SlideShare a Scribd company logo
1 of 11
+




    information security

    Fundamentals
+
    Secure what?

        Physical Assets
                            Ultimately, the goal is to protect information.
        Network/Commun     However, to accomplish that goal physical
         ications           assets must be secured and protected, and
                            users must be educated, trained and
        Data/Information   responsible.

        Users
+
    Evaluate

        What is being protected?
            hardware, software, confidential and proprietary information

        Why?
            your business image, business information, legal

        Value?
            Can you afford to lose “it”? Can you afford the legal costs?
+
    Layers of Protection

       Physical Location      Devices              Data
           Building               Flash Drive          Image Files
           Office                 Laptop               Text
           Home                   Workstation          Spreadsheet
           Car                    Smartphone           Database
           Briefcase              Tablet
           Data Center
+
    Hardware Physical Security

        Fire protection

        Climate control

        Physical security
+
    UPS – Keeping Things Running

        Uninterruptible Power Supply
            Battery
            Generator

        Not just computers
            Phones and TV
            A/C (select areas)
            Lighting (select areas)
+
    Network Infrastructure

        Wireless access

        User accounts

        Firewalls
            Physical
            Software

        Network monitoring software

        Physical protection
+
    Data Protection

        Backups
            Global
            User

        Anti-
            Malware
            Virus
            Adware
            Worms
            Trojans
+
    Data Protection

       Email
           Encrypted
           Digital Signatures
           Security Threats
             Phishing Mails

       Storage devices

       User authentication
           Do not share passwords or accounts
           POS and PMS systems
             Timekeeping
             Money
             PCI DSS(Payment Card Industry Data Security Standards)
              Compliance
+
    Making it Work

        Education/Training/Accountability
            Polices
            Procedures
            Documentation

        Management
            Accountability
            Checks and balances
+
    The end

       Conclusion

       Questions?

More Related Content

What's hot

Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentationfranbodh
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talkritupande
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraKishor Satpathy
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1RAMESHBABU311293
 
Digital Rights Management for Companies
Digital Rights Management for Companies Digital Rights Management for Companies
Digital Rights Management for Companies Canto
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these daysEssaysREasy
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldZach(ary) Eikenberry
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacythinkict
 
Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]Zawawi Mohamad
 
Smart Protection Network
Smart Protection NetworkSmart Protection Network
Smart Protection Networkkevin liao
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights ManagementRahul Neel Mani
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionalsEsteban Romero Frías
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloudBrian Honan
 

What's hot (20)

Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
What is IRM? bright talk
What is IRM?  bright talkWhat is IRM?  bright talk
What is IRM? bright talk
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital era
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Information security
Information securityInformation security
Information security
 
Spelling Test
Spelling TestSpelling Test
Spelling Test
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Digital Rights Management for Companies
Digital Rights Management for Companies Digital Rights Management for Companies
Digital Rights Management for Companies
 
Passwords are everywhere these days
Passwords are everywhere these daysPasswords are everywhere these days
Passwords are everywhere these days
 
Information security
Information securityInformation security
Information security
 
Psychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec FieldPsychological Security: Introducing the PsySec Field
Psychological Security: Introducing the PsySec Field
 
Computer security and_privacy
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
 
Digital physical security[present]
Digital physical security[present]Digital physical security[present]
Digital physical security[present]
 
Smart Protection Network
Smart Protection NetworkSmart Protection Network
Smart Protection Network
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Information security
Information securityInformation security
Information security
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloud
 

Viewers also liked

Who are_the_maori_
 Who are_the_maori_ Who are_the_maori_
Who are_the_maori_KRANKALIZED
 
Common Cause - Edinburgh
Common Cause - EdinburghCommon Cause - Edinburgh
Common Cause - EdinburghOxfamScotland
 
Martin Kirk presentation
Martin Kirk presentationMartin Kirk presentation
Martin Kirk presentationOxfamScotland
 
Alternative Energy Counselors Presentation
Alternative Energy  Counselors PresentationAlternative Energy  Counselors Presentation
Alternative Energy Counselors Presentationsonmilan
 
Business & Industry Career Expo
Business & Industry Career ExpoBusiness & Industry Career Expo
Business & Industry Career Exposonmilan
 

Viewers also liked (6)

