CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

Size: px
Start display at page:

Download "CUSTOMER INFORMATION SECURITY AWARENESS TRAINING"

Transcription

1 CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

2 IN T RO DUCT ION T h i s c o u r s e i s d e s i g n e d to p r o v i d e yo u w i t h t h e k n o w l e d g e to p r o t e c t y o u r p e r s o n a l a n d m o s t l y f i n a n c i a l i n f o r m a t i o n a n d s e n s i t i v e d a t a f r o m cyber t h r e a t s. In your daily activities, yo u r o u t i n e l y p r o v i d e s e n s i t i v e d a t a l i k e n a m e s, S o c i a l S e c u r i t y n u m b e r s, a n d o t h e r c o n f i d e n t i a l r e c o r d s to s u c c e s s f u l l y c a r r y o u t yo u r d ay - to - d ay a c t i v i t i e s. YO U a r e c r i t i c a l to t h e d e f e n s e a n d p r o t e c t i o n o f s e n s i t i v e i n f o r m a t i o n s y s t e m s a n d d a t a. Yo u w i l l b e w e l l e q u i p p e d to p r o t e c t t h e s e n s i t i v e d a t a b y i n c o r p o r a t i n g t h e i n f o r m a t i o n t e c h n o l o g y s e c u r i t y o b j e c t i v e s l e a r n e d i n t h i s p r e s e n t a t i o n i n to yo u r d a i l y activities.

3 IN T HES E T IM ES O F GR EAT C HA N GE C h a n g e Yo u r P e r c e p t i o n S e c u r i t y i s a n e c e s s i t y - n o t a b u r d e n. B e a L e a r n e r U n d e r s t a n d s e c u r i t y t h r e a t s a n d v u l n e r a b i l i t i e s. B e P r o a c t i v e A d o p t g o o d s e c u r i t y h a b i t s. S e e k H e l p a n d A d v i c e A d v a n c e d t e c h n o l o g i e s r e q u i r e e d u c a te d u s e r s. Information Security is YOUR responsibility.

4 W HAT IS IN FO R MAT ION S EC U RIT Y? I n f o r m a t i o n S e c u r i t y ( I S ) T h e p r o t e c t i o n o f i n f o r m a t i o n a n d i n f o r m a t i o n s y s t e m s f r o m u n a u t h o r i z e d a c c e s s, u s e, d i s c l o s u r e, d i s r u p t i o n, m o d i f i c a t i o n, o r d e s t r u c t i o n i n o r d e r to p r o v i d e c o n f i d e n t i a l i t y, i n t e g r i t y, a n d a v a i l a b i l i t y. I n f o r m a t i o n s e c u r i t y i s a c h i e v e d t h r o u g h i m p l e m e n t i n g t e c h n i c a l, m a n a g e m e n t, a n d o p e r a t i o n a l m e a s u r e s d e s i g n e d to p r o t e c t t h e c o n f i d e n t i a l i t y, i n t e g r i t y a n d a v a i l a b i l i t y o f i n f o r m a t i o n. T h e g o a l o f a n I n f o r m a t i o n S e c u r i t y P r o g r a m i s to u n d e r s t a n d, m a n a g e, a n d r e d u c e t h e r i s k to i n f o r m a t i o n u n d e r t h e c o n t r o l o f t h e o r g a n i z a t i o n.

5 T HE C IA C O N C EPT Confidentiality Protecting information from unauthorized disclosure to people or processes. Defending information systems and resources from malicious, unauthorized users to ensure accessibility by authorized users. Availability Integrity Assuring the reliability and accuracy of information and IT resources.

6 C IA Yo u r b a n k AT M i s a g o o d e x a m p l e o f a n i n f o r m a t i o n s y s t e m t h a t m u s t b e c o n f i d e n t i a l, a v a i l a b l e, a n d h a v e i n t e g r i t y. I m a g i n e i f yo u r a c c o u n t wa s n o t k e p t c o n f i d e n t i a l a n d s o m e o n e e l s e wa s a b l e to a c c e s s i t w h e n t h ey a p p r o a c h e d t h e AT M. H o w m u c h d a m a g e c o u l d b e d o n e? I m a g i n e i f e v e r y t i m e yo u w e n t to t h e AT M, t h e b a l a n c e i t d i s p l aye d wa s i n a c c u r a t e ( i n t e g r i t y ). H o w c o u l d t h e p o o r i n t e g r i t y o f yo u r b a l a n c e i n f o r m a t i o n a d v e r s e l y a f f e c t yo u r a c c o u n t m a n a g e m e n t? I m a g i n e i f yo u r b a n k s AT M wa s r a r e l y a v a i l a b l e w h e n yo u n e e d e d i t. Wo u l d yo u c o n t i n u e to u s e t h a t b a n k?

7 D EF INING IT S EC U RIT Y I T s e c u r i t y i s a b o u t p r o t e c t i n g i n f o r m a t i o n a s s e t s b y e f f e c t i v e l y m a n a g i n g r i s k s. H o w m u c h p r o t e c t i o n d e p e n d s o n t h e r i s k a n d m a g n i t u d e o f h a r m t h a t c o u l d r e s u l t i f t h e d a t a w e r e l o s t, m i s u s e d, d i s c l o s e d, o r m o d i f i e d. A s s e t s a r e c o m p u t e r s a n d d a t a. R i s k s a r e m a n a g e d b y e v a l u a t i n g : Vu l n e r a b i l i t i e s - We a k n e s s e s i n a c o m p u t e r o r n e t w o r k t h a t l e a v e i t s u s c e p t i b l e to p o t e n t i a l e x p l o i t a t i o n s u c h a s u n a u t h o r i z e d u s e o r a c c e s s. T h r e a t s - t h e m e a n s t h r o u g h w h i c h a w e a k n e s s c a n b e e x p l o i te d to a d v e r s e l y a f f e c t a n e t w o r k o r s u p p o r t e d s y s t e m s.

8 W HAT IS A C O M P U T ER IN C ID ENT? C o m p u te r i n c i d e n t s i n c l u d e c o m p r o m i s e d s y s t e m s, a t t a c k s m a d e o n o r f r o m t h e B a n k s c o m p u t e r s, i l l e g a l o r i n a p p r o p r i a t e u s e, a n d a b u s e o f c o m p u t e r p r i v i l e g e s. A s s o o n a s p o s s i b l e, r e p o r t t h e s e i n c i d e n t s to t h e a p p r o p r i a te p e r s o n n e l. E x a m p l e s o f c o m p u t e r i n c i d e n t s : Yo u t h i n k s o m e o n e i s u s i n g a c o m p u t e r w i t h o u t a u t h o r i z a t i o n. Yo u r f i l e s l o o k l i k e s o m e o n e h a s b e e n t a m p e r i n g w i t h t h e d a t a. S e n s i t i v e i n f o r m a t i o n h a s b e e n d i s c l o s e d. Yo u r c o m p u t e r i s a c t i n g s t r a n g e.

