Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Data security solutions 2011 @Society.Person.Security.

1,076 views

Published on

On 15th of April "Data Security Solutions" participated in international conference held by "BalticSecurity.org" and made a presentation to raise awareness of importance of risks of cyber crime and data protection.

Published in: Technology
  • Be the first to like this

Data security solutions 2011 @Society.Person.Security.

  1. 1. Cybercrime –<br />the biggest threat of the 21st Century<br />Andris Soroka<br />Managing director<br />Data Security Solutions<br />15.04.2011<br />
  2. 2. Where to start from?<br />Internet has been compared to America’s Wild Wild West countless times – now the analogy holds more weight than ever.No DNA forensics, no overarching laws – just lawlessness.<br />
  3. 3. The 21st Century – the age of cybercrime<br />“Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks”<br />“The New York Times”, “Guardian”, “Der Spiegel”, “El Pais”, “Le Monde” and more. 2010, 2011..<br />FBI warns Congress that cybercriminals can hack any internet-linked system<br />Gordon M. Snow, assistant director of the FBI’s Cyber Division <br />(13th of April, 2011)<br />
  4. 4. Background - technology development <br />IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.)<br />Importance and development of e-World (e-Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for thatetc.)<br />Mobility and borderless enterprise<br />Cyber culture develops faster than cyber security<br />
  5. 5. Every technology is vulnerable<br />
  6. 6. New threats – targeted,professional, silent<br />There are Internet shops full of credit card, bank account, privacy, businessand other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone.<br />Cybercriminal«CV Online»<br />Video trainings and eLearning available in social media, such as YouTube<br />«Black market community» (forums, blogs, interest groups, conferences etc.)<br />
  7. 7. You don’t believe me?<br />
  8. 8. The aim and drivers of the hacker<br />
  9. 9. Why hackers might want to “contact” You?<br />Private person<br />You have the infrastructure for tests of new viruses and robots<br />You have server where to store illegal stuff (programs, files etc.)<br />They can do criminal activities using your computer<br />WiFi – they can just borrow the internet<br />You have the information which could be sold in black market<br />Business<br />Commercial espionage (financial, business and personal data)<br />An attack can stop the business, services (competition)<br />You are spam target<br />Your home page could be damaged<br />They can control and monitor you<br />They can change data in systems<br />Home page cross-scripting<br />The results of damage<br />Financial(costs, data, market, value)<br />Reputation (customer, partner, HR)<br />Development and competitiveness<br />
  10. 10. Business & personal risk analysis matrix<br />
  11. 11. Be prepared – stop the “bullets”<br />
  12. 12. “Data Security Solutions” can help<br />Specialization– IT Security<br />IT Security consulting (vulnerability assessmenttests, security audit, new systems integration, HR training, technical support)<br />Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries<br />
  13. 13. Think security first!<br />www.dss.lv<br />andris@dss.lv<br />+371 2 9162784<br />

×