Who are_the_maori_
 Who are_the_maori_ Who are_the_maori_
Who are_the_maori_
 
Common Cause - Edinburgh
Common Cause - EdinburghCommon Cause - Edinburgh
Common Cause - Edinburgh
 
Martin Kirk presentation
Martin Kirk presentationMartin Kirk presentation
Martin Kirk presentation
 
Alternative Energy Counselors Presentation
Alternative Energy  Counselors PresentationAlternative Energy  Counselors Presentation
Alternative Energy Counselors Presentation
 
Business & Industry Career Expo
Business & Industry Career ExpoBusiness & Industry Career Expo
Business & Industry Career Expo
 
Un dia a barcelona
Un dia a barcelonaUn dia a barcelona
Un dia a barcelona
 

Similar to Information security

FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical SecurityJorge Sebastiao
 
Technology 101 for small businesses
Technology 101 for small businessesTechnology 101 for small businesses
Technology 101 for small businessesRamon Ray
 
System Security
System SecuritySystem Security
System SecuritySaimaRafiq
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and complianceDean Iacovelli
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPandreasschuster
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.pptAnuraagAwasthi3
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessRobert Crane
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceDean Iacovelli
 

Similar to Information security (20)

FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
Technology 101 for small businesses
Technology 101 for small businessesTechnology 101 for small businesses
Technology 101 for small businesses
 
System Security
System SecuritySystem Security
System Security
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
Tech 101
Tech 101Tech 101
Tech 101
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Information protection and compliance
Information protection and complianceInformation protection and compliance
Information protection and compliance
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
apsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLPapsec 7 Golden Rules Data Leakage Prevention / DLP
apsec 7 Golden Rules Data Leakage Prevention / DLP
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
Information Security
Information SecurityInformation Security
Information Security
 
Focusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 BusinessFocusing on security with Microsoft 365 Business
Focusing on security with Microsoft 365 Business
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Turning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conferenceTurning the tables talk delivered at CCISDA conference
Turning the tables talk delivered at CCISDA conference
 
Byod
ByodByod
Byod
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

Information security

  • 1. + information security Fundamentals
  • 2. + Secure what?  Physical Assets Ultimately, the goal is to protect information.  Network/Commun However, to accomplish that goal physical ications assets must be secured and protected, and users must be educated, trained and  Data/Information responsible.  Users
  • 3. + Evaluate  What is being protected?  hardware, software, confidential and proprietary information  Why?  your business image, business information, legal  Value?  Can you afford to lose “it”? Can you afford the legal costs?
  • 4. + Layers of Protection  Physical Location  Devices  Data  Building  Flash Drive  Image Files  Office  Laptop  Text  Home  Workstation  Spreadsheet  Car  Smartphone  Database  Briefcase  Tablet  Data Center
  • 5. + Hardware Physical Security  Fire protection  Climate control  Physical security
  • 6. + UPS – Keeping Things Running  Uninterruptible Power Supply  Battery  Generator  Not just computers  Phones and TV  A/C (select areas)  Lighting (select areas)
  • 7. + Network Infrastructure  Wireless access  User accounts  Firewalls  Physical  Software  Network monitoring software  Physical protection
  • 8. + Data Protection  Backups  Global  User  Anti-  Malware  Virus  Adware  Worms  Trojans
  • 9. + Data Protection  Email  Encrypted  Digital Signatures  Security Threats  Phishing Mails  Storage devices  User authentication  Do not share passwords or accounts  POS and PMS systems  Timekeeping  Money  PCI DSS(Payment Card Industry Data Security Standards) Compliance
  • 10. + Making it Work  Education/Training/Accountability  Polices  Procedures  Documentation  Management  Accountability  Checks and balances
  • 11. + The end  Conclusion  Questions?

Editor's Notes

  1. Hour presentation in the past. Data is the first thing that most will suggest to protect. System should be set up before data is saved. Not after. The topic of computer security is broad covering everything from secure data carried on a laptop to server farms of hundreds of computers.
  2. Protect equipment, data, hardware, software, users from themselves. Don’t invest more in protection than you have value to protect.
  3. A special foam can be used for fire protection – Halon – but very expensive. Part of hardware protection is teaching users how to handle devices from plugging and unplugging USB drives of all types, to portability – not dropping or abusing laptops or workstations.
  4. Users must learn to protect their own data. One of the bigger problems I deal with.