Presentation is loading. Please wait.

Presentation is loading. Please wait.

1/6 최신정보보호기술 경일대학교 사이버보안학과 김 현성. 읽기 단계 (1) 문장 분석  주어, 동사  구, 절, 관계사, and or  모르는 단어 찾기 (2) 의미 파악  문맥의 흐름에 맞는 단어의 의미 찾기 (3) 문맥 연계  앞뒷 문장과 연계한 문장의.

Similar presentations


Presentation on theme: "1/6 최신정보보호기술 경일대학교 사이버보안학과 김 현성. 읽기 단계 (1) 문장 분석  주어, 동사  구, 절, 관계사, and or  모르는 단어 찾기 (2) 의미 파악  문맥의 흐름에 맞는 단어의 의미 찾기 (3) 문맥 연계  앞뒷 문장과 연계한 문장의."— Presentation transcript:

1 1/6 최신정보보호기술 경일대학교 사이버보안학과 김 현성

2 읽기 단계 (1) 문장 분석  주어, 동사  구, 절, 관계사, and or  모르는 단어 찾기 (2) 의미 파악  문맥의 흐름에 맞는 단어의 의미 찾기 (3) 문맥 연계  앞뒷 문장과 연계한 문장의 의미 분석 (4) 제목과 연계  제목과 연계해서 그 문장 및 문맥이 갖는 의미 파악 2/6

3 5 Information Security Trends That Will Dominate 2015 3. Threats From Third Supply chains are a vital component of every organization's global business operations and the backbone of today's global economy. However, Durbin says, security chiefs everywhere are growing more concerned about how open they are to numerous risk factors. A range of valuable and sensitive information is often shared with suppliers, and when that information is shared, direct control is lost. This leads to an increased risk of its confidentiality, integrity or availability being compromised. "Over the next year, third-party providers will continue to come under pressure from targeted attacks and are unlikely to be able to provide assurance of data confidentiality, integrity and/or availability," Durbin says. "Organizations of all sizes need to think about the consequences of a supplier providing accidental, but harmful, access to their intellectual property, customer or employee information, commercial plans or negotiations. And this thinking should not be confined to manufacturing or distribution partners. It should also embrace your professional services suppliers, your lawyers and accountants, all of whom share access oftentimes to your most valuable data assets.“ "Over the next year, third-party providers will continue to come under pressure from targeted attacks and are unlikely to be able to provide assurance of data confidentiality, integrity and/or availability," Durbin says. "Organizations of all sizes need to think about the consequences of a supplier providing accidental, but harmful, access to their intellectual property, customer or employee information, commercial plans or negotiations. And this thinking should not be confined to manufacturing or distribution partners. It should also embrace your professional services suppliers, your lawyers and accountants, all of whom share access oftentimes to your most valuable data assets.“ 4. BYOx Trends in the Workplace The bring-your-own (BYO) trend is here to stay whether organizations like it or not, Durbin says, and few organizations have developed good policy guidelines to cope. "As the trend of employees bringing mobile devices, applications and cloud-based storage and access in the workplace continues to grow, businesses of all sizes are seeing information security risks being exploited at a greater rate than ever before," he says. "These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications." "As the trend of employees bringing mobile devices, applications and cloud-based storage and access in the workplace continues to grow, businesses of all sizes are seeing information security risks being exploited at a greater rate than ever before," he says. "These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications." He notes that if you determine the BYO risks are too high for your organization today, you should at least make sure to stay abreast of developments. If you decide the risks are acceptable, make sure you establish a well-structured BYOx program. He notes that if you determine the BYO risks are too high for your organization today, you should at least make sure to stay abreast of developments. If you decide the risks are acceptable, make sure you establish a well-structured BYOx program. 3/6 출처 : T. Olaysrud, 출처 : T. Olaysrud, http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will -dominate-2015.htmlhttp://www.cio.com/article/2857673/security0/5-information-security-trends-that-will

4 5 Information Security Trends That Will Dominate 2015 "Keep in mind that if implemented poorly, a personal device strategy in the workplace could face accidental disclosures due to loss of boundary between work and personal data and more business information being held and accessed in an unprotected manner on consumer devices," he adds. 5. Engagement with Your People And that brings us full circle to every organization's greatest asset and most vulnerable target: people. Over the past few decades, organizations have spent millions, if not billions, of dollars on information security awareness activities. The rationale behind this approach, Durbin says, was to take their biggest asset — people — and change their behavior, thus reducing risk by providing them with knowledge of their responsibilities and what they need to do. Over the past few decades, organizations have spent millions, if not billions, of dollars on information security awareness activities. The rationale behind this approach, Durbin says, was to take their biggest asset — people — and change their behavior, thus reducing risk by providing them with knowledge of their responsibilities and what they need to do. But this has been — and will continue to be — a losing proposition, Durbin says. Instead, organizations need to make positive security behaviors part of the business process, transforming employees from risks into the first line of defense in the organization's security posture. But this has been — and will continue to be — a losing proposition, Durbin says. Instead, organizations need to make positive security behaviors part of the business process, transforming employees from risks into the first line of defense in the organization's security posture. "As we move into 2015, organizations need to shift from promoting awareness of the problem to creating solutions and embedding information security behaviors that affect risk positively," Durbin says. "The risks are real because people remain a 'wild card.' Many organizations recognize people as their biggest asset, yet many still fail to recognize the need to secure 'the human element' of information security. In essence, people should be an organization's strongest control." "As we move into 2015, organizations need to shift from promoting awareness of the problem to creating solutions and embedding information security behaviors that affect risk positively," Durbin says. "The risks are real because people remain a 'wild card.' Many organizations recognize people as their biggest asset, yet many still fail to recognize the need to secure 'the human element' of information security. In essence, people should be an organization's strongest control." "Instead of simply making people aware of their information security responsibilities and how they should respond, the answer for businesses of all sizes is to embed positive information security behaviors that will result in 'stop and think' behavior becoming a habit and part of an organization's information security culture," Durbin adds. "While many organizations have compliance activities which fall under the general heading of 'security awareness,' the real commercial driver should be risk, and how new behaviors can reduce that risk." "Instead of simply making people aware of their information security responsibilities and how they should respond, the answer for businesses of all sizes is to embed positive information security behaviors that will result in 'stop and think' behavior becoming a habit and part of an organization's information security culture," Durbin adds. "While many organizations have compliance activities which fall under the general heading of 'security awareness,' the real commercial driver should be risk, and how new behaviors can reduce that risk." 4/6 출처 : T. Olaysrud, 출처 : T. Olaysrud, http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will -dominate-2015.htmlhttp://www.cio.com/article/2857673/security0/5-information-security-trends-that-will

5 5 Information Security Trends That Will Dominate 2015 3. Threats From Third Supply chains are a vital component of every organization's global business operations and the backbone of today's global economy. However, Durbin says, security chiefs everywhere are growing more concerned about how open they are to numerous risk factors. A range of valuable and sensitive information is often shared with suppliers, and when that information is shared, direct control is lost. This leads to an increased risk of its confidentiality, integrity or availability being compromised. "Over the next year, third-party providers will continue to come under pressure from targeted attacks and are unlikely to be able to provide assurance of data confidentiality, integrity and/or availability," Durbin says. "Organizations of all sizes need to think about the consequences of a supplier providing accidental, but harmful, access to their intellectual property, customer or employee information, commercial plans or negotiations. And this thinking should not be confined to manufacturing or distribution partners. It should also embrace your professional services suppliers, your lawyers and accountants, all of whom share access oftentimes to your most valuable data assets.“ "Over the next year, third-party providers will continue to come under pressure from targeted attacks and are unlikely to be able to provide assurance of data confidentiality, integrity and/or availability," Durbin says. "Organizations of all sizes need to think about the consequences of a supplier providing accidental, but harmful, access to their intellectual property, customer or employee information, commercial plans or negotiations. And this thinking should not be confined to manufacturing or distribution partners. It should also embrace your professional services suppliers, your lawyers and accountants, all of whom share access oftentimes to your most valuable data assets.“ 4. BYOx Trends in the Workplace The bring-your-own (BYO) trend is here to stay whether organizations like it or not, Durbin says, and few organizations have developed good policy guidelines to cope. "As the trend of employees bringing mobile devices, applications and cloud-based storage and access in the workplace continues to grow, businesses of all sizes are seeing information security risks being exploited at a greater rate than ever before," he says. "These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications." "As the trend of employees bringing mobile devices, applications and cloud-based storage and access in the workplace continues to grow, businesses of all sizes are seeing information security risks being exploited at a greater rate than ever before," he says. "These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications." He notes that if you determine the BYO risks are too high for your organization today, you should at least make sure to stay abreast of developments. If you decide the risks are acceptable, make sure you establish a well-structured BYOx program. He notes that if you determine the BYO risks are too high for your organization today, you should at least make sure to stay abreast of developments. If you decide the risks are acceptable, make sure you establish a well-structured BYOx program. 5/6 출처 : T. Olaysrud, 출처 : T. Olaysrud, http://www.cio.com/article/2857673/security0/5-information-security-trends-that-will -dominate-2015.htmlhttp://www.cio.com/article/2857673/security0/5-information-security-trends-that-will

6 원문 읽기 6/6 Supply chains are a vital component of every organization's global business operations and the backbone of today's global economy. However, Durbin says, security chiefs everywhere are growing more concerned about how open they are to numerous risk factors. A range of valuable and sensitive information is often shared with suppliers, and when that information is shared, direct control is lost. This leads to an increased risk of its confidentiality, integrity or availability being compromised. Backbone : 중추 Chief : 우두머리 Backbone : 중추 Chief : 우두머리 [ ][ ] // [ ] [ ] [][ ] // ////// [ ][][ ] // //// [ ][] [] 13 524 6 7 13 5 24 6 7 8 910 11 12 13 1 3 5 2 46 7 8 9 10 111 35 2 46 7 //


Download ppt "1/6 최신정보보호기술 경일대학교 사이버보안학과 김 현성. 읽기 단계 (1) 문장 분석  주어, 동사  구, 절, 관계사, and or  모르는 단어 찾기 (2) 의미 파악  문맥의 흐름에 맞는 단어의 의미 찾기 (3) 문맥 연계  앞뒷 문장과 연계한 문장의."

Similar presentations


Ads by Google