My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2002-06-26 CC Packet
Centerville
>
City Council
>
Agenda Packets
>
1996-2022
>
2002
>
2002-06-26 CC Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
5/12/2009 9:17:11 AM
Creation date
5/12/2009 9:14:50 AM
Metadata
Fields
Template:
General
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
216
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />CyberCrime & Information Security <br /> <br />What are the Threats? <br /> <br />. Hackers/Crackers <br />~ Bragging rights (City is a high promo target) <br />..,. Forthl'lU, to 1teaI, or to do hann <br /> <br />. Mslware (maIIdoua .softWaraIappJk:ations) <br />-0- W",ses (deIIVMed often by emaJl) <br />- Trojan HorsEIS (hldden In screen $aVers Dr games <br />and downloaded from the Intemet) <br />- Denial 01 Serv~ Aback. (your ODmputer Used to <br />llttack other.) <br />. Accident I Weather <br />- A.... tornado, lightening <br /> <br />How Secure is Secure Enough? <br /> <br />IiZI What are you protecting? <br />IiZI What's it worth to you or someone else? <br /> <br />~ From whom do you need to protect it? <br /> <br />Iil How do you protect It? <br /> <br />How to Prepare <br /> <br />. Assess Your RiskS <br /> <br />. Update & upgrade your disaster <br />recovery & business continuity plans <br /> <br />. Assign someone as security Officer <br /> <br />. Recognize information security as a risk <br />management expense <br /> <br />2002 lMC Annual Conference <br />Barbara GallolBrian Still <br /> <br />I <br /> <br />4 <br />
The URL can be used to link to this page
Your browser does not support the video tag.