Gov 2.0 public 2.0 bad guys 2.0 v3

366 views
330 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
366
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Gov 2.0 public 2.0 bad guys 2.0 v3

  1. 1. Gov 2.0, People 2.0 and Bad Guys 2.0<br />A Presentation to : Gov 2.0 Conference<br />14th June 2010<br />Dr. Rodger Manning, QinetiQ<br />
  2. 2. Overview<br /><ul><li>Gov 2.0
  3. 3. National Broadband Network
  4. 4. Public 2.0
  5. 5. Bad Guys 2.0
  6. 6. Concluding Remarks</li></ul>2<br />
  7. 7. ….is a good thing<br />Education & Empowerment<br />Allows Government to Talk to Each Other<br />Listening<br />Allows me to Talk to Government<br />Reacting<br />Engaging with Youths<br />Efficiency<br />New Ways of Working<br />Opening up Government<br />Making Tougher Choices<br />Innovation<br />Gov 2.0<br />3<br />Democracy<br />
  8. 8. National Broadband Network<br />Overwhelming public support<br />Some implications…<br /><ul><li>Downloads are faster
  9. 9. Mass hardware upgrades will likely follow
  10. 10. Upload speeds are faster
  11. 11. It’s always on
  12. 12. Prices fall, open/public access grows rapidly
  13. 13. Home and SMB use of WiFi explodes</li></ul>4<br />….is a good thing<br />77% of Internet Users agree that the NBN is a good thing1<br />1Source – The Internet In Australia, S. Ewing & J. Thomas, Swinburne University of Technology<br />
  14. 14. Public 2.0<br /><ul><li>80.1% Internet penetration by capita
  15. 15. 3rd largest Tweater by capita</li></ul>5<br />….are ready<br />….are frustrated?<br />53 %<br />44%<br />Respondents disagreeing with:<br />By using the Internet will people like you have more say about what the government does?<br />2007<br />2009<br />Source – The Internet In Australia, S. Ewing & J. Thomas, Swinburne University of Technology<br />
  16. 16. Public 2.0<br /><ul><li>Capped access
  17. 17. Expensive Internet access
  18. 18. 25th out of 34 (OECD Survey, 2010)
  19. 19. ~Double the United Kingdom</li></ul>6<br />….are restrained<br />Source – OECD<br />
  20. 20. Bad Guys 2.0 are…<br /><ul><li>Empowered
  21. 21. Diverse and unseen
  22. 22. Pranksters
  23. 23. Hackivists
  24. 24. Criminals
  25. 25. Individual and organised
  26. 26. Terrorists
  27. 27. Stated sponsored
  28. 28. Innovative
  29. 29. Successful</li></li></ul><li>What do we see?<br />8<br />Open<br />Accountable<br />Responsive<br />Efficient Government<br />OPPORTUNITY<br />Faster<br />Better<br />Cheaper<br />Embracing<br />Ready<br />Innovative<br />
  30. 30. What do Bad Guys 2.0 see?<br />9<br />Information<br />Brand<br />Access<br />OPPORTUNITY<br />Information<br />Access<br />Victim<br />Business Facilitator<br />
  31. 31. The Web2.0 Landscape<br />10<br />
  32. 32. Implications<br /><ul><li>Nearly every common aspect of online evildoing is accelerated by on always on Web 2.0 environment
  33. 33. Phishing and identity theft
  34. 34. Data theft
  35. 35. Infection/compromise of servers and PCs, for:
  36. 36. Spamming
  37. 37. Criminal Hosting: Malware, fast flux, illegal content, Phishing, etc.
  38. 38. DDOS attacks and Cyber Extortion
  39. 39. Libel, defamation, character assassination, disinformation</li></ul>11<br />
  40. 40. Implications<br /><ul><li>Social engineering will become a primary attack vector
  41. 41. Public 2.0 make it easy
  42. 42. Profile 21 year old female
  43. 43. 2000 random people
  44. 44. 94% in 7 days
  45. 45. 31% of users who took less than 2 lines of convincing where IT security workers</li></ul>12<br />
  46. 46. Robin Sage Case Study<br />13<br />
  47. 47. Generic Case Study<br />14<br />
  48. 48. Generic Case Study<br />15<br />
  49. 49. I’m Not Making This Stuff Up<br />16<br />
  50. 50. What Can We do?<br /><ul><li>Know your vulnerabilities
  51. 51. DSD strategies</li></ul>17<br />
  52. 52. What Can We do?<br /><ul><li>Know your vulnerabilities
  53. 53. DSD strategies
  54. 54. Awareness and Training
  55. 55. Teach your staff about risks to data, privacy, systems and customers
  56. 56. Public awareness
  57. 57. Policy & Governance
  58. 58. Prepare guidance for networked employees
  59. 59. Victorian State Government risk assessment
  60. 60. Stop and Think
  61. 61. How might the bad guys exploit this?
  62. 62. Monitor
  63. 63. Understand “Internet Footprint” and monitor yours to minimise risk</li></ul>18<br />

×