SlideShare une entreprise Scribd logo
1  sur  56
Information Security For Small Business by Julius Clark Sr., CISSP, CISA | October 13th 2009
About Me Julius Clark Sr. Location: Charlotte, NC Current home, been residing in Charlotte, NC for over 10 years Hometown Boston, Ma Profession Information Security Professional . BDPA Charlotte History 2010-2012	President 2007-2009 	President-Elect 2006-2004	VP of Education & SITES 2001-2003	Coordinator - High School Computer Competition Education ,[object Object]
MSIS in Information Security
BS in Electronic EngineeringCertifications ,[object Object]
Certified Information Systems Auditor (CISA)
Microsoft Certified System Engineer (MSCE). 2
Agenda Information Security for Small Business 3
Agenda  (Continued)Information Security for Small Business 4
Small Business Wholeness 5
Maslow’s Hierarchy of Needs Being aware of one’s Wholeness keeps bad things from happening.  A solid foundation must be built to advance. Understanding your environment, your health and activities helps one to continually perform a risk assessments and move to the next level. ,[object Object]
Esteem -  Recognition for Good Work
Love -  Acceptance
Safety & Security – Stability
Needs – Air , Food, Water, Shelter6
Maslow’s Business Comparison Maslow’s Hierarchy of Needs can be applied to building a successful business. IT Security is a foundation that businesses must build upon to lower IT Security risks and gain a competitive edge. ,[object Object]
Esteem -  Recognition in Market Place
Love -  Acceptance by Clients or Customers
Safety & Security –  IT Security & Insurance
Needs – Capital & People7
What is Information Security? 8
What Is Information Security? Protecting your information, technology, property, products and people, thus protecting your business.  The Information Security Triad is the foundation for  Information Security and is based on concepts and principles known as  CIA. ,[object Object]
Integrity
Availability9
What Is Information Security? Confidentiality  Concept of protecting information from improper disclosure and protecting the secrecy and privacy of sensitive data so that the intellectual property and reputation of an organization  is not damaged and that data related to individuals is not released in violation of regulations or the privacy policy of the organization. - From the CISSP® CBK® 10
What Is Information Security? Integrity  Addresses two objects, which are protecting data and processes from improper modification, and the ensuring the operations of the information is reliable and performing as expected. - From the CISSP® CBK® 11
What Is Information Security? Availability  Addresses two concepts, which are protecting data and processes from improper modification, and the  concept of ensuring the operations of the information  system is reliable and performing as expected. - From the CISSP® CBK®: 12
Importance Of Small Business Statistic: There are over 26 million small businesses in the U.S. Source: NIST 13
What Is At Stake? Your Business!  Your business is at risk of being damaged due to: ,[object Object]
Lawsuits
Reputation loss
loss of market share
Theft of its technology , resources and products
Denial of service attacks
Blackmail14
Who Are The Actors? Their Roles: ,[object Object]
Hacktivists
Cyber criminals
Information Warriors
Employees
Dumpster divers
Natural disasters
Terrorist activities15
Who Are The Actors? Malicious Code! ,[object Object]
Viruses
Denial of service
Turning your computer into a zombie aka “Bot”16
Cyber Crime In the news 17
Cyber Crime In the News 18
Cyber Crime Statistics! Insider threats are responsible for over 80% of small business issues. There are over 70,000 active viruses ; and exponentially growing Information Security threats can damage or destroy small business 33%  businesses with 100 employees or less had a computer incident Source: NIST 19
Cyber Crime Statistics! Small Business Cyber Crime Report 42 %  of businesses has a Laptop theft 44%  of businesses suffered from Insider Abuse 21% of businesses reported Denial of Service 50%  of businesses detected a viruses 20%  of business systems became a “Bot” Source: Computer Security Institute Survey 20
Cyber Crime Statistics! Reported Data Breaches 2007  - there were 445 data breaches reported  2008 – there were 656 data breaches reported 2009 – approx. 392 data breaches reported so far this year. Source: October 9, 2009 USAToday 21
Privacy Rights Clearinghouse www.privacyrights.org 22
Privacy Rights Clearinghouse www.privacyrights.org The 339,861,901 indicates the total number of records compromised 23
The components of Information Security 24
The Components of Information Security The Information Security Triad is the foundation for  Information Security and is based on concepts and principles known as  CIA. ,[object Object]
Processes

Contenu connexe

Tendances

Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 

Tendances (20)

Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 

En vedette

Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security Leo Welder
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small BusinessesVivastream
 
Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityLatha Menon
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Alison Gianotto
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesFundera
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small BusinessBrendanRose
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology ChallengesInfinity Technologies
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses TodayVelocity Network Solutions
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small BusinessesWilkins Consulting, LLC
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011Arjun V
 
Small business data security
Small business data securitySmall business data security
Small business data securityDavid Usher
 
Management information System and its types
Management information System and its typesManagement information System and its types
Management information System and its typesAbdul Rehman
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systemsBimbashree K.G
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Information security and protecting your business
Information security and protecting your businessInformation security and protecting your business
Information security and protecting your businessBizSmart Select
 

En vedette (20)

Small Business Guide to Information Security
Small Business Guide to Information Security Small Business Guide to Information Security
Small Business Guide to Information Security
 
Big Data for Small Businesses
Big Data for Small BusinessesBig Data for Small Businesses
Big Data for Small Businesses
 
Certificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and SecurityCertificate of Completion- Data Privacy and Security
Certificate of Completion- Data Privacy and Security
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses Security Bootcamp for Startups and Small Businesses
Security Bootcamp for Startups and Small Businesses
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Information security
Information securityInformation security
Information security
 
Robbery Prevention for Small Businesses
Robbery Prevention for Small BusinessesRobbery Prevention for Small Businesses
Robbery Prevention for Small Businesses
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
Small Business Technology Challenges
Small Business Technology ChallengesSmall Business Technology Challenges
Small Business Technology Challenges
 
5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today5 Network Security Threats Facing Businesses Today
5 Network Security Threats Facing Businesses Today
 
5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses5 Step Data Security Plan for Small Businesses
5 Step Data Security Plan for Small Businesses
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
Small business data security
Small business data securitySmall business data security
Small business data security
 
Management information System and its types
Management information System and its typesManagement information System and its types
Management information System and its types
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Information security and protecting your business
Information security and protecting your businessInformation security and protecting your business
Information security and protecting your business
 

Similaire à Information Security For Small Business

Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems- Mark - Fullbright
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your OrganizationRaffa Learning Community
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_HillDennis Hill
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 

Similaire à Information Security For Small Business (20)

Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
Business Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer SystemsBusiness Security Check Reducing Risks Your Computer Systems
Business Security Check Reducing Risks Your Computer Systems
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
2017-10-05 Mitigating Cybersecurity and Cyber Fraud risk in Your Organization
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_Hill
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
CCA study group
CCA study groupCCA study group
CCA study group
 

Plus de Julius Clark, CISSP, CISA

Infographic: From the Classroom to the Boardroom
Infographic: From the Classroom to the BoardroomInfographic: From the Classroom to the Boardroom
Infographic: From the Classroom to the BoardroomJulius Clark, CISSP, CISA
 
Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009
Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009
Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009Julius Clark, CISSP, CISA
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 

Plus de Julius Clark, CISSP, CISA (6)

BDPA ITDiversityCareers.com
BDPA ITDiversityCareers.comBDPA ITDiversityCareers.com
BDPA ITDiversityCareers.com
 
Infographic: From the Classroom to the Boardroom
Infographic: From the Classroom to the BoardroomInfographic: From the Classroom to the Boardroom
Infographic: From the Classroom to the Boardroom
 
Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009
Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009
Was Harriet Tubman A CISSP? - NSBE Alumni Arsenal - November 2009
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Information Security For Small Business

