Download presentation
Presentation is loading. Please wait.
Published byLizette Botsford Modified over 10 years ago
1
Women in Technology 2009 Mary Henthorn
2
Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security Policies Protect Privacy
3
Whos responsible?
4
Chief Executive Officer Chief Technology Officer Chief Security Officer IT Professional Other Business Mom Everyone
5
Physical Logical
6
Cameras Logs Monitoring Breach notification letters Data backup tapes RFID
7
Breach laws Freedom of information $20 Million Settlement on VA Data Theft State tape with data on 800,000 missing
8
Know your enemies Classify your assets Identify constraints and parameters Assess risks Implement security, develop policies Repeat!
9
Physical Equipment failure Natural disaster Manmade disaster Theft Logical Malware Denial of service Data corruption
10
Physical accessibility Physical weaknesses Location People Application weaknesses Memory, input, race, privilege, user interface Inadequate access control
11
Property Dollar value Systems Criticality Data Sensitivity Extremely Critical CriticalNot Critical
12
Laws Regulations Contracts Policies
13
Violation of law Disclosure of personal information Violation of contracts, regulations, or policy Loss of revenue Misuse of resources Corruption of data Unavailable resources Loss of reputation Criminal or civil liability Loss of trust
14
1. Use and update firewalls and anti-virus 2. Properly setup and patch OS and applications 3. Use appropriate authentication – passwords 4. Lock unattended workstations 5. Backup data 6. Use the Internet with caution 7. Be careful with email, social networking 8. Review security regularly 9. Respond to incidents appropriately 10. Recognize security is everyones responsibility
15
Layers of protection Internet access point traffic analysis Router firewall Desktop firewall Fence and secured gate Locked front door Locked office door
16
Variety of protection Firewall Anti-virus Authentication Security cameras Locked doors and file cabinets Scanners
19
Computer Emergency Readiness Team www.uscert.gov National Institute of Standards and Technology www.nist.gov Identity Theft www.ftc.gov/idtheft Arkansas Security www.dis.arkansas.gov/security
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.