Data security solutions 2011 @Society.Person.Security.

992 views
954 views

Published on

On 15th of April "Data Security Solutions" participated in international conference held by "BalticSecurity.org" and made a presentation to raise awareness of importance of risks of cyber crime and data protection.

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Be the first to like this

No Downloads
Views
Total views
992
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
15
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Data security solutions 2011 @Society.Person.Security.

  1. 1. Cybercrime –<br />the biggest threat of the 21st Century<br />Andris Soroka<br />Managing director<br />Data Security Solutions<br />15.04.2011<br />
  2. 2. Where to start from?<br />Internet has been compared to America’s Wild Wild West countless times – now the analogy holds more weight than ever.No DNA forensics, no overarching laws – just lawlessness.<br />
  3. 3. The 21st Century – the age of cybercrime<br />“Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks”<br />“The New York Times”, “Guardian”, “Der Spiegel”, “El Pais”, “Le Monde” and more. 2010, 2011..<br />FBI warns Congress that cybercriminals can hack any internet-linked system<br />Gordon M. Snow, assistant director of the FBI’s Cyber Division <br />(13th of April, 2011)<br />
  4. 4. Background - technology development <br />IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.)<br />Importance and development of e-World (e-Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for thatetc.)<br />Mobility and borderless enterprise<br />Cyber culture develops faster than cyber security<br />
  5. 5. Every technology is vulnerable<br />
  6. 6. New threats – targeted,professional, silent<br />There are Internet shops full of credit card, bank account, privacy, businessand other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone.<br />Cybercriminal«CV Online»<br />Video trainings and eLearning available in social media, such as YouTube<br />«Black market community» (forums, blogs, interest groups, conferences etc.)<br />
  7. 7. You don’t believe me?<br />
  8. 8. The aim and drivers of the hacker<br />
  9. 9. Why hackers might want to “contact” You?<br />Private person<br />You have the infrastructure for tests of new viruses and robots<br />You have server where to store illegal stuff (programs, files etc.)<br />They can do criminal activities using your computer<br />WiFi – they can just borrow the internet<br />You have the information which could be sold in black market<br />Business<br />Commercial espionage (financial, business and personal data)<br />An attack can stop the business, services (competition)<br />You are spam target<br />Your home page could be damaged<br />They can control and monitor you<br />They can change data in systems<br />Home page cross-scripting<br />The results of damage<br />Financial(costs, data, market, value)<br />Reputation (customer, partner, HR)<br />Development and competitiveness<br />
  10. 10. Business & personal risk analysis matrix<br />
  11. 11. Be prepared – stop the “bullets”<br />
  12. 12. “Data Security Solutions” can help<br />Specialization– IT Security<br />IT Security consulting (vulnerability assessmenttests, security audit, new systems integration, HR training, technical support)<br />Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries<br />
  13. 13. Think security first!<br />www.dss.lv<br />andris@dss.lv<br />+371 2 9162784<br />

×