SlideShare a Scribd company logo
1 of 14
Information Technology Security
for Small Business
(video script)
Descriptive Text for the Visually Impaired
August 11, 2009
By Joan Porter
Visual: Images related to computer and internet use and images
symbolic of information
technology security and cyber crime.
Narration:
“No matter how well you protect your business your
information is still very much at
risk and that puts your business at risk.
Visual: A computer keyboard and a cell phone.
Text: The words, “Names, Emails, Phone Numbers, Account
Numbers, Files, Passwords,
User Ids, Payroll, Internet Transactions, Credit Card Numbers,
Electronic Commerce and
Employee Databases” appear.
Narration:
“The dangers change and grow every day and the threats they
pose to your business –
and others – can be devastating.”
Text: The words, “The best defense against these growing
attacks?”appear.
Narration:
“The best defense against these growing attacks?”
Text: The words, “Information Technology Security for Small
Business” and “It’s not
just good business. It’s essential business” appear.
Narration:
“Information Technology Security. It’s not just good business.
It’s essential business.”
Visual: Scenes of employees working at computers and
working in a variety of jobs at
different kinds of small businesses.
1
Narration:
“Today protecting your business’s information is just as critical
as protecting every
other asset you have – your property, your employees and your
products. It doesn’t
matter what kind of business you’re in or its size – whether you
have one employee or
500. The fact is, your information is valuable and it’s at risk.”
Visual: Matthew Scholl, Group Manager, Security Management
and Assurance
Computer Security Division, NIST on camera.
“It’s important that small businesses make IT security a top
priority in order to protect
their businesses. They make other security decisions everyday.
They lock their doors, they have alarm systems, they have
trusted employees working
behind the counters. They should exercise the same level of
security and due diligence
to their IT space where they have just as much exposure.”
Visual: Richard Kissel, Information Security Analyst, Computer
Security Division, NIST
on camera.
“Cyberspace is a dangerous place to be. We all are there
because we have to be there
because that’s where technology forces us to go right now. And
if you don’t understand
that climate and the things that are involved there then you can
get into trouble really
quickly.”
Visual: Jane Boorman, Project Manager, Office of
Entrepreneurship Education, U.S.
Small Business Administration on camera.
“There are some 26 million small businesses in this country and
they all need
to pay attention to the dangers of cyber crime. It’s one of the
greatest risks they face
but many people don’t realize it. Small businesses are “open for
business!” They want
their customers to come in but they’re so open for business they
sometimes don’t take
the time. They don’t really realize that their entire business is at
stake and when they
are careless about their information technology protection, they
can lose the entire
business.”
Visual: Matthew Scholl on camera
“The threats that are faced by small businesses are very similar
to the threats faced by
the federal government and large businesses as a whole. The
truth of the matter is they
don’t care who you are. All they care about is that they can
access your assets for their
purposes.”
Visual: An image showing the globe and a computer keyboard.
2
Text: The words, “Who are they?” appear.
Narration:
“But who are ‘they?’ Who is responsible for this?”
Text: The words, “Hackers; Experimenters and Vandals;
Hacktivists; Cyber Criminals
and Information Warriors” appear.
Narration:
“There are four main types of hackers. Experimenters and
vandals are usually
amateurs who do it for the thrill or to make a reputation for
themselves. Hacktivists
have a personal or political agenda. Cyber criminals are in it for
the money. Other
hackers are Information Warriors.”
