SlideShare a Scribd company logo
1 of 14
Download to read offline
Mobile Communications
Parental Controls Workshop
ICT Week St Maarten
15-20 August, 2010
Making technology work securely for you
and your family!
Anton Kaska, Vice President
Security Business, US, Canada and Caribbean
Agenda
•Introduction
•Terms
•Concerns (Threats)
•A layered and holistic approach
•Question/Answer period
•Demonstration
•Open forum
Introduction
• Security Professional
• Over 20 years overseas in Europe,
Asia and the Middle East
• Parent
Firewall
Internet
Firewall
http://www.sans.org/security-resources/glossary-of-terms/
Terms
•SPAM/UCE
•SMS/MMS
•Phishing
•Spyware
•Virus
•Bearers
Concerns (Threats)
• Uncontrolled or excessive costs
• Exposure to unacceptable
“communications” (religious, sexual in
nature or predatory)
• Technologic Threats to user
• Infrastructure threats
• Moral/Social-family members
Where are the tech-threats?
Spam
SMS Spam
accounting for 18%
of total traffic in
some locations
Knowing the threats and how to control over your technology is imperative
Knowledge is key
Email
Threats via email
are prevalent
Peer to Peer
Can account for
20% of uplink
traffic
Web (HTTP)
Increasing Phishing
& Malware hosting
Virus
MMS Virus
infection rates
approaching 14%
Network Availability
Dangers to the
network and
subscribers(incl. home
network)
Spyware
Copying of
messages, call
eavesdropping and
bugging of rooms.
6 © Nokia Siemens Networks
What are the tech-threats?
7 © Nokia Siemens Networks
35 Million Spam Emails Sent
28 people bought products.
$ 3M
in pharmaceutical sales in 2008
Conversion rate of 0.000008%
PC Spam
Mobile Spam1,000,000
28 people
signed up to service
SMS Sent
78,700
recipients
called number
31,000
recipients
replied to SMS $ 25M
in one 3 day attack
Fake Prize Draw text message sent in a single 3 day
attack in 2009
An analysis of a single Operator’s cost
Conversion rate of 0.01%Total $124,000Total $24,800,000
Total $500
Total $5,000
sdf
dsf
sf
sdf
Example: SMS Phishing Fraud
Mobikama.com
/www.google.co.in/gwt/x/ts?ei=z9vlstwmozqc7q
pazazbag
&;source=m
&;u=http://m.mobikama.com/
&;whp=122383b343f;initial_page_loaded
&;wsc=tc
&;wsi=396cd70b33f3cbdd
User receives
WAP Push
User clicks link
to Web Site
WAP Push has
“hot button” link follow
on many handsets
URL Embedded in Google
search string avoids site
blocking put in place
“Call” Link to
Intl Premium Rate
Curious subscriber clicks
Link and call is placed to
Reverse Charge line
Unexpected
Behaviour
= Mobile Virus
User not seen “call:” links
thinks virus has infected
handset
Website embedded in Google
search URL requires intelligent
traffic parsing.
Leveraging Location Based
Services
9 © Nokia Siemens Networks
Layered and Holistic
Approach
The non-tech bits
• The Onion
Regulators
Providers
and YOU
ho·lis·tic (h-lstk)
a. Emphasizing the importance of the whole and the interdependence of its parts.
b. Concerned with wholes rather than analysis or separation into parts: holistic medicine; holistic ecology.
Questions and Answers
Interim thoughts
Demonstration
A sample parental control portal
REAL WORLD
Open Forum
A Citizens Discussion
Closing
• Take an active role as a parent
• Technologic Threats to user
• Thank you to the Caribbean
Telecommunications Union (CTU) and
my friends in the Netherland Antilles

More Related Content

What's hot

Documento Cisco su Ransomware: come affrontarlo
Documento Cisco su Ransomware: come affrontarloDocumento Cisco su Ransomware: come affrontarlo
Documento Cisco su Ransomware: come affrontarloMaticmind
 
Web Security Training : Tonex Training
Web Security Training : Tonex TrainingWeb Security Training : Tonex Training
Web Security Training : Tonex TrainingBryan Len
 
