SlideShare a Scribd company logo
1 of 16
Download to read offline
IoPTS(security,trust,privacy)

A South African Perspective for the
Irish Future Internet Forum

http://www.futureinternet.ie/FutureInternet


SYSTEMATIC THOUGHT LEADERSHIP FOR INNOVATIVE BUSINESS


Prof. J.H.P. Eloff
Research Director
SAP Research CEC Pretoria / SAP Meraka UTD

02 December 2009
Agenda



   1.   Africa and the Emergent Markets
   2.   Snapshot:
        -   Constitution of South Africa
        -   Past InfoSec Innovation?
        -   Current Information Security events
        -   SAP Research CEC Pretoria / Meraka UTD
   3.   IoPTS:
        -   Use Case South Africa
        -   Convergence of security, trust and privacy
   4.   South Africa:
        -   Next steps for creating the IoPTS(security,trust,privacy)
        -   IoPTS(security,trust,privacy) Vision
Africa and the Emergent Markets


~100 million PCs in Africa, with poor security and old
   OS’s graduate from dial-up to broadband online.

MSI Report (-July 2009)


-   Snapshop of security landscape worldwide
           -   Malicious infection rates worldwide


- Large increase in worm infections
- Different threats – different regions

(1)        increase in Trojans (UK)                  (2)
           malware online banking (Brazil/Africa)


Coordinated, international response needed
Africa and the Emergent Markets



•   Rapid technology advancements vs slow
    regulation (RICA as an example)
•   Globalisation (Business Beyond Boundaries)
•   Lack of international research collaboration
    regarding a Security, Privacy & Trust
    Research Agenda for South Africa and the
    Emerging Markets
•   Fragmented S&T research efforts
•   Insufficient Human Capital Development in
    S&T
•   Insufficient broadband
•   Lack of threat analysis
•   Lack of coordinated strategy, enforcement
    and response capability (CERT)
Snapshot – Constitution of South Africa


  CONSTITUTION OF THE REPUBLIC OF SOUTH AFRICA
                 NO. 108 OF 1996


 14.   Privacy.-Everyone has the right to privacy, which
       includes the right not to have-
           (a) their person or home searched;
           (b) their property searched;
           (c) their possessions seized; or
           (d) the privacy of their communications infringed.


                      *32.   Access to information.-( 1) Everyone has the
                             right of access to-
                                 (a) any information held by the state; and
                                 (b) any information that is held by another person and that
                                     is required for the exercise or protection of any rights.
Snapshot – Past InfoSec Innovation ?



  Cryptographic systems in the early sixties
  Own cryptanalysis capability
  Telecommunications security systems for telex, point-to-point communication
  Network security systems including Netseq used locally and other countries
  End-to-end cell phone security systems
  Secure digital storage systems for PCs and shared enterprise wide systems
  Code-hopping remote authentication and alarm control - sold to Microchip, USA
  DSTV/Multi-Choice Pay TV system deployed in Europe, Africa and others
  Thawte Consulting (Mark Shuttleworth) PKI - sold to VeriSign
  Secure prepaid electricity and water system - accepted IEC
  Secure cell phone banking
  Secure pension payment
  Secure Supply Chain Trust system in conjunction with RFID
Snapshot – Current Information Security events


  On 1 July 2009, the RICA law has been implemented in South Africa. What
  is RICA you ask? Its the Regulation of Interception of Communications Act
  (and Provision of Communication-Related Information Act). This requires
  everyone that has an active cell phone number or purchases a new Prepaid
  Starter Pack to register their SIM cards. All current and new contract, top-up
  and prepaid customers are required to register their SIM cards.


