Top Banner
© LogicaCMG 2006. All rights reserved Enabling Personal Internet Security Dave Martin Managing Security Consultant
6

Enabling Personal Internet Security

Jan 11, 2016

Download

Documents

TAO

Enabling Personal Internet Security. Dave Martin Managing Security Consultant. Agenda. 30 Second Introduction Current and Emerging Cyberspace Threats Addressing the Threats – Three Pronged Approach. 30 Second Introduction. LogicaCMG Worldwide business support company - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Enabling Personal Internet Security

© LogicaCMG 2006. All rights reserved

Enabling Personal Internet Security

Dave Martin

Managing Security Consultant

Page 2: Enabling Personal Internet Security

2Privacy in Cyberspace

Agenda

30 SecondIntroduction

Current and Emerging Cyberspace Threats

Addressing the Threats – Three Pronged Approach

Page 3: Enabling Personal Internet Security

3Privacy in Cyberspace

30 Second Introduction

• LogicaCMG

– Worldwide business support company

– 40,000 employees worldwide

– 250+ full time security consultants

– Full boardroom to bytes security service

Page 4: Enabling Personal Internet Security

4Privacy in Cyberspace

Current and Emerging Cyberspace Threats

• Consumers are exposed to fraud potential

• Viruses, Worms, Trojans, Letter Bombs and more…

• Unacceptable behaviour on-line

• Phishing already a significant problems for consumers

• Penetration of wireless networks

• E-mail interception

• Spear-phishing

Page 5: Enabling Personal Internet Security

5Privacy in Cyberspace

Education

Government websitesISP campaignsVendor adviceIndustry advice

Tools

Anti-virus & Anti-SpamFirewalls

Patch levelsSecured wireless routers

Global co-operation

Cross border co-operation

Education

Targeted advice to publicTailored advice to public

Tools

Secure e-mailIE7

Behavioural Analytics

Global co-operation

MoU between countries

Addressing the Threats – Three Pronged Approach

Page 6: Enabling Personal Internet Security

6Privacy in Cyberspace

Summary

• Government to sponsor public awareness

• ISPs to provide customers with toolkit

• Businesses to safeguard their customers’ information

• Consumers to use the tools available

Coherent - Cost-effective - Simple