Visual: Digital program code over image of Earth as seen from
outer space.
Narration:
“They are professionals who work for nation-states which may
have missions to
disrupt the Internet for example, or take out a city’s electrical
grid.”
Visual: Scenes of employees working at computers in a variety
of kinds of businesses.
Narration:
“But all the dangers don’t come from the ‘outside.’ Businesses
can be severely
damaged - intentionally or unintentionally - by their own
employees.”
Text: The words, “Insider Threats” appear.
Visual: Scenes of employees and computers at different
businesses.
Narration:
“These ‘insider threats’ are responsible for nearly 80% of the
problems that most small
businesses have. No matter where the threat is coming from, the
target is still the same
−access to a business’s systems and information.”
Visual: Richard Kissel on camera
“The reality is that there’s dangers out there in all kinds of
forms.”
Visual: Image of computer code – zeroes and ones.
3
Text: The words, “Theft of Data and Resources” appear.
Richard Kissel:
“You have theft of data, theft of resources, things like walking
off with a laptop.”
Visual: Richard Kissell on camera
“You have the electronic PDAs of various kinds and literally
some people run their
businesses from these devices not understanding that all that
sensitive information on
those devices is vulnerable and it’s not encrypted, it’s not
protected and so if they lose
the device or somebody walks off with it all that data is gone.
And may come back to
haunt them later on.”
Visual: Image of a hacker typing on a laptop
Text: The words, “Denial-of-Service Attacks” appear.
Visual: Richard Kissel on camera
“You have other activities that nefarious folks can take and
that’s denial-of-service
where they just hammer a system until it just stops functioning
and sometimes this is
done to blackmail a business. They demonstrate that they can
take down the system or
the network and they say, ‘if you don’t pay us, we will take you
out,’ and they mean it.”
Text: The words, “Malicious Code” appear.
Visual: Richard Kissel on camera
“Then you have people releasing malicious code. Once it gets
on a system then it’ll do
whatever it’s programmed to do. Malicious code can include
things like keystroke
loggers, which if somebody puts one on your system, it sits
there and silently watches
every keystroke you make which includes little things like bank
account numbers, the
passwords you use to get into your accounts, the answers you
give to the security
verification questions.”
Text: The word, “Viruses” appears.
Visual: Several computer screens
Richard Kissel:
“And viruses are a case of malicious code – and in terms of
viruses there’s about
70,000 active viruses out there right now. The number goes up
every year.”
4
Visual: Richard Kissel on camera
“So these are the kind of threats that we look at, we see out
there. These are general
classes of things that can go wrong and they all have the
potential to damage or destroy
an average small business.”
Visual: Employees working at computers and a meeting of one
company’s employees.
Narration:
“A survey by the Computer Security Institute showed that a
third of all data breaches
in just one year came at the expense of businesses with 100
employees or less.”
Text: The words, “Computer Security Institute Survey; 42% -
Laptop Theft; 44% -
Insider Abuse; 21% - Denial-of-Service Attacks; 50% -
Computer Viruses” and “20% -
Systems made into bots” appear.
Narration:
“Another survey of businesses – 23% of which were small
businesses - showed that
42% reported laptop theft, 44% reported insider abuse, 21%
reported denial-of- service
attacks, 50% detected computer viruses and 20% reported
systems being made into
bots.”
Visual: A variety of people in typing on computers and other
activities at different types
of businesses.
Narration:
“A bot is one of many computers that cybercriminals have taken
over to make a botnet
that they can use to attack other businesses, large industrial and
even governmental
