SlideShare a Scribd company logo
1 of 24
BY ATEFOR TSEFOR Conrad, Regional Specialized Officer
PRIVACY AND SECURITY ON
THE INTERNET
CYBER SECURUTY FORUM YAOUNDE-CAMEROON
22-26 APRIL 2013
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
OUTLINE
• Introduction
• INTERPOL global complex
for innovation
• Threat assessment
• The Technology
• The Internet and Intranets
• Threats and Responses
• Conclusion
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
• Why be concerned about Privacy and Security on
the Internet?
• Internet is simply a way to communicate.
• It was not designed to protect the privacy of the
information transmitted over it.
• Personal computers were designed to meet the
needs of individual users.
• Designed to make information readily available, not
to protect it.
INTRODUCTION
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
INTERPOL GLOBAL COMPLEX FOR
INNOVATION
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
ROLE OF INTERPOL
• Use of I-24/7 and INTERPOL data bases
• International cooperation
• Technical assistance on request
• Criminal analysis on request
• Sharing of best practices
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
• Assess accurately potential threats.
• Invest the resources needed to develop responses
that neutralize them.
• Not all threats can or should be neutralized.
• Threats relating to personal computers and the
Internet include;
THREAT ASSESSMENT
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
• Unauthorized snooping,
• Interception of transmission over Internet as EMAIL,
• File tranfers, and www interactions,
• Impersonation (theft of identity).
THREAT ASSESSMENT
(Continuation)
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
• ENCRYPTION
• Mathematical process of « scrambling » messages
or files in a way that it can be reversed only with a
specific password.
• XOR function, bit in the key is matched with a bit in
the text.
• An important point about this algorithm:
- knowing the algorithm does not help to decode
the encrypted text.
THE TECHNOLOGY
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
THE TECHNOLOGY (continuation)
• Sufficiently long key that consist of random bits,
algorithm nearly unbreakable.
• Available algorithms can be divided into two kinds:
• Weak and
• strong
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
« SECRET KEY » ENCRYPTION
• « secret keys « are passwords that must be kept
secret.
• Same key is used to encrypt and decrypt messages.
• Advantage: can be relatively small but difficult to
crack.
• Disadvantage: Hard to share secret keys among all
who need to know.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
« Public key-Private
key »Encryption
• « Public keys » and « Private keys » refer to pairs of
keys derived from prime number mathematics.
• Part of assymetric encryption.
• Messages encrypted with your public key can be
decrypted only with your corresponding private key.
• Messages encrypted with private key can be verified
by decrypting with public key.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
« Public key-Private
key »Encryption(continuation)
• Advantage of assymetric encryption;
• - public key is not a secret
• - private key is secret (protected with secret
password)
• Disadvantages;
• - larger keys required for adequate security
• - must be certain of public keys you use
• - You must keep your private key private
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
DIGITAL SIGNATURES
• Variation on encrypting a message with your private
key.
• Mathematical summary of the message is created
and encrypted.
• Anyone with your public key can verify that you
signed the summary.
• Summary can be used to verify that the message
has not been altered since it was signed.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
CERTIFICATES OF AUTHORITY
• Are messages signed digitally by an
independent third party.
• Verify that the person or organization that
sends you the certificate really is who
he/she/it says.
• They serve much like a human notary public.
• Accept certificates of authority only when you
trust them.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
THE INTERNET AND INTRANETS
• Consist of large numbers of interconnected
computers.
• The Internet is international.
• Intranets are the same but connect only computers
in a given organization.
• Computers on an Intranet are not necessarily
connected to the Internet.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
OPERATING SYSTEMS
• Software programs that allow users to do things
with their computer hardware.
• Single-user operating systems (windows 95,
Macintosh)
• Easy to use but offer little or no data security.
• Multi-user operating system (UNIX) offer
considerable security
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
FIREWALLS
• Firewall computers have two network cards and
two sets of IP addresses.
• Used to secure Intranets with protected computers
behind the firewall.
• Their IP addresses are secret from the Internet.
• Computers outside the firewall cannot send packets
to them and cannot « sniff » packets that they send.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
NAME SERVERS
• Allow computers to have individual names.
• Names are organized into domains, sub domains,
and so forth.
• Importance of concept of name servers.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
THREATS AND RESPONSES
• The UNIX variants are much resistant to attack by
virus and penetration by amateur crackers than
windows 95 or windows NT.
• « Social engineering » account information and
passwords.
• Separate computers used for Internet access from
computers containing vital information.
• At least 8 character passwords.
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
Continuation
• Java Applets and Active X controls.
• Commercial programs are available that
protect user computers against malicious
programs.
• « Virus » and « virus checkers »
• Download programs only from secure sites.
• Web browsers/ proxy servers
(www.anonymizer.com)
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
CONCLUSION
« The web is a relatively young community, a
neighborhood where few people lock their
doors. But this community is rapidly growing
into a city. Perhaps it’s time you thought
about installing some locks. »
PRESENTATION TITLE – CHANGE IN MASTER SLIDE
THANK YOU FOR YOUR KIND
ATTENTION
Contacts: c.atefor@interpol.int
Tel: +237 77412114
+237 22640266
+237 22060262