Internet Safety again
Internet Safety againInternet Safety again
Internet Safety againmwedwards
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsVeriato
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETYSairam
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Word camp orange county 2012 enduser security
Word camp orange county 2012   enduser securityWord camp orange county 2012   enduser security
Word camp orange county 2012 enduser securityTony Perez
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsnooralmousa
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Topsec Technology
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content SecurityCisco Canada
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Cocoon On Internet Security
Cocoon On Internet SecurityCocoon On Internet Security
Cocoon On Internet SecurityCOCOON
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Documento Cisco su Ransomware: come affrontarlo
Documento Cisco su Ransomware: come affrontarloDocumento Cisco su Ransomware: come affrontarlo
Documento Cisco su Ransomware: come affrontarlo
 
Web Security Training : Tonex Training
Web Security Training : Tonex TrainingWeb Security Training : Tonex Training
Web Security Training : Tonex Training
 
Internet Safety again
Internet Safety againInternet Safety again
Internet Safety again
 
Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
 
Back to school - CYBER SAFETY
Back to school - CYBER SAFETYBack to school - CYBER SAFETY
Back to school - CYBER SAFETY
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Word camp orange county 2012 enduser security
Word camp orange county 2012   enduser securityWord camp orange county 2012   enduser security
Word camp orange county 2012 enduser security
 
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clientsRenaud Bido & Mohammad Shams - Hijacking web servers & clients
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
 
Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only Email Security Threats: IT Manager's Eyes Only
Email Security Threats: IT Manager's Eyes Only
 
HOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFARE
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Ransomware
RansomwareRansomware
Ransomware
 
Cocoon On Internet Security
Cocoon On Internet SecurityCocoon On Internet Security
Cocoon On Internet Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
ZeroAcoso
ZeroAcosoZeroAcoso
ZeroAcoso
 

Viewers also liked

Rabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani Dagada
 
Rabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani Dagada
 
Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011atomikey
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...Rabelani Dagada
 
IHT Seminar ALL PARTS November 14
IHT Seminar ALL PARTS November 14IHT Seminar ALL PARTS November 14
IHT Seminar ALL PARTS November 14Duncan Orr
 
SingleSideWallCalculations_Word
SingleSideWallCalculations_WordSingleSideWallCalculations_Word
SingleSideWallCalculations_WordBroc Patterson
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]Anton Kaska
 
Retirement Seminar v1
Retirement Seminar v1Retirement Seminar v1
Retirement Seminar v1Duncan Orr
 
Rabelani dagada electronic records management chetty law 2011
Rabelani dagada electronic records management   chetty law 2011Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management chetty law 2011Rabelani Dagada
 
Hezkuntza proiektua
Hezkuntza proiektuaHezkuntza proiektua
Hezkuntza proiektualanderibaibe
 
กรณีศึกษา เถ้าแก่น้อย
กรณีศึกษา เถ้าแก่น้อยกรณีศึกษา เถ้าแก่น้อย
กรณีศึกษา เถ้าแก่น้อยChatchamon Uthaikao
 

Viewers also liked (20)

Rabelani dagada economical waves presentation
Rabelani dagada economical waves presentationRabelani dagada economical waves presentation
Rabelani dagada economical waves presentation
 
Rabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factorsRabelani dagada bizpref erp factors
Rabelani dagada bizpref erp factors
 
Rabelani dagada wbs erp
Rabelani dagada wbs erpRabelani dagada wbs erp
Rabelani dagada wbs erp
 
Dagada programmefinal
Dagada programmefinalDagada programmefinal
Dagada programmefinal
 
Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011Ict parent workshop web 2.0 feb 2011
Ict parent workshop web 2.0 feb 2011
 
The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...The integration of legal aspects in Information Security: Is your organisatio...
The integration of legal aspects in Information Security: Is your organisatio...
 
Domestication edit
Domestication editDomestication edit
Domestication edit
 
1474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 91474595020.pdf ปุ๋ย 9
1474595020.pdf ปุ๋ย 9
 
GMGo
GMGoGMGo
GMGo
 
IHT Seminar ALL PARTS November 14
IHT Seminar ALL PARTS November 14IHT Seminar ALL PARTS November 14
IHT Seminar ALL PARTS November 14
 
SingleSideWallCalculations_Word
SingleSideWallCalculations_WordSingleSideWallCalculations_Word
SingleSideWallCalculations_Word
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
 
Retirement Seminar v1
Retirement Seminar v1Retirement Seminar v1
Retirement Seminar v1
 
Test
TestTest
Test
 
Rabelani dagada electronic records management chetty law 2011
Rabelani dagada electronic records management   chetty law 2011Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management chetty law 2011
 