systems. So, the vulnerability of one small business may not
seem significant. But with
over 26 million small businesses in the US, a threat that’s
common to a large
percentage of them could pose a threat to the nation.”
Visual: A variety of employees working at different businesses
including offices, stores,
restaurants and manufacturing.
Matt Scholl
“There are no silver bullets. So outsourcing is definitely an
option that a small
business can take to help them identify their risks and provide
information security
appropriately but it’s important that a small business understand
the basics of
information security, what their risks are and the different ways
they can mitigate
those risks effectively. And that they should not solely rely on
an outsourcing solution.
5
Information security can be an expense and there is a significant
knowledge curve that
needs to happen which is one of the reasons why we are doing
this. Because in
our belief this is essential to maintain the business and it can be
done in a cost effective
manner that is also effective for the small business owner.
We have an understanding of the small business as a part of the
critical infrastructure
of the nation economically and socially and its importance as a
national asset that
needs to be protected which is why SBA, FBI and NIST have
partnered together on
this work.”
Visual: Employees working at a variety of businesses with logo
representing NIST, SBA
and the FBI’s collaboration.
Text: The words, “Computer Security is Good Business” appear.
Narration:
“The collaboration between NIST, the Small Business
Administration, and the FBI
provides small businesses with a wealth of information and
resources at the national
and local levels including training and education, networking
opportunities and
practical assistance.”
Visual: Scenes of people working and meeting at a variety of
businesses.
Text: The words, “Right Investment; Define Needs; Security
Practices; Stay Current”
appear.
Narration:
“Business owners can learn how to make the right investment,
define their information
security needs, establish common security practices, and stay
current. These are just a
few of the topics available to help small businesses protect their
information.”
Visual: Image of a padlock on a computer motherboard and
other images that represent
information technology security.
Text: The words, “Information Technology Laboratory,
Computer Security Resource
Center” and web address
“http://csrc.nist.gov/groups/SMA/sbc/index.html” appear.
Narration:
“The web site for NIST’s Computer Security Resource Center
can guide small business
owners to the kind of help they need whether they’re just
getting started or staying up
to date with the latest in information technology security.”
6
http://csrc.nist.gov/groups/SMA/sbc/index.html
Visual: Richard Kissel on camera
“There’s a very small set of things, actions that a small business
can do to avoid being
an easy target. But they have to be done. And they have to be
done consistently. So it’s
easy to avoid being the easy mark but you do have to work at it.
You can’t just sit still.
You sit still and you’re gone.”
Text: The words, “Information Technology Security for Small
Business” and “It’s not
just good business. It’s essential business” appear.
Text: The following production credits appear.
Writer
Joan Porter
Videography
Chris Sciannella
Editors
Joanna Pearson
Chris Sciannella
Technical Advisor
Magdalena Benitez
Computer Security Division, NIST
Special Thanks To
Jane Boorman
U.S. Small Business Administration
Matthew Scholl
Computer Security Division, NIST
Richard Kissel
Computer Security Division, NIST
Executive Producer
Ron E. Meininger
NIST Public and Business Affairs
Disclaimer
The display of products and services in this program is for
demonstration purposes only
and does not imply an endorsement by NIST
7
8
Produced by
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
U.S. Department of Commerce
July 2009
Visual: Fade to black
Visual: Digital program code over image of Earth as seen from
outer space.

