SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
!
!"            #

                             $ %   &

    #       '      ()
                    )*

+ ,                      !

        '
-           '. /




                               2
%   0



                                             !                 "
                        #        $# %                # &       #
         # '                 (                             !       (
          "        )**           %+      ,!               -.           /
        0)         1      2       !                  0
        3            1 44
                        56       !
                        !        768 )96                  6 8 9    !


          "                                          5*
          "         !            )       :       !
               !
         )%+;           *        !               6 8<
            ,!                       "       :
           #
Why BT for Security?

                                             Industry-leading resources
 1,400 global practitioners           Comprehensive event                      Operating 9 world            Over 100 registered patents,
 with over 125 accredited            correlation platforms and                class SOCs globally            190 security papers and
   security professionals                 reporting tools                           24/7/365                     numerous books
         in the US


                                               With proven experience
   6,000 security              BT has delivered                                           Monitoring 550           Filters over 75,000
                              security services to       Over 1,500 firewalls            networks with data
 engagements in the                                                                                                viruses from client
                               over 75% of the           under management             from over 150 countries
   US since 1994                                                                                                  networks each month
                                 Fortune 500                                            and 335,000 devices


                                Delivering an integrated services portfolio
                                                                         Incorporating industry-
                                     From assessment to
                                                                          leading technology &
                                     mitigation, on a global
                                                                       services, with Counterpane
                                              basis
                                                                               at the core


                                                 Third party validation
                                                                                           Many accreditations, including BS
              Leadership position in                     Highest capability                27001/ISO 17799, SAS70-II, FIPS
          Gartner’s 2007 North American                   maturity rating                    140-2, CERT, FIRST, CLAS,
             MSSP Magic Quadrant                            from NSA                                 SANS GIAC
                                                                                                     and CHECK
1
1
           ,
2

1
1   '   3# 4




               5
1


1                 !                       5
    &   ' &                           " % "
              "           "   &               6

                      6
1
                                  6




                              6
1            ! 77
                )


1            !              -           /    & "   &
        !           &                    !             6

            - /                     &
    &                           6

                                    8 0




                        7
1 8 0 9& &

                      -       /
 $                                !           6
 $ 2 , :'
        ;      6
 $                        <
   -)) = => ; ;
   ) =(: 7 = = /
 $
     &            -       /
 $ ?&             "                   &


 $                                        ,   (6:
     .@   ( .@
           6A 6




                              8
18 0


               &

 $ 9
                   ! 6
 $     !
                         ! 6




           9
??? ; ( 7
     ) 67

 ??? ; ($
      )              !        &   ???
    ;( 7
     ) 67
     $ ( .@
        6:
     $ (
    ;( 7
     ) 67
     $ A .@
     $ A:
    ;( 7
     ) 67
     $ ( .@
        6:
     $ 77
    ;( 7
     ) 67
     $ ( .@
        6:
     $ A:
    ;( 7 '
     ) 67
     $ (6:    A .@
     $ B)
        )
                         10
; ( 7& 6 1 '+
 ) 67


 ; ( 7'
  ) 67                                  ???
 1 '+
 $               ;( 7
                 ) 67                         1 '+
 $ 1 '+                 "      '
   B)
    )                                         18 0
 $                          1 '+        !
           &
 1 '+

 $ ?                    &
        1 '+            -
                        1      /
               ;( 7 ,
               ) 67      6

                                   11
!

&       !

<           ! !
    5




                  12
1


    $                    ,
    $
    $       C

    $
    $   !            D




                13
1                          &


                      !$         !
          @   D                  !
1         8 0               6
0                            6
            !     =
    $ 1
    $ +
    $
                                     &   6



                           14
1         ?, &               &   - ? /
                                 1

              !                           6          !    ,       =
    $                            6
    $              6
    $         &        6
E                                             18 0        6
2              :
    $     :                                    '              !
                   F       -F/       6
    $     :                                          <6
2         B'
           (                              !-         B/
                                                      (
    $
    $ 2                          !F           - F/
?&                 " ?
                    1                &
                                     15
1 '+                               -
                                   1              /


 1
 1? 6
 $ 1 !              ;( 7"
                     ) 67          6
 $                                                1? D
 $ ?<                                            G
 8          '                 =1       (6
 1              1 (                                   ??? ; ( 7
                                                           ) 67
 1      '        !  H)                           I
 $     =3
       3        6    6 6 !3    3 &     3)>)3)
                                        ()3;B3           '   '   ' 'H '
                                                                     )    3




                                            16
1


1                                                     "    &
                                           '       ! ! 6
    $ %   &                                    1?
    $ %   &                !- 6
                             6                      1?     /
    $ %   &   +   '        !