                                  Identity theft + fraudulent SIM swap -
                                   Target Online Banking

                                  Identity theft through social networks;
                                  fraudulent credit and loan application

                                  Insider threats




© SAP 2009 / Page 7
Snapshot – SAP Research CEC Pta/Meraka UTD

                                Research Environment
                    Enterprise Architectures               Social / Economic
     SMEs                                                       aspects
     VSEs                                                                           Mobile
                     Service              Integration              Web services
                   Engineering               hubs
     Adaptive UI                 UX                     Collaboration          SME / VSE
                   mHealth                               platforms             Business
                                         S&T
                                                                                Process
    Mobility                                                                   modelling
                               Directed Research Topics
                    Business
                                         ICT                Customer
                    solutions
                                       Emerging              centric
                   for SMEs /
                                      Economies              design
                      VSEs
                             Contextual Relevant EE Research




         SAP Research          Research Mandate                     SAP Meraka UTD
  Strengthen / Compliment Core                                   ICT Research Capacity
      Next Generation Appl                                        ICT Human Cap Dev
IoPTS - Use Case South Africa
IoPTS - Use Case South Africa




© SAP 2009 / Page 10
IoPTS - Use Case South Africa




© SAP 2009 / Page 11
IoPTS – convergence of security,trust,privacy




                      {
                            Respondent Privacy

        Privacy
                              Owner Privacy
                          User Privacy
                            Ethical
                          Laws
             Authorisation
           Identif & Authen
  Security   Confidentiality
                    Integrity
           Non-repudiation
                 Availability




                                Trust
South Africa: Next steps for creating the
 IoPTS(security,trust,privacy)


Develop a South Africa Research Agenda for IoPTS(security,trust,privacy)
Conduct Interdisciplinary Research for participating in building the
  IoPTS(security,trust,privacy)
Learn from EU initiatives (e.g. RISEPTIS) and participate where possible (e.g. EU FP)
Focus on prevention of Computer Crime and develop excellence in Digital forensics
Protect Critical Infrastructure protection (CIP)
Enhance our legal framework for ICT with international inputs
Increase human capital development in IoPTS(security,trust,privacy)
Foster international cooperation     e.g. EU FP Call 5
Focus on Technology issues (e.g. EU FP Objective ICT-2009.1.4: Trustworthy ICT)
South Africa:
IoPTS(security,trust,privacy) Vision




           Our vision is to create a demonstrably secure, dependable,
           reliable and trustworthy ICT environment that seeks to
           protect critical information and ICT infrastructure whilst
           strengthening shared human values and taking into account
           the fundamental right of every South African citizen to
           privacy to foster a safe, open, free, democratic and citizen-
           friendly society.
Thank you!




© SAP 2009 / Page 15
Copyright 2008 SAP AG
All Rights Reserved
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed
       without prior notice.
Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors.
SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, SAP Business ByDesign, ByDesign, PartnerEdge and other SAP products and services mentioned herein as well as their respective logos are
      trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world.
      Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services
      mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects S.A. in the United States and in several other countries. Business
      Objects is an SAP Company. All other product and service names mentioned and associated logos displayed are the trademarks of their respective companies. Data contained in this
      document serves informational purposes only. National product specifications may vary.
The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written
        permission of SAP AG. This document is a preliminary version and not subject to your license agreement or any other agreement with SAP. This document contains only intended
        strategies, developments, and functionalities of the SAP® product and is not intended to be binding upon SAP to any particular course of business, product strategy, and/or development.
        Please note that this document is subject to change and may be changed by SAP at any time without notice. SAP assumes no responsibility for errors or omissions in this document.
        SAP does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of
        any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.
SAP shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation
      shall not apply in cases of intent or gross negligence.
The statutory liability for personal injury and defective products is not affected. SAP has no control over the information that you may access through the use of hot links contained in these
       materials and does not endorse your use of third-party Web pages nor provide any warranty whatsoever relating to third-party Web pages.


Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, ohne die ausdrückliche schriftliche Genehmigung durch
       SAP AG nicht gestattet. In dieser Publikation enthaltene Informationen können ohne vorherige Ankündigung geändert werden.
Einige von der SAP AG und deren Vertriebspartnern vertriebene Softwareprodukte können Softwarekomponenten umfassen, die Eigentum anderer Softwarehersteller sind.
SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, SAP Business ByDesign, ByDesign, PartnerEdge und andere in diesem Dokument erwähnte SAP-Produkte und Services sowie die
      dazugehörigen Logos sind Marken oder eingetragene Marken der SAP AG in Deutschland und in mehreren anderen Ländern weltweit. Business Objects und das Business-Objects-
      Logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius und andere im Text erwähnte Business-Objects-Produkte und -Dienstleistungen sowie die
      entsprechenden Logos sind Marken oder eingetragene Marken der Business Objects S. A. in den USA und anderen Ländern weltweit. Business Objects ist ein Unternehmen der SAP.
      Alle anderen in diesem Dokument erwähnten Namen von Produkten und Services sowie die damit verbundenen Firmenlogos sind Marken der jeweiligen Unternehmen. Die Angaben im
      Text sind unverbindlich und dienen lediglich zu Informationszwecken. Produkte können länderspezifische Unterschiede aufweisen.
Die in dieser Publikation enthaltene Information ist Eigentum der SAP. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form
        auch immer, nur mit ausdrücklicher schriftlicher Genehmigung durch SAP AG gestattet. Bei dieser Publikation handelt es sich um eine vorläufige Version, die nicht Ihrem gültigen
        Lizenzvertrag oder anderen Vereinbarungen mit SAP unterliegt. Diese Publikation enthält nur vorgesehene Strategien, Entwicklungen und Funktionen des SAP®-Produkts. SAP entsteht
        aus dieser Publikation keine Verpflichtung zu einer bestimmten Geschäfts- oder Produktstrategie und/oder bestimmten Entwicklungen. Diese Publikation kann von SAP jederzeit ohne
        vorherige Ankündigung geändert werden.
SAP übernimmt keine Haftung für Fehler oder Auslassungen in dieser Publikation. Des Weiteren übernimmt SAP keine Garantie für die Exaktheit oder Vollständigkeit der Informationen, Texte,
      Grafiken, Links und sonstigen in dieser Publikation enthaltenen Elementen. Diese Publikation wird ohne jegliche Gewähr, weder ausdrücklich noch stillschweigend, bereitgestellt. Dies
      gilt u. a., aber nicht ausschließlich, hinsichtlich der Gewährleistung der Marktgängigkeit und der Eignung für einen bestimmten Zweck sowie für die Gewährleistung der Nichtverletzung
      geltenden Rechts. SAP haftet nicht für entstandene Schäden. Dies gilt u. a. und uneingeschränkt für konkrete, besondere und mittelbare Schäden oder Folgeschäden, die aus der
      Nutzung dieser Materialien entstehen können. Diese Einschränkung gilt nicht bei Vorsatz oder grober Fahrlässigkeit.
Die gesetzliche Haftung bei Personenschäden oder Produkthaftung bleibt unberührt. Die Informationen, auf die Sie möglicherweise über die in diesem Material enthaltenen Hotlinks zugreifen,
       unterliegen nicht dem Einfluss von SAP, und SAP unterstützt nicht die Nutzung von Internetseiten Dritter durch Sie und gibt keinerlei Gewährleistungen oder Zusagen über Internetseiten
       Dritter ab.
Alle Rechte vorbehalten.

More Related Content

What's hot

Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...
Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...
Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...Thomas Stoecker
 
Is3 Satcom Capabilities Brief
Is3 Satcom Capabilities BriefIs3 Satcom Capabilities Brief
Is3 Satcom Capabilities Briefmageeb
 
Technology Asset Intelligence
Technology Asset IntelligenceTechnology Asset Intelligence
Technology Asset IntelligenceLuis Lobo e Silva
 
Complexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through IntegrationComplexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through Integrationjgatrell
 
Cio conference gary bullock
Cio conference   gary bullockCio conference   gary bullock
Cio conference gary bullockGillian Friend
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Clay Melugin
 
Enrique Castro Leon Virtual Service Oriented Grids
Enrique  Castro Leon    Virtual  Service Oriented GridsEnrique  Castro Leon    Virtual  Service Oriented Grids
Enrique Castro Leon Virtual Service Oriented GridsSOA Symposium
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profilejaymieann
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
Sapphire Corporate Presentation 2008 Al 200508
Sapphire Corporate Presentation 2008 Al 200508Sapphire Corporate Presentation 2008 Al 200508
Sapphire Corporate Presentation 2008 Al 200508atorrisi
 
Hitachi data systems agora edition
Hitachi data systems agora editionHitachi data systems agora edition
Hitachi data systems agora editionAgora Group
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation baipgroup
 
ATT: The Power of the Platform
ATT: The Power of the PlatformATT: The Power of the Platform
ATT: The Power of the PlatformCharles Beck
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
The Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make PossibleThe Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make PossibleCisco Services
 

What's hot (19)

Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...
Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...
Bitkom Trendkongress 2014: NTT DATA Innovationworkshop about how the IoT requ...
 
