SlideShare a Scribd company logo
Computer Security

is anything less than 100% -
      “good enough”?




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
how secure is “secure”?

exactly what are the threats out there?

why are “they” doing it?

what is necessary to protect your
business?




         Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what are risks?
data loss

public relations issues

regulatory non-compliance

legal exposure

productivity loss

unnecessary expense




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
if you are connected to the internet, the
      internet is connected to you




          Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
so, what is “out there”?

    Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
spyware
spam



                                                                          phishing


                              intrusion
       s
 viru



           cyber-threats

        Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
targeted




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
to whom it may concern




   Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
but why & who?




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
political reasons




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
money!
Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
So far...



we know what the threats are
who is doing it
why




      Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
so, what is “good enough”?

     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
is there such thing as “good enough”
when it comes to network security?
are periodic signature updates OK?

should you allow portable media? company “policy”

how long could your organization go without email?

do you know if any of your computers are already compromised?

should you filter content?

is your public wireless network segregated?

how safe is “cloud” storage?

how much illegal software is on your company network?



                 Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
security basics
firewall
intrusion detection
anti-virus
anti-spam
anti-spyware
content filter (web browsing)
data leakage prevention




     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what should a manager do?

each business must carefully evaluate
circumstances
look long and hard at current and
future data
determine where and how to store
data
budget



         Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
security
diy or hire someone?




                                    or




 Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
what do we know now?

every computer that ever connects
to the internet is at risk
the risks run 24/7/365 and... they
are constantly changing
effective security is not difficult or
expensive




        Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
books? - what’s a book?




   Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
how do kids learn today?




    Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
blue reef sonar
  Makes students accountable for the time they spend on the internet

  Protects laptops even when not on the school network

  Support and manage ALL devices - even Apple, iOS, Android, Windows,
Linux, MacOS - with a single log-on

  Teachers can open blocked web sites without involving IT

  Monitor chats, social networking

  Cyber bullying solutions

  STOP anonymous proxies...


if you know a school - do them a favor - tell them
        about Sonar - they will thank you


                     Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
ขอบคุณมากๆ

  thank you




Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok

More Related Content

What's hot

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
DDoS Mitigation
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
Ahmed Banafa
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Mohit Dholakiya
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
Ahmed Banafa
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
Ahmed Banafa
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
ardexateam
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
Daren Dunkel
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Sudha Jamthe
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
Saurabh Yadav
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
Marc Vael
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
BridgetteWilliams15
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
Taibul Islam Tushar
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
Ahmed Banafa
 
IoT
IoTIoT
IoT
Mphasis
 
Cyberspace
CyberspaceCyberspace
Cyberspace
Utchi
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
Zeshan Sattar
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
AM Publications,India
 

What's hot (20)

Top 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be ReadingTop 25 Cyber Security Blogs You Should Be Reading
Top 25 Cyber Security Blogs You Should Be Reading
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IoT Design Principles
IoT Design PrinciplesIoT Design Principles
IoT Design Principles
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
 
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
Jan 2018: IoT trends in silicon valley keynote at consumer electronics forum ...
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
Hackers and hacking in bangladesh
Hackers and hacking in bangladeshHackers and hacking in bangladesh
Hackers and hacking in bangladesh
 
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
IoT
IoTIoT
IoT
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Design and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA CryptosystemDesign and Development of an E-Commerce Security Using RSA Cryptosystem
Design and Development of an E-Commerce Security Using RSA Cryptosystem
 

Similar to Computer Network Security

Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web Apps
Tony Fish
 
How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobile
Carsonified Team
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile Workshop
Tony Fish
 
How To Use It With Safe
How To Use It With SafeHow To Use It With Safe
How To Use It With Safe
Pituphong Yavirach
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobile
Tony Fish
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology Adoption
Software Park Thailand
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
Advance Tech
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
shericehewat
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
Khaltar Togtuun
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
Abhinav Mishra
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
Technopundits Business Solutions
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
Innofied Solution
 
Understanding and Solving Common IoT Security Problems.pdf
Understanding and Solving Common IoT Security Problems.pdfUnderstanding and Solving Common IoT Security Problems.pdf
Understanding and Solving Common IoT Security Problems.pdf
SeasiaInfotech2
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
Stephen Lahanas
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
Cisco Mobility
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentation
neelyworthwhile
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Dinesh O Bareja
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute
247 Invest
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
alicelagajino
 

