+ All Categories
Home > Documents > Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access...

Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access...

Date post: 30-Mar-2015
Category:
Upload: lizette-botsford
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
19
Security and Privacy Women in Technology 2009 Mary Henthorn
Transcript
Page 1: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Security and PrivacyWomen in Technology

2009Mary Henthorn

Page 2: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Security◦Prevent loss, theft, or inappropriate access

Privacy◦Ensure freedom from intrusion or disturbance

Security Policies Protect Privacy

Security and Privacy

Page 3: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Who’s responsible?

Security and Privacy

Page 4: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Chief Executive Officer Chief Technology Officer Chief Security Officer IT Professional Other Business Mom Everyone

Women in IT

Page 5: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Physical

Logical

There Is No Perimeter

Page 6: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Cameras Logs Monitoring Breach notification letters Data backup tapes RFID

Security May Breach Privacy

Page 7: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Breach laws Freedom of information

$20 Million Settlement on VA Data Theft

State tape with data on 800,000 missing

TV News Crew – and You!

Page 8: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Know your enemies Classify your assets Identify constraints and parameters Assess risks Implement security, develop policies

Repeat!

What’s Your Strategy?

Page 9: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Physical◦Equipment failure◦Natural disaster◦Manmade disaster◦Theft

Logical◦Malware◦Denial of service◦Data corruption

Threats

Page 10: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Physical accessibility Physical weaknesses Location

People

Application weaknesses◦Memory, input, race, privilege, user interface

Inadequate access control

Vulnerabilities

Page 11: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Property◦Dollar value

Systems◦Criticality

Data◦Sensitivity

Classify Assets

Extremely

Critical

Critical

Not Critical

Page 12: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Laws

Regulations

Contracts

Policies

Constraints and Parameters

Page 13: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Violation of law Disclosure of personal information Violation of contracts, regulations, or policy Loss of revenue Misuse of resources Corruption of data Unavailable resources Loss of reputation Criminal or civil liability Loss of trust

Risks

Page 14: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

1. Use and update firewalls and anti-virus2. Properly setup and patch OS and applications3. Use appropriate authentication – passwords4. Lock unattended workstations5. Backup data6. Use the Internet with caution7. Be careful with email, social networking8. Review security regularly9. Respond to incidents appropriately10. Recognize security is everyone’s responsibility

Defensive Strategies

Page 15: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Layers of protection

◦Internet access point traffic analysis◦Router firewall◦Desktop firewall

◦Fence and secured gate◦Locked front door◦Locked office door

Defense in Depth

Page 16: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Variety of protection

◦Firewall◦Anti-virus◦Authentication

◦Security cameras◦Locked doors and file cabinets◦Scanners

Defense in Breadth

Page 17: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Be Informed, Stay Alert

Page 18: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Creative Office Security

Page 19: Women in Technology 2009 Mary Henthorn. Security Prevent loss, theft, or inappropriate access Privacy Ensure freedom from intrusion or disturbance Security.

Computer Emergency Readiness Team◦ www.uscert.gov

National Institute of Standards and Technology◦ www.nist.gov

Identity Theft◦ www.ftc.gov/idtheft

Arkansas Security◦ www.dis.arkansas.gov/security

Resources


Recommended