1 / 13

Security: What is Being Done?

Security: What is Being Done?. Peter Coroneos Chief Executive Internet Industry Association (IIA) AVAR Conference Sydney November 7, 2003. About the IIA. Australia’s national internet industry organisation (est.1995) Over 300 members include...

jaafar
Download Presentation

Security: What is Being Done?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security: What is Being Done? Peter Coroneos Chief Executive Internet Industry Association (IIA) AVAR Conference Sydney November 7, 2003

  2. About the IIA • Australia’s national internet industry organisation (est.1995) • Over 300 members include... - telecommunications carriers - web and software developers - content creators and publishers - internet service providers - educational & training firms - local government agencies - law firms - portal sites - internet research analysts - hardware vendors - banks & insurance companies - online advertisers - systems integrators - internet security providers - and businesses doing, or helping others to do e-commerce

  3. Our mission • As a voice for the industry, the IIA provides policy input to government and advocacy on a range of business and regulatory issues, to promote laws and initiatives which enhance access, equity, reliability and growth of the medium within Australia.

  4. Malicious Code • Hybridisation • Crossing the device threshold • The sociopathology of malicious code writers - focus on prevention by addressing motivation and deterence • Who bears the responsibility in a culture of security?

  5. Initiatives • IIA SME Security portal • IIA Cybercrime Code • IIA National Spam Initiative • Spam Legislation • Global Spam Campaign

  6. Spam: the cause and its effect are economic • More than 50% of all email is now junk (8% in 2001) • US$8.9 billion cost to US corporations in 2002 • cost to Australian business A$915 per employee pa • cost to spammers .000030 per email plus .00032 per address • 70% is illegal under current laws • US$3.2 billion pa revenues from porn spam

  7. Spam: the extent of the problem (2) • Nigerian advance scam will gross US$2 bill. In 2003 • 28% of users reply to spam • 8% have purchased from spam • 4.5 seconds per spam wasted corporate time • 16% change email addresses due to spam • 1 in 145 spams carry viruses • only 8% believe the media exaggerates spam problem

  8. The global solution has four elements • legislation • industry action • end user empowerment • international cooperation

  9. Australian legislation will pass this year • opt in regime with few exceptions • infringement notices issued by ACA; enforced by FCA • heavy penalties • limited exemptions • anti harvesting provisions • strong information requirements

  10. www.iia.net.au/nospam

  11. Users are most concerned about... % 25 15 11 11 10 9 3 • computer viruses • spam • privacy • security of transactions • response times • cost of access • cost of upgrading hardware • Source: ACNielsen.consult Australian Online User Study #10 (n = 34,643)

  12. www.iia.net.au

More Related