Similar to Computer Network Security (20)

Future of Web Apps
Future of Web AppsFuture of Web Apps
Future of Web Apps
 
How to take your web app mobile
How to take your web app mobileHow to take your web app mobile
How to take your web app mobile
 
Future of Mobile Workshop
Future of Mobile WorkshopFuture of Mobile Workshop
Future of Mobile Workshop
 
How To Use It With Safe
How To Use It With SafeHow To Use It With Safe
How To Use It With Safe
 
uniqueness of mobile
uniqueness of mobileuniqueness of mobile
uniqueness of mobile
 
Power of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology AdoptionPower of Social Collaboration and Business Technology Adoption
Power of Social Collaboration and Business Technology Adoption
 
In 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docxIn 2022, top 08 trending technology.docx
In 2022, top 08 trending technology.docx
 
Fundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docxFundamentals of Information Systems Security Lesson 2The I.docx
Fundamentals of Information Systems Security Lesson 2The I.docx
 
Mon cirt khaltar
Mon cirt khaltarMon cirt khaltar
Mon cirt khaltar
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
What is ethical hacking
What is ethical hackingWhat is ethical hacking
What is ethical hacking
 
6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them6 Insane Challenges of Smart Home App Development & How To Solve Them
6 Insane Challenges of Smart Home App Development & How To Solve Them
 
Understanding and Solving Common IoT Security Problems.pdf
Understanding and Solving Common IoT Security Problems.pdfUnderstanding and Solving Common IoT Security Problems.pdf
Understanding and Solving Common IoT Security Problems.pdf
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Women in it presentation
Women in it presentationWomen in it presentation
Women in it presentation
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Keynote Sales Kickoff Interoute
Keynote Sales Kickoff InterouteKeynote Sales Kickoff Interoute
Keynote Sales Kickoff Interoute
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Empowerment Technology Lesson 1
Empowerment Technology Lesson 1Empowerment Technology Lesson 1
Empowerment Technology Lesson 1
 

Recently uploaded

Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 

Recently uploaded (20)

Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 

Computer Network Security

  • 1. Computer Security is anything less than 100% - “good enough”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 2. Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 3. how secure is “secure”? exactly what are the threats out there? why are “they” doing it? what is necessary to protect your business? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 4. what are risks? data loss public relations issues regulatory non-compliance legal exposure productivity loss unnecessary expense Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 5. if you are connected to the internet, the internet is connected to you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 6. so, what is “out there”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 7. spyware spam phishing intrusion s viru cyber-threats Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 8. targeted Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 9. to whom it may concern Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 10. but why & who? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 11. political reasons Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 12. money! Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 13. So far... we know what the threats are who is doing it why Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 14. so, what is “good enough”? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 15. is there such thing as “good enough” when it comes to network security? are periodic signature updates OK? should you allow portable media? company “policy” how long could your organization go without email? do you know if any of your computers are already compromised? should you filter content? is your public wireless network segregated? how safe is “cloud” storage? how much illegal software is on your company network? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 16. security basics firewall intrusion detection anti-virus anti-spam anti-spyware content filter (web browsing) data leakage prevention Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 17. what should a manager do? each business must carefully evaluate circumstances look long and hard at current and future data determine where and how to store data budget Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 18. security diy or hire someone? or Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 19. what do we know now? every computer that ever connects to the internet is at risk the risks run 24/7/365 and... they are constantly changing effective security is not difficult or expensive Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 20. books? - what’s a book? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 21. how do kids learn today? Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 22. blue reef sonar Makes students accountable for the time they spend on the internet Protects laptops even when not on the school network Support and manage ALL devices - even Apple, iOS, Android, Windows, Linux, MacOS - with a single log-on Teachers can open blocked web sites without involving IT Monitor chats, social networking Cyber bullying solutions STOP anonymous proxies... if you know a school - do them a favor - tell them about Sonar - they will thank you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok
  • 23. ขอบคุณมากๆ thank you Copyright 2011 - Network Consulting International, Co. Ltd. - Bangkok