Laserfiche WebLink
<br />CyberCrime & Information Security <br /> <br />What are the Threats? <br /> <br />. Hackers/Crackers <br />~ Bragging rights (City is a high promo target) <br />..,. Forthl'lU, to 1teaI, or to do hann <br /> <br />. Mslware (maIIdoua .softWaraIappJk:ations) <br />-0- W",ses (deIIVMed often by emaJl) <br />- Trojan HorsEIS (hldden In screen $aVers Dr games <br />and downloaded from the Intemet) <br />- Denial 01 Serv~ Aback. (your ODmputer Used to <br />llttack other.) <br />. Accident I Weather <br />- A.... tornado, lightening <br /> <br />How Secure is Secure Enough? <br /> <br />IiZI What are you protecting? <br />IiZI What's it worth to you or someone else? <br /> <br />~ From whom do you need to protect it? <br /> <br />Iil How do you protect It? <br /> <br />How to Prepare <br /> <br />. Assess Your RiskS <br /> <br />. Update & upgrade your disaster <br />recovery & business continuity plans <br /> <br />. Assign someone as security Officer <br /> <br />. Recognize information security as a risk <br />management expense <br /> <br />2002 lMC Annual Conference <br />Barbara GallolBrian Still <br /> <br />I <br /> <br />4 <br />