More Related Content

Similar to Information Technology Security for Small Business (.docx

Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationHayden McCall
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!Frode Hommedal
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 

Similar to Information Technology Security for Small Business (.docx (20)

Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
The man behind the city
The man behind the cityThe man behind the city
The man behind the city
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
Security
SecuritySecurity
Security
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
TME0212-49
TME0212-49TME0212-49
TME0212-49
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!The Internet is on fire – don't just stand there, grab a bucket!
The Internet is on fire – don't just stand there, grab a bucket!
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 

More from MARRY7

Part 1.....InstructionsSelect one of the age groups disc.docx
Part 1.....InstructionsSelect one of the age groups disc.docxPart 1.....InstructionsSelect one of the age groups disc.docx
Part 1.....InstructionsSelect one of the age groups disc.docxMARRY7
 
Part 1 – Add to Website PlanList at least three .docx
Part 1 – Add to Website PlanList at least three .docxPart 1 – Add to Website PlanList at least three .docx
Part 1 – Add to Website PlanList at least three .docxMARRY7
 
Part 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docxPart 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docxMARRY7
 
Part 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docxPart 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docxMARRY7
 
Part 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docxPart 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docxMARRY7
 
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxPart 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxMARRY7
 
Part 1 Review QuestionsWhat is the difference between criminal la.docx
Part 1 Review QuestionsWhat is the difference between criminal la.docxPart 1 Review QuestionsWhat is the difference between criminal la.docx
Part 1 Review QuestionsWhat is the difference between criminal la.docxMARRY7
 
Part 1 Review QuestionsWhat is the difference between authenticat.docx
Part 1 Review QuestionsWhat is the difference between authenticat.docxPart 1 Review QuestionsWhat is the difference between authenticat.docx
Part 1 Review QuestionsWhat is the difference between authenticat.docxMARRY7
 
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxPart 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxMARRY7
 
Part 1 Review QuestionsWhat functions constitute a complete infor.docx
Part 1 Review QuestionsWhat functions constitute a complete infor.docxPart 1 Review QuestionsWhat functions constitute a complete infor.docx
Part 1 Review QuestionsWhat functions constitute a complete infor.docxMARRY7
 
Part 1A persons lifestyle has a significant influence on the p.docx
Part 1A persons lifestyle has a significant influence on the p.docxPart 1A persons lifestyle has a significant influence on the p.docx
Part 1A persons lifestyle has a significant influence on the p.docxMARRY7
 
Part 1 Review QuestionsWhat is the definition of information secu.docx
Part 1 Review QuestionsWhat is the definition of information secu.docxPart 1 Review QuestionsWhat is the definition of information secu.docx
Part 1 Review QuestionsWhat is the definition of information secu.docxMARRY7
 
Part 1 Review QuestionsWhat is a security modelWhat are the es.docx
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxPart 1 Review QuestionsWhat is a security modelWhat are the es.docx
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxMARRY7
 
Part 1 Listed below are several key Supreme Court decisions that .docx
Part 1 Listed below are several key Supreme Court decisions that .docxPart 1 Listed below are several key Supreme Court decisions that .docx
Part 1 Listed below are several key Supreme Court decisions that .docxMARRY7
 
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docxPart 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docxMARRY7
 
part 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docxpart 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docxMARRY7
 
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docxPart 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docxMARRY7
 
Parent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docxParent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docxMARRY7
 
Parenting Practices Over GenerationsGeneration 1 Years children.docx
Parenting Practices Over GenerationsGeneration 1 Years children.docxParenting Practices Over GenerationsGeneration 1 Years children.docx
Parenting Practices Over GenerationsGeneration 1 Years children.docxMARRY7
 
ParamsThe interface must be pleasing to look at (a basic form wit.docx
ParamsThe interface must be pleasing to look at (a basic form wit.docxParamsThe interface must be pleasing to look at (a basic form wit.docx
ParamsThe interface must be pleasing to look at (a basic form wit.docxMARRY7
 

More from MARRY7 (20)

Part 1.....InstructionsSelect one of the age groups disc.docx
Part 1.....InstructionsSelect one of the age groups disc.docxPart 1.....InstructionsSelect one of the age groups disc.docx
Part 1.....InstructionsSelect one of the age groups disc.docx
 
Part 1 – Add to Website PlanList at least three .docx
Part 1 – Add to Website PlanList at least three .docxPart 1 – Add to Website PlanList at least three .docx
Part 1 – Add to Website PlanList at least three .docx
 
Part 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docxPart 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docx
 
Part 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docxPart 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docx
 
Part 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docxPart 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docx
 
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxPart 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
 
Part 1 Review QuestionsWhat is the difference between criminal la.docx
Part 1 Review QuestionsWhat is the difference between criminal la.docxPart 1 Review QuestionsWhat is the difference between criminal la.docx
Part 1 Review QuestionsWhat is the difference between criminal la.docx
 
Part 1 Review QuestionsWhat is the difference between authenticat.docx
Part 1 Review QuestionsWhat is the difference between authenticat.docxPart 1 Review QuestionsWhat is the difference between authenticat.docx
Part 1 Review QuestionsWhat is the difference between authenticat.docx
 
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxPart 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
 
