Next slide Pg Dn or Click Previous slide

  • Slides: 9
Download presentation
Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc The Recommendations E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 1

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Recommendations 1. 2. 3. 4. 5. 6. 7. 8. Become aware of the problem Devise an information security strategy Implement some remedial procedures immediately Seek professional help without delay Adopt international standards and best practices Identify the gaps in national legislation Encourage the United Nations to embark urgently on a Law of Cyberspace E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 2

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Awareness Information Security is NOT just a technical problem Everyone has a role to play You cannot manage what you do not understand E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 3

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Security Strategy Assign responsibility for strategy Ensure that strategy matches needs Re-evaluate strategy frequently E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 4

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Remedial Procedures Do the simple things first Do them NOW Advice is readily available and it is free E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 5

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Professional Help Employ “ethical hackers” Involve Auditors and Consultants Consult Professional Associations E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 6

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Standards and Best Practices Adopt ISO 17799 or equivalent Do not reinvent the wheel Ensure compliance with adopted standards E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 7

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Gaps in Legislation Gaps will be exploited by the Bad Guys Understanding the gaps will encourage legislation Legislation will level the playing field E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 8

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation:

Next slide: Pg. Dn or Click Previous slide: Pg. Up To quit the presentation: Esc Law of Cyber-Space A global comprehensive consensus among all stake-holders It cannot wait Only the United Nations can do it E. Gelbstein A. Kamal Information Insecurity Part IV: The Recommendations 9