Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Data Security @ the personal level
Search
Arnon Rotem-Gal-Oz
PRO
April 20, 2017
Technology
0
28
Data Security @ the personal level
personal security briefing to employees (e.g for ISO 27001 compliance)
Arnon Rotem-Gal-Oz
PRO
April 20, 2017
Tweet
Share
More Decks by Arnon Rotem-Gal-Oz
See All by Arnon Rotem-Gal-Oz
Coding with AI
arnonrgo
PRO
0
3
Brownfield Architecture transformations
arnonrgo
PRO
0
140
Software architecture 101
arnonrgo
PRO
0
1.7k
Apache Spark - Overview
arnonrgo
PRO
0
46
Taking ML to production - a journey
arnonrgo
PRO
0
120
Topics in Distributed Systems
arnonrgo
PRO
0
33
Docker & Kubernetes
arnonrgo
PRO
0
27
Microservices it's deja vu all over again
arnonrgo
PRO
0
26
Big Data in the Cloud - Welcome to cost oriented design
arnonrgo
PRO
0
23
Other Decks in Technology
See All in Technology
OpenShiftでllm-dを動かそう!
jpishikawa
0
110
学生・新卒・ジュニアから目指すSRE
hiroyaonoe
2
620
CDKで始めるTypeScript開発のススメ
tsukuboshi
1
450
Frontier Agents (Kiro autonomous agent / AWS Security Agent / AWS DevOps Agent) の紹介
msysh
3
170
ブロックテーマでサイトをリニューアルした話 / 2026-01-31 Kansai WordPress Meetup
torounit
0
470
Digitization部 紹介資料
sansan33
PRO
1
6.8k
レガシー共有バッチ基盤への挑戦 - SREドリブンなリアーキテクチャリングの取り組み
tatsukoni
0
220
Context Engineeringの取り組み
nutslove
0
350
変化するコーディングエージェントとの現実的な付き合い方 〜Cursor安定択説と、ツールに依存しない「資産」〜
empitsu
4
1.4k
Introduction to Bill One Development Engineer
sansan33
PRO
0
360
CDK対応したAWS DevOps Agentを試そう_20260201
masakiokuda
1
310
配列に見る bash と zsh の違い
kazzpapa3
3
160
Featured
See All Featured
Prompt Engineering for Job Search
mfonobong
0
160
The AI Revolution Will Not Be Monopolized: How open-source beats economies of scale, even for LLMs
inesmontani
PRO
3
3k
Writing Fast Ruby
sferik
630
62k
Everyday Curiosity
cassininazir
0
130
Building Experiences: Design Systems, User Experience, and Full Site Editing
marktimemedia
0
410
Documentation Writing (for coders)
carmenintech
77
5.3k
Navigating Team Friction
lara
192
16k
How STYLIGHT went responsive
nonsquared
100
6k
Highjacked: Video Game Concept Design
rkendrick25
PRO
1
290
JAMstack: Web Apps at Ludicrous Speed - All Things Open 2022
reverentgeek
1
340
How to build an LLM SEO readiness audit: a practical framework
nmsamuel
1
640
HDC tutorial
michielstock
1
380
Transcript
Data Security (@ the personal level) Arnon Rotem-Gal-Oz
So what’s so important about “information security”?
Security is a real problem www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Information security? Not MY problem - IT should figure
it out
We’ve met the enemy and he is us
• Hardware • Software • People • Procedur es •
Data
Formal threat analysis The STRIDE model
Also see • OWASP https://www.owasp.org/ • https://www.owasp.org/index.php/Threat_Risk_Modeling#STRIDE • Common Criteria https://www.commoncriteriaportal.org/
Spoofing (of user identity) Tampering Repudiation Information
disclosure Denial of service Elevation of privilege
None
None
On the other hand…
None
None
Passwords
None
2016 is just as bad
None
None
Physical theft/loss
Protect your assets
Pay attention to email/text recipient address
Malware
It is up to you!
•Be mindful •Be careful who you trust •Secure your devices
•Report problems