data security solutions 2011 @society.person.security
DESCRIPTION
On 15th of April "Data Security Solutions" participated in international conference held by "BalticSecurity.org" and made a presentation to raise awareness of importance of risks of cyber crime and data protection.TRANSCRIPT
![Page 1: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/1.jpg)
Cybercrime –the biggest
threat of the 21st Century
Andris SorokaManaging director
Data Security Solutions
15.04.2011
![Page 2: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/2.jpg)
Where to start from?
Internet has been compared to America’s Wild Wild West countless times – now the analogy holds more weight than ever. No DNA forensics, no overarching laws – just lawlessness.
![Page 3: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/3.jpg)
The 21st Century – the age of cybercrime
FBI warns Congress that cybercriminals can hack any internet-linked systemGordon M. Snow, assistant director of the FBI’s Cyber Division (13th of April, 2011)
“Year 2010 was the year of cybercrime and cyberwars. Year of Wikileaks”“The New York Times”, “Guardian”, “Der Spiegel”, “El Pais”, “Le Monde” and more. 2010, 2011..
![Page 4: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/4.jpg)
Background - technology development
IT continues taking the lead in business (ERP, CRM, document management, digital prototyping etc.)
Importance and development of e-World (e-Health, e-government, e-services, social networking, Web 2.0, unified communications and tools for that etc.)
Mobility and borderless enterprise
Cyber culture develops faster than cyber security
![Page 5: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/5.jpg)
Every technology is vulnerable
![Page 6: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/6.jpg)
New threats – targeted, professional, silent
There are Internet shops full of credit card, bank account, privacy, business and other confidential data. Also there are available services to rent a botnet, malicious code and attack anyone.
Cybercriminal «CV Online»
Video trainings and eLearning available in social media, such as YouTube
«Black market community» (forums, blogs, interest groups, conferences etc.)
![Page 7: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/7.jpg)
You don’t believe me?
![Page 8: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/8.jpg)
The aim and drivers of the hacker
![Page 9: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/9.jpg)
Why hackers might want to “contact” You?
BusinessCommercial espionage (financial, business and personal data)An attack can stop the business, services (competition)You are spam targetYour home page could be damagedThey can control and monitor youThey can change data in systemsHome page cross-scripting
Private personYou have the infrastructure for tests of new viruses and robotsYou have server where to store illegal stuff (programs, files etc.)They can do criminal activities using your computerWiFi – they can just borrow the internetYou have the information which could be sold in black market
The results of damageFinancial (costs, data, market, value)Reputation (customer, partner, HR)Development and competitiveness
![Page 10: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/10.jpg)
Business & personal risk analysis matrix
![Page 11: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/11.jpg)
Be prepared – stop the “bullets”
![Page 12: Data security solutions 2011 @Society.Person.Security](https://reader035.vdocuments.mx/reader035/viewer/2022062513/55635e8ed8b42ae6088b464e/html5/thumbnails/12.jpg)
“Data Security Solutions” can help
Specialization – IT Security
IT Security consulting (vulnerability assessment tests, security audit, new systems integration, HR training, technical support)
Innovative & selected software / hardware & hybrid solutions from leading technology vendors from over 10 different countries