1                     1?     =
    $                         ;( J
                               ) 67                  !-        /
                  -           /
    $         !                                !
    $             @           @        &           -F/
    $

                                  17
1       (


                         &          1 '+
                         ???D ; ( 7
                               ) 67
2                                    "'
                                      :       !"
!                    1
                %E               &        ?    -? /

    $   ?            '
    $   ?                !       '            -    '
            /                !




                                     18
1? 4


+                     "
       1?           B")>
                     7()6
+                       "
1?     I    B"))
             )(76




                    19
=            1


"
    ?<


                      ; ( 71 8 0
                       ) 67
    & 6(
     7                         ? &                 - ?/
                                                      6

      &
                  ,          ! 18 0                 &
                        !6
         =3
         3    6              6   3    3   K   K1    K     6

                                 20
?         &                   $                4


                  &                                        6
    $ %               5                                !
              &                                    6
    $         &
                      "                                        & 6
    $
                          "            F   2       " 5
                                                     &     6




                                  21
#                   #
$               3
$                                        !
$                                                !       ?
$           &       '                                &

$   %
$

        &
$           !               &       "
$                                                    18 0
$
$                               '            &
                                    22
0                            !&               6
$               !                                  8 0
        6
    &           "
                             !
$ %
            !                        !6
0 &                 &
$                                            ! "   "
        "   0                    6
0
$                   "                6
$       &                                @             6

                        23
,
$               @                 &                             !
                !&                 !                    6
$                        @
                                                                ?
            6
$                                  @                                6

    ,                                  '                    !
$       ,                         @
                     &                          &   6
$
                "            ?6
$   ,                                       &
    ,            6
                                       24
1       !                                       =
$
$                                         ?6
                             !   &              "
                     !               @
    &                                          ?6
            !                             ,
                         !           ?6




                25
&                     @ -
                        / 8 0
                         1               @   D   !6
                          =
$         18 0                   !   &
$           !        18 0                !
$ &              6




                            26
1



    9                     =
    $       9
    $   9
    $                              - ."   %   " 6/
    $                 3
    $
    $           9
            ?
    $             9       "
                & "



                              27
!$           , 7 6B
                          6 6(


                                  !   ?
$                    -
        /                &            ?6
F
    !
$                -
        /                &            ?6




            28
!

    ,                      !               "
                                       ?       6
        &                  @
        ?&                             !
                                   6
1                 =
$                              !                   ?
              !
$       ;( 7
         ) 67
$
$
          ,           76
                       )


                           29
$   , ( 67
                                            6 67

              &       '
                      !
$        "0                    "
        "                      ! " 6
?                 &
                                                    6
    &                                           &
,                              ,            6




                          30
&   $       , > 6B
                                      6 67


                                 "
    &   6
F                                    "        "
        &                        6
$
$   !
            !            !   &

$           3
$               &




                    31
7 67$ 1
         7                                          !


%
             @
$       ,
$                         3                         &       6
F                                 @                 ,       "
             3
            & 6
                  3                            "&
                                           6
F                 @           D                         - , 7 6>
                                                           6 ( /
$                                              &        @
    &                 6
                                      32
1           3                             $       , 7 6:
                                                   6 7

2           3                    &
                     ?
            6
    $            !
                !
    $                    !                        !

