+ All Categories
Home > Documents > Recommendations on the future of online GyroScope & Databse implementation.

Recommendations on the future of online GyroScope & Databse implementation.

Date post: 16-Dec-2015
Category:
Upload: giles-wilkerson
View: 216 times
Download: 0 times
Share this document with a friend
Popular Tags:
20
Recommendations on the future of online GyroScope & Databse implementation
Transcript
Page 1: Recommendations on the future of online GyroScope & Databse implementation.

Recommendations on the future of

onlineGyroScope &

Databseimplementation

Page 2: Recommendations on the future of online GyroScope & Databse implementation.

There have been proponents these past several years who suggest putting everything Gyro on a Social Network application –

that soon, we could eliminate the GyroScope, go online with the Database & communicate with

unbridled ease!

Page 3: Recommendations on the future of online GyroScope & Databse implementation.

Putting the Gyro Database on aSocial Network… consider …

Page 4: Recommendations on the future of online GyroScope & Databse implementation.

Should Gyro, as has been suggested, take a modern approach and place the Database on a Social Network

such as Facebook & LinkedInto ease communicating amongst

members and attract new members?

Facebook … LinkedIn ?

Page 5: Recommendations on the future of online GyroScope & Databse implementation.

2008 a D-IX Governor found a linkto Gyro on Facebook.

It was discussed whether exploitingthis link would be beneficial to Gyro.

The BOG (then) determined theunknown risks were too great!

Facebook … LinkedIn ?

Page 6: Recommendations on the future of online GyroScope & Databse implementation.

Social Networks – RealityCyberthieves have now shifted their

focus to social networks.Instead of attacking firewalls head on, they are breaching sites using

social engineering, convincing someone that an email is from a

friend or colleague.

Page 7: Recommendations on the future of online GyroScope & Databse implementation.

A Primer on Phishing 101They rely on Phishing --

an attempt to acquire sensitive information such as usernames,

passwords and credit card details by masquerading as a

trustworthy entity in an electronic communication.

Page 8: Recommendations on the future of online GyroScope & Databse implementation.

A phisher emails a potential victimclaiming to be from a familiar source.

Page 9: Recommendations on the future of online GyroScope & Databse implementation.

The message contains a question or threat and urges the victim to go to the company site.

Page 10: Recommendations on the future of online GyroScope & Databse implementation.

The victim clicks a link and is taken to a site that looks real – like a bank’s – but it’s a fake.

Page 11: Recommendations on the future of online GyroScope & Databse implementation.

The victim enters sensitive data such as account numbers and passwords into the site.

Page 12: Recommendations on the future of online GyroScope & Databse implementation.

The phisher uses the data to access a corporate or bank network for identity theft or to steal money.

Page 13: Recommendations on the future of online GyroScope & Databse implementation.

Facebook has a bug called Koobface

that takes over your account.It is currently accessing

or infecting1,000,000 accounts every day!

What’s happening today?

Page 14: Recommendations on the future of online GyroScope & Databse implementation.

Two groups of bad guys …1. The “Black-hackers” who after

money or information they can sell.2. The “Hacktivists” who are not

thieves, but malicious idealists who cause havoc, just because they can.

At this point no one is truly safe.

The Perpetrators

Page 15: Recommendations on the future of online GyroScope & Databse implementation.

Having our own private Database gives us far less exposure.

Being a slightly larger entity on a Social Network is a porthole to

problems … invites the challenge to “break in.”

Page 16: Recommendations on the future of online GyroScope & Databse implementation.

Black Hackers are adapting social networks to establish an evil

ecosystem while exploiting its vulnerabilities to steal data & money …their toolkit includes

social engineering techniques to have you cough up passwords

under the guise of friendship..

Page 17: Recommendations on the future of online GyroScope & Databse implementation.

Protecting yourself …Hacking your password gets much

harder if you follow these tips: The longer the password the

better. Mix upper & lower case letters. Use numbers and special symbols. i.e. PASSword8!

Page 18: Recommendations on the future of online GyroScope & Databse implementation.

Social Networks …Are a boon to promote good

things: like family photo-albums& family communications.

They are a means to promote business networking.

Communication among friends.

Page 19: Recommendations on the future of online GyroScope & Databse implementation.

Social Networks …Unfortunately, they also lend

themselves to a middle-school mentality of …

bullying, exhibitionism, degradation,threats, and even murder.

Not the least, stealing for money, or hacking just for the fun of it!!

Page 20: Recommendations on the future of online GyroScope & Databse implementation.

What to do?I would urge you to discount

any such approach to the future.Be aware that the web not only

doubles in speed every 18 months, it is an ever changing monolith, that

will not be the same two years hence,& security is losing ground faster!


Recommended