Part 1 Review QuestionsWhat functions constitute a complete infor.docx
Part 1 Review QuestionsWhat functions constitute a complete infor.docxPart 1 Review QuestionsWhat functions constitute a complete infor.docx
Part 1 Review QuestionsWhat functions constitute a complete infor.docx
 
Part 1A persons lifestyle has a significant influence on the p.docx
Part 1A persons lifestyle has a significant influence on the p.docxPart 1A persons lifestyle has a significant influence on the p.docx
Part 1A persons lifestyle has a significant influence on the p.docx
 
Part 1 Review QuestionsWhat is the definition of information secu.docx
Part 1 Review QuestionsWhat is the definition of information secu.docxPart 1 Review QuestionsWhat is the definition of information secu.docx
Part 1 Review QuestionsWhat is the definition of information secu.docx
 
Part 1 Review QuestionsWhat is a security modelWhat are the es.docx
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxPart 1 Review QuestionsWhat is a security modelWhat are the es.docx
Part 1 Review QuestionsWhat is a security modelWhat are the es.docx
 
Part 1 Listed below are several key Supreme Court decisions that .docx
Part 1 Listed below are several key Supreme Court decisions that .docxPart 1 Listed below are several key Supreme Court decisions that .docx
Part 1 Listed below are several key Supreme Court decisions that .docx
 
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docxPart 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
 
part 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docxpart 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docx
 
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docxPart 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
 
Parent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docxParent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docx
 
Parenting Practices Over GenerationsGeneration 1 Years children.docx
Parenting Practices Over GenerationsGeneration 1 Years children.docxParenting Practices Over GenerationsGeneration 1 Years children.docx
Parenting Practices Over GenerationsGeneration 1 Years children.docx
 
ParamsThe interface must be pleasing to look at (a basic form wit.docx
ParamsThe interface must be pleasing to look at (a basic form wit.docxParamsThe interface must be pleasing to look at (a basic form wit.docx
ParamsThe interface must be pleasing to look at (a basic form wit.docx
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Information Technology Security for Small Business (.docx

