Information Security For Small Businessby Julius Clark Sr., CISSP, CISA | October 13th 2009
About MeJulius Clark Sr.Location: Charlotte, NCCurrent home, been residing in Charlotte, NC for over 10 yearsHometownBoston, MaProfessionInformation Security Professional.BDPA Charlotte History2010-2012	President2007-2009 	President-Elect2006-2004	VP of Education & SITES2001-2003	Coordinator - High School Computer CompetitionEducationMBA in Information Security
MSIS in Information Security
BS in Electronic EngineeringCertificationsCertified Information Systems Security Professional (CISSP)
Certified Information Systems Auditor (CISA)
Microsoft Certified System Engineer (MSCE).2
Agenda Information Security for Small Business3
Agenda  (Continued)Information Security for Small Business4
Small Business Wholeness5
Maslow’s Hierarchy of NeedsBeing aware of one’s Wholeness keeps bad things from happening.  A solid foundation must be built to advance. Understanding your environment, your health and activities helps one to continually perform a risk assessments and move to the next level.Self – Actualization – Being All You Can Be
Esteem -  Recognition for Good Work
Love -  Acceptance
Safety & Security – Stability
Needs – Air , Food, Water, Shelter6
Maslow’s Business ComparisonMaslow’s Hierarchy of Needs can be applied to building a successful business. IT Security is a foundation that businesses must build upon to lower IT Security risks and gain a competitive edge.Self – Actualization – Meeting the Mission Statement
Esteem -  Recognition in Market Place
Love -  Acceptance by Clients or Customers
Safety & Security –  IT Security & Insurance
Needs – Capital & People7
What is Information Security?8
What Is Information Security?Protecting your information, technology, property, products and people, thus protecting your business. The Information Security Triad is the foundation for  Information Security and is based on concepts and principles known as  CIA.Confidentiality
Integrity
Availability9
What Is Information Security?Confidentiality Concept of protecting information from improper disclosure and protecting the secrecy and privacy of sensitive data so that the intellectual property and reputation of an organization  is not damaged and that data related to individuals is not released in violation of regulations or the privacy policy of the organization.- From the CISSP® CBK®10
What Is Information Security?Integrity Addresses two objects, which are protecting data and processes from improper modification, and the ensuring the operations of the information is reliable and performing as expected.- From the CISSP® CBK®11
What Is Information Security?Availability Addresses two concepts, which are protecting data and processes from improper modification, and the  concept of ensuring the operations of the information  system is reliable and performing as expected.- From the CISSP® CBK®:12
Importance Of Small BusinessStatistic:There are over 26 million small businesses in the U.S.Source: NIST13
What Is At Stake?Your Business! Your business is at risk of being damaged due to:Financial loss
Lawsuits
Reputation loss
loss of market share
Theft of its technology , resources and products
Denial of service attacks
Blackmail14
Who Are The Actors?Their Roles:Experimenters
Hacktivists
Cyber criminals
Information Warriors
Employees
Dumpster divers
Natural disasters
Terrorist activities15
Who Are The Actors?Malicious Code!Key loggers – Stealing your keystrokes
Viruses
Denial of service
Turning your computer into a zombie aka “Bot”16
Cyber Crime In the news17
Cyber Crime In the News18
Cyber Crime Statistics!Insider threats are responsible for over 80% of small business issues.There are over 70,000 active viruses ; and exponentially growingInformation Security threats can damage or destroy small business33%  businesses with 100 employees or less had a computer incidentSource: NIST19
Cyber Crime Statistics!Small Business Cyber Crime Report42 %  of businesses has a Laptop theft44%  of businesses suffered from Insider Abuse21% of businesses reported Denial of Service50%  of businesses detected a viruses20%  of business systems became a “Bot”Source: Computer Security Institute Survey20
Cyber Crime Statistics!Reported Data Breaches2007  - there were 445 data breaches reported 2008 – there were 656 data breaches reported2009 – approx. 392 data breaches reported so far this year.Source: October 9, 2009 USAToday21
Privacy Rights Clearinghousewww.privacyrights.org22
Privacy Rights Clearinghousewww.privacyrights.orgThe 339,861,901 indicates the total number of records compromised23
The components of Information Security24
The Components of Information SecurityThe Information Security Triad is the foundation for  Information Security and is based on concepts and principles known as  CIA.People
Processes

Information Security For Small Business