9 IN FO RMATION S EC U RIT Y PO LIC Y AN D GOVER NANCE Fe d e r a l r e g u l a t i o n s r e q u i r e a l l u s e r s o f i n f o r m a t i o n t e c h n o l o g y s y s t e m s to c o n f o r m w i t h c e r t a i n b a s i c r e q u i r e m e n t s a n d r e c e i v e a n n u a l I T s e c u r i t y a wa r e n e s s t r a i n i n g G L B A - T h e G r a m m L e a c h B l i l ey A c t r e q u i r e s f i n a n c i a l i n s t i t u t i o n s to m a i n t a i n p r o c e d u r e s t h a t p r o t e c t c o n s u m e r s p e r s o n a l f i n a n c i a l i n f o r m a t i o n

10 W HAT IS A C Y BER AT TAC K? A m a l i c i o u s a t t e m p t to u n d e r m i n e o r c o m p r o m i s e t h e f u n c t i o n o f a c o m p u t e r - b a s e d s y s t e m, o r a t t e m p t to t r a c k t h e o n l i n e m o v e m e n t s o f i n d i v i d u a l s w i t h o u t t h e i r p e r m i s s i o n. A t t a c k s a r e P e r v a s i v e a n d C o m m o n The Depar tment of Defense (DoD) detects three million unauthorized scans - or attempts by possible intruder s to access of ficial networks ever y day. A t t a c k s C a n b e C o s t l y The Ponemon Institute benchmarked 50 organizations - the median annualized cost of a cyber attack is $ 5.9M/year. A t t a c k s D o n t H a v e to b e C o s t l y According to the Ponemon Institute, a strong security posture moderates the cost of cyber attacks.

11 P R EVENT ING C Y BER AT TAC KS I n f o r m a t i o n a s s e t s h av e b e c o m e a g r e a t s o u r c e o f va l u e a n d w e a l t h f o r i n d i v i d u a l s w i t h m a l i c i o u s i n t e n t. C y b e r a t t a c k s a r e a d a n g e r o u s t h r e a t to t h e n e t w o r k s a n d d a t a, h o w e v e r t h e r e a r e s o m e s t e p s yo u c a n t a ke to p r e v e n t t h e m. E n s u r e t h a t a n t i - v i r u s s o f t wa r e a n d p a t c h e s a r e u p to d a t e o n a l l c o m p u t e r s a n d l a p to p s. E n s u r e t h a t l a p to p s a n d m o b i l e d e v i c e s a r e e n c r y p t e d w i t h t r u s t e d s o f t wa r e. N e v e r s h a r e p a s s w o r d s w i t h a nyo n e. Be vigilant about s l o w r u n n i n g a p p l i c a t i o n s. I t c o u l d b e a s i g n o f a c o m p u t e r v i r u s.

12 C U R R ENT & EM ERGING C Y BER T HR EAT S H o s t i l e a t t a c k s d e s i g n e d to e s t a b l i s h a f o o t h o l d w i t h i n t h e i n f r a s t r u c t u r e o f t a r g e t o r g a n i z a t i o n s r e m a i n t h e m o s t s e r i o u s c y b e r t h r e a t. E x f i l t r a t i o n o f d a t a t h r o u g h t h e s e a t t a c k s h a s b e e n c h a r a c t e r i z e d a s t h e b i g g e s t t r a n s f e r o f w e a l t h i n t e r m s o f i n t e l l e c t u a l p r o p e r t y i n h i s to r y. M o b i l e d e v i c e s e c u r i t y r e p r e s e n t s a n u n p r e c e d e n t e d l ay e r o f c o m p l e x i t y a n d c o n n e c t i v i t y. S m a r t p h o n e s a r e p o w e r f u l, u b i q u i to u s a n d h av e e x c e e d e d t h e s a l e s o f P C s. T h ey h av e b e c o m e t h e m o s t p o p u l a r m e a n s to a c c e s s t h e I n t e r n e t. A t t a c ke r s s e e t h e m a s a g a t e w ay i n to n e t w o r k s to a c c e s s s e n s i t i v e d a t a. C l o u d s o f f e r s u b s t a n t i a l g a i n s f o r c o s t s av i n g s, p r o d u c t i v i t y a n d s e c u r i t y ; h o w e v e r t h ey a r e a l s o a t t r a c t i v e t a r g e t s f o r a t t a c k e r s. C l o u d s r e p r e s e n t a n o t h e r a l t e r n a t i v e to h o s t i n g a n a p p l i c a t i o n a n d s to r i n g d a t a, a n d m u s t b e s e c u r e.

13 C O M M ON C Y BER S ECURIT Y T HR EAT S M a l wa r e V i r u s e s I n s i d e r t h r e a t s S py wa r e H a c ke r s T h e f t o r l o s s o f s e n s i t i v e d a t a I n t e r n e t a n d e m a i l s c a m s P h i s h i n g I d e n t i t y t h e f t

14 C Y BER C R IM E C y b e r c r i m e r e f e r s to a ny c r i m e t h a t i n v o l v e s a c o m p u t e r a n d a n e t w o r k. O f f e n s e s a r e p r i m a r i l y c o m m i t t e d t h r o u g h t h e I n t e r n e t. C o m m o n e x a m p l e s o f c y b e r c r i m e i n c l u d e : Credit card fraud, Spam, and Identity thef t. I n f o r m a t i o n a n d i n f o r m a t i o n s y s t e m a s s e t s f r o m f i n a n c i a l i n s t i t u t i o n s a r e a h i g h v a l u e t a r g e t. C r i m i n a l s, t e r r o r i s t s, a n d n a t i o n s t a t e s w i t h m a l i c i o u s i n t e n t w o r k d a i l y to s t e a l, d i s r u p t, a n d c h a n g e i n f o r m a t i o n s y s t e m s a t f i n a n c i a l i n s t i t u t i o n s.

15 PA SSWO R DS A s t r o n g p a s s w o r d f o r yo u r n e t w o r k a c c o u n t a n d o t h e r a p p l i c a t i o n s i s a b a s i c p r o t e c t i o n m e c h a n i s m. Tw o r u l e s f o r s t r o n g e r p a s s w o r d s : Create a password at least eight character s in length. Password should contain at least one each: Ca pi ta l l ette r Lowe rca s e l ette r Num be r Spe ci a l c h a ra cte r ( %,^,*,? ) U s e a p a s s p h r a s e. Use the initials of a song or phrase to create a unique password Example: Take me out to the ballgame! becomes Tmo2tBG! C o m m i t p a s s w o r d s to m e m o r y. D O N O T ke e p p a s s w o r d s n e a r yo u r c o m p u t e r o r o n yo u r d e s k.

16 PA SSWO R D P ROT ECT IO N T IP S C h a n g e p a s s w o r d s o f t e n. M o s t a p p l i c a t i o n s w i l l r e m i n d yo u to d o t h i s b u t i f n o t, s e t u p a r e m i n d e r i n yo u r c a l e n d a r a t l e a s t e v e r y 6 0 d ay s. C h a n g e p a s s w o r d i m m e d i a te l y i f yo u s u s p e c t i t i s c o m p r o m i s e d. C r e a te a d i f f e r e n t p a s s w o r d f o r e a c h s y s t e m o r a p p l i c a t i o n. D o n o t r e u s e p a s s w o r d s. D o n o t u s e g e n e r i c i n f o r m a t i o n t h a t c a n b e e a s i l y o b t a i n e d l i k e f a m i l y m e m b e r n a m e s, p e t n a m e s, b i r t h d a t e s, p h o n e n u m b e r s, v e h i c l e i n f o r m a t i o n, e t c. N E V E R s h a r e yo u r p a s s w o r d w i t h a nyo n e.

