Scaricare la presentazione
La presentazione è in caricamento. Aspetta per favore
1
Intervento Microsoft Rischi e minacce su Internet
3/27/ :23 PM Intervento Microsoft Rischi e minacce su Internet Strumenti Microsoft per la sicurezza Consigli utili Claudio Simoni Global Account Techology Strategist © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
Le famiglie con almeno un minorenne sono le più tecnologiche
Dati Istat 2011
3
Rischi per i minori che iniziano presto ad utilizzare le nuove tecnologie
Malware Truffe Hacking Spam Contatti con malintenzionati Contenute inadeguati
4
Sicurezza Essere al Sicuro + Agire in modo Sicuro
Su Internet, come nella vita di ogni giorno, è importante: Rendere sicuri i nostri Devices nello stesso modo in cui chiudiamo le porte e le finestre quando usciamo di casa Conoscere i pericoli che possono nascondersi su Internet e agire con comportamenti sicuri
5
Impegno Microsoft Sicurezza Trustworthy Computing
Microsoft Security Strategy Briefing Impegno Microsoft Sicurezza Trustworthy Computing NDA - Microsoft Confidential Sicurezza Privacy Affidabilita’ Integrita’ Timing: 3 minutes Key Points: Trustworthy Computing is Microsoft’s initiative to address security issues in both our software and in the industry Trustworthy Computing has four pillars: Security, Privacy, Reliability, and Business Practices Talk Track: Lets talk about the foundation of our security efforts at Microsoft and our commitment to you, our customer. Since the Trustworthy Computing Initiative was introduced in early 2002, Microsoft has been working wholeheartedly to address security issues in both our software and in the industry. Broadly adopted technologies such as telephony and electricity have become trusted parts of our daily lives. Even though they occasionally fail, the overwhelming perception is that these technologies are inherently trustworthy. Achieving similar confidence in technology reliability is a fundamental objective of the Microsoft Trustworthy Computing initiative. The challenge: While the overall quality of technology has improved considerably, customer expectations for end-to-end reliability outpaced these improvements. Compounding the challenge is the increasing complexity of software and the computing ecosystem, plus the lack of real standards for measuring reliability. Microsoft has a vision of seamless computing, in which all types of devices work easily together as if they were all a single device. For Microsoft to make that vision real, we focus on our four pillars of Trustworthy Computing. Security Security is all about protecting your environment from attacks and protecting your data and systems Microsoft takes a defense-in-depth approach to security We focus on the fundamentals -- making the platform inherently safer. We do this by training our developers, testers, and program managers in how to develop more secure code, putting in place a process for developing secure code. Securing against attacks: The Microsoft approach looks to reduce an organization’s exposure to attacks, through best-of-breed threat protection, detection, and removal with our technology and products. Data collected using various feedback mechanisms—including MSN Hotmail, Windows Online Crash Analysis, and the SpyNet AntiSpyware Community—combined with a global multivendor research effort will enable fast discovery and awareness to protect against new threats. Protecting data and systems: Microsoft is also focused on protecting data and systems. We help ensure that users are trustworthy, to help manage policy that dictates what resources those users can access, and to help protect information for its lifetime, wherever it is stored. Privacy Privacy is a critical element of a trusted computing experience. Customers have high expectations about how we collect, use, and store personal information. Microsoft believes that its customers have the right to control their personal information, have the right to be left alone, and have the right to a trusted experience in which they can rely on Microsoft technologies, services, and solutions. With this in mind, we create our policies and processes for designing, developing, and testing to ensure that we: Engineer privacy into our products during the product life cycle. Implement privacy-based technology throughout our internal processes. Ensure that our global privacy policies are properly executed throughout the company. We provide the opportunity for our customers to opt in or opt out when providing personal information. We also partner with other organizations and industry professionals to create policies and standards to safeguard the appropriate usage and security of personal information. We are vigilant in our compliance with global privacy laws; our privacy policy is, in part, derived from privacy laws from around the world. We follow the lead of these privacy laws, and apply those standards globally. No matter where our customers live or work, we are striving to help them protect their privacy. Compounding the challenge is the increasing complexity of software and the computing ecosystem, plus the lack of real standards for measuring reliability. Microsoft has a vision of seamless computing, in which all types of devices work easily together as if they were all a single device. We view reliability as a key enabler of that vision. But reliability means more to Microsoft than just making dependable software and providing support. It also means: Continued investments in processes and technology to improve reliability. Active partnership with a wide variety of software and hardware companies. A continuing focus on every customer’s software experience. Business Practices Finally, Trustworthy Computing plays a critical role in Microsoft Business Practices. We are committed to deepening the trust of customers, partners, governments, and communities by demonstrating that we operate with integrity in everything we do. We strive to meet or exceed our legal, regulatory, and ethical responsibilities around the world and to hire and reward employees who share our values and adhere to our Standards of Business Conduct. Our position as an industry leader is both an opportunity and a responsibility to set the standard for responsible innovation and community engagement around the world. <click> Today, we will focus on the security pillar of our Trustworthy Computing Strategy
