the information security crisis: practical steps for your
TRANSCRIPT
![Page 1: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/1.jpg)
Focus on Management - May 2019
The information security crisis: practical steps for your business
![Page 2: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/2.jpg)
Content
![Page 3: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/3.jpg)
Scott Culp – Microsoft, 2000
![Page 4: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/4.jpg)
1. If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.
![Page 5: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/5.jpg)
2. If a bad guy can alter the operating system on your computer, it’s not your computer anymore.
![Page 6: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/6.jpg)
3. If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore.
![Page 7: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/7.jpg)
4. If you allow a bad guy to run active content in your website, it’s not your website anymore.
![Page 8: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/8.jpg)
5. Weak passwords trump strong security.
![Page 9: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/9.jpg)
6. A computer is only as secure as the administrator is trustworthy.
![Page 10: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/10.jpg)
7. Encrypted data is only as secure as the decryption key.
![Page 11: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/11.jpg)
8. An out-of-date antimalware scanner is only marginally better than no scanner at all.
![Page 12: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/12.jpg)
9. Absolute anonymity isn’t practically achievable, online or offline.
![Page 13: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/13.jpg)
10. Technology is not a panacea.
![Page 14: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/14.jpg)
Cybercrime
Financial fraud crimesCyberterrorismCyberwarfareComputer as a targetComputer as a tool
![Page 15: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/15.jpg)
Patrick Kral – SANS - Incident Handler's Handbook, 2011
![Page 16: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/16.jpg)
Case Study – Business Email Compromise
![Page 17: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/17.jpg)
Campbell McKenzie – Incident Response Solutions, 2019
![Page 18: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/18.jpg)
Mitigation Strategies
![Page 19: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/19.jpg)
Password Managers
![Page 20: The information security crisis: practical steps for your](https://reader031.vdocuments.mx/reader031/viewer/2022012509/6186cb0fcf553013b15b9eac/html5/thumbnails/20.jpg)