17 TA ILG AT ING W h e n a n u n a u t h o r i z e d p e r s o n f o l l o w s s o m e o n e to a r e s t r i c t e d a r e a w i t h o u t t h e c o n s e n t o f t h e a u t h o r i z e d p e r s o n. N e v e r a l l o w a nyo n e to f o l l o w yo u i n to a s e c u r e a r e a w i t h o u t p r o p e r a u t h o r i z a t i o n. B e a wa r e o f p r o c e d u r e s f o r e n t e r i n g a s e c u r e a r e a, s e c u r i n g yo u r w o r k s t a t i o n w h e n yo u l e av e t h e o f f i c e, a n d s e c u r i n g yo u r w o r k s t a t i o n d u r i n g e m e r g e n c i e s. D o n o t b e a f r a i d to c h a l l e n g e o r r e p o r t a nyo n e w h o d o e s n o t a p p e a r to b e a n a u t h o r i z e d i n d i v i d u a l / v i s i to r. E s c o r t v i s i to r s to a n d f r o m yo u r o f f i c e a n d a r o u n d t h e f a c i l i t y. R e p o r t a ny s u s p i c i o u s a c t i v i t y to t h e p r o p e r p e r s o n n e l.

18 P HYS ICAL S EC U RIT Y P ROT EC T ION T IP S L o c k yo u r c o m p u t e r w h e n i t i s n o t i n u s e b y u s i n g C T R L + A LT + D E L. S to r e a n d t r a n s p o r t r e m o v a b l e m e d i a s u c h a s C D s, DV D s, f l a s h d r i v e s, a n d e x t e r n a l h a r d d r i v e s i n a s e c u r e m a n n e r to p r e v e n t t h e f t o r l o s s. O n l y c o n n e c t b a n k - a u t h o r i z e d r e m o v a b l e m e d i a d e v i c e s. E n c r y p t a l l d e v i c e s w h i c h c o n t a i n s e n s i t i v e i n f o r m a t i o n. Ke e p s e n s i t i v e i n f o r m a t i o n o u t o f s i g h t w h e n v i s i to r s a r e p r e s e n t. Q u i c k l y r e t r i e v e f a x e s a n d p r i n t j o b s c o n t a i n i n g s e n s i t i v e i n f o r m a t i o n.

19 EM A IL S EC U R IT Y E m a i l s t h a t c o n t a i n s e n s i t i v e d a t a m u s t b e e n c r y p t e d b e f o r e b e i n g s e n t.

20 S O C IAL EN GIN EER ING T h e s e i n d i v i d u a l s m ay l o o k t r u s t w o r t h y, b u t i n f a c t a r e s o p h i s t i c a te d c y b e r c r i m i n a l s. T h ey u s e s o c i a l e n g i n e e r i n g t e c h n i q u e s to o b t a i n yo u r p e r s o n a l i n f o r m a t i o n, a c c e s s s e n s i t i v e g o v e r n m e n t i n f o r m a t i o n, a n d e v e n s t e a l yo u r i d e n t i t y.

21 S O C IAL EN GIN EER ING S o c i a l e n g i n e e r i n g i s c l a s s i c a l l y d e f i n e d a s t h e a r t o f m a n i p u l a t i n g a n d e x p l o i t i n g h u m a n b e h a v i o r to g a i n u n a u t h o r i z e d a c c e s s to s y s t e m s a n d i n f o r m a t i o n f o r f r a u d u l e n t o r c r i m i n a l p u r p o s e s. S o c i a l e n g i n e e r i n g a t t a c k s a r e m o r e c o m m o n a n d m o r e s u c c e s s f u l t h a n c o m p u t e r h a c k i n g a t t a c k s a g a i n s t t h e n e t w o r k. S o c i a l e n g i n e e r s w i l l g a i n i n f o r m a t i o n b y e x p l o i t i n g t h e d e s i r e o f h u m a n s t o t r u s t a n d h e l p e a c h o t h e r. C r i m i n a l s c a n b y p a s s n e t w o r k f i r e wa l l s a n d b u i l d i n g a c c e s s s y s t e m s to s t e a l d a t a a n d d i s r u p t o p e r a t i o n s w i t h a s u c c e s s f u l s o c i a l e n g i n e e r i n g a t t a c k.

22 S O C IAL EN GIN EER ING S o c i a l e n g i n e e r i n g a t t a c k s a r e b a s e d o n n a t u r a l h u m a n d e s i r e s l i k e : Tr u s t D e s i r e to h e l p D e s i r e to a v o i d c o n f l i c t Fe a r C u r i o s i t y I g n o r a n c e a n d c a r e l e s s n e s s

23 S O C IAL EN GIN EER ING S o c i a l e n g i n e e r s wa n t a ny i n f o r m a t i o n t h a t w i l l g i v e t h e m a c c e s s to s e c u r e s y s t e m s o r f a c i l i t i e s. C o m m o n t a r g e t s a r e : P a s s wo r d s S e c u r i t y b a d g e s A c c e s s to s e c u r e a r e a s o f t h e b u i l d i n g S m a r t p h o n e s Wa l l e t s Pe r s o n a l i n f o r m a t i o n

24 C O M BAT S O C IAL EN GINEERING B e c a r e f u l a b o u t d i s c u s s i n g w o r k, yo u r f a m i l y, o r p e r s o n a l i n f o r m a t i o n i n p u b l i c. Yo u n e v e r k n o w w h o i s l i s t e n i n g. B e c a u t i o u s o f t h e p e r s o n a l i n f o r m a t i o n t h a t yo u s h a r e o n s o c i a l m e d i a s i t e s l i k e Fa c e b o o k. C r i m i n a l s c a n u s e t h e i n f o r m a t i o n yo u p o s t i n a s o c i a l e n g i n e e r i n g s c a m.

25 P HIS HING AT TAC K S P h i s h i n g i s a s o c i a l e n g i n e e r i n g s c a m w h e r e b y i n t r u d e r s s e e k a c c e s s t o y o u r p e r s o n a l i n f o r m a t i o n o r p a s s w o r d s b y p o s i n g a s a l e g i t i m a t e b u s i n e s s o r o r g a n i z a t i o n w i t h l e g i t i m a t e r e a s o n t o r e q u e s t i n f o r m a t i o n. U s u a l l y a n e m a i l ( o r t e x t ) a l e r t s y o u t o a p r o b l e m w i t h y o u r a c c o u n t a n d a s k s y o u t o c l i c k o n a l i n k a n d p r o v i d e i n f o r m a t i o n t o c o r r e c t t h e s i t u a t i o n. T h e s e e m a i l s l o o k r e a l a n d o f t e n c o n t a i n t h e o r g a n i z a t i o n s l o g o a n d t r a d e m a r k. T h e U R L i n t h e e m a i l r e s e m b l e s t h e l e g i t i m a t e w e b a d d r e s s. F o r e x a m p l e A m a z o n s. c o m. S p e a r p h i s h i n g i s a n a t t a c k t h a t t a r g e t s a s p e c i f i c i n d i v i d u a l o r b u s i n e s s. T h e e m a i l i s a d d r e s s e d t o y o u a n d a p p e a r s t o b e s e n t f r o m a n o r g a n i z a t i o n y o u k n o w a n d t r u s t, l i k e a g o v e r n m e n t a g e n c y o r a p r o f e s s i o n a l a s s o c i a t i o n. W h a l i n g i s a p h i s h i n g o r s p e a r p h i s h i n g a t t a c k a i m e d a t a s e n i o r o f f i c i a l i n t h e o r g a n i z a t i o n.

26 C O M BAT P HIS HING N E V E R p r o v i d e yo u r p a s s w o r d to a nyo n e v i a e m a i l. B e s u s p i c i o u s o f a ny e m a i l t h a t : Requests per sonal information. Contains spelling and grammatical error s. Asks you to click on a link or image or open an attachment. Is unexpected or from a company or organization with whom you do not have a relationship. I f yo u a r e s u s p i c i o u s o f a n e m a i l : Do not click on the links provided in the . Do not open any attachments in the . Do not provide per sonal information or financial data. Do not for ward the . Delete it from your Inbox.