        ,                        6
E
    $           3
                6
    $ ?<        3                             3   &
            "                "        &
                     6
                                 33
#                                                     $       , 7 67
                                                               6 7
%                      "                 "        !                     "
                                                          ,
                        @                         6
2                      @            ,
     &
    $ 7 67%
       7
          @        ,                                          3
               &       6
    $ 7 67 F
       7                            @                     ,         "
               3
        & 6
    $ 7 67
       7                   3                     "&
                               6
    $ 7 67 F
       7                   @    D                                 - ,       7 6>
                                                                             ( /
                               &             @                    &             6
                                    34
'
$ L                    !
$
$
        & 6
(             )
$ .
$             ,   ,        6
$ L                    "       =

                  &            &



                  35
!                   !
$ 8
$ 2         +                   &       +        !
$ 9             ;( 7
                 ) 67


$               !                   !                    1
        1                   &           ! &                  !
                !           !


$ 0
$ ?                 '                                <           &
$                   &
                                            36
1


                                      "       "
        !"#"     "                        $   $ 6
    $                         !           6
    $        '                    !


    $    D           &




                         37
1


              1?
               8?
    $ E       !         !             8?
    $                   8?        "
2 1           1     (
    $     1   (
    $




                             38
1                                  %

0
    $       6                  6                                     6    6
1?               !                                               E
    $       =3
            3             !6                6                        6!       6
            !'      -              '                         /
    $       6        ! 6
                      '                                              6    6
        %       0          !
    $       6                      !6   3

    $                &
    $       6         6            3    3       K        6


                                                    39
40
!
                         6
    &                            6
,                            &
        &
                     &               &
            !




                41
#3 $


       !"   "       "        #

 %      &
  6 ! 6   3 3           !
  6   6 3       !




                        42

Contenu connexe

Tendances

A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...Acquanews
 
Document1
Document1Document1
Document1M3y3aM
 
Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresmeadriana barba
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewindalpsmsi
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเราพัน พัน
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The CloudNeustar, Inc.
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materialstinoserracompany
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandIlkka Kakko
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launchedYING CHIEH YU
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual engguestc4cf6a1
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate developmentLE HAI TRIEU
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseHeather Piwowar
 

Tendances (18)

A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
 
Susceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludismeSusceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludisme
 
Document1
Document1Document1
Document1
 
Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresme
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewind
 
Aesthetics in Software Testing
Aesthetics in Software TestingAesthetics in Software Testing
Aesthetics in Software Testing
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materials
 
Attività didattiche
Attività didatticheAttività didattiche
Attività didattiche
 
How to Trust the Cloud
How to Trust the CloudHow to Trust the Cloud
How to Trust the Cloud
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, Finland
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launched
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual eng
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
Bs 01
Bs 01Bs 01
Bs 01
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate development
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuse
 

En vedette

Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010Gabriela Makhoul
 
Grid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverterGrid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverterIAEME Publication
 
Dekho security overview
Dekho security overviewDekho security overview
Dekho security overviewjpradeep1982
 
This Is It
This Is ItThis Is It
This Is ItJon
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Dana Gardner
 

En vedette (7)

Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010Estatísticas do Security Leaders 2010
Estatísticas do Security Leaders 2010
 
Grid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverterGrid connected pv system using 9 level flying capacitor multilevel inverter
Grid connected pv system using 9 level flying capacitor multilevel inverter
 
Dekho security overview
Dekho security overviewDekho security overview
Dekho security overview
 
This Is It
This Is ItThis Is It
This Is It
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
Growing BYOD Trend Brings New Security Challenges for IT in Allowing Greater ...
 

Similaire à Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance

设计的约定
设计的约定设计的约定
设计的约定chen meng
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio templateJanine Soika
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenAshley Walker
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsurbed
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor NetworksDiego Pizzocaro
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010guest69ba7b
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industrykateimbach
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Componentsdsingleterry
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?abroekhuis
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Cisco Russia
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6umapst
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerSkills Matter
 

Similaire à Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance (20)

Pilot Interim Results
Pilot Interim ResultsPilot Interim Results
Pilot Interim Results
 
设计的约定
设计的约定设计的约定
设计的约定
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio template
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu Ahonen
 
Lenz Karte
Lenz KarteLenz Karte
Lenz Karte
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-experts
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor Networks
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industry
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Components
 
Javaee glassfish jcertif2010
Javaee glassfish jcertif2010Javaee glassfish jcertif2010
Javaee glassfish jcertif2010
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6
 
