The Recommendations

Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
The
Recommendations
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
1 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Recommendations
1.
2.
3.
4.
Become aware of the problem
Devise an information security strategy
Implement some remedial procedures immediately
Seek professional help without delay
5. Adopt international standards and best practices
6. Identify the gaps in national legislation
7. Encourage the United Nations to embark urgently
on a Law of Cyberspace
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
2 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Awareness
Information Security is NOT just a technical problem
Everyone has a role to play
You cannot manage what you do not understand
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
3 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Security Strategy
Assign responsibility for strategy
Ensure that strategy matches needs
Re-evaluate strategy frequently
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
4 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Remedial Procedures
Do the simple things first
Do them NOW
Advice is readily available and it is free
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
5 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Professional Help
Employ “ethical hackers”
Involve Auditors and Consultants
Consult Professional Associations
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
6 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Standards and Best Practices
Adopt ISO 17799 or equivalent
Do not reinvent the wheel
Ensure compliance with adopted standards
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
7 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Gaps in Legislation
Gaps will be exploited by the Bad Guys
Understanding the gaps will encourage legislation
Legislation will level the playing field
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
8 of 9
Next slide: PgDn or Click
Previous slide: PgUp
To quit the presentation: Esc
Law of Cyber-Space
A global comprehensive consensus among all stake-holders
It cannot wait
Only the United Nations can do it
E. Gelbstein
A. Kamal
Information Insecurity
Part IV: The Recommendations
9 of 9