4 . future uni presentation
-
Upload
rashid-khatmey -
Category
Technology
-
view
47 -
download
0
Transcript of 4 . future uni presentation
Security is everyone’s responsibility
By Omer Mohamed Abalraheem yassin
Electronic Banking Services Co.
Introduction
01
Omer M. Yassin
LCCSA (Lucideus Certified Cyber Security Analyst)Lucideus , India
About Me:
02
B.Sc. Electrical and electronic engineering Majored in software and electronics systems
UofKTeaching assented for information security courseUofK
Information security specialistEBS
Fb/oyessin
Contacts
We are currently not planning on conquering the world.– Sergey Brin
Mission03
What are we going to talk about ?.
• Secure Software development life cycle (S-SDLC).• Social media security.• Information security ethics.
Put a relevant subtitle in this line about your businessSecure Software Development life cycle
A Software Development Life Cycle (SDLC) is a framework that defines the process used by organizations to build an application from its inception to its decommission
What is SDLC ?
SDLC phases : • Planning and requirements • Architecture and design • Test planning • Coding • Testing and results • Release and maintenance
requirements
Design
CodingTesting
Deployment
There SDLC, Why do I need SSDLC ??
This Fire Fighting approach wont work any longer !
• More secure software as security is a continuous concern• Awareness of security considerations by stakeholders• Early detection of flaws in the system• Cost reduction as a result of early detection and resolution of issues• Overall reduction of intrinsic business risks for the organization
Advantages of pursuing an SSDLC approach
06
How does it work?07
Include security in EVERY THING !!!
How Dose it look like ?
Better isn’t it ?!!
08
Will this ever work ?
YES IT WOULD !!
Many SSDLC models have been proposed. Here are a few of them:
•MS Security Development Lifecycle (MS SDL)•NIST 800-64•OWASP CLASP (Comprehensive, Lightweight Application Security Process)•Cigital’s Security Touchpoints
09
How Do I Get Started?
Education Code Tools Advise
Nothing Starts perfect … work your way to it
10
Do I really need to worry about that ?
I have Nothing its only my PC Why Would a hacker hack me really ?
Yes, You Actually Are A Target !
You Can easily be one of those
Check :: https://norse-corp.com
Why are you a target ?
Automation No one is excluded
Easy PeasyTools free and available
Why not try it .
13
Key recommendationsUses these and develop your own.
Your self Use common sense it’s the best defense
UpdatingMake sure that your computer or mobile device is always up to date
PasswordsUse Strong password and unique for each account
Credit cards Check your financial statement more often
NetworkUse passwords to protect your home/work network
5 Important Keys
1 2 3 4 5
14
How about watching this cool videoNot cute cats something even more fun
It’s time for a break
Social MediaWe all use it , why not making it more secure !
Privacy.• impacting Your Future• Attacks Against You• Accidently Harming Your Employer/university
Security Simple
Protect each of your accounts with a strong, unique password and do not share them with anyoneelse.
Login
If you do use privacy settings, make sure you review and test them regularly.
Privacy Settings
Be suspicious of emails that claim to come from social media sites.
Malicious Links/Scams: Be cautious of suspicious links or potential scams posted on social media sites.
Social media sites use encryption called HTTPS to secure your online
connections to the site.
Encryption
Most social media sites provide mobile apps to access your online accounts. Make sure you
download these mobile apps from a trusted site and that your smartphone is protected with a
strong password
Secure
Mobile Apps
Information security ethics.
Ethics is doing the right thing, even when no one is looking
22
We are not all bad , some of us are good people too.
There is a fine line between the ‘hats’ and the distinction often becomes blurred. Often a matter of perspective.
Code of ethics
• Contribute to society and human well-being• Avoid harm to others• Be honest and trustworthy• Be fair and take action not to discriminate• Honor property rights including copyrights and patents• Give proper credit for intellectual property• Respect the privacy of others• Honor confidentiality• Know and respect existing laws pertaining to professional work.• Improve public understanding of computing and its consequences.• Access computing and communication resources only when authorized
to do so
Final tips?
Knowledge is power use it wisely
25
Security is common sense Really !!
Stay informant
EBS – Electronic banking services
Get in Touch
Location Central Bank Of Sudan Khartoum
+249 183 740 840
+249 183 790 864
56
You are your own Information security adviser
Thanks for having usEnjoy your day !