foundations of security
DESCRIPTION
This presentation gives a security overview for small and medium businesses. First presented at the Northern Kentucky Chamber of Commerce, the goal of this presentation sought to explain to business owners some of the security issues that they might face, and how they might address these problems before they had the potential to become disasters. We look at physical security, access control, video surveillance, information security, disaster recovery, security planning, licensing, and more.TRANSCRIPT
![Page 1: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/1.jpg)
Foundations of
Security
By: Joe Robb@joelrobb
![Page 2: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/2.jpg)
YOUR BUSINESS
![Page 5: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/5.jpg)
IRE
SUPRESSION
![Page 6: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/6.jpg)
YOUR BUSINESS
![Page 7: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/7.jpg)
![Page 8: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/8.jpg)
ACCESS CONTROL
![Page 9: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/9.jpg)
THE FOB
![Page 10: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/10.jpg)
![Page 11: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/11.jpg)
FACE OR IRIS
RECOGNITION
![Page 12: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/12.jpg)
WHO’S THIS GUY?
THIS IS YOUR SERVER ROOM.
![Page 13: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/13.jpg)
DON’T WONDER,
![Page 14: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/14.jpg)
KNOW.
![Page 15: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/15.jpg)
KNOW YOUR
NETWORK
![Page 16: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/16.jpg)
What piece of equipment you think of when I say:
Network Security?
![Page 17: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/17.jpg)
![Page 18: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/18.jpg)
THE INTERNET
FIREW
ALL
![Page 19: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/19.jpg)
Home Firewall vs. Business Firewall
Which is better for your business?
![Page 20: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/20.jpg)
ANTIVIRUS
![Page 21: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/21.jpg)
Remember: Antivirus goes on a computer
![Page 22: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/22.jpg)
Backup
![Page 23: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/23.jpg)
3 Main Types of Backup Devices
![Page 24: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/24.jpg)
BACKUP SOFTWARE
![Page 25: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/25.jpg)
Now, let’s talk about …
![Page 26: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/26.jpg)
… the most dangerous part of your business
…
![Page 27: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/27.jpg)
(and the most wonderful)
![Page 29: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/29.jpg)
# of USERS
![Page 30: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/30.jpg)
Types of Users
![Page 31: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/31.jpg)
Licensing
![Page 32: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/32.jpg)
YOU MUST HAVE A
DISASTER RECOVERY
PLAN!
![Page 33: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/33.jpg)
This is Not Disaster
Recovery
![Page 34: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/34.jpg)
DATA SURVIVABILITY
DOESN’T HAVE TO BE THIS COMPLICATED
![Page 35: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/35.jpg)
Or just this one?
Do You Need All of Your Servers to Conduct
Business?
![Page 36: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/36.jpg)
Does everyone need instant, local
recovery?
Or does just this one?
![Page 37: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/37.jpg)
Partial or Full Cloud Storage?
![Page 38: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/38.jpg)
What’s Your Acceptable Downtime?
HOURSDAYS
![Page 39: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/39.jpg)
Whose work is more valuable?
![Page 40: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/40.jpg)
![Page 42: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/42.jpg)
Work with IT
![Page 43: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/43.jpg)
![Page 44: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/44.jpg)
Don’t be paranoid, but know when to
have a healthy fear.
![Page 45: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/45.jpg)
To Close:
I am Joe RobbYou can find me here:
http://twitter.com/joelrobbhttp://linkedin.com/in/joerobb
http://profiles.google.com/robb.joehttp://blog.gbs-inc.com
Today, go here: http://www.slideshare.net/joerobb
![Page 46: Foundations of Security](https://reader037.vdocuments.us/reader037/viewer/2022102815/554e2279b4c90511778b4f41/html5/thumbnails/46.jpg)
Image Attribution:Business Building: http://imageshack.us/photo/my-images/209/dscf7313gpf3.jpg/Forrest Fire: http://www.erh.noaa.gov/okx/okxfirewx.htmlFire Alarm: http://www.flickr.com/photos/shingst/5805978727/Security Cameras: http://www.flickr.com/photos/therontrowbridge/2382074038/Access Control: http://www.flickr.com/photos/frisno/5616935311/Thumbs Up: http://www.flickr.com/photos/vegaseddie/5700609302/Child’s Eyes: http://www.flickr.com/photos/34586698@N00/265915797/Server Room Guy: http://goo.gl/5eUS4Firewall: http://www.imdb.com/title/tt0408345/Users: http://www.flickr.com/photos/ohhector/2366343607/ Hacked: http://goo.gl/XOo7gComic: http://xkcd.com/