Security in Mind (Smart Social ) Kitisak Jirawannakool E-Government - - PowerPoint PPT Presentation

security in mind smart social
SMART_READER_LITE
LIVE PREVIEW

Security in Mind (Smart Social ) Kitisak Jirawannakool E-Government - - PowerPoint PPT Presentation

Security in Mind (Smart Social ) Kitisak Jirawannakool E-Government Agency (Public Organization) kitisak.jirawannakool@ega.or.th 1 2 Violation of Privacy Private information Birthday, Tel no., e-mail, and activities etc. Photo of


slide-1
SLIDE 1

Security in Mind (Smart Social)

Kitisak Jirawannakool

E-Government Agency (Public Organization) kitisak.jirawannakool@ega.or.th

1

slide-2
SLIDE 2

2

slide-3
SLIDE 3

Violation of Privacy

❖ Private information

❖ Birthday, Tel no., e-mail, and activities etc.

❖ Photo of specific person ❖ job title, resume, favorites ❖ Location

❖ Geotagging, Places, 4square, etc.

❖ Video - Socialcam ❖ Relationship

❖ Touchgraph

3

slide-4
SLIDE 4

Cyber Stalking

4

slide-5
SLIDE 5

Mobile device + Camera + GPS + Social media = ? ❖ EXIF (EXchange Information Format) ❖ Location service is “ON” ❖ Lead to the Cyber Stalking

5

slide-6
SLIDE 6

One Stop service - Google

6

slide-7
SLIDE 7

Google map tracking

7

slide-8
SLIDE 8

How to survive in the cloud world?

❖ Strong passwords ❖ Classify information to be stored on cloud ❖ Do not connect to untrusted wifi ❖ 2 Factors (steps) authentication ❖ Update patches and Anti-malware software

8

slide-9
SLIDE 9

Strong Password

❖ Long and Complex

❖ 8++ characters ❖ Lower and Upper case, Number and Special

characters

❖ Do not use specific name or word in dictionary ❖ Change frequently (every 3 months) ❖ Do not put your password on your screen

9

slide-10
SLIDE 10

Which information can be stored on Cloud?

❖ General

❖ Public information

❖ Confidential

❖ Do not store on cloud ❖ Encrypt before storing

10

slide-11
SLIDE 11

WLAN Security Threats

❖ User hijacking & Man-in-the-middle attack

11

Inverse Wardriving Sniff & Modify Fake server and AP Https hack SSL Strip Faked Certification Password stealing “Phishing”

User Hacker Rogue AP Jam & Roam

slide-12
SLIDE 12

Man In The Middle attack

12

slide-13
SLIDE 13

How to use WiFi securely?

❖ Use only trusted WiFi network (access point) ❖ Look carefully at the access point name ❖ Remove the unused access point name from list ❖ Select to connect to only the encrypted connection (WPA2, WPA and WEP) ❖ Install “HTTPS Everywhere” extension for Chrome and Firefox ❖ Do not share files and folders ❖ Turn on personal firewall

13

Details in Thai : http://foh9.blogspot.com/2012/09/blog-post.html

slide-14
SLIDE 14

2-Factor/Step Authentication

14

slide-15
SLIDE 15

15

slide-16
SLIDE 16

Network-connected system

16

slide-17
SLIDE 17

Wearable devices

17

slide-18
SLIDE 18

New generation

❖ PC liked ❖ Connect to the internet ❖ Many apps provided ❖ Not many people concern about security

18

slide-19
SLIDE 19

What will we do, if ...

❖ Malware is infected on TV or Refrigerator ❖ TVs are hacked ❖ Spam are sent to show on our TV ❖ Game consoles break down because of malware

  • r hacker

❖ We need to investigate TV or other non-PC devices for finding criminals

19

slide-20
SLIDE 20

Contact me

Name : Kitisak Jirawannakool Facebook : http://www.facebook.com/kitisak.note Email : kitisak.jirawannakool@ega.or.th jkitisak@gmail.com Weblog : http://foh9.blogspot.com Twitter : @kitisak

20

slide-21
SLIDE 21

Thank You

21