slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms PowerPoint Presentation
Download Presentation
The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms

Loading in 2 Seconds...

play fullscreen
1 / 22

The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms - PowerPoint PPT Presentation


  • 155 Views
  • Uploaded on

The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms Or careless owners…. Often it is the person, not the process that is the threat. (“guns don’t kill people, people do”).

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'The best security devices don’t stop cars getting stolen Thieves look for the old cars/alarms' - arista


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide2

The best security devices don’t stop cars getting stolen

  • Thieves look for the old cars/alarms
  • Or careless owners…
slide4

Often it is the person, not the process that is the threat.

  • (“guns don’t kill people, people do”)
slide5

Presented by Carol Bott, Asst. Director ICT Security Professionalisation, DSD

  • “Weapons of Influence”
  • Reciprocity- People have to return a favour (email info scares).
  • Commitment and Consistency- If people commit, orally or in writing, to an idea or goal, they are more likely to honour that commitment.
  • Social Proof - People will do things that they see other people are doing.
  • Authority - People will tend to obey authority figures, even if they are asked to perform objectionable acts.
  • Liking - People are persuaded by other people that they like.
  • Scarcity - Perceived scarcity will generate demand.
slide6

Also check out “Stumbling on Happiness”

  • The brain tricks us on a second-by-second basis
  • People make regular, invalid assumptions of their future happiness
  • We want our actions to work out well, even in the face of contradictory evidence
slide10

I received this from a reliable family friend this morning. 10/28/01 BIG TROUBLE !!!!

DO NOT OPEN "WTC Survivor" It is a virus that will erase your whole "C" drive. It will come to you in the form of an E-Mail from a familiar person.

I repeat a friend sent it to me, but called and warned me before I opened it.

He was not so lucky and now he can't even start his computer! Forward this to everyone in your address book. I would rather receive this 25 times than not not all.If you receive an email called "WTC Survivor" do not open it. Delete it right away! This virus removes all dynamic link libraries (.dll files) from your computer. This is a serious one.

Social proof… reciprocity… liking… authority…

slide11

Microsoft Mail Internet Headers Version 2.0

Received: from mail.nntt.gov.au ([10.10.0.93]) by perdcexch.nntt.gov.au with Microsoft SMTPSVC(6.0.3790.3959);

Wed, 24 Mar 2010 10:59:28 +0800

X-IronPort-Anti-Spam-Filtered: true

X-IronPort-Anti-Spam-Result: AggDANIcqUvLCgHyjmdsb2JhbACBQpllFQEBAQEJCwgJEQUfvk+CVYIoBIMc

X-IronPort-AV: E=Sophos;i="4.51,298,1267372800";

d="scan'208,217";a="1808472"

Received: from outbound-mail01.westnet.com.au ([203.10.1.242])

by ironport.nntt.gov.au with ESMTP; 24 Mar 2010 10:59:28 +0800

X-IronPort-Anti-Spam-Filtered: true

X-IronPort-Anti-Spam-Result: Aj8GAEodqUvKSLOI/2dsb2JhbACBQplkdL5UglWCKASDHA

X-IronPort-AV: E=Sophos;i="4.51,298,1267372800";

d="scan'208,217";a="66667651"

Received: from dsl-202-72-179-136.wa.westnet.com.au (HELO remote.rossgriffin.com.au) ([202.72.179.136])

by outbound-mail01.westnet.com.au with ESMTP/TLS/AES128-SHA; 24 Mar 2010 10:59:16 +0800

Received: from RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d]) by

RGH-FS1.rgh.com.au ([fe80::2064:1a0f:44e0:5d5d%10]) with mapi; Wed, 24 Mar

2010 10:59:15 +0800

From: Reception <reception@rossgriffin.com.au>

To: "Dart, Martin" <Martin.Dart@nntt.gov.au>

Date: Wed, 24 Mar 2010 10:59:14 +0800

Subject: RE: Car

Thread-Topic: Car

Thread-Index: AcrK8Rs9/pl5wC0XQou06Ey5nNmsjQADKmaA

Message-ID: <603AE2C1D22F1747A92EA6C9CE375A8057D86724@RGH-FS1.rgh.com.au>

References: <9669748D6D82454F9923FA565CC0417005B2310E@perdcexch.nntt.gov.au>

In-Reply-To: <9669748D6D82454F9923FA565CC0417005B2310E@perdcexch.nntt.gov.au>

Accept-Language: en-US, en-AU

Content-Language: en-US

X-MS-Has-Attach:

X-MS-TNEF-Correlator:

acceptlanguage: en-US, en-AU

x-tm-as-product-ver: SMEX-8.0.0.1307-6.000.1038-17272.000

x-tm-as-result: No--40.929200-8.000000-31

x-tm-as-user-approved-sender: No

x-tm-as-user-blocked-sender: No

Content-Type: multipart/alternative;

boundary="_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_"

MIME-Version: 1.0

Return-Path: reception@rossgriffin.com.au

X-OriginalArrivalTime: 24 Mar 2010 02:59:28.0318 (UTC) FILETIME=[04B86DE0:01CACAFE]

--_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_

Content-Type: text/plain; charset="us-ascii"

Content-Transfer-Encoding: quoted-printable

--_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_

Content-Type: text/html; charset="us-ascii"

Content-Transfer-Encoding: quoted-printable

--_000_603AE2C1D22F1747A92EA6C9CE375A8057D86724RGHFS1rghcomau_--

slide14

70% of targeted attacks can be mitigated by following 4 basic strategies

Defence is targeted around 200 times each year by organisations seeking to steal specific information.

Non-defence agencies are targeted some 220 times.

Dr Ian J Watt AOSecretary of Defence

Anonymity & non-attribution the main benefits attacks enjoy.

Mining sector a recently expanding battlefield

“We must all hang together, or most assuredly, we will hang alone”. (Benjamin Franklin)

Duncan Lewis AONational Security Advisor DPMC

slide15

Other conference points of note:

  • The PSM needs urgent review in this area, as it’s focus has been on protecting paper
  • Any internet system can be compromised
  • We need to extend beyond the footprint of our technology/systems – security involves the end-to-end transaction
  • 2007 Estonian ‘cyberwar’ noted as a portent or things to come (be that state-sponsored of non-state actors).
  • 75% of attacks utilise targeted socially engineered email
slide16

Any network can be utilised as a jumping off point for bigger attacks (hence we are a target)

  • Government has not had capacity to date to realise the extent of attacks
  • Boundaries are useless - we must extend systems into the community
  • We needs learning/adaptive systems – no more siege warfare
  • If not patched, you are swiss cheese.
  • Patch within 2 days.
slide18

Do this!

(at home and work)

Automated patching makes your system self-learning

How?

Easy – Start/search/”update”

slide19

1.

2.

3.

4.

slide20

Simple tip #1

Choose the right user account…

  • Give everyone a personal account
  • Use unique & complex passwords
  • Change passwords as often as you can tolerate
slide21

Simple tip #2

…and put them in the right group!

  • There should only be 1 administrator
  • If your making your life easier, you making it less secure.
slide22

Thanks..

Questions?