SlideShare a Scribd company logo
Cyber Security
Mobile Devices and On-line Threats
Cyber Security
Mobile Devices and On-line Threats
Presented by: Umer
Saeed
What is Cyber security
• The term Cyber dates back to the 40’s and 50’s and originates
from the word Cybernetics, which dealt with rise of Control
systems and human interaction with it.
• In simple terms, today the word Cyber indicates Internet or
having to do with computers e.g. Cyber fraud, Cyber security.
• Since its widespread acceptance, Internet has become home of
virtually every activity and huge amount of valuable data.
• Some of that data is extremely valuable and pertinent to
corporate and national security which naturally attracts bad
actors resulting in Cyber Crime and espionage
• Cyber Security deals with the defensive operations carried out
to defend valuable data on computers and especially on Smart
phones against threats like virus, malware, ransomware,
hacking, phishing and various other malicious attacks.
Why is Cyber Security more important than ever
• Exponential growth in use of technology and mobile devices to
process data

Massive use by corporations and people
 Governments, businesses and people, rely very heavily on various forms of
information
 Information, big-data, market statistics are now the key business success factors
 Impacts rich and poor, young and adults, men and women
 Exposes digital devices users to risks, regardless of gender, age, status
 Because these devices play an Irreplaceable role in our daily lives
 Abundance of technology and big-data has attractions for cyber criminals
Why is Cyber Security more important than ever
• Growing possibility of threats to our privacy and security
 HOW - Prejudice about security products/practices due to

Lack of awareness or availability of cheap security solutions

Unavailability of trained security professionals
 WHERE - Lack of understanding of magnitude of risks posed to our integrity

Governments, enterprises, businesses and common people fail to realize the
impact of security incidents
 WHY - Little awareness by relevant authorities, media and education institutes

The laws on Cyber crime, data leakage, defamation are in their early stages
and provide little deterrence
 WHEN – High probability of risks due to

always on, always present mobile/storage devices (e.g. USB sticks, Memory
Cards. Smart phones)
Why is Cyber Security more important than ever
• Lack of training and education at grass root level
 Lack of awareness of Cyber crime laws, basics of frauds and prevention
 Uncontrolled access to harmful mobile apps and websites before proper training
 Easy access given to toddlers, teenagers without proper training
 Ignoring recommended privacy settings for social media (Facebook, Whatsapp)
• Non-negotiable for business sustenance and growth
 Every business needs to operate On-line safely to stay relevant and in touch
with market and its growing consumer base
 A requirement for reaching emerging and developed markets
 Rapidly rising on-line market as compared to traditional businesses
 In most cases, the damages of Cyber crime are irrecoverable
Why worry about Mobile devices?
• Mobile devices have largest market share for Internet access
 More smart phones sold than Personal Computers and Laptops combined
 Easier to carry and operate in contrast to laptops
 Offers similar and in some cases, better computing and storage
• Hides in plain sight
 Exposed to more threats than a larger device e.g. Laptop
 Easy to steal, snatch, abuse data and in some cases leaking corporate resources
 Use in public places, large gathering exposing to Fake Wifi and MITM attacks
• Used for same tasks as we perform on Laptops/PCs
 Storing and processing Corporate information on the go
 Storing confidential files, sensitive and exploitable information

Little or no security for Photos, Online copies of Financial and bank records etc

Hardly any mobile has anti-virus or firewall
How Businesses can protect against Mobile Device threats
• Know what needs protection
●
Know what information assets are important for your business to operate effectively

Ensure strictly devised data classification policy exists and is adhered to for all data

Provide training to users to process data diligently according to classification
●
more you invest to train your business/family people​, less are the chances of security incidents

Evaluate the cost of data leakage and protect information assets accordingly
●
Cost of data leakage is the cost need to gather same data and same reputation. Two very
different things and yet crucial for business survival.