Is3 Satcom Capabilities Brief
Is3 Satcom Capabilities BriefIs3 Satcom Capabilities Brief
Is3 Satcom Capabilities Brief
 
Technology Asset Intelligence
Technology Asset IntelligenceTechnology Asset Intelligence
Technology Asset Intelligence
 
Complexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through IntegrationComplexity and Risk: Effective Business Community Management through Integration
Complexity and Risk: Effective Business Community Management through Integration
 
Cio conference gary bullock
Cio conference   gary bullockCio conference   gary bullock
Cio conference gary bullock
 
The global cyber security market
The global cyber security marketThe global cyber security market
The global cyber security market
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
 
Jeffrey Nick
Jeffrey NickJeffrey Nick
Jeffrey Nick
 
Enrique Castro Leon Virtual Service Oriented Grids
Enrique  Castro Leon    Virtual  Service Oriented GridsEnrique  Castro Leon    Virtual  Service Oriented Grids
Enrique Castro Leon Virtual Service Oriented Grids
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
I3 Technologies Corporation Profile
I3 Technologies Corporation ProfileI3 Technologies Corporation Profile
I3 Technologies Corporation Profile
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
Sapphire Corporate Presentation 2008 Al 200508
Sapphire Corporate Presentation 2008 Al 200508Sapphire Corporate Presentation 2008 Al 200508
Sapphire Corporate Presentation 2008 Al 200508
 
Hitachi data systems agora edition
Hitachi data systems agora editionHitachi data systems agora edition
Hitachi data systems agora edition
 
C2MS
C2MSC2MS
C2MS
 
Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation Cyber Defence East Africa Summit 2015 invitation
Cyber Defence East Africa Summit 2015 invitation
 
ATT: The Power of the Platform
ATT: The Power of the PlatformATT: The Power of the Platform
ATT: The Power of the Platform
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
The Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make PossibleThe Net Effect: It's Not What We Make, It's What We Make Possible
The Net Effect: It's Not What We Make, It's What We Make Possible
 

Viewers also liked

Viewers also liked (8)

Imelda Lambkin - Fp7 At Future Internet 091
Imelda Lambkin - Fp7 At Future Internet 091Imelda Lambkin - Fp7 At Future Internet 091
Imelda Lambkin - Fp7 At Future Internet 091
 
FMurtagh_Sfi_3dec2009_Future_Internet
FMurtagh_Sfi_3dec2009_Future_InternetFMurtagh_Sfi_3dec2009_Future_Internet
FMurtagh_Sfi_3dec2009_Future_Internet
 
Who Smokes? Do You?
Who Smokes? Do You?Who Smokes? Do You?
Who Smokes? Do You?
 
Energy Efficiency and Property Values
Energy Efficiency and Property ValuesEnergy Efficiency and Property Values
Energy Efficiency and Property Values
 
Drugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizenDrugsbeleid in jeughdhuizen
Drugsbeleid in jeughdhuizen
 
IFIF Ideas Submission
IFIF Ideas SubmissionIFIF Ideas Submission
IFIF Ideas Submission
 
SFI Irish Future Internet Forum
SFI Irish Future Internet ForumSFI Irish Future Internet Forum
SFI Irish Future Internet Forum
 
Future internet Forum Google - Eoghan Nolan.
Future internet Forum Google - Eoghan Nolan. Future internet Forum Google - Eoghan Nolan.
Future internet Forum Google - Eoghan Nolan.
 

Similar to Publish Ireland Future Internet St Eloff

Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...
Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...
Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...Sustainable Brands
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnWheatstone
 
Does the Internet of Things make or break your business model?
Does the Internet of Things make or break your business model?Does the Internet of Things make or break your business model?
Does the Internet of Things make or break your business model?Oliver Koeth
 
SwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptxSwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptxWILFRIEDKOUASSIKAN
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
Software panel
Software panelSoftware panel
Software panelMassTLC
 
FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentAlan McSweeney
 
SAP Mobile Strategy and Innovation
SAP Mobile Strategy and InnovationSAP Mobile Strategy and Innovation
SAP Mobile Strategy and InnovationChristian Staalby
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
Your Data Science Journey - Setting Up Analytics Units From Scratch
Your Data Science Journey - Setting Up Analytics Units From ScratchYour Data Science Journey - Setting Up Analytics Units From Scratch
Your Data Science Journey - Setting Up Analytics Units From ScratchNUS-ISS
 
Iot tunisia forum 2017 the journey of making things happen stories of success
Iot tunisia forum 2017  the journey of making things happen stories of successIot tunisia forum 2017  the journey of making things happen stories of success
Iot tunisia forum 2017 the journey of making things happen stories of successIoT Tunisia
 
MITRE Knowledge-Driven Enterprise Strategy
MITRE Knowledge-Driven Enterprise StrategyMITRE Knowledge-Driven Enterprise Strategy
MITRE Knowledge-Driven Enterprise StrategySIKM
 
Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...
Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...
Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...Enterprise Management Associates
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 

Similar to Publish Ireland Future Internet St Eloff (20)

Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...
Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...
Radical Optimization: How the Internet of Things, 3D Printing and Innovative ...
 
Sumyag profile deck
Sumyag profile deck Sumyag profile deck
Sumyag profile deck
 
Changing Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-OnChanging Your Enterprise Architecture - Mobile is Not an Add-On
Changing Your Enterprise Architecture - Mobile is Not an Add-On
 
Does the Internet of Things make or break your business model?
Does the Internet of Things make or break your business model?Does the Internet of Things make or break your business model?
Does the Internet of Things make or break your business model?
 
SwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptxSwitchIT-02.2018-Company-overview.pptx
SwitchIT-02.2018-Company-overview.pptx
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Software panel
Software panelSoftware panel
Software panel
 
FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!FORFIRM - THE FUTURE, DELIVERED!
FORFIRM - THE FUTURE, DELIVERED!
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT MisalignmentDon’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
Don’t Mention The “A” Word – Trends In Continuing Business And IT Misalignment
 
CV - Ujwal Tamminedi
CV - Ujwal TamminediCV - Ujwal Tamminedi
CV - Ujwal Tamminedi
 
SAP Mobile Strategy and Innovation
SAP Mobile Strategy and InnovationSAP Mobile Strategy and Innovation
SAP Mobile Strategy and Innovation
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Your Data Science Journey - Setting Up Analytics Units From Scratch
Your Data Science Journey - Setting Up Analytics Units From ScratchYour Data Science Journey - Setting Up Analytics Units From Scratch
Your Data Science Journey - Setting Up Analytics Units From Scratch
 
Fortinet_for_SAP
Fortinet_for_SAPFortinet_for_SAP
Fortinet_for_SAP
 
Iot tunisia forum 2017 the journey of making things happen stories of success
Iot tunisia forum 2017  the journey of making things happen stories of successIot tunisia forum 2017  the journey of making things happen stories of success
Iot tunisia forum 2017 the journey of making things happen stories of success
 
MITRE Knowledge-Driven Enterprise Strategy
MITRE Knowledge-Driven Enterprise StrategyMITRE Knowledge-Driven Enterprise Strategy
MITRE Knowledge-Driven Enterprise Strategy
 
Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...
Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...
Profiting from the Digital Shift: Time Series Databases as Value Creation Eng...
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 

More from Irish Future Internet Forum

4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...Irish Future Internet Forum
 
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Irish Future Internet Forum
 
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreRay Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreIrish Future Internet Forum
 
Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Irish Future Internet Forum
 
Michel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetMichel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetIrish Future Internet Forum
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 

More from Irish Future Internet Forum (20)

4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
4C’s Perspective Prof. Barry O’Sullivan. Irish Future Internet Forum Conferen...
 
Alan Smeaton Irish Future Internet Forum 2011
Alan Smeaton Irish Future Internet Forum 2011Alan Smeaton Irish Future Internet Forum 2011
Alan Smeaton Irish Future Internet Forum 2011
 
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
Barbara Fogerty, Marine Institute - Extended Recognised Maritime Picture to S...
 
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data CentreRay Carroll, TSSG - Sustainable and Energy Efficient Data Centre
Ray Carroll, TSSG - Sustainable and Energy Efficient Data Centre
 
CNGL Future Internet position - Vincent Wade.
CNGL Future Internet position - Vincent Wade.CNGL Future Internet position - Vincent Wade.
CNGL Future Internet position - Vincent Wade.
 
Barry Smyth Clarity Future Internet
Barry Smyth Clarity Future InternetBarry Smyth Clarity Future Internet
Barry Smyth Clarity Future Internet
 
NEMBES Future Internet position - Dirk Pesch
NEMBES Future Internet position - Dirk PeschNEMBES Future Internet position - Dirk Pesch
NEMBES Future Internet position - Dirk Pesch
 
IBM Research Future Internet
IBM Research Future InternetIBM Research Future Internet
IBM Research Future Internet
 
Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011Cian Blackwell - Risk management and mitigation 2011
Cian Blackwell - Risk management and mitigation 2011
 
Michel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the InternetMichel Riguidel - ENST the Future of the Internet
Michel Riguidel - ENST the Future of the Internet
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Model Smart City Barcelona
Model Smart City BarcelonaModel Smart City Barcelona
Model Smart City Barcelona
 
Irish Future Internet Forum Zed Sabeur
Irish Future Internet Forum Zed SabeurIrish Future Internet Forum Zed Sabeur
Irish Future Internet Forum Zed Sabeur
 
IFIF 2011 opening - Willie Donnelly
IFIF 2011 opening - Willie DonnellyIFIF 2011 opening - Willie Donnelly
IFIF 2011 opening - Willie Donnelly
 
Sdecker
SdeckerSdecker
Sdecker
 
Session 3 Results
Session 3 ResultsSession 3 Results
Session 3 Results
 
Donal Simmie Ifif Poster 1209
Donal Simmie Ifif Poster 1209Donal Simmie Ifif Poster 1209
Donal Simmie Ifif Poster 1209
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
Think Trust A1 Poster Em Final Version
Think Trust A1 Poster Em Final VersionThink Trust A1 Poster Em Final Version
Think Trust A1 Poster Em Final Version
 
Mickposter Nuim
Mickposter NuimMickposter Nuim
Mickposter Nuim
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

Publish Ireland Future Internet St Eloff

  • 1. IoPTS(security,trust,privacy) A South African Perspective for the Irish Future Internet Forum http://www.futureinternet.ie/FutureInternet SYSTEMATIC THOUGHT LEADERSHIP FOR INNOVATIVE BUSINESS Prof. J.H.P. Eloff Research Director SAP Research CEC Pretoria / SAP Meraka UTD 02 December 2009
  • 2. Agenda 1. Africa and the Emergent Markets 2. Snapshot: - Constitution of South Africa - Past InfoSec Innovation? - Current Information Security events - SAP Research CEC Pretoria / Meraka UTD 3. IoPTS: - Use Case South Africa - Convergence of security, trust and privacy 4. South Africa: - Next steps for creating the IoPTS(security,trust,privacy) - IoPTS(security,trust,privacy) Vision
  • 3. Africa and the Emergent Markets ~100 million PCs in Africa, with poor security and old OS’s graduate from dial-up to broadband online. MSI Report (-July 2009) - Snapshop of security landscape worldwide - Malicious infection rates worldwide - Large increase in worm infections - Different threats – different regions (1) increase in Trojans (UK) (2) malware online banking (Brazil/Africa) Coordinated, international response needed
  • 4. Africa and the Emergent Markets • Rapid technology advancements vs slow regulation (RICA as an example) • Globalisation (Business Beyond Boundaries) • Lack of international research collaboration regarding a Security, Privacy & Trust Research Agenda for South Africa and the Emerging Markets • Fragmented S&T research efforts • Insufficient Human Capital Development in S&T • Insufficient broadband • Lack of threat analysis • Lack of coordinated strategy, enforcement and response capability (CERT)
  • 5. Snapshot – Constitution of South Africa CONSTITUTION OF THE REPUBLIC OF SOUTH AFRICA NO. 108 OF 1996 14. Privacy.-Everyone has the right to privacy, which includes the right not to have- (a) their person or home searched; (b) their property searched; (c) their possessions seized; or (d) the privacy of their communications infringed. *32. Access to information.-( 1) Everyone has the right of access to- (a) any information held by the state; and (b) any information that is held by another person and that is required for the exercise or protection of any rights.
  • 6. Snapshot – Past InfoSec Innovation ? Cryptographic systems in the early sixties Own cryptanalysis capability Telecommunications security systems for telex, point-to-point communication Network security systems including Netseq used locally and other countries End-to-end cell phone security systems Secure digital storage systems for PCs and shared enterprise wide systems Code-hopping remote authentication and alarm control - sold to Microchip, USA DSTV/Multi-Choice Pay TV system deployed in Europe, Africa and others Thawte Consulting (Mark Shuttleworth) PKI - sold to VeriSign Secure prepaid electricity and water system - accepted IEC Secure cell phone banking Secure pension payment Secure Supply Chain Trust system in conjunction with RFID
  • 7. Snapshot – Current Information Security events On 1 July 2009, the RICA law has been implemented in South Africa. What is RICA you ask? Its the Regulation of Interception of Communications Act (and Provision of Communication-Related Information Act). This requires everyone that has an active cell phone number or purchases a new Prepaid Starter Pack to register their SIM cards. All current and new contract, top-up and prepaid customers are required to register their SIM cards. Identity theft + fraudulent SIM swap - Target Online Banking Identity theft through social networks; fraudulent credit and loan application Insider threats © SAP 2009 / Page 7
  • 8. Snapshot – SAP Research CEC Pta/Meraka UTD Research Environment Enterprise Architectures Social / Economic SMEs aspects VSEs Mobile Service Integration Web services Engineering hubs Adaptive UI UX Collaboration SME / VSE mHealth platforms Business S&T Process Mobility modelling Directed Research Topics Business ICT Customer solutions Emerging centric for SMEs / Economies design VSEs Contextual Relevant EE Research SAP Research Research Mandate SAP Meraka UTD Strengthen / Compliment Core ICT Research Capacity Next Generation Appl ICT Human Cap Dev
  • 9. IoPTS - Use Case South Africa
  • 10. IoPTS - Use Case South Africa © SAP 2009 / Page 10
  • 11. IoPTS - Use Case South Africa © SAP 2009 / Page 11
  • 12. IoPTS – convergence of security,trust,privacy { Respondent Privacy Privacy Owner Privacy User Privacy Ethical Laws Authorisation Identif & Authen Security Confidentiality Integrity Non-repudiation Availability Trust
  • 13. South Africa: Next steps for creating the IoPTS(security,trust,privacy) Develop a South Africa Research Agenda for IoPTS(security,trust,privacy) Conduct Interdisciplinary Research for participating in building the IoPTS(security,trust,privacy) Learn from EU initiatives (e.g. RISEPTIS) and participate where possible (e.g. EU FP) Focus on prevention of Computer Crime and develop excellence in Digital forensics Protect Critical Infrastructure protection (CIP) Enhance our legal framework for ICT with international inputs Increase human capital development in IoPTS(security,trust,privacy) Foster international cooperation e.g. EU FP Call 5 Focus on Technology issues (e.g. EU FP Objective ICT-2009.1.4: Trustworthy ICT)