More Related Content

What's hot

Attack presentation
Attack presentationAttack presentation
Attack presentationFrikha Nour
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]SISA Information Security Pvt.Ltd
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Tyler Shields
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiShah Sheikh
 
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st SessionBeginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st Sessionveerababu penugonda(Mr-IoT)
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection SolutionGreg Stone
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard ThreatsWill Hatcher
 
Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonGreg Stone
 

What's hot (20)

INSECURITYBLANKET
INSECURITYBLANKETINSECURITYBLANKET
INSECURITYBLANKET
 
Resume
ResumeResume
Resume
 
Bh 2014
Bh 2014Bh 2014
Bh 2014
 
CeBIT SCALE 11 pitch
CeBIT SCALE 11 pitchCeBIT SCALE 11 pitch
CeBIT SCALE 11 pitch
 
Attack presentation
Attack presentationAttack presentation
Attack presentation
 
Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]Essential Guide to Protect Your Data [Key Management Techniques]
Essential Guide to Protect Your Data [Key Management Techniques]
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011Blackhat USA Mobile Security Panel 2011
Blackhat USA Mobile Security Panel 2011
 
Firmware analysis 101
Firmware analysis 101Firmware analysis 101
Firmware analysis 101
 
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed BedewiBalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
BalCcon 2015 - DTS Solution - Attacking the Unknown by Mohamed Bedewi
 
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st SessionBeginner’s Guide on How to Start Exploring IoT Security 1st Session
Beginner’s Guide on How to Start Exploring IoT Security 1st Session
 
IoT security
IoT securityIoT security
IoT security
 
Futurex Secure Key Injection Solution
Futurex Secure Key Injection SolutionFuturex Secure Key Injection Solution
Futurex Secure Key Injection Solution
 
Wireless Keyboard Threats
Wireless Keyboard ThreatsWireless Keyboard Threats
Wireless Keyboard Threats
 
Hacking
HackingHacking
Hacking
 
Info security & crypto
Info security & cryptoInfo security & crypto
Info security & crypto
 
IOT Security FUN-damental
IOT Security FUN-damentalIOT Security FUN-damental
IOT Security FUN-damental
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 
Internet security
Internet securityInternet security
Internet security
 
Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, Boston
 

Viewers also liked (9)

Ho IP Telecom
Ho IP TelecomHo IP Telecom
Ho IP Telecom
 
Session 6.1 Stewart Room
Session 6.1 Stewart RoomSession 6.1 Stewart Room
Session 6.1 Stewart Room
 
Professor Tim Unwin - Keynote Address
Professor Tim Unwin - Keynote AddressProfessor Tim Unwin - Keynote Address
Professor Tim Unwin - Keynote Address
 
A Tier III Data Centre Project in Trinidad
A Tier III Data Centre Project in TrinidadA Tier III Data Centre Project in Trinidad
A Tier III Data Centre Project in Trinidad
 
Jon France HR4 ICT12
Jon France HR4 ICT12Jon France HR4 ICT12
Jon France HR4 ICT12
 
Benefits and impact of public access in libraries in ghana and ukraine
Benefits and impact of public access in libraries in ghana and ukraineBenefits and impact of public access in libraries in ghana and ukraine
Benefits and impact of public access in libraries in ghana and ukraine
 
How do you use the web
How do you use the webHow do you use the web
How do you use the web
 
Introducing a4 ai
Introducing a4 aiIntroducing a4 ai
Introducing a4 ai
 
Creating Value for Money from Universal Access Funds
Creating Value for Money from Universal Access FundsCreating Value for Money from Universal Access Funds
Creating Value for Money from Universal Access Funds
 

Similar to CTO Cybersecurity Forum 2013 Atefor Tsefor Conrad

Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet abhinavkeesari
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...CAS
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYNishant Pawar
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Pathshibaehed
 

Similar to CTO Cybersecurity Forum 2013 Atefor Tsefor Conrad (20)

Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
lecture 7.pptx
lecture 7.pptxlecture 7.pptx
lecture 7.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
Seminar
SeminarSeminar
Seminar
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Lect_2.pptx
Lect_2.pptxLect_2.pptx
Lect_2.pptx
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Unit 3
Unit 3Unit 3
Unit 3
 
INTERNET OF THINGS.pptx
INTERNET OF THINGS.pptxINTERNET OF THINGS.pptx
INTERNET OF THINGS.pptx
 
640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths640-554 IT Certification and Career Paths
640-554 IT Certification and Career Paths
 

More from Commonwealth Telecommunications Organisation

More from Commonwealth Telecommunications Organisation (20)

Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le RouxCommonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael OjoCommonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint GironsCommonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois HernandezCommonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
 
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatseCommonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
 
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijerCommonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer HopeCommonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
 
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat DegertCommonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
 
we.learn.it - February 2015
we.learn.it - February 2015we.learn.it - February 2015
we.learn.it - February 2015
 
We learn it agenda
We learn it agendaWe learn it agenda
We learn it agenda
 
Reflections on scale up and transferability
Reflections on scale up and transferabilityReflections on scale up and transferability
Reflections on scale up and transferability
 
Planning your learning expedition final
Planning your learning expedition finalPlanning your learning expedition final
Planning your learning expedition final
 
Le template 2015 final
Le template 2015 finalLe template 2015 final
Le template 2015 final
 
Mapping Tools Version 3
Mapping Tools Version 3Mapping Tools Version 3
Mapping Tools Version 3
 
5 expedition posters
5 expedition posters5 expedition posters
5 expedition posters
 
Session 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El ShamiSession 6.2 Cécile Barayre El Shami
Session 6.2 Cécile Barayre El Shami
 
Session 5.3 Alexander Ntoko
Session 5.3 Alexander NtokoSession 5.3 Alexander Ntoko
Session 5.3 Alexander Ntoko
 
Session 5.2 Martin Koyabe
Session 5.2 Martin KoyabeSession 5.2 Martin Koyabe
Session 5.2 Martin Koyabe
 
Session 4.1 Roy Arends
Session 4.1 Roy ArendsSession 4.1 Roy Arends
Session 4.1 Roy Arends
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

