive broadband access Prof. Jim Norton Chartered Director & Chartered Engineer Senior Policy Adviser e-Business & e-Government.

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

Are you Resilient? Diane Howorth Business Development Manager European Telecommunications Resilience & Recovery Association.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
MiCloud: Enterprise UCaaS (UK) Powered by Mitel
Yammer for Executives Introductions.
How well is the Life Insurance Industry keeping pace with rapidly changing technology? International Insurance Society 23 June 2014 London.
Internet, Intranet and Extranets
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
All Organizations Need to Share and Communicate Information...
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Mitun PatelMXP07U. Organisational structure Top management; this includes the organisation’s general manager and its executives Department managers; this.
Computer Networks IGCSE ICT Section 4.
Broadband Adoption in Rural America John B. Horrigan October 27, 2004 Rural Broadband Coalition Alexandria, Virginia.
GOOD DAY AT WORK: CONNECTING WELL BEING & THE BUSINESS AGENDA Ann Francke, CEO of CMI  Ttle.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
1 Computer Security: Protect your PC and Protect Yourself.
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
1 Europe and the challenge of electronic commerce Barcelona 2 December 2002 Reinhard Büscher European Commission.
365 IT CONSULTANCY AND PROJECTS PTY (LTD) 04 Smuts Park Corner Northey & Smuts Ave Witbank 1039 Phone: Fax:
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Involving Local SMEs as E-Procurement Suppliers.
Club Presentation Press or left-click on mouse to advance to the next slide Welcome to ClubRunner ™ Discover a better way to communicate.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Welcome Digital Inclusion in Austere Times Tuesday 16 th July 2013 BT Tower, London Humphrey Penney CBE Director, Custom Solutions, BT Business.
Introduction Our Topic: Mobile Security Why is mobile security important?
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Welcome. eworks Seminar Series The n e twork: Building the Foundation for eBusiness Chris Parsons Senior Vice President Business Development and Strategy.
CISB113 Fundamentals of Information Systems Telecommunications & Network.
2010 © Connect Ohio ®. All Rights Reserved. Do Not Copy Without Written Permission. Connect Ohio Technology Assessment Executive Summary
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
PCI: As complicated as it sounds? Gerry Lawrence CTO
UK GRID Firewall Workshop Matthew J. Dovey Technical Manager Oxford e-Science Centre.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Trade Support Network Communications Strategy Session Summary Findings June 5, 2002.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Smart policies to close the digital divide: Best practices from around the world Key findings presentation Kim Andreasson Report author September 19 th.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
In the Crossfire International Cooperation and Computer Crime Stewart Baker.
Reflections on the State of Privacy Risk Management in Health Care Benefits Administration (one year and counting …) Mark Lutes, Esq. Partner Epstein Becker.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
SETTING UP AN INTERNET NETWORK What you’ll need Your options How does data travel the Internet? Different terminology.
Business Transformation Overview Brian Morgan LTEC
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
OneVoice W Group Results 16 June 2014 Human Resources Employee Engagement.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Better Broadband for Suffolk Wortham Area Broadband Briefing 1.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Computing/BCS North London What’s ahead for 2003? December 2002 Presented by: Colin Barker, Editor in Chief, Computing.
Windows Small Business Server 2003 R2 Powering Small Businesses.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Selling a Product or Service Website. Website Objective Developing or Designing a Website 40 Questions and Questionnaire with 30 questions are to be filled.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Websoftex Software Solution Pvt. Ltd No: 240/A, 3rd Cross, Gokula 1st, Stage, 1st Phase Mathikere, Bangalore , Karnataka, India.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Armenia Twinning 2011 Component F – Information Society, 2 – 6 May DEVELOPMENT OF INFORMATION SOCIETY STATISTICS IN LITHUANIA SURVEY ON.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
Ponemon Institute© Private & Confidential ReportPage 1 State of the Endpoint Survey Analysis of Global Results Briefing for Lumension October 30, 2009.
Vodafone Business Cloud
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. CLOUD.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
BT: the next step in the UK’s digital transformation
Presentation transcript:

Security threats from pervasive broadband access Prof. Jim Norton Chartered Director & Chartered Engineer Senior Policy Adviser e-Business & e-Government Institute of Directors Message ‘05 conference Business Design Centre London 27 October 2005

Background to the Survey Policy Unit questionnaire published in June 2004 edition of IoD News and on IoD.com 409 IoD members responded. Small businesses dominated: – 56.7% has up to 9 employees; – 23% had 10 to 49 employees; – 11.5% had 50 to 249 employees; and – 8.1% had more than 250 employees.

Broadband is good for business; Penetration is now high (though members in rural areas not yet reached are increasingly frustrated); Connection “Quality of Service” (QoS) is perceived to be improving; Respondents welcome increased competition; For a small minority there are still significant unmanaged security exposures from ‘always on’ access; and Affordable broadband access is significant facilitator of home working. Key messages

What quantifiable benefits are you seeing in your business use of broadband access? Base: 325 respondents who use broadband for business purposes. 84.3% of respondents cite productivity improvements from broadband access

Better and faster R&D. Better information for decisions Can now do jobs we would not have contemplated four years ago. Couldn’t do business without it. Improved communications with/for outworkers Quick access to worldwide web with huge increase in use at low fixed monthly cost. Many respondents believe that broadband access brings very significant business benefits Transforms way of working. Speed and ability to work anywhere in the World

If your organisation uses broadband and has used the same service for a year or more, which have you seen over time? Base: 325 respondents who use broadband for business purposes. Respondents are not seeing falling service quality as more customers join…

What measures do you take to protect your home (or home office) PC against viruses and other security threats? There are still significant vulnerabilities with 10% of respondents not using a firewall and 23% not regularly installing security updates… Base: 325 respondents who use broadband for business purposes.

As we go beyond eight million affordable broadband access lines in the UK, IoD members (especially those running small companies) are reaping significant and quantifiable business benefits. Those who don’t believe that they can access broadband should look again as new technology extends its reach and BT moves to implement its commitment to 99%+ population coverage. Security remains a key issue. We all have a “duty of care” not to allow our computing facilities to be used to attack others. Simple solutions are available, but not always used… In summary…

The challenge of security compliance? Say 150M broadband access lines worldwide… IoD 2004 Benchmark: 10% without firewall protection… Superhuman effort to drive security adoption (and maintenance) globally up to 99.5% - just 0.5% without… 750,000 broadband attached devices without protection. Time to become infected <1 hour. 750,000 devices in BotNets…. Is this an acceptable situation, given the ever increasing reliance on the Net for mainstream commercial activities?

New models from Grid Computing and ASP? I suggest that processing will move into the network (along the model long highlighted by Sun and Silicon Image) where it can be fully and professionally protected. This will leave very thin clients (screen scrapers) only at the edge on very high speed broadband access, with little if any processing to infect. Software, processing and storage will be available on a pay per use basis - e.g. Application Service Provision (ASP). Recent research in the UK by IoD/Dell suggests that SMEs are now much more willing to consider an ASP model… This model powered by broadband access may greatly benefit small business…

Questions & Answers… Slides downloadable from: