Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

S1 internet, secure place for business

338 views

Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

S1 internet, secure place for business

  1. 1. IntroductionSeminar 1Internet: secure place for Business ?Josep Bardallo - 2012
  2. 2. INTERNET2/ 10/ 2012JOSEP BARDALLOThe most challenging tool in the managing arena ……Main channel for communication, distribution or knowledgenetworking ……A “new” Business place for companies …………..BUT …………..
  3. 3. COMPANIES HACKED: DATA BREACH & SERVICES DOWN …2/ 10/ 2012JOSEP BARDALLO
  4. 4. COMPANIES HACKED: DATA BREACH & SERVICES DOWN …2/ 10/ 2012JOSEP BARDALLO
  5. 5. HACKING IS TODAY A BUSINESS …..2/ 10/ 2012JOSEP BARDALLO• “Expensive cars choke the streets of RâmnicuVâlcea’s bustling center. Top-of-the-line BMWs,Audis, and Mercedes driven by twenty- andthirty-something men sporting gold chains.• I ask my cab driver if these men all have high-paying jobs. He laughs, then wiggles his fingersas if typing on a keyboard…• “They steal money on the Internet.”
  6. 6. AND A WEAPON …..2/ 10/ 2012JOSEP BARDALLOhttp://socks-studio.com/2012/07/17/stuxnet-anatomy-of-the-first-weapon-made-entirely-out-of-code/
  7. 7. EVEN AGAINST THE MOST PREPARED TODAY ….2/ 10/ 2012JOSEP BARDALLO
  8. 8. AND ALL KIND OF DAILY USE THINGS ….2/ 10/ 2012JOSEP BARDALLOhttp://www.euronews.com/2012/09/25/hacking-into-a-car
  9. 9. SO ………..2/ 10/ 2012JOSEP BARDALLOInternet is a good place for businessBut you need include security in the Business planSecurity is a balance between Risk and Budget
  10. 10. CLASS DISCUSSION AND REPORT2/ 10/ 2012JOSEP BARDALLOWork in teams, and choose a question: Which sector can be more affected by Internet issues ? Are SMB affected by security issues in Internet business ? http://www.tekconn.com/news/it-support/smbs-dont-have-to-be-targeted-to-be-hacked/5’ speak conclusions each team (to entire class), and open discussionReport for the next day
  11. 11. BIBLIOGRAPHY2/ 10/ 2012JOSEP BARDALLOhttp://www.forbes.com/sites/andygreenberg/2011/04/04/anonymous-hackers-bring-down-sony-websites/http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hackhttp://articles.cnn.com/2012-07-12/tech/tech_web_yahoo-users-hacked_1_passwords-yahoo-accounts-hackhttp://openspace.org.in/UIDaadhaarsecurity2012http://www.wired.com/magazine/2011/01/ff_hackerville_romania/http://socks-studio.com/2012/07/17/stuxnet-anatomy-of-the-first-weapon-made-entirely-out-of-code/http://www.youtube.com/watch?v=uZUaZjZAy1shttp://www.huffingtonpost.com/2012/10/01/white-house-hacked-cyber-_n_1928646.htmlhttp://www.foxnews.com/tech/2012/10/01/washington-confirms-chinese-hack-attack-on-white-house-computer/http://www.senderbase.org/home/detail_spam_volumehttp://www.theatlantic.com/technology/archive/2012/08/all-the-spammers-in-the-world-may-only-make-200-million-a-year/260814/http://www.computerworld.com/s/article/9229919/Car_hacking_Remote_access_and_other_security_issueshttp://www.euronews.com/2012/09/25/hacking-into-a-car/http://www.tekconn.com/news/it-support/smbs-dont-have-to-be-targeted-to-be-hacked/

×