CTO Cybersecurity Forum 2013 Atefor Tsefor Conrad

  • 1. BY ATEFOR TSEFOR Conrad, Regional Specialized Officer PRIVACY AND SECURITY ON THE INTERNET CYBER SECURUTY FORUM YAOUNDE-CAMEROON 22-26 APRIL 2013
  • 2. PRESENTATION TITLE – CHANGE IN MASTER SLIDE OUTLINE • Introduction • INTERPOL global complex for innovation • Threat assessment • The Technology • The Internet and Intranets • Threats and Responses • Conclusion
  • 3. PRESENTATION TITLE – CHANGE IN MASTER SLIDE • Why be concerned about Privacy and Security on the Internet? • Internet is simply a way to communicate. • It was not designed to protect the privacy of the information transmitted over it. • Personal computers were designed to meet the needs of individual users. • Designed to make information readily available, not to protect it. INTRODUCTION
  • 4. PRESENTATION TITLE – CHANGE IN MASTER SLIDE INTERPOL GLOBAL COMPLEX FOR INNOVATION
  • 5. PRESENTATION TITLE – CHANGE IN MASTER SLIDE ROLE OF INTERPOL • Use of I-24/7 and INTERPOL data bases • International cooperation • Technical assistance on request • Criminal analysis on request • Sharing of best practices
  • 6. PRESENTATION TITLE – CHANGE IN MASTER SLIDE • Assess accurately potential threats. • Invest the resources needed to develop responses that neutralize them. • Not all threats can or should be neutralized. • Threats relating to personal computers and the Internet include; THREAT ASSESSMENT
  • 7. PRESENTATION TITLE – CHANGE IN MASTER SLIDE • Unauthorized snooping, • Interception of transmission over Internet as EMAIL, • File tranfers, and www interactions, • Impersonation (theft of identity). THREAT ASSESSMENT (Continuation)
  • 8. PRESENTATION TITLE – CHANGE IN MASTER SLIDE • ENCRYPTION • Mathematical process of « scrambling » messages or files in a way that it can be reversed only with a specific password. • XOR function, bit in the key is matched with a bit in the text. • An important point about this algorithm: - knowing the algorithm does not help to decode the encrypted text. THE TECHNOLOGY
  • 9. PRESENTATION TITLE – CHANGE IN MASTER SLIDE THE TECHNOLOGY (continuation) • Sufficiently long key that consist of random bits, algorithm nearly unbreakable. • Available algorithms can be divided into two kinds: • Weak and • strong
  • 10. PRESENTATION TITLE – CHANGE IN MASTER SLIDE « SECRET KEY » ENCRYPTION • « secret keys « are passwords that must be kept secret. • Same key is used to encrypt and decrypt messages. • Advantage: can be relatively small but difficult to crack. • Disadvantage: Hard to share secret keys among all who need to know.
  • 11. PRESENTATION TITLE – CHANGE IN MASTER SLIDE « Public key-Private key »Encryption • « Public keys » and « Private keys » refer to pairs of keys derived from prime number mathematics. • Part of assymetric encryption. • Messages encrypted with your public key can be decrypted only with your corresponding private key. • Messages encrypted with private key can be verified by decrypting with public key.
  • 12. PRESENTATION TITLE – CHANGE IN MASTER SLIDE « Public key-Private key »Encryption(continuation) • Advantage of assymetric encryption; • - public key is not a secret • - private key is secret (protected with secret password) • Disadvantages; • - larger keys required for adequate security • - must be certain of public keys you use • - You must keep your private key private
  • 13. PRESENTATION TITLE – CHANGE IN MASTER SLIDE DIGITAL SIGNATURES • Variation on encrypting a message with your private key. • Mathematical summary of the message is created and encrypted. • Anyone with your public key can verify that you signed the summary. • Summary can be used to verify that the message has not been altered since it was signed.
  • 14. PRESENTATION TITLE – CHANGE IN MASTER SLIDE CERTIFICATES OF AUTHORITY • Are messages signed digitally by an independent third party. • Verify that the person or organization that sends you the certificate really is who he/she/it says. • They serve much like a human notary public. • Accept certificates of authority only when you trust them.
  • 15. PRESENTATION TITLE – CHANGE IN MASTER SLIDE THE INTERNET AND INTRANETS • Consist of large numbers of interconnected computers. • The Internet is international. • Intranets are the same but connect only computers in a given organization. • Computers on an Intranet are not necessarily connected to the Internet.
  • 16. PRESENTATION TITLE – CHANGE IN MASTER SLIDE
  • 17. PRESENTATION TITLE – CHANGE IN MASTER SLIDE OPERATING SYSTEMS • Software programs that allow users to do things with their computer hardware. • Single-user operating systems (windows 95, Macintosh) • Easy to use but offer little or no data security. • Multi-user operating system (UNIX) offer considerable security
  • 18. PRESENTATION TITLE – CHANGE IN MASTER SLIDE FIREWALLS • Firewall computers have two network cards and two sets of IP addresses. • Used to secure Intranets with protected computers behind the firewall. • Their IP addresses are secret from the Internet. • Computers outside the firewall cannot send packets to them and cannot « sniff » packets that they send.
  • 19. PRESENTATION TITLE – CHANGE IN MASTER SLIDE
  • 20. PRESENTATION TITLE – CHANGE IN MASTER SLIDE NAME SERVERS • Allow computers to have individual names. • Names are organized into domains, sub domains, and so forth. • Importance of concept of name servers.
  • 21. PRESENTATION TITLE – CHANGE IN MASTER SLIDE THREATS AND RESPONSES • The UNIX variants are much resistant to attack by virus and penetration by amateur crackers than windows 95 or windows NT. • « Social engineering » account information and passwords. • Separate computers used for Internet access from computers containing vital information. • At least 8 character passwords.
  • 22. PRESENTATION TITLE – CHANGE IN MASTER SLIDE Continuation • Java Applets and Active X controls. • Commercial programs are available that protect user computers against malicious programs. • « Virus » and « virus checkers » • Download programs only from secure sites. • Web browsers/ proxy servers (www.anonymizer.com)
  • 23. PRESENTATION TITLE – CHANGE IN MASTER SLIDE CONCLUSION « The web is a relatively young community, a neighborhood where few people lock their doors. But this community is rapidly growing into a city. Perhaps it’s time you thought about installing some locks. »
  • 24. PRESENTATION TITLE – CHANGE IN MASTER SLIDE THANK YOU FOR YOUR KIND ATTENTION Contacts: c.atefor@interpol.int Tel: +237 77412114 +237 22640266 +237 22060262