If you don't get involved, don't expect anyone else to be. Security is a Senior management
responsibility.
How Businesses can protect against Mobile Device threats
Protection of Information Assets

Never use pirated PC/Software to process data that is valuable to you, your family or business

Use strong encryption to protect data during operations (i.e. storage, processing, transmission)

Use Firewall, Intrusion Prevention, VLAN, DMZ, honeypots to protect sensitive data

Maintain regular off-line backup of valuable data. Test backups for possible recovery scenario

Avoid using USB sticks to store UN-encrypted data, at all costs

Avoid using Open WiFi and hot-spots in Coffee shops, airport and bus terminals. Use Mobile data.

Use strong passwords. Use pass phrases if possible.

Do NOT share sensitive information over social media

If costs are concern, use Open Source software. There’s an open source software for every need.

Hire only trained professionals to be custodians of information assets.
Three basic rules of protection
Protect
Business data
• Train staff and show your
involvement
• Classify Data and employ
controls matching data
sensitivity
• Genuine skills, software and
technology
Protect
Personal data
• Education about abuse of
personal data and misuse of
Social Media
• Use built-in cloud/App-lock
features to prevent device
misuse
• Encrypt valuable data, if you
have to keep on mobile.
About Presenter
• 20+ years in Systems and Networks Management, Security
• Held roles with prestigious organizations like British Council,
Arabian Co, ISACA
• Avid supporter of grass-root level, easily available security
education, awareness and training for youth
• Believes in adapting Linux in home as well as corporate
environments to end piracy and security issues
• Trainer for CISA, CISM
fb.me/FutureNOW
Cyber security and mobile devices

More Related Content

What's hot

Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
Ronald Soh
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
Avanzo net
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
Tyrone Grandison
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
Yasir Nafees
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
John Palfreyman
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
Stephen Cobb
 
Cyber security
Cyber securityCyber security
Cyber security
Luke Veltjens-Swan
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
Caston Thomas
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Morakinyo Animasaun
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
Tammy Clark
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationJacqueline Fick
 
Cyber security
Cyber security Cyber security
Cyber security
Shivam Yadav
 

What's hot (20)

Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber-Security in Education
Cyber-Security in EducationCyber-Security in Education
Cyber-Security in Education
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
Smarter Cyber Security
Smarter Cyber SecuritySmarter Cyber Security
Smarter Cyber Security
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Cyber security
Cyber securityCyber security
Cyber security
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3Cybersecurity for CRM v0219-3
Cybersecurity for CRM v0219-3
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
 
Creating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisationCreating cyber forensic readiness in your organisation
Creating cyber forensic readiness in your organisation
 
Cyber security
Cyber security Cyber security
Cyber security
 

Similar to Cyber security and mobile devices

Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
AnuraagAwasthi3
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
Jon Collins
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
Anwar CHFI, SSCP, ITIL
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
Karel Van Isacker
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptx
PratheeshKumarN
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
SecureCurve
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Apurva323420
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
newbie2019
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
Huntsman Security
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
Freeform Dynamics
 

Similar to Cyber security and mobile devices (20)

Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Computer & Internet Security.pptx
Computer & Internet Security.pptxComputer & Internet Security.pptx
Computer & Internet Security.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Cyber security and mobile devices