27 ID EN T IT Y T HEF T T h e Fe d e r a l Tr a d e C o m m i s s i o n e s t i m a t e s t h a t 9 m i l l i o n p e o p l e h a v e t h e i r i d e n t i t y s to l e n e a c h y e a r. I d e n t i t y t h i e v e s u s e n a m e s, a d d r e s s e s, S o c i a l S e c u r i t y n u m b e r s, a n d f i n a n c i a l i n f o r m a t i o n o f t h e i r v i c t i m s to o b t a i n c r e d i t c a r d s, l o a n s, a n d b a n k a c c o u n t s f o r t h e m s e l v e s.

28 P R EVENT ING ID EN T IT Y T HEF T B e c a u t i o u s w h e n p r o v i d i n g yo u r S o c i a l S e c u r i t y n u m b e r. K n o w h o w a n d w h y i t w i l l b e u s e d. R e v i e w c r e d i t c a r d a n d b a n k s t a t e m e n t s a t l e a s t m o n t h l y f o r u n a u t h o r i z e d t r a n s a c t i o n s. U s e s t r o n g p a s s w o r d s f o r yo u r h o m e c o m p u t e r a n d w e b s i t e s yo u v i s i t, e s p e c i a l l y e m a i l a c c o u n t s a n d f i n a n c i a l i n s t i t u t i o n s. L e a v e yo u r S o c i a l S e c u r i t y c a r d a n d p a s s p o r t a t h o m e. N e v e r l e a v e t h e m i n yo u r p u r s e o r wa l l e t u n l e s s n e c e s s a r y. S h r e d s e n s i t i v e d o c u m e n t s a n d m a i l c o n t a i n i n g yo u r n a m e a n d a d d r e s s.

29 M A LWA RE M a l wa r e ( s h o r t f o r m a l i c i o u s s o f t wa r e ) d o e s d a m a g e to, s t e a l s i n f o r m a t i o n f r o m, o r d i s r u p t s a c o m p u t e r s y s t e m. Malware is commonly installed through attachments, downloading infected files, or visiting an infected web site. It can corrupt files, erase your hard drive, or give a hacker access to your computer.

30 C O M BAT M A LWA R E S c a n a t t a c h m e n t s w i t h a n t i v i r u s s o f t wa r e b e f o r e d o w n l o a d i n g. D o n o t t r u s t a ny a t t a c h m e n t s, e v e n t h o s e t h a t c o m e f r o m r e c o g n i z e d s e n d e r s. D e l e te s u s p i c i o u s e m a i l s w i t h o u t o p e n i n g t h e m. I f yo u b e l i ev e yo u r c o m p u t e r i s i n f e c t e d, c o n t a c t t h e a p p r o p r i a te I T p e r s o n n e l.

31 S EC URIT Y O U T S ID E O F T HE O F F IC E S e c u r i t y r e s e a r c h e r s s ay t h a t 3 5 % o f d a t a b r e a c h e s a t U. S. c o m p a n i e s a r e c a u s e d b y l o s i n g l a p to p s o r o t h e r m o b i l e d e v i c e s. B e v i g i l a n t a b o u t p r o t e c t i n g i n f o r m a t i o n a n d i n f o r m a t i o n s y s t e m s o u t s i d e o f t h e h o m e o r o f f i c e.

32 M O BIL E D EVIC E LO S S A N D T HEF T C y b e r a t t a c k s a r e a d a n g e r o u s t h r e a t to t h e B a n k s n e t w o r k s a n d d a t a, h o w e v e r a l a r g e n u m b e r o f b r e a c h e s o c c u r b e c a u s e o f l o s s o r t h e f t o f m o b i l e d e v i c e s. N e v e r l e av e l a p to p s, c e l l p h o n e s, o r o t h e r m o b i l e d e v i c e s u n a t t e n d e d e s p e c i a l l y w h e n t r av e l l i n g. E n s u r e t h a t t h e w i r e l e s s s e c u r i t y f e a t u r e s a r e p r o p e r l y c o n f i g u r e d. W h e n a way f r o m yo u r d e s k, u s e a c o m p u t e r l o c k f o r yo u r l a p to p o r p l a c e i t i n a l o c ke d c a b i n e t. M o b i l e d e v i c e s t h a t c o n t a i n P e r s o n a l l y i d e n t i f i a b l e i n f o r m a t i o n m u s t b e e n c r y p t e d. R e p o r t l o s t o r s to l e n d e v i c e s i m m e d i a t e l y.

33 PER S ONALLY ID EN TIF IABLE IN FO RMAT ION P e r s o n a l l y i d e n t i f i a b l e i n f o r m a t i o n ( P I I ) c a n b e u s e d to d i s t i n g u i s h o r t r a c e s o m e o n e s i d e n t i t y, o r c a n b e l i n k e d to a s p e c i f i c i n d i v i d u a l. A ny s u c h i t e m o f i n f o r m a t i o n c a n b e P I I, i n c l u d i n g : Sensitive data - financial or legal information ; Neutral information - name, facial photos, work address ; or Contextual information - file folder for a specific customer that contains a list of account number s. P I I m u s t b e p r o t e c t e d, w h e t h e r i n p a p e r, e l e c t r o n i c, o r o r a l f o r m. S e e m i n g l y i n n o c u o u s i n f o r m a t i o n c a n i d e n t i f y a n i n d i v i d u a l w h e n c o m b i n e d w i t h o t h e r d a t a o r c o m p a r e d to a d a t a s e t t h a t i n c l u d e s o t h e r P I I.

34 C O M M ON EXA M P L ES O F P II N a m e S o c i a l S e c u r i t y n u m b e r ( S S N ) D a t e o f b i r t h ( D O B ) M o t h e r s m a i d e n n a m e F i n a n c i a l r e c o r d s E m a i l a d d r e s s D r i v e r s l i c e n s e n u m b e r P a s s p o r t n u m b e r

35 S a f e g u a r d p e r s o n a l i n f o r m a t i o n i n yo u r p o s s e s s i o n, w h e t h e r i t b e i n p a p e r o r e l e c t r o n i c f o r m a t. R e p o r t s u s p e c t e d p r i va c y v i o l a t i o n s o r i n c i d e n t s. S h r e d d o c u m e n t s c o n t a i n i n g P I I ; N E V E R p l a c e t h e m i n t h e t r a s h.

36 D o n t l e av e d o c u m e n t s t h a t c o n t a i n P I I o n p r i n t e r s a n d f a x m a c h i n e s. D o n t l e av e f i l e s o r d o c u m e n t s c o n t a i n i n g P I I u n s e c u r e d o n yo u r d e s k w h e n yo u a r e n o t t h e r e. Fo l l o w t h e t e c h n i c a l, p e r s o n n e l, a d m i n i s t r a t i v e, a n d t e l e c o m m u n i c a t i o n s a f e g u a r d s fo r c o m p u t e r s y s t e m s yo u u s e. Ta ke u s e r a wa r e n e s s t r a i n i n g a n n u a l l y.

37 C O M M ON S C EN ARIOS P r i va c y i n c i d e n t s m o s t o f t e n o c c u r f r o m : L o s s, d a m a g e, t h e f t, o r i m p r o p e r d i s p o s a l o f e q u i p m e n t, m e d i a, o r p a p e r s c o n t a i n i n g P I I. A c c i d e n t a l l y s e n d i n g a f i l e c o n t a i n i n g P I I to a p e r s o n n o t a u t h o r i z e d to v i e w t h e f i l e o r s e n d i n g i t i n a n u n p r o t e c t e d m a n n e r ( e. g., u n e n c r y p t e d ). A l l o w i n g a n u n a u t h o r i z e d p e r s o n to u s e yo u r c o m p u t e r o r c r e d e n t i a l s to a c c e s s P I I. A ny s e c u r i t y s i t u a t i o n t h a t c o u l d c o m p r o m i s e P I I ( e. g., v i r u s, p h i s h i n g e m a i l, s o c i a l e n g i n e e r i n g a t t a c k ).

