4 . future uni presentation

Post on 22-Feb-2017

54 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Security is everyone’s responsibility

By Omer Mohamed Abalraheem yassin

Electronic Banking Services Co.

Introduction

01

Omer M. Yassin

LCCSA (Lucideus Certified Cyber Security Analyst)Lucideus , India

About Me:

02

B.Sc. Electrical and electronic engineering Majored in software and electronics systems

UofKTeaching assented for information security courseUofK

Information security specialistEBS

Fb/oyessin

Omar.m.yassin@outlook.com

Contacts

We are currently not planning on conquering the world.– Sergey Brin

Mission03

What are we going to talk about ?.

• Secure Software development life cycle (S-SDLC).• Social media security.• Information security ethics.

Put a relevant subtitle in this line about your businessSecure Software Development life cycle

A Software Development Life Cycle (SDLC) is a framework that defines the process used by organizations to build an application from its inception to its decommission

What is SDLC ?

SDLC phases : • Planning and requirements • Architecture and design • Test planning • Coding • Testing and results • Release and maintenance

requirements

Design

CodingTesting

Deployment

There SDLC, Why do I need SSDLC ??

This Fire Fighting approach wont work any longer !

• More secure software as security is a continuous concern• Awareness of security considerations by stakeholders• Early detection of flaws in the system• Cost reduction as a result of early detection and resolution of issues• Overall reduction of intrinsic business risks for the organization

Advantages of pursuing an SSDLC approach

06

How does it work?07

Include security in EVERY THING !!!

How Dose it look like ?

Better isn’t it ?!!

08

Will this ever work ?

YES IT WOULD !!

Many SSDLC models have been proposed. Here are a few of them:

•MS Security Development Lifecycle (MS SDL)•NIST 800-64•OWASP CLASP (Comprehensive, Lightweight Application Security Process)•Cigital’s Security Touchpoints

09

How Do I Get Started?

Education Code Tools Advise

Nothing Starts perfect … work your way to it

10

Do I really need to worry about that ?

I have Nothing its only my PC Why Would a hacker hack me really ?

Yes, You Actually Are A Target !

You Can easily be one of those

Check :: https://norse-corp.com

Why are you a target ?

Automation No one is excluded

Easy PeasyTools free and available

Why not try it .

13

Key recommendationsUses these and develop your own.

Your self Use common sense it’s the best defense

UpdatingMake sure that your computer or mobile device is always up to date

PasswordsUse Strong password and unique for each account

Credit cards Check your financial statement more often

NetworkUse passwords to protect your home/work network

5 Important Keys

1 2 3 4 5

14

How about watching this cool videoNot cute cats something even more fun

It’s time for a break

Social MediaWe all use it , why not making it more secure !

Privacy.• impacting Your Future• Attacks Against You• Accidently Harming Your Employer/university

Security Simple

Protect each of your accounts with a strong, unique password and do not share them with anyoneelse.

Login

If you do use privacy settings, make sure you review and test them regularly.

Privacy Settings

Be suspicious of emails that claim to come from social media sites.

Malicious Links/Scams: Be cautious of suspicious links or potential scams posted on social media sites.

Email

Social media sites use encryption called HTTPS to secure your online

connections to the site.

Encryption

Most social media sites provide mobile apps to access your online accounts. Make sure you

download these mobile apps from a trusted site and that your smartphone is protected with a

strong password

Secure

Mobile Apps

Information security ethics.

Ethics is doing the right thing, even when no one is looking

22

We are not all bad , some of us are good people too.

There is a fine line between the ‘hats’ and the distinction often becomes blurred. Often a matter of perspective.

Code of ethics

• Contribute to society and human well-being• Avoid harm to others• Be honest and trustworthy• Be fair and take action not to discriminate• Honor property rights including copyrights and patents• Give proper credit for intellectual property• Respect the privacy of others• Honor confidentiality• Know and respect existing laws pertaining to professional work.• Improve public understanding of computing and its consequences.• Access computing and communication resources only when authorized

to do so

Final tips?

Knowledge is power use it wisely

25

Security is common sense Really !!

Stay informant

EBS – Electronic banking services

Get in Touch

Location Central Bank Of Sudan Khartoum

+249 183 740 840

+249 183 790 864

info@ebs-sd.com

56

You are your own Information security adviser

Thanks for having usEnjoy your day !

top related