14

Cybesecurity: Guidelines for Diplomats

Embed Size (px)

DESCRIPTION

Diplomats use computers in their offices and at home, and smartphones and tablets that support voice and data, and can run hundreds of applications. Unless due care is taken to protect such devices, the owners are a target of attacks and crime. None of the suggestions in this presentation are obligatory – just proven good practice.

Citation preview

Page 1: Cybesecurity: Guidelines for Diplomats
Page 2: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 3: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 4: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 5: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 6: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 7: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 8: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 9: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 10: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 11: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 12: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 13: Cybesecurity: Guidelines for Diplomats

Con

cept

: Ste

fano

Bal

di, E

d G

elbs

tein

Page 14: Cybesecurity: Guidelines for Diplomats