Case ส.ขอนแก่น
Case ส.ขอนแก่นCase ส.ขอนแก่น
Case ส.ขอนแก่น
 
Hezkuntza proiektua
Hezkuntza proiektuaHezkuntza proiektua
Hezkuntza proiektua
 
Cpf case rev1
Cpf case rev1Cpf case rev1
Cpf case rev1
 
กรณีศึกษา เถ้าแก่น้อย
กรณีศึกษา เถ้าแก่น้อยกรณีศึกษา เถ้าแก่น้อย
กรณีศึกษา เถ้าแก่น้อย
 
Ամեոբաներ
ԱմեոբաներԱմեոբաներ
Ամեոբաներ
 

Similar to StMaarten-workshop-final

Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersUnited Security Providers AG
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Netpluz Asia Pte Ltd
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Mehrdad Jingoism
 

Similar to StMaarten-workshop-final (20)

Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
The Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security ProvidersThe Whys and Wherefores of Web Security – by United Security Providers
The Whys and Wherefores of Web Security – by United Security Providers
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
C3
C3C3
C3
 
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™ Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications Ce hv8 module 13 hacking web applications
Ce hv8 module 13 hacking web applications
 

StMaarten-workshop-final

  • 1. Mobile Communications Parental Controls Workshop ICT Week St Maarten 15-20 August, 2010 Making technology work securely for you and your family! Anton Kaska, Vice President Security Business, US, Canada and Caribbean
  • 2. Agenda •Introduction •Terms •Concerns (Threats) •A layered and holistic approach •Question/Answer period •Demonstration •Open forum
  • 3. Introduction • Security Professional • Over 20 years overseas in Europe, Asia and the Middle East • Parent
  • 5. Concerns (Threats) • Uncontrolled or excessive costs • Exposure to unacceptable “communications” (religious, sexual in nature or predatory) • Technologic Threats to user • Infrastructure threats • Moral/Social-family members
  • 6. Where are the tech-threats? Spam SMS Spam accounting for 18% of total traffic in some locations Knowing the threats and how to control over your technology is imperative Knowledge is key Email Threats via email are prevalent Peer to Peer Can account for 20% of uplink traffic Web (HTTP) Increasing Phishing & Malware hosting Virus MMS Virus infection rates approaching 14% Network Availability Dangers to the network and subscribers(incl. home network) Spyware Copying of messages, call eavesdropping and bugging of rooms. 6 © Nokia Siemens Networks
  • 7. What are the tech-threats? 7 © Nokia Siemens Networks 35 Million Spam Emails Sent 28 people bought products. $ 3M in pharmaceutical sales in 2008 Conversion rate of 0.000008% PC Spam Mobile Spam1,000,000 28 people signed up to service SMS Sent 78,700 recipients called number 31,000 recipients replied to SMS $ 25M in one 3 day attack Fake Prize Draw text message sent in a single 3 day attack in 2009 An analysis of a single Operator’s cost Conversion rate of 0.01%Total $124,000Total $24,800,000 Total $500 Total $5,000
  • 8. sdf dsf sf sdf Example: SMS Phishing Fraud Mobikama.com /www.google.co.in/gwt/x/ts?ei=z9vlstwmozqc7q pazazbag &;source=m &;u=http://m.mobikama.com/ &;whp=122383b343f;initial_page_loaded &;wsc=tc &;wsi=396cd70b33f3cbdd User receives WAP Push User clicks link to Web Site WAP Push has “hot button” link follow on many handsets URL Embedded in Google search string avoids site blocking put in place “Call” Link to Intl Premium Rate Curious subscriber clicks Link and call is placed to Reverse Charge line Unexpected Behaviour = Mobile Virus User not seen “call:” links thinks virus has infected handset Website embedded in Google search URL requires intelligent traffic parsing.
  • 9. Leveraging Location Based Services 9 © Nokia Siemens Networks
  • 10. Layered and Holistic Approach The non-tech bits • The Onion Regulators Providers and YOU ho·lis·tic (h-lstk) a. Emphasizing the importance of the whole and the interdependence of its parts. b. Concerned with wholes rather than analysis or separation into parts: holistic medicine; holistic ecology.
  • 12. Demonstration A sample parental control portal REAL WORLD
  • 13. Open Forum A Citizens Discussion
  • 14. Closing • Take an active role as a parent • Technologic Threats to user • Thank you to the Caribbean Telecommunications Union (CTU) and my friends in the Netherland Antilles