Laserfiche WebLink
<br />. .. <br />CyberCrime & Information Security <br /> <br />Scope of the Dangers <br /> <br />. City Information <br />- Could be stoten, then sold or <br />published (even privete or financial) <br />. Post Your Vulnerabilities <br />.. post a map of the water towers <br />and treatment facilities on your <br />website <br />. Employee uses e-mail system to <br />harass others <br /> <br />How Secure is Secure Enough? <br /> <br />Il2I What are you protecting? <br />bZI What's it wonh to you or someone else? <br /> <br />b!J From whom do you need to protect It? <br /> <br />o How do you protect it1 <br /> <br />What are the Threats? <br /> <br />. Vandals/Thleves (threat to physical <br />hardware) <br />. Staff AbuselMlsuse <br />... This Is the biggest threat <br />. Not aware 01 how or why processes must <br />be followed to protect data; <br />. Or dlsoruntled <br />- CreatlnglEn10rclng Policies & educating on <br />best practices serves as the best rl,k <br />mhlgation <br /> <br />2002 LMC Annual Conference <br />Barbara Gallo/Brian Still <br /> <br />~'f pthr uu.lrwil'J txt.b~ <br /> <br />3 <br />