38 HO M E S EC U RIT Y M a ny o f t h e t i p s i n t h i s p r e s e n t a t i o n c a n b e u s e d to p r o t e c t yo u r h o m e c o m p u t e r. C r i m i n a l s c a n u s e yo u r p e r s o n a l i n f o r m a t i o n to s t e a l yo u r i d e n t i t y a n d r u i n yo u r f i n a n c e s. P r o t e c t i n g yo u r s e l f a n d yo u r f a m i l y o n t h e I n t e r n e t a t h o m e i s j u s t a s i m p o r t a n t a s p r o t e c t i n g i n f o r m a t i o n s y s t e m s a t w o r k.

39 SA F EGUAR D YO U R HO M E C O M P UT ER U s e p a s s w o r d s o n p e r s o n a l c o m p u te r s a n d m o b i l e d e v i c e s. I n s t a l l a n d u p d a te a n t i v i r u s s o f t wa r e o n yo u r h o m e c o m p u te r. E n a b l e t h e f i r e wa l l o n yo u r c o m p u te r. R o u t i n e l y b a c k u p yo u r f i l e s. Fo l l o w t h e i n s t r u c t i o n s i n t h e u s e r m a n u a l to e n a b l e e n c r y p t i o n f o r yo u r w i r e l e s s r o u t e r.

40 C O N GR ATUL AT IO NS

B y R us se ll E ri c Wr ig ht, DV M. M as te r of S ci en ce I n V et er in ar y Me di ca l Sc ie nc es. A pp ro ve d:

B y R us se ll E ri c Wr ig ht, DV M. M as te r of S ci en ce I n V et er in ar y Me di ca l Sc ie nc es. A pp ro ve d: E ff ec ts o f El ec tr ic al ly -S ti mu la te d Si lv er -C oa te d Im pl an ts a nd B ac te ri al C on ta mi na ti on i n a Ca ni ne R ad iu s Fr ac tu re G ap M od el B y R us se ll E ri c Wr ig ht,

More information

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ). PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a

More information

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct H ig h L e v e l O v e r v iew S te p h a n M a rt in S e n io r S y s te m A rc h i te ct OPEN XCHANGE Architecture Overview A ge nda D es ig n G o als A rc h i te ct u re O ve rv i ew S c a l a b ili

More information

E M C P e r f o r m a n c e R e q u i r e m e n t s C o m p o n e n t s

E M C P e r f o r m a n c e R e q u i r e m e n t s C o m p o n e n t s D a i m l e r C h r y s l e r D C -1 0 6 1 4 J o i n t E n g i n e e r i n g S t a n d a r d D a t e P u b l i s h e d : 2 0 0 5-03 C h r y s l e r C a t e g o r y : L -2 T ot a l N o. of Pa g e s ( I

More information

Application Note: Cisco A S A - Ce r t if ica t e T o S S L V P N Con n e ct ion P r of il e Overview: T h i s a p p l i ca ti o n n o te e x p l a i n s h o w to co n f i g u r e th e A S A to a cco m

More information

Put the human back in Human Resources.

Put the human back in Human Resources. Put the human back in Human Resources A Co m p l et e Hu m a n Ca p i t a l Ma n a g em en t So l u t i o n t h a t em p o w er s HR p r o f essi o n a l s t o m eet t h ei r co r p o r a t e o b j ect

More information

Models of Natural Language In modeling English (or another natural language) we ignore meaning and even grammar. That is, we ignore semantics.

Models of Natural Language In modeling English (or another natural language) we ignore meaning and even grammar. That is, we ignore semantics. Models of Natural Language In modeling English (or another natural language) we ignore meaning and even grammar. That is, we ignore semantics. Instead, we treat English as being the result of some random

More information

T e s t e xp re s s i o n B o d y o f i f E xi t F i g u re 1 - F l o w c h art o f th e i f s tate m M u l ti S tate m s i n th e i f B o d y : L ik

T e s t e xp re s s i o n B o d y o f i f E xi t F i g u re 1 - F l o w c h art o f th e i f s tate m M u l ti S tate m s i n th e i f B o d y : L ik MQL4 COURSE By Coders guru w w w. f orex -t sd. c om -6- Loops & Decisions Part 2 ---------------------------- We l c o m e t o t h e s ix t h l e s s o n in m y c o u r s e a b o u t M Q L 4. I h o pe

More information

S e w i n g m a c h i n e s for but t - seams. - c o m p l e t e b r o c h u r e -

S e w i n g m a c h i n e s for but t - seams. - c o m p l e t e b r o c h u r e - S e w i n g m a c h i n e s for but t - seams - c o m p l e t e b r o c h u r e - D o h l e s e w i n g m a c h i n e s f o r b u t t - s e a m s Head Office D o h l e m a n u f a c t u re b u t t s e

More information

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner í d : r ' " B o m m 1 E x p e r i e n c e L : i i n g S e c u r it y. 1-1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his g u id e å ] - ew i c h P e t e r M u la e n PACKT ' TAÞ$Æo

More information

SCO TT G LEA SO N D EM O Z G EB R E-

SCO TT G LEA SO N D EM O Z G EB R E- SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e

More information

EM EA. D is trib u te d D e n ia l O f S e rv ic e

EM EA. D is trib u te d D e n ia l O f S e rv ic e EM EA S e c u rity D e p lo y m e n t F o ru m D e n ia l o f S e rv ic e U p d a te P e te r P ro v a rt C o n s u ltin g S E p p ro v a rt@ c is c o.c o m 1 A g e n d a T h re a t U p d a te IO S Es

More information

«С e n tra l- A s ia n E le c tric - P o w e r C o rp o ra tio n», JS C

«С e n tra l- A s ia n E le c tric - P o w e r C o rp o ra tio n», JS C J o in t - s t o c k c o m p C E N T R A L - A S IA N E L E C T R IC P O W a n y E R C O R P O R A T IO N I n t e r n a l A u d i t P O L IC Y o f J o in t - S t o c k C o m p a n y C E N T R A L - A S

More information

G ri d m on i tori n g w i th N A G I O S (*) (*) Work in collaboration with P. Lo Re, G. S av a and G. T ortone WP3-I CHEP 2000, N F N 10.02.2000 M e e t i n g, N a p l e s, 29.1 1.20 0 2 R o b e r 1

More information

Collaboration in Public H e alth be tw e e n U niv e rs ity of H e id e lbe rg and U niv e rs ity of D ar e s S alaam How t h e c oop e r a t i on e m e r g e d Informal c ont ac t s from e arly 1 9

More information

ACE-1/onearm #show service-policy client-vips

ACE-1/onearm #show service-policy client-vips M A C E E x a m Basic Load Balancing Using O ne A r m M ode w it h S ou r ce N A T on t h e C isco A p p licat ion C ont r ol E ngine Goal Configure b a s ic l oa d b a l a nc ing (L a y er 3 ) w h ere

More information

Campus Sustainability Assessment and Related Literature

Campus Sustainability Assessment and Related Literature Campus Sustainability Assessment and Related Literature An Annotated Bibliography and Resource Guide Andrew Nixon February 2002 Campus Sustainability Assessment Review Project Telephone: (616) 387-5626

More information

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r.

