SlideShare a Scribd company logo
Mobile Communications
Parental Controls Workshop
ICT Week St Maarten
15-20 August, 2010
Making technology work securely for you
and your family!
Anton Kaska, Vice President
Security Business, US, Canada and Caribbean
Agenda
•Introduction
•Terms
•Concerns (Threats)
•A layered and holistic approach
•Question/Answer period
•Demonstration
•Open forum
Introduction
• Security Professional
• Over 20 years overseas in Europe,
Asia and the Middle East
• Parent
Firewall
Internet
Firewall
http://www.sans.org/security-resources/glossary-of-terms/
Terms
•SPAM/UCE
•SMS/MMS
•Phishing
•Spyware
•Virus
•Bearers
Concerns (Threats)
• Uncontrolled or excessive costs
• Exposure to unacceptable
“communications” (religious, sexual in
nature or predatory)
• Technologic Threats to user
• Infrastructure threats
• Moral/Social-family members
Where are the tech-threats?
Spam
SMS Spam
accounting for 18%
of total traffic in
some locations
Knowing the threats and how to control over your technology is imperative
Knowledge is key
Email
Threats via email
are prevalent
Peer to Peer
Can account for
20% of uplink
traffic
Web (HTTP)
Increasing Phishing
& Malware hosting
Virus
MMS Virus
infection rates
approaching 14%
Network Availability
Dangers to the
network and
subscribers(incl. home
network)
Spyware
Copying of
messages, call
eavesdropping and
bugging of rooms.
6 © Nokia Siemens Networks
What are the tech-threats?
7 © Nokia Siemens Networks
35 Million Spam Emails Sent
28 people bought products.
$ 3M
in pharmaceutical sales in 2008
Conversion rate of 0.000008%
PC Spam
Mobile Spam1,000,000
28 people
signed up to service
SMS Sent
78,700
recipients
called number
31,000
recipients
replied to SMS $ 25M
in one 3 day attack
Fake Prize Draw text message sent in a single 3 day
attack in 2009
An analysis of a single Operator’s cost
Conversion rate of 0.01%Total $124,000Total $24,800,000
Total $500
Total $5,000
sdf
dsf
sf
sdf
Example: SMS Phishing Fraud
Mobikama.com
/www.google.co.in/gwt/x/ts?ei=z9vlstwmozqc7q
pazazbag
&;source=m
&;u=http://m.mobikama.com/
&;whp=122383b343f;initial_page_loaded
&;wsc=tc
&;wsi=396cd70b33f3cbdd
User receives
WAP Push
User clicks link
to Web Site
WAP Push has
“hot button” link follow
on many handsets
URL Embedded in Google
search string avoids site
blocking put in place
“Call” Link to
Intl Premium Rate
Curious subscriber clicks
Link and call is placed to
Reverse Charge line
Unexpected
Behaviour
= Mobile Virus
User not seen “call:” links
thinks virus has infected
handset
Website embedded in Google
search URL requires intelligent
traffic parsing.
Leveraging Location Based
Services
9 © Nokia Siemens Networks
Layered and Holistic
Approach
The non-tech bits
• The Onion
Regulators
Providers
and YOU
ho·lis·tic (h-lstk)
a. Emphasizing the importance of the whole and the interdependence of its parts.
b. Concerned with wholes rather than analysis or separation into parts: holistic medicine; holistic ecology.
Questions and Answers
Interim thoughts
Demonstration
A sample parental control portal
REAL WORLD
Open Forum
A Citizens Discussion
Closing
• Take an active role as a parent
• Technologic Threats to user
• Thank you to the Caribbean
Telecommunications Union (CTU) and
my friends in the Netherland Antilles

More Related Content

PPTX
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
PPTX
Introduction to malvertising
PPTX
Web security
PPTX
Ransomware
PDF
Jean pier talbot - web is the battlefield - atlseccon2011
PPTX
Internet Safety
PPTX
Ransomware attack
PPTX
Media-web_application_security_and_vulnerabilities
Educate Your Users Not To Take The Bait: Introduction To Phishing As A Service
Introduction to malvertising
Web security
Ransomware
Jean pier talbot - web is the battlefield - atlseccon2011
Internet Safety
Ransomware attack
Media-web_application_security_and_vulnerabilities