All about Apache ACE
All about Apache ACEAll about Apache ACE
All about Apache ACE
 
Ipad gump
Ipad gumpIpad gump
Ipad gump
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle Manager
 
Coanda Effect UAV
Coanda Effect UAVCoanda Effect UAV
Coanda Effect UAV
 
Self-Adaptation of Online Recommender Systems via Feed-Forward Controllers
Self-Adaptation of Online Recommender Systems via Feed-Forward ControllersSelf-Adaptation of Online Recommender Systems via Feed-Forward Controllers
Self-Adaptation of Online Recommender Systems via Feed-Forward Controllers
 

Plus de Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 

Plus de Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Ben Rothke Getting A Handle On Wireless Security For Pci Dss Compliance

  • 1. !
  • 2. !" # $ % & # ' () )* + , ! ' - '. / 2
  • 3. % 0 ! " # $# % # & # # ' ( ! ( " )** %+ ,! -. / 0) 1 2 ! 0 3 1 44 56 ! ! 768 )96 6 8 9 ! " 5* " ! ) : ! ! )%+; * ! 6 8< ,! " : #
  • 4. Why BT for Security? Industry-leading resources 1,400 global practitioners Comprehensive event Operating 9 world Over 100 registered patents, with over 125 accredited correlation platforms and class SOCs globally 190 security papers and security professionals reporting tools 24/7/365 numerous books in the US With proven experience 6,000 security BT has delivered Monitoring 550 Filters over 75,000 security services to Over 1,500 firewalls networks with data engagements in the viruses from client over 75% of the under management from over 150 countries US since 1994 networks each month Fortune 500 and 335,000 devices Delivering an integrated services portfolio Incorporating industry- From assessment to leading technology & mitigation, on a global services, with Counterpane basis at the core Third party validation Many accreditations, including BS Leadership position in Highest capability 27001/ISO 17799, SAS70-II, FIPS Gartner’s 2007 North American maturity rating 140-2, CERT, FIRST, CLAS, MSSP Magic Quadrant from NSA SANS GIAC and CHECK
  • 5. 1 1 , 2 1 1 ' 3# 4 5
  • 6. 1 1 ! 5 & ' & " % " " " & 6 6 1 6 6
  • 7. 1 ! 77 ) 1 ! - / & " & ! & ! 6 - / & & 6 8 0 7
  • 8. 1 8 0 9& & - / $ ! 6 $ 2 , :' ; 6 $ < -)) = => ; ; ) =(: 7 = = / $ & - / $ ?& " & $ , (6: .@ ( .@ 6A 6 8
  • 9. 18 0 & $ 9 ! 6 $ ! ! 6 9
  • 10. ??? ; ( 7 ) 67 ??? ; ($ ) ! & ??? ;( 7 ) 67 $ ( .@ 6: $ ( ;( 7 ) 67 $ A .@ $ A: ;( 7 ) 67 $ ( .@ 6: $ 77 ;( 7 ) 67 $ ( .@ 6: $ A: ;( 7 ' ) 67 $ (6: A .@ $ B) ) 10
