ECM1c

Information about ECM1c

Published on November 20, 2007

Author: Berenger

Source: authorstream.com

Content

Slide1:  Okay, so what does THAT mean? Rule 1B-26.003, F.A.C. Requirements Specific requirements included in the Rule include: Standard Group IV TIFF images – sets a verifiable cross-platform imaging standard for vendors. Also introduces security standards, legality of optical images. Minimum 300 dots per inch (dpi) for 8 ½ x 11” documents - Assures image quality for future retrievals. Minimum 300 dots per inch (dpi) for architectural/engineering drawings/maps – Assures image quality for future retrievals. Recopy optical platters every ten years or less (platters that include documents with a retention requirement of ten years or more) – provides for archival security of documents. Maintain a migration path for both hardware and software – assures that archives will not become obsolete or lost due to “technology creep”. Copyright 2004, William A. Cellich and CCS Productions Slide2:  A Typical Enterprise Content Management System Three Dell 6450 servers plus a Power Vault with 1-tera-byte capacity for index data, system data, and image cache One Dell 2650 web server Compaq DL-380 gateway server Two optical media jukeboxes with a total capacity of 426 giga-bytes for electronic images/pages Eleven high production scanners One large format scanner Seven million pages of information Copyright 2004, William A. Cellich and CCS Productions What Kind of Security Needs Do We Have? Slide3:  A Typical Enterprise Content Management System (continued) Software to capture, index, and store Software to deliver content via client PC and web browser Tripwire IDS Remote Access thru Netmeeting, Terminal Services, and VPN Windows mixed-mode environment: Servers - NT 4.0, W2K Clients - 95, 98, 98SE, W2K 225 users ONE SYSTEM ADMINISTRATOR Copyright 2004, William A. Cellich and CCS Productions What Kind of Security Needs Do We Have? Slide4:  Security Risks Inherent in the ECM Lifecycle Authentication and Validation Errors Factual Data Input Accidental Intentional Directed Corrections Technology Hardware induced Software induced Environmental Disaster Workarounds Business Related Poor Library Management Sale of Assets Loss of Experts Deficient Warehousing Human Factors Greed Malicious Espionage Turnover Asset Transfer Regulatory Federal State Local Auditing Requirements Certification Programs Copyright 2004, William A. Cellich and CCS Productions Capture Manage Store Preserve Deliver Risk Mitigation:  Copyright 2004, William A. Cellich and CCS Productions Risk Mitigation Slide6:  His arrest in February 1994 badly embarrassed the CIA. He remains the most damaging mole ever to burrow into the agency. After he was caught, Congress criticized the CIA for badly bungling the Ames investigation. It should have been known that he was a mole much earlier but instead of investigating obvious clues -- he drove a new Jaguar to work that cost more than his annual salary -- it spent years chasing dead-end leads and focusing on obscure suspects. While that criticism stung, what really infuriated CIA officers the most about Ames was that he was one of their own. The CIA had trained him to recruit foreigners as spies. Yet, he was the one who had betrayed his own country. Why? “What really amazed me about Rick Ames is that I thought he had a feeling of loyalty to the people whom he dealt with and that is the betrayal that I can’t understand,” said FBI agent R. Patrick Watson. “I can understand why he didn’t have any loyalty to the agency. I can understand how he could have lost his way so that there came a point when it didn’t matter to him if he was the recruiter or the recruitee. But what I can’t understand is how he lost his loyalty, not only to his coworkers, such as me, but his friends! How can you ever justify betraying the people closest to you?” Ideological Risks Copyright 2004, William A. Cellich and CCS Productions Slide7:  Ramon Garcia was one of his code names. He thought he had been cautious, never giving Moscow his real name and never meeting with the KGB. But he had not been careful enough. His biggest mistake had been leaving his fingerprints on the plastic garbage bags in which he delivered state secrets. When his file was sold by a former KGB higher-up in September 2000, the FBI lab had asked for everything. Surprisingly, the Russians had kept the Hefty bags and once the prints had been dusted and traced, his fate was sealed. Human Factor Risks Copyright 2004, William A. Cellich and CCS Productions Slide8:  National security advisor to President Bill Clinton from 1997 to 2001. During Berger's tenure, the United States engaged in military operations against Iraq on four occasions. Trusted Mechanisms Risks Copyright 2004, William A. Cellich and CCS Productions Slide9:  Compliance and Regulatory Risks Worldcom Enron Arthur Andersen Copyright 2004, William A. Cellich and CCS Productions Slide10:  Insider Risks Copyright 2004, William A. Cellich and CCS Productions BJs Warehouse replaces credit cards because of database hack… Study: ID theft usually an inside job Up to 70 percent of cases start with employee heist …student employee at the University of Texas allegedly stole 55,000 Social Security Numbers. …3 admit hacking into Lowe's computer Men conspired to steal credit card information, authorities say The Associated Press

