Presentation is loading. Please wait.

Presentation is loading. Please wait.

Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Similar presentations


Presentation on theme: "Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security."— Presentation transcript:

1 Women in Technology 2009 Mary Henthorn

2 Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security Policies Protect Privacy

3 Whos responsible?

4 Chief Executive Officer Chief Technology Officer Chief Security Officer IT Professional Other Business Mom Everyone

5 Physical Logical

6 Cameras Logs Monitoring Breach notification letters Data backup tapes RFID

7 Breach laws Freedom of information $20 Million Settlement on VA Data Theft State tape with data on 800,000 missing

8 Know your enemies Classify your assets Identify constraints and parameters Assess risks Implement security, develop policies Repeat!

9 Physical Equipment failure Natural disaster Manmade disaster Theft Logical Malware Denial of service Data corruption

10 Physical accessibility Physical weaknesses Location People Application weaknesses Memory, input, race, privilege, user interface Inadequate access control

11 Property Dollar value Systems Criticality Data Sensitivity Extremely Critical CriticalNot Critical

12 Laws Regulations Contracts Policies

13 Violation of law Disclosure of personal information Violation of contracts, regulations, or policy Loss of revenue Misuse of resources Corruption of data Unavailable resources Loss of reputation Criminal or civil liability Loss of trust

14 1. Use and update firewalls and anti-virus 2. Properly setup and patch OS and applications 3. Use appropriate authentication – passwords 4. Lock unattended workstations 5. Backup data 6. Use the Internet with caution 7. Be careful with email, social networking 8. Review security regularly 9. Respond to incidents appropriately 10. Recognize security is everyones responsibility

15 Layers of protection Internet access point traffic analysis Router firewall Desktop firewall Fence and secured gate Locked front door Locked office door

16 Variety of protection Firewall Anti-virus Authentication Security cameras Locked doors and file cabinets Scanners

17

18

19 Computer Emergency Readiness Team www.uscert.gov National Institute of Standards and Technology www.nist.gov Identity Theft www.ftc.gov/idtheft Arkansas Security www.dis.arkansas.gov/security


Download ppt "Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security."

Similar presentations


Ads by Google