Upload
wayne-clare
View
4
Download
1
Embed Size (px)
Citation preview
SECURITY PLANCOST OF PARANOIA
WHEN TO WORRY
• IF YOU DON’T HAVE A WATCH, GET ONE, YOU WILL WORRY ALL THE TIME
• MOST SEVERE SECURITY BREACHES HAPPEN FROM THE INSIDE, WHEN INTERVIEWING YOUR PERSONNEL SCREEN THEM FOR GOOD ETHICS AND MORALITY
• RISKS COULD COME FROM OUTSIDE IF THERE IS AN INTERNET CONNECTION OR AT LEAST A WIRE LINKING MACHINES
• MANY MACHINES ARE NOT ATTACKED BY HUMANS PER SE, THE ARE ATTACKED BY OTHER MACHINES PROGRAMMED BY PEOPLE
LINES OF DEFENSE
• THE FIRST LINE OF DEFENSE ON COMPUTERS IS A STRONG PASSWORD THAT CHANGES EVERY THREE TO SIX MONTHS
• THE SECOND LINE OF DEFENSE IS ENCRYPTION OF DATA
• THE THIRD LINE OF DEFENSE IS SECURING THE SERVERS
• THE FOURTH LINE OF DEFENSE IS KEY CARDS TO SECURE AREAS
• THE FIFTH LINE OF DEFENSE IS USING A TOKEN FOR REAL SENSITIVE DATA
• THE SIXTH LINE OF DEFENSE ONLY PERTAINS TO MACHINES INTEGRATING DATA FROM OTHER AGENCIES OR PRIVATE FIRMS, USE A SECURE CONNECTION