security in the information age n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Security in the Information Age PowerPoint Presentation
Download Presentation
Security in the Information Age

Loading in 2 Seconds...

play fullscreen
1 / 25

Security in the Information Age - PowerPoint PPT Presentation


  • 114 Views
  • Uploaded on

Security in the Information Age. Adventist Ministries Convention 2007 David Greene North American Division IT Services. Technology Changes in Ministries. Mobile devices Business transactions Websites. Mobile Devices - Laptops. New and increased risks Theft Network attacks

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Security in the Information Age' - hanna-riggs


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
security in the information age

Security in the Information Age

Adventist Ministries Convention 2007

David Greene

North American Division IT Services

technology changes in ministries
Technology Changes in Ministries

Mobile devices

Business transactions

Websites

mobile devices laptops
Mobile Devices - Laptops

New and increased risks

  • Theft
  • Network attacks
  • Wireless attacks
  • Risks to office network from guests
mobile devices laptops1
Mobile Devices - Laptops

What to do about: Theft

  • “Phone-home” software
  • Physical locks
  • Encryption
  • Strong passwords
mobile devices laptops2
Mobile Devices - Laptops

What to do about: Network attacks

  • Install updates
  • Use a personal firewall
  • Use anti-virus and anti-spam software
  • Never send passwords “in the clear”
mobile devices laptops3
Mobile Devices - Laptops

What to do about: Wireless attacks

  • Install updates
  • Use care when connecting to access points
  • Use WPA protection whenever possible
  • Never send passwords “in the clear”
  • Use cellular network where available
mobile devices laptops4
Mobile Devices - Laptops

What to do about: Guests at office

  • Separate guest and office networks
  • Require employee-owned laptops to have current virus protection installed
mobile devices pda s
Mobile Devices – PDA’s

New and increased risks

  • Theft
  • Improper disposal
  • Bluetooth attacks
  • Network attacks
  • Viruses
mobile devices pda s1
Mobile Devices – PDA’s

What to do about: Theft

  • Encryption
  • Strong passwords
  • “Password safe”
  • Keep data synchronized
  • Insurance
mobile devices pda s2
Mobile Devices – PDA’s

What to do about: Improper disposal

  • Encryption
  • Destruction
mobile devices pda s3
Mobile Devices – PDA’s

What to do about: Bluetooth attacks

  • Turn off Bluetooth when not in use
  • Set device to be “non-discoverable”
  • Set Bluetooth authentication
  • Ensure privacy when pairing devices
mobile devices pda s4
Mobile Devices – PDA’s

What to do about: Network attacks

  • Turn off Wifi when not in use
  • Use WPA protection whenever possible
  • Never send passwords “in the clear”
mobile devices pda s5
Mobile Devices – PDA’s

What to do about: Viruses

  • Consider installing PDA anti-virus software
mobile devices removable media
Mobile Devices – Removable media

New and increased risks

  • Theft
  • Improper disposal
  • Loss of function
mobile devices removable media1
Mobile Devices – Removable media

What to do about: Theft

  • Encryption
  • Keep sensitive data off removable media
mobile devices removable media2
Mobile Devices – Removable media

What to do about: Improper disposal

  • Encryption
  • Destruction
  • Keep sensitive data off removable media
mobile devices removable media3
Mobile Devices – Removable media

What to do about: Loss of function

  • Synchronize frequently
technology changes in ministries1
Technology Changes in Ministries

Mobile devices

Business transactions

Websites

technology changes in ministries2
Technology Changes in Ministries

Mobile devices

Business transactions

Websites

website security questions who s making sure your whole website is secured
Settings

Accounts

Input

Errors

Backups

Updates

Website Security QuestionsWho’s making sure your whole website is secured?
references mobile device theft
References: Mobile Device Theft
  • Laptop theften.wikipedia.org/wiki/Laptop_theft
  • Computer Theft—will you be the next victim? …the next computer theft will occur in 53 secondswww.user-groups.net/safenet/computer_theft.html
  • Combating Gadget Theftwww.nytimes.com April 28, 2005
  • Solving Laptop Larcenywww.techreview.com June 19, 2006
  • Screaming Phones to Cut Down Mobile Theft?www.tech2.com October 3, 2006 (Reuters)
references mobile device security
References: Mobile Device Security
  • Defining a Security Policy for Windows Mobile Pocket PCswww.pocketpcmag.com May, 2005
  • Security in Windows Mobile 5.0 Messaging Pack Disappointswww.gartner.com June 9, 2005
  • An overview of mobile device securitywww.viruslist.com September 21, 2005
  • Mobile virus growth outpaces PC malwarewww.vnunet.com February 16, 2006
  • New virus closes PC/Windows Mobile gapwww.vnunet.com February 28, 2006
  • Trend Micro Advances Security for Smartphones & Other Deviceswww.hardwarezone.com.au November 14, 2006
  • Intel PRO/Wireless 2200BG Driver Beacon Frame Remote Memory Corruption Vulnerabilitywww.fsirt.com December 19, 2006
  • Smartphones Beware: New Viruses On The Horizon Target These Deviceswww.processor.com December 29, 2006
  • Wireless drivers are now a major vulnerabilitywww.hackinthebox.org December 31, 2006 (Tech World)
  • How to crash a Windows mobile using MMS: Test code spotlights mobile malware menacewww.channelregister.co.uk January 2, 2007
  • New Hacking Tools Bite Bluetoothwww.unstrung.com January 3, 2007
references cyber extortion
References: Cyber Extortion
  • Cyber-Extortion: When Data Is Held Hostagewww.businessweek.com August 22, 2000
  • Spyware Software Dubbed ‘Ransom-ware’www.techweb.com May 31, 2005
  • Save Your PC From Cyber Extortionwww.cbsnews.com June 2, 2005
  • Extortion virus makes rounds in Russia: It encrypts files then seeks money for the data to be decodedwww.computerworld.com October 25, 2005 (IDG News Service)
  • Hackers, Extortion Threats Shut Down Game Sitewww.eweek.com December 16, 2005
  • Virus writers get into cyber-extortion—’Pay up or you’ll never see your data again’www.theregister.co.uk April 21, 2006
  • New Trojan Ransoms Files, Demands $300www.techweb.com March 16, 2006
  • Ransomeware Attack Targets Hotmail Accountswww.informationweek.com December 12, 2006
  • Cybercrooks hold PC data captiveindystar.gns.gannett.com December 26, 2006
references spear phishing
References: Spear Phishing
  • ‘Spear Phishing’ Tests Education People About Online Scamsonline.wsj.com August 17, 2005
  • Separating myth from reality in ID theftnews.com.com October 24, 2005
  • Spear phishing reaches epidemic proportionswww.scmagazine.com October 26, 2005
  • Spear Phishing Attack Targets Credit Unionswww.eweek.com December 16, 2005
  • DOD battles spear phishingwww.fcw.com December 26, 2006
  • Beware the Spear Phishing Attackswww.newsfactor.com December 27, 2006
  • SonicWALL Phishing IQ Testwww.sonicwall.com/phishing
references website security
References: Website Security
  • MSDN: Security Guidelines: ASP.NET 2.0msdn.microsoft.com/library/default.asp?url=/library/en-us/dnpag2/html/pagguidelines0001.asp
  • SANS: Top-20 Internet Security Attack Targets (2006 Annual Update)www.sans.org/top20
  • Open Web Application Security Project: Top Ten Projectwww.owasp.org/index.php/OWASP_Top_Ten_Project