  • 1. Information Security For Small Business by Julius Clark Sr., CISSP, CISA | October 13th 2009
  • 2.
  • 4.
  • 6. Microsoft Certified System Engineer (MSCE). 2
  • 7. Agenda Information Security for Small Business 3
  • 8. Agenda (Continued)Information Security for Small Business 4
  • 10.
  • 11. Esteem - Recognition for Good Work
  • 12. Love - Acceptance
  • 13. Safety & Security – Stability
  • 14. Needs – Air , Food, Water, Shelter6
  • 15.
  • 16. Esteem - Recognition in Market Place
  • 17. Love - Acceptance by Clients or Customers
  • 18. Safety & Security – IT Security & Insurance
  • 19. Needs – Capital & People7
  • 20. What is Information Security? 8
  • 21.
  • 24. What Is Information Security? Confidentiality Concept of protecting information from improper disclosure and protecting the secrecy and privacy of sensitive data so that the intellectual property and reputation of an organization is not damaged and that data related to individuals is not released in violation of regulations or the privacy policy of the organization. - From the CISSP® CBK® 10
  • 25. What Is Information Security? Integrity Addresses two objects, which are protecting data and processes from improper modification, and the ensuring the operations of the information is reliable and performing as expected. - From the CISSP® CBK® 11
  • 26. What Is Information Security? Availability Addresses two concepts, which are protecting data and processes from improper modification, and the concept of ensuring the operations of the information system is reliable and performing as expected. - From the CISSP® CBK®: 12
  • 27. Importance Of Small Business Statistic: There are over 26 million small businesses in the U.S. Source: NIST 13
  • 28.
  • 32. Theft of its technology , resources and products
  • 35.
  • 43.
  • 46. Turning your computer into a zombie aka “Bot”16
  • 47. Cyber Crime In the news 17
  • 48. Cyber Crime In the News 18
  • 49. Cyber Crime Statistics! Insider threats are responsible for over 80% of small business issues. There are over 70,000 active viruses ; and exponentially growing Information Security threats can damage or destroy small business 33% businesses with 100 employees or less had a computer incident Source: NIST 19
  • 50. Cyber Crime Statistics! Small Business Cyber Crime Report 42 % of businesses has a Laptop theft 44% of businesses suffered from Insider Abuse 21% of businesses reported Denial of Service 50% of businesses detected a viruses 20% of business systems became a “Bot” Source: Computer Security Institute Survey 20
  • 51. Cyber Crime Statistics! Reported Data Breaches 2007 - there were 445 data breaches reported 2008 – there were 656 data breaches reported 2009 – approx. 392 data breaches reported so far this year. Source: October 9, 2009 USAToday 21
  • 52. Privacy Rights Clearinghouse www.privacyrights.org 22
  • 53. Privacy Rights Clearinghouse www.privacyrights.org The 339,861,901 indicates the total number of records compromised 23
  • 54. The components of Information Security 24
  • 55.
  • 58. The Components of Information Security People People are the weakest link of the three components of Information Security! 26
  • 59. The Components of Information Security Processes The operational aspects of small business 27
  • 60. The Components of Information Security Technology All of the tools, applications, software, and infrastructure that allows a business process to work and perform efficiently. 28
  • 61.
  • 62. Some will relate to expected employee practices for using business resources, such as telephones, computers, printers, fax machines, and Internet access.
  • 63. Legal and regulatory requirements may also require certain policies to be put in place and enforced.
  • 64. Policies for information, computer, network, and Internet security, should communicate clearly to employees the expectations that the business management has for appropriate use. 29
  • 65.
  • 66. Policies should be communicated clearly to each employee and all employees should sign a statement agreeing that they have read the policies, that they will follow the policies, and that they understand the possible penalties for violating those policies.
  • 67. This will help management to hold employees accountable for violation of the businesses policies.
  • 68. There should be penalties for disregarding business policies. And, those penalties should be enforced fairly and consistently for everyone in the business that violates the policies of the business. 30
  • 69. Business Continuity and Disaster Recovery Planning 31
  • 70. Highly Recommended Practices! NIST IT Security Fundamentals For Small Business Contingency and Disaster Recover planning considerations What happens if there is a disaster (flood, fire, tornado, etc) or a contingency (power outage, sewer backup, accidental sprinkler activation, etc)? Do you have a plan for restoring business operations during or after a disaster or a contingency? Since we all experience power outages or brownouts from time to time, do you have Uninterruptible Power Supplies (UPS) on each of your computers and critical network components? They allow you to work through short power outages and to save your data when the electricity goes off. Conduct an inventory of all information used in running your business. Do you know where each type of information is located (on which computer or server)? Have you prioritized your business information so that you know which type of information is most critical to the operation of your business – and, therefore, which type of information must be restored first in order to run your most critical operations? If you have never (or not recently) done a full inventory of your important business information, now is the time. For a very small business, this shouldn’t take longer than a few hours. For a larger small business, this might take from a day to a week or so. While you are doing this inventory, ensure that the information is prioritized relative to importance for the entire business, not necessarily for a single part of the business. When you have your prioritized information inventory (on an electronic spreadsheet), add three columns to address the kind of protection that each type of information needs. Some information will need protection for confidentiality, some for integrity, and some for availability. 32