  • 11. ; ( 7& 6 1 '+ ) 67 ; ( 7' ) 67 ??? 1 '+ $ ;( 7 ) 67 1 '+ $ 1 '+ " ' B) ) 18 0 $ 1 '+ ! & 1 '+ $ ? & 1 '+ - 1 / ;( 7 , ) 67 6 11
  • 12. ! & ! < ! ! 5 12
  • 13. 1 $ , $ $ C $ $ ! D 13
  • 14. 1 & !$ ! @ D ! 1 8 0 6 0 6 ! = $ 1 $ + $ & 6 14
  • 15. 1 ?, & & - ? / 1 ! 6 ! , = $ 6 $ 6 $ & 6 E 18 0 6 2 : $ : ' ! F -F/ 6 $ : <6 2 B' ( !- B/ ( $ $ 2 !F - F/ ?& " ? 1 & 15
  • 16. 1 '+ - 1 / 1 1? 6 $ 1 ! ;( 7" ) 67 6 $ 1? D $ ?< G 8 ' =1 (6 1 1 ( ??? ; ( 7 ) 67 1 ' ! H) I $ =3 3 6 6 6 !3 3 & 3)>)3) ()3;B3 ' ' ' 'H ' ) 3 16
  • 17. 1 1 " & ' ! ! 6 $ % & 1? $ % & !- 6 6 1? / $ % & + ' ! 1 1? = $ ;( J ) 67 !- / - / $ ! ! $ @ @ & -F/ $ 17
  • 18. 1 ( & 1 '+ ???D ; ( 7 ) 67 2 "' : !" ! 1 %E & ? -? / $ ? ' $ ? ! ' - ' / ! 18
  • 19. 1? 4 + " 1? B")> 7()6 + " 1? I B")) )(76 19
  • 20. = 1 " ?< ; ( 71 8 0 ) 67 & 6( 7 ? & - ?/ 6 & , ! 18 0 & !6 =3 3 6 6 3 3 K K1 K 6 20
  • 21. ? & $ 4 & 6 $ % 5 ! & 6 $ & " & 6 $ " F 2 " 5 & 6 21
  • 22. # # $ 3 $ ! $ ! ? $ & ' & $ % $ & $ ! & " $ 18 0 $ $ ' & 22
  • 23. 0 !& 6 $ ! 8 0 6 & " ! $ % ! !6 0 & & $ ! " " " 0 6 0 $ " 6 $ & @ 6 23
  • 24. , $ @ & ! !& ! 6 $ @ ? 6 $ @ 6 , ' ! $ , @ & & 6 $ " ?6 $ , & , 6 24
  • 25. 1 ! = $ $ ?6 ! & " ! @ & ?6 ! , ! ?6 25
  • 26. & @ - / 8 0 1 @ D !6 = $ 18 0 ! & $ ! 18 0 ! $ & 6 26
  • 27. 1 9 = $ 9 $ 9 $ - ." % " 6/ $ 3 $ $ 9 ? $ 9 " & " 27
  • 28. !$ , 7 6B 6 6( ! ? $ - / & ?6 F ! $ - / & ?6 28
  • 29. ! , ! " ? 6 & @ ?& ! 6 1 = $ ! ? ! $ ;( 7 ) 67 $ $ , 76 ) 29
  • 30. $ , ( 67 6 67 & ' ! $ "0 " " ! " 6 ? & 6 & & , , 6 30
  • 31. & $ , > 6B 6 67 " & 6 F " " & 6 $ $ ! ! ! & $ 3 $ & 31
  • 32. 7 67$ 1 7 ! % @ $ , $ 3 & 6 F @ , " 3 & 6 3 "& 6 F @ D - , 7 6> 6 ( / $ & @ & 6 32
  • 33. 1 3 $ , 7 6: 6 7 2 3 & ? 6 $ ! ! $ ! ! , 6 E $ 3 6 $ ?< 3 3 & " " & 6 33
  • 34. # $ , 7 67 6 7 % " " ! " , @ 6 2 @ , & $ 7 67% 7 @ , 3 & 6 $ 7 67 F 7 @ , " 3 & 6 $ 7 67 7 3 "& 6 $ 7 67 F 7 @ D - , 7 6> ( / & @ & 6 34
  • 35. ' $ L ! $ $ & 6 ( ) $ . $ , , 6 $ L " = & & 35
  • 36. ! ! $ 8 $ 2 + & + ! $ 9 ;( 7 ) 67 $ ! ! 1 1 & ! & ! ! ! $ 0 $ ? ' < & $ & 36
  • 37. 1 " " !"#" " $ $ 6 $ ! 6 $ ' ! $ D & 37
  • 38. 1 1? 8? $ E ! ! 8? $ 8? " 2 1 1 ( $ 1 ( $ 38
  • 39. 1 % 0 $ 6 6 6 6 1? ! E $ =3 3 !6 6 6! 6 !' - ' / $ 6 ! 6 ' 6 6 % 0 ! $ 6 !6 3 $ & $ 6 6 3 3 K 6 39
  • 40. 40
  • 41. ! 6 & 6 , & & & & ! 41
  • 42. #3 $ !" " " # % & 6 ! 6 3 3 ! 6 6 3 ! 42