Your SlideShare is downloading. ×
  • Like
2014 - DSS - Mobile devices & security overview
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

2014 - DSS - Mobile devices & security overview

  • 323 views
Published

Short overview of security issues regarding mobile phone usage. Examples of mobile threats, common mistakes of users, sophistication of cyber criminals and some futuristic vision of mobility …

Short overview of security issues regarding mobile phone usage. Examples of mobile threats, common mistakes of users, sophistication of cyber criminals and some futuristic vision of mobility development in technology era.

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to like this
No Downloads

Views

Total Views
323
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
7
Comments
1
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Don’t want to predict the future. It is hard and easily can go wrong. It is present. 1000000 aps on Apstore, 1000000 aps on google store.http://www.youtube.com/watch?v=cCyGEzzZhTQ

Transcript

  • 1. PHONE Elisha Gray & Alexander Granham Bell 2013 Xperia Z Ultra SONY
  • 2. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 3. “Data Security Solutions” business card Specialization – IT Security IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support) Solutions and experience portfolio with more than 20 different technologies – cyber-security global market leaders from more than 10 countries Trusted services provider for banks, insurance companies, government and private companies (critical infrastructure etc.)
  • 4. Role of DSS in Cyber-security Development in Baltics Cyber-Security Awareness Raising Technology and knowledge transfer Most Innovative Portfolio Trusted Advisor to its Customers
  • 5. Own organized conference “DSS ITSEC” 5th annual event this year More than 400 visitors + more than 250 online live streaming watchers from LV, EE, LT 4 parallel sessions with more than 40 international speakers, including Microsoft, Oracle, Symantec, IBM, Samsung and many more – everything free of charge Participation in other events & sponsorship CERT & ISACA conferences & events RIGA COMM, HeadLight, IBM Pulse Las vegas Roadshows and events in Latvia / Lithuania / Estonia (f.i. Vilnius Innovation Forum, Devcon, ITSEC HeadLight, SFK, business associations) Participation in cyber security discussions, strategy preparations, seminaries, publications etc.
  • 6. Innovative Technology Transfer Number of unique projects done with different technology global leadership vendors Knowledge transfer (own employees, customers – both from private & public, other IT companies in LV, EE, LT) Specialization areas include: Endpoint Security Network Security Security Management Application Security Mobile Security Data Security Cyber-security Security Intelligence
  • 7. Agenda Prologue Digital world 2014 Threats & Security Recommendations Exit scene
  • 8. 3D Printers Google Glasses (“glassh**es) Cloud Computing Big Data & Supercomputers Mobile Payment & Virtual Money Robotics and Intraday Deliveries Internet of things Augmented Reality Extreme development of Aps Digital prototyping Gadgets (devices) & Mobility Technology replaced jobs (automation) Geo-location power Biometrics Health bands and mHealth Electronic cars Avegant Glymph and much, much more
  • 9. PC era Mobile era
  • 10. Multi-OS
  • 11. 1 Cisco IBSG Horizons Study of 600 U.S. IT and business leaders “Globally in 2013 an average economically active person owns 2.8 mobile devices. In 2014 it is forecasted that such person will own 3.3 devices. Forecast is giving taking in mind also that population increases.” 1
  • 12. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 13. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 14. - Emails & other data - Location - Social Media data - Personal information - Degrees of contact - Web-based data
  • 15. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 16. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 17. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 18. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 19. We give mobile devices to children or any other friendly souls (multiuser factor) We install as many differerent applications as possible - games, social media etc. (apps vulnerability factor) We experience lost or stolen devices & mostly those won’t be returned We don’t care about securty basics (updates, security programms, encryption, passwords etc.) We connect to anything that is FREE We open EVRYTHING We give 3rd party apps any possible rights We don’t make «seasonal» clearings of our devices
  • 20. M - the need for mobility O - the need to improve operations B - the need to break business barriers I - the need to improve information quality L - the need to decrease transaction lag E - the need to improve efficiency
  • 21. ITMobile 2-3x as many employees using mobile Devices not Windows-based >50% owned by employees >50 apps per device Most mobile apps built outside IT Constant OS migration
  • 22. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 23. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 24. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 25. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 26. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 27. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1
  • 28. “2014.gadā vidēji katram izglītotam darbiniekam būs vidēji 3.3 mobīlās ierīces, salīdzinot ar vidējo statistiku ar 2.8 mobīlajām ierīcēm 2013.gadā.” 1 4 Roll out at scale Group-based User self-service Multi-tier management Email AD/LDAP Certificates BES 2 Integrate tightly Email and apps Policy and identity Connectivity (Wi-Fi, VPN) By group, individual, or ownership 1 Configure securely 3 Protect privacy BYOD programs Regional regulations Across OS For apps and devices For BYOD and corporate programs 5 Manage inventory Wipe corporate data15 Limit roaming costs14 Deliver apps at scale Protect app container12 11 Tunnel app data13 Apps 6 Monitor risk 8 Enforce identity 9 Automate workflow 7 Control access Security Access and protect docs10 Docs
  • 29. Drošu pašu veidoto mobīlo aplikāciju izveide Pilnvērtīgi ieviest un izmantoto korporatīvajā vidē tā saucamo «Nāc ar savu ierīci» («BYOD») tendenci Mobīlo ierīču pārvaldība un drošība Mobīlo aplikāciju pārvaldības politika Datu nošķirtības sasniegšana Privātie dati Korporatīvie dati Nodrošināt drošu piekļuvi pie korporatīvajiem datiem un darba aplikācijām Drošs savienojums (šifrēts) Identitātes kontrole, autentifikācija un autorizācija, arī audits Droša pašmāju aplikāciju izstrāde un testēšana
  • 30. www.dss.lv andris@dss.lv +371 29162784