4 . future uni presentation
TRANSCRIPT
![Page 1: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/1.jpg)
Security is everyone’s responsibility
By Omer Mohamed Abalraheem yassin
Electronic Banking Services Co.
![Page 2: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/2.jpg)
Introduction
01
![Page 3: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/3.jpg)
Omer M. Yassin
LCCSA (Lucideus Certified Cyber Security Analyst)Lucideus , India
About Me:
02
B.Sc. Electrical and electronic engineering Majored in software and electronics systems
UofKTeaching assented for information security courseUofK
Information security specialistEBS
Fb/oyessin
Contacts
![Page 4: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/4.jpg)
We are currently not planning on conquering the world.– Sergey Brin
Mission03
What are we going to talk about ?.
• Secure Software development life cycle (S-SDLC).• Social media security.• Information security ethics.
![Page 5: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/5.jpg)
Put a relevant subtitle in this line about your businessSecure Software Development life cycle
A Software Development Life Cycle (SDLC) is a framework that defines the process used by organizations to build an application from its inception to its decommission
What is SDLC ?
SDLC phases : • Planning and requirements • Architecture and design • Test planning • Coding • Testing and results • Release and maintenance
requirements
Design
CodingTesting
Deployment
![Page 6: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/6.jpg)
There SDLC, Why do I need SSDLC ??
This Fire Fighting approach wont work any longer !
• More secure software as security is a continuous concern• Awareness of security considerations by stakeholders• Early detection of flaws in the system• Cost reduction as a result of early detection and resolution of issues• Overall reduction of intrinsic business risks for the organization
Advantages of pursuing an SSDLC approach
06
![Page 7: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/7.jpg)
How does it work?07
Include security in EVERY THING !!!
![Page 8: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/8.jpg)
How Dose it look like ?
Better isn’t it ?!!
08
![Page 9: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/9.jpg)
Will this ever work ?
YES IT WOULD !!
Many SSDLC models have been proposed. Here are a few of them:
•MS Security Development Lifecycle (MS SDL)•NIST 800-64•OWASP CLASP (Comprehensive, Lightweight Application Security Process)•Cigital’s Security Touchpoints
09
![Page 10: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/10.jpg)
How Do I Get Started?
Education Code Tools Advise
Nothing Starts perfect … work your way to it
10
![Page 11: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/11.jpg)
Do I really need to worry about that ?
I have Nothing its only my PC Why Would a hacker hack me really ?
Yes, You Actually Are A Target !
![Page 12: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/12.jpg)
You Can easily be one of those
Check :: https://norse-corp.com
![Page 13: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/13.jpg)
Why are you a target ?
Automation No one is excluded
Easy PeasyTools free and available
Why not try it .
13
![Page 14: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/14.jpg)
Key recommendationsUses these and develop your own.
Your self Use common sense it’s the best defense
UpdatingMake sure that your computer or mobile device is always up to date
PasswordsUse Strong password and unique for each account
Credit cards Check your financial statement more often
NetworkUse passwords to protect your home/work network
5 Important Keys
1 2 3 4 5
14
![Page 15: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/15.jpg)
How about watching this cool videoNot cute cats something even more fun
It’s time for a break
![Page 16: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/16.jpg)
![Page 17: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/17.jpg)
Social MediaWe all use it , why not making it more secure !
![Page 18: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/18.jpg)
Privacy.• impacting Your Future• Attacks Against You• Accidently Harming Your Employer/university
![Page 19: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/19.jpg)
Security Simple
Protect each of your accounts with a strong, unique password and do not share them with anyoneelse.
Login
If you do use privacy settings, make sure you review and test them regularly.
Privacy Settings
![Page 20: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/20.jpg)
Be suspicious of emails that claim to come from social media sites.
Malicious Links/Scams: Be cautious of suspicious links or potential scams posted on social media sites.
Social media sites use encryption called HTTPS to secure your online
connections to the site.
Encryption
![Page 21: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/21.jpg)
Most social media sites provide mobile apps to access your online accounts. Make sure you
download these mobile apps from a trusted site and that your smartphone is protected with a
strong password
Secure
Mobile Apps
![Page 22: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/22.jpg)
Information security ethics.
Ethics is doing the right thing, even when no one is looking
22
![Page 23: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/23.jpg)
We are not all bad , some of us are good people too.
There is a fine line between the ‘hats’ and the distinction often becomes blurred. Often a matter of perspective.
![Page 24: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/24.jpg)
Code of ethics
• Contribute to society and human well-being• Avoid harm to others• Be honest and trustworthy• Be fair and take action not to discriminate• Honor property rights including copyrights and patents• Give proper credit for intellectual property• Respect the privacy of others• Honor confidentiality• Know and respect existing laws pertaining to professional work.• Improve public understanding of computing and its consequences.• Access computing and communication resources only when authorized
to do so
![Page 25: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/25.jpg)
Final tips?
Knowledge is power use it wisely
25
Security is common sense Really !!
Stay informant
![Page 26: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/26.jpg)
EBS – Electronic banking services
Get in Touch
Location Central Bank Of Sudan Khartoum
+249 183 740 840
+249 183 790 864
56
![Page 27: 4 . future uni presentation](https://reader036.vdocuments.co/reader036/viewer/2022081512/58acdb1e1a28ab36288b64ed/html5/thumbnails/27.jpg)
You are your own Information security adviser
Thanks for having usEnjoy your day !