SlideShare a Scribd company logo
การสร้างเกราะป้องกันภัยคุกคาม
  ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร

Assoc.Prof. Dr. Thanachart Numnonda
Director
Software Park Thailand
14 March 2012
                                       1
2
3
6 Million SmartPhones in
         Thailand




                           (4)
More than 400,000 Tablets sold in Thailand




                                         5
Source: wikipedia
                    6
7
iCloud




         8
www.facebook.com/softwareparkthailand




                                        9
Dropbox




          10
Open Environment




                   11
The New Reality for Users
          Apps & Data                                          Diverse Access
          Everywhere                                               Points



                                          Universal App
                          Windows          Catalog and                           Browser
                                            Workflow
                        Legacy Apps



                                                                         Windows

                         SaaS
                         Services
                                                                           Mac
                                      Broker
                         Mobile                                            iOS
                         Apps



                                                                           Android
                                      Entitlements, Policies
                                          and Reporting
                          Data
                          Services




Source : From Datacenter to Device: Security in the Enterprise 2012 and Beyond : VMWare
                                                                                           12
Work Life Balance
Blurred Boundaries
Anywhere Anytime
Productivity
Strengths, Interested, Choices




                                 13
Security
Data Loss
Virus
Identity Loss
Internet Security
Social Media Security
Mobile Security


                           14
Data Loss Prevention
      Where is my confidential data stored?
      Where is my confidential data being sent?
      How is my confidential data being used?
      How do I enforce my data loss policies




                                                  15
Source : Vontu: Security for a wide open world.
Have You Deployed?




                                                  16
Source : Vontu: Security for a wide open world.
Content Awareness Protection




                                                  17
Source : Vontu: Security for a wide open world.
Mobile Devices
Notebook
Smartphones
Tablets
Portable Harddisk
ThumbDrive



                           18
Risks
     Mobile devices are easy to lose or steal
     Can carry large amount of data
     Often unprotected
     Data may be “sniffed” during unprotected
     wireless communications
     Results
           –    Broken device
           –    Infections from viruses, spyware, malware
           –    Privacy and personal security concerns
Source : CYBER SECURITY ON THE GO: TCU Information          19
Security Services
Best Practices
Never store sensitive or confidential information
on a mobile device.
Rule of thumb – do not trust wireless to be
secure!
Avoid joining unknown Wi-fi networks
Most apps offer privacy controls
   –   But privacy controls are not always easy to
       access
Avoid portable harddisk, usb, thumbdrive
                                                     20
Data Loss Protection
Develop a plan and work with it
Develop a policy
Reduce the initial scope
Understand why you need it, business, HR and
Legal aligned
Avoid band-aid solutions - integration is key



                                                21
Social Media Security Treats
      Mobile Apps
      Social Engineering
      Social Networking Sites
      Your Employees
      Lack of a Social Media Policy




Source : 5 Top Social Media Security Threats: Network World   22
Internet Security Treats
      Advise Your Employees on Safe Internet
      Conduct
      Be Wary of Social Engineering
      Maintain Security Options
      Password Security
      Back-up Data



Source : 5 simple internet security tips: Evan Godfrey   23
Smart Phone Security Tips
      Beware of Text Message Spam
      Use Anti-Virus Software
      Mind Your Moblie Apps
      Avoid Wi-Fi Hotspots
      Keep Your Phone in Jail




Source : Top 10 Smartphone Security Tips: Joseph Morah   24
Smart Phone Security Tips
      Turn off Bluetooth Discovery Mode
      Apply OS update
      Backup or Sync Your Data Frequently
      Enable Remote Locate, Lock and Wipe
      Screen Lock Your Phone




Source : Top 10 Smartphone Security Tips: Joseph Morah   25
Case Studies




               26
Thank you

thanachart@swpark.or.th
twitter.com/thanachart
www.facebook.com/thanachart
www.swpark.or.th
www.facebook.com/softwareparkthailand

                                        27

More Related Content

PDF
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
PDF
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
PDF
Protect your company from zero-day with ESET Dynamic Threat Defense
PDF
Comilion introduction presentation 26102012 (1)
PDF
Drainware Corporate
PDF
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...
Black Hat USA 2014 - A Practical Attack Against Virtual Desktop Infrastructur...
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
Top Seven Risks of Enterprise Mobility - How to protect your business
MobileCON 2013 – Attacks Aginst MDM Solutions (and What You Can Do About It)
Protect your company from zero-day with ESET Dynamic Threat Defense
Comilion introduction presentation 26102012 (1)
Drainware Corporate
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...

What's hot (19)

PDF
Ivanti Insights Podcast - FireEye Breach
PDF
Dissecting internet of things by avinash sinha
PPTX
10 Things to Watch for in 2016
PPTX
10 IT Security Trends to Watch for in 2016
PPTX
Three trends in cybersecurity
PPT
Group1 First Periodical Exam
PDF
Axxera End Point Security Protection
PPTX
Cybersecurity
PDF
Security 2 Q 07[1]
PDF
Ensuring Mobile Device Security
PDF
Безопасность данных мобильных приложений. Мифы и реальность.
PPTX
Security of iot device
PPTX
Internet & iot security
PPTX
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
PPTX
Security issues and solutions : IoT
PDF
Public wifi
PPTX
Internet of Things (IoT) Security
PPT
IoT security (Internet of Things)
PDF
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
Ivanti Insights Podcast - FireEye Breach
Dissecting internet of things by avinash sinha
10 Things to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Three trends in cybersecurity
Group1 First Periodical Exam
Axxera End Point Security Protection
Cybersecurity
Security 2 Q 07[1]
Ensuring Mobile Device Security
Безопасность данных мобильных приложений. Мифы и реальность.
Security of iot device
Internet & iot security
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
Security issues and solutions : IoT
Public wifi
Internet of Things (IoT) Security
IoT security (Internet of Things)
[CB20] It is a World Wide Web, but All Politics is Local: Planning to Survive...
Ad