  • 1. Information Technology Security for Small Business (video script) Descriptive Text for the Visually Impaired August 11, 2009 By Joan Porter Visual: Images related to computer and internet use and images symbolic of information technology security and cyber crime. Narration: “No matter how well you protect your business your information is still very much at risk and that puts your business at risk. Visual: A computer keyboard and a cell phone. Text: The words, “Names, Emails, Phone Numbers, Account Numbers, Files, Passwords, User Ids, Payroll, Internet Transactions, Credit Card Numbers,
  • 2. Electronic Commerce and Employee Databases” appear. Narration: “The dangers change and grow every day and the threats they pose to your business – and others – can be devastating.” Text: The words, “The best defense against these growing attacks?”appear. Narration: “The best defense against these growing attacks?” Text: The words, “Information Technology Security for Small Business” and “It’s not just good business. It’s essential business” appear. Narration: “Information Technology Security. It’s not just good business. It’s essential business.” Visual: Scenes of employees working at computers and working in a variety of jobs at different kinds of small businesses. 1 Narration:
  • 3. “Today protecting your business’s information is just as critical as protecting every other asset you have – your property, your employees and your products. It doesn’t matter what kind of business you’re in or its size – whether you have one employee or 500. The fact is, your information is valuable and it’s at risk.” Visual: Matthew Scholl, Group Manager, Security Management and Assurance Computer Security Division, NIST on camera. “It’s important that small businesses make IT security a top priority in order to protect their businesses. They make other security decisions everyday. They lock their doors, they have alarm systems, they have trusted employees working behind the counters. They should exercise the same level of security and due diligence to their IT space where they have just as much exposure.” Visual: Richard Kissel, Information Security Analyst, Computer Security Division, NIST on camera. “Cyberspace is a dangerous place to be. We all are there because we have to be there because that’s where technology forces us to go right now. And if you don’t understand that climate and the things that are involved there then you can get into trouble really quickly.” Visual: Jane Boorman, Project Manager, Office of Entrepreneurship Education, U.S. Small Business Administration on camera.
  • 4. “There are some 26 million small businesses in this country and they all need to pay attention to the dangers of cyber crime. It’s one of the greatest risks they face but many people don’t realize it. Small businesses are “open for business!” They want their customers to come in but they’re so open for business they sometimes don’t take the time. They don’t really realize that their entire business is at stake and when they are careless about their information technology protection, they can lose the entire business.” Visual: Matthew Scholl on camera “The threats that are faced by small businesses are very similar to the threats faced by the federal government and large businesses as a whole. The truth of the matter is they don’t care who you are. All they care about is that they can access your assets for their purposes.” Visual: An image showing the globe and a computer keyboard. 2 Text: The words, “Who are they?” appear.
  • 5. Narration: “But who are ‘they?’ Who is responsible for this?” Text: The words, “Hackers; Experimenters and Vandals; Hacktivists; Cyber Criminals and Information Warriors” appear. Narration: “There are four main types of hackers. Experimenters and vandals are usually amateurs who do it for the thrill or to make a reputation for themselves. Hacktivists have a personal or political agenda. Cyber criminals are in it for the money. Other hackers are Information Warriors.” Visual: Digital program code over image of Earth as seen from outer space. Narration: “They are professionals who work for nation-states which may have missions to disrupt the Internet for example, or take out a city’s electrical grid.” Visual: Scenes of employees working at computers in a variety of kinds of businesses. Narration: “But all the dangers don’t come from the ‘outside.’ Businesses can be severely damaged - intentionally or unintentionally - by their own
  • 6. employees.” Text: The words, “Insider Threats” appear. Visual: Scenes of employees and computers at different businesses. Narration: “These ‘insider threats’ are responsible for nearly 80% of the problems that most small businesses have. No matter where the threat is coming from, the target is still the same −access to a business’s systems and information.” Visual: Richard Kissel on camera “The reality is that there’s dangers out there in all kinds of forms.” Visual: Image of computer code – zeroes and ones. 3 Text: The words, “Theft of Data and Resources” appear. Richard Kissel: “You have theft of data, theft of resources, things like walking off with a laptop.” Visual: Richard Kissell on camera “You have the electronic PDAs of various kinds and literally
  • 7. some people run their businesses from these devices not understanding that all that sensitive information on those devices is vulnerable and it’s not encrypted, it’s not protected and so if they lose the device or somebody walks off with it all that data is gone. And may come back to haunt them later on.” Visual: Image of a hacker typing on a laptop Text: The words, “Denial-of-Service Attacks” appear. Visual: Richard Kissel on camera “You have other activities that nefarious folks can take and that’s denial-of-service where they just hammer a system until it just stops functioning and sometimes this is done to blackmail a business. They demonstrate that they can take down the system or the network and they say, ‘if you don’t pay us, we will take you out,’ and they mean it.” Text: The words, “Malicious Code” appear. Visual: Richard Kissel on camera “Then you have people releasing malicious code. Once it gets on a system then it’ll do whatever it’s programmed to do. Malicious code can include things like keystroke loggers, which if somebody puts one on your system, it sits there and silently watches every keystroke you make which includes little things like bank account numbers, the