  • 71. Identifying The Business’ critical assets 33
  • 72. Identifying The Business’ critical assets 34
  • 73. Identifying The Business’ critical assets 35
  • 74. Identifying The Business’ critical assets 36
  • 75.
  • 76. As you read/research your trade/professional publications, take note of the data security issues covered in these publications. Ask yourself “Is my business vulnerable to something like this? If so, what have others done that I could copy to protect my business?”
  • 77. As you network with your peers, talk cyber security issues. Give and get advice, hints, tips, etc.
  • 78. Make every effort to stay in touch with and on top of every threat or incident that does or could affect your business.
  • 79. Join InfraGard to get critical information about current threats in your local area (and to act as eyes and ears to help protect our nation!).
  • 80. (www.infragard.net - membership application form is online – membership is free in most areas of our nation)37
  • 82.
  • 85. Safeguarding Critical Assets People People are the weakest link of the three components of Information Security! 40
  • 86.
  • 87. Lock up laptops when they are not in use.
  • 88. Control who has access to your systems and networks, this includes cleaning crews. No one should be able to walk into your office space without being challenged by an employee.
  • 89.
  • 90. Do not provide access to all data to any employee,
  • 91. Only give employee enough access privileges necessary to perform job.
  • 92. Do not allow a single individual to both initiate and approve a transaction (financial or otherwise).41
  • 93. Safeguarding Critical Assets Processes The operational aspects of small business; needs checks and balances aka controls. 42
  • 94.
  • 95. Backup can be done inexpensively if copied to another hard drive that can hold 52 weeks of backups; 500GB should be sufficient for most businesses.
  • 96. Backups should be performed at a minimum weekly, but better if done daily.
  • 97. A full backup should be performed once a month and taken off site incase of a fire, flood, theft or other disaster.
  • 98. Portable USB Drive is recommended ; 1000GB.
  • 99.
  • 100. Employees should review computer usage policies on the 1st day of work.
  • 101. Train them about expectations concerning limited use of telephones, printers and other business resources.
  • 102. After training they should sign a a statement that they understand these policies and the penalties for violation of business policies.43
  • 103.
  • 104. To protect information and systems, employees should not operate computers with administrative privileges.
  • 105. Malicious code will gain the same privileges and install itself on a system if the user is using an account with administrative privileges.
  • 106.
  • 107. Employees should review computer usage policies on the 1st day of work..
  • 108. Train them about expectations concerning limited use of telephones, printers and other business resources.
  • 109. After training they should sign a a statement that they understand these policies and the penalties for violation of business policies. 44
  • 110.
  • 111. It is recommended to have the anti-virus software, spyware and malicious code software to update automatically; frequently.
  • 112.
  • 113. Ensure that your employees home PCs have a firewall installed between your/ their systems(s) and the Internet.
  • 114. Change the administrative password upon installation and regularly thereafter. Good idea to change the administrator name too. 45
  • 115.
  • 116. Set wireless device to not broadcast its Service Set Identifier (SSID).
  • 117. Recommended encryption is WiFi Protected Access 2 (WPA-2) using Advanced Encryption Standard (AES).
  • 119. It is recommended to configure systems to update automatically. 46
  • 120.
  • 121. Make sure that the firewall is turned on.
  • 122.
  • 123. It is recommended to configure systems to update automatically.
  • 124. Ensure employees home PCs are configured to update automatically as well.
  • 125. If you have many systems consider purchasing a product that can manage the process for your business.
  • 126. Update Microsoft Office regularly. 47
  • 127. Highly Recommended Practices! NIST IT Security Fundamentals For Small Business Security emails requesting sensitive information.  Security concerns about email attachments and emails requesting sensitive information. Do not open email attachments unless you are expecting the email with the attachment and you trust the sender. If you are not sure why someone sent you and email with attachments or links. Call them or email them back asking questions.  Be cautious of emails asking for sensitive personal or financial information – regardless of who the email appears to be from. No responsible business will ask for sensitive information in an email.  Security concerns about web links in email, instant messages, social media, or other means.  Do not click on links in email messages. Recently, scams are in the form of embedded links in emails. Once a recipient clicks on the link, malicious software (for example, key stroke logging software) is installed on the user’s computer. Don’t do it unless you know what the web link connects to and you trust the person who sent the email to you. 48
  • 128. Highly Recommended Practices! NIST IT Security Fundamentals For Small Business Security concerns about popup windows and other hacker tricks.  When connected to and using the Internet, do not respond to popup windows requesting that you to click “ok” for anything.  If a window pops up on your screen informing you that you have a virus or spyware and suggesting that you download an antivirus or antispyware program to take care of it, close the popup window by selecting the X in the upper right corner of the popup window.  Hackers are known to scatter infected USB drives with provocative labels in public places where their target business’s employees hang out, knowing that curious individuals will pick them up and take them back to their office system to “see what’s on them.” What is on them is generally malicious code which installs a spy program or remote control program on the computer. Teach your employees to not bring USB drives into the office and plug them into your business computers (or take them home and plug into their home systems). It is a good idea to disable the “AutoRun” feature for the USB ports on your business computers to help prevent such malicious programs from running. 49