  • 1. Cyber Security Mobile Devices and On-line Threats Cyber Security Mobile Devices and On-line Threats Presented by: Umer Saeed
  • 2.
  • 3. What is Cyber security • The term Cyber dates back to the 40’s and 50’s and originates from the word Cybernetics, which dealt with rise of Control systems and human interaction with it. • In simple terms, today the word Cyber indicates Internet or having to do with computers e.g. Cyber fraud, Cyber security. • Since its widespread acceptance, Internet has become home of virtually every activity and huge amount of valuable data. • Some of that data is extremely valuable and pertinent to corporate and national security which naturally attracts bad actors resulting in Cyber Crime and espionage • Cyber Security deals with the defensive operations carried out to defend valuable data on computers and especially on Smart phones against threats like virus, malware, ransomware, hacking, phishing and various other malicious attacks.
  • 4. Why is Cyber Security more important than ever • Exponential growth in use of technology and mobile devices to process data  Massive use by corporations and people  Governments, businesses and people, rely very heavily on various forms of information  Information, big-data, market statistics are now the key business success factors  Impacts rich and poor, young and adults, men and women  Exposes digital devices users to risks, regardless of gender, age, status  Because these devices play an Irreplaceable role in our daily lives  Abundance of technology and big-data has attractions for cyber criminals
  • 5. Why is Cyber Security more important than ever • Growing possibility of threats to our privacy and security  HOW - Prejudice about security products/practices due to  Lack of awareness or availability of cheap security solutions  Unavailability of trained security professionals  WHERE - Lack of understanding of magnitude of risks posed to our integrity  Governments, enterprises, businesses and common people fail to realize the impact of security incidents  WHY - Little awareness by relevant authorities, media and education institutes  The laws on Cyber crime, data leakage, defamation are in their early stages and provide little deterrence  WHEN – High probability of risks due to  always on, always present mobile/storage devices (e.g. USB sticks, Memory Cards. Smart phones)
  • 6. Why is Cyber Security more important than ever • Lack of training and education at grass root level  Lack of awareness of Cyber crime laws, basics of frauds and prevention  Uncontrolled access to harmful mobile apps and websites before proper training  Easy access given to toddlers, teenagers without proper training  Ignoring recommended privacy settings for social media (Facebook, Whatsapp) • Non-negotiable for business sustenance and growth  Every business needs to operate On-line safely to stay relevant and in touch with market and its growing consumer base  A requirement for reaching emerging and developed markets  Rapidly rising on-line market as compared to traditional businesses  In most cases, the damages of Cyber crime are irrecoverable
  • 7. Why worry about Mobile devices? • Mobile devices have largest market share for Internet access  More smart phones sold than Personal Computers and Laptops combined  Easier to carry and operate in contrast to laptops  Offers similar and in some cases, better computing and storage • Hides in plain sight  Exposed to more threats than a larger device e.g. Laptop  Easy to steal, snatch, abuse data and in some cases leaking corporate resources  Use in public places, large gathering exposing to Fake Wifi and MITM attacks • Used for same tasks as we perform on Laptops/PCs  Storing and processing Corporate information on the go  Storing confidential files, sensitive and exploitable information  Little or no security for Photos, Online copies of Financial and bank records etc  Hardly any mobile has anti-virus or firewall
  • 8. How Businesses can protect against Mobile Device threats • Know what needs protection ● Know what information assets are important for your business to operate effectively  Ensure strictly devised data classification policy exists and is adhered to for all data  Provide training to users to process data diligently according to classification ● more you invest to train your business/family people​, less are the chances of security incidents  Evaluate the cost of data leakage and protect information assets accordingly ● Cost of data leakage is the cost need to gather same data and same reputation. Two very different things and yet crucial for business survival.  If you don't get involved, don't expect anyone else to be. Security is a Senior management responsibility.
  • 9. How Businesses can protect against Mobile Device threats Protection of Information Assets  Never use pirated PC/Software to process data that is valuable to you, your family or business  Use strong encryption to protect data during operations (i.e. storage, processing, transmission)  Use Firewall, Intrusion Prevention, VLAN, DMZ, honeypots to protect sensitive data  Maintain regular off-line backup of valuable data. Test backups for possible recovery scenario  Avoid using USB sticks to store UN-encrypted data, at all costs  Avoid using Open WiFi and hot-spots in Coffee shops, airport and bus terminals. Use Mobile data.  Use strong passwords. Use pass phrases if possible.  Do NOT share sensitive information over social media  If costs are concern, use Open Source software. There’s an open source software for every need.  Hire only trained professionals to be custodians of information assets.
  • 10. Three basic rules of protection Protect Business data • Train staff and show your involvement • Classify Data and employ controls matching data sensitivity • Genuine skills, software and technology Protect Personal data • Education about abuse of personal data and misuse of Social Media • Use built-in cloud/App-lock features to prevent device misuse • Encrypt valuable data, if you have to keep on mobile.
  • 11. About Presenter • 20+ years in Systems and Networks Management, Security • Held roles with prestigious organizations like British Council, Arabian Co, ISACA • Avid supporter of grass-root level, easily available security education, awareness and training for youth • Believes in adapting Linux in home as well as corporate environments to end piracy and security issues • Trainer for CISA, CISM fb.me/FutureNOW