Related presentations


Other presentations created by Berenger

Bernard Meunier Nestle
26. 11. 2007
0 views

Bernard Meunier Nestle

an Outline in Microsoft Word
02. 11. 2007
0 views

an Outline in Microsoft Word

festivals
05. 11. 2007
0 views

festivals

gmks
05. 11. 2007
0 views

gmks

IT Procurement Process
15. 11. 2007
0 views

IT Procurement Process

Pharmacology2000
16. 11. 2007
0 views

Pharmacology2000

sunum7
23. 11. 2007
0 views

sunum7

Assessing Students Online
18. 12. 2007
0 views

Assessing Students Online

Sleep Related Disorders
29. 11. 2007
0 views

Sleep Related Disorders

Biomes
03. 01. 2008
0 views

Biomes

ruraldevelopment
07. 01. 2008
0 views

ruraldevelopment

etb
29. 10. 2007
0 views

etb

20025McGloughlin
22. 11. 2007
0 views

20025McGloughlin

DRisstromGreenPurch0 303
04. 01. 2008
0 views

DRisstromGreenPurch0 303

presentation citymanagement
05. 11. 2007
0 views

presentation citymanagement

Overview April May 2005
17. 12. 2007
0 views

Overview April May 2005

martin
05. 11. 2007
0 views

martin

acs indonesia
24. 02. 2008
0 views

acs indonesia

Overhead A way out off fog
27. 02. 2008
0 views

Overhead A way out off fog

NCSL schaeffer july04
29. 02. 2008
0 views

NCSL schaeffer july04

0597Hecker
05. 03. 2008
0 views

0597Hecker

inter jusisdictional health en
11. 03. 2008
0 views

inter jusisdictional health en

Lt6 MktgStraginASPAC
27. 03. 2008
0 views

Lt6 MktgStraginASPAC

dunham
02. 01. 2008
0 views

dunham

G 17 pp
13. 04. 2008
0 views

G 17 pp

Beautiful motherhood
03. 10. 2007
0 views

Beautiful motherhood

WMCh2
23. 11. 2007
0 views

WMCh2

fiestaspaganas
05. 11. 2007
0 views

fiestaspaganas

Modovrv
06. 12. 2007
0 views

Modovrv

CFD InIndustry
04. 01. 2008
0 views

CFD InIndustry

CtxiForum2005Tritsch
27. 11. 2007
0 views

CtxiForum2005Tritsch

v 2007 02 08 lacher
16. 11. 2007
0 views

v 2007 02 08 lacher

Ch18part2
04. 01. 2008
0 views

Ch18part2

ovidmlaguide
12. 12. 2007
0 views

ovidmlaguide

EnergyFair81702Rev
04. 10. 2007
0 views

EnergyFair81702Rev

rvo1 4
13. 11. 2007
0 views

rvo1 4

innovation IIM
02. 11. 2007
0 views

innovation IIM

metabolism post meeting
28. 09. 2007
0 views

metabolism post meeting