  • 129. Highly Recommended Practices! NIST IT Security Fundamentals For Small Business Security considerations for web surfing.  No one should surf the web using a user account which has administrative privileges. It is best to set up a special account with “guest” (limited) privileges to avoid this vulnerability. Issues in downloading software from the Internet.  Do not download software from any unknown web page. Only those web pages belonging to businesses with which you have a trusted business relationship should be considered reasonably safe for downloading software. Such trusted sites would include the Microsoft Update web page where you would get patches and updates for various versions of the Windows operating system and Microsoft Office or other similar software. Most other web pages should be viewed with suspicion. Be very careful if you decide to use freeware or shareware from a source on the web. Most of these do not come with technical support and some are deliberately crippled so that you do not have the full functionality you might be led to believe will be provided. 50
  • 130. Highly Recommended Practices! NIST IT Security Fundamentals For Small Business Doing online business or banking more securely.  Online business/commerce/banking should only be done using a secure browser connection. This will normally be indicated by a small lock visible in the lower right corner of your web browser window. After any online commerce or banking session, erase your web browser cache, temporary internet files, cookies, and history so that if your system is compromised, that information will not be on your system to be stolen by the individual hacker or malware program.  Recommended personnel practices in hiring employees.  When hiring new employees, conduct a comprehensive background check before making a job offer. Ensure that you do criminal background checks on all prospective new employees. If possible, it is a good idea to do a credit check on prospective employees. This is especially true if they will be handling your business funds. Do your homework – call their references and former employers. Note: It is also an excellent idea for you the business owner to do a background check of yourself. Many people become aware that they are victims of identity theft only after they do a background check on themselves and find arrest records and unusual previous addresses where they never lived. 51
  • 131. Highly Recommended Practices! NIST IT Security Fundamentals For Small Business How to dispose of old computers and media.  When disposing of old business computers, remove the hard disks and destroy them. The destruction can be done by taking apart the disk and beating the hard disk platters with a hammer. It is very common for small businesses to discard old computers and media without destroying the computers’ hard disks or the media. Sensitive business and personal information is regularly found on computers purchased on Ebay, thrift shops, Goodwill, etc, much to the embarrassment of the small businesses involved (and much to the annoyance of customers or employees whose sensitive data is compromised). Consider Using Full Disk Encryption if you handle sensitive data and information. 52
  • 132. Highly Recommended Practices! NIST IT Security Fundamentals For Small Business How to protect against Social Engineering.  Social engineering is a personal or electronic attempt to obtain unauthorized information or access to systems/facilities or sensitive areas by manipulating people. The social engineer researches the organization to learn names, titles, responsibilities, and publically available personal identification information. Then the social engineer usually calls the organization’s receptionist or help desk with a believable, but made-up story designed to convince the person that the social engineer is someone in, or associated with, the organization and needs information or system access which the organization’s employee can provide and will feel obligated to provide.  Train employees to protect against social engineering techniques, employees must be taught to be helpful, but vigilant when someone calls in for help and asks for information or special system access. The employee must first authenticate the caller by asking for identification information that only the person who is in or associated with the organization would know.  If the individual is not able to provide such information, then the employee should politely, but firmly refuse to provide what has been requested by the social engineer. The employee should then notify management of the attempt to obtain information or system access. 53
  • 133. Information Security Resources for Small Business Small Business Information Security : The Fundamentals (Security Guide for Small Business)http://csrc.nist.gov/publications/drafts/ir-7621/draft-nistir-7621.pdfSmall Business C enter Documentshttp://csrc.nist.gov/groups/SMA/sbc/library.html InfraGard http://www.infragard.net 54
  • 134.
  • 137. References: Surviving Security Surviving Security—How to Integrate People, Process and Technology, 2nd Edition http://www.isaca.org/Template.cfm?Section=Home&CONTENTID=27320&TEMPLATE=/ContentManagement/ContentDisplay.cfmIntroduction to the Business Model for Information Security , 2009 ISACAhttp://www.isaca.orgSmall Business Information Security : The Fundamentals (Security Guide for Small Business)http://csrc.nist.gov/publications/drafts/ir-7621/draft-nistir-7621.pdfSmall Business C enter Documentshttp://csrc.nist.gov/groups/SMA/sbc/library.htmlI nterHack,- Information Security: Friend or Foe, 2002http://web.interhack.com/publications/whatis-security.pdf               56