3
SECURITY PLAN COST OF PARANOIA

Security Plan

Embed Size (px)

Citation preview

Page 1: Security Plan

SECURITY PLANCOST OF PARANOIA

Page 2: Security Plan

WHEN TO WORRY

• IF YOU DON’T HAVE A WATCH, GET ONE, YOU WILL WORRY ALL THE TIME

• MOST SEVERE SECURITY BREACHES HAPPEN FROM THE INSIDE, WHEN INTERVIEWING YOUR PERSONNEL SCREEN THEM FOR GOOD ETHICS AND MORALITY

• RISKS COULD COME FROM OUTSIDE IF THERE IS AN INTERNET CONNECTION OR AT LEAST A WIRE LINKING MACHINES

• MANY MACHINES ARE NOT ATTACKED BY HUMANS PER SE, THE ARE ATTACKED BY OTHER MACHINES PROGRAMMED BY PEOPLE

Page 3: Security Plan

LINES OF DEFENSE

• THE FIRST LINE OF DEFENSE ON COMPUTERS IS A STRONG PASSWORD THAT CHANGES EVERY THREE TO SIX MONTHS

• THE SECOND LINE OF DEFENSE IS ENCRYPTION OF DATA

• THE THIRD LINE OF DEFENSE IS SECURING THE SERVERS

• THE FOURTH LINE OF DEFENSE IS KEY CARDS TO SECURE AREAS

• THE FIFTH LINE OF DEFENSE IS USING A TOKEN FOR REAL SENSITIVE DATA

• THE SIXTH LINE OF DEFENSE ONLY PERTAINS TO MACHINES INTEGRATING DATA FROM OTHER AGENCIES OR PRIVATE FIRMS, USE A SECURE CONNECTION