CTO Cybersecurity Forum 2013 David Turahi


Published on

Supporting the global efforts in strengthening the safety, security and resilience of Cyberspace, the Commonwealth Cybersecurity Forum 2013, organised by the Commonwealth Telecommunications Organisation. The ceremonial opening examined how Cyberspace could be governed and utilised in a manner to foster freedom and entrepreneurship, while protecting individuals, property and the state, leading to socio-economic development. Speakers of this session, Mr Mario Maniewicz, Chief, Department of Infrastructure, Enabling Environment and E-Applications, ITU; Mr David Pollington, Director, International Security Relations, Microsoft; Mr Alexander Seger, Secretary, Cybercrime Convention Committee, Council of Europe; Mr Nigel Hickson, Vice President, Europe, ICANN and Mr Pierre Dandjinou, Vice President, Africa, ICANN, added their perspectives on various approaches to Cybergovernance, with general agreement on the role Cyberspace could play to facilitate development equitably and fairly across the world.

Hosted by the Ministry of Posts and Telecommunications of Cameroon together with the Telecommunications Regulatory Board of Cameroon and backed by partners and industry supporters including ICANN, Council of Europe, Microsoft, MTN Cameroon, AFRINIC and Internet Watch Foundation, the Commonwealth Cybersecurity Forum 2013 seeks to broaden stakeholder dialogue to facilitate practical action in Cybergovernance and Cybersecurity, some of which will be reflected in the CTO’s own work programmes under its Cybersecurity agenda.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

CTO Cybersecurity Forum 2013 David Turahi

  1. 1. Dr. David Turahi Director for IT&IMS - MOICT Uganda
  2. 2. Benefits Mobility Size A smart phone is a mobile phone offering advanced capabilities beyond a typical mobile phone, often with computer like functionality. There is no industry standard definition of a smart phone.
  3. 3. Inherent risk to exposure of personal information carried on and transmitted through the device Phones are easily lost Devices are associated with and linked to a particular user for billing and account purposes. Increased mobility means increased exposure. Applications used on smartphones are unsafe.
  4. 4. Password Protection • Lack of leads to great exposure Jail breaking/Rooting • Exposes phone to remote installation of software (Might be malware) Accounts linked to credit cards • Can easily leak your financial information when compromised
  5. 5. Applications • Can access and reveal a lot of personal information • Security leak if not updated Email Accounts • Amalgamation of communications
  6. 6. How much does your phone know about you? •Almost everything Mobile malware •App based •Web based •SMS/Text message-based Securing your smartphone •Passcode •Antivirus software •Software updates
  7. 7. App permissions/access •Pay attention to permissions app requests for Location services: GPs and WiFi •Disclose location information •Disclose of transmitted information (public WiFi)
  8. 8. Definitions Spyware Botnets Trojan Virus Worms Geolocation
  9. 9. Spyware – software that self-installs on a computer, enabling information to be covertly obtained about a person’s internet use, passwords, etc.
  10. 10. Botnets – A network of private computers infected with malicious software and controlled as a group without the owner’s knowledge, e.g. to send spam
  11. 11. Trojan – A Trojan horse, or Trojan is a malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access to a user’s computer system
  12. 12. Virus – A Virus is a software program capable of reproducing itself and usually of causing great damage to files or other programs on the same computer
  13. 13. Worm – A computer worm is a self-replicating malware computer program in order to spread to other computers. It uses a computer network to spread itself relying on security failures on the target computer. Unlike a virus it does not need to attach itself to an existing program
  14. 14. Geolocation – Geolocation is the identification of the real- world geographic location of an object, such as a cell phone or an internet-connected computer terminal. For example, a picture taken with a smart phone may record the location within the file. When the file is posted on a social network site, any viewer may be able to determine the location from the data saved on the picture file
  15. 15. •Malware •Metadata •Application scams •Insecure applications Risks associated with mobile applications •Decreased performance •Random action •Unknown phone calls or emails • • Signs that your phone is compromised
  16. 16. Steps to take incase you are victim of compromise • If antivirus is installed, scan and remove malware • If unable to remove malware, use wiping program
  17. 17. Password protect your phone Install security software Be aware of what you are doing with your phone Do not “jail-break” or “root” your phone Application access Review permission given to applications when installing them
  18. 18. Install “phone-finder” app Enroll in a backup/wiping program Limit your activities while using public WiFi Crosscheck URLs while making purchases using your phone Turn off Geolocation and GPS
  19. 19. If your phone is stolen • If enrolled in backup/wiping program • Contact administrator and wipe immediately • Contact service provider to cancel your service • if not enrolled in a backup/wiping program • Treat loss as you would treat loss of wallet or purse y In case of disposal •Wipe phone clean