Post-Quantum Protecting the worlds information Cyber Security - - PowerPoint PPT Presentation

post quantum
SMART_READER_LITE
LIVE PREVIEW

Post-Quantum Protecting the worlds information Cyber Security - - PowerPoint PPT Presentation

Post-Quantum Protecting the worlds information Cyber Security Issues to be considered when Implementing Fintech Solutions Contents Four Major Threats When Communicating Online


slide-1
SLIDE 1

Post-Quantum

Protecting the world’s information Cyber Security Issues to be considered when Implementing Fintech Solutions 實施金融科技方案時 需考慮的網絡安全問題

slide-2
SLIDE 2

Contents

  • Four Major Threats When Communicating Online
  • Key Considerations for Systems Implementation
  • Most Fundamental Control in Cyber Security
  • Fintech Implementation Triangle
  • Why Hong Kong?

2 www.post-quantum.com

slide-3
SLIDE 3

Four Major Threats When Communicating Online

3 www.post-quantum.com

slide-4
SLIDE 4

Man-In-The-Middle Attacks

4 www.post-quantum.com

slide-5
SLIDE 5

5 www.post-quantum.com

Four Major Threats When Communicating Online

slide-6
SLIDE 6

Insider Threats

6 www.post-quantum.com

slide-7
SLIDE 7

Insider Threats

7 www.post-quantum.com

slide-8
SLIDE 8

Four Major Threats When Communicating Online

8 www.post-quantum.com

slide-9
SLIDE 9

Transaction Authentication & Non-Repudiation

9 www.post-quantum.com

slide-10
SLIDE 10

Transaction Authentication & Non-Repudiation

10 www.post-quantum.com

slide-11
SLIDE 11

Transaction Authentication & Non-Repudiation

11 www.post-quantum.com

slide-12
SLIDE 12

Four Major Threats When Communicating Online

12 www.post-quantum.com

slide-13
SLIDE 13

Encryption Cracking

13 www.post-quantum.com

slide-14
SLIDE 14

Encryption Cracking

14 www.post-quantum.com

slide-15
SLIDE 15

Four Major Threats When Communicating Online

15 www.post-quantum.com

slide-16
SLIDE 16

So Should We Give Up Then?

16 www.post-quantum.com

Far from it!

slide-17
SLIDE 17

Key Considerations for Systems Implementation

  • Completeness
  • Accuracy
  • Validity
  • Timeliness

17 www.post-quantum.com

slide-18
SLIDE 18

Most Fundamental Control in Cyber Security

Segregation of duties

18 www.post-quantum.com

slide-19
SLIDE 19

Segregation of Duties

19 www.post-quantum.com www.post-quantum.com 19

  • A. Encrypted data has a master key

which can be lost, stolen or abused

  • B. The key is split and the fragments are

shared between stakeholders

  • C. A quorum of stakeholders

is needed to unlock the data

  • D. After use the key is immediately

broken into fragments again for security

slide-20
SLIDE 20

Segregation of Duties

20 www.post-quantum.com

Approver 1 Approver 2 Approver 3 Requestor

  • 1. Need to

access encrypted document

  • 2. Request

sent

  • 3. Quorum

request sent to Approvers Approver 1 Approver 2 Approver 3 Requestor

  • 1. Individual

approvals given by Approvers

  • 2. Quorum

approval given

  • 3. Document access

given

slide-21
SLIDE 21

Fintech Implementation Triangle

21 www.post-quantum.com

slide-22
SLIDE 22

Why Hong Kong?

22 www.post-quantum.com

slide-23
SLIDE 23

Why Hong Kong?

23 www.post-quantum.com

slide-24
SLIDE 24

Why Hong Kong?

24 www.post-quantum.com

  • Leading financial services, logistics and technology centre
  • Supportive government policies
  • World class physical and technology infrastructure
  • Flexible demographics
  • Highly adaptable workforce
  • Willingness to learn best practices
  • Welcoming in importing fintech and blockchain expertise
  • Close proximity to all major cities in Asia
slide-25
SLIDE 25

Is it Too Late for Hong Kong?

25 www.post-quantum.com

  • Late but not too late
  • Minimum wasted costs so far
  • Learn from other people’s mistakes
  • Absorb world class expertise and knowledge transfer
  • Introduce best technologies and practices
  • Choose most ready technologies to implement NOW
  • Leapfrog directly into execution
slide-26
SLIDE 26

26 www.post-quantum.com

Thank you!

Contact:

Andersen Cheng, CEO 鄭毓輝 行政總裁 ac@post-quantum.com