INFORMATION SECURITY AND PRIVACY Presented By: Jason Rottler Mengmeng Zhao Vijak Pongtippun Weiwei Huang Ju Yang Agenda Introduction IT Security Spending IT Security Threats Chief Information Security Officer (CISO) Case Studies Best Practices 2 What is IT Security Information security means protecting information and information system from unauthorized access, use, disclosure, disruption, modification or destruction. “In the case of information security, the goals of confidentiality, integrity, and availability (CIA) must be balanced against organizational priorities and the negative consequences of security breaches.” http://en.wikipedia.org/wiki/It_security http://proquest.umi.com/pqdweb?index=2&did=901411&SrchMode=1&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD &TS=1257803955&clientId=45249 3 What is IT Security NSTISSC Security Model ( McCumber Cube) Three dimensions: 1. Confidentiality, integrity, and availability (CIA triangle) 2.Policy, education, and technology 3. Storage, processing, and transmission Confidentiality Integrity Availability Storage Processing Transmission http://proquest.umi.com/pqdweb?index=0&did=1374511721&SrchMode=1&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=3 09&VName=PQD&TS=1257259579&clientId=45249 http://en.wikipedia.org/wiki/McCumber_cube 4 Why is IT Security important “Security is, I would say, our top priority because for all the exciting things you will be able to do with computers - organizing your lives, staying in touch with people, being creative - if we don't solve these security problems, then people will hold back.” ----Bill gates http://www.billgatesmicrosoft.com/ http://chinadigitaltimes.net/china/bill-gates/ 5 Security Breach Example Wireless Security and the TJX Data Breach 6 Why is IT Security important IT Security breaches happen everyday 2009 NAME NUMBER OF RECORDS 19-Jan-09 Forcht Bank 8,500 3-Feb-09 SRA International Unknown 12-Mar-09 US Army 1,600 16-Apr-09 Myspace Unknown 4-May-09 Virginia Health Data Potentially 530,000 7-Jun-09 T-Mobile USA Unknown 8-Jul-09 AT&T 2,100 14-Aug-09 American Express Unknown 2-Sep-09 Naval Hospital Pensacola 38,000 2-Oct-09 U.S. Military Veterans 76 Million http://www.privacyrights.org/ar/ChronDataBreaches.htm#2009 7 Why is IT Security important IT security breaches may be from outsider’s and Insider’s breaches. “As the network expand, including online, it will become harder to know whether market-moving information originated improperly through an insider’s breach or properly through gathering of information in other ways” http://business.timesonline.co.uk/tol/business/industry_sectors/technology/article6861965.eceThe Times October 6, 2009 http://proquest.umi.com/pqdweb?index=0&did=1886259131&SrchMode=1&sid=5&Fmt=3&VInst=PROD&VType=PQD& RQT=309&VName=PQD&TS=1257262182&clientId=45249 8 Why is IT Security important Consequences of poor Security in Organization Unreliable Systems Unauthorized Access By Employee Reduced Employee Productivity Financial Embezzlement & Lost Revenue Theft of Customer Records Reno, NV, “Academy of Information and Management Sciences” Vol.11 No.2 (October 2007) p.51-53 http://www.alliedacademies.org/Public/Proceedings/Proceedings21/AIMS%20Proceedings.pdf 9 Why is IT Security important Losses from IT Security Breaches In 2008 losses resulting from IT security breaches averaged 289,000 2008 CSI Computer Crime & Security Survey, Robert Richardson, GoCSI.com 10 Agenda Introduction IT Security Spending IT Security Threats Chief Information Security Officer (CISO) Case Studies Best Practices 11 IT Security Spending 31% 31% of companies spend more than 5% of their overall IT budget on information security in 2008. 