  • 14. South Africa: IoPTS(security,trust,privacy) Vision Our vision is to create a demonstrably secure, dependable, reliable and trustworthy ICT environment that seeks to protect critical information and ICT infrastructure whilst strengthening shared human values and taking into account the fundamental right of every South African citizen to privacy to foster a safe, open, free, democratic and citizen- friendly society.
  • 15. Thank you! © SAP 2009 / Page 15
  • 16. Copyright 2008 SAP AG All Rights Reserved No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, SAP Business ByDesign, ByDesign, PartnerEdge and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects S.A. in the United States and in several other countries. Business Objects is an SAP Company. All other product and service names mentioned and associated logos displayed are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. The information in this document is proprietary to SAP. No part of this document may be reproduced, copied, or transmitted in any form or for any purpose without the express prior written permission of SAP AG. This document is a preliminary version and not subject to your license agreement or any other agreement with SAP. This document contains only intended strategies, developments, and functionalities of the SAP® product and is not intended to be binding upon SAP to any particular course of business, product strategy, and/or development. Please note that this document is subject to change and may be changed by SAP at any time without notice. SAP assumes no responsibility for errors or omissions in this document. SAP does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. SAP shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intent or gross negligence. The statutory liability for personal injury and defective products is not affected. SAP has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party Web pages nor provide any warranty whatsoever relating to third-party Web pages. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, ohne die ausdrückliche schriftliche Genehmigung durch SAP AG nicht gestattet. In dieser Publikation enthaltene Informationen können ohne vorherige Ankündigung geändert werden. Einige von der SAP AG und deren Vertriebspartnern vertriebene Softwareprodukte können Softwarekomponenten umfassen, die Eigentum anderer Softwarehersteller sind. SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, SAP Business ByDesign, ByDesign, PartnerEdge und andere in diesem Dokument erwähnte SAP-Produkte und Services sowie die dazugehörigen Logos sind Marken oder eingetragene Marken der SAP AG in Deutschland und in mehreren anderen Ländern weltweit. Business Objects und das Business-Objects- Logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius und andere im Text erwähnte Business-Objects-Produkte und -Dienstleistungen sowie die entsprechenden Logos sind Marken oder eingetragene Marken der Business Objects S. A. in den USA und anderen Ländern weltweit. Business Objects ist ein Unternehmen der SAP. Alle anderen in diesem Dokument erwähnten Namen von Produkten und Services sowie die damit verbundenen Firmenlogos sind Marken der jeweiligen Unternehmen. Die Angaben im Text sind unverbindlich und dienen lediglich zu Informationszwecken. Produkte können länderspezifische Unterschiede aufweisen. Die in dieser Publikation enthaltene Information ist Eigentum der SAP. Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, nur mit ausdrücklicher schriftlicher Genehmigung durch SAP AG gestattet. Bei dieser Publikation handelt es sich um eine vorläufige Version, die nicht Ihrem gültigen Lizenzvertrag oder anderen Vereinbarungen mit SAP unterliegt. Diese Publikation enthält nur vorgesehene Strategien, Entwicklungen und Funktionen des SAP®-Produkts. SAP entsteht aus dieser Publikation keine Verpflichtung zu einer bestimmten Geschäfts- oder Produktstrategie und/oder bestimmten Entwicklungen. Diese Publikation kann von SAP jederzeit ohne vorherige Ankündigung geändert werden. SAP übernimmt keine Haftung für Fehler oder Auslassungen in dieser Publikation. Des Weiteren übernimmt SAP keine Garantie für die Exaktheit oder Vollständigkeit der Informationen, Texte, Grafiken, Links und sonstigen in dieser Publikation enthaltenen Elementen. Diese Publikation wird ohne jegliche Gewähr, weder ausdrücklich noch stillschweigend, bereitgestellt. Dies gilt u. a., aber nicht ausschließlich, hinsichtlich der Gewährleistung der Marktgängigkeit und der Eignung für einen bestimmten Zweck sowie für die Gewährleistung der Nichtverletzung geltenden Rechts. SAP haftet nicht für entstandene Schäden. Dies gilt u. a. und uneingeschränkt für konkrete, besondere und mittelbare Schäden oder Folgeschäden, die aus der Nutzung dieser Materialien entstehen können. Diese Einschränkung gilt nicht bei Vorsatz oder grober Fahrlässigkeit. Die gesetzliche Haftung bei Personenschäden oder Produkthaftung bleibt unberührt. Die Informationen, auf die Sie möglicherweise über die in diesem Material enthaltenen Hotlinks zugreifen, unterliegen nicht dem Einfluss von SAP, und SAP unterstützt nicht die Nutzung von Internetseiten Dritter durch Sie und gibt keinerlei Gewährleistungen oder Zusagen über Internetseiten Dritter ab. Alle Rechte vorbehalten.