Viewers also liked (20)

PDF
Thailand Software Park Alliance
PDF
SYSCON & MOBI CON2011 Press Conference
PDF
TheFuture of Mobile Application and Media Tablets
PDF
Strategic IT Governance and IT Security Management Course
PDF
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
PDF
Power of Social Collaboration and Business Technology Adoption
PDF
Technology Trends 2014 and Beyond
PDF
Enterprise Techonology Trends
PDF
PDF
IT Management Trends on Enterprise 2.0
PDF
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
PDF
Impact of cloud computing to Asian IT Industry
PDF
Technology Trends 2011
PDF
Innovation and Business Opportunities in Cloud Computing
PDF
Overview Mobile Applications Market
PDF
พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่
PDF
Moving towards Work-Life Flexibility
PDF
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
PDF
ICT Vision and Technologies Adoption across Thailand
PDF
พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่
Thailand Software Park Alliance
SYSCON & MOBI CON2011 Press Conference
TheFuture of Mobile Application and Media Tablets
Strategic IT Governance and IT Security Management Course
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
Power of Social Collaboration and Business Technology Adoption
Technology Trends 2014 and Beyond
Enterprise Techonology Trends
IT Management Trends on Enterprise 2.0
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
Impact of cloud computing to Asian IT Industry
Technology Trends 2011
Innovation and Business Opportunities in Cloud Computing
Overview Mobile Applications Market
พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่
Moving towards Work-Life Flexibility
ไอซีทีกับการเปลี่ยนแปลงของสังคมไทย
ICT Vision and Technologies Adoption across Thailand
พิชิตคู่แข่ง แซงหน้าด้วยไอที ยุคใหม่
Ad

Similar to การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร (20)

PDF
Unicom Conference - Mobile Application Security
PDF
Sholove cyren web security - technical datasheet2
PDF
C0c0n 2011 mobile security presentation v1.2
PDF
Evaluate Top Seven Risks of Enterprise Mobility
PDF
Public/Private Cloud Securtiy Trends & Awareness
PDF
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
PDF
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
PDF
Trojan horseofbyod2
PDF
Article on Mobile Security
PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PPTX
Secure Android Apps- nVisium Security
PDF
Securing Mobile Apps - Appfest Version
PPTX
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
PDF
SecurityWhitepaper 7-1-2015
PPTX
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
PDF
BYOD for your business with WSO2 Enterprise Mobility Manager
PDF
Droidcon2013 security genes_trendmicro
PDF
Hexnode Unified Endpoint Management
PDF
Mobile Security for Smartphones and Tablets
Unicom Conference - Mobile Application Security
Sholove cyren web security - technical datasheet2
C0c0n 2011 mobile security presentation v1.2
Evaluate Top Seven Risks of Enterprise Mobility
Public/Private Cloud Securtiy Trends & Awareness
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
Trojan horseofbyod2
Article on Mobile Security
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Secure Android Apps- nVisium Security
Securing Mobile Apps - Appfest Version
APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati
SecurityWhitepaper 7-1-2015
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
BYOD for your business with WSO2 Enterprise Mobility Manager
Droidcon2013 security genes_trendmicro
Hexnode Unified Endpoint Management
Mobile Security for Smartphones and Tablets

More from Software Park Thailand (20)

PDF
Smart industry Vol.33/2561
PDF
Softwarepark news Vol.7/2561
PDF
Software Park Thailand Newsletter (Thai) Vol2/2556
PDF
Software Park Newsletter Thai Vol 3/25561
PDF
Smart Industry Vol.23
PDF
Solfware park Newsletter Vol 3/2013 Eng Version
PDF
Software Park Thailand Newsletter Vol 3/2556
PDF
Software Park Thailand Newsletter (Eng) Vol3/2012
PDF
Software Park Thailand Newsletter (Eng) Vol5/2013
PDF
Software Park Thailand Newsletter (Thai) Vol4/2555
PDF
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)
PDF
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"
PDF
Software newsletter
PDF
Smart industry Vol. 21/2556
PDF
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...
PDF
Software Park Newsletter Vol. 4/2012 English Version
PDF
Thai IT Delegation to Japan 2012
PDF
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012
PDF
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012
PDF
Thai IT Business Development Delegation to Tokyo, Japan: November 2012
Smart industry Vol.33/2561
Softwarepark news Vol.7/2561
Software Park Thailand Newsletter (Thai) Vol2/2556
Software Park Newsletter Thai Vol 3/25561
Smart Industry Vol.23
Solfware park Newsletter Vol 3/2013 Eng Version
Software Park Thailand Newsletter Vol 3/2556
Software Park Thailand Newsletter (Eng) Vol3/2012
Software Park Thailand Newsletter (Eng) Vol5/2013
Software Park Thailand Newsletter (Thai) Vol4/2555
Thai ICT Trad Mission CommunicAsia 2013 (18-21 June 2013)
Smart Industry Vo.22/2556"E-transaction กระตุ้นธุรกิจอีคอมเมิร์สโต"
Software newsletter
Smart industry Vol. 21/2556
Software Park Newsletter 2/2554 "แท็บเล็ต สมาร์ทโพน โมบายแอพพลิเคชั่น ดาวเด่น...
Software Park Newsletter Vol. 4/2012 English Version
Thai IT Delegation to Japan 2012
Thai IT Business Develop,emt Delegation to Tokyo, Japan, 2012
Thai IT Trade Delegation to Tokyo, Japan 11-16 November 2012
Thai IT Business Development Delegation to Tokyo, Japan: November 2012

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf

การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร