SlideShare ist ein Scribd-Unternehmen logo
1 von 29
The Battle for Internet Safety Vic Laurie vlaurie.com
What We Will Cover ,[object Object],[object Object],[object Object]
The Bad News ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Good News ,[object Object],[object Object]
The Problem Is Inherent ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bad Statistics  ,[object Object],[object Object]
 
 
 
An ad online showing bulk credit card numbers for sale
 
How Much Security Is Enough? ,[object Object],[object Object],[object Object],[object Object]
21 ZoneAlarm Internet Security 35 Trend Micro Internet Security Pro 19 PC Security Shield 24 Panda Internet Security 15 Norton Internet Security 2010 26 Norman Internet Security Suite 19 McAfee Internet Security 15 Kaspersky Internet Security 40 BitDefender Internet Security Boot Time Increase   (sec) Suite
Different Types of Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Criteria for Basic Defense for Average Home User ,[object Object],[object Object],[object Object],[object Object]
Minimum Defenses for Average PC User ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Additional Defenses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
More Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Useful References ,[object Object],[object Object],[object Object],[object Object]
 
Menu from “Safety” button in Internet Explorer 8
Firefox Site Filtering
 
 
Network Security ,[object Object],[object Object],[object Object]
Privacy Issues ,[object Object],[object Object],[object Object],[object Object]
 
The  End vlaurie.com tips.vlaurie.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Enterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security CasesEnterprise Security and Cyber Security Cases
Enterprise Security and Cyber Security Cases
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
cyber security
cyber securitycyber security
cyber security
 
cyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber securitycyber security,need,security problem and types of cyber security
cyber security,need,security problem and types of cyber security
 
Home cyber security
Home cyber securityHome cyber security
Home cyber security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 

Andere mochten auch

Anniversary intro
Anniversary introAnniversary intro
Anniversary introclcewing
 
CDP – Статистика за 2012 год
CDP – Статистика за 2012 годCDP – Статистика за 2012 год
CDP – Статистика за 2012 годYury Shilyaev
 
あなたはどっち? クラウドでDebian // Debianでクラウド
あなたはどっち? クラウドでDebian // Debianでクラウドあなたはどっち? クラウドでDebian // Debianでクラウド
あなたはどっち? クラウドでDebian // DebianでクラウドYasuhiro Araki, Ph.D
 
THE VALUE OF GLOBAL CAREERS TO THE UK
THE VALUE OF GLOBAL CAREERS TO THE UKTHE VALUE OF GLOBAL CAREERS TO THE UK
THE VALUE OF GLOBAL CAREERS TO THE UKL'Oréal Talent
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 

Andere mochten auch (8)

Anniversary intro
Anniversary introAnniversary intro
Anniversary intro
 
Gvo2
Gvo2Gvo2
Gvo2
 
My virtual Bio
My virtual BioMy virtual Bio
My virtual Bio
 
3c
3c3c
3c
 
CDP – Статистика за 2012 год
CDP – Статистика за 2012 годCDP – Статистика за 2012 год
CDP – Статистика за 2012 год
 
あなたはどっち? クラウドでDebian // Debianでクラウド
あなたはどっち? クラウドでDebian // Debianでクラウドあなたはどっち? クラウドでDebian // Debianでクラウド
あなたはどっち? クラウドでDebian // Debianでクラウド
 
THE VALUE OF GLOBAL CAREERS TO THE UK
THE VALUE OF GLOBAL CAREERS TO THE UKTHE VALUE OF GLOBAL CAREERS TO THE UK
THE VALUE OF GLOBAL CAREERS TO THE UK
 
Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 

Ähnlich wie The battle for safety

Ähnlich wie The battle for safety (20)

C3
C3C3
C3
 
Information security
Information securityInformation security
Information security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Securing Your Small Business Network
Securing Your Small Business NetworkSecuring Your Small Business Network
Securing Your Small Business Network
 
Ethical hacking.docx
Ethical hacking.docxEthical hacking.docx
Ethical hacking.docx
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Hamza
HamzaHamza
Hamza
 
INT 1010 05-3.pdf
INT 1010 05-3.pdfINT 1010 05-3.pdf
INT 1010 05-3.pdf
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Malicious malware breaches - eScan
Malicious malware breaches - eScanMalicious malware breaches - eScan
Malicious malware breaches - eScan
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 

Mehr von Joel May

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photosJoel May
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash driveJoel May
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creationJoel May
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use GmailJoel May
 
Free software
Free softwareFree software
Free softwareJoel May
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystifiedJoel May
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?Joel May
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Joel May
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable StorageJoel May
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the WebJoel May
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your ComputerJoel May
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of GoogleJoel May
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to WordJoel May
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricksJoel May
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to ExcelJoel May
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktopJoel May
 
Audio on the web
Audio on the webAudio on the web
Audio on the webJoel May
 
Your family legacy
Your family legacyYour family legacy
Your family legacyJoel May
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard driveJoel May
 

Mehr von Joel May (20)

Organize, edit and share your photos
Organize, edit and share your photosOrganize, edit and share your photos
Organize, edit and share your photos
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
101 ways to use a flash drive
101 ways to use a flash drive101 ways to use a flash drive
101 ways to use a flash drive
 
Free and easy website creation
Free and easy website creationFree and easy website creation
Free and easy website creation
 
Top Ten Reasons to use Gmail
Top Ten Reasons to use GmailTop Ten Reasons to use Gmail
Top Ten Reasons to use Gmail
 
Free software
Free softwareFree software
Free software
 
Cell phones demystified
Cell phones demystifiedCell phones demystified
Cell phones demystified
 
So you took some great pictures, now what?
So you took some great pictures, now what?So you took some great pictures, now what?
So you took some great pictures, now what?
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Removeable Storage
Removeable StorageRemoveable Storage
Removeable Storage
 
Planning Travel on the Web
Planning Travel on the WebPlanning Travel on the Web
Planning Travel on the Web
 
Optimizing Your Computer
Optimizing Your ComputerOptimizing Your Computer
Optimizing Your Computer
 
The Many Faces of Google
The Many Faces of GoogleThe Many Faces of Google
The Many Faces of Google
 
Introduction to Word
Introduction to WordIntroduction to Word
Introduction to Word
 
Excel tips&tricks
Excel tips&tricksExcel tips&tricks
Excel tips&tricks
 
Introduction to Excel
Introduction to ExcelIntroduction to Excel
Introduction to Excel
 
Configuring the desktop
Configuring the desktopConfiguring the desktop
Configuring the desktop
 
Audio on the web
Audio on the webAudio on the web
Audio on the web
 
Your family legacy
Your family legacyYour family legacy
Your family legacy
 
Mastering your hard drive
Mastering your hard driveMastering your hard drive
Mastering your hard drive
 

Kürzlich hochgeladen

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

The battle for safety

  • 1. The Battle for Internet Safety Vic Laurie vlaurie.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.  
  • 9.  
  • 10.  
  • 11. An ad online showing bulk credit card numbers for sale
  • 12.  
  • 13.
  • 14. 21 ZoneAlarm Internet Security 35 Trend Micro Internet Security Pro 19 PC Security Shield 24 Panda Internet Security 15 Norton Internet Security 2010 26 Norman Internet Security Suite 19 McAfee Internet Security 15 Kaspersky Internet Security 40 BitDefender Internet Security Boot Time Increase (sec) Suite
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.  
  • 22. Menu from “Safety” button in Internet Explorer 8
  • 24.  
  • 25.  
  • 26.
  • 27.
  • 28.  
  • 29. The End vlaurie.com tips.vlaurie.com