6
Esperienza e Impegno 1989 1995 2000 2005 2010 Active Directory
Microsoft Security Strategy Briefing NDA - Microsoft Confidential Esperienza e Impegno Active Directory Trustworthy Computing Initaitive (TwC) SAS-70 Certification 1st Microsoft Data Center Malware Protection Center BillG Memo ISO Certification 1989 1995 2000 2005 2010 Microsoft Security Response Center (MSRC) Windows Update Global Foundation Services (GFS) Microsoft Security Engineering Center/Security Development Lifecycle FISMA Certification Timing: 2 minutes Key Points: Our security journey is nearly two decades long. Talk Track: Microsoft’s security experience began when we opened our first data center in 1989 and comes from securing some of the world’s first online services like MSN and Hotmail. In the late 90’s we established our own Security Response Center and began delivering world-class security technologies in Windows such as AD and Windows Update. A key moment for us was the internal memo Bill Gates sent in 2002 that outlined Microsoft responsibility and commitment to computing that people and businesses could trust. This began our Trustworthy Computing Initiative which continues to deliver fundamental security innovations, such as the industry leading Security Development Lifecycle used for all our products – we will take a closer look at SDL in a few minutes – and our world-class Malware Protection Center. In the 2000’s we standardized our online services on the common Global Foundation Services infrastructure which today runs over 200 public services at Microsoft. We have achieved numerous security certifications for our online services and continue to innovate with security technologies available in our Windows Azure Platform and other Microsoft Online Services. For several years now we have made basic desktop antimalware protection freely available worldwide with Microsoft Security Essentials, proof of our commitment to work with industry and consumers to make computing safer for everyone. Dates (highlight as needed) Microsoft.com first launched as a website: April 1994 MSN launched in August 1995 Windows Update services started in 1995 (introduced as part of Windows 95) Hotmail was acquired in 1997 Microsoft Security Response Center (established in 1998) Trustworthy Computing Directive (by Bill Gates): January 2002 Global Foundation Services (established in 2002) Malware Protection Center (established in 2004) Security Development Lifecycle Mandatory Policy Published: December 2004 First SAS 70: Type II, October 2007 Microsoft Online Services (established in 2007) First ISO/IEC 27001:2005 Certification: May 2008 Microsoft Security Essentials launched Sept 2009 (and quickly rose to be the most popular antivirus product in North America) Windows Azure launched November 2009 FISMA Cert in 2011
7
Principali Strumenti Microsoft
Sicuri Online: Safety and Security Center:
8
Microsoft Security Essentials
Protezione completa da Virus, Spyware e Malware Download semplice e gratuito Aggiornamenti automatici Facile da utilizzare DEMO: Spiegare da dove si installa Far vedere la UI Spiegare che fa gli aggiornamenti in modo silente al contrario di avast/avira
9
Windows Update Aggiornare il Sistema Operativo è importante quanto aggiornare l’antivirus. Per aggiornare è possibile attivare il Microsoft Update andando su DEMO: far vedere come si fa Windows Update / Microsoft Update
10
Centro Operativo di Windows
Da Windows XP SP2 è stato introdotto il Centro Sicurezza PC, chiamato Centro Operativo in Windows 7 e Windows 8. Nel Centro operativo è possibile visualizzare a colpo d’occhio lo stato del PC, con la possibilità di intervenire per correggere le situazioni critiche. DEMO: Centro Operativo
11
Internet Explorer 9 e 10 Navigazione più rapida e sicura
Maggiore protezione contro virus, spyware e download dannosi Lo SmartScreen Filter Protezione da monitoraggio DEMO: Spiegare come si aggiorna da Internet Explorer 9 e dove si scarica Demo SmartScreen Tracking Protection Evidenziazione del dominio e SSL sulla barra degli indirizzi Come disinstallare le Toolbar Se uno ha ancora XP, dirgli di aggiornarsi a Windows 8
12
Firewall È un filtro sulle connessioni entranti ed uscenti, permettendo agli utenti di operare al massimo della sicurezza. È possibile configurarlo per effettuare operazioni di Controllo, Modifica, Monitoraggio sul traffico Internet del computer. Spiegare che in Windows è già integrato un buon firewall e non si deve fare nulla per configurarlo. In una scuola invece è bene dotare a tutta l’infrastruttura di rete di un firewall hardware per bloccare su tutti i computer i siti indesiderati
13
Outlook.com Servizio di posta elettronica di Microsoft, precedentemente chiamato Hotmail Basato sul Cloud, si collega a tutti i dispositivi Antispam, Antiphishing e SmartScreen integrati Interfaccia semplice e funzionale DEMO: Far vedere il sito outlook.com Spiegare come si aggiorna da Hotmail a Outlook Spiegare come disiscriversi dalle newsletter Antispam SmartScreen
14
Consigli per i Genitori 1/2
15
Consigli per i Genitori 2/2
16
Consigli per i Ragazzi
17
Siate per i vostri figli occhi che guardano
18
Riepilogo link utili Intervista: Claudio Simoni Safer Internet Day Sicuri Online: Safety and Security Center
19
Claudio Simoni Global Account Techology Strategist
3/27/ :23 PM Intervento Microsoft Grazie per l’attenzione Claudio Simoni Global Account Techology Strategist Mobile: © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Presentazioni simili
© 2024 SlidePlayer.it Inc.
All rights reserved.