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB 06 013-0009 0 M /V. ja a r. D a t a b a n k m r in g R a p p o r t M Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r I d e n t if ic a t ie v a n d e m S e c t o r BJB V o lg n r. 06 013-0009 0 V o o r z ie n in g N ie u w la

More information

Unit 16 : Software Development Standards O b jec t ive T o p r o v id e a gu ide on ho w t o ac h iev e so f t wa r e p r o cess improvement through the use of software and systems engineering standards.

More information

The Business Case for D om aink ey s I d ent ified M ail Andy Spillane V ic e P r es ident, Y ah o o! M February 13, 2006 ail 1 Fighting Spam & Email Abuse R eq uir es a M ulti-fac eted Appr o ac h DomainKeys

More information

SCHOOL PESTICIDE SAFETY AN D IN TEG R ATED PEST M AN AG EM EN T Statutes put into law by the Louisiana Department of Agriculture & Forestry to ensure the safety and well-being of children and school personnel

More information

First A S E M R e c to rs C o n f e re n c e : A sia E u ro p e H ig h e r E d u c a tio n L e a d e rsh ip D ia l o g u e Fre ie U n iv e rsitä t, B e rl in O c to b e r 2 7-2 9 2 0 0 8 G p A G e e a

More information

South Salem Stop MBTA Commuter Rail Station Salem, MA

South Salem Stop MBTA Commuter Rail Station Salem, MA South Salem Stop MBTA Commuter Rail Station Salem, MA Conceptual Design Presentation Public Meeting March 22, 2016 New MBTA Commuter Rail Stop in South Salem Study Area M OF F A TT RD MON R O E GR I S

More information

FORT WAYNE COMMUNITY SCHOOLS 12 00 SOUTH CLINTON STREET FORT WAYNE, IN 468 02 6:02 p.m. Ma r c h 2 3, 2 015 OFFICIAL P ROCEED ING S Ro l l Ca l l e a r d o f h o o l u e e o f t h e r t y m m u t y h o

More information

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y

I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y and KB rl iak s iol mi a, hme t a ro cp hm a5 a 2k p0r0o 9f i,e ls hv oa nr t ds eu rmv oedye l o nf dae cr

More information

T h is do c u m e nt r e f e r s to F a st E th e r C h a nne l, G ig a b it E th e r C h a nne l, p o r t c h a nne l a nd p o r t g r o u p w ith a

T h is do c u m e nt r e f e r s to F a st E th e r C h a nne l, G ig a b it E th e r C h a nne l, p o r t c h a nne l a nd p o r t g r o u p w ith a Understanding L ay er 3 Eth erch annel S u p p o rt o n th e Cisc o I ntegrated S erv ic es R o u ter T h e p u r p o se o f th is do c u m e nt is to e x p l a in C isc o Inte g r a te d S e r v ic e

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

A n d r e w S P o m e r a n tz, M D

A n d r e w S P o m e r a n tz, M D T e le h e a lth in V A : B r in g in g h e a lth c a r e to th e u n d e r s e r v e d in c lin ic a n d h o m e A n d r e w S P o m e r a n tz, M D N a tio n a l M e n ta l H e a lth D ir e c to r f

More information

STEEL PIPE NIPPLE BLACK AND GALVANIZED

STEEL PIPE NIPPLE BLACK AND GALVANIZED Price Sheet CWN-616 Effective June 06, 2016 Supersedes CWN-414 A Member of The Phoenix Forge Group CapProducts LTD. Phone: 519-482-5000 Fax: 519-482-7728 Toll Free: 800-265-5586 www.capproducts.com www.capitolcamco.com

More information

Constructief ontwerpen en innoveren van materialen en hun effecten in de architectuur

Constructief ontwerpen en innoveren van materialen en hun effecten in de architectuur Constructief ontwerpen en innoveren van materialen en hun effecten in de architectuur Company Case Study: The Market Hall Portfolio: 20 years of space structures, 25 years of glass structures, 10 years

More information

7' RICOCHET SHUFFLEBOARD TABLE

7' RICOCHET SHUFFLEBOARD TABLE 7' RICOCHET SHUFFLEBOARD TABLE ASSEM BLYL INSTRUCTIONS NG1201 THANK Y OU! Th a n k yo u f o r p u r ch a si n g t h i s p r o d u ct. We w o r k a r o u n d t h e cl o ck a n d a r o u n d t h e g l o

More information

Chart 1: Macroeconomic Indicators Macedonia

Chart 1: Macroeconomic Indicators Macedonia Fakultät für Wirtschaftsw L ehrstuhl für I nternatio nale Wirtschaftsb ez iehung en P ro f. D r. H o rst B rez inski The P er s p ec t i v es o f E U A c c es s i o n o f t he F o r m er Y u g o s l a

More information

Software Quality Requirements and Evaluation, the ISO 25000 Series

Software Quality Requirements and Evaluation, the ISO 25000 Series Pittsburgh, PA 15213-3890 Software Quality Requirements and Evaluation, the ISO 25000 Series PSM Technical Working Group February 2004 Dave Zubrow Sponsored by the U.S. Department of Defense Background

More information

L a h ip e r t e n s ió n a r t e r ia l s e d e f in e c o m o u n n iv e l d e p r e s ió n a r t e r ia l s is t ó lic a ( P A S ) m a y o r o

L a h ip e r t e n s ió n a r t e r ia l s e d e f in e c o m o u n n iv e l d e p r e s ió n a r t e r ia l s is t ó lic a ( P A S ) m a y o r o V e r s i ó n P á g i n a 1 G U I A D E M A N E J O D E H I P E R T E N S I O N E S C E N C I A L 1. D E F I N I C I O N. L a h ip e r t e n s ió n a r t e r ia l s e d e f in e c o m o u n n iv e l d

More information

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process Improvement Understanding, Modelling and Improving the Software Process Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1 Process improvement Understanding existing processes

More information

Outline Presentation Why S c i r u s S c i r u s V a l u e C ha i n A d d e d v a l u e f o r E S a n d s c i e n t i f i c c o m m u n i t y

Outline Presentation Why S c i r u s S c i r u s V a l u e C ha i n A d d e d v a l u e f o r E S a n d s c i e n t i f i c c o m m u n i t y Searching the Scientific Web: s & T d s m m u Sciru he ad ed benefits fo r the cientific co nity Femke Markus S r. P ro d uc t Man ag er S c i rus 1 8 O c t o b er 2 0 0 2, C E R N, G en ev a Outline Presentation

More information

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m

B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m Symposium on Public Transportation in Indian Cities with Special focus on Bus Rapid Transit (BRT) System New Delhi 20-21 Jan 2010 B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g

More information

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D.

AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981. P. A. V a le s, Ph.D. AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL 1978-1981 P. A. V a le s, Ph.D. SYNOPSIS Two in d ep en d en t tre a tm e n t g ro u p s, p a r t ic ip

More information

W Regional Cooperation in the Field of A u tom otiv e E ngineering in S ty ria Dr. Peter Riedler 2 9.1 1.2 0 1 1 i e n GmbH Graz B u s ines s S trategy S ty ria 2 0 2 0 H is tory 1 9 9 4 1 9 9 5 1 9 9

More information

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage CAS Loss Reserve Seminar 23 Session 3 Private Passenger Automobile Insurance Frank Cacchione Carlos Ariza September 8, 23 Today

More information

E-Commerce Security and Fraud Protection CHAPTER 9

E-Commerce Security and Fraud Protection CHAPTER 9 E-Commerce Security and Fraud Protection CHAPTER 9 LEARNING OBJECTIVES 1. Understand the importance and scope of security of information systems for EC. 2. Describe the major concepts and terminology of

More information

An Introduction on How to Better Protect Your Computer and Sensitive Data

An Introduction on How to Better Protect Your Computer and Sensitive Data An Introduction on How to Better Protect Your Computer and Sensitive Data Common Security Problems Computer users who fail to use strong passwords Constant attacks by viruses, worms, key loggers and bots

More information

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 -

w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, 2-8 -2, K a s h iw a z a, A g e o C ity, S a ita m a 3 6 2 - E ffic a c y o f S e le c tiv e M y e lo id L in e a g e L e u c o c y te D e p le tio n in P y o d e r m a G a n g re n o su m a n d P so r ia sis A sso c ia te d w ith In fla m m a to r y B o w e l D

More information

G S e r v i c i o C i s c o S m a r t C a r e u ي a d e l L a b o r a t o r i o d e D e m o s t r a c i n R ل p i d a V e r s i n d e l S e r v i c i o C i s c o S m a r t C a r e : 1 4 ع l t i m a A c

More information

An E mpir ical Analysis of Stock and B ond M ar ket Liquidity

An E mpir ical Analysis of Stock and B ond M ar ket Liquidity A p r il 2 2, 2 0 0 2 An E mpir ical Analysis of Stock and B ond M ar ket Liquidity Ta r u n Ch o r d ia, A s a n i S a r ka r, a n d A va n id h a r S u b r a h m a n ya m Go iz u e t a B u s in e s s

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Morningstar Document Research

Morningstar Document Research Morningstar Document Research FORM8-K EMC INSURANCE GROUP INC - EMCI Filed: May 11, 2016 (period: May 11, 2016) Report of unscheduled material events or corporate changes. The information contained herein

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

C A R I N G / F A I R N E S S GRADE: KINDERGARTEN

C A R I N G / F A I R N E S S GRADE: KINDERGARTEN C A R I N G / F A I R N E S S GRADE: KINDERGARTEN Core Cu rri c u lu m : Su pp l em ents social stu d i e s Foc u s : In terpers onal skill s, ch a racter bu i l d i n g Overvi ew: E m p a t hy is the

More information

M Mobile Based Clinical Decision Support System Bhudeb Chakravarti & Dr. Suman Bhusan Bhattacharyya Provider & Public Health Group, VBU-HL P S aty am C om puter S ervices L im ited Bhudeb_ C hak ravarti@

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

D The Joint Master of Science eg ree C ou rse in V eterinary P u b l ic H eal th ( MScVPH), F U -C MU Dr. L e rt ra k S ri k i t j a k a rn R e g i o n a l C e n t re f o r V e t e ri n a ry P u b l i

More information

W Cisco Kompetanse eek end 2 0 0 8 SMB = Store Mu ll ii gg hh eter! Nina Gullerud ng ulleru@ c is c o. c o m 1 Vår E n t e r p r i s e e r f a r i n g... 2 S m å o g M e llo m s t o r e B e d r i f t e

More information

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB

PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB M IPCC EXPRESS Product Solution (IPCC - IP Co n t a c t Ce n t e r ) E i n f ü h r u n g Ü b e r h u nd e r t M il l io ne n N u t ze r - P r o g no s e n zu f o l g e w e r d e n e s in d ie s e m J ah

More information

T h e m i n i m u m r eq u i r em en t s a r e essen t i a l t o st a r t a b a si c w o r k o n y o u r w eb ser v er. As technology is r a p id ly a

T h e m i n i m u m r eq u i r em en t s a r e essen t i a l t o st a r t a b a si c w o r k o n y o u r w eb ser v er. As technology is r a p id ly a Windows XP with Service Pack 2 Installation Guide T h i s set u p g u i d e w i l l g u i d e y o u t h r o u g h t h e st ep s r eq u i r ed t o i n st a l l W i n d o w s X P ser v i c e p a c k 2 o

More information

TRENDnetVIEW App (Android)

TRENDnetVIEW App (Android) Installation Ta p o n th e P la y S tore ico n to d o w n lo a d a n d in sta ll T R E N D n e tv IE W a p p. O n ce in sta lle d ta p the TRENDnetVIEW icon to open up the app. N ote : A n d ro id O S

More information

C o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t

More information

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8

B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 U r b a n S tu d ie s, V o l. 3 2, N o. 2, 1 9 9 5 3 6 1 ±3 7 8 T e le c o m m u n ic a t io n s a n d th e C h a n g in g G e o g r a p h ie s o f K n o w le d g e T r a n s m is s io n in th e L a te

More information

JCUT-3030/6090/1212/1218/1325/1530

JCUT-3030/6090/1212/1218/1325/1530 JCUT CNC ROUTER/CNC WOODWORKING MACHINE JCUT-3030/6090/1212/1218/1325/1530 RZNC-0501 Users Guide Chapter I Characteristic 1. Totally independent from PC platform; 2. Directly read files from U Disk; 3.

More information

The USGA Handicap Syste m In Brief A Summary of Handicap Basics

The USGA Handicap Syste m In Brief A Summary of Handicap Basics Golf Association Box 746 NJ 07931-0746 223-0041 usga.org The USGA Handicap Syste m In Brief A Summary of Handicap Basics HOW TO USE YOUR HANDICAP E ve ry golfer wants to enjoy a fair match. The USGA Handicap

More information

1 D e r 1. S c h u l t a g M a l e a u s. S c h re i b e d e i n e n N a m e n u n t e r e i n K i n d. 1 2 D a s b i n i c h M a l e d i c h s e l b e r. 2 3 F re u n d e M a l e d i c h u n d d e i n

More information

PROYECTO PERU CENTRE. The re l i a b l e p a r t n e r fo r i n ternships, S p a n i s h courses a n d a ccommodation i n Cu s co, Pe r u

PROYECTO PERU CENTRE. The re l i a b l e p a r t n e r fo r i n ternships, S p a n i s h courses a n d a ccommodation i n Cu s co, Pe r u PROYECTO PERU CENTRE The re l i a b l e p a r t n e r fo r i n ternships, S p a n i s h courses a n d a ccommodation i n Cu s co, Pe r u About Proyecto Peru Proye c to Pe r u o f fe r s i n ternships i

More information

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014 A Small Business Approach to Big Business Cyber Security Brent Bettis, CISSP 23 September, 2014 1 First, a Video http://www.youtube.com/watch?v=cj8wakqwlna 2 3 Agenda Threat Landscape Strategic Initiatives

More information

UFPA Brazil. d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t

UFPA Brazil. d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t A v a n ç o s n o P la n o d e C o n tr o le d e R e d e s Ó p tic a s e s e u s Im p a c to s n o F u tu r o d a In te r n e t A n to n io A b e lé m a b e le m @ u fp a.b r Agenda In tr o d u ç ã o C

More information

I nflexibility as a stabilisation device

I nflexibility as a stabilisation device I nflexibility as a stabilisation device Abstr act : A p o s s ib le r a t io n a le fo r in s t it u t io n a l c o n s e r va t is m,i.e., r e lu c t a n c e in a d ju s t in g a c t io n s in a c c

More information

Purpose of presentation

Purpose of presentation ECONOMIC REGULATION Purpose of presentation To provide the Status Quo on Economic Regulation To indicate the ideal situation WHERE DOES THE MANDATE COME FROM? Constitution Water Services Act Section 10

More information

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management The EU D a t a G r i d D a t a M a n a g em en t (EDG release 1.4.x) T h e Eu ro p ean Dat agri d P ro j ec t T eam http://www.e u - d a ta g r i d.o r g DataGrid is a p ro j e c t f u n de d b y th e

More information

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. CIS CO S Y S T E M S A c c e s s T e c h n o lo g y T e le c o m /IT Co n n e c tiv ity W o rk s h o p G u ille rm o A g u irre, Cis c o Ch ile g m o.a g u irre @ c is c o.c o m S e s s io n N u m b e

More information

Online Department Stores. What are we searching for?

