Survey							
                            
		                
		                * Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Information Security in Real Business Yuri & The Cheeseheads Review of the problem statement and existing work  Assessing and managing third party vendor security requirements and practices for outsourced services  Existing solution     Established Vendor Review Process Technical Infrastructure Evaluation Scheduled Reviews & Onsite Visits Contractual Obligations Review of the problem statement and existing work Source: Forrester Research, and Infosys Analysis Real World Problem – VCNA  E-Commerce Portal      Technical Literature Integration with Production Lines – VINs Help System Payment Processing VIDA Software Downloads and Configurations Real World Problem – VCNA Cont…  Security Concerns      Personally Identifiable Information Complete VIN List Credit Card Processing Trade Secrets – Software Configurations Governing Bodies    EPA/CARB PCI Ford Motor Company Technical Solution Personally Identifiable Information      Entire site is encrypted using SSL Passwords are encrypted in database Customer is segregated on individual VLAN Backups are encrypted and shipped off-site Complete VIN List    Encrypted Secure Transmission to Locksmiths Credit Card Processing   Industry Standard Encryption Technical Solution Cont… Trade Secrets – Software Configurations  Software Subscriptions  Secure Login from Public Internet    All information is passed via https Passwords are encrypted in database Configured in Sweden per Order     Software is placed in shopping cart Order is passed to Volvo (Sweden) over a VPN connection Configured Software Request is Sent Back via VPN Technical Solution Cont… Trade Secrets – Software Configurations  Sold Via E-Commerce Application  Software is Purchased using Credit Card    Transmitted to Ford Network  Software Request is sent to Ford      SSL Encryption Verisign Integration Uses VPN connection with Limited IP and Port Number Request is Dropped into Message Queue Configured Software is Downloaded from Ford Installed on Cars for Diagnostic Testing Network Diagram Business, Risk, and Cost Considerations  Benefits of outsourcing services/data  Cost savings    Consistency of quality Expansion of business line   Economies of scale E-Commerce site Risks  Data security  Costs of a data breach – Survey conducted by Ponemon Inst.    $197 per company record Average total $6.3 million per breach Ranged from $225K to $35M Feasibility  The outsourcing vendor has the same incentive to secure the data  Breach of their customers’ data will be just as damaging to them as to the customer    Loss of revenue Loss of reputation Costs of securing data is low compared to the cost of breach  1 year of SSL Validity – VeriSign.com  $400 - $1600 per server   Varies based on trust level, security level, encryption strength Increase in competition will require vendors to provide adequate security levels Legal Considerations  Legal Compliance    SOX EPA/CARB PCI Conclusion  As long as we need to outsource data, we need to continue to balance security with usability and ensure that our vendors have the proper level of security in place for the data they have Q&A