© LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing...
-
Upload
lenard-morton -
Category
Documents
-
view
215 -
download
0
Transcript of © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing...
![Page 1: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.](https://reader036.fdocuments.us/reader036/viewer/2022062516/56649e175503460f94b02472/html5/thumbnails/1.jpg)
© LogicaCMG 2006. All rights reserved
Enabling Personal Internet Security
Dave Martin
Managing Security Consultant
![Page 2: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.](https://reader036.fdocuments.us/reader036/viewer/2022062516/56649e175503460f94b02472/html5/thumbnails/2.jpg)
2Privacy in Cyberspace
Agenda
30 SecondIntroduction
Current and Emerging Cyberspace Threats
Addressing the Threats – Three Pronged Approach
![Page 3: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.](https://reader036.fdocuments.us/reader036/viewer/2022062516/56649e175503460f94b02472/html5/thumbnails/3.jpg)
3Privacy in Cyberspace
30 Second Introduction
• LogicaCMG
– Worldwide business support company
– 40,000 employees worldwide
– 250+ full time security consultants
– Full boardroom to bytes security service
![Page 4: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.](https://reader036.fdocuments.us/reader036/viewer/2022062516/56649e175503460f94b02472/html5/thumbnails/4.jpg)
4Privacy in Cyberspace
Current and Emerging Cyberspace Threats
• Consumers are exposed to fraud potential
• Viruses, Worms, Trojans, Letter Bombs and more…
• Unacceptable behaviour on-line
• Phishing already a significant problems for consumers
• Penetration of wireless networks
• E-mail interception
• Spear-phishing
![Page 5: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.](https://reader036.fdocuments.us/reader036/viewer/2022062516/56649e175503460f94b02472/html5/thumbnails/5.jpg)
5Privacy in Cyberspace
Education
Government websitesISP campaignsVendor adviceIndustry advice
Tools
Anti-virus & Anti-SpamFirewalls
Patch levelsSecured wireless routers
Global co-operation
Cross border co-operation
Education
Targeted advice to publicTailored advice to public
Tools
Secure e-mailIE7
Behavioural Analytics
Global co-operation
MoU between countries
Addressing the Threats – Three Pronged Approach
![Page 6: © LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant.](https://reader036.fdocuments.us/reader036/viewer/2022062516/56649e175503460f94b02472/html5/thumbnails/6.jpg)
6Privacy in Cyberspace
Summary
• Government to sponsor public awareness
• ISPs to provide customers with toolkit
• Businesses to safeguard their customers’ information
• Consumers to use the tools available
Coherent - Cost-effective - Simple