2008 CSI Computer Crime & Security Survey, Robert Richardson, GoCSI.com 12 IT Security Spending IT Budget Vs. Information Security Budget The projected percentage cut in IT spending for 2009 is greater overall than the relative projected percentage cut in security spending. http://metrosite.files.wordpress.com/2008/06/information_security_spending_survey_2009.pdf 13 IT Security Spending IT departments in U.S. enterprises spent US$61 billion on security in 2006, representing 7.3% of total IT spending in the U.S. IT Security Spend in the U.S. 2006 10.8B 10.4B 9.9B 3.6B Business Financial Government services services sectors Education 3.2B Health Care 2.5B Primary Industries http://proquest.umi.com/pqdweb?index=4&did=1162465461&SrchMode=1&sid=4&Fmt=3&VInst=PRO D&VType=PQD&RQT=309&VName=PQD&TS=1257727916&clientId=45249#indexing 14 IT Security Spending "IT security has become a higher priority over the last few years, with a greater proportion of the overall IT budget being spent on security equipment and services." ------ Ed Daugavietis http://proquest.umi.com/pqdweb?index=4&did=1162465461&SrchMode=1&sid=4&Fmt=3&VInst=PROD&V Type=PQD&RQT=309&VName=PQD&TS=1257727916&clientId=45249#indexing 15 Agenda Introduction IT Security Spending IT Security Threats Chief Information Security Officer (CISO) Case Studies Best Practices 16 Top 9 Network Security Threats CSOonline.com is the website that provides news, analysis and research on a broad range of security and risk management topics. Areas of focus include information security, physical security, business continuity, identity and access management, loss prevention and more. 1. 2. 3. 4. 5. 6. 7. 8. 9. Malicious Insiders – Rising Threat Malware – Steady Threat Exploited Vulnerabilities – Weakening Threat Social Engineering – Rising Threat Careless Employees – Rising Threat Reduced Budgets – Rising Threat Remote workers – Steady Threat Unstable Third Party Providers – Strong Rising Threat Download Software Including Open Source & P2P Files – Steady Threat http://www.csoonline.com/article/print/472866 17 Top 9 Network Security Threats Strong Rising Threat Weakening Threat Rising Threat - Unstable Providers Rising Threat - Malicious Insiders - Social Engineering - Careless Employees - Reduced Budgets Steady Threat - Malware - Remote workers - Download Software Weakening Threat - Exploited Vulnerabilities 18 Type of IT Security Threats Malware Malware (Malicious Software) is a genetic term for programs that try to secretly install themselves on your computer. Other Thailand Czech Republic Turkey UK Ukraine South Korea Germany Russia China (inc HK) US 14.30% 1.20% 1.30% 1.50% 1.70% 1.80% 2.10% 2.30% 9.10% 27.70% 37.00% Top 10 malware hosting countries in 2008 http://www.msun.edu/its/security/threats.htm http://www.sophos.com/sophos/.../sophos-security-threat-report-jan-2009-na.pdf 19 Type of IT Security Threats Type of Malware Viruses Worms Trojan horses Spyware Adware Damage Some viruses delete files, reformat the hard disk. Worms consume bandwidth and can cause degraded network performance. Spyware can collect various types of personal information such as credit card number, or username and password. http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx http://proquest.umi.com/pqdweb?index=0&did=1783184381&SrchMode=1&sid=5&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName =PQD&TS=1257726601&clientId=45249 20 Type of IT Security Threats Social Engineering Social engineering is a term is used to describe the art of persuading people to divulge information, such as usernames, and passwords. Identity Theft steal and sell identity information. Phishing a fake web page. Damage Criminals can use a person’s detail to make transactions or create fake accounts in victim’s name. http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx 21 Type of IT Security Threats SPAM SPAM is electronic junk email. E-mail addresses are collected from chat rooms, websites, newsgroups. Damage SPAM can clog a personal mailbox, overload mail servers and impact network performance. http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx 22 Type of IT Security Threats Denial of Service Attack (DoS Attack) DoS Attack is an attempt to make a computer resource such as a website or web service unavailable to use.. Criminals frequently use Bot to launch DoS Attack Damage Dos attacks typically target large businesses or government institutions. They can make a website or web service temporarily unavailable (for minutes, hours, or days) with ramifications for sales or customer service. http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx 23 Prevention of IT Threats Malware Use antivirus and anti spyware software. Keep current with latest security updates or patches Be wary of opening unexpected e-mails Social Engineering Never disclose any personal information Use Strong passwords. Never e-mail personal or financial information. Check your statements often. http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx 24 Prevention of IT Threats SPAM Use spam filters Use a form of e-mail authentication. Using reasonable mailing and ensuring relevant e-mails. Make sure your e-mails look right in multiple e-mail clients. DOS Attack Plan ahead Use Firewalls to allow or deny protocols, ports, or IP addresses. Utilize routers and switches http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx http://proquest.umi.com/pqdweb?index=0&did=1876359931&SrchMode=1&sid=13&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VNam e=PQD&TS=1257728149&clientId=45249&cfc=1 25 Agenda Introduction IT Security Spending IT Security Threats Chief Information Security Officer (CISO) Case Studies Best Practices 26 Chief Security Officer (CSO) The executive responsible for the organization's entire security posture, both physical and digital. The title Chief Security Officer (CSO) was first used principally inside the information technology function to designate the person responsible for IT security. http://www.csoonline.com/article/221739/What_is_a_Chief_Security_Officer_?page=1,viewed October 10,2009 27 Chief Information Security Officer (CISO) A more accurate description of a job that focuses on information security within an organization , and today the CISO title is becoming more prevalent for leaders with an exclusive info security focus. http://www.csoonline.com/article/221739/What_is_a_Chief_Security_Officer_?page=1,viewed October 10,2009 28 Roles & Responsibilities of a CISO Communications and Relationship Risk and Control Assessment Threat and Vulnerability Management Identity and Access Management http://en.wikipedia.org/wiki/Chief_information_security_officer, Viewed October 10,2009 29 CISO: Skills Required for Success 1. Literature Review CISO should first think of themselves as Business professionals and secondly as security specialist. 2. Partake in continuing security education 3. Soft skills 4. Management 5. Problem solving 6. Understand of the security threats and risks Dwayne Whitten(2008),”The Chief Information Security Officer”: An analysis of the skills required for success”, Journal of Computer Information Systems, Page 15-18 30 CISO: Skills Required for Success 1. 2. Interviews with Eight Executives The executives were basically in agreement that the skills which emerged from the analysis were important. They suggested the addition of two items: * disaster recovery planning * security breach investigation The interviews were conducted over a two month period between December,2005 and January,2006 Dwayne Whitten(2008),”The Chief Information Security Officer”: An analysis of the skills required for success”, Journal of Computer Information Systems, Page 15-18 31 CISO: Skills Required for Success Frequency of Duties on Job Listings Duties % of listing included Oversee IT security policy 70% Management 58% IT security education 42% Maintain currency 39% Vendor relations 36% Disaster recovery planning 27% Security breach investigations 27% A review of 33 recent CISO job listing posted at Chief Security Officer magazine (http://www.CSOonline.com) Dwayne Whitten(2008),”The Chief Information Security Officer”: An analysis of the skills required for success”, Journal of Computer Information Systems, Page 15-18 32 CISO: Skills Required for Success Frequency of Background Experience on Job Listing Duties % of listing included IT security skills 76% Communication skills 61% System experience 61% Leadership skills 39% Investigative experience 27% A review of 33 recent CISO job listing posted at Chief Security Officer magazine (http://www.CSOonline.com) Dwayne Whitten(2008),”The Chief Information Security Officer”: An analysis of the skills required for success”, Journal of Computer Information Systems, Page 15-18 33 CISO: Skills Required for Success Lit. Review CISO Interview Job Listing Management Skills Management (D) Leadership skills (B/E) Maintain Currency (D) IT Security Education IT Security Education (D) Maintain Currency (D) Soft Skills Communication skills (B/E) IT Security Oversee IT Security Policy (D) IT Security Skills (B/E) Problem Solving No Match Business Strategy No Match Disaster Recovery Planning Disaster Recovery Planning (D) Security Breach Investigations Security Breach Investigations (D) Investigation Experience (B/E) System Experience (B/E) No Match Vendor Relations (D) No Match Dwayne Whitten(2008),”The Chief Information Security Officer”: An analysis of the skills required for success”, Journal of Computer Information Systems, Page 15-18 34 CISO: Skills Required for Success Conclusion Business strategy was given the high level of importance by the literature and executives, but it was not in the job listing surveys. Many of the organizations searching for new CISOs during the research period didn’t fully understand the importance of including in the business strategy formulation. Organizations currently employing a CISO should consider the duties and responsibilities included in these results as perfunctory in their position requirement. Dwayne Whitten(2008),”The Chief Information Security Officer”: An analysis of the skills required for success”, Journal of Computer Information Systems, Page 15-18 35 Agenda Introduction IT Security Spending IT Security Threats Chief Information Security Officer (CISO) Case Studies Best Practices 36 Case Studies IT & Security Compliance Manager of: Chief Information Security Officer (CISO) of: Mining Company Compal Communication, Inc. (CCI) 37 Part 1 Overview Mining Company in St. Louis Compal Communication, Inc. (CCI) 38 Mining Company Background: • 2nd largest in their industry Ships and provide product to 35 states and 20+ countries worldwide • • • Size: • • 4,600 employees Revenues: • • $2.9 Billion $350 Million in profits IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 39 Compal Communication, Inc. (CCI) • Background: Manufacturers and trades wireless handsets and other telecommunication equipment • • Size: • 4,000 employees • Revenues: • • $3.25 Billion $380 Million in Profit Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 http://www.compalcomm.com/ 40 Part 2 Reporting Structures Mining Company in St. Louis Compal Communication, Inc. (CCI) 41 Mining Company Sr. VP. Strategic Development VP & CIO IS Support Administrator Mgr. IT Security & Compliance IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 42 Compal Communication, Inc. (CCI) CEO CIO CISO Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 43 Part 3 The Role of CISO Mining Company in St. Louis Compal Communication, Inc. (CCI) 44 Manager IT Security and Compliance • In current position for 4 years • • In charge of security for past 2 Responsibilities • Overseeing IS departments of Security, Change Management, Business Continuity, and Compliance IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 45 Chief Information Security Officer • In current position for 2 years • • In charge of security for past 4 Responsibilities • Develop and structure information security policies, change management, help with integrating security skills Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 46 Part 4 Threats & Risks Mining Company in St. Louis Compal Communication, Inc. (CCI) 47 Threat Examples and Mitigation Risk Mitigation Practice Improper Access to Data Automated Access form that is routed to requestor’s supervisor for approval. Quarterly review of user access by Administrator. Un-patched Software Weekly scans for vulnerabilities are performed on IS assets and reported to the administrators. Improper Physical Access Data center access is limited to only those needing access. Entry and data centers have surveillance. Use of social engineering to gain access End user security training IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 48 Security Issues and Threats Issues and/or Threats System Reliability SQL of Injection Unauthorized Access by Employees Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 49 Part 5 IT Security Policies Mining Company in St. Louis Compal Communication, Inc. (CCI) 50 IT Security Policies • Samples of policies in place: • • • • • • • • • Information Security Policy Risk Assessment ID and Password Access Account Third Party Access Information Security Incident Management Data Access Data Sharing Mobile Device Encryption IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 51 IT Security Policies • Samples of policies in place: • • • • • No visitors allowed in Information Security Department Flash drives can only be readable, not writable Emergency services Access Control System Monitoring control from Security Operation Center Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 52 Part 6 Lessons Learned Mining Company in St. Louis Compal Communication, Inc. (CCI) 53 Lessons Learned • “No silver bullets to security nirvana” • • Security evolves as risk evolves Use a layered approach IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 54 Lessons Learned • Importance of security education for EACH user • Employees must understand risks • Provide company-wide security training • 50+ slides going through 3 tenants of security • CIA Model IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 55 Lessons Learned • • • Keep in line with international information security practice Integrate security needs with business objectives Make appropriate adjustments according to business strategy change 2008/ISO2701 Certificate Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 56 Part 7 Plans for the Future Mining Company in St. Louis Compal Communication, Inc. (CCI) 57 Plans for the Future • Integrate different “specialties” into overall Governance, Risk, and Compliance (GRC) Model IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 58 Plans for the Future • • Review security at each location for operational equipment Document standards and procedures related to IT policies • Example: What to do if you need a user ID? IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 59 Plans for the Future • Information security program for business processes that is “tailormade” for the company • Employee internet management Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 60 Part 8 Summary Comparison Mining Company in St. Louis Compal Communication, Inc. (CCI) 61 Summary Comparison Mining Company CCI $2.9 Billion $3.25 Billion Security Mgr Reports to: VP/CIO CIO Interviewee in charge of Security for: 2 years 3 years Policy examples IS Incident Mgmt, ID & Password, Risk Assessment, Data Access, etc. Data Access, Monitoring, Emergency Services, etc. Top Threats Improper access to data Unauthorized access to data Layered Approach IS in-line w/business strategy GRC Model Info security program for business processes Revenues Lessons Learned Future Plans 62 Agenda Introduction IT Security Spending IT Security Threats Chief Information Security Officer (CISO) Case Studies Best Practices 63 Best Practices from Case Studies • • • • • • Access • Allow on a “least privilege” basis Review security as systems are installed Follow CIA Depth of Security • Layered approach Integrate security needs with business objective Adjust according to business strategy IT Security and Compliance Manager of a Mining Company in St Louis, interviewed in person, by Jason Rottler, Oct, 14,2009 Mr. Qin, CISO of Compal Communication, Inc. interviewed by phone, by Mengmeng Zhao, Oct, 29, 2009 64 The Verizon Business Risk Team: Proper Security Measures • Align process with policy • Achieve “essential” then worry about “excellent” • Create a data retention plan • Control data with transaction zones • Monitor event logs • Incident Response Plan • Increase awareness and testing Study of over 500 breaches from 2004 – 2007 found 87% could have been prevented Swartz, N.. (2008). Study: Most Data Breaches Preventable. Information Management Journal, 42(5), pg 7. 65 THANK YOU Jason Rottler Mengmeng Zhao Vijak Pongtippun Weiwei Huang Ju Yang References 1. http://en.wikipedia.org/wiki/It_security 2. Principles of Information Security By Michael E. Whitman, Herbert J. Mattord http://books.google.com/books?id=gPonBssSm0kC&pg=PA13&lpg=PA13&dq=nstissc+securi ty+model&source=bl&ots=cZ8bUHvAnV&sig=mLSw8gGbD6wrhoP2u9R4t2dLcmg&hl=en&ei= 6jnrSu3SCJW6Noj8rYQM&sa=X&oi=book_result&ct=result&resnum=6&ved=0CBcQ6AEwBQ#v =onepage&q=nstissc%20security%20model&f=false *3. Security as a contributor to knowledge management success By Murray E. Jennex & Suzanne Zyngier Published online: 9 October 2007, # Springer Science + Business Media, LLC 2007 http://proquest.umi.com/pqdweb?index=0&did=1374511721&SrchMode=1&sid=1&Fmt=6& VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1257259579&clientId=45249 4. http://www.billgatesmicrosoft.com/ 5. http://chinadigitaltimes.net/china/bill-gates/ 6.http://www.youtube.com/watch?v=6tnnuGRT088&feature=PlayList&p=3D4EE8E264394E75&pla ynext=1&playnext_from=PL&index=21 *7. Information Age: 'Outsider Trading' and Too Much Information By L. Gordon Crovitz. Wall Street Journal. (Eastern edition). New York, N.Y.: Oct 26, 2009. pg. A.17 http://proquest.umi.com/pqdweb?index=0&did=1886259131&SrchMode=1&sid=5&Fmt=3& VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1257262182&clientId=45249 8. http://www.privacyrights.org/ar/ChronDataBreaches.htm#2009 *9. THE CHIEF INFORMATION SECURITY OFFICER: AN ANALYSIS OF THE SKILLS REQUIRED FOR SUCCESS BY Dwayne Whitten. The Journal of Computer Information Systems. Stillwater: Spring 2008. Vol. 48, Iss. 3; pg. 15, 5 pgs http://proquest.umi.com/pqdweb?index=0&did=1481115001&SrchMode=1&sid=2&Fmt=4& VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1257639426&clientId=45249 10. 2008 CSI Computer Crime & Security Survey, Robert Richardson, CoCSI.com http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf 67 References 11.Information security spending survey 2009 results By Dov Yoran, Partner, Metrosite Group http://metrosite.files.wordpress.com/2008/06/information_security_spending_survey_2009.p df *12. IT Security Spending by U.S. Companies Will Hit US$61 Billion for 2006, Says Info-Tech Research Group PR Newswire. New York: Nov 15, 2006. http://proquest.umi.com/pqdweb?index=4&did=1162465461&SrchMode=1&sid=4&Fmt=3& VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1257727916&clientId=45249#indexi ng 13. http://www.baselinemag.com/c/a/Security/Top-IT-Security-Spending-Priorities-for-2009/ 14. Information Technology Services: Types of Net Threats, from http://www.msun.edu/its/security/threats.htm 15. Sophos security threat report 2009, from http://www.sophos.com/sophos/docs/eng/marketing_material/sophos-security-threatreport-jan-2009-na.pdf 16. The 11 most common computer security threats… And what you can do to protect yourself from them. http://www.symantec-norton.com/11-most-common-computer-security-threats_k13.aspx *17. Kevin Prince, “Top 9 Network Security Threats in 2009”, from http://www.csoonline.com/article/print/472866 *18. Reno, NV, “Academy of Information and Management Sciences” Vol.11 No.2 (October 2007) p.51-53 http://www.alliedacademies.org/Public/Proceedings/Proceedings21/AIMS%20Proceedings.pdf 19. McAfee logo, from http://strategyhealth.com/computer_help/mcafee_logo_1.jpg 68 References 20. Symantec logo, from http://www.cstoncall.com/images/upload/symantec-logo-300dpi.jpg 21. Ad-aware logo, from http://www.weatherbug.com/aws/imagesHmPg0604/img_logo_adaware.gif 22. http://www.csoonline.com/article/221739/What_is_a_Chief_Security_Officer_?page=1,viewed October 10,2009 23. http://en.wikipedia.org/wiki/Chief_information_security_officer, Viewed October 10,2009 24. Interview with IT Manager at Mining Company. http://www.corporatecomplianceinsights.com/2009/grc-management-best-practicesframework-for-more-effective-governance-risk-and-compliance-management *25. Group Test: Anti-malware Michael Lipinski. SC Magazine. New York: Jan 2009. Vol. 20, Iss. 1; pg. 42, 2 pgs http://proquest.umi.com/pqdweb?index=0&did=1783184381&SrchMode=1&sid=5&Fmt=3& VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1257726601&clientId=45249 *26. Five ways to make sure your e-mail isn't flagged as spam Phil Fernandez. B to B. Chicago: Sep 28, 2009. Vol. 94, Iss. 12; pg. 18, 1 pgs http://proquest.umi.com/pqdweb?index=0&did=1876359931&SrchMode=1&sid=13&Fmt=3 &VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1257728149&clientId=45249&cfc= 1 *27. Information security - The CIA model by Le Roux, Yves. Director. London: Aug 1993. pg. 53, 4 pgs http://proquest.umi.com/pqdweb?index=2&did=901411&SrchMode=1&sid=1&Fmt=3&VInst =PROD&VType=PQD&RQT=309&VName=PQD&TS=1257803955&clientId=45249 28. http://www.cert.org/cert/ 29. http://www.compalcomm.com/ 30. http://en.wikipedia.org/wiki/McCumber_cube 69 References *31. Swartz, N.. (2008). Study: Most Data Breaches Preventable. Information Management Journal, 42(5), pg 7. 32. CISO PICTURES, from “INFORMATION SECURITY - TOPIC AND SPEAKERS” http://images.google.com/imgres?imgurl=http://www.isacasv.org/speaker_images/kenbaylo.jpg& imgrefurl=http://www.isacasv.org/SpringConferenceSecTopic2007.html&usg=__8NPq9rC9j7B _wFC9Pl36YIQMww=&h=385&w=350&sz=27&hl=zhCN&start=92&tbnid=6LVk3Bf6CFqSyM:&t bnh=123&tbnw=112&prev=/images%3Fq%3DCISO%26gbv%3D2%26ndsp%3D20%26hl%3DzhCN%26sa%3DN%26start%3D80 * Represents the documents from referred journals 70