Online Department Stores. What are we searching for? Online Department Stores What are we searching for? 2 3 CONTENTS Table of contents 02 Table of contents 03 Search 06 Fashion vs. footwear 04 A few key pieces 08 About SimilarWeb Stepping up the Competition

More information

PRIMER TESTIMONIO. -F o l i o n ú m e r o 1 2 0. ḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋḋ ESC RITU RA NU MERO TREINTA.- E n l a c i u d a d d e B u e n os A i r e s, c a p i t a l d e l a R e p ú b l i c

More information

E-learning and Student Mobility in Higher Education. BEST Symposium on Education, Gothenburg 2 nd June 10 th June; 2007

E-learning and Student Mobility in Higher Education. BEST Symposium on Education, Gothenburg 2 nd June 10 th June; 2007 E-learning and Student Mobility in Higher Education BEST Symposium on Education, Gothenburg 2 nd June 10 th June; 2007 Ta b l e of Contents Board of European Students of Technology TABLE OF CONTENTS...2

More information

YRRTC Business Plan

YRRTC Business Plan 2015 2025 YRRTC Business Plan 2015 annual update updated 2015 edocs #5677831 mission Our mission is to design and deliver an exceptional rapid transit system attracting, moving and connecting people to

More information

W h a t is m e tro e th e rn e t

W h a t is m e tro e th e rn e t 110 tv c h a n n e ls to 10 0 0 0 0 u s e rs U lf V in n e ra s C is c o S y s te m s 2 0 0 2, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h a t is m e tro e th e rn e t O b je c tiv

More information

Legal Concepts Meet Technology: A 50 State Survey of Privacy Laws

Legal Concepts Meet Technology: A 50 State Survey of Privacy Laws Legal Concepts Meet Technology: A 50 State Survey of Privacy Laws Miriam B. Russom University of Illinois at Chicago, Computer Science Department Robert H. Sloan University of Illinois at Chicago, Computer

More information

IntИg r a ti o n d e s s o l u ti o ns IB M e t C i s c o : C o l l a b o r a ti o n e t C o m m u ni c a ti o ns U ni f i Иe s ( U C 2 ) Mathieu in tr at Sales Business ev elop ent anag er om unic at

More information

Matrix Technical Support Mailer 139

Matrix Technical Support Mailer 139 Dear Friends, Matrix Technical Support Mailer 139 Matrix SPARSH M2S application in ETERNITY ME, GE and PE This mailer helps you to use Matrix SPARSH M2S application in ETERNITY ME, GE and PE for video

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

How To Master Facebook Post Promotion

How To Master Facebook Post Promotion How To Master Facebook Post Promotion Introduction Facebook is the world s premier platform for reach and engagement - but if you re a company, your Facebook content is only as good as your best promoted

More information

2015 Cybersecurity Awareness

2015 Cybersecurity Awareness 2015 Cybersecurity Awareness CDSE Cybersecurity Thomas N. LeBaron, CISSP Cybersecurity Curriculum Manager Mr. LeBaron has been the Cybersecurity Curriculum Manager for CDSE since October 2012 Mr. LeBaron

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

The content is based on the National Council of Teachers of Mathematics (NCTM) standards and is aligned to state standards.

The content is based on the National Council of Teachers of Mathematics (NCTM) standards and is aligned to state standards. Core Precalculus Precalculus is a course that combines reviews of algebra, geometry, and functions into a preparatory course for calculus. The course focuses on the mastery of critical skills and exposure

More information

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

M P L S /V P N S e c u rity. 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. M P L S /V P N S e c u rity M ic h a e l B e h rin g e r < m b e h rin g @ c is c o.c o m > M b e h rin g - M P L S S e c u rity 2 0 0 1, C is c o S y s te m s, In c. A ll rig h ts re s e rv e d. 1 W h

More information

B rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g...

B rn m e d s rlig e b e h o v... 3 k o n o m i... 6. S s k e n d e tils k u d o g k o n o m is k frip la d s... 7 F o r ld re b e ta lin g... V e lf rd s s e k re ta ria te t S a g s n r. 1 4 3 4 1 5 B re v id. 9 9 3 9 7 4 R e f. S O T H D ir. tlf. 4 6 3 1 4 0 0 9 s o fie t@ ro s k ild e.d k G o d k e n d e ls e s k rite rie r fo r p riv a tin

More information

GSM MOBILE ALARM. Sensor alarm with alerts straight to your phone activate.co.uk. Page 1

GSM MOBILE ALARM. Sensor alarm with alerts straight to your phone  activate.co.uk. Page 1 GSM MOBILE ALARM Sensor alarm with alerts straight to your phone www.gsm activate.co.uk Page 1 Pr o d u ct I n f o r m at io n Our GSM Mobile Alarm is a standalone sm all portable unit which can be deployed

More information

Bonn Declaration on Regional Cooperation in Quality Assurance in Higher Education Adopted on 20 June 2007 during the Conference Enhancing Quality Across Borders R egional Cooperation in Quality Assurance

More information

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS $ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security

More information

S E 5/9. Checks & Forms for. BIS Software www.bisformsdivision.com 888.629.9640

S E 5/9. Checks & Forms for. BIS Software www.bisformsdivision.com 888.629.9640 BTM MO _TH ER SAFE PO SS 89 70 DEN E. H VE AMPD R FA 303-, C EN X; 74 O AV 30 0-62 8023 E. 3-22 06 1 0-74 24 IBIL ITIE S ST AT DA TE E RE FE RE NC E DAT AC E CO UN T NU CO DE ME NT MBE R DE SC DA TE RIPT

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

C + + a G iriş 2. K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r

C + + a G iriş 2. K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r C + + a G iriş 2 K o n tro l y a p ıla rı if/e ls e b re a k co n tin u e g o to sw itc h D ö n g ü le r w h ile d o -w h ile fo r F o n k s iy o n la r N e d ir? N a s ıl k u lla n ılır? P ro to tip v

More information

Professional Indemnity Claim Form

Professional Indemnity Claim Form Tokio Marine & Nichido Fire Insurance Co., Ltd. ABN 80 000 438 291 Managing Agent in Australia: Tokio Marine Management (Australasia) Pty. Ltd. ABN 69 001 488 455 Level 31, 9 Castlereagh Street, Sydney

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

ta tio n a l s c ie n c e b y s u p p o rtin g th e e m e rg in g G rid p ro to c o ls o n W in d o w s a n d

ta tio n a l s c ie n c e b y s u p p o rtin g th e e m e rg in g G rid p ro to c o ls o n W in d o w s a n d A p p e a rs in th e P ro c e e d in g s o f th e 2 0 0 5 In te rn a tio n a l C o n fe re n c e o n C o m p u ta tio n a l S c ie n c e (IC C S 2 0 0 5 ), E m o ry U n iv e rs ity, A tla n ta, G A, M

More information

About the Author. Jak ub Pr zybo lew sk i

About the Author. Jak ub Pr zybo lew sk i About the Author Jak ub Pr zybo lew sk i E ver since I rem em ber, g r a phic ha s been m y pa ssio n. I wa s inter est ed in dr a wing ca r s a s a child. When I g r ew up crea t ing a ut o m o tive o

More information

HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES

HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES HR DEPARTMENTAL SUFFIX & ORGANIZATION CODES Department Suffix Organization Academic Affairs and Dean of Faculty, VP AA 1100 Admissions (Undergraduate) AD 1330 Advanced Ceramics, Colorado Center for--ccac

More information