What's hot (20)

PPTX
Cyber security
PDF
Documento Cisco su Ransomware: come affrontarlo
PPTX
Web Security Training : Tonex Training
PPT
Internet Safety again
PDF
Ransomware attacks 2017
PPTX
Fraud Detection With User Behavior Analytics
PPTX
Back to school - CYBER SAFETY
PPT
Social media risk
PPTX
Word camp orange county 2012 enduser security
PPT
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
PDF
Email Security Threats: IT Manager's Eyes Only
PPTX
HOW HACKERS CONDUCT CYBER WARFARE
PPTX
Oula 9 a
PDF
Cisco Content Security
PPT
Security Basics Webinar
PPTX
Ransomware
PPTX
Cocoon On Internet Security
PDF
The Cost of Inactivity: Malware Infographic
PDF
ZeroAcoso
Cyber security
Documento Cisco su Ransomware: come affrontarlo
Web Security Training : Tonex Training
Internet Safety again
Ransomware attacks 2017
Fraud Detection With User Behavior Analytics
Back to school - CYBER SAFETY
Social media risk
Word camp orange county 2012 enduser security
Renaud Bido & Mohammad Shams - Hijacking web servers & clients
Email Security Threats: IT Manager's Eyes Only
HOW HACKERS CONDUCT CYBER WARFARE
Oula 9 a
Cisco Content Security
Security Basics Webinar
Ransomware
Cocoon On Internet Security
The Cost of Inactivity: Malware Infographic
ZeroAcoso
Ad

Viewers also liked (20)

PPTX
Rabelani dagada economical waves presentation
PPT
Rabelani dagada bizpref erp factors
PPTX
Rabelani dagada wbs erp
PDF
Dagada programmefinal
PPT
Ict parent workshop web 2.0 feb 2011
PPTX
The integration of legal aspects in Information Security: Is your organisatio...
PPTX
Domestication edit
PDF
1474595020.pdf ปุ๋ย 9
PPTX
IHT Seminar ALL PARTS November 14
PDF
SingleSideWallCalculations_Word
PDF
13.Anton-Position-Security-Considerations-23June2015[1]
PPTX
Retirement Seminar v1
PPTX
Rabelani dagada electronic records management chetty law 2011
PPT
Case ส.ขอนแก่น
PPT
Hezkuntza proiektua
PPT
Cpf case rev1
PPT
กรณีศึกษา เถ้าแก่น้อย
PPTX
Ամեոբաներ
Rabelani dagada economical waves presentation
Rabelani dagada bizpref erp factors
Rabelani dagada wbs erp
Dagada programmefinal
Ict parent workshop web 2.0 feb 2011
The integration of legal aspects in Information Security: Is your organisatio...
Domestication edit
1474595020.pdf ปุ๋ย 9
IHT Seminar ALL PARTS November 14
SingleSideWallCalculations_Word
13.Anton-Position-Security-Considerations-23June2015[1]
Retirement Seminar v1
Rabelani dagada electronic records management chetty law 2011
Case ส.ขอนแก่น
Hezkuntza proiektua
Cpf case rev1
กรณีศึกษา เถ้าแก่น้อย
Ամեոբաներ
Ad

Similar to StMaarten-workshop-final (20)

PDF
5 network-security-threats
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PDF
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
PPTX
Updated Cyber Security and Fraud Prevention Tools Tactics
PPTX
The Whys and Wherefores of Web Security – by United Security Providers
PPTX
Cisco Web and Email Security Overview
PPTX
cyber threats and attacks.pptx
PDF
Phishing: Analysis and Countermeasures
PPTX
Security Minded - Ransomware Awareness
PDF
First Union Bank Report
PDF
Cyber Risk Management in the New Digitalisation Age - eSentinel™
PDF
Cybersecurity in BFSI - Top Threats & Importance
PPT
3 Hkcert Trend
PPTX
Info Session on Cybersecurity & Cybersecurity Study Jams
PPT
cyber terrorism
PPT
cyber terrorism
PDF
Cyber modified
PPTX
Ecommerce security
PDF
Ce hv8 module 13 hacking web applications
5 network-security-threats
Five Network Security Threats And How To Protect Your Business Wp101112
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
Updated Cyber Security and Fraud Prevention Tools Tactics
The Whys and Wherefores of Web Security – by United Security Providers
Cisco Web and Email Security Overview
cyber threats and attacks.pptx
Phishing: Analysis and Countermeasures
Security Minded - Ransomware Awareness
First Union Bank Report
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cybersecurity in BFSI - Top Threats & Importance
3 Hkcert Trend
Info Session on Cybersecurity & Cybersecurity Study Jams
cyber terrorism
cyber terrorism
Cyber modified
Ecommerce security
Ce hv8 module 13 hacking web applications

StMaarten-workshop-final

  • 1. Mobile Communications Parental Controls Workshop ICT Week St Maarten 15-20 August, 2010 Making technology work securely for you and your family! Anton Kaska, Vice President Security Business, US, Canada and Caribbean
  • 2. Agenda •Introduction •Terms •Concerns (Threats) •A layered and holistic approach •Question/Answer period •Demonstration •Open forum
  • 3. Introduction • Security Professional • Over 20 years overseas in Europe, Asia and the Middle East • Parent
  • 5. Concerns (Threats) • Uncontrolled or excessive costs • Exposure to unacceptable “communications” (religious, sexual in nature or predatory) • Technologic Threats to user • Infrastructure threats • Moral/Social-family members
  • 6. Where are the tech-threats? Spam SMS Spam accounting for 18% of total traffic in some locations Knowing the threats and how to control over your technology is imperative Knowledge is key Email Threats via email are prevalent Peer to Peer Can account for 20% of uplink traffic Web (HTTP) Increasing Phishing & Malware hosting Virus MMS Virus infection rates approaching 14% Network Availability Dangers to the network and subscribers(incl. home network) Spyware Copying of messages, call eavesdropping and bugging of rooms. 6 © Nokia Siemens Networks
  • 7. What are the tech-threats? 7 © Nokia Siemens Networks 35 Million Spam Emails Sent 28 people bought products. $ 3M in pharmaceutical sales in 2008 Conversion rate of 0.000008% PC Spam Mobile Spam1,000,000 28 people signed up to service SMS Sent 78,700 recipients called number 31,000 recipients replied to SMS $ 25M in one 3 day attack Fake Prize Draw text message sent in a single 3 day attack in 2009 An analysis of a single Operator’s cost Conversion rate of 0.01%Total $124,000Total $24,800,000 Total $500 Total $5,000
  • 8. sdf dsf sf sdf Example: SMS Phishing Fraud Mobikama.com /www.google.co.in/gwt/x/ts?ei=z9vlstwmozqc7q pazazbag &;source=m &;u=http://m.mobikama.com/ &;whp=122383b343f;initial_page_loaded &;wsc=tc &;wsi=396cd70b33f3cbdd User receives WAP Push User clicks link to Web Site WAP Push has “hot button” link follow on many handsets URL Embedded in Google search string avoids site blocking put in place “Call” Link to Intl Premium Rate Curious subscriber clicks Link and call is placed to Reverse Charge line Unexpected Behaviour = Mobile Virus User not seen “call:” links thinks virus has infected handset Website embedded in Google search URL requires intelligent traffic parsing.
  • 9. Leveraging Location Based Services 9 © Nokia Siemens Networks
  • 10. Layered and Holistic Approach The non-tech bits • The Onion Regulators Providers and YOU ho·lis·tic (h-lstk) a. Emphasizing the importance of the whole and the interdependence of its parts. b. Concerned with wholes rather than analysis or separation into parts: holistic medicine; holistic ecology.
  • 12. Demonstration A sample parental control portal REAL WORLD
  • 13. Open Forum A Citizens Discussion
  • 14. Closing • Take an active role as a parent • Technologic Threats to user • Thank you to the Caribbean Telecommunications Union (CTU) and my friends in the Netherland Antilles