  • 8. passwords you use to get into your accounts, the answers you give to the security verification questions.” Text: The word, “Viruses” appears. Visual: Several computer screens Richard Kissel: “And viruses are a case of malicious code – and in terms of viruses there’s about 70,000 active viruses out there right now. The number goes up every year.” 4 Visual: Richard Kissel on camera “So these are the kind of threats that we look at, we see out there. These are general classes of things that can go wrong and they all have the potential to damage or destroy an average small business.” Visual: Employees working at computers and a meeting of one company’s employees. Narration: “A survey by the Computer Security Institute showed that a
  • 9. third of all data breaches in just one year came at the expense of businesses with 100 employees or less.” Text: The words, “Computer Security Institute Survey; 42% - Laptop Theft; 44% - Insider Abuse; 21% - Denial-of-Service Attacks; 50% - Computer Viruses” and “20% - Systems made into bots” appear. Narration: “Another survey of businesses – 23% of which were small businesses - showed that 42% reported laptop theft, 44% reported insider abuse, 21% reported denial-of- service attacks, 50% detected computer viruses and 20% reported systems being made into bots.” Visual: A variety of people in typing on computers and other activities at different types of businesses. Narration: “A bot is one of many computers that cybercriminals have taken over to make a botnet that they can use to attack other businesses, large industrial and even governmental systems. So, the vulnerability of one small business may not seem significant. But with over 26 million small businesses in the US, a threat that’s common to a large percentage of them could pose a threat to the nation.”
  • 10. Visual: A variety of employees working at different businesses including offices, stores, restaurants and manufacturing. Matt Scholl “There are no silver bullets. So outsourcing is definitely an option that a small business can take to help them identify their risks and provide information security appropriately but it’s important that a small business understand the basics of information security, what their risks are and the different ways they can mitigate those risks effectively. And that they should not solely rely on an outsourcing solution. 5 Information security can be an expense and there is a significant knowledge curve that needs to happen which is one of the reasons why we are doing this. Because in our belief this is essential to maintain the business and it can be done in a cost effective manner that is also effective for the small business owner. We have an understanding of the small business as a part of the critical infrastructure of the nation economically and socially and its importance as a national asset that needs to be protected which is why SBA, FBI and NIST have partnered together on
  • 11. this work.” Visual: Employees working at a variety of businesses with logo representing NIST, SBA and the FBI’s collaboration. Text: The words, “Computer Security is Good Business” appear. Narration: “The collaboration between NIST, the Small Business Administration, and the FBI provides small businesses with a wealth of information and resources at the national and local levels including training and education, networking opportunities and practical assistance.” Visual: Scenes of people working and meeting at a variety of businesses. Text: The words, “Right Investment; Define Needs; Security Practices; Stay Current” appear. Narration: “Business owners can learn how to make the right investment, define their information security needs, establish common security practices, and stay current. These are just a few of the topics available to help small businesses protect their information.” Visual: Image of a padlock on a computer motherboard and other images that represent
  • 12. information technology security. Text: The words, “Information Technology Laboratory, Computer Security Resource Center” and web address “http://csrc.nist.gov/groups/SMA/sbc/index.html” appear. Narration: “The web site for NIST’s Computer Security Resource Center can guide small business owners to the kind of help they need whether they’re just getting started or staying up to date with the latest in information technology security.” 6 http://csrc.nist.gov/groups/SMA/sbc/index.html Visual: Richard Kissel on camera “There’s a very small set of things, actions that a small business can do to avoid being an easy target. But they have to be done. And they have to be done consistently. So it’s easy to avoid being the easy mark but you do have to work at it. You can’t just sit still. You sit still and you’re gone.” Text: The words, “Information Technology Security for Small Business” and “It’s not just good business. It’s essential business” appear. Text: The following production credits appear.
  • 13. Writer Joan Porter Videography Chris Sciannella Editors Joanna Pearson Chris Sciannella Technical Advisor Magdalena Benitez Computer Security Division, NIST Special Thanks To Jane Boorman U.S. Small Business Administration Matthew Scholl Computer Security Division, NIST Richard Kissel Computer Security Division, NIST Executive Producer Ron E. Meininger NIST Public and Business Affairs Disclaimer The display of products and services in this program is for demonstration purposes only and does not imply an endorsement by NIST
  • 14. 7 8 Produced by Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce July 2009 Visual: Fade to black Visual: Digital program code over image of Earth as seen from outer space.